Cisco 2 Chapter 4 Exam Answers


  • The last five bits of a supplied IP address will be ignored. CCNA 2 V6. The type of data generated by end devices applications, the way signals are encoded by the NICs on end devices, and even the way the IP protocol forwards the packet through the...
    Link: https://brainly.in/question/36812377


  • What conclusion can be made based on the output of this command? VLAN 20 has not been created. This indicates the interface has probably not been configured as a trunk link. The no shutdown command has not been configured. The IP address on...
    Link: https://cambridge.org/core/books/postgraduate-orthopaedics/hip-oral-core-topics/35C05FA48D13F6E25A16A9EA2266DE66/core-reader
  • If the destination MAC address is not in the table, the switch forwards the frame out all ports except the inbound port that originated the frame. CCNA2 v6. SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.
    Link: http://semhg.org/wp-content/uploads/2014/07/NWB-Deductible-eff-7.1.15.pdf
  • SW1 drops the frame because it does not know the destination MAC address. Explanation: When a switch powers on, the MAC address table is empty. The switch forwards based on the destination MAC address found in the frame header. If a switch has no entries in the MAC address table or if the destination MAC address is not in the switch table, the switch will forward the frame out all ports except the port that brought the frame into the switch. A small publishing company has a network design such that when a broadcast is sent on the LAN, devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic? Replace the switches with switches that have more ports per switch. This will allow more devices on a particular switch. Replace at least half of the switches with hubs to reduce the size of the broadcast domain. Explanation: By dividing the one big network into two smaller network, the network administrator has created two smaller broadcast domains.
    Link: https://localexam.com/search/balotario-de-examenes-del-cnm
  • Match the DTP mode with its function. Not all options are used. CCNA 2 v7. An error message would be displayed. Refer to the exhibit. What, if anything, is wrong with the configuration? There is nothing wrong with the configuration. The mls qos trust cos command should reference VLAN The command used to assign the voice VLAN to the switch port is incorrect. Which four steps are needed to configure a voice VLAN on a switch port? Choose four. Configure the interface as an IEEE Assign the voice VLAN to the switch port. Ensure that voice traffic is trusted and tagged with a CoS priority value. Assign a data VLAN to the switch port.
    Link: http://jobshankar.com/swachh-jal-mission-guwahati-exam-postponed/
  • It can be prone to errors and does not scale well for large networks. Static routing uses fewer router resources, because no computing is required for updating routes. Static routing can also be more secure because it does not advertise over the network. Refer to the exhibit. Configure a static route from R1 to Edge and a dynamic route from Edge to R1. Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1. Configure a dynamic route from R1 to Edge and a static route from Edge to R1. Configure a dynamic routing protocol between R1 and Edge and advertise all routes. Two routes have to be created: a default route in R1 to reach Edge and a static route in Edge to reach R1 for the return traffic.
    Link: https://amazon.com/Lippincotts-Certification-Review-Emergency-Nursing/dp/1451171994
  • Moreover, static routing consumes less bandwidth than dynamic routing. What is the correct syntax of a floating static route? To be a floating static route, the configured route must have a higher administrative distance than the primary route. For example, if the primary route is learned through OSPF, then a floating static route that serves as a backup to the OSPF route must have an administrative distance greater than The administrative distance on a floating static route is put at the end of the static route: ip route What is a characteristic of a static route that matches all packets? It backs up a route already discovered by a dynamic routing protocol. It uses a single network address to send multiple static routes to one destination address.
    Link: http://rapidresult.in/mhu-karnal-non-teaching-admit-card/
  • A company has several networks with the following IP address requirements: IP phones — 50 PCs — 70 IP cameras — 10 wireless access points — 10 network printers — 10 network scanners — 2 Which block of addresses would be the minimum to accommodate all of these devices if each type of device was on its own network? That network could use IP addresses 0 through What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state? The static route is removed from the routing table. The router polls neighbors for a replacement route. The static route remains in the table because it was defined as static. The router automatically redirects the static route to use another interface.
    Link: https://mba.hitbullseye.com/MH-CET/About-MH-CET.php
  • When both are used, it is a fully specified static route. Refer to the graphic. A config ip route The network administrator needs to configure a default route on the Border router. Which command would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets? Border config ip route 0. What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? A fully specified static route contains both the IP address of the next-hop router and the ID of the exit interface. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet? Consider the following command: ip route Static routes have a default administrative distance of 1. This route that has an administrative distance of 5 will not be placed into the routing table unless the previously entered static route to the The administrative distance of 5 added to the end of the static route configuration creates a floating static route that will be placed in the routing table when the primary route to the same destination network goes down.
    Link: https://scholarworks.uark.edu/cgi/viewcontent.cgi?article=4677&context=etd
  • Because the IP address of A network administrator has entered a static route to an Ethernet LAN that is connected to an adjacent router. However, the route is not shown in the routing table. Which command would the administrator use to verify that the exit interface is up? The show ip route command has already been issued by the administrator. The show ip protocols command is used when a routing protocol is enabled. The tracert command is used from a Windows PC. Delete the default gateway route on the router. Ping any valid address on the Manually shut down the router interface used as a primary route.
    Link: https://science.umd.edu/classroom/bsci410-liu/BSCI410-S09/02Exam09KEY.pdf
  • The direction in which the traffic is examined in or out is also required. Consider the two permit UDP statements. The ACEs from most specific to least specific are as follows: permit udp Because it uses state information, the stateful firewall can analyze traffic at OSI Layers 4 and 5. A company is deploying a new network design in which the border router has three interfaces. Which type of traffic would receive the least amount of inspection have the most freedom of travel? The amount of inspection done to that traffic depends on its destination or whether traffic that is going to that private IP address originated the connection. The demilitarized zone typically holds servers. Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections?
    Link: https://weegy.com/?ConversationId=IGR07LGR

No comments:

Post a Comment

Gst Exam Questions And Answers Pdf

[FREE] Gst Exam Questions And Answers Pdf | free! How To Upload Past Questions Interestingly, members can now upload their past question pa...