Podcast
Questions and Answers
Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?
Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?
- forward the packet out GigabitEthernet0/0
- forward the packet out GigabitEthernet0/1
- forward the packet out Serial0/0/0 (correct)
- drop the packet
Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
- ip route 10.10.0.0 255.255.0.0 209.165.200.225 50 (correct)
- ip route 10.10.0.0 255.255.0.0 209.165.200.226 100
- ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100
- ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?
Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?
- Change the exit interface to S0/0/1.
- Change the destination network and mask to 0.0.0.0 0.0.0.0 (correct)
- Add an administrative distance of 254.
- Add the next-hop neighbor address of 209.165.200.226.
Which option shows a correctly configured IPv4 default static route?
Which option shows a correctly configured IPv4 default static route?
Refer to the exhibit. Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?
Refer to the exhibit. Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?
What is a method to launch a VLAN hopping attack?
What is a method to launch a VLAN hopping attack?
A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?
A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?
Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?
Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?
Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Hostl. Which entry should be seen in the ARP table on Hostl in order to gain connectivity to the Internet?
Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Hostl. Which entry should be seen in the ARP table on Hostl in order to gain connectivity to the Internet?
Match the forwarding characteristic to its type. (Not all options are used.)
Match the forwarding characteristic to its type. (Not all options are used.)
Flashcards
Default Route
Default Route
Route ::/0 directs packets to any destination not specified in the routing table.
Floating Static Route
Floating Static Route
A static route with higher administrative distance to provide a backup option.
Static Route for Internet Access
Static Route for Internet Access
Changing dest. network to 0.0.0.0 allows all outbound traffic.
BPDU Guard
BPDU Guard
Prevents loop formation by disabling ports receiving BPDUs.
Signup and view all the flashcards
DHCP Snooping
DHCP Snooping
Protects network by filtering untrusted DHCP messages.
Signup and view all the flashcards
Inter-VLAN Routing
Inter-VLAN Routing
Allows communication between different VLANs through a router.
Signup and view all the flashcards
WLAN Controller
WLAN Controller
Centralizes management and configuration of wireless networks.
Signup and view all the flashcards
IEEE 802.1Q
IEEE 802.1Q
Standard for VLAN tagging in Ethernet frames.
Signup and view all the flashcards
MAC Address Table
MAC Address Table
Stores MAC addresses and port mappings in a switch.
Signup and view all the flashcards
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Prevents loops in network topologies by blocking redundant paths.
Signup and view all the flashcards
Access List
Access List
Set of rules that permit or deny packets to enter or leave a network.
Signup and view all the flashcards
EtherChannel
EtherChannel
Combines multiple physical Ethernet links into a single logical link.
Signup and view all the flashcards
ARP Spoofing
ARP Spoofing
An attack that sends forged ARP messages to associate the attacker's MAC with an IP.
Signup and view all the flashcards
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP)
Protocol that assigns IP addresses dynamically to devices on a network.
Signup and view all the flashcards
Access Port
Access Port
Port configured to connect end devices to a switch.
Signup and view all the flashcards
Trunk Port
Trunk Port
Port that carries multiple VLANs between switches.
Signup and view all the flashcards
Link Layer Discovery Protocol (LLDP)
Link Layer Discovery Protocol (LLDP)
Used by network devices to advertise their identity and capabilities.
Signup and view all the flashcards
Certification Authority
Certification Authority
Entity that issues digital certificates for security protocols.
Signup and view all the flashcards
VLAN Hopping
VLAN Hopping
An attack that allows a malicious user to gain access to a VLAN they should not be in.
Signup and view all the flashcards
Rogue DHCP Server
Rogue DHCP Server
Unauthorized DHCP server that provides incorrect IP configurations.
Signup and view all the flashcards
Quality of Service (QoS)
Quality of Service (QoS)
Technology to manage bandwidth applications and prioritize network traffic.
Signup and view all the flashcards
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Protocol to manage VLAN configurations across multiple switches.
Signup and view all the flashcards
Port Security
Port Security
Configures limits on the number of MAC addresses that can be learned on a port.
Signup and view all the flashcards
RADIUS
RADIUS
A protocol for AAA (Authentication, Authorization, and Accounting).
Signup and view all the flashcards
Stateless DHCP
Stateless DHCP
DHCP where the server does not keep track of IP address assignments.
Signup and view all the flashcards
ICMPv6 Neighbor Solicitation
ICMPv6 Neighbor Solicitation
Used by hosts to verify that an IPv6 address is unique on the local network.
Signup and view all the flashcards
Device Profile
Device Profile
Configuration that gives specifications for managing a device on the network.
Signup and view all the flashcards
L3 Switch
L3 Switch
Switch that operates at Layer 3, enabling IP routing capabilities.
Signup and view all the flashcards
IPv6 Link-Local Address
IPv6 Link-Local Address
An address used for local communications within a network segment.
Signup and view all the flashcardsStudy Notes
Router Packet Forwarding
- Router R1 will forward a packet with a destination IPv6 address of 2001:db8:cafe:5::1 out GigabitEthernet0/0 if a route for that address is found in its routing table.
- If no specific route is found, the default route is used.
Floating Static Route
- A floating static route has an administrative distance greater than the active route in the routing table to act as a backup.
- The administrative distance of the active EIGRP route to the 10.10.0.0/16 network is 90.
- The floating static route needs to have a higher administrative distance than the active route to be activated when there is a link failure.
- The next hop address should also match the corresponding serial interface IP address of the backup device.
Incorrect Static Route
- A static route configured with the wrong destination network and mask will prevent users on the 172.16.0.0/16 network from accessing the internet.
- The correct destination mask should be 0.0.0.0 when making a default static route for the LAN to internet connectivity.
IPv4 Default Static Route
- The correct IPv4 default static route format is: ip route 0.0.0.0 0.0.0.0
. - Using the correct exit interface is vital for the route to be functional.
Static Route for Forwarding Traffic to a LAN
- A static route command will be issued on R1 to redirect traffic to the LAN connected to R2.
- The destination network and its mask need to be defined.
IPv6 Static Route Command
- The ipv6 route command is used for configuring IPv6 static routes.
- The appropriate format should be provided to correctly define the route.
VLAN Hopping Attack
- A method to launch a VLAN hopping attack involves introducing a rogue switch and enabling trunking.
- Sending spoofed native VLAN information or flooding the switch with MAC addresses are also methods to launch a VLAN hopping attack.
DHCPv6 Server Configuration
- A router configured as a DHCPv6 server that doesn't have any active clients will show a client count of 0.
- This is because the clients will configure their IPv6 addresses by using the link-local address of the router interface as the default gateway.
HSRP Group Configuration
- In HSRP group 1 configuration, users on Host1 will experience connectivity issues to the Internet after reloading routers R1 and R2.
- The ARP table on Host1 will contain an entry for the virtual IP address of HSRP group 1 and the MAC address of the router that is currently active in the group.
Frame Forwarding Decisions
- Layer 2 switches make frame forwarding decisions based on MAC addresses and port mappings in the content addressable memory (CAM) table.
- Frames with broadcast destinations are forwarded to all active ports.
VLANs and Interconnected Switches
- Interconnected Cisco LAN switches form a single broadcast domain.
- Each switch port represents a separate collision domain.
Link State and Protocol Status
- A link can be up/up, down/down, administratively down or disabled.
- Protocol status is determined by the state of the related interface.
MAC Address Table on Empty Switch
- If the MAC address table is empty, the switch will flood the frame to all ports, except the originating port, in order to reach the destination device.
VLANs Not Removed
- Default VLANs (VLANs 1-1005 or similar standard ranges) are stored in a file (e.g., vlan.dat) on the switch's flash memory.
- Deleting VLANs requires deleting the file and reloading the switch.
Removing VLANs from a Cisco Switch
- Default VLANs(VLAN 1-1000) cannot be removed by simply removing the configuration.
- They need to be manually deleted.
Secure Remote Access Configuration
- Configuration options for remote network device access include enabling 802.1X, SSH and ACLs in VTY lines.
- For remote access, using SSH is the most secure.
Wireless Encryption Methods
- WPA2 with AES is considered the most secure wireless encryption method.
Accessing Internet with Static Route
- An incorrect static route (e.g,, incorrect destination network and mask) can prevent access to the internet.
- The correct destination network and mask are needed to reach resources on the internet.
Static Route to Forward Traffic
- Static routes are manually configured network routes that are used to direct traffic between networks. A static route to a LAN connected to R2 would need to include the IP address of that network.
Static vs Dynamic Routes
- Static routes are manually configured routes and are less susceptible to network topology changes.
- Dynamic routes adapt to changes in the network topology automatically.
Router Security via Static Routes
- Static routes can be used to improve network security by limiting network routes.
- They do not adapt to topology changes as compared to dynamic routes.
Layer 2 Switch Forwarding
- Switches forward frames based on the MAC address of the destination.
- If the destination MAC address is not in the CAM, the switch floods the frame to all ports except the incoming port.
- Specific configurations ensure correct traffic delivery across all ports.
Static Route to a Specific Network
- A static route with a specific destination network and next-hop address is used for directing traffic.
- If configured improperly, the traffic might not reach the target network.
Spanning-Tree Protocol (STP) Configuration
- STP is used to prevent loops in a switched network, which would prevent access to specific networks.
- On some switches the portfast configuration command directly disables STP and thus prevents loops on specific ports.
IPv6 Link-Local Address
- The IPv6 prefix for link-local addresses is FE80::/10.
Routed Ports on Multilayer Switches
- Routed ports connect to a router's interface.
- Typically found in core or distribution layers.
- Provide connectivity between different VLANs.
VLAN Configuration on Switches
- A VLAN configuration includes a VLAN ID and the ports allocated to that ID.
- Different VLANs are typically used for different devices or functions.
Removing VLANs
- If a switch has VLANs that should be deleted, remove them in a proper manner—the VLAN dat file needs to be manually removed from the flash memory. Any configuration files need to be updated in the configuration file so that the switch can then be reloaded with the updated configuration.
VTP Configuration
- VTP mode determines how VLANs are communicated across a network.
- Two modes allow for modification and deletion of VLANs on a local switch: master and client mode.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.