Networking Concepts Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the function of the default route ::/0 in a routing table?

  • It overrides all other routes in the table.
  • It is the route to the loopback interface.
  • It directs packets to a specific network segment.
  • It specifies the gateway of last resort for all unknown destinations. (correct)
  • In the event that the link between R1 and Branch2 goes down, what purpose does a floating static route serve?

  • It improves the speed of packet transmission across the network.
  • It ensures that all packets are dropped if the primary route is down.
  • It permanently removes the route from the routing table.
  • It acts as a backup route when the primary route fails. (correct)
  • Which command would you use to specify a static route that becomes active only when another route fails?

  • ip route 10.10.0.0 255.255.0.0 <next-hop> 254 (correct)
  • ip route 10.10.0.0 255.255.0.0 <next-hop> administrative-distance
  • ip route 10.10.0.0 255.255.0.0 <next-hop> 1
  • ip route 10.10.0.0 255.255.0.0 <next-hop> 10
  • What happens if an EIGRP route fails in relation to the routing table?

    <p>Backups routes like floating static routes may be activated. (C)</p> Signup and view all the answers

    Which of the following addresses represents the default route in its compressed form?

    <p>::/0 (C)</p> Signup and view all the answers

    What is the primary reason an attacker would launch a MAC address overflow attack?

    <p>So that the attacker can see frames that are destined for other hosts (A)</p> Signup and view all the answers

    When is authorization implemented during the AAA process?

    <p>Immediately after successful authentication against an AAA data source (D)</p> Signup and view all the answers

    Which port security configuration allows dynamically learned MAC addresses to be added to both the MAC address table and the running configuration?

    <p>Sticky secure MAC addresses (A)</p> Signup and view all the answers

    Which of the following is NOT a benefit of using sticky secure MAC addressing?

    <p>Only stores addresses in the address table (B)</p> Signup and view all the answers

    What is the result of a MAC address overflow attack on a switch?

    <p>The switch will begin to ignore new MAC addresses (D)</p> Signup and view all the answers

    Which AAA phase follows successful authentication?

    <p>Authorization (A)</p> Signup and view all the answers

    Which Wi-Fi standards operate in the 2.4GHz frequency range?

    <p>802.11b, 802.11g, 802.11n (D)</p> Signup and view all the answers

    What does dynamic secure MAC addressing do?

    <p>Learns MAC addresses dynamically without storing them in the configuration (B)</p> Signup and view all the answers

    Why is VLAN 99 missing in the given configuration?

    <p>Because VLAN 99 has not yet been created (A)</p> Signup and view all the answers

    Which two VTP modes allow for the creation, modification, and deletion of VLANs on the local switch?

    <p>Server (A), Master (B)</p> Signup and view all the answers

    Which step is NOT required when moving a Cisco switch to a new VTP management domain?

    <p>Change the switch's MAC address (D)</p> Signup and view all the answers

    What needs to be done before a switch can synchronize with a new VTP domain?

    <p>Configure the VTP version and password (C)</p> Signup and view all the answers

    In which VTP mode can a switch learn VLANs but cannot create or delete them?

    <p>Client (D)</p> Signup and view all the answers

    What is a key requirement for managing VLANs using VTP?

    <p>All switches must share the same VTP version (D)</p> Signup and view all the answers

    What action should be taken to allow a switch to manage VLANs in a VTP environment?

    <p>Configure it in server mode (C)</p> Signup and view all the answers

    What is the primary function of the VTP server mode?

    <p>To create and propagate VLAN information across the domain (D)</p> Signup and view all the answers

    Which static route command is considered a default static route that matches all destination networks?

    <p>ip route 0.0.0.0 0.0.0.0 S0/0/0 (B)</p> Signup and view all the answers

    What is a common method to launch a VLAN hopping attack?

    <p>Introducing a rogue switch and enabling trunking (A)</p> Signup and view all the answers

    Which command would be used to configure a static route for traffic to reach the LAN connected to R2 using an IPv6 address?

    <p>ipv6 route 2001:db8:12:10::/64 S0/0/1 fe80::2 (C)</p> Signup and view all the answers

    What does the macof tool primarily target during switch configuration evaluations?

    <p>MAC address table overflow (D)</p> Signup and view all the answers

    Which command would show the number of active clients in a DHCPv6 pool?

    <p>show ipv6 dhcp pool (C)</p> Signup and view all the answers

    What type of attack involves flooding a switch with a high number of MAC addresses?

    <p>MAC address table overflow (A)</p> Signup and view all the answers

    What is the primary effect of sending spoofed native VLAN information during an attack?

    <p>Gaining unauthorized access to VLANs (D)</p> Signup and view all the answers

    Which route command can be used to route all IPv4 traffic to a specific next-hop?

    <p>ip route 0.0.0.0 0.0.0.0 S0/0/0 (A)</p> Signup and view all the answers

    What is the valid command to configure a static route to the network 172.16.2.0 with a next-hop IP address of 172.16.3.1?

    <p>R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1 (B)</p> Signup and view all the answers

    Which protocol or technology is specifically designed to allow data to transmit over redundant switch links?

    <p>EtherChannel (B)</p> Signup and view all the answers

    Assuming port Fa0/4 on both switches is set up for multiple VLANs, which hosts will receive ARP requests from host A?

    <p>Host B, Host C, Host D (C)</p> Signup and view all the answers

    What action should be taken by the network administrator if Host C cannot ping Host D?

    <p>Associate hosts A and B with VLAN 10. (C)</p> Signup and view all the answers

    What is the effect of the shutdown command when configured on a switch port?

    <p>It disables an unused port. (A)</p> Signup and view all the answers

    What VLAN communication issue arises when hosts are configured incorrectly?

    <p>Hosts will not receive broadcasts sent by their own VLAN. (C)</p> Signup and view all the answers

    If a network administrator wants to prevent VLANs from dynamically negotiating trunking, what command should be used?

    <p>Use the switchport nonegotiate command. (B)</p> Signup and view all the answers

    What type of address is used in ARP requests?

    <p>Broadcast (C)</p> Signup and view all the answers

    Which command is used to configure an interface as a trunk port?

    <p>switchport mode trunk (D)</p> Signup and view all the answers

    What is the purpose of configuring 'ip routing' on a switch?

    <p>To allow routing between different subnets (C)</p> Signup and view all the answers

    What should be configured for time-sensitive traffic to improve WLAN performance?

    <p>Configure the 5 GHz band for streaming multimedia (D)</p> Signup and view all the answers

    Which security modes could be configured for different networks when using the split-the-traffic approach?

    <p>WPA Personal TKIP/AES for one and WPA2 Personal AES for the other (D)</p> Signup and view all the answers

    What needs to be checked if employees are unable to access the internet after switching ISPs?

    <p>Verify that the static route to the server is present (C)</p> Signup and view all the answers

    Which configuration change is necessary when a company switches to a new ISP?

    <p>Remove the old default route from edge routers (C)</p> Signup and view all the answers

    How does a switch populate its MAC address table?

    <p>By listening to the traffic on its connected interfaces (B)</p> Signup and view all the answers

    What is the effect of the command 'no switchport' on an interface?

    <p>The interface will function as a routed port with an IP address (A)</p> Signup and view all the answers

    Study Notes

    No specific text provided. Please provide the text or questions you would like me to create study notes for.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on various networking concepts including routing tables, AAA processes, and security configurations. This quiz covers critical topics such as default routes, MAC address attacks, and Wi-Fi standards. Ideal for students and professionals in network administration.

    More Like This

    Networking Concepts and Commands Quiz
    15 questions

    Networking Concepts and Commands Quiz

    SustainableAntigorite1088 avatar
    SustainableAntigorite1088
    Networking Concepts: Routing and Tables
    33 questions
    Routing Protocols Quiz - Networking Concepts
    47 questions
    Use Quizgecko on...
    Browser
    Browser