CCENT ICND1 Study Guide. Lammle Todd

Чтение книги онлайн.

Читать онлайн книгу CCENT ICND1 Study Guide - Lammle Todd страница 7

CCENT ICND1 Study Guide - Lammle Todd

Скачать книгу

by default on all Cisco switches.

      B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed.

      C. You should not have more than 10 switches in the same VTP domain.

      D. You need to have a trunk link configured between switches in order to send information about more than one VLAN down the link.

      23. How many broadcast domains are created when you segment a network with a 12-port switch?

      A. 1

      B. 2

      C. 5

      D. 12

      24. What protocols are used to configure trunking on a switch? (Choose two.)

      A. VLAN Trunking Protocol

      B. VLAN

      C. 802.1q

      D. ISL

      25. What is a stub network?

      A. A network with more than one exit point

      B. A network with more than one exit and entry point

      C. A network with only one entry and no exit point

      D. A network that has only one entry and exit point

      26. Where is a hub specified in the OSI model?

      A. Session layer

      B. Physical layer

      C. Data Link layer

      D. Application layer

      27. What are the two main types of access control lists (ACLs)? (Choose two.)

      A. Standard

      B. IEEE

      C. Extended

      D. Specialized

      28. Which of the following is the best summarization of the following networks: 192.168.128.0 through 192.168.159.0?

      A. 192.168.0.0/24

      B. 192.168.128.0/16

      C. 192.168.128.0/19

      D. 192.168.128.0/20

      29. What command is used to create a backup configuration?

      A. copy running backup

      B. copy running-config startup-config

      C. config mem

      D. wr net

      30. 1000Base-T is which IEEE standard?

      A. 802.3f

      B. 802.3z

      C. 802.3ab

      D. 802.3ae

      Answers to Assessment Test

      1. C. 2100 boots the router into ROM monitor mode, 2101 loads the mini-IOS from ROM, and 2102 is the default and loads the IOS from flash. See Chapter 8 for more information.

      2. D. The show license udi command displays the unique device identifier (UDI) of the router, which comprises the product ID (PID) and serial number of the router. See Chapter 8 for more information.

      3. B. The show license feature command allows you to view the technology package licenses and feature licenses that are supported on your router along with several status variables related to software activation and licensing, both licensed and unlicensed features. See Chapter 8 for more information.

      4. B. There are eight different trap levels. If you choose, for example, level 3, level 0 through level 3 messages will be displayed. See Chapter 8 for more information.

      5. B. This can be a hard question if you don’t remember to invert the 7th bit of the first octet in the MAC address! Always look for the 7th bit when studying for the Cisco R/S, and when using eui-64, invert it. The eui-64 autoconfiguration then inserts an FF: FE in the middle of the 48-bit MAC address to create a unique IPv6 address. See Chapter 14 for more information.

      6. A. The NDP neighbor advertisement (NA) contains the MAC address. A neighbor solicitation (NS) was initially sent asking for the MAC address. See Chapter 14 for more information.

      7. B. Each field in an IPv6 address is 16 bits long. An IPv6 address has eight fields for a total of 128 bits. See Chapter 14 for more information.

      8. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information.

      9. B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254. See Chapter 4 for more information.

      10. C. The IP address is configured under a logical interface, called a management domain or VLAN 1, by default. See Chapter 10 for more information.

      11. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information.

      12. C. An inside global address is considered to be the IP address of the host on the private network after translation. See Chapter 13 for more information.

      13. B. Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question, we need to see if access list 100 is configured correctly, if at all, so show access-list is the best answer. See Chapter 13 for more information.

      14. D. Layer 2 switching creates individual collision domains per port. See Chapter 1 for more information.

      15. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 6 for more information.

      16. B. To see the contents of all access lists, use the show access-lists command. See Chapter 12 for more information.

      17. C. VLANs break up broadcast domains at layer 2. See Chapter 11 for more information.

      18. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 6 for more information.

      19. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 3 for more information.

      20. A. Class A addressing provides 22 bits for host subnetting. Class B provides 16 bits, but only 14 are available for subnetting. Class C provides only 6 bits

Скачать книгу