Multicast addresses does OSPFv3 use
Which of the following
is true when describing a global unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular
publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be
routed over the Internet.
D. These addresses are meant for nonrouting purposes, but they are almost
globally unique, so it is unlikely they will have an address overlap.
·
B. Unlike unicast
addresses, global unicast addresses are meant to be routed.
Which of the following
is true when describing a unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular
publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be
routed.
·
Packets addressed to a
unicast address are delivered to a single interface. For load balancing,
multiple interfaces can use the same address.
Which of the following
is true when describing a link-local address?
A. Packets addressed to a broadcast address are delivered to a single
interface.
B. These are your typical publicly routable addresses, just like a regular
publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be
routed over the Internet.
·
C. Link-local
addresses are meant for throwing together a temporary LAN for meetings or a
small LAN that is not going to be routed but needs to share and access files
and services locally.
Which of the following
is true when describing a unique local address?
A. Packets addressed to a unique local address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular
publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be
routed.
·
D. These addresses are
meant for nonrouting purposes like link-local, but they are almost globally
unique, so it is unlikely they will have an address overlap. Unique local
addresses were designed as a replacement for site-local addresses.
Which of the following
is true when describing a multicast address?
A. Packets addressed to a multicast address are delivered to a single
interface.
B. Packets are delivered to all interfaces identified with the address. This is
also called a one-to-many address.
C. A multicast address identifies multiple interfaces and is delivered to only
one address. This address can also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost
globally unique, so it is unlikely they will have an address overlap.
·
B. Packets addressed
to a multicast address are delivered to all interfaces identified with the
multicast address, the same as in IPv4. It is also called a one-to-many
address. You can always tell a multicast address in IPv6 because multicast
addresses always start with FF.
Which of the following
is true when describing an anycast address?
A. Packets addressed to an anycast address are delivered to a single interface.
B. Packets are delivered to all interfaces identified by the address. This is
also called a one-to-many address.
C. This address identifies multiple interfaces and the anycast packet is only
delivered to one device. This address can also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost
globally unique, so it is unlikely they will have an address overlap.
·
C. Anycast addresses
identify multiple interfaces, which is somewhat similar to multicast addresses;
however, the big difference is that the anycast packet is only delivered to one
address, the first one it finds defined in the terms of routing distance. This
address can also be called one-to-one-of-many, or one-to-nearest.
You want to ping the
loopback address of your IPv6 local host. What will you type?
A. ping 127.0.0.1
B. ping 0.0.0.0
C. ping ::1
D. trace 0.0.::1
·
C. The loopback
address with IPv4 is 127.0.0.1. With IPv6, that address is ::1.
What two multicast
addresses does OSPFv3 use? (Choose two.)
A. FF02::A
B. FF02::9
C. FF02::5
D. FF02::6
·
C, D. Adjacencies and
next-hop attributes now use link-local addresses, and OSPFv3 still uses
multicast traffic to send its updates and acknowledgments with the addresses
FF02::5 for OSPF routers and FF02::6 for OSPF designated routers. These are the
replacements for 224.0.0.5 and 224.0.0.6, respectively.
Write the command that
must be present for this layer 3 switch to provide inter-VLAN routing between
the two VLANs created with these commands:
S1(config)#int vlan 10
S1(config-if)#ip address 192.168.10.1 255.255.255.0
S1(config-if)#int vlan 20
S1(config-if)#ip address 192.168.20.1 255.255.255.0
·
ip routingRouting must
be enabled on the layer 3 switch.
What is the only type
of second VLAN of which an access port can be a member?
A. Secondary
B. Voice
C. Primary
D. Trunk
·
B. While in all other
cases access ports can be a member of only one VLAN, most switches will allow
you to add a second VLAN to an access port on a switch port for your voice
traffic; it’s called the voice VLAN. The voice VLAN used to be called the auxiliary
VLAN, which allowed it to be overlaid on top of the data VLAN, enabling both
types of traffic through the same port.
In the following
configuration, what command is missing in the creation of the VLAN interface?
2960#config t
2960(config)#int vlan 1
2960(config-if)#ip address 192.168.10.2 255.255.255.0
2960(config-if)#exit
2960(config)#ip default-gateway 192.168.10.1
A. no shutdown under int vlan 1
B. encapsulation dot1q 1 under int vlan 1
C. switchport access vlan 1
D. passive-interface
·
Yes, you have to do a
no shutdown on the VLAN interface.
Which of the following
statements is true with regard to ISL and 802.1q?
A. 802.1q encapsulates the frame with control information; ISL inserts an ISL
field along with tag control information.
B. 802.1q is Cisco proprietary.
C. ISL encapsulates the frame with control information; 802.1q inserts an
802.1q field along with tag control information.
D. ISL is a standard.
·
C. Unlike ISL which
encapsulates the frame with control information, 802.1q inserts an 802.1q field
along with tag control information.
Write the command that
places an interface into VLAN 2. Write only the command and not the prompt.
·
#switchport access
vlan 2
This command is executed under the interface (switch port) that is being placed
in the VLAN.
Write the command that
generated the following output:
VLAN Name Status Ports
---- ------------------------- --------- ------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Gi0/1
Gi0/2
2 Sales active
3 Marketing active
4 Accounting active
[output cut]
·
#show vlan After you
create the VLANs that you want, you can use the show vlan command to check them
out
What is true of the
output shown below?
S1#sh vlan
VLAN Name Status Ports
---- ---------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/19, Fa0/20,
Fa0/22, Fa0/23, Gi0/1, Gi0/2
2 Sales active
3 Marketing Fa0/21
4 Accounting active
[output cut]
A. Interface F0/15 is a trunk port.
B. Interface F0/17 is an access port.
C. Interface F0/21 is a trunk port.
D. VLAN 1 was populated manually.
·
Ports Fa0/15-18 are
not present in any VLANs. They are trunk ports.
802.1q untagged frames
are members of the _________ VLAN.
A. Auxiliary
B. Voice
C. Native
D. Private
·
13. C. Untagged frames
are members of the native VLAN, which by default is VLAN 1.
Write the command that
generated the following output. Write only the command and not the prompt:
Name: Fa0/15
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: isl
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN: none
[output cut]
·
sh interfaces
fastEthernet 0/15 switchport This show interfacesinterfaceswitchport command
shows us the administrative mode of dynamic desirable and that the port is a
trunk port, DTP was used to negotiate the frame tagging method of ISL, and the
native VLAN is the default of 1.
Which statement is
true regarding virtual local area networks (VLANs)?
A. VLANs are location dependent.
B. VLANs are limited to a single switch.
C. VLANs may be subnets of major networks.
D. VLANs define collision domains.
·
C. VLANs are not
location dependent and can span to multiple switches using trunk links.
Moreover, they can be subnets of major networks.
What is the purpose of
frame tagging in virtual LAN (VLAN) configurations?
A. Inter-VLAN routing
B. Encryption of network packets
C. Frame identification over trunk links
D. Frame identification over access links
·
C. Frame tagging is
used when VLAN traffic travels over a trunk link. Trunk links carry frames for
multiple VLANs. Therefore, frame tags are used for identification of frames
from different VLANs.
Write the command to
create VLAN 2 on a layer 2 switch. Write only the command and not the prompt.
·
#vlan 2 To configure
VLANs on a Cisco Catalyst switch, use the global config vlan command.
Which statement is
true regarding 802.1q frame tagging?
A. 802.1q adds a 26-byte trailer and 4-byte header.
B. 802.1q uses a native VLAN.
C. The original Ethernet frame is not modified.
D. 802.1q only works with Cisco switches.
·
B. 802.1q uses the
native VLAN.
Write the command that
prevents an interface from generating DTP frames. Write only the command and
not the prompt.
·
switchport nonegotiate
You can use this command only when the interface switchport mode is access or
trunk. You must manually configure the neighboring interface as a trunk
interface to establish a trunk link.
Network Activity Logs
·
HIDS/NIDS logs
2. Firewall logs
3. Router logs
4. Load Balancer logs
5. Switch logs