Search Header Logo

ICT169 session 8-2

Authored by Shaun Matthews

Instructional Technology

University

Used 3+ times

ICT169 session 8-2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

Media Image

What action will router take when it receives packet destined for 192.168.10.25?

(Examine routing table in image)

packet will be forwarded to 192.168.1.202 via Serial0/0

forward the packet to 198.18.0.0/24 via FastEthernet0/0.

forward the packet to 192.168.1.206 via Serial0/0/0.

drop the packet because there is no route for 192.168.10.25 in the routing table.

2.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A network engineer issues the show cdp neighbor command on several network devices during the process of network documentation.

What is the purpose of performing this command?

to obtain information about directly connected cisco devices

to verify the network addresses that are attached to the network devices

to check the networks that are advertised by the neighbouring routers

to check the connectivity of PC's that are connected to the network devices

3.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

What does the SPF algorithm consider to be the best path to a network?

The path with the least number of hops

The path with the smallest delays

The path that includes the fastest cumulative bandwidth links

The path that includes the fastest single bandwidth link

4.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A technician is currently troubleshooting an OSPF connection in a corporate network.

The symptom they've observed is a significant delay in routing updates between two neighbouring routers.

Despite configuration checks and interface status verifications, the routing updates seem to be taking an unusually long time to propagate.

Select the most suitable initial course of action to attempt to resolve the issue.

Increase the OSPF hello and dead timers to allow for more frequent neighbour checks and faster detection of link failures.

Verify that the network links between the routers are stable and that there are no physical issues or excessive packet drops.

Check for any access control lists (ACLs) or firewall rules that may be blocking OSPF traffic between the routers.

Ensure that the OSPF process ID and area IDs match on both routers, as OSPF neighbours won't form if these values are mismatched.

Examine the CPU and memory utilization on the routers to ensure that they are not overloaded, as high resource usage can lead to slow OSPF updates.

5.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol.

What does the router OSPF process use to assign the router ID?

the highest IP address on the LAN interfaces

the highest IP address that is configured on the WAN interfaces

the IP address of the interface that is configured with priority 0

the OSPF area ID that is configured on the interface with the highest IP address

the loopback interface IP address

6.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

R1 is a router in a network, and it has two serial connections. One serial connection (Serial0/0/0) is connected to R2, while the other serial connection (Serial0/0/1) is connected to R3. R1 also has a LAN interface connected to a network of host PCs.

The technician logs onto R1 remotely to check the network status and notices that the serial connection (Serial0/0/0) to R2 is down. However, the serial connection (Serial0/0/1) to R3 is up and functioning correctly. The LAN interface is also operational, allowing the host PCs to communicate within the network.

The technician's task is to diagnose and resolve the issue with the downed serial connection to R2

A

B

C

D

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is a security feature of using NAT on a network?

denies all packets that originate from private IP addresses

allows internal IP addresses to be concealed from external users

allows external IP addresses to be concealed from internal users

denies all internal hosts from communicating outside their own network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?