0% found this document useful (0 votes)
33 views11 pages

Kuis Jarkom 2 Pert 9-15

Uploaded by

naenrolubis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views11 pages

Kuis Jarkom 2 Pert 9-15

Uploaded by

naenrolubis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Question 1

Answer saved
Marked out of 1.00

Flag question

Question text

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs
could be created and applied to it?
Select one:
a. 8
b. 6
c. 4
d. 16

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

What single access list statement matches all of the following networks?
192.168.16.0,192.168.17.0,192.168.18.0,192.168.19.0
Select one:
a. access-list 10 permit 192.168.16.0 0.0.0.255
b. access-list 10 permit 192.168.0.0 0.0.15.255
c. access-list 10 permit 192.168.16.0 0.0.3.255
d. access-list 10 permit 192.168.16.0 0.0.15.255
Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

On which router should the show access-lists command be executed?


Select one:
a. on the router that has the ACL configured
b. on the router that routes the packet referenced in the ACL to the final destination
network
c. on the router that routes the packet referenced in the ACL from the source network
d. on any router through which the packet referenced in the ACL travels

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

Which statement describes a difference between the operation of inbound and


outbound ACLs?
Select one:
a. On a network interface, more than one inbound ACL can be configured but only one
outbound ACL can be configured.
b. In contrast to outbound ALCs, inbound ACLs can be used to filter packets with
multiple criteria.
c. Inbound ACLs can be used in both routers and switches but outbound ACLs can be
used only on routers.
d. Inbound ACLs are processed before the packets are routed while outbound ACLs are
processed after the routing is completed.
Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

Which address is required in the command syntax of a standard ACL?


Select one:
a. source IP address
b. destination IP address
c. source MAC address
d. destination MAC address

Question 6
Answer saved
Marked out of 1.00

Flag question

Question text

In which configuration would an outbound ACL placement be preferred over an inbound


ACL placement?
Select one:
a. when the ACL is applied to an outbound interface to filter packets coming from
multiple inbound interfaces before the packets exit the interface
b. when an interface is filtered by an outbound ACL and the network attached to the
interface is the source network being filtered within the ACL
c. when a router has more than one ACL
d. when an outbound ACL is closer to the source of the traffic flow
Question 1
Answer saved
Marked out of 1.00

Flag question

Question text

Which address does a DHCPv4 server target when sending a DHCPOFFER message to a
client that makes an address request?
Select one:
a. gateway IP address
b. client hardware address
c. client IP address
d. broadcast MAC address

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a
DHCP server?
Select one:
a. broadcast DHCPACK
b. broadcast DHCPREQUEST
c. unicast DHCPACK
d. unicast DHCPREQUEST
Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

As a DHCPv4 client lease is about to expire, what is the message that the client sends
the DHCP server?
Select one:
a. DHCPOFFER
b. DHCPACK
c. DHCPDISCOVER
d. DHCPREQUEST

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited
lease period?
Select one:
a. dynamic allocation
b. manual allocation
c. automatic allocation
d. pre-allocation
Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

A company uses DHCP servers to dynamically assign IPv4 addresses to employee


workstations. The address lease duration is set as 5 days. An employee returns to the
office after an absence of one week. When the employee boots the workstation, it
sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination
addresses will the message contain?
Select one:
a. FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
b. FF-FF-FF-FF-FF-FF and 255.255.255.255
c. MAC address of the DHCP server and 255.255.255.255
d. both MAC and IPv4 addresses of the DHCP server

Question 1
Answer saved
Marked out of 1.00

Flag question

Question text

A network administrator is configuring a static NAT on the border router for a web
server located in the DMZ network. The web server is configured to listen on TCP port
8080. The web server is paired with the internal IP address of 192.168.5.25 and the
external IP address of 209.165.200.230. For easy access by hosts on the Internet,
external users do not need to specify the port when visiting the web server. Which
command will configure the static NAT?
Select one:
a. R1(config)# ip nat inside source static tcp 192.168.5.25 8080 209.165.200.230 80
b. R1(config)# ip nat inside source static tcp 209.165.200.230 8080 192.168.5.25 80
c. R1(config)# ip nat inside source static tcp 192.168.5.25 80 209.165.200.230 8080
d. R1(config)# ip nat inside source static tcp 209.165.200.230 80 192.168.5.25 8080

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

A network engineer has configured a router with the command ip nat inside source list
4 pool corp overload. Why did the engineer use the overload option?
Select one:
a. The company has a small number of servers that should be accessible by clients from
the Internet.
b. The company needs to have more public IP addresses available to be used on the
Internet.
c. The company router must throttle or buffer traffic because the processing power of
the router is not enough to handle the normal load of external-bound Internet traffic.
d. The company has more private IP addresses than available public IP addresses.

Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

What is the major benefit of using NAT with Port Address Translation?
Select one:
a. It improves network performance for real-time protocols.
b. It provides a pool of public addresses that can be assigned to internal hosts.
c. It allows many internal hosts to share the same public IPv4 address.
d. It allows external hosts access to internal servers.

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

What is the purpose of port forwarding?


Select one:
a. Port forwarding allows an internal user to reach a service on a public IPv4 address
that is located outside a LAN.
b. Port forwarding allows an external user to reach a service on a private IPv4 address
that is located inside a LAN.
c. Port forwarding allows users to reach servers on the Internet that are not using
standard port numbers.
d. Port forwarding allows for translating inside local IP addresses to outside local
addresses.

Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

Which method is used by a PAT-enabled router to send incoming packets to the correct
inside hosts?
Select one:
a. It uses the source IP address on the incoming packet.
b. It uses the source TCP or UDP port number on the incoming packet.
c. It uses a combination of the source TCP or UDP port number and the destination IP
address on the incoming packet.
d. It uses the destination TCP or UDP port number on the incoming packet.

Question 1
Answer saved
Marked out of 1.00

Flag question

Question text

What statement describes a Cisco IOS image with the “universalk9_npe” designation for
Cisco ISR G2 routers?
Select one:
a. It is an IOS version that, at the request of some countries removes any strong
cryptographic functionality
b. It is an IOS version that can only be used in the United States of Amenca
c. It is an IOS version that provides only the IPBase feature set
d. It Is an IOS version that offers all of the Cisco IOS Software feature sets

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

A ping fails when performed from router R1 to directly connected router R2. The
network administrator then proceeds to issue the show cdp neighbors command. Why
would the network administrator issue this command if the ping failed between the two
routers?
Select one:
a. The network administrator wants to determine if connectivity can be established from
a non-directly connected network.
b. The network administrator wants to verify Layer 2 connectivity.
c. The network administrator wants to venfy the IP address configured on router R2.
d. The network administrator suspects a virus because the ping command did not work.

Question 3
Answer saved
Marked out of 1.00
Flag question

Question text

What is used as the default event logging destination for Cisco routers and switches?
Select one:
a. terminal line
b. console line
c. syslog server
d. workstation

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for
installing additional technology pack licenses?
Select one:
a. UC
b. DATA
c. SEC
d. IPBase

Question 5
Answer saved
Marked out of 1.00

Flag question
Question text

What is the major release number in the IOS image name c1900-universalk9-
mz.SPA.152-3.T.bin?
Select one:
a. 52
b. 1900
c. 15
d. 2

You might also like