Which address type does a switch use to make selective forwarding decisions.


In which two ways does TCP differ from UDP. (Choose two.)


Under which circumstance should a network administrator implement one way NAT.


Which destination IP address can a host use to send one message to multiple devices across differentsubnets.


Which option must occur before a workstation can exchange HTTP packets with a web server.


Refer to the exhibit. Which statement describes the effect of this configuration.


Which route source code represents the routing protocol with a default administrative distance of 90 in the rout ...


Refer to the exhibit. A TFTP server has recently been instated in the Atlanta office. The network administrator ...


On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor. ...


Which statement about a router on a stick is true.


Which routing protocol has the smallest default administrative distance.


Two hosts are attached to a switch with the default configuration. Which statement about the configuration is tr ...


Which MTU size can cause a baby giant error.


Which statement about static routes is true.


Which two statements describe the IP address 10.16.3.65/23. (Choose two.)


Which NAT type is used to translate a single inside address to a single outside address.


Which option is a valid hostname for a switch.


Which function enables an administrator to route multiple VLANs on a router.


Which NTP command configures the local device as an NTP reference clock source.


Which RFC was created to alleviate the depletion of IPv4 public addresses.


A workstation has just resolved a browser URL to the IP address of a server. Which protocol will the workstation ...


What is the default lease time for a DHCP binding.


When a router makes a routing decision for a packet that is received from one network and destined to another, w ...


Which device allows users to connect to the network using a single or double radio.


Which entity assigns IPv6 addresses to end users.


Refer to the exhibit. Which command is simplest to configure routing between the regional office network 10.89. ...


What is one requirement for interfaces to run IPv6.


Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives ...


Which network topology allows all traffic to flow through a central hub.


Which two statements are true regarding ICMP packets. (Choose two.)


Which method does a connected trunk port use to tag VLAN traffic.


On which type of device is every port in the same collision domain.


Which option is the default switch port port security violation mode.


Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administ ...


Which statement about native VLAN traffic is true.


Which value is indicated by the next hop in a routing table.


Which component of the routing table ranks routing protocols according to their preferences.


At which layer of the OSI model does the protocol that provides the information that is displayed by the show cd ...


Which statement about unicast frame forwarding on a switch is true.


By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled. ...


Which dynamic routing protocol uses only the hop count to determine the best path to a destination.


Refer to the exhibit. The exhibit is showing the topology and the MAC address table. Host A sends a data frame ...


Refer to the exhibit. If the resume command is entered after the sequence that is shown in the exhibit, which r ...


Which component of a routing table entry represents the subnet mask.


Which technology supports the stateless assignment of IPv6 addresses.


When enabled, which feature prevents routing protocols from sending hello messages on an interface.


Refer to the exhibit. If CDP is enabled on all devices and interfaces, which devices will appear in the output ...


Configuration of which option is required on a Cisco switch for the Cisco IP phone to work.


Which two of these functions do routers perform on packets. (Choose two.)


Which statement about the inside interface configuration in a NAT deployment is true.


You have configured the host computers on a campus LAN to receive their DHCP addresses from the local router to ...


The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols o ...


Which three statements are true about the operation of a full duplex Ethernet network. (Choose three.)


Which Ethernet interface command is present when you boot a new Cisco router for the first time.


After you configure a default route to the Internet on a router, the route is missing from the routing table. Wh ...


Which table displays the MAC addresses that are learned on a switch.


Why would a network administrator configure port security on a switch.


Refer to the exhibit. A network has been planned as shown. Which three statements accurately describe the areas ...


Which two things does a router do when it forwards a packet. (Choose two.)


Which two statements describe the operation of the CSMA/CD access method. (Choose two.)


Which set of conditions comprises a successful ping attempt between two connected routers configured with IP add ...


Which NTP concept indicates the distance between a device and the reliable time source.


Which statement is a Cisco best practice for switch port security.


Which statement about unique local IPv6 addresses is true.


Which three statements accurately describe CDP. (Choose three.)


Which statement describes the effect of the overload keyword in the ip nat inside source list 90 interface ether ...


Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At ...


On a live network, which two commands will verify the operational status of router interfaces. (Choosetwo.)


Which two options will help to solve the problem of a network that is suffering a broadcast storm. (Choosetwo.) ...


Which technique can you use to route IPv6 traffic over an IPv4 infrastructure.


Which NAT command can be applied to an interface.


Which subnet address is for the IP address 172.19.20.23/28.


Which protocol verifies connectivity between two switches that are configured with IP addresses in thesame networ ...


Which command displays the number of times that an individual router translated an inside address to anoutside ad ...


On which OSI layer does a VLAN operate.


What is the subnet address of 192.168.1.42 255.255.255.248.


Which statement describes the effect of the copy run start command on a router in enable mode.


Which statement describes the effect of the exec timeout 30 command.


Which statement about the default switch configuration for remote access managements is true.


Which two VLANs are reserved for system use only. (Choose two.)


In which circumstance is static routing most useful.


Which information is used to install the best route to a destination in IP routing table.


Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202 ...


Which sequence begins a unique local IPv6 address in binary notation.


If a host experiences intermittent issues that relate to congestion within a network while remaining connected, ...


A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broa ...


Which network configuration can you use to segregate broadcast traffic for two different departments in your org ...


Which keyword in a NAT configuration enables the use of one outside IP address for multiple inside hosts.


Which NAT term is defined as a group of addresses available for NAT use.


Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrat ...


Refer to the exhibit. The network administrator is testing connectivity from the branch router to the newly inst ...


Refer to the topology and switching table shown in the graphic. Host B sends a frame to Host C . Which option de ...


An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC ...


Which port security feature allows a switch to learn MAC addresses dynamically and add them to the running conf ...


Which statement about 6to4 tunneling is true.


An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Which two ad ...


Which adverse situation can occur if an Ethernet cable is too long.


Which statement about NTP is true.


Which statement about routing protocols is true.


Refer to the exhibit. Which feature is enabled by this configuration.


Which statement about DHCP address pools is true.


How does a Layer 2 switch differ from a hub.


Which feature automatically disables Cisco Express Forwarding when it is enabled.


How does a switch differ from a hub.


Refer to the exhibit. Host A is sending a packet to Host B for the first time. What destination MAC address will ...


The network manager has requested a 300 workstation expansion of the network. The workstations are to be instal ...


What are two common TCP applications. (Choose two.)


Refer to the exhibit. SwitchA receives the frame with the addressing shown in the exhibit. According to the com ...


What does a host on an Ethernet network do when it is creating a frame and it does not have the destination addr ...


Refer to the exhibit. The ports that are shown are the only active ports on the switch. The MAC address table is ...


Refer to the exhibit. What must be configured to establish a successful connection from Host A to switch SW A t ...


A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MA ...


Which two characteristics apply to Layer 2 switches. (Choose two.)


Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface. (Choose ...


Which two characteristics describe the access layer of the hierarchical network design model. (Choose two.) ...


What is the purpose of assigning an IP address to a switch.


What is the subnet address of 172.16.159.159/22.


What is the network address for the host with IP address 192.168.23.61/28.


What is the best practice when assigning IP addresses in a small office of six hosts.


Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on e ...


Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224.


An administrator is in the process of changing the configuration of a router. What command will allow the admini ...


Which router command will configure an interface with the IP address 10.10.80.1/19.


Refer to the exhibit. Which two statements are correct. (Choose two.)


Refer to the exhibit. Host A can communicate with Host B but not with Hosts C or


What does administrative distance refer to.


Which IOS command is used to initiate a login into a VTY port on a remote router.


In the configuration of NAT, what does the keyword overload signify.


What happens when computers on a private network attempt to connect to the Internet through a Cisco router runni ...


When configuring NAT, which address translation type is considered the Internet interface.


The ip helper address command does what.


Refer to the exhibit. The network administrator made the entries that are shown and then saved the configurati ...


The following commands are entered on the router: Burbank(config) #enable secret fortress Burbank(config) #line ...


What is the effect of using the service password encryption command.


A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security ...


How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1.


Refer to the exhibit. A network administrator has configured a Catalyst 2950 switch for remote management by p ...


Refer to the exhibit. The junior network support staff provided the diagram as a recommended configuration for ...


Which OSI layer header contains the address of a destination host that is on another network.


Which layer of the TCP/IP stack combines the OSI model physical and data link layers.


Which protocol uses a connection oriented service to deliver files between end systems.


Refer to the exhibit. If the hubs in the graphic were replaced by switches, what would be virtually eliminated. ...


Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the f ...


Refer to the exhibit. HostX is transferring a file to the FTP server. Point A represents the frame as it goes ...


Which network device functions only at Layer 1 of the OSI model.


Refer to the exhibit. The host in Kiev sends a request for an HTML document to the server in Minsk. What will b ...


Refer to the exhibit. As packets travel from Mary to Robert, which three devices will use the destination MAC a ...


Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series o ...


Refer to the exhibit. A network device needs to be installed in the place of the icon labeled Network Device to ...


Which transport layer protocol provides best effort delivery service with no acknowledgment receipt required. ...


Which layer of the OSI model controls the reliability of communications between network devices using flow contr ...


Refer to the output of the corporate router routing table shown in the graphic. The corporate router receives an ...


An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the ...


What is the default administrative distance of the OSPF routing protocol.


Refer to the exhibit. The output is from a router in a large enterprise. From the output, determine the role o ...


Which command can you use to manually assign a static IPV6 address to a router interface.


The network administrator is using a Windows PC application that is called putty.exe for remote communication to ...


What should be part of a comprehensive network security plan.


Which two of these statements are true of IPv6 address representation. (Choose two.)


A network administrator cannot connect to a remote router by using SS