logo

CuriousTab

CuriousTab

Discussion


Home Networking IPv6 See What Others Are Saying!
  • Question
  • Which of the following is true when describing an anycast address?


  • Options
  • A. Packets addressed to a unicast address are delivered to a single interface.
  • B. Packets are delivered to all interfaces identified by the address. This is also called one-to-many addresses.
  • C. This address identifies multiple interfaces and the anycast packet is only delivered to one address. This address can also be called one-to-one-of-many.
  • D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.

  • Correct Answer
  • This address identifies multiple interfaces and the anycast packet is only delivered to one address. This address can also be called one-to-one-of-many. 

    Explanation
    Anycast addresses identify multiple interfaces, which is the same as multicast; however, the big difference is that the anycast packet is only delivered to one address, the first one it finds defined in the terms of routing distance. This address can also be called one-to-one-of-many.

  • More questions

    • 1. What are two purposes for segmentation with a bridge?

      1. To add more broadcast domains.
      2. To create more collision domains.
      3. To add more bandwidth for users.
      4. To allow more broadcasts for users.

    • Options
    • A. 1 only
    • B. 2 and 3
    • C. 2 and 4
    • D. 4 only
    • Discuss
    • 2. Why does the data communication industry use the layered OSI reference model?

      1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
      2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
      3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.
      4. It encourages industry standardization by defining what functions occur at each layer of the model.

    • Options
    • A. 1 only
    • B. 1 and 4
    • C. 2 and 3
    • D. 3 only
    • Discuss
    • 3. Which of the following allows a router to respond to an ARP request that is intended for a remote host?

    • Options
    • A. Gateway DP
    • B. Reverse ARP (RARP)
    • C. Proxy ARP
    • D. Inverse ARP (IARP)
    • Discuss
    • 4. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?

      1. The command is used to establish a static route.
      2. The default administrative distance is used.
      3. The command is used to configure the default route.
      4. The subnet mask for the source address is 255.255.255.0.

    • Options
    • A. 1 and 2
    • B. 2 and 4
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 5. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?

    • Options
    • A. 0x2100
    • B. 0x2101
    • C. 0x2102
    • D. 0x2142
    • Discuss
    • 6. Which of the following network types have a designated router and a backup designated router assigned?

      1. Broadcast
      2. Point-to-point
      3. NBMA
      4. NBMA point-to-point

    • Options
    • A. 1, 2 and 3
    • B. 1 and 3
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 7. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

    • Options
    • A. You must type the show ip rip command first.
    • B. IP addressing on the network is incorrect.
    • C. You must use the terminal monitor command.
    • D. Debug output is sent only to the console.
    • Discuss
    • 8. Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.

    • Options
    • A. 192.168.10.142
    • B. 192.168.10.66
    • C. 192.168.100.254
    • D. 192.168.10.143
    • E. 192.168.10.126
    • Discuss
    • 9. What are the two main types of access control lists (ACLs)?

      1. Standard
      2. IEEE
      3. Extended
      4. Specialized

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 3 and 4
    • D. 1 and 2
    • Discuss
    • 10. What does the command o/r 0x2142 provide?

    • Options
    • A. It is used to restart the router.
    • B. It is used to bypass the configuration in NVRAM.
    • C. It is used to enter ROM Monitor mode.
    • D. It is used to view the lost password.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment