Dest 143 Chapter 1 Quiz Lecture

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Diorey.potestas
D
Diorey.potestas
Community Contributor
Quizzes Created: 1 | Total Attempts: 195
| Attempts: 195 | Questions: 24
Please wait...
Question 1 / 24
0 %
0/100
Score 0/100
1. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?

Explanation

The network administrator should use a cross-over cable to connect two routers directly via their FastEthernet ports. A cross-over cable is used to connect two similar devices, such as two routers or two switches, without the need for a hub or switch in between. It allows for the transmission of data between the devices by crossing over the transmit and receive pins. This is different from a straight-through cable, which is used to connect dissimilar devices, such as a router and a switch. A rollover cable is used to connect a computer to the console port of a router or switch for configuration purposes, while a serial cable is used to connect devices serially.

Submit
Please wait...
About This Quiz
Dest 143 Chapter 1 Quiz Lecture - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?

Explanation

A router changes the Layer 2 source and destination address in the header address information it receives from an attached Ethernet interface before transmitting the information out another interface. This is because Layer 2 addresses are specific to the local network, and as the router forwards the information to a different network, it needs to update the Layer 2 addresses to ensure proper delivery. The Layer 3 source and destination addresses, on the other hand, remain unchanged as they are used for routing the information across different networks.

Submit
3. What is the default sequence for loading the configuration file?

Explanation

The default sequence for loading the configuration file is NVRAM, TFTP, CONSOLE. This means that the router will first check the NVRAM (non-volatile random access memory) for a saved configuration file. If it does not find one, it will then attempt to load the configuration file from a TFTP (Trivial File Transfer Protocol) server. If the TFTP server is not available or the file is not found, the router will prompt the user to enter the configuration manually through the console.

Submit
4. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?

Explanation

The command "Router1(config)# copy running-config startup-config" should be executed to save configuration changes to NVRAM. This command copies the currently running configuration to the startup configuration file, which is stored in NVRAM. This ensures that the new configurations will be saved and loaded automatically the next time the router is powered on.

Submit
5. Which of the following is the correct flow of routines for a router startup?

Explanation

The correct flow of routines for a router startup is to first load the bootstrap, which initializes the router's hardware and software. Then, the router should load the IOS (Internetwork Operating System), which is the main operating system for the router. Finally, the router should apply the configuration, which includes setting up network parameters and protocols. This sequence ensures that the router is properly initialized and configured before it starts operating.

Submit
6. If a router cannot find a valid configuration file during the startup sequence, what will occur?

Explanation

If a router cannot find a valid configuration file during the startup sequence, it will prompt the user for a response to enter setup mode. This means that the router is unable to load a configuration file and requires user input to set up the necessary configurations.

Submit
7. Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)

Explanation

From the routing table output, it can be concluded that the FastEthernet0/0 and Serial0/0/0 interfaces of this router have been configured with an IP address and the "no shutdown" command. This means that these interfaces are operational and ready to forward packets. Additionally, if an IP packet is received by this router with a destination address of 198.18.9.1, it will be forwarded out of the Serial0/0/0 interface.

Submit
8. Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?

Explanation

The cause of the problem is that host 1 and host 2 are on different networks. This means that they are not in the same IP address range and cannot communicate directly with each other. They would require a router to connect the two networks and facilitate communication between the hosts.

Submit
9. Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)

Explanation

Based on the given exhibit, RouterA has a route to the network 192.168.3.0/24 through interface S0/0/1. Therefore, if RouterA receives a packet destined for 192.168.3.146, it will forward it out through interface S0/0/1. Similarly, RouterB has a route to the network 10.5.27.0/24 through interface S0/0/1. Therefore, if RouterB receives a packet destined for 10.5.27.15, it will forward it out through interface S0/0/1.

Submit
10. Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?

Explanation

The output of the running-configuration of a router shows the commands that are currently being used by the router, which determine its current operation. This means that the displayed configuration represents the settings and parameters that are currently active and being used by the router.

Submit
11. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?

Explanation

The most likely problem is that the interfaces on the router have not been enabled with the "no shutdown" command. This command is used to activate the interfaces and bring them up so that they can send and receive traffic. Without this command, the interfaces will remain in a shutdown state and will not be able to communicate with the connected networks or other router interfaces.

Submit
12. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)

Explanation

The three configuration commands that must be made on the Sydney router to establish connectivity with the Melbourne site are:
1. Sydney(config-if)# ip address 201.100.53.2 255.255.255.0: This command assigns the IP address and subnet mask to the interface connecting to the Melbourne site.
2. Sydney(config-if)# no shutdown: This command enables the interface, allowing it to transmit and receive data.
3. Sydney(config-if)# clock rate 56000: This command sets the clock rate for the serial connection, ensuring proper synchronization with the Melbourne site.

Submit
13. Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)

Explanation

Interfaces 1 and 4 could be used for a leased line WAN connection. A leased line is a dedicated point-to-point connection between two locations, typically provided by a telecommunications service provider. Interface 1 and 4 are the only interfaces shown in the exhibit, so they are the only options for a leased line connection.

Submit
14. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?

Explanation

The correct answer is "Router1# copy running-config startup-config". This command is used to save the configuration changes made in the running-config file to the startup-config file in NVRAM. NVRAM is a non-volatile memory that retains the configuration even after a reboot, so saving the changes to NVRAM ensures that the configuration is persistent.

Submit
15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)

Explanation

When a router receives a packet from one network that is destined for another network, it first decapsulates the Layer 3 packet by stripping off the Layer 2 frame header. Then, it uses the destination IP Address in the IP header to look up the next-hop address in the routing table. After that, it encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface. This process allows the router to properly route the packet to its intended destination network.

Submit
16. Which two statements describe characteristics of load balancing? (Choose two.)

Explanation

Load balancing is a technique used to distribute network traffic across multiple paths or links to prevent congestion and optimize resource utilization. The first statement correctly describes load balancing by stating that it allows a router to forward packets over multiple paths to the same destination network. This means that the router can distribute the traffic among different paths to improve performance and reliability. The fourth statement is also correct as it states that EIGRP, a routing protocol, supports unequal cost load balancing. This means that the router can distribute traffic over paths with different metrics, taking into account the varying costs of each path.

Submit
17. Which are functions of a router? (Choose three.)

Explanation

A router performs packet switching by receiving packets from one network and forwarding them to another network. It also segments broadcast domains by dividing a network into smaller subnetworks, preventing broadcast traffic from spreading across the entire network. Additionally, a router selects the best path for forwarding packets based on logical addressing, such as IP addresses, to ensure efficient and reliable communication between networks. It does not select the best path based on physical addressing, as that is the function of switches in a network.

Submit
18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)

Explanation

The output of the "show version" command provides information about the router's startup process. It includes details about the last restart method, such as whether it was a power cycle or a software reload. It also displays the configuration register settings, which determine the router's behavior during startup. Additionally, the output shows the location from where the IOS (Internetwork Operating System) loaded, indicating whether it was loaded from NVRAM or FLASH memory.

Submit
19. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

Explanation

Passwords can be used to restrict access to the VTY interface, console interface, and privileged EXEC mode. The VTY interface is used for remote access to the device, so setting a password for it ensures that only authorized users can access the device remotely. The console interface is the physical connection to the device, so setting a password for it ensures that only authorized users can access the device locally. Privileged EXEC mode is a higher level of access that allows users to make configuration changes, so setting a password for it ensures that only authorized users can make these changes.

Submit
20. From what location can a router load the Cisco IOS during the boot process? (Choose two.)

Explanation

A router can load the Cisco IOS during the boot process from two locations: TFTP server and Flash memory. The TFTP server is a network server that stores the IOS image and can be accessed by the router over the network. The router can also load the IOS from its internal Flash memory, which is a non-volatile storage location on the router itself. This allows the router to boot up and run the IOS without relying on external sources.

Submit
21. What is the outcome of entering these commands?

Explanation

The given commands "line vty 0 4" and "password check123" are used to configure the virtual terminal lines on the router. The command "line vty 0 4" specifies that the configuration is being done on the virtual terminal lines from 0 to 4. The command "password check123" sets the password for these virtual terminal lines to "check123". This password will be used for connecting to the router via Telnet. Therefore, the correct answer is "sets the password to be used for connecting to this router via Telnet".

Submit
22. Which two statements correctly describe the components of a router? (Choose two.)

Explanation

The first statement, "ROM contains diagnostics executed on hardware modules," is correct because ROM (Read-Only Memory) in a router contains built-in diagnostics that are executed to check the functionality of hardware modules during the boot sequence.

The fourth statement, "Flash memory does not lose its contents during a reboot," is also correct because Flash memory is non-volatile, meaning it retains its contents even when the router is rebooted or powered off. This makes it an ideal location for storing the IOS (Internetwork Operating System) and other important files.

Submit
23. Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)

Explanation

When R4 accepts the ping into the Ethernet interface, the two pieces of header information included are the destination IP address: 192.168.10.134 and the destination MAC address: 9999.DADC.1234. These pieces of information are necessary for the packet to be correctly routed to the intended destination (host B). The destination IP address identifies the specific device on the network, while the destination MAC address identifies the specific network interface card (NIC) on that device.

Submit
24. Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.)

Explanation

The router will change the frame type to one supported by the WAN link before forwarding the frame because different types of WAN links require different frame types. The frame was received on the Fa0/0 interface of the router and will be switched to the S0/0/0 interface because the destination MAC address will be used to determine which interface to forward the packet.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 13, 2016
    Quiz Created by
    Diorey.potestas
Cancel
  • All
    All (24)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The network administrator needs to connect two routers directly via...
What header address information does a router change in the...
What is the default sequence for loading the configuration file?
A network administrator has just entered new configurations into...
Which of the following is the correct flow of routines for a router...
If a router cannot find a valid configuration file during the startup...
Refer to the exhibit. What can be concluded from the routing table...
Refer to the exhibit. After host 2 is connected to the switch on the...
Refer to the exhibit. All routers have a route in its routing table to...
Refer to the exhibit. What can be concluded from the output of the...
Refer to the exhibit. The network administrator has configured the...
The serial connection shown in the graphic needs to be configured....
Which interfaces in the exhibit could be used for a leased line WAN...
A network administrator has just entered new configurations into...
What three processes does a router execute when it receives a packet...
Which two statements describe characteristics of load balancing?...
Which are functions of a router? (Choose three.)
What information about the router and its startup process can be...
Passwords can be used to restrict access to all or parts of the Cisco...
From what location can a router load the Cisco IOS during the boot...
What is the outcome of entering these commands?
Which two statements correctly describe the components of a router?...
Refer to the exhibit. Host A pings host B. When R4 accepts the ping...
Refer to the exhibit. The frame shown in the exhibit was received by...
Alert!

Advertisement