1.
This are lists of conditions used to test network traffic that tries to travel across a router interface.
Correct Answer
B. Access Control List
Explanation
Access Control Lists (ACLs) are used to control and filter network traffic based on specified conditions. In the context of the given question, ACLs can be used to test network traffic attempting to pass through a router interface. ACLs can be configured to allow or deny traffic based on various criteria such as source/destination IP addresses, protocols, ports, etc. Therefore, ACLs are a suitable choice for testing network traffic attempting to traverse a router interface.
2.
When making changes, you must remove the access list, using the _______command
Correct Answer
A. No access – list [ list number]
Explanation
The correct answer is "no access – list [ list number]". This command is used to remove an access list from the configuration. By using the "no" keyword followed by "access-list" and the list number, the access list is deleted and the changes are implemented. The other options provided in the question do not represent valid commands in Cisco IOS.
3.
ACL unique identification number 600 falls under what protocol?
Correct Answer
A. Apple Talk
Explanation
The correct answer is Apple Talk because ACL unique identification number 600 is associated with Apple Talk protocol.
4.
A ______in a bit position of the access list mask indicates that the corresponding bit in the address must be checked;
Correct Answer
B. X
Explanation
A "X" in a bit position of the access list mask indicates that the corresponding bit in the address must be checked. This means that the access list is specifying a specific value for that bit position in order for the address to be allowed or denied.
5.
The ______option substitutes 0.0.0.0 for the mask. This mask requires that all bits of the ACL address and the packet address match. This option will match just one address.
Correct Answer
D. Host
Explanation
The "host" option substitutes 0.0.0.0 for the mask. This means that all bits of the ACL address and the packet address need to match in order for the option to be valid. This option will only match one specific address, rather than a range of addresses.
6.
The _______command links an existing standard ACL to an interface:
Correct Answer
C. Ip access-group
Explanation
The correct answer is "ip access-group". This command is used to link an existing standard ACL (Access Control List) to an interface. By applying the ACL to an interface, the specified access restrictions defined in the ACL will be enforced on the traffic passing through that interface.
7.
•An Access list number range of 100 – 199 and 2000 – 2699 is used with it.
Correct Answer
C. Extended ACL
Explanation
The given information states that an access list number range of 100-199 and 2000-2699 is used with it. This indicates that the access list being referred to is an extended access control list (ACL). Extended ACLs allow for more granular control over network traffic by filtering based on source and destination IP addresses, protocols, port numbers, and other criteria. Standard ACLs, on the other hand, only filter based on source IP address. Therefore, the correct answer is Extended ACL.
8.
________Masking for IP address bits uses the number 1 and the number 0 to identify how to treat the corresponding IP address bits.
Correct Answer
B. Wildcard
Explanation
The given correct answer is "Wildcard." In IP address masking, a wildcard is used to identify how to treat the corresponding IP address bits. The wildcard consists of 1s and 0s, where the 1s indicate the bits that should be matched exactly, and the 0s indicate the bits that can be ignored or treated as don't care. This allows for more flexible and granular control over network traffic and access control.
9.
If the byte of data to be sent is 10011010 what should be the data word that should be received using Hamming Code Detection?
Correct Answer
A. 011100101010
Explanation
The given byte of data, 10011010, should be received as 011100101010 using Hamming Code Detection.
10.
Which of the following bit will presume an Even Parity bit
Correct Answer
A. 010101100011
Explanation
The given bit sequence has an even number of 1s. In even parity, an additional bit is added to the sequence to make the total number of 1s even. This is done to detect errors in transmission. In this case, the sequence 010101100011 already has an even number of 1s, so it would presume an Even Parity bit.
11.
The_____option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This option will match any address that it is compared against.
Correct Answer
C. Any
Explanation
The "any" option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This means that it will match any address that it is compared against, making it a universal match.
12.
•Which of the following ACL command is used to display the access-lists configuration
Correct Answer
A. Show access-lists
Explanation
The correct answer is "Show access-lists". This command is used to display the configuration of access lists on a network device. By using this command, network administrators can view the access control entries (ACEs) and their associated parameters, such as source and destination IP addresses, protocols, and port numbers. This information is crucial for troubleshooting network connectivity issues and verifying the effectiveness of the access control policies in place.
13.
•A _____ in a bit position of the access list mask indicates the corresponding bit in the address is not “interesting” and can be ignored.
Correct Answer
D. One
Explanation
In an access list mask, a "one" in a bit position indicates that the corresponding bit in the address is not "interesting" and can be ignored. This means that the access list will not consider or match any addresses that have a "one" in that particular bit position.
14.
•It is an architectural structure that exists between the user and the outside world to protect the internal network from intruders
Correct Answer
C. Firewall
Explanation
A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders. It acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking unauthorized access attempts, a firewall helps to prevent malicious attacks and maintain the security and integrity of the internal network.
15.
Which of the following ACL command is used to display the configuration output, including access-lists and assignments
Correct Answer
C. Show running-config
Explanation
The correct answer is "Show running-config" because this command is used to display the complete configuration of a device, including access-lists and assignments. It shows the current running configuration of the device, which includes all the commands and settings that have been applied. This command is commonly used to troubleshoot and verify the configuration of a device.
16.
•Each port on Cisco Catalyst switches have status LED indicator lights and one of this is the RPS LED. RPS stands for?
Correct Answer
B. Redundant Power System
Explanation
The RPS LED on Cisco Catalyst switches stands for Redundant Power System. This LED indicates the status of the redundant power system, which provides backup power in case the primary power source fails.
17.
To remove a standard ACL which command is to be used?
Correct Answer
B. Router(config)#no access-list access-list-number
Explanation
The correct answer is "Router(config)#no access-list access-list-number." This command is used to remove a standard ACL from the router's configuration. By entering this command in the global configuration mode, followed by the specific access-list number, the router will remove the specified access-list from its configuration.
18.
Which of the following ACL command is used to display the access-lists interface assignments
Correct Answer
B. Show ip interface
Explanation
The correct answer is "Show ip interface". This command is used to display the access-lists interface assignments. It shows the access control lists (ACLs) that are applied to specific interfaces on a device. By using this command, network administrators can quickly view the ACLs that are configured on each interface, allowing them to verify the access control policies in place and troubleshoot any connectivity issues that may be related to ACL configurations.
19.
•Types of communication where it can send or receive data at a time
Correct Answer
A. Half Duplex
Explanation
Half Duplex communication refers to a type of communication where data can be sent or received, but not simultaneously. In this mode, communication can happen in both directions, but only one direction at a time. It is like a walkie-talkie where one person can speak while the other person listens, and then they switch roles. This is different from Full Duplex communication where data can be sent and received simultaneously, like in a telephone conversation. Therefore, the correct answer in this case is Half Duplex.
20.
CISCO IOS command to return to the privileged EXEC mode.
Correct Answer
A. End
Explanation
The "end" command is used to return to the privileged EXEC mode in Cisco IOS. When entered, this command allows the user to exit the current configuration mode and return to the privileged mode, where they have access to all the commands and features available to the administrator.
21.
•Types of communication where it can send and receive data simultaneously
Correct Answer
D. Full Duplex
Explanation
Full Duplex is the correct answer because it refers to a type of communication where data can be sent and received simultaneously. In Full Duplex communication, both parties can transmit and receive data at the same time, allowing for faster and more efficient communication. This is in contrast to Half Duplex communication, where data can only be sent or received at a time, and Serial and Parallel communication, which do not necessarily involve simultaneous sending and receiving of data.
22.
It is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.
Correct Answer
B. VLAN
Explanation
A VLAN (Virtual Local Area Network) is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire. VLANs provide a way to segment a network without physically separating the devices. By creating virtual networks, VLANs allow for better network management, improved security, and more efficient use of network resources.
23.
•CISCO IOS command to enter global configuration mode
Correct Answer
A. Configure terminal
Explanation
The correct answer is "configure terminal" because it is the CISCO IOS command used to enter global configuration mode. This mode allows the user to configure various settings and parameters for the device. The other commands mentioned in the question, such as "ip address" and "no shutdown," are used to configure specific settings within global configuration mode, but "configure terminal" is the initial command to access this mode.
24.
VLAN 0 is used for?
Correct Answer
D. System used only
Explanation
VLAN 0 is used for system used only. This means that VLAN 0 is reserved for internal use within the networking system and cannot be assigned to any specific network or device. It is typically used for administrative purposes or for special system functions that do not require communication with external networks or devices.
25.
CISCO IOS command to save the running config to start up config
Correct Answer
C. Copy run start
Explanation
The correct answer is "copy run start". This command is used in Cisco IOS to save the running configuration to the startup configuration. The "copy" command is used to copy files, and in this case, it is used to copy the running configuration (run) to the startup configuration (start). This ensures that any changes made to the running configuration are saved and will persist after a reboot.
26.
PoE stands for?
Correct Answer
D. Power over Ethernet
Explanation
Power over Ethernet (PoE) refers to a technology that allows the transmission of both power and data over an Ethernet cable. This eliminates the need for separate power cables, making it more convenient and cost-effective for devices such as IP cameras, wireless access points, and VoIP phones. Therefore, the correct answer is "Power over Ethernet."
27.
This VLAN number is the CISCO default.
Correct Answer
C. 1
28.
This feature is used to automatic detect cable type
Correct Answer
A. mdix auto
Explanation
The correct answer is "mdix auto" because this feature is used to automatically detect the type of cable being used. By setting it to "auto," the device will determine whether the cable is a straight-through or crossover cable and adjust accordingly. This ensures the proper communication between devices without the need for manual cable configuration.
29.
This VLAN number is the cisco Default for FDDI and Token Ring
Correct Answer
B. 1002 -1005
Explanation
The VLAN numbers 1002-1005 are the Cisco default VLANs for FDDI (Fiber Distributed Data Interface) and Token Ring. These VLANs are reserved for these specific network technologies and are used for management and control purposes. VLANs 2-1001 and 1006-4094 are user-defined VLANs, while VLANs 0 and 4095 are reserved VLANs with special meanings.
30.
•The following are VLAN parameter when you create VLAN except for one which is?
Correct Answer
D. VLAN mode
Explanation
The VLAN mode is not a parameter when creating a VLAN. VLAN mode refers to the different ways in which VLANs can be configured, such as access mode or trunk mode, but it is not a specific parameter that is set when creating a VLAN.
31.
•When auto-MDIX is enabled, the interface automatically detects and configures the connection appropriately
Correct Answer
A. True
Explanation
When auto-MDIX is enabled on a network interface, it allows the interface to automatically detect the type of cable being used (straight-through or crossover) and configure the connection appropriately. This means that regardless of the cable being used, the interface will adjust the transmit and receive pairs accordingly, eliminating the need for manual configuration or the use of a crossover cable. Therefore, the given statement is true.
32.
ACL lists tell the router what types of packets to accept or deny.
Correct Answer
A. True
Explanation
ACL (Access Control List) lists are used to control network traffic by specifying what types of packets should be allowed or denied by a router. They can be configured to permit or deny packets based on various criteria such as source/destination IP address, protocol, port number, etc. By defining rules in an ACL list, the router can determine which packets should be accepted and forwarded and which should be rejected. Therefore, the statement "ACL lists tell the router what types of packets to accept or deny" is true.
33.
•The boot loader can also be used to manage the switch if the IOS can’t be loaded
Correct Answer
A. True
Explanation
The boot loader is a small program that runs when a device is powered on and is responsible for loading the operating system. In some cases, the IOS (Internetwork Operating System) may fail to load properly, preventing the switch from functioning. In such situations, the boot loader can be used to manage the switch and troubleshoot the issue. Therefore, the statement that the boot loader can be used to manage the switch if the IOS can't be loaded is true.
34.
If managing the switch from a remote network, a default gateway must also be configured
Correct Answer
A. True
Explanation
When managing a switch from a remote network, a default gateway must be configured. A default gateway is the IP address of the router that connects the switch to other networks. It allows the switch to send and receive data to and from devices on different networks. Without a default gateway, the switch would not be able to communicate with devices outside of its local network. Therefore, it is necessary to configure a default gateway when managing a switch remotely.
35.
•Each ACL must have a unique identification number assigned to it.
Correct Answer
A. True
Explanation
Each Access Control List (ACL) is a set of rules that determine what traffic is allowed or denied on a network. To ensure proper management and identification, each ACL must have a unique identification number assigned to it. This allows administrators to easily identify and reference specific ACLs when configuring and troubleshooting network security. Therefore, the statement is true.
36.
An ACL containing numbered ACL statements can be altered
Correct Answer
B. False
Explanation
An ACL (Access Control List) containing numbered ACL statements cannot be altered. Numbered ACL statements are fixed and cannot be modified once they are created. To make changes to an ACL, it needs to be completely replaced with a new ACL that includes the desired alterations. Therefore, the given statement is false.
37.
An ACL containing numbered ACL statements can be altered
Correct Answer
A. True
Explanation
An ACL (Access Control List) is a set of rules that determines the access permissions for a network device or system. Numbered ACL statements refer to the specific rules within the ACL that are identified by numbers. These statements define what traffic is allowed or denied based on various criteria such as source/destination IP addresses, protocols, or ports. The ability to alter an ACL means that the administrator can modify or change these rules as needed, allowing for flexibility in managing network security and access control. Therefore, the statement "An ACL containing numbered ACL statements can be altered" is true.
38.
Runts are packets that are discarded because they exceed the maximum packet size for medium
Correct Answer
B. False
Explanation
The given statement is false. Runts are not discarded packets that exceed the maximum packet size for medium. In fact, runts are undersized packets that are smaller than the minimum packet size required. These undersized packets are typically caused by collisions or errors during transmission and are often discarded by the receiving device.
39.
•Standard ACLs as close as possible to the source of the traffic denied
Correct Answer
B. False
Explanation
The correct answer is False. This statement is not accurate because standard ACLs are typically applied as close as possible to the destination of the traffic, not the source. Standard ACLs filter traffic based on the source IP address only, so they are more effective when placed closer to the destination. By placing them closer to the source, it may allow unwanted traffic to reach the destination before being filtered out.
40.
•CRC errors are generated when the calculated checksum is not the same as the checksum recieved
Correct Answer
A. True
Explanation
CRC (Cyclic Redundancy Check) errors occur when the calculated checksum, which is a value obtained by performing a mathematical calculation on the data, does not match the checksum received with the data. The purpose of the checksum is to ensure data integrity during transmission. If the calculated checksum and the received checksum do not match, it indicates that the data may have been corrupted or altered during transmission, resulting in a CRC error. Therefore, the given statement is true.