logo

CuriousTab

CuriousTab

Discussion


Home Networking IPv6 See What Others Are Saying!
  • Question
  • Which of the following is true when describing a unique local address?


  • Options
  • A. Packets addressed to a unicast address are delivered to a single interface.
  • B. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
  • C. These are like private addresses in IPv4 in that they are not meant to be routed.
  • D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.

  • Correct Answer
  • These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. 

    Explanation
    These addresses are meant for nonrouting purposes like link-local, but they are almost globally unique so it is unlikely they will have an address overlap. Unique local addresses were designed as a replacement for site-local addresses.

  • More questions

    • 1. What is the maximum data rate for the 802.11a standard?

    • Options
    • A. 6Mbps
    • B. 11Mbps
    • C. 22Mbps
    • D. 54Mbps
    • Discuss
    • 2. You type show running-config and get this output:

      [output cut]
      Line console 0
          Exec-timeout 1 35
          Password CURIOUSTABPASSWD
          Login
      [output cut]
      
      What do the two numbers following the exec-timeout command mean?

    • Options
    • A. If no command has been typed in 35 seconds, the console connection will be closed.
    • B. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out.
    • C. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed.
    • D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed.
    • Discuss
    • 3. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

    • Options
    • A. access-list 10 deny 192.168.160.0 255.255.224.0
    • B. access-list 10 deny 192.168.160.0 0.0.191.255
    • C. access-list 10 deny 192.168.160.0 0.0.31.255
    • D. access-list 10 deny 192.168.0.0 0.0.31.255
    • Discuss
    • 4. Which of the following is an example of a standard IP access list?

    • Options
    • A. access-list 110 permit host 1.1.1.1
    • B. access-list 1 deny 172.16.10.1 0.0.0.0
    • C. access-list 1 permit 172.16.10.1 255.255.0.0
    • D. access-list standard 1.1.1.1
    • Discuss
    • 5. You are connecting your access point and it is set to root. What does Extended Service Set ID mean?

    • Options
    • A. That you have more than one access point and they are in the same SSID connected by a distribution system.
    • B. That you have more than one access point and they are in separate SSIDs connected by a distribution system.
    • C. That you have multiple access points, but they are placed physically in different buildings.
    • D. That you have multiple access points, but one is a repeater access point.
    • Discuss
    • 6. Which of the following series of commands will restrict Telnet access to the router?

    • Options
    • A. Lab_A(config)#access-list 10 permit 172.16.1.1
      Lab_A(config)#line con 0
      Lab_A(config-line)#ip access-group 10 in
    • B. Lab_A(config)#access-list 10 permit 172.16.1.1
      Lab_A(config)#line vty 0 4
      Lab_A(config-line)#access-class 10 out
    • C. Lab_A(config)#access-list 10 permit 172.16.1.1
      Lab_A(config)#line vty 0 4
      Lab_A(config-line)#access-class 10 in
    • D. Lab_A(config)#access-list 10 permit 172.16.1.1
      Lab_A(config)#line vty 0 4
      Lab_A(config-line)#ip access-group 10 in
    • Discuss
    • 7. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?

      1. A crossover cable should be used in place of the straight-through cable.
      2. A rollover cable should be used in place of the straight-through cable.
      3. The subnet masks should be set to 255.255.255.192.
      4. A default gateway needs to be set on each host.
      5. The subnet masks should be set to 255.255.255.0.

    • Options
    • A. 1 only
    • B. 2 only
    • C. 3 and 4 only
    • D. 1 and 5 only
    • E. 2 and 5 only
    • Discuss
    • 8. Which of the following describe router functions?

    • Options
    • A. Packet switching
    • B. Packet filtering
    • C. Internetwork communication
    • D. Path selection
    • E. All of the above
    • Discuss
    • 9. Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend?

    • Options
    • A. PPP
    • B. HDLC
    • C. Frame Relay
    • D. ISDN
    • Discuss
    • 10. The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services?

    • Options
    • A. 802.1
    • B. Frame Relay
    • C. HDLC
    • D. PPP
    • E. PAP
    • Discuss


    Comments

    There are no comments.

Enter a new Comment