They can provide hosts with information about network problems.
They are encapsulated within IP datagrams.
Options
A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
Correct Answer
3 and 4
Explanation
Internet Control Message Protocol (ICMP) is used to send error messages through the network, but they do not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).
More questions
1. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
Options
A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology
Correct Answer: In an improperly implemented redundant topology
Explanation:
If the Spanning Tree Protocol is not running on your switches and you connect them together with redundant links, you will have broadcast storms and multiple frame copies.
2. What is the purpose of Spanning Tree Protocol in a switched LAN?
Options
A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
If you have a server or other devices connected into your switch that you're totally sure won't create a switching loop if STP is disabled, you can use something called
portfast on these ports. Using it means the port won't spend the usual 50 seconds to come up while STP is converging.
4. Which of the following commands connect access list 110 inbound to interface ethernet0?
Correct Answer: Router(config-if)# ip access-group 110 in
Explanation:
To place an access list on an interface, use the
ip access-group command in interface configuration mode.
5. You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
First, you must know that a /20 is 255.255.240.0, which is a block size of 16 in the third octet. Counting by 16s, this makes our subnet 48 in the third octet, and the wildcard for the third octet would be 15 since the wildcard is always one less than the block size.
6. Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?
IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model.
7. What protocols are used to configure trunking on a switch?
VTP is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1Q and ISL are used to configure trunking on a port.
8. When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined?
Clocking on a serial interface is always provided by the CSU/DSU (DCE device). However, if you do not have a CSU/DSU in your nonproduction test environment, then you need to supply clocking with the
clock rate command on the serial interface of the router with the DCE cable attached.
9. What are the decimal and hexadecimal equivalents for the binary number 10110111?
You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of
10110111 are
128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits),
1011 and
0111. By add- ing up these values, you get
11 and
7. In hexadecimal,
11 is
B, so the answer is
0xB7.
10. What type of RJ45 UTP cable is used between switches?
Options
A. Straight-through
B. Crossover cable
C. Crossover with a CSU/DSU
D. Crossover with a router in between the two switches