Podcast
Questions and Answers
An employee at a branch office needs to access confidential pricing information from internal servers at the Head Office. What type of network is required?
An employee at a branch office needs to access confidential pricing information from internal servers at the Head Office. What type of network is required?
- an extra net
- the Internet
- a local area network
- an intranet (correct)
Which command prevents unencrypted passwords from displaying in plain text in a configuration file?
Which command prevents unencrypted passwords from displaying in plain text in a configuration file?
- (config)# service password-encryption (correct)
- (config)# enable secret Encrypted_Password
- (config)# enable secret Secret_Password
- (config)# enable password secret
Which modes and interfaces can be protected with passwords on a Cisco IOS device? (Choose three.)
Which modes and interfaces can be protected with passwords on a Cisco IOS device? (Choose three.)
- Console interface (correct)
- VTY interface (correct)
- Boot IOS mode
- Ethernet interface
- Router configuration mode
- Privileged EXEC mode (correct)
After issuing the copy running-config startup-config
command on a Cisco switch, what is the result?
After issuing the copy running-config startup-config
command on a Cisco switch, what is the result?
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
Refer to the exhibit. What password is required to access user EXEC mode via a console connection?
Refer to the exhibit. What password is required to access user EXEC mode via a console connection?
How does SSH differ from Telnet?
How does SSH differ from Telnet?
While troubleshooting a network issue, a technician made multiple unsaved changes to the router configuration. How can the changes be discarded?
While troubleshooting a network issue, a technician made multiple unsaved changes to the router configuration. How can the changes be discarded?
What does the service password-encryption
command accomplish?
What does the service password-encryption
command accomplish?
When IPv4 addressing is manually configured, what identifies the network and host portions of an IPv4 address?
When IPv4 addressing is manually configured, what identifies the network and host portions of an IPv4 address?
Why would a Layer 2 switch need an IP address?
Why would a Layer 2 switch need an IP address?
What information does the loopback test provide?
What information does the loopback test provide?
What routing table entry has a next hop address associated with a destination network?
What routing table entry has a next hop address associated with a destination network?
Why is NAT not needed in IPv6?
Why is NAT not needed in IPv6?
What is the purpose of configuring a switch with a default gateway address?
What is the purpose of configuring a switch with a default gateway address?
A computer can access devices on the same network but not devices on other networks. What is the likely problem?
A computer can access devices on the same network but not devices on other networks. What is the likely problem?
What happens when the transport input ssh
command is entered on the switch VTY lines?
What happens when the transport input ssh
command is entered on the switch VTY lines?
Which commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
Which commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
Which address prefix range is reserved for IPv4 multicast?
Which address prefix range is reserved for IPv4 multicast?
What is the broadcast address for the 172.16.16.0/22 network?
What is the broadcast address for the 172.16.16.0/22 network?
An administrator configures an end device with the IP address 209.165.201.10 but it fails, while school B uses 192.168.25.10. Why?
An administrator configures an end device with the IP address 209.165.201.10 but it fails, while school B uses 192.168.25.10. Why?
Match the subnetwork to a host address:
Match the subnetwork to a host address:
What is the usable number of host IP addresses with a /26 mask?
What is the usable number of host IP addresses with a /26 mask?
Which addresses are valid public addresses? (Choose three.)
Which addresses are valid public addresses? (Choose three.)
How many host addresses are available with a subnet mask of 255.255.252.0?
How many host addresses are available with a subnet mask of 255.255.252.0?
What is the network address and subnet mask of the second useable subnet from the network address 192.168.1.0/24?
What is the network address and subnet mask of the second useable subnet from the network address 192.168.1.0/24?
Which three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)
Which three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)
What are two types of IPv6 unicast addresses? (Choose two.)
What are two types of IPv6 unicast addresses? (Choose two.)
What type of IPv6 address is FE80::1?
What type of IPv6 address is FE80::1?
A company is deploying an IPv6 addressing scheme for its network. What is the maximum number of subnets achieved per sub-site?
A company is deploying an IPv6 addressing scheme for its network. What is the maximum number of subnets achieved per sub-site?
Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?
Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?
What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?
What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?
What IPv6 prefix is reserved for communication between devices on the same link?
What IPv6 prefix is reserved for communication between devices on the same link?
What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?
What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?
What IPv6 address refers to any unicast address that is assigned to multiple hosts?
What IPv6 address refers to any unicast address that is assigned to multiple hosts?
What is the purpose of ICMP messages?
What is the purpose of ICMP messages?
Which subnet would include the address 192.168.1.96 as a usable host address?
Which subnet would include the address 192.168.1.96 as a usable host address?
Match each description with an appropriate IP address:
Match each description with an appropriate IP address:
A Windows PC cannot connect to the Internet, showing an IP address of 169.254.10.3. What conclusions can be drawn? (Choose two.)
A Windows PC cannot connect to the Internet, showing an IP address of 169.254.10.3. What conclusions can be drawn? (Choose two.)
Which command can an administrator execute to determine what interface a router will use to reach remote networks?
Which command can an administrator execute to determine what interface a router will use to reach remote networks?
Why would a network administrator use the tracert
utility?
Why would a network administrator use the tracert
utility?
To complete the SSH configuration, what are the additional actions have to be performed? (Choose three.)
To complete the SSH configuration, what are the additional actions have to be performed? (Choose three.)
What causes a port to be placed in the err-disabled state?
What causes a port to be placed in the err-disabled state?
Flashcards
What is an intranet?
What is an intranet?
A private network accessible only to an organization's employees, facilitating internal communication and collaboration.
What is service password-encryption?
What is service password-encryption?
This command encrypts all configured passwords in the configuration file, preventing them from appearing in plain text.
What does copy running-config startup-config do?
What does copy running-config startup-config do?
The command replaces the startup configuration with the current running configuration, which will be loaded upon device restart.
What is the purpose of a Switch Virtual Interface (SVI)?
What is the purpose of a Switch Virtual Interface (SVI)?
It allows the device to be managed remotely over the network.
Signup and view all the flashcards
Why is SSH preferred over Telnet?
Why is SSH preferred over Telnet?
Because SSH encrypts messages and uses user authentication, preventing insecure comms.
Signup and view all the flashcards
What does the reload command do (without saving)?
What does the reload command do (without saving)?
It discards unsaved changes by reloading the saved configuration from NVRAM.
Signup and view all the flashcards
What is the service password-encryption command?
What is the service password-encryption command?
It encrypts all plain-text passwords in the configuration file.
Signup and view all the flashcards
What does the subnet mask identify?
What does the subnet mask identify?
The subnet mask identifies the network and host portions of an IPv4 address.
Signup and view all the flashcards
Why does a Layer 2 switch need an IP address?
Why does a Layer 2 switch need an IP address?
It is for remote management using tools like Telnet or SSH.
Signup and view all the flashcards
loopback test does?
loopback test does?
It checks if the device can communicate with itself using its own network software.
Signup and view all the flashcards
What are remote routes in a routing table?
What are remote routes in a routing table?
Remote routes specify a next hop address to reach a destination network.
Signup and view all the flashcards
Why is NAT not needed in IPv6?
Why is NAT not needed in IPv6?
It allows for enough public IP addresses for every device, so NAT is unnecessary.
Signup and view all the flashcards
What is the purpose of a switch's default gateway address?
What is the purpose of a switch's default gateway address?
It is used to forward packets originating from the switch to remote networks.
Signup and view all the flashcards
Why can a computer access devices on same network but not other networks?
Why can a computer access devices on same network but not other networks?
It is likely that the default gateway is incorrectly configured or missing on the computer.
Signup and view all the flashcards
What does the transport input ssh command do?
What does the transport input ssh command do?
Communication between the switch and remote users is encrypted.
Signup and view all the flashcards
What address prefix range is reserved for IPv4 multicast?
What address prefix range is reserved for IPv4 multicast?
Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.
Signup and view all the flashcards
Why will the IP address 192.168.25.10 not work for Internet videoconferencing?
Why will the IP address 192.168.25.10 not work for Internet videoconferencing?
A private IPv4 address. These addresses are not routed over the Internet.
Signup and view all the flashcards
What is the target of an IPv6 packet with destination address FF02::1
What is the target of an IPv6 packet with destination address FF02::1
All IPv6-enabled devices on the local link are targeted.
Signup and view all the flashcards
How is the prefix for an IPv6 host address determined?
How is the prefix for an IPv6 host address determined?
The prefix is determined by the first 64 bits of the address.
Signup and view all the flashcards
Which IPv6 prefix is reserved for communication between devices on the same link?
Which IPv6 prefix is reserved for communication between devices on the same link?
The FE80::/10 prefix is designated for link-local addresses in IPv6.
Signup and view all the flashcards
What is used in the EUI-64 process to create an IPv6 interface ID?
What is used in the EUI-64 process to create an IPv6 interface ID?
The MAC address of the interface is used.
Signup and view all the flashcards
Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?
Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?
An anycast address
Signup and view all the flashcards
What is the purpose of ICMP messages?
What is the purpose of ICMP messages?
To provide feedback of IP packet transmissions
Signup and view all the flashcards
Which subnet includes the host address 192.168.1.96?
Which subnet includes the host address 192.168.1.96?
The 192.168.1.64/26 subnet
Signup and view all the flashcards
What does an IP address in the range 169.254.x.x indicate on a Windows PC?
What does an IP address in the range 169.254.x.x indicate on a Windows PC?
When a Windows PC is assigned an IP address in the 169.254.x.x range, it indicates the PC is unable to reach a DHCP server.
Signup and view all the flashcards
What command displays a router's IP routing table?
What command displays a router's IP routing table?
The show ip route command.
Signup and view all the flashcards
Why would a network administrator use the tracert utility?
Why would a network administrator use the tracert utility?
To identify where a packet was lost or delayed on a network.
Signup and view all the flashcards
What are three actions needed to complete SSH configuration?
What are three actions needed to complete SSH configuration?
The correct IP domain name needs to be configured, a valid local username and password database, symmetric RSA keys generated.
Signup and view all the flashcards
When does the system have this message: What causes a port to be placed in the err-disabled state?
When does the system have this message: What causes a port to be placed in the err-disabled state?
A port enters the err-disabled state when a port security violation occurs.
Signup and view all the flashcards
What is the benefit of EtherChannel technology?
What is the benefit of EtherChannel technology?
EtherChannel provides increased bandwidth by bundling existing FastEthernet or Gigabit Ethernet interfaces into a single EtherChannel.
Signup and view all the flashcards
Active channel is configured on, means?
Active channel is configured on, means?
Bundles the links unconditionally and no negotiation protocol is used.
Signup and view all the flashcards
Which is the best next step to take? What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Which is the best next step to take? What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Sticky MAC addressing
Signup and view all the flashcards
If a shutdown message for violation detected on Fa0/1, this means?
If a shutdown message for violation detected on Fa0/1, this means?
The port security violation mode on Fa0/1 is set to shutdown.
Signup and view all the flashcards
One role of the Dynamic Host Configuration Protocol?
One role of the Dynamic Host Configuration Protocol?
The DHCP server leases client IP addresses dynamically
Signup and view all the flashcards
SW1, which error must be corrected?
SW1, which error must be corrected?
aThere is a native VLAN mismatch
Signup and view all the flashcards
Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
B: R1 (config)#interface ethernet0/0.20
Signup and view all the flashcards
What action should be taken?
What action should be taken?
B. configure IEEE 802.1q
Signup and view all the flashcards
Which statement explains the configuration error message that is received?
Which statement explains the configuration error message that is received?
A: It is a a broadcast IP address
Signup and view all the flashcards
Router(config)#interface GigabitEthernet 1/0/1 What is configured/What causes the error here?
Router(config)#interface GigabitEthernet 1/0/1 What is configured/What causes the error here?
D.
Signup and view all the flashcardsStudy Notes
Intranet
- A private network of interconnected LANs and WANs owned by an organization
- Designed to be accessible only to the organization's employees or members
- Allows them to share information, communicate, and collaborate efficiently within a controlled environment
Service Password Encryption
- The command encrypts all configured passwords in the configuration file
- Prevents passwords from appearing in plain text
Password Protection
- Passwords can restrict access to parts of the Cisco IOS
- Secure the Console interface for direct, local access.
- Secure the Privileged EXEC mode to prevent unauthorized access to advanced commands.
- Secure the VTY interface for remote access via Telnet or SSH.
copy running-config startup-config
Command
- Replaces the startup configuration with the current configuration
- This saved configuration then loads automatically when the device restarts
Switch Virtual Interface (SVI)
- A Layer 2 switch includes an SVI to allow remote management of the device over the network.
User EXEC Mode Access
- Access obtained through the console port requires the password set under the
line console 0
command. - Privileged EXEC mode access is granted by the
enable
andenable secret
passwords.
SSH vs. Telnet
- SSH encrypts messages and uses user authentication for secure remote sessions.
- Telnet sends messages in plaintext and is considered insecure.
- SSH is the suggested protocol for network access due to its security features.
Discarding Router Configuration Changes
- The
reload
command discards unsaved changes in the current router configuration file. - The command allows working with the file in NVRAM.
service password-encryption
Command
- Encrypts all plain-text passwords (console, VTY, auxiliary) in the configuration file
- Makes the passwords appear as encrypted characters
Subnet Mask Definition
- It determines which part of an IPv4 address refers to the network, and which part refers to the host.
- Essential for routing and proper communication.
Layer 2 Switch IP Address
- Required only for remote management using tools like Telnet or SSH
- Not needed for forwarding packets.
Loopback Test Information
- Tests if a device can communicate with itself using its own network software
- Does not check the network, cables, or connections to other devices
Remote Routes
- Specify a next hop address to reach a destination network not directly connected to the router
- Typically come from other routers
NAT in IPv6
- Not needed because IPv6 provides enough public IP addresses for every device
- IPv6 eliminates the need to conserve address space
Default Gateway Address for a Switch
- Used to forward packets originating from a switch to remote networks
- Routes packets to the relevant network or device when the switch cannot send a packet locally.
Probable Cause of Network Access Issues
- An invalid default gateway address prevents a computer from accessing devices on other networks
- The default gateway is needed for routing packets to remote networks.
transport input ssh
Command
- When entered on the switch VTY lines, communication becomes encrypted between the switch and remote users
Secure Access to a Router via Console Interface
- Use the
line console 0
command to enter console line configuration mode - Set a password with the
password cisco
command - Apply the
login
command to require password authentication.
IPv4 Multicast Address Range
- Reserved Class D address range between
224.0.0.0
to239.255.255.255
Broadcast Address of Network 172.16.16.0/22
- Network portion consists of 22 bits, and the host portion consists of 10 bits.
- The subnet mask is thus
255.255.252.0
. - Valid host addresses range between
172.16.16.1
and172.16.19.254
. - The broadcast address is
172.16.19.255
.
Unroutable IP Address
- The IP address
192.168.25.10
is an IPv4 private address - Because it is private, it will not be routed over the Internet
IPv6 Link-Local Address
- Used for communication within the same network segment.
- Denoted by the prefix
FE80::/10
. - Distinct from global unicast, multicast, and loopback addresses.
IPv6 Address Compression
- The longest consecutive group of zero segments can be replaced with a double colon
::
(only once in an address) - Leading zeros in each segment can be eliminated
IPv6 Multicast Packet Target
- Destination address of
FF02::1
targets all IPv6-enabled devices on the local link.
IPv6 Prefix Determination
- Determined by the first 64 bits of an address
- For the address
2001:DB8:BC15:A:12AB::1/64
, the prefix is2001:DB8:BC15:A
EUI-64 Process
- Uses the MAC address to make an IPv6 interface ID
IPv6 Anycast Address
- A unicast address assigned to multiple hosts.
- Data is sent to the closest host based on routing, unlike multicast which sends data to multiple devices.
ICMP Messages
- Used to provide feedback on the status of IP packet transmissions
- Helps in reporting errors and to check connectivity between devices
192.168.1.64/26
Subnet
- Has usable host addresses from
192.168.1.65
to192.168.1.126
192.168.1.96
falls within this range and is a valid host address
Windows PC APIP Indication
- Indicates the PC is unable to reach a DHCP server
- PC automatically assigns itself a link-local address
Determining Router Interface for Remote Networks
- The
show ip route
command displays the IP routing table of the router - Shows known local and remote networks and the interfaces the router uses to reach them.
Using the tracert
Utility
- Used to identify the path a packet takes from source to destination.
- Determines where packets are dropped or delayed for troubleshooting.
SSH Configuration on a Router
- Configure the correct IP domain name
- Create a valid local username and password database
- Generate the asymmetric RSA keys
Port Security Violation
- Happens when a port enters the err-disabled state as when an unauthorized device with a different MAC address attempts to connect
- Protects the network from potential security threats
EtherChannel Technology
- Provides increased bandwidth by bundling existing FastEthernet or Gigabit Ethernet interfaces into a single channel
- Provides redundancy in case one or more links in the channel fail
EtherChannel Mode
- "On" mode bundles the links unconditionally.
- No negotiation protocol is used in this mode
Enable Sticky MAC Addressing
- Enables the switch to automatically add a printer's MAC address allowing it to communicate with other devices
Port Security Violation Mode Configuration
- Setting the port security violation mode to
shutdown
causes the port to enter an err-disable state
option D
Correct Response Explanation
- Creates a backup route with a higher administrative distance
- Creates a lower chance of selecting the backup route.
Ethernet Switch Unused Ports
- Can be configured via admin shutdown to improve the security of a network
IPv6 Static Address Assignment
- To connect two ends and set and IPv6 address to the interface.
Trunking Protocol
- IEEE 802.1q is the industrial standard used for configuration of trunking on both sides of third party devices
Route Advertisement Prevention
- Router cannot have the same broadcast IP listed and as a result it drops the command and prevents route advertisement.
Static Route Recommendation
- Should involve a lower amount of hops
Default Route Advertisement Recommendation
- Requires advertising by 0.0.0.0
Network Operation
- Without access to the internet requires a private address
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.