Uploaded by Mohamed

Advanced Network Question Bank- Chapter 8 to 14- 2022

advertisement
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
FINAL EXAM – CHAPTERS - (8 to 14)
Chapter (8) - IP routing - Answered
2. You are viewing the routing table and you see an entry 10.1.1.1/32. What legend code would you
expect to see next to this route?
A.
B.
C.
D.
C
L
S
D
3. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0
192.168.4.2? (Choose two.)
A.
B.
C.
D.
E.
The command is used to establish a static route.
The default administrative distance is used.
The command is used to configure the default route.
The subnet mask for the source address is 255.255.255.0.
The command is used to establish a stub network.
4. What destination addresses will be used by HostA to send data to the HTTPS server as shown in the
following network? (Choose two.)
A.
B.
C.
D.
E.
F.
The IP address of the switch
The MAC address of the remote switch
The IP address of the HTTPS server
The MAC address of the HTTPS server
The IP address of RouterA’s Fa0/0 interface
The MAC address of RouterA’s Fa0/0 interface
5. Using the output shown, what protocol was used to learn the MAC address for 172.16.10.1? Interface:
172.16.10.2 --- 0x3 Internet Address Physical Address Type 172.16.10.1 00-15-05-06-31-b0 dynamic
A. ICMP B. ARP C. TCP D. UDP
6. Which of the following is called an advanced distance-vector routing protocol?
A. OSPF B. EIGRP C. BGP D. RIP
7. When a packet is routed across a network, the ______________ in the packet changes at every hop
while the ____ does not.
A. MAC address, IP address. B. IP address, MAC address C. Port number, IP address D. IP address,
port number
8. Which statement is true regarding classless routing protocols? (Choose two.)
A. The use of discontiguous networks is not allowed.
B. The use of variable length subnet masks is permitted.
C. RIPv1 is a classless routing protocol.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
1
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
D.
E.
IGRP supports classless routing within the same autonomous system.
RIPv2 supports classless routing.
9. Which two of the following are true regarding the distance-vector and link-state routing protocols?
(Choose two.)
A. Link state sends its complete routing table out of all active interfaces at periodic time intervals.
B. Distance vector sends its complete routing table out of all active interfaces at periodic time intervals.
C. Link state sends updates containing the state of its own links to all routers in the internetwork.
D. Distance vector sends updates containing the state of its own links to all routers in the internetwork.
10. When a router looks up the destination in the routing table for every single packet it is called
_____________ .
A. dynamic switching B. fast switching. C. Process switching. D. Cisco Express Forwarding
11. What type(s) of route is the following? Choose all that apply. S* 0.0.0.0/0 [1/0] via 172.16.10.5
A. Default B. Subnetted C. Static D. Local
12. A network administrator views the output from the show ip route command.
A network that is advertised by both RIP and EIGRP appears in the routing table flagged as an EIGRP
route. Why is the RIP route to this network not used in the routing table?
A.
B.
C.
D.
EIGRP has a faster update timer.
EIGRP has a lower administrative distance.
RIP has a higher metric value for that route.
The EIGRP route has fewer hops. E. The RIP path has a routing loop.
13. Which of the following is NOT an advantage of static routing?
A.
B.
C.
D.
Less overhead on the router CPU
No bandwidth usage between routers
Adds security
Recovers automatically from lost routes
14. What metric does RIPv2 use to find the best path to a remote network?
A. Hop count B. MTU C. Cumulative interface delay D. Load E. Path bandwidth value
15. The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a
destination address of 192.168.22.3. Looking at the output from the Corp router, what will the router do
with this packet? Corp#sh ip route [output cut]
R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C 192.168.20.0 is directly connected, Serial0/0 C
192.168.214.0 is directly connected,
FastEthernet0/0
A. The packet will be discarded.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
2
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. The packet will be routed out of the S0/0 interface.
C. The router will broadcast looking for the destination.
D. The packet will be routed out of the Fa0/0 interface.
16. If your routing table has a static, an RIP, and an EIGRP route to the same network, which route will
be used to route packets by default?
A. Any available route B. RIP route C. Static route D. EIGRP route E. They will all load-balance.
17. Which of the following is an EGP?
A. RIPv2
B. EIGRP
C. BGP
D. RIP
18. Which of the following is an advantage of static routing?
A.
B.
C.
D.
Less overhead on the router CPU
No bandwidth usage between routers
Adds security
Recovers automatically from lost routes
19. What command produced the following output?
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.10.1 YES manual up up
FastEthernet0/1 unassigned YES unset administratively down down
Serial0/0/0 172.16.10.2 YES manual up up
Serial0/0/1 unassigned YES unset administratively down down
A. show ip route
B. show interfaces
C. show ip interface brief
D. show ip arp
20. In the following command what does the 150 at the end of the command mean? Router(config)#ip
route 172.16.3.0 255.255.255.0 192.168.2.4 150
A. Metric B. Administrative distance C. Hop count D. Cost
Chapter 9: Open Shortest Path First (OSPF)- Not Answered
1. There are three possible routes for a router to reach a destination network. The first route is from OSPF
with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a
composite metric of 20514560. Which route will be installed by the router in its routing table?
A.
B.
C.
D.
RIPv2
EIGRP
OSPF
All three
2. In the accompanying diagram, which of the routers must be ABRs? (Choose all that apply.)
Area 1
F
Cfataax91@gmail.com
Engr. Abdifatah Ugas
3
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
Area 2
G
Area 3
H
CD
Backbone Area
E
A. C
B. D
C. E
D. F
E. G
F. H
3. Which of the following describe the process identifier that is used to run OSPF on a
router? (Choose two.)
A.
B.
C.
D.
E.
It is locally significant.
It is globally significant.
It is needed to identify a unique instance of an OSPF database.
It is an optional parameter required only if multiple OSPF processes are running on the router.
All routes in the same OSPF area must have the same process ID if they are to exchange routing
information.
4. All of the following must match for two OSPF routers to become neighbors except which?
A.
B.
C.
D.
Area ID
Router ID
Stub area flag
Authentication password if using one
5. In the diagram, by default what will be the router ID of Lab_B?
10.255.255.81/30 10.255.255.82/30
Fa0/0 Fa0/0 Fa0/0
192.168.10.65/29 192.168.10.49/29 192.168.10.17/29
10.255.255.9/30 10.255.255.10/30
G0/0 G0/1 G0/1 G0/0
Lab A Lab B Lab C
A.
B.
C.
D.
10.255.255.82
10.255.255.9
192.168.10.49
10.255.255.81
Cfataax91@gmail.com
Engr. Abdifatah Ugas
4
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
6. You get a call from a network administrator who tells you that he typed the following into his router:
Router(config)#router ospf 1
Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
He tells you he still can’t see any routes in the routing table. What configuration error did the
administrator make?
A. The wildcard mask is incorrect.
B. The OSPF area is wrong.
C. The OSPF process ID is incorrect.
D. The AS configuration is wrong.
7. Which of the following statements is true with regard to the output shown?
Corp#sh ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
172.31.1.4 1 FULL/BDR 00:00:34 10.10.10.2 FastEthernet0/0
192.168.20.1 0 FULL/ - 00:00:31 172.16.10.6 Serial0/1
192.168.10.1 0 FULL/ - 00:00:32 172.16.10.2 Serial0/0
A. There is no DR on the link to 192.168.20.1.
B. The Corp router is the BDR on the link to 172.31.1.4.
C. The Corp router is the DR on the link to 192.168.20.1.
D. The link to 192.168.10.1 is Active.
8. What is the administrative distance of OSPF?
A.
B.
C.
D.
90
100
120
110
9. In OSPF, Hellos are sent to what IP address?
A.
B.
C.
D.
224.0.0.5
224.0.0.9
224.0.0.10
224.0.0.1
10. What command generated the following output?
172.31.1.4 1 FULL/BDR 00:00:34 10.10.10.2 FastEthernet0/0
192.168.20.1 0 FULL/ - 00:00:31 172.16.10.6 Serial0/1
192.168.10.1 0 FULL/ - 00:00:32 172.16.10.2 Serial0/0
A.
B.
C.
D.
show ip ospf neighbor
show ip ospf database
show ip route
show ip ospf interface
Cfataax91@gmail.com
Engr. Abdifatah Ugas
5
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
11. Updates addressed to 224.0.0.6 are destined for which type of OSPF router?
A.
B.
C.
D.
DR
ASBR
ABR
All OSPF routers
12. For some reason, you cannot establish an adjacency relationship on a common Ethernet link between
two routers. Looking at this output, what is the cause of the problem?
RouterA#
Ethernet0/0 is up, line protocol is up
Internet Address 172.16.1.2/16, Area 0
Process ID 2, Router ID 172.126.1.2, Network Type BROADCAST, Cost: 10
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 172.16.1.2, interface address 172.16.1.1
No backup designated router on this network
Timer intervals configured, Hello 5, Dead 20, Wait 20, Retransmit 5
RouterB#
Ethernet0/0 is up, line protocol is up
Internet Address 172.16.1.1/16, Area 0
Process ID 2, Router ID 172.126.1.1, Network Type BROADCAST, Cost: 10
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 172.16.1.1, interface address 172.16.1.2
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
A. The OSPF area is not configured properly.
B. The priority on RouterA should be set higher.
C. The cost on RouterA should be set higher.
D. The Hello and Dead timers are not configured properly.
E. A backup designated router needs to be added to the network.
F. The OSPF process ID numbers must match.
13. In the work area match each OSPF term (by line) to its definition.
Designated router
contains only the best routes
Topological database
elected on broadcast networks
Hello protocol
contains all routes learned
Routing table
provides dynamic neighbor
15. Which two of the following commands will place network 10.2.3.0/24 into area 0? (Choose two.)
A. router eigrp 10
B. router ospf 10
Cfataax91@gmail.com
Engr. Abdifatah Ugas
6
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
C.
D.
E.
F.
G.
router rip
network 10.0.0.0
network 10.2.3.0 255.255.255.0 area 0
network 10.2.3.0 0.0.0.255 area0
network 10.2.3.0 0.0.0.255 area 0
16. Given the following output, which statement or statements can be determined to be true? (Choose all
that apply.)
RouterA2# show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
192.168.23.2 1 FULL/BDR 00:00:29 10.24.4.2 FastEthernet1/0
192.168.45.2 2 FULL/BDR 00:00:24 10.1.0.5 FastEthernet0/0
192.168.85.1 1 FULL/- 00:00:33 10.6.4.10 Serial0/1
192.168.90.3 1 FULL/DR 00:00:32 10.5.5.2 FastEthernet0/1
192.168.67.3 1 FULL/DR 00:00:20 10.4.9.20 FastEthernet0/2
192.168.90.1 1 FULL/BDR 00:00:23 10.5.5.4 FastEthernet0/1
<<output omitted>>
A. The DR for the network connected to Fa0/0 has an interface priority higher than 2.
B. This router (A2) is the BDR for subnet 10.1.0.0.
C. The DR for the network connected to Fa0/1 has a router ID of 10.5.5.2.
D. The DR for the serial subnet is 192.168.85.1.
17. What are three reasons for creating OSPF in a hierarchical design? (Choose three.)
A.
B.
C.
D.
To decrease routing overhead
To speed up convergence
To confine network instability to single areas of the network
To make configuring OSPF easier
18. Type the command that produced the following output. Write only the command and not the prompt.
FastEthernet0/0 is up, line protocol is up
Internet Address 10.10.10.1/24, Area 0
Process ID 1, Router ID 223.255.255.254, Network Type BROADCAST, Cost: 1
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 223.255.255.254, Interface address 10.10.10.1
Backup Designated router (ID) 172.31.1.4, Interface address 10.10.10.2
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:08
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 3/3, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Cfataax91@gmail.com
Engr. Abdifatah Ugas
7
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 172.31.1. Suppress hello for 0 neighbor(s)
19. A(n) ____________is an OSPF data packet containing link-state and routing information that are
shared among OSPF routers.
A.
B.
C.
D.
LSA
TSA
Hello
SPF
20. If routers in a single area are configured with the same priority value, what value does a router use for
the OSPF router ID in the absence of a loopback interface?
A.
B.
C.
D.
The lowest IP address of any physical interface
The highest IP address of any physical interface
The lowest IP address of any logical interface
The highest IP address of any logical interface
Chapter (10) Layer 2 Switching - Answered
1. Which of the following statements is not true with regard to layer 2 switching?
A. Layer 2 switches and bridges are faster than routers because they don’t take up time looking at
the Data Link layer header information.
B. Layer 2 switches and bridges look at the frame’s hardware addresses before deciding to either
forward, flood, or drop the frame.
C. Switches create private, dedicated collision domains and provide independent bandwidth on each
port.
D. Switches use application-sp
2. Type the command that generated the last entry in the MAC address table shown. Type the command
only, without the prompt.
Mac Address Table
------------------------------------------Vlan
Mac Address
------
----------- --------
All
0100.0ccc.cccc
Type
Ports
---------
---------
STATIC
CPU
DYNAMIC
Fa0/1
[output cut]
1
000e.83b2.e34b
Cfataax91@gmail.com
Engr. Abdifatah Ugas
8
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
1
0011.1191.556f
1
0011.3206.25cb
001a.4d55.2f7e
1
001b.d40a.
DYNAMIC
Fa0/1
DYNAMIC
Fa0/1 1
DYNAMIC
Fa0/1
DYNAMIC
Fa0/1
1
001c.575e.c891
DYNAMIC
1
aaaa.bbbb.0ccc
STATIC
Fa0/1
Fa0/7
3. In the diagram shown, what will the switch do if a frame with a destination MAC address of
000a.f467.63b1 is received on Fa0/4? (Choose all that apply.)
Switch# show mac address-table
VLAN
Mac Address
Ports .
1
0005.dccb.d74b
Fa0/4.
1
000a.f467.9e80
Fa0/5.
1
000a.f467.9e8b
Fa0/6
A.
B.
C.
D.
E.
Drop the frame.
Send the frame out of Fa0/3.
Send the frame out of Fa0/4.
Send the frame out of Fa0/5.
Send the frame out of Fa0/6.
4. Write the command that generated the following output. Mac
Address Table
----------------------------------------------------------------------------------------Vlan
Mac Address
All
0100.0ccc.cccc
1
000e.83b2.e34b
1
0011.1191.556f
1
0011.3206.25cb
1
001a.2f55.c9e8
1
001a.4d55.2f7e
1
001c.575e.c891
1
b414.89d9.1886
1
b414.89d9.1887
Ans: show mac address-table
Type
STATIC
DYNAMIC
DYNAMIC
DYNAMIC
DYNAMIC
DYNAMIC
DYNAMIC
DYNAMIC
DYNAMIC
Ports
CPU
Fa0/1
Fa0/1
Fa0/1
Fa0/1
Fa0/1
Fa0/1
Fa0/5
Fa0/6
5. In the work area draw the functions of a switch from the list on the left to the right.
Address
Packet forwarding
Layer three security
Forward/filter
learning Address learning
Forward/filter decisions
Loop avoidance
decisions
Loop avoidance
Cfataax91@gmail.com
Engr. Abdifatah Ugas
9
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
7.
Write the command that would limit the number of MAC addresses allowed on a port to 2. Write
only the command and not the prompt.
switchport port-security maximum 2
8.
Which of the following commands in the configuration, is a prerequisite for the other commands
to function?
S3#config t
S(config)#int fa0/3
S3(config-if#switchport port-security
S3(config-if#switchport port-security maximum 3
S3(config-if#switchport port-security violation restrict
S3(config-if#Switchport mode-security aging time 10
A.
B.
C.
D.
switchport mode-security aging time 10
switchport port-security
switchport port-security maximum 3
switchport port-security violation restrict
9. Which if the following is not an issue addressed by STP?
A.
B.
C.
D.
Broadcast storms
Gateway redundancy
A device receiving multiple copies of the same frame
Constant updating of the MAC filter table
10. What issue that arises when redundancy exists between switches is shown in the figure?
A. Broadcast storm
B. Routing loop
C. Port violation
D. Loss of gateway
11. Which two of the following switch port violation
modes will alert you via SNMP that a violation has
occurred on a port?
A. Restrict B. Protect
C. Shutdown
D. Err-disable
12. ____is the loop avoidance mechanism used by
switches.
Spanning tree protocol (STP)
13. Write the command that must be present on any
switch that you need to manage from a different subnet.
14. On which interface have you configured an IP address for a switch?
A. int fa0/0
B. int vty 0 15
C. int vlan 1 D. int s/0/0 .
Which Cisco IOS command is used to verify the port security configuration of a switch port?
A. show interfaces port-security
Cfataax91@gmail.com
Engr. Abdifatah Ugas
10
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. show port-security interyace
C. show ip interface
D. show interfaces switchport
16. Write the command that will save a dynamically learned MAC address in the runningconfiguration of
a Cisco switch?
switchport port-security mac-address sticky
17. Which of the following methods will ensure that only one specific host can connect to port F0/3 on a
switch? (Choose two. Each correct answer is a separate solution.)
A.
B.
C.
D.
Configure port security on F0/3 to accept traffic other than that of the MAC address of the host.
Configure the MAC address of the host as a static entry associated with port F0/3.
Configure an inbound access control list on port F0/3 limiting traffic to the IP address of the host.
Configure port security on F0/3 to accept traffic only from the MAC address of the host.
18. What will be the effect of executing the following command on port F0/1? switch(config-if)#
switchport port-security mac-address 00C0.35F0.8301
A. The command configures an inbound access control list on port F0/1, limiting traffic to the IP
address of the host.
B. The command expressly prohibits the MAC address of 00c0.35F0.8301 as an allowed host on the
switch port.
C. The command encrypts all traffic on the port from the MAC address of 00c0.35F0.8301.
D. The command statically defines the MAC address of 00c0.35F0.8301 as an allowed host on the
switch port.
19. The conference room has a switch port available for use by the presenter during classes, and each
presenter uses the same PC attached to the port. You would like to prevent other PCs from using that port.
You have completely removed the former configuration in order to start anew. Which of the following steps
is not required to prevent any other PCs from using that port?
A.
B.
C.
D.
Enable port security.
Assign the MAC address of the PC to the port.
Make the port an access port.
Make the port a trunk port.
20. Write the command required to disable the port if a security violation occurs. Write only the
command and not the prompt.
switchport port-security violation shutdown
Chpater (11) VLANS - Answered
1. Which of the following statements is true with regard to VLANs?
A. VLANs greatly reduce network security.
B. VLANs increase the number of collision domains while decreasing their size.
C. VLANs decrease the number of broadcast domains while decreasing their size.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
11
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
D. Network adds, moves, and changes are achieved with ease by just configuring a port into the
appropriate VLAN.
2.
Write the command that must be present for this layer 3 switch to provide inter-VLAN routing
between the two VLANs created with these commands:
S1(config)#int vlan 10
S1(config-if)#ip address 192.168.10.1 255.255.255.0
S1(config-if)#int vlan 20
S1(config-if)#ip address 192.168.20.1 255.255.255.0
3.
In the diagram, how must the port on each end of the line be configured to carry traffic between
the two hosts in the Sales VLAN?.
A. Access port
B. 10 GB
C. Trunk
D. Spanning
4. What is the only type of second VLAN of which an access port can be a member?
A. Secondary
B. Voice
C. Primary
D. Trunk
5. In the following configuration, what command is missing in the creation of the VLAN interface?
2960#config t
2960(config)#int vlan 1
2960(config-if)#ip address 192.168.10.2 255.255.255.0
2960(config-if)#exit
2960(config)#ip default-gateway 192.168.10.1
A. no shutdown under int vlan 1
B. encapsulation dot1q 1 under int vlan 1
C. switchport access vlan 1
D. passive-interface
6. Which of the following statements is true with regard to ISL and 802.1q?
A. 802.1q encapsulates the frame with control information; ISL inserts an ISL field along with tag control
information.
B. 802.1q is Cisco proprietary.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
12
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
C. ISL encapsulates the frame with control information; 802.1q inserts an 802.1q field along with tag
control information. D. ISL is a standard.
7. What concept is depicted in the diagram?
A.
B.
C.
Multiprotocol routing
Passive interface
Gateway redundancy
D.
Router on a stick
8. Write the command that places an interface into VLAN 2. Write only the command and not the
prompt.
switchport access vlan 2
9. Write the command that generated the following output:
VLAN
-------1
Name
----------default
2
3
4
show vlan
Sales
Marketing
Accounting
Status
Ports
------------------active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Gi0/1 Gi0/2
active
active
active
10. In the configuration and diagram shown,
what command is missing to enable interVLAN
routing between VLAN 2 and VLAN 3?
A. encapsulation dot1q 3 under int f0/0.2
B. encapsulation dot1q 2 under int f0/0.2
C. no shutdown under int f0/0.2
D. no shutdown under int f0/0.3
11. Based on the configuration shown below,
what statement is true?
S1(config)#ip routing
S1(config)#int vlan 10
Cfataax91@gmail.com
Engr. Abdifatah Ugas
13
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
S1(config-if)#ip address 192.168.10.1 255.255.255.0
S1(config-if)#int vlan 20
S1(config-if)#ip address 192.168.20.1 255.255.255.0
A. This is a multilayer switch.
B. The two VLANs are in the same subnet.
C. Encapsulation must be configured.
D. VLAN 10 is the management VLAN.
12. What is true of the output shown below?
S1#sh vlan
VLAN
-------1
Name
----------default
Fa0/9, Fa0/10, Fa0/11, Fa0/12
2
3
4
[output cut]
A.
B.
C.
D.
Sales
Marketing
Accounting
Status
Ports
------------------active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/13, Fa0/14, Fa0/19, Fa0/20
Fa0/22, Fa0/23, Fa0/24, Gi0/1 Gi0/2
active
Fa 0/21
active
Interface F0/15 is a trunk port.
Interface F0/17 is an access port.
Interface F0/21 is a trunk port.
VLAN 1 was populated manually.
13. 802.1q untagged frames are members of the _________ VLAN.
A. Auxiliary B. Voice C. Native D. Private
14. Write the command that generated the following output. Write only the command and not the
prompt:
Name: Fa0/15
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: isl
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN:
sh interfaces fastEthernet 0/15 switchport
15. Which statement is true regarding virtual local area networks (VLANs)?
A. VLANs are location dependent.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
14
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. VLANs are limited to a single switch.
C. VLANs may be subnets of major networks.
D. VLANs define collision domains.
16. In the diagram, what should be the default gateway
address of Host B?
A. 192.168.10.1
B. 192.168.1.65
C. 192.168.1.129
D. 192.168.1.2
17. What is the purpose of frame tagging in virtual LAN
(VLAN) configurations?
A. Inter-VLAN routing
B. Encryption of network packets
C. Frame identification over trunk links
D. Frame identification over access links
18.
Write the command to create VLAN 2 on a layer 2 switch. Write only the command and not the
prompt. vlan 2
19.
A.
B.
C.
D.
Which statement is true regarding 802.1q frame tagging?
802.1q adds a 26-byte trailer and 4-byte header.
802.1q uses a native VLAN.
The original Ethernet frame is not modified.
802.1q only works with Cisco switches.
20. Write the command that prevents an interface from generating DTP frames. Write only the command
and not the prompt.
switchport nonegotiate
Chapter 12- Security- Access List
1. Which of the following statements is false when a packet is being compared to an
access list?
A.
B.
C.
D.
E.
It’s always compared with each line of the access list in sequential order.
Once the packet matches the condition on a line of the access list, the packet is
acted upon and no further comparisons take place.
There is an implicit “deny” at the end of each access list.
Until all lines have been analyzed, the comparison is not over.
2. You need to create an access list that will prevent hosts in the network range of
192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
A. access-list 10 deny 192.168.160.0 255.255.224.0
Cfataax91@gmail.com
Engr. Abdifatah Ugas
15
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. access-list 10 deny 192.168.160.0 0.0.191.255
C. access-list 10 deny 192.168.160.0 0.0.31.255
D. access-list 10 deny 192.168.0.0 0.0.31.255
3. You have created a named access list called Blocksales. Which of the following is a valid
command for applying this to packets trying to enter interface Fa0/0 of your router?
A.
B.
C.
D.
(config)#ip access-group 110 in
(config-if)#ip access-group 110 in
(config-if)#ip access-group Blocksales in
(config-if)#Blocksales ip access-list in
4. Which access list statement will permit all HTTP sessions to network 192.168.144.0/24
containing web servers?
A.
B.
C.
D.
access-list 110 permit tcp 192.168.144.0 0.0.0.255 any eq 80
access-list 110 permit tcp any 192.168.144.0 0.0.0.255 eq 80
access-list 110 permit tcp 192.168.144.0 0.0.0.255 192.168.144.0 0.0.0.255 any eq 80
access-list 110 permit udp any 192.168.144.0 eq 80
5. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?
A.
B.
C.
D.
E.
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
access-list 10 deny tcp any 196.15.7.0 eq www
access-list 100 permit 196.15.7.0 0.0.0.255 eq www
access-list 110 permit ip any 196.15.7.0 0.0.0.255
access-list 110 permit www 196.15.7.0 0.0.0.255
6. What router command allows you to determine whether an IP access list is enabled on a particular
interface?
A.
B.
C.
D.
show ip port
show access-lists
show ip interface
show access-lists interface
7. In the work area, connect the show command to its function on the right.
A. show access-list Shows only the parameters for the access list 110. This command does not
show you the interface the list is set on.
B. show access-list 110 Shows only the IP access lists configured on the router.
C. show ip access-list Shows which interfaces have access lists set.
D. show ip interface Displays all access lists and their parameters configured on the router. This
command does not show you which interface the list is set on.
8. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you
use?
A. access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
B. access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
C. access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
Cfataax91@gmail.com
Engr. Abdifatah Ugas
16
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
D. access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
Review Questions 537
9. If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow
everything else, which of the following command strings is valid?
A.
A.
B.
C.
D.
E.
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftp
access-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 permit ip any 0.0.0.0 255.255.255.255
10. You want to create an extended access list that denies the subnet of the following host:
172.16.50.172/20. Which of the following would you start your list with?
A.
B.
C.
D.
access-list 110 deny ip 172.16.48.0 255.255.240.0 any
access-list 110 udp deny 172.16.0.0 0.0.255.255 ip any
access-list 110 deny tcp 172.16.64.0 0.0.31.255 any eq 80
access-list 110 deny ip 172.16.48.0 0.0.15.255 any
11. Which of the following is the wildcard (inverse) version of a /27 mask?
A.
B.
C.
D.
0.0.0.7
0.0.0.31
0.0.0.27
0.0.31.255
12. You want to create an extended access list that denies the subnet of the following host:
172.16.198.94/19. Which of the following would you start your list with?
A.
B.
C.
D.
access-list 110 deny ip 172.16.192.0 0.0.31.255 any
access-list 110 deny ip 172.16.0.0 0.0.255.255 any
access-list 10 deny ip 172.16.172.0 0.0.31.255 any
access-list 110 deny ip 172.16.188.0 0.0.15.255 any
13. The following access list has been applied to an interface on a router:
access-list 101 deny tcp 199.111.16.32 0.0.0.31 host 199.168.5.60
Which of the following IP addresses will be blocked because of this single rule in the list? (Choose all
that apply.)
A.
B.
C.
D.
199.111.16.67
199.111.16.38
199.111.16.65
199.11.16.54
14. Which of the following commands connects access list 110 inbound to interface Ethernet0?
A. Router(config)#ip access-group 110 in
B. Router(config)#ip access-list 110 in
Cfataax91@gmail.com
Engr. Abdifatah Ugas
17
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
C. Router(config-if)#ip access-group 110 in
D. Router(config-if)#ip access-list 110 in
15. What is the effect of this single-line access list? access-list 110 deny ip 172.16.10.0 0.0.0.255 host
1.1.1.1
A.
B.
C.
D.
Denies only the computer at 172.16.10
Denies all traffic
Denies the subnet 172.16.10.0/26
Denies the subnet 172.16.10.0/25
16. You configure the following access list. What will the result of this access list be?
access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp
access-list 110 deny tcp any any eq 23
int ethernet 0
ip access-group 110 out
A.
B.
C.
D.
Email and Telnet will be allowed out E0.
Email and Telnet will be allowed in E0.
Everything but email and Telnet will be allowed out E0.
No IP traffic will be allowed out E0.
17. Which of the following series of commands will restrict Telnet access to the router?
A. Lab_A(config)#access-list 10 permit 172.16.1.1
Lab_A(config)#line con 0
Lab_A(config-line)#ip access-group 10 in
B. Lab_A(config)#access-list 10 permit 172.16.1.1
Lab_A(config)#line vty 0 4
Lab_A(config-line)#access-class 10 out
C. Lab_A(config)#access-list 10 permit 172.16.1.1
Lab_A(config)#line vty 0 4
Lab_A(config-line)#access-class 10 in
D. Lab_A(config)#access-list 10 permit 172.16.1.1
Lab_A(config)#line vty 0 4
Lab_A(config-line)#ip access-group 10 in
18. Which of the following is true regarding access lists applied to an interface?
A. You can place as many access lists as you want on any interface until you run out of memory.
B. You can apply only one access list on any interface.
C. One access list may be configured, per direction, for each layer 3 protocol configured on an
interface.
D. You can apply two access lists to any interface.
19. What is the most common attack on a network today?
A. Lock picking
B. Naggle
Cfataax91@gmail.com
Engr. Abdifatah Ugas
18
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
C. DoS
D. auto secure
20. You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your
network. What should you do your network?l
A.
B.
C.
D.
Add more routers.
Use the auto secure command.
Implement IDS/IPS.
Configure Naggle.
Chapter 13: Network Address Translation (NAT)
1. Which of the following are disadvantages of using NAT? (Choose three.)
A.
B.
C.
D.
E.
F.
Translation introduces switching path delays.
NAT conserves legally registered addresses.
NAT causes loss of end-to-end IP traceability.
NAT increases flexibility when connecting to the Internet.
Certain applications will not function with NAT enabled.
NAT reduces address overlap occurrence.
2. Which of the following are advantages of using NAT? (Choose three.)
A.
B.
C.
D.
E.
F.
Translation introduces switching path delays.
NAT conserves legally registered addresses.
NAT causes loss of end-to-end IP traceability.
NAT increases flexibility when connecting to the Internet.
Certain applications will not function with NAT enabled.
NAT remedies address overlap occurrence.
3. Which command will allow you to see real-time translations on your router?
A.
B.
C.
D.
show ip nat translations
show ip nat statistics
debug ip nat
clear ip nat translations *
4. Which command will show you all the translations active on your router?
A.
B.
C.
D.
show ip nat translations
show ip nat statistics
debug ip nat
clear ip nat translations *
5. Which command will clear all the translations active on your router?
A. show ip nat translations
B. show ip nat statistics
Cfataax91@gmail.com
Engr. Abdifatah Ugas
19
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
C. debug ip nat
D. clear ip nat translations *
6. Which command will show you the summary of the NAT configuration?
A.
B.
C.
D.
show ip nat translations
show ip nat statistics
debug ip nat
clear ip nat translations *
7. Which command will create a dynamic pool named Todd that will provide you with 30
global addresses?
A.
B.
C.
D.
ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240
ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0
8. Which of the following are methods of NAT? (Choose three.)
A.
B.
C.
D.
E.
Static
IP NAT pool
Dynamic
NAT double-translation
Overload
9. When creating a pool of global addresses, which of the following can be used instead of the netmask
command?
A.
B.
C.
D.
/ (slash notation)
prefix-length
no mask
block-size
10. Which of the following would be a good starting point for troubleshooting if your router is not
translating?
A.
B.
C.
D.
Reboot
Call Cisco
Check your interfaces for the correct configuration
Run the debug all command
11. Which of the following would be good reasons to run NAT? (Choose three.)
A.
A.
B.
C.
D.
You need to connect to the Internet and your hosts don’t have globally unique
IP addresses.
You change to a new ISP that requires you to renumber your network.
You don’t want any hosts connecting to the Internet.
You require two intranets with duplicate addresses to merge.
12. Which of the following is considered to be the inside host’s address after translation?
A. Inside local
Cfataax91@gmail.com
Engr. Abdifatah Ugas
20
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. Outside local
C. Inside global
D. Outside global
13. Which of the following is considered to be the inside host’s address before translation?
A.
B.
C.
D.
Inside local
Outside local
Inside global
Outside global
14. By looking at the following output, which of the following commands would allow dynamic
translations?
Router#show ip nat trans
Pro Inside global Inside local Outside local Outside global
--- 1.1.128.1 10.1.1.1 --- ----- 1.1.130.178 10.1.1.2 --- ----- 1.1.129.174 10.1.1.10 --- ----- 1.1.130.101 10.1.1.89 --- ----- 1.1.134.169 10.1.1.100 --- ----- 1.1.135.174 10.1.1.200 --- --A. ip nat inside source pool todd 1.1.128.1 1.1.135.254 prefix-length 19
B. ip nat pool todd 1.1.128.1 1.1.135.254 prefix-length 19
C. ip nat pool todd 1.1.128.1 1.1.135.254 prefix-length 18
D. ip nat pool todd 1.1.128.1 1.1.135.254 prefix-length 21
15. Your inside locals are not being translated to the inside global addresses. Which of the fol lowing
commands will show you if your inside globals are allowed to use the NAT pool?
ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248
ip nat inside source list 100 int pool Corp overload




debug ip nat
show access-list
show ip nat translation
show ip nat statistics
16. Which command would you place on the interface of a private network?
A.
B.
C.
D.
ip nat inside
ip nat outside
ip outside global
ip inside local
17. Which command would you place on an interface connected to the Internet?
A.
B.
C.
D.
ip nat inside
ip nat outside
ip outside global
ip inside local
Cfataax91@gmail.com
Engr. Abdifatah Ugas
21
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
18. Port Address Translation is also called what?
A.
B.
C.
D.
NAT Fast
NAT Static
NAT Overload
Overloading Static
19. What does the asterisk (*) represent in the following output?
NAT*: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [1]
A.
B.
C.
D.
The packet was destined for a local interface on the router.
The packet was translated and fast-switched to the destination.
The packet attempted to be translated but failed.
The packet was translated but there was no response from the remote host.
20. Which of the following needs to be added to the configuration to enable PAT?
ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248
access-list 1 permit 192.168.76.64 0.0.0.31
A.
B.
C.
D.
ip nat pool inside overload
ip nat inside source list 1 pool Corp overload
ip nat pool outside overload
ip nat pool Corp 198.41.129 net 255.255.255.0 overload
Chapter 14: -Internet Protocol Version 6 (IPv6)
1. Which of the following is true when describing a global unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable
address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed over the
Internet.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique, so
it is unlikely they will have an address overlap.
2. Which of the following is true when describing a unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable address in
IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique, so it
is unlikely they will have an address overlap.
3. Which of the following is true when describing a link-local address?
A. Packets addressed to a broadcast address are delivered to a single interface.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
22
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
B. These are your typical publicly routable addresses, just like a regular publicly routable
address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed over the
Internet.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique, so
it is unlikely they will have an address overlap.
4. Which of the following is true when describing a unique local address?
A. Packets addressed to a unique local address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable
address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are not meant for Internet routing purposes, but they are unique, so it is
unlikely they will have an address overlap.
5. Which of the following is true when describing a multicast address?
A. Packets addressed to a multicast address are delivered to a single interface.
B. Packets are delivered to all interfaces identified with the address. This is also called a oneto-many address.
C. A multicast address identifies multiple interfaces and is delivered to only one address. This
address can also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique, so
it is unlikely they will have an address overlap.
6. Which of the following is true when describing an anycast address?
A. Packets addressed to an anycast address are delivered to a single interface.
B. Packets are delivered to all interfaces identified by the address. This is also called a one-tomany address.
C. This address identifies multiple interfaces and the anycast packet is only delivered to one
device. This address can also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique, so
it is unlikely they will have an address overlap.
7. You want to ping the loopback address of your IPv6 local host. What will you type?
A.
B.
C.
D.
ping 127.0.0.1
ping 0.0.0.0
ping ::1
trace 0.0.::1
8. What two multicast addresses does OSPFv3 use? (Choose two.)
A.
B.
C.
D.
FF02::A
FF02::9
FF02::5
FF02::6
9. An IPv6 hostname Host A is trying to connect to a web page on a remote server. Which of the
following is true? (Choose two.)
Cfataax91@gmail.com
Engr. Abdifatah Ugas
23
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
Internet
R1
Remote server
2001:db8:c334:67::/64
Fa0/0
Fa0/0 Gi0/1
Host A
2001:db8:c334:1::/64
A. A RA would be used by R1 to communicate its layer 2 MAC address to Host A.
B. OSPFv2 is used for the routers to share IPv6 routes.
C. IPv6 uses a two-part addressing scheme, similar to the way IPv4 uses a network and host
portion of an IPv4 address.
D. Host A would send the server’s link-local address to the router.
10. A host sends a router solicitation (RS) on the data link. What destination address is sent with this
request?
A.
B.
C.
D.
E.
FF02::A
FF02::9
FF02::2
FF02::1
FF02::5
11. IPv6 unicast routing is running on the Corp router. Which of the following addresses would show up
with the show ipv6 int brief command?
Corp#sh int f0/0
FastEthernet0/0 is up, line protocol is up
Hardware is AmdFE, address is 000d.bd3b.0d80 (bia 000d.bd3b.0d80)
[output cut]
A. FF02::3c3d:0d:bdff:fe3b:0d80
B. FE80::3c3d:2d:bdff:fe3b:0d80
C. FE80::3c3d:0d:bdff:fe3b:0d80
D. FE80::3c3d:2d:ffbd:3bfe:0d80
12. A host sends a type of NDP message providing the MAC address that was requested. Which type of
NDP was sent?
A.
B.
C.
D.
NA
RS
RA
NS
13. To enable OSPFv3, which of the following would you use?
A.
B.
C.
D.
E.
Router(config-if)#ipv6 ospf 10 area 0.0.0.0
Router(config-if)#ipv6 router rip 1
Router(config)#ipv6 router eigrp 10
Router(config-rtr)#no shutdown
Router(config-if)#ospf ipv6 10 area 0
14. Which of the following statements about IPv6 addresses are true? (Choose two.)
Cfataax91@gmail.com
Engr. Abdifatah Ugas
24
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
A.
B.
C.
D.
Leading zeros are required.
Two colons (::) are used to represent successive hexadecimal fields of zeros.
Two colons (::) are used to separate fields.
A single interface will have multiple IPv6 addresses of different types.
15. What two statements about IPv4 and IPv6 addresses are true? (Choose two.)
A.
B.
C.
D.
An IPv6 address is 32 bits long, represented in hexadecimal.
An IPv6 address is 128 bits long, represented in decimal.
An IPv4 address is 32 bits long, represented in decimal.
An IPv6 address is 128 bits long, represented in hexadecimal.
16. Which of the following descriptions about IPv6 is correct?
A.
B.
C.
D.
Addresses are not hierarchical and are assigned at random.
Broadcasts have been eliminated and replaced with multicasts.
There are 2.7 billion addresses.
An interface can only be configured with one IPv6 address.
17. How many bits are in an IPv6 address field?
A.
B.
C.
D.
E.
F.
24
4
3
16
32
128
18. Which of the following correctly describe characteristics of IPv6 unicast addressing? (Choose two.)
A.
B.
C.
D.
Global addresses start with 2000::/3.
Link-local addresses start with FF00::/10.
Link-local addresses start with FE00:/12.
There is only one loopback address and it is ::1.
19. Which of the following statements are true of IPv6 address representation? (Choose two.)
A.
B.
C.
D.
The first 64 bits represent the dynamically created interface ID.
A single interface may be assigned multiple IPv6 addresses of any type.
Every IPv6 interface contains at least one loopback address.
Leading zeroes in an IPv6 16-bit hexadecimal field are mandatory.
20. Which of the following is true regarding OSPFv3? (Choose three.)
A.
B.
C.
D.
E.
Uses a wildcard to define interfaces
Uses a network command under global configuration mode
Uses a 32-bit router ID
Uses link-state advertisements
Uses an interface command to enable OSPF on an interface
CIRCLE ANSWERS
Cfataax91@gmail.com
Engr. Abdifatah Ugas
25
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
Chapter 8: IP Routing
1. show ip route The ip route command is used to display the routing table of a router.
2. B
3. A, B.
4. C, F.
5. B.
6. B.
7. A.
8. B, E.
9. B, C.
10. C.
11. A, C.
12. B.
13. D.
14. A.
15. A.
16. C.
17. C.
18. D.
19. C.
20. B.
Chapter 9: Open Shortest Path First (OSPF)
1. B.
2. A, B, C.
3. A, C.
4. B.
5. C.
6. A.
7. A.
8. D.
9. A.
10. A.
11. A.
12. D.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
26
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
14. passive-interface fastEthernet 0/1 The command passive-interface fastEthernet 0/1 will
disable OSPF on the specified interface only.
15. B, G.
16. A.
17. A, B, C.
18. show ip ospf interface The show ip ospf interface command displays all inter face-related
OSPF information. Data is displayed about OSPF information for all OSPF-enabled interfaces or
for specified interfaces.
19. A.
20. B.
Chapter 10: Layer 2 Switching
1. A.
2. mac address-table static aaaa.bbbb.cccc vlan 1 int fa0/7 You can set a static MAC address
3. B, D, E.
4. show mac address-table This command displays the forward filter table.
6. A, D.
7. switchport port-security maximum 2 The maximum setting of 2 means only two MAC
8. B.
9. B.
10. A.
11. B, C.
12. Spanning tree protocol (STP) STP is a switching loop avoidance scheme use by switches.
13. ip default-gateway If you want to manage your switches from outside your LAN, you need to
set a default gateway on the switches, just as you would with a host.
14. C.
16. switchport port-security mac-address sticky Issuing the switchport port-security mac-address
sticky command .
17. B, D.
18. D.
19. D.
20. switchport port-security violation shutdown This command is used to set the reaction of the
switch to a port violation of shutdown.
Chapter 11: VLANs and InterVLAN Routing
1. D.
2. ip routing Routing must be enabled on the layer 3 switch.
3. C.
4. B.
5. A.
6. C.
.7. D.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
27
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
8. switchport access vlan 2 This command is executed under the interface (switch port) that is
being placed in the VLAN.
9. show vlan After you create the VLANs that you want, you can use the show vlan command to
check them out.
10. B.
11. A.
12. A.
13. C
14. sh interfaces fastEthernet 0/15 switchport .
15. C.
16. B.
17. C.
18. vlan 2 To configure VLANs on a Cisco Catalyst switch, use the global config vlan
command.
19. B. 802.1q uses the native VLAN.
20. switchport nonegotiate You can use this command only when the interface switchport mode
is access or trunk.
Chapter 12: Security
1. D.
2. C.
3. C.
4. B.
5. A.
6. C.
8. C.
9. D.
10. D.
11. B.
12. A.
13. B.
14. C.
15. B.
17. C.
18. C.
19. C.
20. C.
Chapter 13: Network Address Translation
1. A, C, E.
2. B, D, F.
3. C.
4. A.
5. D.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
28
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
6. B.
7. B.
8. A, C, E.
9. B.
10. C..
11. A, B, D.
12. C.
13. A.
14. D.
15. B.
16. A.
17. B.
18. C.
19. B
20. B.
Chapter 14: Internet Protocol Version 6 (IPv6)
1. B.
2. A.
3. C.
4. D.
5. B.
6. C.
7. C.
8. C, D.
9. A, C.
10. C.
11. B.
12. A.
13. A.
14. B, D.
15. C, D
16. B.
17. D.
18. A, D.
19. B, C
20. C, D, E.
Cfataax91@gmail.com
Engr. Abdifatah Ugas
29
Advanced Network- (Semester 5)
Jamhuriya University of Science and Technology (JUST)
1/1/2022
DIRECT QUESTIONS
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
Explain Routing? List types of Routing?
Differentiate between Static Routing and Dynamic Routing?
Explain Administrative distance?
Compare Link State vs. Distance Vector
Explain OSPF?
Write steps to configure OSPF area 0?
List the three functions of switch at layer 2.
OSPF operation is basically divided into three categories, what are they?
What is the difference between access and trunk links?
Explain the purpose of Catalyst Switches?
What are the three types of VTP modes?
Explain Standard Access Lists?
Explain Extended ACL?
Do We Need to Put an IP Address on a Switch? Explain?
What is Layer 2 switching?
Discuss why we need Port Security?
Explain VLAN? How to create VLAN, write Steps?
What are the advantages and disadvantages of using NAT?
What is Frame Tagging? list its types?
Explain the three Switch Functions at Layer 2?
Explain why we use IPv6?
Briefly, Explain IPv6 Addressing and Expressions?
Cisco has some really effective security solutions- Explain?
a) Access control lists (ACLs)
b) Cisco IOS Firewall
c) VPNs
PRACTICAL LABS
1.
2.
3.
4.
5.
6.
7.
Routing – Static, Dynamic, Default
OSPF
Catalyst Switch
VLANs
Access List
NAT
IPv6
ALL RIGHT RESERVED
JAMHURIYA UNIVERSITY OF SCIENCE AND TECHNOLOGY
LECTURER: - ABDIFATAH UGAS ABDULLAHI
Cfataax91@gmail.com
Engr. Abdifatah Ugas
30
Download