The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Networking is a complex yet understandable concept of Computer Science and Networking Hardware Review 3 queries on the different protocols within the study not to mention the critical thinking comprehensions. All the best and enjoy.
Questions and Answers
1.
You have configured NAT on your router to connect your small company network to the Internet. Shown below is a partial configuration for the router:hostname RouterA!ip address 192.168.11.1 255.255.255.0speed autoduplex autoip nat inside!interface FastEthernet0/1ip address 192.168.12.1 255.255.0speed autoduplex autoip nat inside!interface Serial0/1/0ip address 116.12.11.155 255.255.255.248ip nat outside!ip nat pool ovrloadd 116.12.11.151 116.12.11.156 netmask 255.255.255.248!ip nat inside source list 7 pool overloadd!Following the configuration, you must find that no hosts on Fa0/0 or Fa0/1 can connect to the Internet. What should you do so that hosts can connect to the Internet?
A.
Add the overload parameter to the ip nat inside source list name.
B.
Add an ip access-group entry for Fa0/0 and Fa0/1.
C.
Use ip nat outside for Fa0/0 and Fa0/1; use ip nat inside for S0/1/0.
D.
Create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24
E.
Change the subnet mask for both Fa0/0 and Fa0/1 to 255.255.255.248
Correct Answer
D. Create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24
Explanation The correct answer is to create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24. By creating this access list, the router will allow traffic from these networks to be translated and forwarded to the Internet using NAT. Without the access list, the router will not know which traffic should be translated and forwarded, resulting in the hosts being unable to connect to the Internet.
Rate this question:
2.
While working at the console of a Cisco device, you need to view a list of commands that are available in the current mode.Which command should you use?
A.
Terminal editing
B.
?
C.
Terminal history
D.
Show history
Correct Answer
B. ?
Explanation To view a list of commands available in the current mode while working at the console of a Cisco device, you should use the "show history" command. This command will display a list of previously entered commands, allowing you to see what commands are available in the current mode.
Rate this question:
3.
You've just enabled port security on an interface of a Catalyst 2950 switch. You want to generate an SNMP trap whenever a violation occurs. Which feature should you enable?
A.
Shutdown
B.
Secure
C.
Protect
D.
Restrict
Correct Answer
D. Restrict
Explanation To generate an SNMP trap whenever a violation occurs after enabling port security on a Catalyst 2950 switch, the feature that should be enabled is "restrict." This feature restricts the number of MAC addresses allowed on the interface and generates an SNMP trap when a violation, such as exceeding the allowed number of MAC addresses, occurs.
Rate this question:
4.
You want to implement an Ethernet network using the 100Base-FX standard using the minimum hardware specifications possible. You need to support distances of up to 1,000 meters.Which of the following should you include in your plan? (Select two.)
A.
Cat5 twitsted pair cable
B.
Cat5e twisted pair cable
C.
SC connectors
D.
RJ-45 connectors
E.
Multi-mode fiber optic cable
F.
Cat4 twisted pair cable
G.
Single-mode fiber optic cable
Correct Answer(s)
C. SC connectors G. Single-mode fiber optic cable
Explanation To implement an Ethernet network using the 100Base-FX standard and support distances of up to 1,000 meters, you should include SC connectors and single-mode fiber optic cable in your plan. SC connectors are commonly used with fiber optic cables and provide a secure and reliable connection. Single-mode fiber optic cable is designed for long-distance transmissions and can support the required distance of 1,000 meters. This combination of SC connectors and single-mode fiber optic cable will ensure optimal performance and connectivity for your Ethernet network.
Rate this question:
5.
Which of the following measures can you take to increase the security of remote connections to your router?
A.
Keep the router in a locket room.
B.
Set a password and use the login command for line con 0.
C.
Use the service password-encryption command.
D.
Configure the enable secret password.
E.
Configure SSH.
Correct Answer
A. Keep the router in a locket room.
6.
What problem does the Spanning Tree Protocol prevent?
A.
It prevents message loops from developing when a switch or bridge is connected to the same location more than once.
B.
It doesn't prevent any problem. Instead, it creates and overall routing table (a span tree) for the entire network.
C.
It prevents buffer overflows by defining source quench messages that a receiving device sends to the transmitting device.
D.
It prevents route tables from becoming outdated by decreasing the convergence time on a network.
Correct Answer
A. It prevents message loops from developing when a switch or bridge is connected to the same location more than once.
Explanation The Spanning Tree Protocol prevents message loops from developing when a switch or bridge is connected to the same location more than once. By using the protocol, redundant paths in the network are identified and blocked, ensuring that there is only one active path between any two network devices. This prevents the occurrence of loops, which can cause network congestion, broadcast storms, and inefficient packet forwarding.
Rate this question:
7.
A Cisco router boots but cannot locate the startup-config file. Assuming the default configuration what will the router do next?
A.
Enter setup mode
B.
Stop with a configuration file load error
C.
Prompt you for the location of a valid configuration file
D.
Enter ROM monitor mode
Correct Answer
A. Enter setup mode
Explanation When a Cisco router boots up but cannot locate the startup-config file, it will enter setup mode. In this mode, the router will prompt the user to configure basic settings such as hostname, IP addresses, and passwords. This allows the user to manually set up the router's configuration from scratch or restore a backup configuration file if available.
Rate this question:
8.
You are deploying a new 10GB Ethernet network using Cat6 cabling.Which of the following are true concerning this media? (Select two.)
A.
It includes a solid plastic core.
B.
It supports 10 Mbps Ethernet connections.
C.
It is uses twisted 18- or 16- gauge copper wiring.
D.
It is completely immune to EMI.
E.
It supports multi-mode transmission.
Correct Answer(s)
A. It includes a solid plastic core. B. It supports 10 Mbps Ethernet connections.
Explanation Cat6 cabling includes a solid plastic core, which provides structural support and helps maintain the shape of the cable. It also supports 10 Mbps Ethernet connections, which means it is capable of transmitting data at speeds of up to 10 megabits per second.
Rate this question:
9.
A workstation has been assigned the following IP addressing information:* IP address: 192.168.1.26* Subnet mask: 255.255.255.0* Default gateway: 192.168.1.254* DNS server: 192.168.1.1Given this information, what is the IP address of the network where this host resides?
A.
192.0.0.0
B.
192.168.1.0
C.
192.168.1.255
D.
192.168.0.0
Correct Answer
A. 192.0.0.0
Explanation The correct answer is 192.168.1.0. This is because the IP address of the network where the host resides is obtained by performing a logical AND operation between the IP address and the subnet mask. In this case, 192.168.1.26 AND 255.255.255.0 results in 192.168.1.0, which is the network address.
Rate this question:
10.
Which of the following is true of the systom ROM on a Cisco device?
A.
It holds a limited version of the IOS software to be used if the full IOS image can't be found.
B.
It provides a long-term storage location for saving alternate configuration files and IOS images.
C.
It holds the startup-config file that is copied into memory when the device boots.
D.
It holds the current configuration used by the device as it runs.
Correct Answer
A. It holds a limited version of the IOS software to be used if the full IOS image can't be found.
Explanation The system ROM on a Cisco device holds a limited version of the IOS software to be used if the full IOS image cannot be found. This means that if the device is unable to find the full IOS image during startup, it can still boot up using the limited version stored in the system ROM. This provides a fail-safe mechanism to ensure that the device can still function even if the full IOS image is not available.
Rate this question:
11.
Which of the following IPv6 addressses is equivalent to the IPv4 loopback address of 127.0.0.1?
A.
::1
B.
FE80::1
C.
::
D.
FF02::1
Correct Answer
A. ::1
Explanation The IPv6 address "::1" is equivalent to the IPv4 loopback address of 127.0.0.1. In IPv6, the "::1" address is reserved for the loopback interface, just like 127.0.0.1 is in IPv4. Both addresses are used to test network connectivity on a local machine without involving any external network devices.
Rate this question:
12.
Which IPv6 address type is only valid within a subnet?
A.
Link-local
B.
Global unicast
C.
Unique local
D.
Site-local
E.
Multicast
Correct Answer
A. Link-local
Explanation The link-local IPv6 address type is only valid within a subnet. These addresses are automatically assigned to interfaces on a network without the need for any external configuration or intervention. Link-local addresses are used for communication within a single subnet and are not routable outside of that subnet. They are primarily used for neighbor discovery and automatic address configuration within a local network.
Rate this question:
13.
You have a small network connected to the Internet as shown in the exhibit.Both Srv1 and Srv2 need to be contacted by Internet hosts. Which of the folllowing tasks are required parts of the solution? (Select two.)
A.
Define S0/1/0 as an inside NAT interface.
B.
Define Fa0/0 and Fa0/1 as inside NAT interfaces.
C.
Configure a static NAT mapping for Srv1 and Srv2
D.
Define Fa0/0 as an inside NAT interface.
E.
Configure a static NAT mapping for Srv1.
Correct Answer
A. Define S0/1/0 as an inside NAT interface.
Explanation The correct answer is to define S0/1/0 as an inside NAT interface. This is necessary because S0/1/0 is the interface that connects the small network to the Internet. By defining it as an inside NAT interface, it allows for the translation of private IP addresses used in the small network to public IP addresses that can be recognized by hosts on the Internet. This ensures that Srv1 and Srv2 can be contacted by Internet hosts.
Rate this question:
14.
You have configured access lists on your router. A partial configuration for the router is shown below:hostname RouterA!interface FastEthernet0/0ip address 192.168.1.1 255.255.255.0speed autoduplex auto!interface FastEthernet0/1ip address 192.168.2.1 255.255.255.0speed autoduplex auto!interface Serial0/1/0ip address 192.168.3.1 255.255.255.248encapsulationn pppip access-group 7 in!access-list 7 deny 192.168.1.55 0.0.0.0access-list 7 permit ip any any!You want to block any traffic received on S0/1/0 that is sent to the host with address 192.168.1.55. However, you find that traffic sent to this host through that interface is still being allowed.What should you do?
A.
Apply access list 7 on S0/1/0 as an outbound access list instead of an inbout list.
B.
Use an extended access list instead of a standard access list.
C.
Change the mask used in the access list statements to 255.255.255.255.
D.
Apply access list 7 to the Fa0/0 and Fa0/1 interfaces instead of the S0/1/0 inteface. Use the out parameter.
Correct Answer
B. Use an extended access list instead of a standard access list.
15.
While working at the console of a Cisco devvice, you need use the same command repeatedly.Given that the command is quite long, what can you do to avoid having to retype it over and over?
A.
Enter terminal no history at the command prompt.
B.
Press the Ins key.
C.
Press the Up-arrow key.
D.
Enter terminal editing at the command prompt.
E.
Enter show history at the command prompt.
Correct Answer
C. Press the Up-arrow key.
Explanation Pressing the Up-arrow key allows you to access the command history on the Cisco device's console. This means that you can scroll through and reuse previously entered commands without having to retype them. This saves time and effort, especially when dealing with long and complex commands.
Rate this question:
16.
You use the show ip route command on your router and see the information shown below:Gateway of last resort is not set172.16.0.0/28 is subnetted, 4 subnetsC 172.16.0.0 is directly connected, FastEthernet0/0C 172.16.0.32 is directly connected, FastEthernet0/1R 172.16.0.96 [120/1] via 172.16.0.1, 00:00:25, FastEthernet0/0R 172.16.0.128 [120/1] via 172.16.0.33, 00:00:25, FastEthernet0/1The router receives a packet addressed to 172.16.0.19 and one addressed to 172.16.0.109. What will the router do with each packet? (Select two.)
A.
Forward the packet addressed to 172.16.0.19 to router 172.16.0.33
B.
Forward the packet addressed to 172.16.0.109 to router 172.16.0.1
C.
Drop the packet addressed to 172.16.0.109
D.
Forward the packet addressed to 172.16.0.19 to router 172.16.0.1
E.
Drop the packet addressed to 172.16.0.19
F.
Forward the packet addressed to 172.16.0.109 to router 172.16.0.33
Correct Answer(s)
B. Forward the packet addressed to 172.16.0.109 to router 172.16.0.1 E. Drop the packet addressed to 172.16.0.19
Explanation The router will forward the packet addressed to 172.16.0.109 to router 172.16.0.1 because there is a routing entry for this destination with a next hop of 172.16.0.1. However, the router will drop the packet addressed to 172.16.0.19 because there is no specific routing entry for this destination.
Rate this question:
17.
You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BastTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite.Which connectivity device would be the best choice in this situation?
A.
Router
B.
Bridge
C.
Switch
D.
Gateway
E.
Hub
F.
Repeater
Correct Answer
A. Router
Explanation A router would be the best choice in this situation because it can connect networks using different protocols, such as the Ethernet network and the token ring network. It can also route traffic between the networks based on IP addresses, allowing for efficient communication between the two networks.
Rate this question:
18.
How does TCP handle data sequencing?
A.
TCP does not sequence the data; it simply passes numbered segments created at a higher layer in the sequence defined.
B.
TCP breaks user data into segments, numbers each segment, places them into the correct segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.
C.
TCP breaks user data into segments, numbers each segment, and sends each segment in order, without waiting for an acknowledgement.
D.
TCP breaks the data into segments, numbers each segment, and passes them to UDP, which sequences the segments into the correct oder.
Correct Answer
B. TCP breaks user data into segments, numbers each segment, places them into the correct segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.
Explanation TCP handles data sequencing by breaking user data into segments, numbering each segment, placing them into the correct sequence, and sending each one in order. It waits for an acknowledgement before sending the next segment. This ensures that the data is sent and received in the correct order, preventing any data loss or corruption.
Rate this question:
19.
What is the correct binary form of the decimal IP address 192.168.1.1?
A.
11000000.10101000.00000010.00000001
B.
00001010.10101000.00000001.00000001
C.
10101100.00010001.00000001.00000001
D.
11000000.10101000.00000001.00000001
Correct Answer
D. 11000000.10101000.00000001.00000001
Explanation The correct binary form of the decimal IP address 192.168.1.1 is 11000000.10101000.00000001.00000001.
Rate this question:
20.
You have an office network connected to the Internet as shown in the Exhibit. The network has three subnets, all with client computers.The Web1 server on Subnet1 hosts a small website used for treveling employees. Employees must be able to contact the Web server from the Internet. All other hosts on the private network need to have full Internet connectivity for browsing the Web and sending e-mail.On which routers should you configure NAT?
A.
RouterA, RouterB, and RouterC
B.
RouterA and RouterC
C.
RouterB
D.
RouterA
E.
RouterC
Correct Answer
E. RouterC
21.
You would like to use crypto key command to generate a key pair for use with SSH. Which parameters must be set prior to running this command? (Select two.)
A.
Aaa new-model
B.
Username
C.
Hostname
D.
Transport input ssh
E.
Ip domain-name
Correct Answer(s)
C. Hostname E. Ip domain-name
Explanation Prior to running the crypto key command to generate a key pair for use with SSH, the parameters that must be set are the hostname and the IP domain-name. The hostname parameter is required to identify the device, while the IP domain-name parameter is necessary for generating the SSH key pair.
Rate this question:
22.
At which layer of the OSI model do network switches operate?
A.
Network
B.
Data Link
C.
Transport
D.
Physical
Correct Answer
B. Data Link
Explanation Network switches operate at the Data Link layer of the OSI model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Network switches use MAC addresses to forward data packets within a local area network (LAN). They examine the data link layer header of incoming packets and make decisions on where to forward them based on the destination MAC address. Therefore, the correct answer is Data Link.
Rate this question:
23.
You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups, Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department.Which segmentation device meets the needs while providing the most economical and simplest administration?
A.
Bridge
B.
Switch
C.
Hub
D.
Router
E.
Gateway
Correct Answer
D. Router
Explanation A router is the best segmentation device for Company AGH because it can separate the three workgroups into different network segments, allowing for localized traffic within each group and controlling the traffic that crosses between them. Routers also provide security features such as firewall capabilities, which would address the company's concern about the security of information within the Accounting department. Additionally, routers offer more advanced administration options compared to other devices like bridges, switches, hubs, or gateways.
Rate this question:
24.
Consider the following IPv6 addresss:FE80:0000:0000:0055:0000:0000:000A:AB00Which of the following are valid shortened forms of this address? (Select two.)
A.
FE80::0055::000A:AB
B.
FE80:0000:0000:0055:000A:AB00
C.
FE80::55:0000:A:AB00
D.
FE80::55::A:AB
E.
FE80::55::A:AB00
Correct Answer(s)
B. FE80:0000:0000:0055:000A:AB00 C. FE80::55:0000:A:AB00
Explanation The given IPv6 address can be shortened by omitting leading zeros in each 16-bit block. Therefore, the valid shortened forms of the address are "FE80::55:0000:A:AB00" and "FE80::55::A:AB00".
Rate this question:
25.
Your network has been assigned 200.55.6.0 as the network address. You have determined that you need four subnets.Which subnet mask should you use to provide four subnets?
A.
255.255.255.128
B.
255.255.255.192
C.
255.255.255.224
D.
255.255.255.240
E.
255.255.255.248
F.
255.255.255.252
Correct Answer
B. 255.255.255.192
Explanation To provide four subnets, the subnet mask should have enough bits to accommodate the number of subnets required. In this case, four subnets are needed, which can be represented by 2 bits (2^2 = 4). The subnet mask 255.255.255.192 has 26 bits turned on, which allows for 64 possible subnets (2^6 = 64). Therefore, it is the appropriate subnet mask to provide four subnets.
Rate this question:
26.
Which of the following statements about access lists are true? (Select two.)
A.
Inbound access lists are applied before the routing process.
B.
Use a standard access list to filter on source or destination IP address.
C.
An access list without a permit traffic will not allow any traffic.
D.
You can have a maximum of two standard and two extended access lists applied to each interface.
Correct Answer(s)
A. Inbound access lists are applied before the routing process. C. An access list without a permit traffic will not allow any traffic.
Explanation Inbound access lists are applied before the routing process. This means that when a packet arrives at a router, the inbound access list is checked first to determine if the packet should be allowed or denied before the routing process is initiated.
An access list without a permit traffic will not allow any traffic. This means that if an access list does not have any permit statements, it will deny all traffic by default.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.