A Learning Portal from Recruitment India
What are the characteristics of TCP?
Connectionless, error-checking, reliable
Connection-oriented, error-checking, unreliable
Connectionless, no error-checking, unreliable
Connection-oriented, error-checking, reliable
Answer with explanation
Answer: Option DExplanation
The correct answer is Connection-oriented, error-checking, reliable
Workspace
Which of the four Gateway Load Balancing Protocol (GLBP) configured routers will respond to client ARP requests?
It will depend on the GLBP configuration of all router members
The active virtual gateway (AVG) will reply with one of four virtual MAC addresses
All GLBP members will reply with one of four possible MAC addresses
The active virtual gateway (AVG) will reply using its own MAC address
Answer with explanation
Answer: Option DExplanation
The correct answer is The active virtual gateway (AVG) will reply with one of four virtual MAC addresses
With GLBP, routers are configured as members of the GLBP group to help load balance traffic. The of the four maximum GLBP member routers, active virtual gateway (AVG) is the most used. The AVG is responsible for replying to ARP requests to local hosts such as workstations, servers, etc., using one of four (in our example) virtual MAC addresses that correspond to different routers
Workspace
What is the reason the interface status below shows as “administratively down, line protocol down”?
Router# show interface s0/1
Serial 0/1 is administratively down, line protocol is down
There is a problem with the other end of the cable
An incorrect cable has been used to connect the interface
Interface serial 0/1 has been incorrectly configured
The administrator has issued the “shutdown” command under interface s0/1
Answer with explanation
Answer: Option DExplanation
The correct answer is The administrator has issued the “shutdown” command under interface s0/1
The output “administratively down” shows that the interface has been manually placed in a downstate, therefore has been forcibly shut down
Workspace
Identify which of the following is a valid IPv6 address:
2131::160F::9B0:888A:110B
2801:3FB9:0:555H::87B:832B
2201:0BB8:0000:330B:0000:0000:09GC:353C
2631:0:139B::8C0:876A:630C
Answer with explanation
Answer: Option DExplanation
The correct answer is 2631:0:139B::8C0:876A:630C
IPv6 addresses are 128-bit hexadecimal addresses. Therefore, letters such as “G” and “H” contained in the second and third answers are invalid. The fourth answer contains two semi-columns “::”, which is also invalid, as the semi-column can only be used once in an IPv6 address.
More information on IPv6 can be found on Firewall. cx’s analysis of IPv6 Protocol structure and IPv6 subnetting.
Workspace
Which of the following commands is used to encrypt all plain-text passwords on a Cisco router?
Router# service password-encryption
Router (config)# service password-encryption
Router (config)# password-encryption
Router# password-encryption
Answer with explanation
Answer: Option AExplanation
The correct answer is Router (config)# service password-encryption
The service password-encryption command will automatically encrypt all text-based passwords on your Cisco router and switch. The service password-encryption command is also part of the AutoSecure process and it is considered an essential command for securing Cisco routers.
Workspace
Which of the following will refresh all DHCP leases?
Ifconfig /renew
Nslookup -r
Ipconfig /registerdns
Ipconfig /renew
Answer with explanation
Answer: Option CExplanation
The correct answer is Ipconfig /registerdns
ipconfig /renew wil renew the IP address for the specified adapter. /renew is not a valid option for ifconfig. -r is not a valid option for nslookup.
Workspace
What is the function of DNS?
Maintains distributed directory information services
Translates name to numerical IP address
Networking protocol for clock synchronization
Allocates IP addresses
Answer with explanation
Answer: Option BExplanation
The correct answer is Translates name to numerical IP address
Workspace
What would UDP be used for?
VoIP
Downloading
File sharing
Answer with explanation
Answer: Option AExplanation
The correct answer is VoIP
File-sharing, downloading, and e-mail requires error-free guaranteed delivery so they use TCP. VoIP needs fast data transmission and does not require error-checking so it uses UDP
Workspace
How many bits are in an MPLS label?
20
16
10
9
Answer with explanation
Answer: Option AExplanation
Workspace
What is a reason that internal security threats might cause greater damage to an organization than external security threats?
Internal users have better hacking skills.
Internal users have direct access to the infrastructure devices.
Internal users can access the corporate data without authentication.
Internal users can access the infrastructure devices through the Internet.
Answer with explanation
Answer: Option BExplanation
The correct answer is Internal users have direct access to the infrastructure devices.
Workspace
What is an example of “hacktivism”?
A country tries to steal defense secrets from another country by infiltrating government networks.
Criminals use the Internet to attempt to steal money from a banking company.
A teenager breaks into the webserver of a local newspaper and posts a picture of a favorite cartoon character.
A group of environmentalists launches a denial of service attack against an oil company that is responsible for a large oil spill.
Answer with explanation
Answer: Option DExplanation
The correct answer is A group of environmentalists launches a denial of service attack against an oil company that is responsible for a large oil spill.
Workspace