The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?
Options
A. RAM should be erased and the router restarted.
B. Flash should be erased and the router restarted.
C. NVRAM should be erased and the router restarted.
D. The new configuration should be entered and saved.
Correct Answer
NVRAM should be erased and the router restarted.
Explanation
Before you start to configure the router, you should erase the NVRAM with the
erase startup-config command and then reload the router using the
reload command.
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
3. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?
Options
A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution
Correct Answer: Floods the network with the frame looking for the device
Explanation:
Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device.
4. Which of the following types of connections can use full duplex?
Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
5. What is the maximum distance with maximum data rate for 802.11a?
Correct Answer: ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
Explanation:
The command
ip nat pool <name> creates the pool that hosts can use to get onto the global Internet. What makes option B correct is that the range 171.16.10.65 through 171.16.10.94 includes 30 hosts, but the mask has to match 30 hosts as well, and that mask is 255.255.255.224. Option C is wrong because the pool name has a lower case "T" in the pool name. Pool name's are case sensitive.
7. To enable EIGRP, which of the following would you use?
Unlike RIPng and OSPFv3, you need to configure EIGRP both from global configuration mode and from interface mode, and you have to enable the command with the
no shutdown command.
8. Which of the following is true regarding access lists applied to an interface?
Options
A. You can place as many access lists as you want on any interface until you run out of memory.
B. You can apply only one access list on any interface.
C. One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
D. You can apply two access lists to any interface.
Correct Answer: One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
Explanation:
A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface.
9. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.
10. Which of the following protocols are used to configure trunking on a switch?