Guest User

sieci

a guest
May 21st, 2019
1,073
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 233.67 KB | None | 0 0
  1. var elements=document.getElementsByTagName('*');var running=!1;var exam=!1;var chapter=!1;var questionid=!1;var as,bs;function isInt(value)
  2. {return!isNaN(value)&&(function(x){return(x|0)===x})(parseFloat(value))}
  3. function getExam(miejsce)
  4. {console.log("getExam start");(miejsce.toLowerCase().indexOf('routing')>-1||miejsce.toLowerCase().indexOf('ccna 2')>-1)?exam=2:(miejsce.toLowerCase().indexOf('introduction')>-1||miejsce.toLowerCase().indexOf('ccna 1')>-1)?exam=1:miejsce.toLowerCase().indexOf('it')>-1?exam=0:console.log("no exam found");if(isInt(exam))
  5. {(miejsce.toLowerCase().indexOf('practice')>-1||miejsce.toLowerCase().indexOf('c14')>-1)?chapter=13:(miejsce.toLowerCase().indexOf('final')>-1||miejsce.toLowerCase().indexOf('c0')>-1)?chapter=0:(miejsce.toLowerCase().indexOf('chapter 12')>-1||miejsce.toLowerCase().indexOf('c12')>-1)?chapter=12:(miejsce.toLowerCase().indexOf('chapter 11')>-1||miejsce.toLowerCase().indexOf('c11')>-1)?chapter=11:(miejsce.toLowerCase().indexOf('chapter 10')>-1||miejsce.toLowerCase().indexOf('c10')>-1)?chapter=10:(miejsce.toLowerCase().indexOf('chapter 9')>-1||miejsce.toLowerCase().indexOf('c9')>-1)?chapter=9:(miejsce.toLowerCase().indexOf('chapter 8')>-1||miejsce.toLowerCase().indexOf('c8')>-1)?chapter=8:(miejsce.toLowerCase().indexOf('chapter 7')>-1||miejsce.toLowerCase().indexOf('c7')>-1)?chapter=7:(miejsce.toLowerCase().indexOf('chapter 6')>-1||miejsce.toLowerCase().indexOf('c6')>-1)?chapter=6:(miejsce.toLowerCase().indexOf('chapter 5')>-1||miejsce.toLowerCase().indexOf('c5')>-1)?chapter=5:(miejsce.toLowerCase().indexOf('chapter 4')>-1||miejsce.toLowerCase().indexOf('c4')>-1)?chapter=4:(miejsce.toLowerCase().indexOf('chapter 3')>-1||miejsce.toLowerCase().indexOf('c3')>-1)?chapter=3:(miejsce.toLowerCase().indexOf('chapter 2')>-1||miejsce.toLowerCase().indexOf('c2')>-1)?chapter=2:(miejsce.toLowerCase().indexOf('chapter 1')>-1||miejsce.toLowerCase().indexOf('c1')>-1)?chapter=1:console.log("no chapter found")}
  6. console.log("exam: "+exam+", chapter: "+chapter);console.log("getExam end")}
  7. document.addEventListener('copy',function(e)
  8. {console.log("copyListener start");e.preventDefault();var selectedText=window.getSelection().toString();selectedText=selectedText.replace(/\u200B/g,"");console.log("zaznaczony tekst: "+selectedText);var a="";if(isInt(exam)&&isInt(chapter))
  9. {lst=selectedText.toLowerCase();console.log("exam: "+exam+", chapter: "+chapter+" są intami, szukamy pytania");questions[exam][chapter].forEach(function(question,i)
  10. {question=question.replace(/\u200B/g,"");question=question.toLowerCase();if((lst.indexOf(question)>-1&&question.length>15)||(lst==question))
  11. {console.log("znalezione pytanie: "+question);questionid=i;answers[exam][chapter][questionid].forEach(function(answer)
  12. {a+=answer})}})}
  13. else{console.log("exam: "+exam+", chapter: "+chapter+" nie są intami, szukamy chapteru");getExam(selectedText);if(isInt(exam)&&isInt(chapter))
  14. {console.log("exam: "+exam+", chapter: "+chapter+" są intami, doklejamy kropke");a="."}}
  15. if(e.clipboardData)
  16. e.clipboardData.setData('text/plain',selectedText+a);else if(window.clipboardData)
  17. window.clipboardData.setData('Text',selectedText+a);console.log("CopyListener end")});function znajdzPytanie()
  18. {console.log("znajdzPytanie start");if(isInt(exam)&&isInt(chapter))
  19. {running=!0;var questionDivId=$("td.current").attr('data-ident');var questionTextDiv=$('#AI'+questionDivId+'TextDiv');var questionText=$('#AI'+questionDivId+'TextDiv .surveyHeader .coreContent').text().toLowerCase();console.log("pytanie w divie: "+questionText);questions[exam][chapter].forEach(function(question,i)
  20. {question=question.replace(/\u200B/g,"");question=question.toLowerCase();if((questionText.indexOf(question)>-1&&question.length>15)||(questionText==question))
  21. questionid=i});console.log("questionid: "+questionid);isInt(questionid)?dopisz():running=!1}
  22. console.log("znajdzPytanie stop")}
  23. function dopisz()
  24. {console.log("dopisz start");if(isInt(questionid))
  25. {running=!0;for(var i=0;i<elements.length;i++)
  26. {var element=elements[i];for(var j=0;j<element.childNodes.length;j++)
  27. {var node=element.childNodes[j];if(node.nodeType===3)
  28. {answers[exam][chapter][questionid].forEach(function(answer)
  29. {var text=node.nodeValue;var patt=new RegExp(answer,'gi');var replacedText=text.replace(patt,answer+'˙');if(replacedText!==text)
  30. {console.log("dopisane: "+replacedText);node.replaceWith(document.createTextNode(replacedText))}})}}}}
  31. console.log("dopisz end")}
  32. function odpisz()
  33. {console.log("odpisz start");if(isInt(questionid))
  34. {for(var i=0;i<elements.length;i++)
  35. {var element=elements[i];for(var j=0;j<element.childNodes.length;j++)
  36. {var node=element.childNodes[j];if(node.nodeType===3&&isInt(questionid))
  37. {answers[exam][chapter][questionid].forEach(function(answer)
  38. {var text=node.nodeValue;var patt=new RegExp(answer+'.','gi');var replacedText=text.replace(patt,answer);if(replacedText!==text)
  39. {console.log("replacedText: "+replacedText);node.replaceWith(document.createTextNode(replacedText))}})}}}
  40. running=!1}
  41. console.log("odpisz end")}
  42. document.onmousedown=function(e)
  43. {if(e.which==2&&(!isInt(exam)||!isInt(chapter)))
  44. getExam($('#hdr').text());if(e.which==2&&!running&&isInt(exam)&&isInt(chapter))
  45. znajdzPytanie()}
  46. document.onmouseup=function(e)
  47. {if(e.which==2&&running&&isInt(exam)&&isInt(chapter)&&isInt(questionid))
  48. odpisz()}
  49. document.onkeydown=function(e)
  50. {if(e.which==68&&e.shiftKey)
  51. if(!isInt(exam)||!isInt(chapter))
  52. getExam($('#hdr').text());if(e.which==68&&!running&&isInt(exam)&&isInt(chapter))
  53. znajdzPytanie()}
  54. document.onkeyup=function(e)
  55. {if(e.which==68&&running&&isInt(exam)&&isInt(chapter)&&isInt(questionid))
  56. odpisz()}
  57. var questions=[[["A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?","A customer needs additional storage space on an older computer. What will the technician look at in the computer to determine if an additional hard drive can be added?","Why do laptop computers use CPU throttling techniques?","Which step is critical in selecting and installing multiple cooling fans for a PC case?","Which statement is true about DDR2 and DDR3 RAM modules?","To avoid electromagnetic interference, which type of equipment should a technician route copper network cables away from?","Which statement is true about the use of an antistatic wrist strap?","Which are two potential risks to a mobile device that could result from rooting or jailbreaking the device? (Choose two.)","A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?","A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?","What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)","In which circumstance should a level one technician initiate an escalated work order?","Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.)","Which motherboard feature controls the amount of data that a CPU transfers at one time?","What laptop component converts DC power to AC so that the display can illuminate?","A technician needs to configure a Bluetooth headset for a laptop user. Which two steps should the technician take before installing the headset? (Choose two.)","Which statement correctly compares the characteristics of coaxial cable with twisted-pair cable?","How is DSL able to carry telephone and data signals at the same time?","A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?","A user wants to upgrade components in a laptop to improve performance. Which two components can be replaced by the user? (Choose two.)","What are two operating systems that are found on mobile devices? (Choose two.)","A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?","Which feature of a mobile device touchscreen will allow a user to zoom in displayed items such as maps and photographs?","A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?","A user updates a device driver and reboots the system. When the user successfully logs in after the reboot, the OS displays a blue screen and crashes. The user presses the F8 key on reboot and tries to log in using the Last Known Good Configuration but gets the same result. Why will the Last Known Good Configuration not work?","Which file is used to detect and build information about the hardware devices installed on a Windows XP laptop during the boot process?","A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make the partition useable?","A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?","A technician is troubleshooting a computer that fails to print. The technician suspects that the printer driver may be outdated, proceeds to download the latest driver, and installs it. The technician attempts to print, but the problem persists. What is the next action that the technician should take?","A user reports that some printing jobs are not being printed. The technician checks and notices that the jobs are stuck in the printing queue. What action should the technician take to solve the problem?","A technician is troubleshooting a printer that fails to print because of constant paper jams. What should the technician try first?","A technician is planning an operating system upgrade for a user system that is currently running Windows Vista. Because the BitLocker feature embedded in the Windows Vista OS is required, there is a request that this feature be available when the new operating system is installed. Which version or versions of Windows 7 would support this feature?","What does %USERPROFILE% represent in the pathC:Users%USERPROFILE%AppDataLocalTemp?","A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?","A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?","A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?","Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?","The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?","What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?","What best describes the security threat of spoofing?","Which three attributes of NTFS make it a better file system than FAT32? (Choose three.)","Which open standards-based wireless security mode supports the highest level of security?","After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?","A technician is servicing a laser printer. Which two printer parts should the technician avoid touching because they retain large amounts of voltage even when disconnected from a power source?","A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)","A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?","A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?","What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?","After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?","Rogue antivirus warning windows have been reported as appearing on computers in a company. The computer systems administrator is drafting a notice to all employees explaining how to deal with this problem. In addition to a description of the problem and the reporting procedure, which two instructions should also be included in the notice? (Choose two.)","An audit reveals company files that are stored in the personal server space of a former employee have been modified after the employee left the company. What should be done to prevent further unauthorized access to these files, while still allowing the company to use them?","A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)","Which two procedures should be done before performing preventive maintenance on a laptop? (Choose two.)","In what circumstance would plenum-rated twisted-pair computer network cabling be required?","Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)","Which feature is characteristic of the ntbackup command?","What are the four layers in the TCP/IP reference model?","After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem?","The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?","What is a typical task performed by a level one technician in a call center?","Which statement is true about the use of an antistatic wrist strap?","Which action can reduce the risk of ESD damage when computer equipment is being worked on?","A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?","What approach should a technician take when receiving a call from a stressed customer?","A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?","A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?","What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)","A user has installed a new printer. Which two pieces of information about the printer operation are provided by printing a test page from the computer? (Choose two.)","Which two procedures should be done before performing preventive maintenance on a laptop? (Choose two.)","What is a typical task performed by a level one technician in a call center?","What laptop component converts DC power to AC so that the display can illuminate?","A technician needs to configure a Bluetooth headset for a laptop user. Which two steps should the technician take before installing the headset? (Choose two.)","Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)","A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?","What are two operating systems that are found on mobile devices? (Choose two.)","A user updates a device driver and reboots the system. When the user successfully logs in after the reboot, the OS displays a blue screen and crashes. The user presses the F8 key on reboot and tries to log in using the Last Known Good Configuration but gets the same result. Why will the Last Known Good Configuration not work?","A technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?","A technician is troubleshooting a computer that fails to print. The technician suspects that the printer driver may be outdated, proceeds to download the latest driver, and installs it. The technician attempts to print, but the problem persists. What is the next action that the technician should take?","A technician is troubleshooting a printer that fails to print because of constant paper jams. What should the technician try first?","A technician is planning an operating system upgrade for a user system that is currently running Windows Vista. Because the BitLocker feature embedded in the Windows Vista OS is required, there is a request that this feature be available when the new operating system is installed. Which version or versions of Windows 7 would support this feature?","What is different about the default location for user files in Windows Vista compared to Windows XP?","Which Windows feature enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?","Which Windows hard drive partition is referred to as the C: drive?","Refer to the exhibit. Which utility has the IT department started on each computer?","A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?","A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?","Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?","Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?","What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?","What characterizes a DDoS attack?","What guideline should be followed when establishing a password security policy?","After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?","A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?","A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)","A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?","The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?","A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?","What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?","A computer has been assigned an IP address of 169.254.33.16. What command could be used to force the computer to request an IP address again?","After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?","A user wants to upgrade components in a laptop to improve performance. Which two components can be replaced by the user? (Choose two.)","A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make use of the new space?","A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting?","How does MAC address filtering enable wireless network security at the device level?","Rogue antivirus warning windows have been reported as appearing on computers in a company. The computer systems administrator is drafting a notice to all employees explaining how to deal with this problem. In addition to a description of the problem and the reporting procedure, which two instructions should also be included in the notice? (Choose two.)","The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?","Which protocol adds security to remote connections?","What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)","Which statement is true about DDR2 and DDR3 RAM modules?","A customer needs additional storage space on an older computer. What will the technician look at in the computer to determine if an additional hard drive can be added?","A computer user has a USB 3.0 thumb drive. What USB port or ports could be used to attach the drive to the PC?","Which step is critical in selecting and installing multiple cooling fans for a PC case?","A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?","Refer to the exhibit. To what input device would the cables attach?","Which motherboard feature controls the amount of data that a CPU transfers at one time?","Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?","A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)","A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?","Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?","Which two items would be part of a laptop preventive maintenance kit? (Choose two.)","In which circumstance should a level one technician initiate an escalated work order?","In what circumstance would plenum-rated twisted-pair computer network cabling be required?","Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)","A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?","Which feature of a mobile device touchscreen will allow a user to zoom in displayed items such as maps and photographs?","A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?","After solving a problem on a computer, a technician checks the event log to ensure that there are no new error messages. At which step of the troubleshooting process is this action taking place?","A technician has just installed a new laser printer, but is unable to print a test page. What is the most likely cause for this?","A user reports that some printing jobs are not being printed. The technician checks and notices that the jobs are stuck in the printing queue. What action should the technician take to solve the problem?","A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?","A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?","For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?","An administrator receives an email message from what appears to be the company bank. The email asks for account information. The administrator determines the email is not from the bank. What type of security threat has the administrator detected?","Which two aspects of a computer can be protected by setting the BIOS password? (Choose two.)","Which two aspects of a computer can be protected by setting the BIOS password? (Choose two.)","Which two password control policies should an organization implement to ensure strong passwords? (Choose two.)","Which open standards-based wireless security mode supports the highest level of security?","In a networking class, the instructor tells the students to ping the other computers in the classroom from the command prompt. Why do all pings in the class fail?","A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)","What can help control the effect of RFI on a wireless LAN?","The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?","What are the four layers in the TCP/IP reference model?","A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?","A newly hired technician is attaching a computer to the network. Upon examining the network configuration, the technician recognizes that the computer is configured with a protocol stack that is used for Internet communication. What protocol stack is installed on the computer?","After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem?","An audit reveals company files that are stored in the personal server space of a former employee have been modified after the employee left the company. What should be done to prevent further unauthorized access to these files, while still allowing the company to use them?","How is DSL able to carry telephone and data signals at the same time?","A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?","Which are two potential risks to a mobile device that could result from rooting or jailbreaking the device? (Choose two.)?","Which three attributes of NTFS make it a better file system than FAT32? (Choose three.)","Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?","Why do laptop computers use CPU throttling techniques?","A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?","A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?","What are the terms refresh rate, interlace, and aspect ratio related to?","Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.)"],[],[],[],["Which task should be part of a software maintenance routine?","What is the purpose of documenting the information that is obtained from the customer in the work order?","What is a recommended procedure to follow when cleaning computer components?","After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)","Which device is most likely to be affected by an incorrect setting saved in CMOS or an incorrect jumper setting?","A technician is performing hardware maintenance of PCs at a construction site. What task should the technician perform as part of a preventive maintenance plan?","A user has opened a ticket that indicates that the computer clock keeps losing the correct time. What is the most likely cause of the problem?","Which two common computer problems could cause a motherboard to short-circuit? (Choose two.)","An employee reports that each time a workstation is started it locks up after about 5 minutes of use. What is the most likely cause of the problem?","An employee reports that the antivirus software cannot obtain updates. The support technician notices that the license for the software has expired. The technician adds a new license to the software and completes the update service. What should the technician do next?","Which two items could be used to help establish a plan of action when resolving a computer problem? (Choose two.)","After a new PCIe video card is added, the computer seems to boot successfully but it will not display any video. The computer was working properly before the new video card was installed. What is the most likely cause of the problem?","A scientific expedition team is using laptops for their work. The temperatures where the scientists are working range from -13 degrees Fahrenheit (-25 degree Celsius) to 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is around 40 percent. Noise levels are low, but the terrain is rough and winds can reach 45 miles per hour (72 kilometers per hour). When needed, the scientists stop walking and enter the data using the laptop. Which condition is most likely to adversely affect a laptop that is used in this environment?","What is part of creating a preventive maintenance plan?","What is the preferred method to remove a disc from an optical drive that fails to eject the disc?","A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status and the file system structure. The technician asks the customer if a backup has been performed on the disk and the customer replies that the backup was done a week ago to a different logical partition on the disk. What should the technician do before performing diagnostic procedures on the disk?","During the process of testing a theory of several probable causes to a problem, which should be tested first?","During the troubleshooting of a PC that will not boot, it is suspected that the problem is with the RAM modules. The RAM modules are removed and put into another PC, which successfully powers on. The RAM modules are then put back into the original PC and it now successfully powers on as well. What was the most likely cause of the problem?","Which component can be easily damaged by the direct spray of compressed air when cleaning the inside the computer case?","Which step of the six-step troubleshooting process is where a technician would ask the computer user to print a document on a newly installed printer?","Which two types of data should be backed up before troubleshooting a computer for a customer? (Choose two.)","A web designer installed the latest video editing software and now notices that when the application loads, it responds slowly. Also the hard disk LED is constantly flashing when the application is in use. What is a solution to solve the performance problem?"],[],["Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?","A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)","Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?","When is a dial-up connection used to connect to an Internet provider?","Which type of connection to the Internet is capable of the fastest transfer rates?","Which statement describes the logical topology for a LAN?","ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program?","What is an example of network maintenance?","A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?","Which technology is most often used to connect devices to a PAN?","Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)","A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device?","What is a characteristic of the UDP protocol?","What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11g protocol standard?","What is the maximum segment length that is specified by the 1000BASE-T standard?","Which two characteristics describe Ethernet technology? (Choose two.)","Which three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)","What benefit is provided by a computer data network?","When would a printer be considered a network host?","A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?","What is identified by the 100 in the 100BASE-TX standard?","A user installs a new gigabit NIC in a PC. The user notices that the data transfer rate is much slower than expected. What should the user do to fix the problem?","A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers do. The original computers performed much faster with applications that required the transfer of data over the network. What should the company technicians do?","A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem?"],["Which two statements are true of a laptop CPU when compared to a desktop CPU? (Choose two.)","In the power management settings, which two devices can be set to turn off to conserve battery power? (Choose two.)","What is the first step in the process of troubleshooting a laptop?","What is the final task for a technician after troubleshooting a laptop?","What can a user do to reconnect a laptop to a functioning wireless network after a laptop has been moved and the connection has been lost?","Why are SODIMMs well suited for laptops?","An administrator tries to configure Power Options within Windows, but is unable to do so. What is the possible cause?","A technician is trying to remove a SODIMM module from a laptop. What is the correct way to do this?","What should a technician do prior to replacing a keyboard on a laptop?","Which two internal expansion slots in laptops are commonly used to install wireless adapter cards? (Choose two.)","What is the next step in the troubleshooting process after a solution has been implemented on a laptop?","A technician notices that a laptop display appears stretched and pixelated. What is a probable cause of this?","Which statement is true about laptops?","What is a definition for CPU throttling?","What is the purpose of the eject button on a laptop docking station?","Which key sequence may be used to control whether the content of the screen will be presented on a built-in display or on an external display?","What would be the most effective preventive maintenance routine for company laptops that are subject to high use?","To clean laptops, which two products are recommended? (Choose two.)","A technician has been asked to decide which laptop components should be cleaned on a monthly basis as part of a maintenance routine. What are two examples of components that should be included? (Choose two.)","A technician has installed a wireless Ethernet card in a Windows 7 laptop. Where would the technician configure a new wireless connection?","Which component or components would be interchangeable between a laptop and and a desktop PC?","A user needs to connect a Bluetooth device to a laptop. Which type of cable is needed to accomplish this?","Which task should be part of a software maintenance routine?","What is the purpose of documenting the information that is obtained from the customer in the work order?","What is a recommended procedure to follow when cleaning computer components?","After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)","Which device is most likely to be affected by an incorrect setting saved in CMOS or an incorrect jumper setting?","A technician is performing hardware maintenance of PCs at a construction site. What task should the technician perform as part of a preventive maintenance plan?","A user has opened a ticket that indicates that the computer clock keeps losing the correct time. What is the most likely cause of the problem?","Which two common computer problems could cause a motherboard to short-circuit? (Choose two.)","An employee reports that each time a workstation is started it locks up after about 5 minutes of use. What is the most likely cause of the problem?","An employee reports that the antivirus software cannot obtain updates. The support technician notices that the license for the software has expired. The technician adds a new license to the software and completes the update service. What should the technician do next?","Which two items could be used to help establish a plan of action when resolving a computer problem? (Choose two.)","After a new PCIe video card is added, the computer seems to boot successfully but it will not display any video. The computer was working properly before the new video card was installed. What is the most likely cause of the problem?","A scientific expedition team is using laptops for their work. The temperatures where the scientists are working range from -13 degrees Fahrenheit (-25 degree Celsius) to 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is around 40 percent. Noise levels are low, but the terrain is rough and winds can reach 45 miles per hour (72 kilometers per hour). When needed, the scientists stop walking and enter the data using the laptop. Which condition is most likely to adversely affect a laptop that is used in this environment?","What is part of creating a preventive maintenance plan?","What is the preferred method to remove a disc from an optical drive that fails to eject the disc?","A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status and the file system structure. The technician asks the customer if a backup has been performed on the disk and the customer replies that the backup was done a week ago to a different logical partition on the disk. What should the technician do before performing diagnostic procedures on the disk?","During the process of testing a theory of several probable causes to a problem, which should be tested first?","During the troubleshooting of a PC that will not boot, it is suspected that the problem is with the RAM modules. The RAM modules are removed and put into another PC, which successfully powers on. The RAM modules are then put back into the original PC and it now successfully powers on as well. What was the most likely cause of the problem?","Which component can be easily damaged by the direct spray of compressed air when cleaning the inside the computer case?","Which step of the six-step troubleshooting process is where a technician would ask the computer user to print a document on a newly installed printer?","Which two types of data should be backed up before troubleshooting a computer for a customer? (Choose two.)","A web designer installed the latest video editing software and now notices that when the application loads, it responds slowly. Also the hard disk LED is constantly flashing when the application is in use. What is a solution to solve the performance problem?"],["What is a good source for safely downloading Android apps?","What two functions can be performed with the home button on an iOS mobile device? (Choose two.)","What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)","What are two purposes of the passcode lock feature on mobile devices? (Choose two.)","What is an advantage of using flash memory to store data in mobile devices?","What are two touchscreen characteristics that are used by most mobile devices? (Choose two.)","Which component is field-replaceable in most mobile devices?","Which mobile device troubleshooting procedure is correct?","A user accidentally drops a mobile device into a pool. What corrective action should be taken?","After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?","After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues? (Choose two.)","Which scenario or situation would prevent a user from upgrading the OS on an Android device?","Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)","Which two items common to both Android and iOS devices can be remotely backed up? (Choose two.)","Which statement is true about wireless connectivity on an Android mobile device?","Second-generation (2G)","Third-generation (3G)","Fourth-generation (4G)","In the context of mobile devices, what does the term tethering involve?","Which statement is true about industry standards for cellular networks?","Which statement about synchronizing a mobile device to a PC is true?","A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?","Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?","Which term describes the ability of a mobile device to recognize when two or more points of contact are made on the screen?"],["Which factor affects the speed of an inkjet printer?","What are two cables that are used to connect a computer to a printer? (Choose two.)","What is a characteristic of thermal inkjet nozzles?","In laser printing, what is the name of the process of applying toner to the latent image on the drum?","What is the purpose of the Additional Drivers button in the Sharing tab of the Printer Properties?","A small LAN uses a shared printer that is connected to a computer. None of the users can print but all of the users can access the shared resources on the computer to which the printer is locally connected. What is a possible cause of this?","How would a user install a new USB printer on a PC that is running Windows 7 Professional?","A Windows 7 computer has several printers configured in the Control Panel Devices and Printers window. Which printer will the computer choose to be the first option for printing?","What are two methods to share a printer wirelessly? (Choose two.)","A user discovers that an inkjet color printer is printing different colors from those that are shown on the screen. What can be done to solve this problem?","The users on a LAN are reporting that computers respond slowly whenever high resolution photographs are being printed on the color laser printer. What would be the cause of this problem?","What is a characteristic of global and per-document options in print settings?","What is true about the PostScript language?","What are two closed-ended questions that a technician could ask a user while trying to identify the problem with a printer? (Choose two.)","After applying a solution to a printer problem, a technician restarts the printer and prints a test page. Which step of the troubleshooting process is the technician applying?","A user notices that a job submitted to a printer is displayed in the print queue, but the printer is not printing the document. What is a probable cause of this problem?","A technician recorded that a new fuser roller unit was installed in a laser printer to solve a printing problem. Which step in the troubleshooting process did the technician just perform?","Where would network printer sharing be configured in a Windows 7 environment?","What are two functions of a print server? (Choose two.)","Which action supports an effective printer preventive maintenance program?","Which two replacement parts are typically found in a laser printer maintenance kit? (Choose two.)","How can the life of a thermal printer be extended?"],["A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?","Which two security precautions will help protect a workplace against social engineering? (Choose two.)","What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)","Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?","It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)","In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?","All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?","You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?","What is the most effective way of securing wireless traffic?","Which two items are used in asymmetric encryption? (Choose two.)","Which two characteristics describe a worm? (Choose two.)","Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?","How should future expansion be done?","What does a malware detection program look for when running a scan?","Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?","Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)","What is the primary goal of a DoS attack?","Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?","Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?","A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?","A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?","What is the name given to the programming-code patterns of viruses?"],["Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)","What is the definition of cyber law?","When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?","During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information?","Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?","What are two sections that are usually included in an SLA? (Choose two.)","Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.)","Which statement describes a best practice related to time management?","Which two statements are correct about level one and level two technicians? (Choose two.)","What should a level two technician do immediately after receiving an escalated work order from a level one technician?","A customer calls to report a computer problem. Which two actions can the technician take to establish a good rapport with the customer? (Choose two.)","What is the correct way to conduct a telephone call to troubleshoot a computer problem?","A technician receives a call from a customer who is too talkative. How should the technician handle the call?","What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)","What are three pieces of information a level one technician should gather from a customer? (Choose three.)","Which situation would require that a support desk call be given the highest priority?","Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)","In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?","What customer support procedure would likely cause an upset customer to become more upset?","What name is given to a certain set of general rules that apply to written communication over the Internet?","When performing computer forensics what is required to prove a chain of custody?","What is a reason to escalate a problem from a level one technician to a level two technician?"],["Which two operating systems can be upgraded to Windows XP Home? (Choose two.)","A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.)","A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an","A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem?","A laptop that is running Windows XP displays","Several times during the last few days, a user has experienced the Blue Screen of Death when plugging an external hard drive into a laptop via USB. What is a possible solution for this problem?","A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)","What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)","A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?","Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)","A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?","A technician is working on a laptop that has a dark display. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem. What could be the problem?","A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?","A user complains that when a page is printed on a laser printer, the page smears when touched. What is a possible cause of this issue?","A technician finds that occasionally when a network printer is restarted, clients are unable to print to it, receiving a","A user complains that a printer is outputting random characters instead of the desired document. What is a probable cause of this?","A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause?","A computer displays this message when the computer boots:","Users are complaining that they are receiving spam from the email account that belongs to a co-worker. What could cause this problem?","A technician is troubleshooting a laptop that has the power light on and the hard drive spinning. However, the laptop only displays vertical lines that change color. What is the problem?","A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer test pages. What is a probable cause?","A technician arrives and asks a customer,","A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.)"],["Which two elements should typically be included in a computer security policy? (Choose two.)","Which type of power connector is used to connect devices such as optical drives and hard drives?","A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?","A client has provided a 4 GB SODIMM module to a technician to perform a memory upgrade on a workstation, but the technician is having problems installing it. What is a probable cause for this?","How should a hard drive be partitioned to support a Windows 7 installation over a network?","A new technician has joined the IT team and is about to service a heavy printer. What advice would you give this technician to avoid any injury when transporting the heavy printer to the service area?","A customer used the Convert utility to take advantage of NTFS security features. The customer later discovered that the applications on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files were missing. What should the customer do next?","A technician is trying to determine where a network cable terminates in the wiring closet. Which tool is best suited for this task?","Which component uses the greatest amount of power on most mobile devices?","A technician is troubleshooting a printer that prints unknown characters instead of the correct document. What are two probable causes for this? (Choose two.)","Which two memory types are installed using DIMM slots? (Choose two.)","Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?","A customer reports that after booting a Windows Vista computer with a CD and running antivirus software to remove a boot sector virus, the computer still fails to boot from the hard disk. What should the technician do to try to solve this problem?","A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?","A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?","A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?","A technician has repaired a failing laser printer that was not able to pull the paper from the input tray. After installing the replacement parts, the technician tested the printer with a test page and everything worked as expected. Which would be a possible next step to complete the troubleshooting process?","Which wireless security mode supports government grade security and offers both personal and enterprise authentication?","What are three benefits of computer preventive maintenance? (Choose three.)","Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?","A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?","Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate?","A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?","What are three common input devices found on laptops? (Choose three.)","On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)","A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem?","Which statement correctly describes the cancellation effect?","Which is a characteristic of the Android operating system?","A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?","What is an accurate description of asymmetric encryption technology?","Which software installation method is used when a customer runs Google play from a mobile device?","When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?","A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?","A technician recently implemented security on a new computer used by a web-based program developer. Initially the computer was allowed to access a number of programs over the network, but now the developer has found that new programs cannot be accessed. Which firewall setting should the technician apply to allow new programs while also keeping the computer secure?","Which technology allows a user to securely access a company LAN across a public network?","A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. The technician thinks that the CMOS battery is losing the charge. What would be the next step in the troubleshooting process?","A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?","A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)","A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?","Which three components are typically found in laser printer maintenance kits? (Choose three.)","A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?","What precaution should a technician take when checking a thermal printer that suddenly stops functioning?","A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password?","Which two actions must be performed before installing RAM into a laptop? (Choose two.)","A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?","What category of technician uses remote access software to update a computer belonging to a customer?","What determines to which device the computer searches first to locate boot files?","Which port is used only for input?","When a dual core CPU with Hyper-Threading features is installed on a motherboard, how many instructions can the CPU simultaneously process?","Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)","Which measure can help control RFI effects on wireless networks?","What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)","At which TCP/IP model layer would a MAC address be found?","A technician is attempting to install an application that is not supported by the Windows XP operating system on the PC. How can the technician make this application run on the PC?","Which factor should be considered when selecting cooling fans for a PC case?","A technician is replacing a failing keyboard on a laptop computer. After the installation, the technician finds that none of the keys on the keyboard are working. What should the technician do next?","A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?","Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)","A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?","A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?"]],[["Which communication tool allows real-time collaboration?","A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)","A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?","A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?","Refer to the exhibit. From which location did this router load the IOS?","Which connection provides a secure CLI session with encryption to a Cisco network device?","Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?","An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?","What function does pressing the Tab key have when entering a command in IOS?","Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?","Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?","After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?","Refer to the exhibit. Which action will be successful?","Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?","What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)","Which two protocols function at the internet layer? (Choose two.)","Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?","Which address on a PC does not change, even if the PC is moved to a different network?","What is the protocol that is used to discover a physical address from a known logical address and what message type does it use?","What will happen if the default gateway address is incorrectly configured on a host?","What is an important function of the physical layer of the OSI model?","Which procedure is used to reduce the effect of crosstalk in copper cables?","Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)","What is contained in the trailer of a data-link frame?","What is the auto-MDIX feature on a switch?","Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?.","How does a Layer 3 switch differ from a Layer 2 switch?","What is the purpose of the routing process?","Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?","Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?","Which of the following are primary functions of a router? (Choose two.)","Which two statements correctly describe a router memory type and its contents? (Choose two.)","In which default order will a router search for startup configuration information?","What happens when part of an Internet VoIP transmission is not delivered to the destination?","Which three IP addresses are private ? (Choose three.)","How many bits make up the single IPv6 hextet :10CD:?","What is the effect of configuring the ipv6 unicast-routing command on a router?","Which group of IPv6 addresses cannot be allocated as a host source address?","What is the purpose of ICMP messages?","Refer to the exhibit. A technician has configured a user workstation with the IP address and default subnet masks that are shown. Although the user can access all local LAN resources, the user cannot access any Internet sites by using either FQDN or IP addresses. Based upon the exhibit, what could account for this failure?","Which subnet would include the address 192.168.1.96 as a usable host address?","A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?","Refer to the exhibit. Which IP addressing scheme should be changed?","Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)","A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)","What is the purpose of the network security accounting function?","When applied to a router, which command would help mitigate brute-force password attacks against the router?","A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?","When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?","What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)","Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?","is a best-effort, connectionless application layer protocol that is used to transfer files.","Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)","Consider the following range of addresses:","A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)","When is a dial-up connection used to connect to an ISP?","On a school network, students are surfing the web, searching the library database, and attending an audio conference with their sister school in Japan. If network traffic is prioritized with QoS, how will the traffic be classified from highest priority to lowest priority?","During normal operation, from which location do most Cisco routers run the IOS?","Which connection provides a secure CLI session with encryption to a Cisco switch?","Which keys act as a hot key combination that is used to interrupt an IOS process?","Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?","After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?","On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?","A technician uses the ping 127.0.0.1 command. What is the technician testing?","What is the correct order for PDU encapsulation?","Which device should be used for enabling a host to communicate with another host on a different network?","A network technician is measuring the transfer of bits across the company backbone for a mission critical application. The technician notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)","Which characteristics describe fiber optic cable? (Choose two.)","What are two features of a physical, star network topology? (Choose two.)","A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?","What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?","Which switching method has the lowest level of latency?","Which parameter does the router use to choose the path to the destination when there are multiple routes available?","Which two statements describe the functions or characteristics of ROM in a router? (Choose two.)","Which statement describes a characteristic of the Cisco router management ports?","What happens when part of an Internet radio transmission is not delivered to the destination?","What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?","Which three IP addresses are private ? (Choose three.)","What types of addresses make up the majority of addresses within the /8 block IPv4 bit space?","What is the maximum TTL value that is used to reach the destination www.cisco.com??","A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)","In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts?","Which protocol supports rapid delivery of streaming media?","Why would a network administrator use the tracert utility?","What is the significance of the asterisk (*) in the exhibited output?","Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?","Point-to-point communications where both devices can transmit and receive on the medium at the same time are known as","A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)","Which area would most likely be an extranet for the company network that is shown?","What is the purpose of having a converged network?","Three office workers are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other office workers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?","During normal operation, from which location do most Cisco switches and routers run the IOS?","A network administrator is making changes to the configuration of a router. After making the changes and verifying the results, the administrator issues the copy running-config startup-config command. What will happen after this command executes?","What information does the loopback test provide?","What is a characteristic of the LLC sublayer?","What method is used to manage contention-based access on a wireless network?","What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?","Which destination address is used in an ARP request frame?","What is the auto-MDIX feature on a switch?","Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?","What are the two main components of Cisco Express Forwarding (CEF)? (Choose two.)","Which statement describes the sequence of processes executed by a router when it receives a packet from a host to be delivered to a host on another network?","Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?","Router R1 has two interfaces that were configured with correct IP addresses and subnet masks. Why does the show ip route command output not display any information about the directly connected networks?","What happens when part of an Internet television transmission is not delivered to the destination?","Which three statements characterize the transport layer protocols? (Choose three.)","A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify the destination web browser?","Which statement is true regarding the UDP client process during a session with a server?","Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)","What are three characteristics of multicast transmission? (Choose three.)","Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)","What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64?.","Which two tasks are functions of the presentation layer? (Choose two.)","What is the purpose of the network security authentication function?","Which type of wireless security makes use of dynamic encryption keys each time a client associates with an AP?","During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a","The Server0 message is","A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?","Which field in an IPv4 packet header will typically stay the same during its transmission?","Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?","Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?","Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator has already logged into a Telnet session on the switch, which password is needed to access privileged EXEC mode?","What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)","What must be configured to enable Cisco Express Forwarding (CEF) on most Cisco devices that perform Layer 3 switching?","What is the purpose of adjacency tables as used in Cisco Express Forwarding (CEF)?","Which statement describes a characteristic of the network layer in the OSI model?","A user gets an IP address of 192.168.0.1 from the company network administrator. A friend of the user at a different company gets the same IP address on another PC. How can two PCs use the same IP address and still reach the Internet, send and receive email, and search the web?","At a minimum, which address is required on IPv6-enabled interfaces?","Why does HTTP use TCP as the transport layer protocol?","What is the binary representation of 0xCA?","What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?","Refer to the exhibit. What is the maximum TTL value that is used to reach the destination www.cisco.com?","What field content is used by ICMPv6 to determine that a packet has expired?","Which statement is true about variable-length subnet masking?","Which firewall technique blocks incoming packets unless they are responses to internal requests?","A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command issued on the PC will return to the technician the complete path to the remote host?","To prevent faulty network devices from carrying dangerous voltage levels, equipment must be","A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)","What is a possible hazard that can be caused by network cables in a fire?","What device is commonly used to verify a UTP cable?","What needs to be checked when testing a UTP network cable?","Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?","Which function is provided by TCP?","What does a router use to determine where to send data it receives from the network?","Which router interface should be used for direct remote access to the router via a modem?","A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?","Which three statements characterize the transport layer protocols? (Choose three.)","Refer to the exhibit. A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?","Which statement is true about an interface that is configured with the IPv6 address command?","Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?","Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?","A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?","How many additional bits should be borrowed from a /26 subnet mask in order to create subnets for WAN links that need only 2 useable addresses?","topology influences the type of network framing and media access control that will be used.","Refer to the exhibit. The administrator configured the access to the console and the vty lines of a router. Which conclusion can be drawn from this configuration?","An administrator issued the service password-encryption command to apply encryption to the passwords configured for enable password, vty, and console lines. What will be the consequences if the administrator later issues the no service password-encryption command?","After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?","What are two features of ARP? (Choose two.)","What are two examples of the cut-through switching method? (Choose two.)","A network administrator is enabling services on a newly installed server. Which two statements describe how services are used on a server? (Choose two.)","Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?","Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?","A particular telnet site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?","Network devices come in two physical configurations. Devices that have expansion slots that provide the flexibility to add new modules have a","Refer to the exhibit. What is the maximum TIL value that is used to reach the destination www.cisco.com?","Which statement is true about DHCP operation?","Which type of wireless security is easily compromised?","A network administrator notices that the throughput on the network appears lower than expected when compared to the end-to-end network bandwidth. Which three factors can explain this difference? (Choose three.)","A host PC is attempting to lease an address through DHCP. What message is sent by the server to the client know it is able to use the provided IP information?","A network administrator is configuring access control to switch SW1. If the administrator uses console line to connect to the switch, which password is needed to access user EXEC mode?","What is a characteristic of UTP cabling?","How many bits would need to be borrowed if a network admin were given the IP addressing scheme of 172.16.0.0/16 and needed no more than 16 subnet with equal number of hosts?","It will give 4 options about ping, the correct one is:","Which statement best describes the operation of the File Transfer Protocol?","A client is establishing a TCP session with a server. How is the acknowledgment number in the response segment to the client determined?","Why does layer 3 device perform the ANDing process on a destination IP and subnet Mask?","There was also a question about if you activated service password encryption in the past and you prompt","What type of communication rule would best describe CSMA/CD?","What is the primary reason to subnet IPv6 prefixes?","What type of IPv6 address is FE80::1?","Which statement describes data throughput?","IPv4 multicast addresses are directly mapped to IEEE 802 (Ethernet) MAC addresses using the last","How could a faulty network device create a source of hazard for a user? (Choose two.)","What are three important considerations when planning the structure of an IP addressing scheme? (Choose three.)","What is the metric value that is used to reach the 10.1.1.0 network in the following routing table entry?","Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)","What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?","To what legacy address class does the address 10.0.0.0 belong?","What type of communication medium is used with a wireless LAN connection?","Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?","What is a characteristic of DNS?","What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?","What are two services provided by the OSI network layer? (Choose two.)","What information is maintained in the CEF adjacency table?","A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network services is the network administrator trying to accommodate? (Choose two.)"],[],[],[],["What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)","Which statement is correct about multimode fiber?","Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?","The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?","A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)","What is the purpose of the FCS field in a frame?","As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?","Which statement describes signaling at the physical layer?","A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)","What is one main characteristic of the data link layer?","What is one advantage of using fiber optic cabling rather than copper cabling?","What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?","Why are two strands of fiber used for a single fiber optic connection?","Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?","What is true concerning physical and logical topologies?","The term","Refer to the exhibit. What is wrong with the displayed termination?","10,000,000,000 b/s can also be written as","What are two characteristics of 802.11 wireless networks? (Choose two.)","A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?","How is the magnetic field cancellation effect enhanced in UTP cables?","The physical layer encodes the frames.","The physical layer creates the signals that represent the bits in each frame.","The signals are sent on the media one at a time.","The physical layer retrieves the individual signals from the media","The physical layer restores the individual signals to their bit representations","What is true concerning physical and logical topologies?","What is indicated by the term throughput?","Which characteristic describes crosstalk?","What technique is used with UTP cable to help protect against signal interference from crosstalk?","What are two services performed by the data link layer of the OSI model? (Choose two.)","Which method of data transfer allows information to be sent and received at the same time?","Which statement describes an extended star topology?","Which statement describes the media access control methods that are used by the networks in the exhibit?","What is contained in the trailer of a data-link frame?","What is the function of the CRC value that is found in the FCS field of a frame?","Multimode Fiber","Single-mode Fiber"],[],["After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?","Which IPv4 header field is responsible for defining the priority of the packet?","When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?","Why is NAT not needed in IPv6?","A packet leaving PC-1 has to traverse ","Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)","A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?","Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)","enable","copy running-config startup-config","login","interface fastethernet 0/0","FastEthernet0/0","FastEthernet0/1","FastEthernet1/0","FastEthernet1/1","Serial0/0/0","Which statement about router interfaces is true?","A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost? (Choose two.)","IP v4 Header","IP v6 Header","How do hosts ensure that their packets are directed to the correct network destination?","What is a service provided by the Flow Label field of the IPv6 header?","During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?","In a router, ","Which two commands can be used on a Windows host to display the routing table? (Choose two.)","A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?","Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?","Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)","Does the router have enough RAM and flash memory to support the new IOS?","When would the Cisco IOS image held in ROM be used to boot the router?","Which type of static route that is configured on a router uses only the exit interface?","Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?","What are two characteristics of IP? (Choose two.)","When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?","Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?","What IPv4 header field identifies the upper layer protocol carried in the packet?","What is one advantage that the IPv6 simplified header offers over IPv4?","Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?","What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?","What routing table entry has a next hop address associated with a destination network?","Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?","Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?","What are two types of router interfaces? (Choose two.)","Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.)","A router boots and enters setup mode. What is the reason for this?","What is the purpose of the startup configuration file on a Cisco router?","Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)","Which characteristic describes an IPv6 enhancement over IPv4?","For what reason is the failure occurring?","R1(config)#","R1>","R1#","R1(config-line)#","R1(config-if)#"],[],[],["How many broadcast domains are there?","How many usable host addresses are there in the subnet 192.168.1.32/27?","How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?","A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many host addresses will this subnet provide?","A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?","The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?","How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?","A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)","In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts?","Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many addresses are wasted in total by subnetting each network with a subnet mask of 255.255.255.224?","When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group?","A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?","Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)","A computer that is configured with the IPv6 address as shown in the exhibit is unable to access the internet. What is the problem?","When subnetting a /64 IPv6 network prefix, which is the preferred new prefix?","What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64?","Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)","In dotted decimal notation, the IP address ","In dotted decimal notation, the subnet mask ","The prefix for the range of addresses is ","A nibble consists of ","192.168.1.68","192.168.1.48","192.168.1.121","192.168.0.192/27","192.168.0.0/25","192.168.0.224/30","192.168.0.128/26","What issue is causing Host A to be unable to communicate with Host B?","Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many total host addresses are unused in the assigned subnets?"],["Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)","Which two tasks are functions of the presentation layer? (Choose two.)","Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)","A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)","What are two characteristics of peer-to-peer networks? (Choose two.)","What is an example of network communication that uses the client-server model?","What is an advantage for small organizations of adopting IMAP instead of POP?","Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)","Which application layer protocol uses message types such as GET, PUT, and POST?","A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)","A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?","Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?","Which three statements describe a DHCP Discover message? (Choose three.)","Which phrase describes an FTP daemon?","What is true about the Server Message Block protocol?","When would it be more efficient to use SMB to transfer files instead of FTP?","What is the acronym for the protocol that is used when securely communicating with a web server?","What command was used to resolve a given host name by querying the name servers?","NS","CNAME","MX","DHCPREQUEST","DHCPDISCOVER","DHCPOFFER","DHCPACK","peer-to-peer network","peer-to-peer application","Which PC or PCs are sending FTP packets to the server?"]],[["What are two features of a link-state routing protocol? (Choose two.)","In IPv6, all routes are level","Which switching method drops frames that fail the FCS check?","Which summary IPv6 static route statement can be configured to summarize only the routes to networks 2001:db8:cafe::/58 through 2001:db8:cafe:c0::/58?","Refer to the exhibit. If RIPng is enabled, how many hops away does R1 consider the 2001:0DB8:ACAD:1::/64 network to be?","When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default?","A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home?","Which statement describes a route that has been learned dynamically?","A network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used?","Refer to the exhibit. How did the router obtain the last route that is shown?","Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router for Internet connectivity. Which two configurations would be applied to the switch? (Choose two.)","A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?","Match the order in which the link-state routing process occurs on a router. (Not all options are used.)","Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)","Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?","How is the router ID for an OSPFv3 router determined?","Two employees in the Sales department work different shifts with their laptop computers and share the same Ethernet port in the office. Which set of commands would allow only these two laptops to use the Ethernet port and create violation log entry without shutting down the port if a violation occurs?","Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)","Refer to the exhibit. Which type of route is 172.16.0.0/16?","What caused the following error message to appear?","Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)","A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other?","Match the switching characteristic to the correct term. (Not all options are used.)","What does the cost of an OSPF link indicate?","Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)","On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from the switch?","A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.)","What is a function of the distribution layer?","A small-sized company has 20 workstations and 2 servers. The company has been assigned a group of IPv4 addresses 209.165.200.224/29 from its ISP. What technology should the company implement in order to allow the workstations to access the services over the Internet?","Which three requirements are necessary for two OSPFv2 routers to form an adjacency? (Choose three.)","Which three pieces of information does a link-state routing protocol use initially as link-state information for locally connected links? (Choose three.)","What is a disadvantage of NAT?","Refer to the exhibit. The partial configuration that is shown was used to configure router on a stick for VLANS 10, 30, and 50. However, testing shows that there are some connectivity problems between the VLANs. Which configuration error is causing this problem?","Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4 address. What is the problem?","What best describes the operation of distance vector routing protocols?","A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?","Which three advantages are provided by static routing? (Choose three.)","When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?","Which information does a switch use to populate the MAC address table?","Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?","What is the problem preventing PC0 and PC1 from communicating with PC2 and PC3?","Which command will create a static route on R2 in order to reach PC B?","Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?","Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)","A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry?","Which kind of message is sent by a DHCP client when its IP address lease has expired?","What happens immediately after two OSPF routers have exchanged hello packets and have formed a neighbor adjacency?","What benefit does NAT64 provide?","What is the purpose of setting the native VLAN separate from data VLANs?","Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?","Which statement is correct about IPv6 routing?","A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?","Refer to the exhibit. How many broadcast and collision domains exist in the topology?","Which two commands can be used to verify the content and placement of access control lists? (Choose two.)","Which type of traffic would most likely have problems when passing through a NAT device?","Which keyword is displayed on the web browser?","What summary static address would be configured on R1 to advertise to R3?","Static routes are configured by the use of the","A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?","Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)","The OSPF Type 1 packet is the","Which value represents the “trustworthiness” of a route and is used to determine which route to install into the routing table when there are multiple routes toward the same destination?","Which type of router memory temporarily stores the running configuration file and ARP table?","The default administrative distance for a static route is","Static routes are configured by the use of the global configuration command.","Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?","What is the purpose of an access list that is created as part of configuring IP address translation?","The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)","While analyzing log files, a network administrator notices reoccurring native VLAN mismatches. What is the effect of these reoccurring errors?","Which two characteristics describe the native VLAN? (Choose two.)","Refer to the exhibit. The Branch Router has an OSPF neighbor relationship with the HQ router over the 198.51.0.4/30 network. The 198.51.0.8/30 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/1/1 100 was issued on Branch and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?","Refer to the exhibit. An attacker on PC X sends a frame with two 802.1Q tags on it, one for VLAN 40 and another for VLAN 12. What will happen to this frame?","Which statement is true about the difference between OSPFv2 and OSPFv3?","What are two ways of turning off DTP on a trunk link between switches? (Choose two.)","Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?","A new network policy requires an ACL to deny HTTP access from all guests to a web server at the main office. All guests use addressing from the IPv6 subnet 2001:DB8:19:C::/64. The web server is configured with the address 2001:DB8:19:A::105/64. Implementing the NoWeb ACL on the interface for the guest LAN requires which three commands? (Choose three.)","An OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?","Refer to the exhibit. Which type of route is 172.16.0.0/16?","Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?","Which subnet mask would be used as the classful mask for the IP address 192.135.250.27?","Which subnet mask would be used as the classful mask for the IP address 128.107.52.27?","Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?","The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?","A network technician is configuring port security on switches. The interfaces on the switches are configured in such a way that when a violation occurs, packets with unknown source address are dropped and no notification is sent. Which violation mode is configured on the interfaces?","A standard ACL has been configured on a router to allow only clients from the 10.11.110.0/24 network to telnet or to ssh to the VTY lines of the router. Which command will correctly apply this ACL?","What address will summarize the LANs attached to routers 2-A and 3-A and can be configured in a summary static route to advertise them to an upstream neighbor?","A security specialist designs an ACL to deny access to a web server from all sales staff. The sales staff are assigned addressing from the IPv6 subnet 2001:db8:48:2c::/64. The web server is assigned the address 2001:db8:48:1c::50/64. Configuring the WebFilter ACL on the LAN interface for the sales staff will require which three commands? (Choose three.)","To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?","Refer to the exhibit. An ACL preventing FTP and HTTP access to the interval web server from all teaching assistants has been implemented in the Board Office. The address of the web server is 172.20.1.100 and all teaching assistants are assigned addresses in the 172.21.1.0/24 network. After implement the ACL, access to all servers is denied. What is the problem?","Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?","A router learns of multiple toward the same destination. Which value in a routing table represents the trustworthiness of learned routes and is used by the router to determine which route to install into the routing table for specific situation?","What is the minimum configuration for a router interface that is participating in IPv6 routing?","Which two statements are true about half-duplex and full-duplex communications? (Choose two.)","The acronym describes the type of traffic that has strict QoS requirements and utilizes a one-way overall delay less than 150 ms across the network.","Which two commands should be implemented to return a Cisco 3560 trunk port to its default configuration? (Choose two.)","Which command will enable auto-MDIX on a device?","What is the effect of issuing the passive-interface default command on a router that is configured for OSPF?","A network administrator is implementing a distance vector routing protocol between neighbors on the network. In the context of distance vector protocols, what is a neighbor?","Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)","Match the router memory type that provides the primary storage for the router feature. (Not all options are used.)","Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)","Which highlighted value represents a specific destination network in the routing table?","Refer to the exhibit. If RIPng is enabled, how many hops away does R1 consider the 2001:0DB8:ACAD:1::/64 network to be?","Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?","Which network design may be recommended for a small campus site that consists of a single building with a few users?","Refer to the exhibit. A small business uses VLANs 2, 3, 4, and 5 between two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?","A router learns of multiple routes toward the same destination. Which value in a routing table represents the trustworthiness of learned routes and is used by the router to determine which route to install into the routing table for this specific situation?","Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination?","The network address 172.18.9.128 with netmask 255.255.255.128 is matched by which wildcard mask?","Which three addresses could be used as the destination address for OSPFv3 messages? (Choose three.)","Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?​","Refer to the exhibit. What is the OSPF cost to reach the R2 LAN 172.16.2.0/24 from R1?","A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?","A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?","What are two reasons that will prevent two routers from forming an OSPFv2 adjacency? (Choose two.)","Refer to the exhibit. The network administrator needs as many switch ports as possible for end devices and the business is using the most common type of inter-VLAN method. What type of inter-VLAN interconnectivity is best to use between the switch and the router if R1 routes for all VLANs?","As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?","A part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?","Refer to the exhibit. An ACL preventing FTP and HTTP access to the internal web server from all teaching assistants has been implemented in the Board office. The address of the web server is 172.20.1.100 and all teaching assistants are assigned addresses in the 172.21.1.0/24 network. After implementing the ACL, access to all servers is denied. What is the problem?","Refer to the exhibit. A new network policy requires an ACL denying FTP and Telnet access to a Corp file server from all interns. The address of the file server is 172.16.1.15 and all interns are assigned addresses in the 172.18.200.0/24 network. After implementing the ACL, no one in the Corp network can access any of the servers. What is the problem?","A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?","Router R1 routes traffic to the 10.10.0.0/16 network using an EIGRP learned route from Branch2. The administrator would like to install a floating static route to create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down. Which static route meets this goal?","Which highlighted value represents a specific destination network in the routing table?","Which type of traffic is designed for a native VLAN?","Which two statements are correct if a configured NTP master on a network cannot reach any clock with a lower stratum number?","A network engineer has created a standard ACL to control SSH access to a router. Which command will apply the ACL to the VTY lines?","A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)","However, users report that workstations do not receive IPv6 addresses within the scope.","Which characteristic describes cut-through switching?","A company has an internal network of 172.16.25.0/24 for their employee workstations and a DMZ network of 172.16.12.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT?"],["What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?","A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)","What are two advantages of modular switches over fixed-configuration switches? (Choose two.)","Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?","What is one function of a Layer 2 switch?","collision domains in the topology.","What is a collapsed core in a network design?","What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)","How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?","What is a basic function of the Cisco Borderless Architecture distribution layer?","ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?","What does the term “port density” represent for an Ethernet switch?","Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?","What is a basic function of the Cisco Borderless Architecture access layer?","What information is added to the switch table from incoming frames?","network is one that uses the same infrastructure to carry voice, data, and video signals.","An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?","Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?","broadcast domains in the topology.","What tool is important to consider for use when making hardware improvement decisions about switches?","What is the maximum wire speed of a single port on a 48-port gigabit switch?","When the installation of a network infrastructure is being planned, which technology will allow power to be provided via Ethernet cabling to a downstream switch and its connected devices?","A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?","What is a definition of a two-tier LAN network design?","What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames? (Choose two.)","Which statement describes the microsegmentation feature of a LAN switch?","Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)","What is the destination address in the header of a broadcast frame?","Which type of address does a switch use to build the MAC address table?","Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)","Refer to the exhibit. How many broadcast domains are displayed?","How many collision domains are shown in the topology?","Which network device can be used to eliminate collisions on an Ethernet network?","Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?"],["Which type of cable does a network administrator need to connect a PC to a switch to recover it after the Cisco IOS software fails to load?","Which two basic functions are performed by network security tools? (Choose two.)","While troubleshooting a connectivity problem, a network administrator notices that a switch port status LED is alternating between green and amber. What could this LED indicate?","Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?","What is the missing command on S1?","Which three statements are true about using full-duplex Fast Ethernet? (Choose three.)","In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?","Which protocol or service sends broadcasts containing the Cisco IOS software version of the sending device, and the packets of which can be captured by malicious hosts on the network?","Which two statements are true regarding switch port security? (Choose two.)","What is the effect of entering these commands?","Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?","Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?","Which method would mitigate a MAC address flooding attack?","Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface command?","communication allows both ends of a connection to transmit and receive data simultaneously.","Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?","Which action will bring an error-disabled switch port back to an operational state?","Refer to the exhibit. What can be determined about port security from the information that is shown?","When port security is enabled, a switch port uses the default violation mode of","Refer to the exhibit. Which S1 switch port interface or interfaces should be configured with the ip dhcp snooping trust command if best practices are implemented?","What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?","Which command displays information about the auto-MDIX setting for a specific interface?","A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.)","Which two statements are true about using full-duplex Fast Ethernet?","A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?","An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?","Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)","What is one difference between using Telnet or SSH to connect to a network device for management purposes?","Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit?","In which situation would a technician use the show interfaces switch command?","Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?","What is a function of the switch boot loader?"],["A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​ (Choose two.)","What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?","Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?","Which command is used to remove only VLAN 20 from a switch?","A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?","What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?","Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?","Match the DTP mode with its function. (Not all options are used.)","Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?","What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?","Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)","In a basic VLAN hopping attack, which switch feature do attackers take advantage of?","A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?","Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?","Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?","What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?","Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)","Which PCs will receive the broadcast sent by PC-C?","Which two statements are true about VLAN implementation? (Choose two.)","Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?","Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?","command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.","Which three statements accurately describe VLAN types? (Choose three).","Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?","Which combination of DTP modes set on adjacent Cisco switches will cause the link to become an access link instead of a trunk link?","An administrator has determined that the traffic from a switch that corresponds to a VLAN is not being received on another switch over a trunk link. What could be the problem?","What is the default DTP mode on Cisco 2960 and 3560 switches?","What can be determined from the output that is shown?","Which two characteristics match extended range VLANs? (Choose two.)","Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)","Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?","What are three primary benefits of using VLANs? (Choose three.)","What happens to switch ports after the VLAN to which they are assigned is deleted?","Which two modes does Cisco recommend when configuring a particular switch port? (Choose two.)"],["What type of IPv6 address is required as a minimum on IPv6 enabled interfaces?","In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)","What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)","Refer to the exhibit. Match the description with the routing table entries (Not all options are used.)","Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)","Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)","Refer to the exhibit. What is the purpose of the highlighted field in the line that is displayed from the show ip route command?","Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)","What are two functions of a router? (Choose two.)","A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination? (Choose two.)","Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?","A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?","Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?","When a router receives a packet, it examines the destination address of the packet and looks in the","A network administrator configures a router by the command ip route 0.0.0.0 0.0.0.0 209.165.200.226. What is the purpose of this command?","Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. Which two types of routes are displayed in the routing table? (Choose two.)","What address changes as a packet travels across multiple Layer 3 Ethernet hops to its final destination?","Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?","A network administrator is implementing dynamic routing protocols for a company. Which command can the administrator issue on a router to display the supported routing protocols?","Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?","What is one feature that distinguishes routers from Layer 2 switches?","Which statement describes a route that has been learned dynamically?","Refer to the exhibit. A network administrator issues the show ip route command on R2. What two types of routes are installed in the routing table? (Choose two.)","When a computer is pinging another computer for the first time, what type of message does it place on the network to determine the MAC address of the other device?","Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? (Choose Two.)","What route would have the lowest administrative distance?","Which two parameters are used by EIGRP as metrics to select the best path to reach a network? (Choose two.)​","What are two common types of static routes in routing tables? (Choose two)","Which software is used for a network administrator to make the initial router configuration securely?","Consider the following routing table entry for R1:","PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?","What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?","What are two types of static routes in routing tables? (choose two)","what is a characteristic of an IPv4 interface on a Cisco IOS router?","What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B?","If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?","What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​"],["A network engineer is troubleshooting the configuration of new VLANs on a network. Which command is used to display the list of VLANs that exists on the switch?","What is a disadvantage of using multilayer switches for inter-VLAN routing?","Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?​","Refer to the exhibit. A network administrator has configured router CiscoVille with the above commands to provide inter-VLAN routing. What command will be required on a switch that is connected to the Gi0/0 interface on router CiscoVille to allow inter-VLAN routing?​","Refer to the exhibit. The switch does the routing for the hosts that connect to VLAN 5. If the PC accesses a web server from the Internet, at what point will a VLAN number be added to the frame?","Inter-VLAN communication is not occurring in a particular building of a school. Which two commands could the network administrator use to verify that inter-VLAN communication was working properly between a router and a Layer 2 switch when the router-on-a-stick design method is implemented? (Choose two.)","Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?","What condition is required to enable Layer 3 switching?","Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?","Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?","How is traffic routed between multiple VLANs on a multilayer switch?","Refer to the exhibit. Communication between the VLANs is not occurring. What could be the issue?","What is a disadvantage of using router-on-a-stick inter-VLAN routing?","Which statement describes a disadvantage of using router subinterfaces for inter-VLAN routing?","While configuring inter-VLAN routing on a multilayer switch, a/an","Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?","Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PCs on different VLANs cannot communicate. Based on the output, what are two configuration errors on switch interface Gi1/1? (Choose two.)","While configuring inter-VLAN routing on a multilayer switch, a network administrator issues the no switchport command on an interface that is connected to another switch. What is the purpose of this command?","Which command is missing on the Layer 3 switch to restore the full connectivity between PC1 and the web server?","A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing?","Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?","Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?","Refer to the exhibit. Which command can the administrator issue to change the VLAN10 status to up?​","How are IP addressing designs affected by VLAN implementations?","What is a characteristic of a routed port on a Layer 3 switch?","An administrator is attempting to configure a static route on a Cisco 2960 series switch. After the administrator types the command ip route 0.0.0.0 0.0.0.0 10.1.1.1, an error message appears stating that the command is not recognized. What must the administrator do so that this command is accepted?","Refer to the exhibit. In this network design, which connection or connections if any, add the VLAN ID number if host H1 sends information to host H2?","What is a characteristic of legacy inter-VLAN routing?","In what switch mode should port G0/1 be assigned if Cisco best practices are being used?","What is the problem with this configuration, based on the output of the router?","A network administrator is verifying the configuration of inter-VLAN routing. Based on the partial output that is displayed by the use of the show vlan command, which conclusion can be drawn for the Gi1/1 interface?"],["What are two advantages of static routing over dynamic routing? (Choose two.)","Refer to the exhibit. Which is the best way for PC A and PC B to successfully communicate with sites on the Internet?","Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?","Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?","What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?","Refer to the graphic. Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?","The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?","Refer to the exhibit. The network administrator needs to configure a default route on the Border router. Which command would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets?","Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?","Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?","Refer to the exhibit. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?","Which two statements describe classful IP addresses? (Choose two.)","A company has several networks with the following IP address requirements:","What does VLSM allow a network administrator to do?","What would be the best summary route for the following networks?","What is a valid summary route for IPv6 networks 2001:0DB8:ACAD:4::/64, 2001:0DB8:ACAD:5::/64, 2001:0DB8:ACAD:6::/64, and 2001:0DB8:ACAD:7::/64?","Which type of static route that is configured on a router uses only the exit interface?","Which three IOS troubleshooting commands can help to isolate problems with a static route? (Choose three.)","Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)","What happens to a static route entry in a routing table when the outgoing interface is not available?","What is the name of the web server that is displayed in the webpage?","What IPv6 static route can be configured on router R1 to make a fully converged network?","Consider the following command:","What would be the first step in calculating a summarized route for 5 networks?","What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)","26. Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?","What is the correct syntax of a floating static route?","What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?","R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?"],["What is the purpose of the passive-interface command?","What two tasks do dynamic routing protocols perform? (Choose two.)","is used in RIP router configuration mode to enable the sending of subnet masks with the routing updates.","Refer to the exhibit. OSPF is used in the network. Which path will be chosen by OSPF to send data packets from Net A to Net B?","Which two statements are true regarding classless routing protocols? (Choose two.)","What two actions result from entering the network 192.168.1.0 command in RIP configuration mode on a router? (Choose two.)","Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol? (Choose two.)","In the context of routing protocols, what is a definition for time to convergence?","command instructs the router to propagate a static default route.​","A destination route in the routing table is indicated with a code D. Which kind of route entry is this?","Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?","Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?","Which two requirements are necessary before a router configured with a link-state routing protocol can build and send its link-state packets? (Choose two.)","Which two requirements are used to determine if a route can be considered as an ultimate route in a router’s routing table? (Choose two.)","What is different between IPv6 routing table entries compared to IPv4 routing table entries?","Which dynamic routing protocol was developed as an exterior gateway protocol to interconnect different Internet providers?","Which route will a router use to forward an IPv4 packet after examining its routing table for the best match with the destination address?","Which two statements describe the OSPF routing protocol? (Choose two.)","Which two events will trigger the sending of a link-state packet by a link-state routing protocol? (Choose two.)","Refer to the exhibit. A network administrator has issued the exhibited commands in an attempt to activate RIPng on interface gig0/0. What is causing the console message that is shown after RIP is enabled?","Which type of route will require a router to perform a recursive lookup?","After a network topology change occurs, which distance vector routing protocol can send an update message directly to a single neighboring router without unnecessarily notifying other routers?","An OSPF enabled router is processing learned routes to select best paths to reach a destination network. What is the OSPF algorithm evaluating as the metric?","What is a disadvantage of using dynamic routing protocols?","While configuring RIPv2 on an enterprise network, an engineer enters the command network 192.168.10.0 into router configuration mode. What is the result of entering this command?","Which routing protocol uses link-state information to build a map of the topology for computing the best path to each destination network?","A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?","When does a link-state router send LSPs to its neighbors?"],["Which OSPF component is identical in all routers in an OSPF area after convergence?","Which three statements describe features of the OSPF topology table? (Choose three.)","A router is participating in an OPSFv2 domain. What will always happen if the dead interval expires before the router receives a hello packet from an adjacent DROTHER OPSF router?","Which command will provide information specific to OSPFv3 routes in the routing table?","Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an OSPF configuration?","A network administrator enters the command ipv6 router ospf 64 in global configuration mode. What is the result of this command?","The election of a DR and a BDR takes place on","OSPF uses","Which command should be used to check the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance?","Which OSPFv3 function works differently from OSPFv2?","What message is displayed on www.ciscoville.com?","To quickly verify OSPFv3 configuration information including the OSPF process ID, the router ID, and the interfaces enabled for OSPFv3, you need to issue the command","Loopback interface address 10.1.1.1","Serial interface address 192.168.10.1","Configured router ID 1.1.1.1","Loopback interface IP address 172.16.1.1","adjacency database","Shortest Path First","Single-area OSPF","link-state database","Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.)","What is a function of OSPF hello packets?","show ip ospf neighbor","show ip ospf","show ip protocols","show interface serial 0/0/0","What are the two purposes of an OSPF router ID? (Choose two.)","Which command will verify that a router that is running OSPFv3 has formed an adjacency with other routers in its OSPF area?","Single area OSPFv3 has been enabled on a router via the ipv6 router ospf 20 command. Which command will enable this OSPFv3 process on an interface of that router?","When a network engineer is configuring OSPFv3 on a router, which command would the engineer issue immediately before configuring the router ID?","Which criterion is preferred by the router to choose a router ID?","Which OPSF packet contains the different types of link-state advertisements?","What does a Cisco router use automatically to create link-local addresses on serial interfaces when OSPFv3 is implemented?","A router is participating in an OSPFv2 domain. What will always happen if the dead interval expires before the router receives a hello packet from an adjacent DROTHER OSPF router?","What is the first criterion used by OSPF routers to elect a DR?","What is used to create the OSPF neighbor table?","What are two reasons that will prevent routers from forming an OSPFv2 adjacency? (Choose two.)","What command would be issued to determine if a routing protocol-initiated relationship has been made with an adjacent router?","What command would be issued to determine if a Routing Protocol-initiated relationship has been made with an adjacent router?","Which three addresses could be used as the destination address for OSPFv3 messages? (Choose three.)","Refer to the exhibit. A network administrator issued the command show ip ospf interface on the router R2. What conclusion can be drawn?","What command would be used to determine if a routing protocol-initiated relationship had been made with an adjacent router?","What are two reasons that will prevent two routers from forming an OSPFv2 adjacency? (Choose two.)","Init state","Full state","Exchange state","Down state","Exstart state","Two-way state","Loading state"],["A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)","Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?","Why is the ACL not working?","Which statement describes a characteristic of standard IPv4 ACLs?","Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)","What are two possible uses of access control lists in an enterprise network? (Choose two.)","An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?","Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)","Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)","Which two characteristics are shared by both standard and extended ACLs? (Choose two.)","the first valid host address in a subnet","subnetwork address of a subnet with 14 valid host ","all IP address bits must match exactly","hosts in a subnet with SM 255.255.252.0","address with a subnet 255.255.255.248","Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?","What two functions describe uses of an access control list? (Choose two.)","Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?","Which three statements describe ACL processing of packets? (Choose three.)","Which statement describes a difference between the operation of inbound and outbound ACLs?","What is the only type of ACL available for IPv6?","Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?","Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?","If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?","Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?","What packets would match the access control list statement that is shown below?","What single access list statement matches all of the following networks?","What is a limitation when utilizing both IPv4 and IPv6 ACLs on a router?","In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?","What method is used to apply an IPv6 ACL to a router interface?","Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?","Refer to the exhibit. What is the result of adding the established argument to the end of the ACE?"],["Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?","What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?","A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?","Type a command to exclude the first fifteen useable IP addresses from a DHCPv4 address pool of the network 10.0.15.0/24.","Stateless DHCPv6","Stateful DHCPv6","Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?","A network engineer is troubleshooting hosts on a LAN that are not being assigned an IPv4 address from a DHCP server after a new Ethernet switch has been installed on the LAN. The configuration of the DHCP server has been confirmed as correct and the clients have network connectivity to other networks if a static IP address is configured on each one. What step should the engineer take next to solve the issue?","A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?","Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?","A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?","Under which two circumstances would a router usually be configured as a DHCPv4 client? (Choose two.)","A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?","Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?","A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?","What is the administrator trying to achieve?","Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?","Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?","How many IP addresses has the DHCP server leased and what is the number of DHCP pools configured? (Choose two.)","Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?","A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?","Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?","Configure a DHCP pool.","Exclude IP addresses.","Define the default gateway router.","An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?","A company uses the method SLAAC to configure IPv6 addresses for the workstations of the employees. A network administrator configured the IPv6 address on the LAN interface of the router. The interface status is UP. However, the workstations on the LAN segment did not obtain the correct prefix and prefix length. What else should be configured on the router that is attached to the LAN segment for the workstations to obtain the information?","Which address does a DHCPv4 server target when sending a DHCPOFFER message to a client that makes an address request?","What is an advantage of configuring a Cisco router as a relay agent?","How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method?","What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?","As a DHCPv4 client lease is about to expire, what is the message that the client sends the DHCP server?"],["Which version of NAT allows many hosts inside a private network to simultaneously use a single inside global address for connecting to the Internet?","What is the group of public IPv4 addresses used on a NAT-enabled router known as?","What problem is causing PC-A to be unable to communicate with the Internet?","What is a disadvantage of NAT?","Which statement accurately describes dynamic NAT?","When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?","What is the purpose of port forwarding?","Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?","When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?","Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?","A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. What is required to be configured in order for this particular command to be functional?","Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?","A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload. Why did the engineer use the overload option?","Refer to the exhibit. What will be the effect of entering the command that is shown in the exhibit on R2 as part of the dynamic NAT configuration?","Which configuration would be appropriate for a small business that has the public IP address of 209.165.200.225/30 assigned to the external interface on the router that connects to the Internet?","Which type of NAT maps a single inside local address to a single inside global address?","Typically, which network device would be used to perform NAT for a corporate environment?","Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?","What is a characteristic of unique local addresses?","Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?","Refer to the exhibit. The NAT configuration applied to the router is as follows:","R1 replaces the address 192.168.10.10 with a translated inside global address.","R1 checks the NAT configuration to determine if this packet should be translated.","R1 selects an available global address from the dynamic address pool.","The host sends packets that request a connection to the server at the address 209.165.200.254.","If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.","What are two of the required steps to configure PAT? (Choose two.)","Using NAT terminology, what is the address of the source host on a private network as seen from inside the network?","What is an advantage of deploying IPv4 NAT technology for internal hosts in an organization?","A network administrator is configuring a static NAT on the border router for a web server located in the DMZ network. The web server is configured to listen on TCP port 8080. The web server is paired with the internal IP address of 192.168.5.25 and the external IP address of 209.165.200.230. For easy access by hosts on the Internet, external users do not need to specify the port when visiting the web server. Which command will configure the static NAT?","NAT overload is also known as","What is the primary purpose of NAT?"]]];var answers=[[[["management frame"],["an available PATA/SATA connection"],["to reduce the heat that the CPU may generate"],["Make sure they are mounted in correct air flow directions."],["They use different types of DIMM slots on the motherboard."],["electric motors"],["An antistatic wrist strap should not be worn when repairing a power supply."],["A custom OS enables user access to the root directory.","A custom OS may not properly create or maintain sandboxing features."],["Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours."],["Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer."],["Let a customer finish talking before asking additional questions.","As soon as you detect customer anger, pass the angry customer to the next level."],["when a problem requires expertise from another technician"],["FireWire","USB"],["front side bus"],["inverter"],["Enable Bluetooth in BIOS Setup.","Ensure that the laptop Bluetooth switch is enabled."],["Coaxial cable is physically more difficult to install than UTP cable."],["Each signal uses a different frequency."],["everything that was done to try to solve the problem"],["RAM","battery"],["Android","iOS"],["Set up the virtual machines using a native hypervisor."],["double touch"],["The widget is associated with the app and this is the normal behavior."],["The Last Known Good Configuration is overwritten with the current one on successful login."],["NTDETECT.COM"],["Partition the unallocated space."],["Replace the CMOS battery."],["Develop a new theory"],["Cancel the job that displays the error that is preventing the other jobs from being printed."],["Clean the printer."],["Windows 7 Ultimate"],["an environment variable that is set by the operating system"],["Choose Start > All Programs > Accessories > System Tools > System Restore > Create a restore point."],["2 primary, 1 active, 1 extended, 3 logical"],["Chkdsk"],["key fob"],["VPN"],["social engineering"],["making data appear to come from a source that is not the actual source"],["file and folder permission options","journaling","encryption at the file and folder level"],["WPA2"],["Set the file permissions to Read and Execute."],["conditioning roller","corona wire"],["the microwave oven","the cellular phones that are used by the employees"],["SSH"],["The computer has an invalid default gateway address."],["Wireless clients must then have the SSID manually configured to connect to the wireless network."],["Check for the latest OS patches and updates."],["Do not click anywhere in the warning window.","If the window has to be closed, then press Alt + F4."],["Disable the account of the former employee."],["Inkjet printers are less expensive as an initial purchase than laser printers.","The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing."],["Disconnect the AC adapter.","Remove the battery."],["when the cable run must be installed inside a ceiling"],["removing dust from fan intakes, the power supply, and peripherals","installing appropriate security updates","removing unused or unwanted programs"],["It can be executed from a batch file."],["application, transport, internet, network access"],["Verify that the MAC address for the laptop is in the MAC address filter table."],["DHCP"],["gathering information when a customer calls for help"],["An antistatic wrist strap should not be worn when repairing a power supply."],[" working on a grounded antistatic mat"],["Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours."],["Try to establish a rapport with the customer."],["Confirm the issues and give detailed instructions to solve the problem."],["Determine whether the customer would prefer to receive the instructions in another form, such as emailed, illustrated written instructions."],["Let a customer finish talking before asking additional questions. ","If you have to put the customer on hold, ask the customer for permission."],["verification that driver software is working correctly ","confirmation that printer and computer are communicating"],["Disconnect the AC adapter. ","Remove the battery."],["gathering information when a customer calls for help"],["inverter"],["Enable Bluetooth in BIOS Setup.","Ensure that the laptop Bluetooth switch is enabled."],["removing dust from fan intakes, the power supply, and peripherals ","installing appropriate security updates ","removing unused or unwanted programs"],["everything that was done to try to solve the problem"],["Android ","iOS"],["The Last Known Good Configuration is overwritten with the current one on successful login."],["Change the boot sequence in the BIOS."],["Develop a new theory."],["Clean the printer."],["Windows 7 Ultimate"],["The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder."],["Remote Desktop"],["the first primary partition"],["Defragment"],["invalid system disk"],["Chkdsk"],["biometric devices"],["biometric devices"],["social engineering"],["Many hosts participate in a coordinated attack."],["An expiration period should be established so that passwords frequently change."],["Set the file permissions to Read and Execute."],["mesh"],["Data is more secure in the event of hardware failures.","Data resources and access are centrally controlled."],["peer-to-peer"],["DHCP"],["The computer has an invalid default gateway address."],["Wireless clients must then have the SSID manually configured to connect to the wireless network."],["ipconfig /release"],["Check for the latest OS patches and updates"],["RAM ","battery"],["Partition the unallocated space."],["Security Center"],["The unique MAC address of each wireless device is filtered and only authorized addresses are allowed network access."],["Do not click anywhere in the warning window. ","If the window has to be closed, then press Alt + F4."],["VPN"],["SSH"],["Internet access","VPN client"],["They use different types of DIMM slots on the motherboard."],["an available PATA/SATA connection"],["any USB 1.1, 2.0, or 3.0 port"],["Make sure they are mounted in correct air flow directions."],["The power supply has sufficient wattage to support all components inside the computer."],["KVM switch"],["front side bus"],["Aim at the base of the flame, squeeze the lever, and sweep from side to side."],["Inkjet printers are less expensive as an initial purchase than laser printers.","The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing."],["Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer."],["Is this the first time the error occurred?"],["compressed air","soft cloth"],["when a problem requires expertise from another technician"],["when the cable run must be installed inside a ceiling"],["removing dust from fan intakes, the power supply, and peripherals","installing appropriate security updates","removing unused or unwanted programs"],["Set up the virtual machines using a native hypervisor."],["double touch"],["The widget is associated with the app and this is the normal behavior."],["Verify the solution and full system functionality."],["The installed printer driver is the wrong one."],["Cancel the job that displays the error that is preventing the other jobs from being printed."],["Change the startup type for the utility to Automatic in Services."],["2 primary, 1 active, 1 extended, 3 logical"],["firewall settings"],["phishing"],["hard drive settings","operating system booting"],["hard drive settings","operating system booting"],["Passwords should be set to expire every 60 days.","Passwords should contain letters and numbers."],["WPA2"],["The Windows firewall is blocking the ping."],["Avoid lifting the equipment using the strength in your back.","Lift the equipment using the strength in your legs and knees."],["Ensure the wireless network is on a different frequency than the offending source."],["DHCP"],["application, transport, internet, network access"],["SSH"],["TCP/IP"],["Verify that the MAC address for the laptop is in the MAC address filter table."],["Disable the account of the former employee."],["Each signal uses a different frequency."],["Choose Start > All Programs > Accessories > System Tools > System Restore > Next."],["A custom OS enables user access to the root directory.","A custom OS may not properly create or maintain sandboxing features."],["file and folder permission options","journaling","encryption at the file and folder level"],["ROM"],["to reduce the heat that the CPU may generate"],["CPU"],["3 GHz"],["image quality of a monitor"],["FireWire","USB"]],[],[],[],[["Defragment the hard drive."],["to use the information to aid in solving the problem"],["Hold cans of compressed air upright while spraying."],["Establish a new theory of probable causes.","Document each test tried that did not correct the problem."],["hard drive"],["Remove dust from intake fans."],["The CMOS battery is loose or failing."],["loose case screws","unseated adapter cards"],["The CPU experiences overheating."],["Run a full virus scan on the computer."],["the computer repair history log","the computer manual"],["The saved CMOS settings are set to use the built-in video adapter."],["the temperature"],["documenting the details and frequency of each maintenance task"],["Insert a pin into the small hole on the front of the drive."],["Back up the user data to a removable drive."],["the easiest and most obvious"],["The RAM modules were not seated firmly."],["fan"],["Verify full system functionality and, if applicable, implement preventive measures."],["Internet Explorer favorites files","documents that are created by the customer"],["adding more RAM"]],[],[["switch"],["router","switch","wireless access point"],["cellular"],["when a regular telephone line is used"],["cable"],["It describes how computers access the LAN medium."],["Inspect all patch cables for breaks."],["educating users on IT policies and procedures"],["The computer cannot communicate with a DHCP server."],["Bluetooth"],["application","session","presentation"],["0607:1234:aa10:ba01"],["low overhead"],["802.11a wireless devices will not be able to connect to the wireless network."],["328 ft (100 m)"],["It is supported by IEEE 802.3 standards.","It uses the CSMA/CD access control method."],["The company network requires secure access to confidential information.","The data gathered by the employees is critical and should be backed up on a regular basis.","The users need a central database to store inventory and sales information."],["resource sharing"],["when it is connected to a switch"],["The PC default gateway address is missing or incorrect."],["the maximum bandwidth in Mb/s"],["Change the NIC duplex setting from half duplex to full duplex."],["Check if the network interface cards in the refurbished computers are limited to 10 Mb/s."],["The NIC duplex settings have somehow been set to half-duplex."]],[["The laptops are designed to produce less heat.","The laptops use smaller cooling devices."],["hard disk drive","display"],["Identify the problem."],["Document the problem and the solution."],["Change the orientation of the laptop."],["They have a small form factor."],["ACPI has not been enabled in the BIOS."],["Press outward on the clips that hold the sides of the SODIMM."],["Remove all sources of power from the laptop."],["Mini-PCIe","PCI Express Micro"],["Verify the solution."],["The display properties are incorrectly set."],["Most of the internal components that are designed for laptops cannot be used for desktops."],["the ability to modify CPU clock speed as needed"],["to detach the laptop from the docking station"],["Fn"],["a proactive routine that is performed monthly and as needed"],["cotton swabs","mild cleaning solution"],["exterior case","keyboard"],["Control Panel > Networking and Sharing Center > Set up a new connection or network"],["peripheral devices"],["None. Bluetooth connections are wireless."],["Defragment the hard drive."],["to use the information to aid in solving the problem"],["Hold cans of compressed air upright while spraying."],["Establish a new theory of probable causes.","Document each test tried that did not correct the problem."],["hard drive"],["Remove dust from intake fans."],["The CMOS battery is loose or failing."],["loose case screws","unseated adapter cards"],["The CPU experiences overheating."],["Run a full virus scan on the computer."],["the computer repair history log","the computer manual"],["The saved CMOS settings are set to use the built-in video adapter."],["the temperature"],["documenting the details and frequency of each maintenance task"],["Insert a pin into the small hole on the front of the drive."],["Back up the user data to a removable drive."],["the easiest and most obvious"],["The RAM modules were not seated firmly."],["fan"],["Verify full system functionality and, if applicable, implement preventive measures."],["Internet Explorer favorites files","documents that are created by the customer"],["adding more RAM"]],[["Google Play"],["the same functions as the Android navigation buttons","start voice control"],["The operating system can be fine-tuned to improve the speed of the device.","The user interface can be extensively customized."],["to place the device into a power saving state","to help prevent theft of private information","to prevent unauthorized use of the device."],["Flash memory requires very little power to store and retrieve data."],["an electrical field of the screen that is interrupted when the user touches the screen","two transparent layers of material capable of conducting electricity"],["memory card"],["When a problem appears with a mobile device, the owner should analyze if it is cost-effective to fix it."],["Contact the manufacturer for repair or replacement."],["Return the phone to the manufacturer for repair."],["a software problem","a memory problem"],["The hardware does not meet specifications."],["The device must be powered on.","The device must be connected to a network."],["contacts","calendar"],["When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled."],["CDMA","GSM"],["CDMA2000","EV-DO"],["LTE","Mobile WiMax"],["connecting a mobile device to another mobile device or computer to share a network connection"],["Cell phones that use a single standard can often only be used in specific geographic areas."],["To synchronize data on an iOS device, iTunes must be installed on the PC."],["IMAP"],["pattern"],["multitouch"]],[["the desired quality of the image"],["FireWire","serial"],["The heat creates a bubble of steam in the chamber."],["developing"],["to add additional drivers for other operating systems"],["The cable that connects the printer to the PC is faulty."],["Connect the printer and power it on. Windows will detect the printer and install the needed drivers."],["the printer that is set as the default printer"],["infrared","IEEE 802.11 standards"],["Calibrate the printer."],["The printer does not have enough memory to buffer an entire photograph."],["Per-document options override global options."],["It handles complex printing jobs."],["Can you print a test page on the printer?","Is the printer powered on?"],["verifying the solution and system functionality"],["a bad cable connection"],["documenting findings, actions, and outcomes"],["Network and Sharing Center"],["provide print resources to all connected client computers","store print jobs in a queue until the printer is ready"],["Reset the printer page counters if available."],["transfer rollers","fuser assembly"],["Clean the heating element regularly with isopropyl alcohol."]],[["social engineering"],["ensuring that each use of an access card allows access to only one user at the time","registering and escorting all visitors to the premises"],["Implement biometric authentication.","Disable the autorun feature in the operating system."],["Trusted Platform Module (TPM)"],["Set virus protection software to scan removable media when data is accessed.","Disable the autorun feature in the operating system."],["when a virus has damaged the master boot record of the system disk"],["Enable UAC on the computer."],["Smash the platters with a hammer."],["WPA2"],["a private key","a public key"],["is self-replicating","travels to new computers without any intervention or knowledge of the user"],["phishing"],["What are the possible threats to the assets of the organization?","What is to be done in the case of a security breach?","What assets require protection?"],["patterns in the programming code of the software on a computer"],["All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113."],["protocols","ports"],["to prevent the target server from being able to handle additional requests"],["What symptoms are you experiencing?"],["Disconnect the host from the network."],["Ensure the security policy is being enforced."],["The computer has been infected with spyware."],["signatures"]],[["Contact a first responder.","Document as much information as possible."],["the collection of international, country, and local laws that affect computer security professionals"],["evidence tampering"],["Keep it confidential."],["Replace all passwords in the file with before emailing the file and then supply the passwords by secure means, if required."],["supported equipment and software","time of service availability"],["The technician should contact the customer if the technician is going to be late for a follow-up appointment.","The technician should be sure to treat all customers equally."],["The technician should make sure to call the customer back as close to the callback time as possible."],["as they may be able to resolve them faster.","Level two technicians are usually more knowledgeable about technology than the level one technicians are."],["Call the customer back to ask any additional questions and resolve the problem."],["Allow the customer to speak without interruption.","Refer to the customer by name whenever possible."],["Maintain professional behavior at all times."],["Allow the customer to speak without interruption and then try to use closed-ended questions to gather data."],["clarifying what customers say after they have finished their explanations","the use of active listening, with occasional interjections such as"],["details of any recent changes to the computer","description of the problem","contact information"],["The company cannot operate because of a system failure."],["solid state drives","hard disk drives"],["data in transit between RAM and the CPU"],["Ask the customer to do obvious or unnecessary steps."],["netiquette"],["proper documentation procedures"],["when drivers, applications, or operating systems need to be installed"]],[["Windows 98","Windows NT workstation"],["Install the driver from the CD provided with the card reader.","Download and install the driver from the manufacturer of the card reader."],["The hard drive jumper is set incorrectly."],["Update the BIOS firmware to support the dual core CPU."],["Boot.ini is missing or damaged.","The boot order is not set correctly in the BIOS."],["Research the STOP error and the name of the module that produced the error."],["The computer has a virus.","An update has corrupted the operating system."],["Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.","Run chkdsk /F /R from the recovery console."],["The network cable is faulty."],["The wireless signal is too weak.","There is interference from outside sources."],["The DHCP server is not operational."],["The power inverter of the LCD screen or backlight lamp has failed."],["Document all findings, actions, and outcomes."],["The fuser has failed."],["The printer is configured to get an IP address using DHCP."],["An incorrect print driver is installed."],["The Windows Firewall is blocking ping requests."],["A boot sector virus has altered the master boot record."],["The email account belonging to the co-worker was hijacked because of malware."],["The LCD screen has failed."],["The drum is failing to hold a charge."],["The CMOS battery has failed."],["bootrec /fixboot","bootrec /fixmbr"]],[["an acceptable computer usage statement for the organization","requirements necessary for data to remain confidential on a network"],["Molex"],["Stop the print spooler."],["The module is incompatible with the workstation."],["A FAT32 partition of at least 5 GB must be created."],["Bend your knees to use the strength in your legs to lift the printer."],["Restore the data files that were backed up in preparation for the conversion."],["toner probe"],["LCD screen"],["The computer has an incorrect driver installed.","The printer has a loose data cable."],["SDRAM","DDR SDRAM"],["social engineering"],["Boot the computer from the Vista installation media and select Repair your computer from the Install Windows screen."],["Add a new 802.11n device."],["Reinstall the programs in Compatibility Mode."],["The default gateway is not set."],["Document any components that were used in the repair."],["WPA2"],["extension of the life of components","improvement in data protection","reduction in the number of equipment failures"],["virus"],["tracert"],["Install an SSD drive in each computer."],["BIOS"],["touchpad","fingerprint reader","web camera"],["A new replacement hard drive is installed in a computer.","The existing operating system is corrupted."],["The DSL filter is faulty or not connected."],["The signals in the wires in each twisted-pair circuit generate magnetic fields which cancel each other out."],["It allows for the user to change the source code."],["Ethernet and Star"],["It is an encryption process that uses a public and private key pair to encrypt/decrypt data."],["pull"],["BIOS reads the MBR."],["Make the users members of a group called Backup Operators."],["Notify the user when Windows Firewall blocks a program."],["VPN"],["Test the theory to determine the cause."],["Consult the service manual for the laptop."],["Enable real-time virus and spyware scanning.","Enable automatic antivirus and antispyware software updates."],["Learn the name of the customer and create a connection with the customer."],["fuser assembly","pickup rollers","transfer rollers"],["The technician interrupted a number of times to ask questions."],["Avoid the thermal head, which can become hot."],["key fobs"],["Disconnect AC power.","Remove the battery."],["Signal to the colleague to wait."],["level two technicians"],["BIOS boot sequence option"],["PS/2"],["4"],["configuration software","printer driver"],["Ensure the wireless network is on a different frequency than the offending source."],["The network has relatively few wireless devices.","Specific security policies can be applied to static IP addresses."],["network access"],["Create a virtual machine with an operating system that supports the application."],["the number of installed adapter cards"],["Check if the cable is properly connected."],["Full Control"],["configuring MAC address filtering","disabling SSID broadcasts"],["Boot to Last Known Good Configuration."],["twisted-pair"]]],[[["instant messaging"],["regenerating data signals","applying security settings to control the flow of data","notifying other devices when errors occur"],["DSL"],["WAN"],["flash memory"],["an SSH connection"],["The administrator must first enter privileged EXEC mode before issuing the command."],["to interrupt the ping process"],["It completes the remainder of a partially typed word in a command."],["Switch(config)"],["linevtyin"],["The new configuration will be loaded if the switch is restarted."],["PC2 can send a ping to 192.168.1.1."],["127.0.0.1"],["DHCP","DNS","FTP"],["ICMP","IP"],["Request for Comments"],["MAC address"],["ARP, broadcast"],["The host cannot communicate with hosts in other networks."],["It encodes frames into electrical, optical, or radio wave signals."],["twisting opposing circuit wire pairs together"],["Fiber-optic cabling does not conduct electricity.","Fiber-optic cabling is primarily used as backbone cabling."],["error detection"],["crossover Ethernet cable connection"],["just PC0 and PC1 MAC addresses"],["An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches."],["to select the paths that are used to direct traffic to destination networks"],["NAT"],["It is the IP address of the Router1 interface that connects the PC1 LAN to Router1."],["packet switching","path selection"],["RAM is volatile and stores the running configuration.","ROM is nonvolatile and stores bootup information."],["NVRAM, TFTP, setup mode"],["The transmission continues without the missing portion."],["10.172.168.1","172.20.4.4","192.168.5.254"],["16"],["to enable the router as an IPv6 router"],["FF00::/8"],["to provide feedback of IP packet transmissions"],["The default gateway address in incorrect."],["192.168.1.64/26"],["predictable static IP addresses for easier identification"],["Site 2"],["/64","/68"],["DHCPDISCOVER","DHCPREQUEST"],["to keep track of the actions of a user"],["login block-for 60 attempts 5 within 60"],["ipconfig /displaydns"],["192.168.11.252"],["broadcast SSID","default administrator password"],["WPA"],["TFTP"],["wireless NIC","wireless client software"],["/60"],["regenerating data signals","applying security settings to control the flow of data","notifying other devices when errors occur"],["when a regular telephone line is used"],["audio conference, database, HTTP"],["RAM"],["an SSH connection"],["Ctrl-Shift-6"],["Switch(config)"],["The new configuration will be loaded if the switch is restarted."],["VLAN 1"],["the TCP/IP stack on a network host*"],["FRAME HEADER"],["router"],["the amount of traffic that is currently crossing the network","the type of traffic that is crossing the network","the latency that is created by the number of network devices that the data is crossing"],["It is not affected by EMI or RFI.","It is the most expensive type of LAN cabling"],["It is straightforward to troubleshoot.","It is easy to add and remove end devices."],["to check the frame for possible transmission errors"],["It forwards the frame out of all ports except for the port at which the frame was received."],["fast-forward"],["the lower metric value that is associated with the destination network"],["maintains instructions for POST diagnostics","stores bootstrap program"],["A console port is not used for packet forwarding."],["The transmission continues without the missing portion."],["203.0.113.211"],["10.20.30.1","172.30.5.3","192.168.5.5"],["public addresses"],["13"],["192.168.1.64/27","192.168.1.96/28"],["/25"],["Real-Time Transport Protocol"],["to identify where a packet was lost or delayed on a network"],["The asterisk designates which file system is the default file system."],["WPA"],["full-duplex"],["regenerating data signals","applying security settings to control the flow of data","notifying other devices when errors occur"],["area C"],["to reduce the cost of deploying and maintaining the communication infrastructure"],["audio conference, financial transactions, web page"],["RAM"],["The configuration will load when the router is restarted."],["The TCP/IP stack on the device is working correctly."],["It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media."],["CSMA/CA"],["The switch drops the frame."],["FFFF.FFFF.FFFF"],["the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection"],["store-and-forward switching"],["adjacency tables","forwarding information base (FIB)"],["It de-encapsulates the packet, selects the appropriate path, and encapsulates the packet to forward it toward","the destination host."],["NAT"],["The no shutdown command was not issued on these interfaces."],["The transmission continues without the missing portion."],["TCP and UDP port numbers are used by application layer protocols.","TCP uses windowing and sequencing to provide reliable transfer of data.","TCP is a connection-oriented protocol. UDP is a connectionless protocol."],["the destination port number"],["Datagrams that arrive in a different order than that in which they were sent are not placed in order."],["IP address","subnet mask"],["A single packet can be sent to a group of hosts.","Multicast transmission can be used by routers to exchange routing information.","Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255."],["It eliminates most address configuration errors.","It reduces the burden on network support staff."],["2001:DB8:BC15:A::0"],["compression","encryption"],["to require users to prove who they are"],["WPA"],["multicast"],["winner"],["This is a static map entry."],["Destination Address"],["2001:db8:abc:5::1"],["audio conference, financial transactions, web page"],["secretin"],["data link layer addressing","detection of errors through CRC calculations","delimiting groups of bits into frames"],["CEF is enabled by default, so no configuration is necessary."],["to maintain Layer 2 next-hop addresses"],["Its protocols specify the packet structure and processing used to carry the data from one host to another."],["ISPs use Network Address Translation to change a user IP address into an address that can be used on the Internet."],["link-local"],["because HTTP requires reliable delivery"],["11001010"],["2001:DB8:0:AB00::1234"],["13"],["Hop Limit field"],["The size of each subnet may be different, depending on requirements."],["stateful packet inspection"],["tracert 10.1.1.5"],["grounded"],["the amount of traffic that is currently crossing the network","the type of traffic that is crossing the network","the latency that is created by the number of network devices that the data is crossing"],["The cable insulation could be flammable."],["a cable tester"],["wire map"],["just PC0 and PC1 MAC addresses."],["detection of missing packets"],["a routing table"],["an AUX port"],["any line configuration mode"],["TCP and UDP port numbers are used by application layer protocols.","TCP uses windowing and sequencing to provide reliable transfer of data.","TCP is a connection-oriented protocol. UDP is a connectionless protocol."],["306"],["A link-local IPv6 address is automatically configured on the interface."],["default gateway address"],["172.16.19.255"],["10.1.1.160/29"],["4"],["logical"],["Because the IOS includes the login command on the vty lines by default, access to the device via Telnet will require authentication."],["It will not reverse any encryption."],["The new configuration will be loaded if the switch is restarted."],["If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.","If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply."],["fast-forward switching","fragment-free switching"],["A port is considered to be open when it has an active server application that is assigned to it.","Server security can be improved by closing ports that are associated with unused services."],["to identify the network address of the destination network"],["236.17.12.10"],["ipconfig /displaydns"],["Modular"],["13"],["When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the networK."],["WEP"],["the amount of traffic","the type of traffic","the number and type of network devices that the data is crossing"],["DHCPOFFER"],["lineconin"],["cancellation"],["4"],["The PC2 will be able to ping 192.168.1.1"],["An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client."],["The acknowledgment number field is modified by adding 1 to the randomly chosen initial sequence number in response to the client."],["to identify network address of destination host;"],["no password at all"],["access method"],["to create a hierarchical Layer 3 network design*"],["link-local"],["It is the measure of the bits transferred across the media over a given period of time."],["4"],["It could stop functioning.","It could explode."],["preventing duplication of addresses","providing and controlling access","conserving addresses"],["2170112"],["VoIP","DNS"],["It sends a DHCPREQUEST that identifies which lease offer the client is accepting."],["Class A"],["microwave"],["SLAAC"],["DNS servers can cache recent queries to reduce DNS query traffic."],["2001:DB8:BC15:A"],["encapsulating PDUs from the transport layer","routing packets toward the destination"],["layer 2 next hops"],["voice","video"]],[],[],[],[["to identify where the frame starts and ends","to distinguish data bits from control bits"],["SC-SC patch cords are used with multimode fiber cables."],["data link"],["65 Mb/s"],["RFI​","EMI"],["to determine if errors occurred in the transmission and reception"],["The transmitting node inserts start and stop bits into the frame."],["Sending the signals asynchronously means that they are transmitted without a clock signal."],["coverage area","interference","security"],["It shields the upper layer protocol from being aware of the physical medium to be used in the communication."],["It is able to carry signals much farther than copper cabling."],["LLC"],["They allow for full-duplex connectivity."],["1 – rollover, 2 – straight-through, 3 – crossover"],["Logical topologies determine the media access control method used."],["Bandwidth"],["The untwisted length of each wire is too long."],["10"],["Collisions can exist in the networks.","They use CSMA/CA technology."],["802.11ac"],["by increasing and varying the number of twists in each wire pair"],["Step 1"],["Step 2"],["Step 3"],["Step 4"],["Step 5"],["Logical topologies refer to how a network transfers data between devices."],["the measure of the bits transferred across the media over a given period of time"],["the distortion of the transmitted messages from signals carried in adjacent wires"],["twisting the wires together into pairs"],["RJ-45"],["It accepts Layer 3 packets and encapsulates them into frames.","It provides media access control and performs error detection."],["full duplex"],["End devices connect to a central intermediate device, which in turn connects to other central intermediate devices."],["Network 1 uses CSMA/CD and Network 3 uses CSMA/CA."],["error detection"],["to verify the integrity of the received frame"],["LED as light source","several paths of light into the fiber","generally used with LANs"],["only one ray of light into the fiber","generally used for campus backbone","laser as light source"]],[],[["copy running-config startup-config"],["differentiated services"],["upper-layer connection-oriented protocols"],["Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large."],["three"],["WAN interfaces","LAN interfaces"],["the default gateway address"],["password cisco","line console 0","login"],["R1"],["R1#"],["R1(config-line)#"],["R1(config)#"],["packets with destination of 172.17.6.15"],["packets with destination of 172.17.14.8"],["packets with destination of 172.17.12.10"],["packets with destination of 172.17.10.5"],["packets with destination of 172.17.8.20"],["A configured and activated router interface must be connected to another device in order to operate."],["routing table","ARP cache"],["Flags","Total Length"],["Traffic Class","Flow Label"],["They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route."],["It informs network devices to maintain the same path for real-time application packets."],["switch the packet to the directly connected interface"],["ROM"],["route print","netstat -r"],["The packet will be sent directly to the destination host."],["show ip interface brief"],["startup configuration","IOS image file"],["The router has enough RAM and flash memory for the IOS upgrade."],["when the full IOS cannot be found"],["directly connected static route"],["the ability to operate without regard to the data that is carried in each packet"],["does not require a dedicated end-to-end connection","operates independently of the network media"],["Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host."],["Time-to-Live"],["Protocol"],["efficient packet handling"],["Serial0/0/1"],["directly connected route"],["remote routes"],["It has two types of ports that can be used to access the console."],["Locate and load the startup-config file from NVRAM."],["LAN","WAN"],["Cisco IOS","IP routing table"],["The configuration file is missing from NVRAM."],["to contain the commands that are used to initially configure a router on startup"],["line console 0","login","password cisco"],["The IPv6 header is simpler than the IPv4 header is, which improves packet handling."],["SW1 does not have a default gateway configured."],["service password-encrytion"],["enable"],["copy running-config startup-config"],["login"],["ip address 192.168.4.4 255.255.255.0"]],[],[],[["4"],["30"],["1022"],["6"],["255.255.255.128"],["IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33"],["three"],["192.168.1.64/27","192.168.1.96/28"],["/25"],["72"],["hosts accessible from the Internet"],["predictable static IP addresses for easier identification"],["It eliminates most address configuration errors.","It reduces the burden on network support staff."],["The gateway address is in the wrong subnet."],["/72"],["2001:DB8:BC15:A::0"],["/64","/68"],["172.25.0.126"],["255.255.254.0"],["60"],["4"],["192.168.1.64/27"],["192.168.1.32/27"],["192.168.1.96/27"],["Network C"],["Network A"],["Network D"],["Network B"],["Host A and host B are on overlapping subnets."],["72"]],[["session layer","application layer","presentation layer"],["compression","encryption"],["FTP","POP3","DHCP"],["FTP","HTTP","SMTP"],["decentralized resources","resource sharing without a dedicated server"],["A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser."],["Messages are kept in the mail servers until the client manually deletes them."],["SMTP tries to send the messages at a later time.","SMTP periodically checks the queue for messages and attempts to send them again."],["HTTP"],["DHCPDISCOVER","DHCPREQUEST"],["The user will access the site without problems."],["netacad.com"],["The destination IP address is 255.255.255.255.","The message comes from a client seeking an IP address.","All hosts receive the message, but only a DHCP server replies."],["a program that is running on an FTP server"],["Clients establish a long term connection to servers."],["when downloading large numbers of files from the same server"],["HTTPS"],["nslookup"],["authoritative name server"],["canonical name"],["mail exchange record"],["a message that is used to identify the explicit server and lease offer to accept"],["a message that is used to locate any available DHCP server on a network"],["a message that is used to suggest a lease to a client"],["a message that is used to acknowledge that the lease is successful"],["no dedicated server is required","client and server roles are set on a per request basis"],["requires a specific user interface","a background service is required"],["PC_2"]]],[[["Routers send triggered updates in response to a change.","Routers create a topology of the network by using information from other routers."],["1"],["store-and-forward switching"],["ipv6 route 2001:db8:cafe::/56 S0/0/0"],["3"],["native VLAN ID "],["ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443","ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 4365"],["It is automatically updated and maintained by routing protocols."],["in an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific network device"],["Another router in the same organization provided the default route by using a dynamic routing protocol."],["interface gigabitethernet 1/1","no switchport","ip routing"],["Only devices in VLAN 20 see the frame."],["Step 1- Each router learns about its own directly connected networks.","Step 2- Each router is responsible for “saying hello” to its neighbors on directly connected networks.","Step 3- Each router builds a Link-State Packet (LSP) containing the state of each directly connected link","Step 4- Each router floods the LSP to all neighbors, who then store all LSPs received in a database","Step 5- Each router uses the database to construct a complete map of the topology and computes the best"],["ICMP message type","destination UDP port number"],["Change the destination network and mask to 0.0.0.0 0.0.0.0"],["the highest IPv4 address on an active interface"],["switchport mode access","switchport port-security maximum 2","switchport port-security mac-address sticky","switchport port-security violation restrict"],["speed of convergence","scalability"],["level 1 parent route"],["Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8."],["In a switched network, they are mostly configured between switches at the core and distribution layers.","They are not associated with a particular VLAN."],["permit icmp any any nd-na"],["This is the ability... -> buffering","Each switch port can... -> full duplex","Each switch port creates... -> collision domain","Switches use... -> MAC address table"],["A lower cost indicates a better path to the destination than a higher cost does."],["outbound","R1 Gi0/1.12"],["no vlan 100"],["router ospf 1","network 192.168.2.0 0.0.0.255 area 0"],["interconnection of large-scale networks in wiring closets"],["dynamic NAT"],["The link interface subnet masks must match.","The two routers must include the inter-router link network in an OSPFv2 network command.","The OSPF hello or dead timers on each router must match."],["the cost of that link","the type of network link","the link router interface IP address and subnet mask"],["There is no end-to-end addressing."],["The wrong VLAN has been configured on subinterface Fa0/0.50."],["The ip helper-address command was applied on the wrong interface."],["They send their routing tables to directly connected neighbors."],["interface gigabitethernet 1/1","switchport mode trunk"],["The path a static route uses to send data is known.","Static routing does not advertise over the network, thus providing better security. ","Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does."],["create a public and private key pair"],["the source MAC address and the incoming port"],["The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation."],["The serial interfaces of the routers are in different subnets."],["ip route 172.16.2.0 255.255.255.0 172.16.3.1"],["A cable has not been attached to the port."],["access list number between 100 and 199","source address and wildcard mask","destination address and wildcard mask"],["0.0.1.255"],["a DHCPREQUEST unicast message"],["They exchange abbreviated lists of their LSDBs"],["It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses."],["A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs."],["ip address dhcp"],["IPv6 uses the link-local address of neighbors as the next-hop address for dynamic routes."],["ip route 172.16.32.0 255.255.224.0 S0/0/0 200"],["5 broadcast domains and 10 collision domains"],["show access-lists","show running-config"],["IPsec"],["Welldone!"],["192.168.0.0/22"],["ip route"],["sticky secure MAC addresses"],["dynamic desirable – dynamic auto","dynamic desirable – dynamic desirable","dynamic desirable – trunk"],["hello"],["administrative distance"],["RAM"],["1"],["ip route"],["Router R4 will become the DR and router R3 will become the BDR."],["The access list defines the private IP addresses that are to be translated."],["access-list 5 permit 10.7.0.0 0.0.0.31","access-class 5 in"],["The control and management traffic on the error-occurring trunk port is being misdirected or dropped."],["The native VLAN provides a common identifier to both ends of a trunk.","The native VLAN traffic will be untagged across the trunk link."],["Change the administrative distance to 120."],["SW-A will remove both tags and forward the rest of the frame across the trunk link, where SW-B will forward the frame to hosts on VLAN 40."],["OSPFv3 routers do not need to have matching subnets to form neighbor adjacencies."],["Configure attached switch ports with the nonegotiate command option.","Place the two attached switch ports in access mode."],["to determine which ports are not correctly configured to prevent MAC address flooding"],["deny tcp any host 2001:DB8:19:A::105 eq 80","permit ipv6 any any"],["network 172.16.1.0 0.0.255.255 area 0"],["level 1 parent route"],["recursive static route"],["255.255.255.0"],["255.255.0.0"],["5"],["RAM"],["protect"],["access-group 11 in"],["10.0.0.0/21"],["deny tcp host 2001:db8:48:1c::50 any eq 80","deny tcp any host 2001:db8:48:1c::50 eq 80","deny ipv6 any any"],["192.168.5.0"],["named ACLs requite the use of port numbers"],["2"],["Metric"],["To have only a link-local IPv6 address"],["Full duplex offers 100 percent potential use of the bandwidth.","Full duplex allows both ends to transmit and receive simultaneously."],["VoIP"],["no switchport trunk allowed vlan","no switchport trunk native vlan"],["mdix auto"],["It prevents OSPF messages from being sent out any OSPF-enabled interface."],["routers that share a link and use the same routing protocol"],["Address translation is working.","A standard access list numbered 1 was used as part of the configuration process.","Two types of NAT are enabled."],["full operating system > flash","limited operating system > ROM","routing table > RAM","startup configuration file > NVRAM"],["Configure specific ports for management traffic on a specific VLAN.","Configure SSH for remote management."],["10.16.100.128","172.16.100.64"],["3"],["Source MAC: 00E0.FE91.7799","Source IP: 10.1.1.10"],["a collapsed core network design"],["5"],["administrative distance"],["administrative distance"],["0.0.0.127"],["FF02::5","FF02::6","FE80::1"],["65"],["65"],["protect"],["172.16.47.254"],["mismatched OSPF hello or Dead timers"],["one link between the switch and the router with the one switch port being configured in access mode"],["sticky secure MAC addresses"],["sticky secure MAC addresses"],["The ACL is implicitly denying access to all the servers."],["Inbound ACLs must be routed before they are processed.","The ACL is implicitly denying access to all the servers."],["sticky secure MAC addresses"],["ip route 10.10.0.0 255.255.0.0 209.165.200.225 100"],["10.16.100.128","172.16.100.64"],["untagged","un tagged"],["The NTP master will claim to be synchronized at the configured stratum number.","Other systems will be willing to synchronize to that master using NTP."],["access-class 11 in"],["loopback address","default VLAN","IP address"],["The dns-server line is included in the ipv6 dhcp pool section."],["Frames are forwarded without any error checking."],["172.16.25.35"]],[["has a lower latency appropriate for high-performance computing applications"],["simpler deployment for additional switch equipment","easier to provide redundant links to ensure higher availability"],["need for fewer power outlets","increased scalability"],["to Fa0/1, Fa0/2, and Fa0/3 only"],["determines which interface is used to forward a frame based on the destination MAC address"],["12"],["a combination of the functionality of the distribution and core layers"],["to enhance user bandwidth","to isolate traffic between segments"],["SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch."],["aggregating Layer 3 routing boundaries"],["switch"],["the number of available ports"],["broadcast"],["provides access to the user"],["source MAC address and incoming port number"],["converged"],["It enables the sharing of power among multiple stackable switches."],["stackable switch"],["5"],["traffic flow analysis"],["1000 Mb/s"],["PoE pass-through"],["fixed configuration"],["distribution and core layers collapsed into one tier, and the access layer on a separate tier"],["destination MAC address","ingress port"],["Each port forms a collision domain."],["analog and VoIP phone traffic","user data traffic"],["FF-FF-FF-FF-FF-FF"],["source MAC address"],["analog and VoIP phone traffic","user data traffic"],["8"],["2"],["switch"],["to Fa0/1, Fa0/2, and Fa0/3 only"]],[["a console cable"],["revealing the type of information an attacker is able to gather from monitoring network traffic","simulating attacks against the production network to determine any existing vulnerabilities"],["The port is experiencing errors."],["Modify the transport input command."],["ip address 192.168.99.2 255.255.255.0"],["Performance is improved with bidirectional data flow.","Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.","Performance is improved because the collision detect function is disabled on the device."],["DHCP starvation"],["CDP"],["Dynamically learned secure MAC addresses are lost when the switch reboots.","If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached."],["Users on the 192.168.1.0/24 subnet are able to ping the switch at IP address 192.168.1.2."],["switchport port-security","switchport port-security maximum 2","switchport port-security mac-address sticky"],["Packets with unknown source addresses will be dropped."],["configuring port security"],["There could be too much electrical interference and noise on the link."],["Full-duplex"],["VLAN 1"],["Issue the shutdown and then no shutdown interface commands."],["The port violation mode is the default for any port that has port security enabled."],["shutdown"],["only the G0/1 and G0/24 ports"],["automatically detects copper cable type"],["show controllers"],["A full version of the Cisco IOS was located and loaded.","POST occurred normally."],["Performance is improved with bidirectional data flow.","Full-duplex Fast Ethernet offers 100 percent efficiency in both directions."],["restrict"],["the aging-out period of the MAC address table"],["port security","DHCP snooping"],["Telnet sends a username and password in plain text, whereas SSH encrypts the username and password."],["A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length."],["when packets are being dropped from a particular directly attached host"],["If the LED is green, the port is operating at 100 Mb/s."],["to provide an environment to operate in when the switch operating system cannot be found"]],[["between a switch and a server that has an 802.1Q NIC","between two switches that utilize multiple VLANs"],["The port becomes inactive."],["All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN."],["no vlan 20"],["Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch."],["VLAN 20 will be created automatically."],["show interfaces Fa0/1 switchport"],["dynamic auto","nonegotiate","dynamic desirable","trunk"],["Port Fa0/11 will be returned to VLAN 1."],["Enter the switchport access vlan 3 command in interface configuration mode."],["Disable DTP autonegotiation on end-user ports.","Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1."],["the default automatic trunking configuration"],["It allows only VLAN 30 on Fa0/5."],["No VLAN tag is added to the frame."],["The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk."],["All VLANs will be allowed across the trunk."],["when connecting a Cisco switch to a non-Cisco switch","on links that should not be trunking"],["PC-D, PC-E"],["Devices in one VLAN do not hear the broadcasts from devices in another VLAN.","VLANs logically group hosts, regardless of physical location."],["switchport trunk native vlan 66"],["PVLAN protected port"],["show vlan brief"],["An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.","A management VLAN is any VLAN that is configured to access management features of the switch.","After the initial boot of an unconfigured switch, all ports are members of the default VLAN."],["switchport nonegotiate"],["dynamic auto – dynamic auto"],["allowed VLANS on trunks"],["dynamic auto"],["Interface FastEthernet 0/1 is configured with the switchport protected command."],["They are saved in the running-config file by default.","VLAN IDs exist between 1006 to 4094."],["User Priority – value that supports level or service implementation","Type – value for the tag protocol ID value","Canonical Format Identifier – identifier that enables Token Ring frames to be carried across Ethernet Links","– not scored – -value for the application protocol of the user data in a frame","VLAN ID – VLAN number"],["native"],["security","improved IT staff efficiency","cost reduction"],["The ports stop communicating with the attached devices."],["trunk","access"]],[["link-local"],["default gateway","IP address","subnet mask"],["Layer 1 statuses","IP addresses"],["172.16.2.2 -> next hop","10.3.0.0 -> destination network","21024000 -> metric","1 -> administrative distance","00:22:15 -> route timestamp","D -> route source protocol"],["destination IP address","subnet mask"],["R1 does not know a route to any remote networks.","The interface Fa0/1 is configured with IPv6 address 2001:DB8:ACAD:A::12."],["It indicates that this route was learned via EIGRP."],["Routes with the smallest metric to a destination indicate the best path.","Administrative distance refers to the trustworthiness of a particular route."],["It determines the best path to send packets.","It connects multiple IP networks."],["source IP address","destination IP address"],["the MAC address of the G0/0 interface on R1"],["The interface fa0/0 has not been activated."],["ipv6 address ipv6-address/prefix-length eui-64"],["routing"],["to provide a route to forward packets for which there is no route in the routing table"],["directly connected network","local host route"],["source Layer 2 address"],["Send the packet out the Serial0/0/0 interface."],["router"],["no shutdown"],["Routers support a variety of interface types. Switches typically support Ethernet interfaces."],["It is automatically updated and maintained by routing protocols."],["directly connected networks","routes that are learned through the EIGRP routing protocol"],["an ARP request"],["bandwidth","delay"],["a directly connected network"],["bandwidth","delay"],["a default static route","a static route to a specific network"],["terminal emulation client software"],["It is the interface on R1 used to send data that is destined for 10.1.1.0/24."],["192.168.12.16"],["the ipv6 unicast-routing command"],["default static route","static route to specific network"],["it is a logical int internal to the router"],["If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request."],["remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0"],["It is a logical interface internal to the router."]],[["show vlan"],["Multilayer switches are more expensive than router-on-a-stick implementations."],["There is an incorrect IP address configured on GigabitEthernet 0/0.30."],["switchport mode trunk"],["No VLAN number is added to the frame in this design."],["From the switch, issue the show interface trunk command.","From the router, issue the show ip route command."],["The router will forward the packet out interface FastEthernet 0/1.2."],["The Layer 3 switch must have IP routing enabled."],["router on a stick"],["IP addresses on the subinterfaces are incorrectly matched to the VLANs."],["Traffic is routed via internal VLAN interfaces."],["The Gi1/1 switch port is not in trunking mode."],["does not scale well beyond 50 VLANs"],["Routed traffic must contend for bandwidth on a single router interface."],["SVI"],["The encapsulation dot1Q 5 command contains the wrong VLAN."],["Gi1/1 is configured as trunk mode.","Gi1/1 is in the default VLAN."],["to create a routed port for a single network"],["ip address 192.168.20.1 255.255.255.0"],["A router with at least two LAN interfaces should be used."],["RTA is using the same subnet for VLAN 20 and VLAN 30."],["4"],["vlan 10"],["Each VLAN must have a different network number."],["It is not assigned to a VLAN."],["Enter the command sdm prefer lanbase-routing and reload."],["no link"],["The router requires one Ethernet link for each VLAN. "],["trunk"],["The encapsulation has not been configured on the subinterface."],["It is configured as trunk mode."]],[["Static routing is more secure because it does not advertise over the network.","Static routing uses fewer router resources than dynamic routing."],["Configure a default route from R1 to ISP and a static route from ISP to R1."],["R1 needs a static route to the R2 LAN."],["ip route 0.0.0.0 0.0.0.0 s0/0/0","ip route 0.0.0.0 0.0.0.0 s0/1/0 10 "],["default route"],["ip route 192.168.4.0 255.255.255.0 192.168.3.2"],["S 172.16.1.0 [1/0] via 172.16.2.2"],["ip route 0.0.0.0 0.0.0.0 s0/0/1"],["to be used as a backup route"],["ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2"],["ipv6 route ::/0 G0/1 fe80::2"],["All subnets in a network are the same size.","The number of bits used to identify the hosts is fixed by the class of the network."],["172.16.0.0/24"],["utilize multiple different subnet masks in the same IP address space"],["10.50.168.0/21"],["2001:0DB8:ACAD:0004::/62"],["directly connected static route"],["show ip route","show ip interface brief","ping"],["ip route 10.0.0.0 255.0.0.0 192.168.1.2","no ip route 10.0.0.0 255.0.0.0 172.16.40.2"],["The route is removed from the table."],["Webserver10"],["ipv6 route 2001:db8:10:12::/64 S0/0/1"],["Manually shut down the router interface used as a primary route."],["Write all network numbers in binary."],["the interface ID exit interface","the IP address of the next-hop neighbor"],["Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1."],["ip route 209.165.200.228 255.255.255.248 10.0.0.1 120"],["The static route is removed from the routing table."],["Serial0/0/0"]],[["allows a router to receive routing updates on an interface but not send updates via that interface"],["network discovery","update and maintain routing tables"],["version 2"],["R1, R3, R5, R7"],["allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology","sends subnet mask information in routing updates"],["Routing updates are sent through all the interfaces belonging to 192.168.1.0.","The network address 192.168.1.0 is advertised to the neighbor routers."],["The command no auto-summary has been used on the RIP neighbor router.","RIP version 2 is running on this router and its RIP neighbor."],["the amount of time for the routing tables to achieve a consistent state after a topology change"],["default-information originate"],["a route dynamically learned through the EIGRP routing protocol"],["Serial0/0/1"],["S 10.16.0.0/24 [1/0] via 192.168.0.9"],["The router has determined the costs associated with its active links.","The router has established its adjacencies."],["contain a next-hop IP address","contain an exit interface"],["By design IPv6 is classless so all routes are effectively level 1 ultimate routes."],["BGP"],["a level 1 ultimate route"],["calculates its metric using bandwidth","uses Dijkstra’s algorithm to build the SPF tree"],["a change in the topology","the initial startup of the routing protocol process"],["IPv6 unicast routing has not been enabled on this router."],["an ultimate route that is using a next hop IP address on a router that is not using CEF"],["EIGRP"],["The cumulative bandwidth that is used along the routing path."],["They send messages about network status insecurely across networks by default."],["The interface of the 192.168.10.0 network is sending only version 2 updates."],["OSPF"],["a 192.168.14.0 /26 route that is learned via RIP"],["immediately after receiving an LSP from neighbors with updates"]],[["link-state database"],["When converged, all routers in an area have identical topology tables.","It is a link-state database that represents the network topology.","The table can be viewed via the show ip ospf database command."],["OSPF will remove that neighbor from the router link-state database."],["show ipv6 route ospf"],["0.0.0.31"],["The OSPFv3 process will be assigned an ID of 64."],["multiaccess"],["cost"],["show ip protocols"],["authentication"],["Completion!"],["show ipv6 protocols"],["Third precedence"],["Fourth precedence"],["First precedence"],["Second precedence"],["This is where the details of the neighboring routers can be found."],["This is the algorithm used by OSPF."],["All the routers are in the backbone area."],["This is where you can find the topology table."],["They both use the same DR/BDR election process.","They both share the concept of multiple areas.","They both are link-state protocols."],["to discover neighbors and build adjacencies between them"],["Neighbor ID of 3.3.3.3"],["Routing Process"],["Routing Protocol"],["BW 1544 Kbit/sec"],["to uniquely identify the router within the OSPF domain","to facilitate router participation in the election of the designated router"],["show ipv6 ospf neighbor"],["ipv6 ospf 20 area 0"],["ipv6 router ospf 10"],["the router-id rid command"],["LSU"],["an Ethernet interface MAC address available on the router, the FE80::/10 prefix, and the EUI-64 process"],["OSPF will remove that neighbor from the router link-state database."],["Highest priority"],["adjacency database"],["mismatched subnet masks on the link interfaces","mismatched OSPF Hello or Dead timers"],["show ip ospf neighbor"],["show ip ospf neighbor"],["FF02::5","FE80::1","FF02::6"],["R2 has not formed an adjacency with any other router"],["show ip ospf neighbor"],["mismatched OSPF Hello or Dead timers","mismatched subnet masks on the link interfaces"],["second state"],["seventh state"],["fifth state"],["first state"],["fourth state"],["third state"],["sixth state"]],[[" access-list 10 permit 192.168.15.23 0.0.0.0"," access-list 10 permit host 192.168.15.23"],["Manually add the new deny ACE with a sequence number of 5."],["The ACL is applied to the wrong interface."],["They filter traffic based on source IP addresses only."],[" interface gi0/0"," ip access-group 105 out","access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20","access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21","access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www","access-list 105 deny ip any host 10.0.54.5","access-list 105 permit ip any any"],["limiting debug outputs","controlling virtual terminal access to routers"],[" access-class 1 in"],["Place extended ACLs close to the source IP address of the traffic.","Place standard ACLs close to the destination IP address of the traffic.","Filter unwanted traffic before it travels onto a low-bandwidth link."],["deny ipv6 any any","permit icmp any any nd-ns","permit icmp any any nd-na"],["Both can be created by using either a descriptive name or number.","Both include an implicit deny as a final ACE."],["the first valid host address in a subnet"],["subnetwork address of a subnet with 14 valid host "],["all IP address bits must match exactly"],["hosts in a subnet with SM 255.255.252.0"],["address with a subnet 255.255.255.248"],[" interface gi0/0"," no ip access-group 105 out"," no access-list 105"," access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000"," access-list 105 permit tcp any host 10.0.54.5 eq 20"," access-list 105 permit tcp any host 10.0.54.5 eq 21"," access-list 105 deny ip any any"," ip access-group 105 out"],["ACLs provide a basic level of security for network access.","ACLs can control which areas a host can access on a network."],["an implicit permit of neighbor discovery packets"],["Each statement is checked only until a match is detected or until the end of the ACE list.","An implicit deny any rejects any packet that does not match any ACE.","A packet can either be rejected or forwarded as directed by the ACE that is matched."],["Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed."],["named extended"],["permit tcp any host 2001:DB8:10:10::100 eq 25"],["ICMPv6 packets that are destined to PC1"],["8"],["172.16.2.0 to 172.16.3.255"],["SSH traffic from the 172.16.0.0 network to any destination network"],["access-list 10 permit 192.168.16.0 0.0.3.255"],["Both IPv4 and IPv6 ACLs can be configured on a single device, but cannot share the same name."],["when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface"],["the use of the ipv6 traffic-filter command"],["The ACEs of access list 10 will be renumbered."],["Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to an originated request."]],[["Add the ipv6 dhcp relay command to interface Fa0/0."],["to notify other DHCP servers on the subnet that the IP address was leased"],["FF-FF-FF-FF-FF-FF and 255.255.255.255"],["excluded-address 10.0.15.1 10.0.15.15"],["enabled in RA messages with the ipv6 nd other-config-flag command","clients send only DHCPv6 INFORMATION-REQUEST messages to the server","enabled on the client with the ipv6 address autoconfig command"],["the M flag is set to 1 in RA messages","uses the address command to create a pool of addresses for clients","enabled on the client with the ipv6 address dhcp command"],["The router is configured for stateless DHCPv6 operation."],["Confirm that ports on the Layer 2 LAN switch are configured as edge ports."],["It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information."],["ICMPv6"],["Clients must use all configuration information that is provided by a DHCPv6 server."],["The router is intended to be used as a SOHO gateway.","This is an ISP requirement."],["the link-local address of the router interface that is attached to the network"],["stateless DHCPv6"],["DHCPv6 INFORMATION-REQUEST"],["configuring the router to obtain IP parameters from a DHCPv4 server"],["ip dhcp excluded-address 192.168.100.1 192.168.100.10","ip dhcp excluded-address 192.168.101.254","ip dhcp pool LAN-POOL-100","network 192.168.100.0 255.255.254.0","default-router 192.168.100.1"],["broadcast DHCPREQUEST"],["one pool","three leases"],["The router is configured for SLAAC DHCPv6 operation."],["Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway."],["dynamic allocation"],["Step 2"],["Step 1"],["Step 3"],["stateless DHCPv6"],["ipv6 unicast-routing"],["client hardware address"],["It can provide relay services for multiple UDP services."],["It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address."],["the MAC address of the IPv6 enabled interface"],["DHCPREQUEST"]],[["PAT"],["inside global addresses"],["The NAT interfaces are not correctly assigned."],["There is no end-to-end addressing."],["It provides an automated mapping of inside local to inside global IP addresses."],["The request to the server for the seventh user fails."],["Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN."],["Interface S0/0/0 should be configured with the command ip nat outside."],["private IP addresses"],["defines which addresses can be translated"],["a NAT pool named corp that defines the starting and ending public IP addresses"],["NAT-POOL2 is not bound to ACL 1."],["The company has more private IP addresses than available public IP addresses."],["It will bind NAT-POOL1 with ACL 1."],["access-list 1 permit 10.0.0.0 0.255.255.255","ip nat inside source list 1 interface serial 0/0/0 overload"],["static"],["router"],["Assign static internal addresses and public external addresses to each of the servers."],["They allow sites to be combined without creating any address conflicts."],["PAT using an external interface"],["Not enough information is given to determine if both static and dynamic NAT are working."],["step 5"],["step 2"],["step 4"],["step 1"],["step 3"],["Define a pool of global addresses to be used for overload translation.","Identify the inside interface."],["inside local"],["provides flexibility in designing the IPv4 addressing scheme"],["ip nat inside source static tcp 192.168.5.25 8080 209.165.200.230 80"],["Port Address Translation"],["conserve IPv4 addresses"]]]]
Add Comment
Please, Sign In to add comment