CISCO Cyberops Security Fundamentals Section 02: Network Infrastructure (Q 1-10)

10 Questions | Total Attempts: 293

SettingsSettingsSettings
CISCO Quizzes & Trivia

.


Questions and Answers
  • 1. 
    When using DHCP with LWAP devices, which one of the following is option 43 used for?
    • A. 

      To identify the default gateway

    • B. 

      To assign a fallback IP address

    • C. 

      To supply the specific WLAN controllers IP address

    • D. 

      To supply the specific NAME server IP address

  • 2. 
    Which two of the following DHCP messages are always sent as broadcast? (Choose two.)
    • A. 

      DHCPOFFER

    • B. 

      DHCPDISCOVER

    • C. 

      DHCPREQUEST

    • D. 

      DHCPACK

  • 3. 
    In the address 172.16.55.87 /20, what does the /20 indicate?
    • A. 

      The subnet can accommodate 20 hosts per network

    • B. 

      /20 is the prefix length: the first 20 bits are the network address; the remaining 12 bits are the host portion

    • C. 

      This subnet is the 20th usable range

    • D. 

      This IP address is the 20th usable IP in the range

  • 4. 
    Which two of the following options are potential problems with a large single broadcast domain? (Choose two.)
    • A. 

      Large amounts of broadcast traffic consume resources.

    • B. 

      All PCs share the same collision domain.

    • C. 

      Layer 3 routing overhead is high.

    • D. 

      It is difficult to apply security policies because there are no boundaries between devices.

  • 5. 
    How many usable subnets and hosts per subnet are available in the 192.168.1.0 network address with a 255.255.255.240 mask?
    • A. 

      2 usable subnets and 126 hosts per subnet

    • B. 

      4 usable subnets and 62 hosts per subnet

    • C. 

      8 usable subnets and 30 hosts per subnet

    • D. 

      16 usable subnets and 14 hosts per subnet

    • E. 

      32 usable subnets and 6 hosts per subnet

  • 6. 
    Which one of the following devices operates strictly at the physical layer?
    • A. 

      Switches

    • B. 

      Hubs

    • C. 

      Routers

    • D. 

      Bridges

  • 7. 
    Which one of the following options is the main purpose for using spanning tree protocol?
    • A. 

      Layer 2 routing protocol

    • B. 

      Layer 2 loop prevention protocol

    • C. 

      Layer 2 frame speed double verification protocol

    • D. 

      Layer 3 routing protocol

  • 8. 
    Which one of the following statements is true regarding STP?
    • A. 

      STP is used to defend against spoofing attacks.

    • B. 

      STP is used to maintain the VLAN configuration consistency across the Layer 2 network.

    • C. 

      STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.

    • D. 

      STP is used to negotiate whether an interconnection between two switches should be put into access or trunk mode.

    • E. 

      STP is used to detect the loss of bidirectional communication on a link.

  • 9. 
    Which two of the following statements are true regarding standalone and lightweight access points? (Choose two.)
    • A. 

      Lightweight access points are self-contained, each offering one or more fully functional BSSs.

    • B. 

      Standalone access points can be configured one-by-one and offer complete functionality by themselves.

    • C. 

      Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.

    • D. 

      Lightweight access points are also known as autonomous access points.