Which two security features can be configured to prevent unauthorized access into the network through a networ
Which two security features can be configured to prevent unauthorized access into the network through a networking device? (Choose two.) A. Anti-Replay B. Traffic filtering C. Authentication D. IPSec network security Explanation: Traffic filtering and authentication security can be configured to prevent unauthorized access into the network through a networking device. Unauthorized access to the […]
What command was used to generate the output shown below?
What command was used to generate the output shown below? A. winipcfg B. ipconfig C. ifconfig D. ipconfig/all Explanation: The output displayed is that generated by the ipconfig/all command as executed on a Windows computer. This command displays a wealth of information about the current configuration. Examples of information that can be gleaned from the […]
In the diagram below, if the workstation at 10.0.1.3 sends a packet to the workstation at 10.1.1.3, what will
In the diagram below, if the workstation at 10.0.1.3 sends a packet to the workstation at 10.1.1.3, what will be the source physical address when the packet arrives at 10.1.1.3? A. ab.ab.ab.ab.ab.ab B. ee.ee.ee.ee.ee.ee C. dd.dd.dd.dd.dd.dd D. cc.cc.cc.cc.cc.cc E. aa.aa.aa.aa.aa.aa F. bb.bb.bb.bb.bb.bb Explanation: The source physical address of the packet when it arrives at 10.1.1.3 […]
Which of the following cables would be used to connect a router to a switch?
Which of the following cables would be used to connect a router to a switch? A. v.35 B. crossover C. rollover D. straight-through Explanation: A straight-through cable would be used. When connecting “unlike” devices, such as a switch to a router, a straight-through cable is used. This is a cable where the wires are in […]
Which of the following are port roles in the Rapid Spanning Tree Protocol (RSTP)? (Choose three.)
Which of the following are port roles in the Rapid Spanning Tree Protocol (RSTP)? (Choose three.) A. Alternate B. Listening C. Routing D. Designated E. Backup F. Blocking G. Discarding Explanation: There are five port roles in RSTP: ● Root port: the closest port to the root bridge in terms of path cost. There can […]
What is the valid host address range for the subnet 172.25.4.0 /23?
What is the valid host address range for the subnet 172.25.4.0 /23? A. 172.25.4.1 to 172.25.5.254 B. 172.25.4.10 to 172.25.5.210 C. 172.25.4.35 to 172.25.5.64 D. 172.25.4.21 to 172.25.5.56 Explanation: For the subnet 172.25.4.0, the valid host range will start at 172.25.4.1 and end at 172.25.5.254. To determine the valid range of addresses in a subnet, […]
Which statement is NOT true regarding Internet Control Message Protocol (ICMP)?
Which statement is NOT true regarding Internet Control Message Protocol (ICMP)? A. ICMP can identify network problems. B. ICMP is documented in RFC 792. C. ICMP provides reliable transmission of data in an Internet Protocol (IP) environment. D. An ICMP echo-request message is generated by the ping command. Explanation: ICMP does NOT provide reliable transmission […]
Which of the following examples of partial output of the show run command from R1 represents a correct configu
You are configuring a PPP connection between two routers, R1 and R2. The password for the connection will be poppycock. When you are finished you execute the show run command on R1 to verify the configuration. Which of the following examples of partial output of the show run command from R1 represents a correct configuration […]
Which Cisco Internetwork Operating System (IOS) command is used to view the number of Enhanced Interior Gatewa
Which Cisco Internetwork Operating System (IOS) command is used to view the number of Enhanced Interior Gateway Routing Protocol (EIGRP) packets that are sent and received? A. show eigrp neighbors B. show ip eigrp interfaces C. show ip eigrp packets D. show ip eigrp traffic E. show ip route F. show ip eigrp topology Explanation: […]
Which Cisco 2950 switch command should you use to configure the port?
You are a network administrator for your organization. Your organization has two Virtual LANs, named Marketing and Production. All Cisco 2950 switches in the network have both VLANs configured on them. Switches A, C, F, and G have user machines connected for both VLANs, whereas switches B, D, and E have user machines connected for […]