Computer Networks Questions and Answers
Networking Basics
1.
|
How long is an IPv6 address?
|
|||||||
Answer: Option D
Explanation:
An IPv6 address is 128 bits long.
|
2.
|
What flavor of Network Address
Translation can be used to have one IP address allow many users to connect to
the global Internet?
|
|||||||
Answer: Option D
Explanation:
Port Address Translation (PAT)
allows a one-to-many approach to network address translation.
|
3.
|
What are the two main types of
access control lists (ACLs)?
1.
Standard
2.
IEEE
3.
Extended
4.
Specialized
|
|||||||
Answer: Option A
Explanation:
Standard and extended access
control lists (ACLs) are used to configure security on a router.
|
4.
|
What command is used to create a
backup configuration?
|
|||||||
Answer: Option B
Explanation:
The command to back up the
configuration on a router is copy running-config startup-config.
|
5.
|
You have 10 users plugged into a
hub running 10Mbps half-duplex. There is a server connected to the switch
running 10Mbps half-duplex as well. How much bandwidth does each host have to
the server?
|
|||||||
Answer: Option D
Explanation:
Each device has 10 Mbps to the
server.
|
||||||||
6.
|
Which WLAN IEEE specification
allows up to 54Mbps at 2.4GHz?
|
|||||||
Answer: Option C
Explanation:
IEEE 802.11B is 2.4GHz, but with a
maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed
of 54Mbps.
|
7.
|
Which of the following is the
valid host range for the subnet on which the IP address 192.168.168.188
255.255.255.192 resides?
|
|||||||
Answer: Option A
Explanation:
256 - 192 = 64. 64 + 64 = 128. 128
+ 64 = 192. The subnet is 128, the broadcast address is 191, and the valid
host range is the numbers in between, or 129-190.
|
8.
|
To back up an IOS, what command
will you use?
|
|||||||
Answer: Option D
Explanation:
The command copy flash tftp will prompt you to back up an existing IOS in flash
to a TFTP host.
|
9.
|
What protocol does PPP use to
identify the Network layer protocol?
|
|||||||
Answer: Option A
Explanation:
Network Control Protocol is used
to help identify the Network layer protocol used in the packet.
|
10.
|
Which of the following commands
will allow you to set your Telnet password on a Cisco router?
|
|||||||
Answer: Option C
Explanation:
The command line vty 0 4 places you in a prompt that will allow you to set or
change your Telnet password.
|
||||||||
11.
|
Which protocol does DHCP use at
the Transport layer?
|
|||||||
Answer: Option C
Explanation:
User Datagram Protocol is a
connection network service at the Transport layer, and DHCP uses this
connectionless service.
|
12.
|
Which command is used to determine
if an IP access list is enabled on a particular interface?
|
|||||||
Answer: Option C
Explanation:
The show ip interface command will show you if any outbound or inbound
interfaces have an access list set.
|
13.
|
Where is a hub specified in the
OSI model?
|
|||||||
Answer: Option B
Explanation:
Hubs regenerate electrical
signals, which are specified at the Physical layer.
|
14.
|
What does the passive command
provide to dynamic routing protocols?
|
|||||||
Answer: Option B
Explanation:
The passive command,
short for passive-interface, stops regular updates from being sent out an
interface. However, the interface can still receive updates.
|
15.
|
Which protocol is used to send a
destination network unknown message back to originating hosts?
|
|||||||
Answer: Option C
Explanation:
ICMP is the protocol at the
Network layer that is used to send messages back to an originating router.
|
||||||||
16.
|
How often are BPDUs sent from a
layer 2 device?
|
|||||||
Answer: Option B
Explanation:
Every 2 seconds, BPDUs are sent
out from all active bridge ports by default.
|
17.
|
How many broadcast domains are
created when you segment a network with a 12-port switch?
|
|||||||
Answer: Option A
Explanation:
By default, switches break up
collision domains but are one large broadcast domain.
|
18.
|
What does the command routerA(config)#line cons 0 allow you to perform next?
|
|||||||
Answer: Option C
Explanation:
The command line console 0 places you at a prompt where you can then set your console
user-mode password.
|
19.
|
Which router command allows you to
view the entire contents of all access lists?
|
|||||||
Answer: Option B
Explanation:
To see the contents of all access
lists, use the show access-lists command.
|
20.
|
Which class of IP address has the
most host addresses available by default?
|
|||||||
Answer: Option A
Explanation:
Class A addressing provides 24
bits for host addressing.
|
||||||||
21.
|
In a network with dozens of
switches, how many root bridges would you have?
|
|||||||
Answer: Option A
Explanation:
You should have only one root
bridge per network.
|
22.
|
What PPP protocol provides dynamic
addressing, authentication, and multilink?
|
|||||||
Answer: Option C
Explanation:
Link Control Protocol in the PPP
stack provides dynamic addressing, authentication, and multilink.
|
23.
|
What is a stub network?
|
|||||||
Answer: Option D
Explanation:
Stub networks have only one
connection to an internetwork. Only default routes can be set on a stub
network or network loops may occur.
|
24.
|
If your router is facilitating a
CSU/DSU, which of the following commands do you need to use to provide the
router with a 64000bps serial link?
|
|||||||
Answer: Option D
Explanation:
The clock rate command
is two words, and the speed of the line is in bps.
|
25.
|
Which one of the following is true
regarding VLANs?
|
|||||||
Answer: Option D
Explanation:
Switches do not propagate VLAN
information by default; you must configure the VTP domain. VLAN Trunking
Protocol (VTP) is used to propagate VLAN information across a trunk link.
|
||||||||
26.
|
What does a VLAN do?
|
|||||||
Answer: Option C
Explanation:
VLANs break up broadcast domains
at layer 2.
|
27.
|
What is the main reason the OSI
model was created?
|
|||||||
Answer: Option C
Explanation:
The primary reason the OSI model
was created was so that different networks could inter-operate.
|
28.
|
How many collision domains are
created when you segment a network with a 12-port switch?
|
|||||||
Answer: Option D
Explanation:
Layer 2 switching creates
individual collision domains.
|
29.
|
What command will display the
line, protocol, DLCI, and LMI information of an interface?
|
|||||||
Answer: Option B
Explanation:
The show interface command shows the line, protocol, DLCI, and LMI
information of an interface.
|
30.
|
Which protocol does Ping use?
|
|||||||
Answer: Option C
Explanation:
ICMP is the protocol at the
Network layer that is used to send echo requests and replies.
|
||||||||
31.
|
Which command is used to upgrade
an IOS on a Cisco router?
|
|||||||
Answer: Option D
Explanation:
The copy tftp flash command places a new file in flash memory, which is
the default location for the Cisco IOS in Cisco routers.
|
32.
|
If you wanted to delete the configuration
stored in NVRAM, what would you type?
|
|||||||
Answer: Option A
Explanation:
The command erase startup-config deletes the configuration stored in NVRAM.
|
33.
|
What protocols are used to
configure trunking on a switch?
1.
VLAN Trunking
Protocol
2.
VLAN
3.
802.1Q
4.
ISL
|
|||||||
Answer: Option B
Explanation:
VTP is not right because it has
nothing to do with trunking except that it sends VLAN information across a
trunk link. 802.1Q and ISL are used to configure trunking on a port.
|
TCP/IP
1.
|
Which of the following services use TCP?
1.
DHCP
2.
SMTP
3.
HTTP
4.
TFTP
5.
FTP
|
|||||||
Answer: Option B
Explanation:
SMTP, HTTP and FTP use TCP.
|
2.
|
What layer in the TCP/IP stack is equivalent
to the Transport layer of the OSI model?
|
|||||||
Answer: Option B
Explanation:
The four layers of the TCP/IP stack (also called the DoD
model) are Application/Process, Host-to-Host, Internet, and Network Access.
The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
|
3.
|
Which of the following describe the DHCP
Discover message?
1.
It uses FF:FF:FF:FF:FF:FF as a layer 2
broadcast.
2.
It uses UDP as the Transport layer protocol.
3.
It uses TCP as the Transport layer protocol.
4.
It does not use a layer 2 destination address.
|
|||||||
Answer: Option B
Explanation:
A client that sends out a DHCP Discover message in order
to receive an IP address sends out a broadcast at both layer 2 and layer 3.
The layer 2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer 3 broadcast
is 255.255.255.255,
which means all networks and all hosts. DHCP is connectionless, which means
it uses User Datagram Protocol (UDP) at the Transport layer, also called the
Host-to-Host layer.
|
4.
|
You want to implement a mechanism that
automates the IP configuration, including IP address, subnet mask, default
gateway, and DNS information. Which protocol will you use to accomplish this?
|
|||||||
Answer: Option C
Explanation:
Dynamic Host Configuration Protocol (DHCP) is used to
provide IP information to hosts on your network. DHCP can provide a lot of
information, but the most common is IP address, subnet mask, default gateway,
and DNS information.
|
5.
|
Which of the following is private IP address?
|
|||||||
Answer: Option D
Explanation:
Class A private address range is 10.0.0.0 through 10.255.255.255.
Class B private address range is 172.16.0.0 through 172.31.255.255, and Class
C private address range is 192.168.0.0 through 192.168.255.255.
|
6.
|
Which of the following allows a router to
respond to an ARP request that is intended for a remote host?
|
|||||||
Answer: Option C
Explanation:
Proxy ARP can help machines on a subnet reach remote
subnets without configuring routing or a default gateway.
|
7.
|
The DoD model (also called the TCP/IP stack)
has four layers. Which layer of the DoD model is equivalent to the Network
layer of the OSI model?
|
|||||||
Answer: Option C
Explanation:
The four layers of the DoD model are Application/Process,
Host-to-Host, Internet, and Network Access. The Internet layer is equivalent
to the Network layer of the OSI model.
|
8.
|
Which of the following services use UDP?
1.
DHCP
2.
SMTP
3.
SNMP
4.
FTP
5.
HTTP
6.
TFTP
|
|||||||
Answer: Option A
Explanation:
DHCP, SNMP, and TFTP use UDP.
|
9.
|
Which class of IP address provides a maximum
of only 254 host addresses per network ID?
|
|||||||
Answer: Option C
Explanation:
A Class C network address has only 8 bits for defining
hosts: 28 - 2 = 254.
|
10.
|
If you use either Telnet or FTP, which is the
highest layer you are using to transmit data?
|
|||||||
Answer: Option A
Explanation:
Both FTP and Telnet use TCP at the Transport layer;
however, they both are Application layer protocols, so the Application layer
is the best answer.
|
11.
|
Which of the following is the decimal and
hexadecimal equivalents of the binary number 10011101?
|
|||||||
Answer: Option B
Explanation:
To turn a
binary number into decimal, you just have to add the values of each bit that
is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1
= 157.
Hexadecimal
is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5,
6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all
the numbers you'll ever need. So, if 1001 in binary is 9, then the
hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary,
the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.
|
12.
|
Which statements are true regarding ICMP
packets?
1.
They acknowledge receipt of a TCP segment.
2.
They guarantee datagram delivery.
3.
They can provide hosts with information about network
problems.
4.
They are encapsulated within IP datagrams.
|
|||||||
Answer: Option C
Explanation:
Internet Control Message Protocol (ICMP) is used to send
error messages through the network, but they do not work alone. Every segment
or ICMP payload must be encapsulated within an IP datagram (or packet).
|
13.
|
Which of the following are layers in the
TCP/IP model?
1.
Application
2.
Session
3.
Transport
4.
Internet
5.
Data Link
6.
Physical
|
|||||||
Answer: Option B
Explanation:
This seems like a hard question at first because it doesn't
make sense. The listed answers are from the OSI model and the question asked
about the TCP/IP protocol stack (DoD model). However, let's just look for
what is wrong. First, the Session layer is not in the TCP/IP model; neither
are the Data Link and Physical layers. This leaves us with the Transport
layer (Host-to-Host in the DoD model), Internet layer (Network layer in the
OSI), and Application layer (Application/Process in the DoD).
|
14.
|
Which layer 4 protocol is used for a Telnet
connection?
|
|||||||
Answer: Option B
Explanation:
Although Telnet does use TCP and IP (TCP/IP), the
question specifically asks about layer 4, and IP works at layer 3. Telnet
uses TCP at layer 4.
|
15.
|
Which statements are true regarding ICMP
packets?
1.
ICMP guarantees datagram delivery.
2.
ICMP can provide hosts with information about network
problems.
3.
ICMP is encapsulated within IP datagrams.
4.
ICMP is encapsulated within UDP datagrams.
|
|||||||
Answer: Option B
Explanation:
ICMP is used for diagnostics and destination unreachable
messages. ICMP is encapsulated within IP datagrams, and because it is used
for diagnostics, it will provide hosts with information about network
problems.
|
16.
|
Which of the following are TCP/IP protocols
used at the Application layer of the OSI model?
1.
IP
2.
TCP
3.
Telnet
4.
FTP
5.
TFTP
|
|||||||
Answer: Option C
Explanation:
Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP)
are all Application layer protocols. IP is a Network layer protocol.
Transmission Control Protocol (TCP) is a Transport layer protocol.
|
17.
|
What protocol is used to find the hardware
address of a local device?
|
|||||||
Answer: Option B
Explanation:
Address Resolution Protocol (ARP) is used to find the
hardware address from a known IP address.
|
18.
|
Which of the following protocols uses both
TCP and UDP?
|
|||||||
Answer: Option D
Explanation:
DNS uses TCP for zone exchanges between servers and UDP
when a client is trying to resolve a hostname to an IP address.
|
19.
|
What is the address range of a Class B
network address in binary?
|
|||||||
Answer: Option C
Explanation:
The range of a Class B network address is 128-191. This makes our binary range 10xxxxxx.
|
IOS and
Security Device Manager
1.
|
Which of the
following commands sets the secret password to Cisco?
|
|||||||
Answer: Option C
Explanation:
The enable secret password is case sensitive, so the
second option is wrong. To set the enable secret <password>,
use the enable
secret <password> command from global configuration
mode.
|
2.
|
You type the
following command into the router and receive the following output:
Why was this error message displayed?
|
|||||||
Answer: Option D
Explanation:
You can view the interface statistics from user mode, but
the command is show interface serial 0/0.
|
3.
|
Which of the
following commands will display the current IP addressing and the layer 1 and
2 status of an interface?
1.
show version
2.
show
protocols
3.
show
interfaces
4.
show
controllers
5.
show ip
interface
|
|||||||
Answer: Option B
Explanation:
The commands show protocols, show interfaces,
and show ip
interface will show you the layer 1 and 2 status
and the IP addresses of your router's interfaces.
|
4.
|
You type show running-config and get this
output:
What do the two numbers following the exec-timeout
command mean?
|
|||||||
Answer: Option C
Explanation:
The exec-timeout command is set in
minutes and seconds.
|
5.
|
What layer of the OSI
model would you assume the problem is in if you type show interface serial 1 and receive the
following message? "Serial1
is down, line protocol is down."
|
|||||||
Answer: Option A
Explanation:
If you see that a serial interface and the protocol are
both down, then you have a Physical layer problem. If you see serial1 is up, line protocol is down,
then you are not receiving (Data Link) keepalives from the remote end.
|
||||||||
6.
|
Which of the
following commands displays the configurable parameters and statistics of all
interfaces on a router?
|
|||||||
Answer: Option C
Explanation:
With the show interfaces command, you can view
the configurable parameters, get statistics for the interfaces on the router,
verify if the interfaces are shut down, and see the IP address of each
interface.
|
7.
|
Which of the
following commands will configure all the default VTY ports on a router?
|
|||||||
Answer: Option B
Explanation:
From global configuration mode, use the line vty 0 4 command
to set all five default VTY lines.
|
8.
|
You need to find the
broadcast address used on a LAN on your router. What command will you type
into the router from user mode to find the broadcast address?
|
|||||||
Answer: Option C
Explanation:
The command show ip protocols will actually show you
the broadcast address for each interface - too bad it isn't a possible
answer. Your best answer is show interfaces, which will provide the IP
address and mask for each interface.
|
9.
|
Which command will
delete the contents of NVRAM on a router?
|
|||||||
Answer: Option D
Explanation:
The erase startup-config command erases the
contents of NVRAM and will put you in setup mode if the router is restarted.
|
10.
|
What keystroke will
terminate setup mode?
|
|||||||
Answer: Option C
Explanation:
You can exit setup mode at any time by using the
keystroke Ctrl+C.
|
||||||||
11.
|
What command do you
type to save the configuration stored in RAM to NVRAM?
|
|||||||
Answer: Option D
Explanation:
To copy the running-config to NVRAM so that it will be
used if the router is restarted, use the copy running-config startup-config command
(copy run start for
short).
|
12.
|
You type Router#sh ru and receive an % ambiguous command error. Why did
you receive this message?
|
|||||||
Answer: Option B
Explanation:
The % ambiguous command error means that there
is more then one possible command that starts with ru.
Use a question mark to find the correct command.
|
13.
|
If you wanted
administrators to see a message when logging into the router, which command
would you use?
|
|||||||
Answer: Option C
Explanation:
The typical banner is a message of the day (MOTD) and is
set by using the global configuration mode command banner motd.
|
14.
|
How many simultaneous
Telnet sessions does a Cisco router support by default?
|
|||||||
Answer: Option D
Explanation:
Cisco routers, if they do not have the Enterprise edition
of the IOS, will default to 5 simultaneous Telnet sessions.
|
15.
|
You set the console
password, but when you display the configuration, the password doesn't show
up; it looks like this:
What cause the password to be stored like this?
|
|||||||
Answer: Option B
Explanation:
The command service password-encryption, from global
configuration mode, will encrypt the passwords.
|
||||||||
16.
|
Which command will
show you whether a DTE or a DCE cable is plugged into serial 0?
|
|||||||
Answer: Option C
Explanation:
The show controllers serial 0 command will
show you whether either a DTE or DCE cable is connected to the interface. If
it is a DCE connection, you need to add clocking with the clock rate command.
|
17.
|
You want to totally
reinitialize the router and replace the current running-config with the
current startup-config. What command will you use?
|
|||||||
Answer: Option D
Explanation:
To completely replace the running-config with the
startup-config, you must reload the router. Note : You may have picked option
C, which isn't a bad answer. Remember, though, it doesn't replace the
configuration, it appends it.
|
18.
|
If you delete the
contents of NVRAM and reboot the router, what mode will you be in?
|
|||||||
Answer: Option C
Explanation:
If you delete the startup-config and reload the router,
the router will automatically enter setup mode. You can also type setup from
privileged mode at any time.
|
19.
|
What is the problem
with an interface if you type show
interface serial 0 and
receive the following message? "Serial0
is administratively down, line protocol is down."
|
|||||||
Answer: Option B
Explanation:
If an interface is shut down, the show interface command
will show the interface as administratively shut down. (It is possible that
no cable is attached, but you can't tell that from this message.)
|
IP
Routing
1.
|
Which of the
following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?
1.
The command is used to establish a static route.
2.
The default administrative distance is used.
3.
The command is used to configure the default route.
4.
The subnet mask for the source address is 255.255.255.0.
|
|||||||
Answer: Option A
Explanation:
Although answer D almost seems right, it is not; the mask
is the mask used on the remote network, not the source network. Since there
is no number at the end of the static route, it is using the default
administrative distance of 1.
|
2.
|
Which command
displays RIP routing updates?
|
|||||||
Answer: Option B
Explanation:
The debug ip rip command is used to
show the Internet Protocol (IP) Routing Information Protocol (RIP) updates
being sent and received on the router.
|
3.
|
Which statement is
true regarding classless routing protocols?
1.
The use of discontiguous networks is not allowed.
2.
The use of variable length subnet masks is permitted.
3.
RIPv1 is a classless routing protocol.
4.
IGRP supports classless routing within the same
autonomous system.
5.
RIPv2 supports classless routing.
|
|||||||
Answer: Option C
Explanation:
Classful routing means that all hosts in the internetwork
use the same mask. Classless routing means that you can use Variable Length
Subnet Masks (VLSMs) and can also support discontiguous networking.
|
4.
|
You have the
following routing table. Which of the following networks will not be placed
in the neighbor routing table?
|
|||||||
Answer: Option C
Explanation:
The network 10.0.0.0 cannot be placed in the next
router's routing table because it already is at 15 hops. One more hop would
make the route 16 hops, and that is not valid in RIP networking.
|
5.
|
What is split
horizon?
|
|||||||
Answer: Option A
Explanation:
A split horizon will not advertise a route back to the
same router it learned the route from.
|
||||||||
6.
|
What command is used
to stop RIP routing updates from exiting out an interface but still allow the
interface to receive RIP route updates?
|
|||||||
Answer: Option C
Explanation:
The (config-router)#passive-interface command
stops updates from being sent out an interface, but route updates are still
received.
|
7.
|
Two connected routers
are configured with RIP routing. What will be the result when a router
receives a routing update that contains a higher-cost path to a network
already in its routing table?
|
|||||||
Answer: Option B
Explanation:
When a routing update is received by a router, the router
first checks the administrative distance (AD) and always chooses the route
with the lowest AD. However, if two routes are received and they both have
the same AD, then the router will choose the one route with the lowest
metrics, or in RIP's case, hop count.
|
8.
|
You type debug ip rip on your router console and see
that 172.16.10.0 is being advertised to you with a metric of 16. What does
this mean?
|
|||||||
Answer: Option C
Explanation:
You cannot have 16 hops on a RIP network by default. If
you receive a route advertised with a metric of 16, this means it is
inaccessible.
|
9.
|
The Corporate router
receives an IP packet with a source IP address of 192.168.214.20 and a
destination address of 192.168.22.3. Looking at the output from the Corporate
router, what will the router do with this packet?
|
|||||||
Answer: Option A
Explanation:
Since the routing table shows no route to the
192.168.22.0 network, the router will discard the packet and send an ICMP
destination unreachable message out interface FastEthernet 0/0, which is the
source LAN where the packet originated from.
|
10.
|
If your routing table
has a static, a RIP, and an IGRP route to the same network, which route will
be used to route packets by default?
|
|||||||||
Answer: Option C
Explanation:
Static routes have an administrative distance of 1 by
default. Unless you change this, a static route will always be used over any
other found route. IGRP has an administrative distance of 100, and RIP has an
administrative distance of 120, by default.
|
||||||||||
11.
|
What is route
poisoning?
|
|||||||||
Answer: Option D
Explanation:
Another way to avoid problems caused by inconsistent
updates and to stop network loops is route poisoning. When a network goes
down, the distance-vector routing protocol initiates route poisoning by
advertising the network with a metric of 16, or unreachable (sometimes
referred to as infinite).
|
12.
|
Which of the
following is true regarding RIPv2?
|
|||||||
Answer: Option C
Explanation:
RIPv2 is pretty much just like RIPv1. It has the same
administrative distance and timers and is configured just like RIPv1.
|
13.
|
A network
administrator views the output from the show ip
route command.
A network that is advertised by both RIP and IGRP appears in the routing
table flagged as an IGRP route. Why is the RIP route to this network not used
in the routing table?
|
|||||||
Answer: Option B
Explanation:
RIP has an administrative distance (AD) of 120, while
IGRP has an administrative distance of 100, so the router will discard any
route with a higher AD than 100.
|
14.
|
What does RIPv2 use to prevent routing loops?
1)
CIDR
2)
Split horizon
3)
Authentication
4)
Classless masking
5)
Holddown timers
|
|||||||
Answer: Option C
Explanation:
RIPv2 uses the same timers and loop-avoidance schemes as
RIPv1. Split horizon is used to stop an update from being sent out the same
interface it was received on. Holddown timers allow time for a network to
become stable in the case of a flapping link.
|
15.
|
Which two of the
following are true regarding the distance-vector and link-state routing
protocols?
1.
Link state sends its complete routing table out all
active interfaces on periodic time intervals.
2.
Distance vector sends its complete routing table out all
active interfaces on periodic time intervals.
3.
Link state sends updates containing the state of its own
links to all routers in the internetwork.
4.
Distance vector sends updates containing the state of its
own links to all routers in the internetwork.
|
|||||||
Answer: Option C
Explanation:
The distance-vector routing protocol sends its complete
routing table out all active interfaces at periodic time intervals.
Link-state routing protocols send updates containing the state of its own
links to all routers in the internetwork.
|
||||||||
16.
|
IGRP uses which of
the following as default parameters for finding the best path to a remote
network?
1.
Hop count
2.
MTU
3.
Cumulative interface delay
4.
STP
5.
Path bandwidth value
|
|||||||
Answer: Option B
Explanation:
IGRP uses bandwidth and delay of the line, by default, to
determine the best path to a remote network. Delay of the line can sometimes
be called the cumulative interface delay.
|
17.
|
Network 206.143.5.0
was assigned to the Acme Company to connect to its ISP. The administrator of
Acme would like to configure one router with the commands to access the
Internet. Which commands could be configured on the Gateway router to allow
Internet access to the entire network?
1.
Gateway(config)#
ip route 0.0.0.0 0.0.0.0 206.143.5.2
2.
Gateway(config)#
router rip
3.
Gateway(config-router)#
network 206.143.5.0
4.
Gateway(config-router)#
network 206.143.5.0 default
|
|||||||
Answer: Option D
Explanation:
There are actually three different ways to configure the
same default route, but only two are shown in the answer. First, you can set
a default route with the 0.0.0.0 0.0.0.0 mask and then specify
the next hop, as in option A. Or you can use 0.0.0.0 0.0.0.0 and use the exit
interface instead of the next hop. Finally, you can use option D with the ip default-network command.
|