Computer Science > EXAM > Cisco: Routing and Switching Final Exam| 60 QUESTIONS| WITH COMPLETE VERIFIED SOLUTIONS (All)

Cisco: Routing and Switching Final Exam| 60 QUESTIONS| WITH COMPLETE VERIFIED SOLUTIONS

Document Content and Description Below

Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains t... he reason that the number of active clients is 0? IMAGE ATTACHED a. The default gateway address is not provided in the pool. b. No clients have communicated with the DHCPv6 server yet. c. The IPv6 DHCP pool configuration has no IPv6 address range specified. d. The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation. CORRECT ANSWERS: The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation. Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled? a. ip dhcp pool b. ip address dhcp* c. service dhcp d. ip helper-address CORRECT ANSWERS: ip address dhcp Which kind of message is sent by a DHCP client when its IP address lease has expired? CORRECT ANSWERS: a DHCPREQUEST unicast message Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4 address. What is the problem? IMAGE ATTACHED CORRECT ANSWERS: The ip helper-address command was applied on the wrong interface. A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home? CORRECT ANSWERS: ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443 ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 4365 What is a disadvantage of NAT? CORRECT ANSWERS: There is no end-to-end addressing. Which type of traffic would most likely have problems when passing through a NAT device? CORRECT ANSWERS: IPsec What benefit does NAT64 provide? CORRECT ANSWERS: It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses. Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.) IMAGE ATTACHED CORRECT ANSWERS: R1 Gi0/1.12 outbound Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.) CORRECT ANSWERS: ICMP message type destination UDP port number A network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used? CORRECT ANSWERS: in an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific network device Which three values or sets of values are included when creating an extended access control list entry? (Choose three.) CORRECT ANSWERS: access list number between 100 and 199 destination address and wildcard mask source address and wildcard mask A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry? CORRECT ANSWERS: 0.0.1.255 The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.) CORRECT ANSWERS: access-class 5 in access-list 5 permit 10.7.0.0 0.0.0.31 A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other? CORRECT ANSWERS: permit icmp any any nd-na Which statement describes a route that has been learned dynamically? CORRECT ANSWERS: It is automatically updated and maintained by routing protocols. Refer to the exhibit. How did the router obtain the last route that is shown? IMAGE ATTACHED CORRECT ANSWERS: Another router in the same organization provided the default route by using a dynamic routing protocol. Which statement is correct about IPv6 routing? CORRECT ANSWERS: IPv6 uses the link-local address of neighbors as the next-hop address for dynamic routes. Refer to the exhibit. Which type of route is 172.16.0.0/16? IMAGE ATTACHED CORRECT ANSWERS: level 1 parent route Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.) CORRECT ANSWERS: scalability speed of convergence Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit? IMAGE ATTACHED CORRECT ANSWERS: recursive static route A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network? CORRECT ANSWERS: ip route 172.16.32.0 255.255.224.0 S0/0/0 200 Which summary IPv6 static route statement can be configured to summarize only the routes to networks 2001:db8:cafe::/58 through 2001:db8:cafe:c0::/58? CORRECT ANSWERS: ipv6 route 2001:db8:cafe::/56 S0/0/0 Refer to the exhibit. If RIPng is enabled, how many hops away does R1 consider the 2001:0DB8:ACAD:1::/64 network to be? IMAGE ATTACHED CORRECT ANSWERS: 3 Which statement is true about the difference between OSPFv2 and OSPFv3? CORRECT ANSWERS: OSPFv3 routers do not need to have matching subnets to form neighbor adjacencies. What happens immediately after two OSPF routers have exchanged hello packets and have formed a neighbor adjacency? CORRECT ANSWERS: They exchange abbreviated lists of their LSDBs. What does the cost of an OSPF link indicate? CORRECT ANSWERS: A lower cost indicates a better path to the destination than a higher cost does. Which three pieces of information does a link-state routing protocol use initially as link-state information for locally connected links? (Choose three.) CORRECT ANSWERS: the link router interface IP address and subnet mask the type of network link the cost of that link Which three requirements are necessary for two OSPFv2 routers to form an adjacency? (Choose three.) CORRECT ANSWERS: The two routers must include the inter-router link network in an OSPFv2 network command. The OSPF hello or dead timers on each router must match. The link interface subnet masks must match. A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.) CORRECT ANSWERS: RouterA(config)# router ospf 1 RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0 What are two features of a link-state routing protocol? (Choose two.) CORRECT ANSWERS: Routers send triggered updates in response to a change. Routers create a topology of the network by using information from other routers. Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses? CORRECT ANSWERS: to determine which ports are not correctly configured to prevent MAC address flooding Two employees in the Sales department work different shifts with their laptop computers and share the same Ethernet port in the office. Which set of commands would allow only these two laptops to use the Ethernet port and create violation log entry without shutting down the port if a violation occurs? CORRECT ANSWERS: switchport mode access switchport port-security [Show More]

Last updated: 4 months ago

Preview 1 out of 8 pages

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
20
0

Document information


Connected school, study & course


About the document


Uploaded On

Dec 29, 2023

Number of pages

8

Written in

Seller


seller-icon
EXCELLENCE NURSING LIBRARY

Member since 7 months

0 Documents Sold


Additional information

This document has been written for:

Uploaded

Dec 29, 2023

Downloads

 0

Views

 20

More From EXCELLENCE NURSING LIBRARY

View all EXCELLENCE NURSING LIBRARY's documents »

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·