A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?
A crossover cable should be used in place of the straight-through cable.
A rollover cable should be used in place of the straight-through cable.
The subnet masks should be set to 255.255.255.192.
A default gateway needs to be set on each host.
The subnet masks should be set to 255.255.255.0.
Options
A. 1 only
B. 2 only
C. 3 and 4 only
D. 1 and 5 only
E. 2 and 5 only
Correct Answer
1 and 5 only
Explanation
First, if you have two hosts directly connected, as shown in the graphic, then you need a crossover cable. A straight-through cable won't work. Second, the hosts have different masks, which puts them in different subnets. The easy solution is just to set both masks to 255.255.255.0 (/24).
Subnetting problems
Search Results
1. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.
2. Using the illustration from the previous question, what would be the IP address of S0 if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question.
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes our host range 17-30. 30 is the last valid host.
3. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet.
4. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
5. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet.
6. Which command will show you the IOS version running on your router?
The best answer is
show version, which shows you the IOS file running currently on your router. The
show flash command shows you the contents of flash memory, not which file is running.
7. What does the command o/r 0x2142 provide?
Options
A. It is used to restart the router.
B. It is used to bypass the configuration in NVRAM.
Correct Answer: It is used to bypass the configuration in NVRAM.
Explanation:
The default configuration setting is
0x2102, which tells the router to load the IOS from flash and the configuration from NVRAM.
0x2142 tells the router to bypass the configuration in NVRAM so that you can perform password recovery.
8. Which command loads a new version of the Cisco IOS into a router?
The command
copy tftp flash will allow you to copy a new IOS into flash memory on your router.
9. A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images?
The
show flash command will provide you with the current IOS name and size and the size of flash memory.
10. You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?
The command
traceroute (trace for short), which can be issued from user mode or privileged mode, is used to find the path a packet takes through an internetwork and will also show you where the packet stops because of an error on a router.