1 A CLIENT PACKET IS RECEIVED BY A SERVER.
THE PACKET HAS A
DESTINATION PORT NUMBER OF 22. WHAT SERVICE IS THE CLIENT
REQUESTING?
SSH
TFTP
DNS
DHCP
2 TO WHICH TCP PORT GROUP DOES THE PORT 414 BELONG?
PRIVATE OR DYNAMIC
REGISTERED
WELL-KNOWN
PUBLIC
3 REFER TO THE EXHIBIT. WHAT DOES THE VALUE OF THE WINDOW SIZE
SPECIFY?
THE AMOUNT OF DATA THAT CAN BE SENT AT ONE TIME
A RANDOM NUMBER THAT IS USED IN ESTABLISHING A
CONNECTION WITH THE 3-WAY HANDSHAKE
THE AMOUNT OF DATA THAT CAN BE SENT BEFORE AN
ACKNOWLEDGMENT IS REQUIRED
THE TOTAL NUMBER OF BITS RECEIVED DURING THIS TCP
SESSION
4 REFER TO THE EXHIBIT. THE EXHIBIT SHOWS A SMALL SWITCHED
NETWORK AND THE CONTENTS OF THE MAC ADDRESS TABLE OF THE
SWITCH. PC1 HAS SENT A FRAME ADDRESSED TO PC3. WHAT WILL THE
SWITCH DO WITH THE FRAME?
THE SWITCH WILL FORWARD THE FRAME ONLY TO PORTS 1
AND 3.
THE SWITCH WILL FORWARD THE FRAME TO ALL PORTS.
THE SWITCH WILL DISCARD THE FRAME.
THE SWITCH WILL FORWARD THE FRAME TO ALL PORTS
EXCEPT PORT 4.
THE SWITCH WILL FORWARD THE FRAME ONLY TO PORT 2.
5 WHICH DESTINATION ADDRESS IS USED IN AN ARP REQUEST FRAME?
255.255.255.255
THE PHYSICAL ADDRESS OF THE DESTINATION HOST
FFFF.FFFF.FFFF
0.0.0.0
AAAA.AAAA.AAAA
6 REFER TO THE EXHIBIT. PC1 ISSUES AN ARP REQUEST BECAUSE IT
NEEDS TO SEND A PACKET TO PC3. IN THIS SCENARIO, WHAT WILL
HAPPEN NEXT?
RT1 WILL SEND AN ARP REPLY WITH ITS OWN FA0/1 MAC
ADDRESS.
RT1 WILL FORWARD THE ARP REQUEST TO PC3.
SW1 WILL SEND AN ARP REPLY WITH ITS FA0/1 MAC ADDRESS.
RT1 WILL SEND AN ARP REPLY WITH THE PC3 MAC ADDRESS.
RT1 WILL SEND AN ARP REPLY WITH ITS OWN FA0/0 MAC
ADDRESS.
7 WHAT ROUTING TABLE ENTRY HAS A NEXT HOP ADDRESS
ASSOCIATED WITH A DESTINATION NETWORK?
REMOTE ROUTES
C AND L SOURCE ROUTES
LOCAL ROUTES
DIRECTLY-CONNECTED ROUTES
8 WHICH TERM DESCRIBES A FIELD IN THE IPV4 PACKET HEADER THAT
CONTAINS A UNICAST, MULTICAST, OR BROADCAST ADDRESS?
DESTINATION IPV4 ADDRESS
TTL
PROTOCOL
HEADER CHECKSUM
9 IF THE DEFAULT GATEWAY IS CONFIGURED INCORRECTLY ON THE
HOST, WHAT IS THE IMPACT ON COMMUNICATIONS?
THE HOST CAN COMMUNICATE WITH OTHER HOSTS ON
REMOTE NETWORKS, BUT IS UNABLE TO COMMUNICATE WITH
HOSTS ON THE LOCAL NETWORK.
THE HOST IS UNABLE TO COMMUNICATE ON THE LOCAL
NETWORK.
THE HOST CAN COMMUNICATE WITH OTHER HOSTS ON THE
LOCAL NETWORK, BUT IS UNABLE TO COMMUNICATE WITH HOSTS
ON REMOTE NETWORKS.
THERE IS NO IMPACT ON COMMUNICATIONS.
10 WHY IS NAT NOT NEEDED IN IPV6?
ANY HOST OR USER CAN GET A PUBLIC IPV6 NETWORK
ADDRESS BECAUSE THE NUMBER OF AVAILABLE IPV6 ADDRESSES
IS EXTREMELY LARGE.
THE END-TO-END CONNECTIVITY PROBLEMS THAT ARE
CAUSED BY NAT ARE SOLVED BECAUSE THE NUMBER OF ROUTES
INCREASES WITH THE NUMBER OF NODES THAT ARE CONNECTED
TO THE INTERNET.
THE PROBLEMS THAT ARE INDUCED BY NAT APPLICATIONS
ARE SOLVED BECAUSE THE IPV6 HEADER IMPROVES PACKET
HANDLING BY INTERMEDIATE ROUTERS.
BECAUSE IPV6 HAS INTEGRATED SECURITY, THERE IS NO NEED
TO HIDE THE IPV6 ADDRESSES OF INTERNAL NETWORKS.
11 REFER TO THE EXHIBIT. A USER ISSUES THE COMMAND NETSTAT –
R ON A WORKSTATION. WHICH IPV6 ADDRESS IS ONE OF THE LINK-
LOCAL ADDRESSES OF THE WORKSTATION?
2001:0:9D38:6AB8:30D0:115:3F57:FE4C/128
::1/128
FE80::30D0:115:3F57:FE4C/128
FE80::/64
13 WHAT TYPE OF IPV6 ADDRESS IS REPRESENTED BY ::1/128?
GLOBAL UNICAST
EUI-64 GENERATED LINK-LOCAL
UNSPECIFIED
LOOPBACK
14 TWO NETWORK ENGINEERS ARE DISCUSSING THE METHODS USED TO
FORWARD FRAMES THROUGH A SWITCH. WHAT IS AN IMPORTANT
CONCEPT RELATED TO THE CUT-THROUGH METHOD OF SWITCHING?
FRAGMENT-FREE SWITCHING IS THE TYPICAL CUT-THROUGH
METHOD OF SWITCHING.
THE FRAGMENT-FREE SWITCHING OFFERS THE LOWEST LEVEL
OF LATENCY.
PACKETS CAN BE RELAYED WITH ERRORS WHEN FAST-
FORWARD SWITCHING IS USED.
FAST-FORWARD SWITCHING CAN BE VIEWED AS A
COMPROMISE BETWEEN STORE-AND-FORWARD SWITCHING AND
FRAGMENT-FREE SWITCHING.
15 WHAT HAPPENS WHEN A SWITCH RECEIVES A FRAME AND THE
CALCULATED CRC VALUE IS DIFFERENT THAN THE VALUE THAT IS IN
THE FCS FIELD?
THE SWITCH DROPS THE FRAME.
THE SWITCH NOTIFIES THE SOURCE OF THE BAD FRAME.
THE SWITCH FLOODS THE FRAME TO ALL PORTS EXCEPT THE
PORT THROUGH WHICH THE FRAME ARRIVED TO NOTIFY THE
HOSTS OF THE ERROR.
THE SWITCH PLACES THE NEW CRC VALUE IN THE FCS FIELD
AND FORWARDS THE FRAME.
16 WHICH TWO FUNCTIONS ARE PERFORMED AT THE LLC SUBLAYER OF
THE OSI DATA LINK LAYER TO FACILITATE ETHERNET
COMMUNICATION? (CHOOSE TWO.)
ADDS ETHERNET CONTROL INFORMATION TO NETWORK
PROTOCOL DATA
APPLIES SOURCE AND DESTINATION MAC ADDRESSES TO
ETHERNET FRAME
IMPLEMENTS CSMA/CD OVER LEGACY SHARED HALF-DUPLEX
MEDIA
PLACES INFORMATION IN THE ETHERNET FRAME THAT
IDENTIFIES WHICH NETWORK LAYER PROTOCOL IS BEING
ENCAPSULATED BY THE FRAME
INTEGRATES LAYER 2 FLOWS BETWEEN 10 GIGABIT ETHERNET
OVER FIBER AND 1 GIGABIT ETHERNET OVER COPPER
17 WHICH TWO ISSUES CAN CAUSE BOTH RUNTS AND GIANTS IN
ETHERNET NETWORKS? (CHOOSE TWO.)
A MALFUNCTIONING NIC
CRC ERRORS
ELECTRICAL INTERFERENCE ON SERIAL INTERFACES
USING THE INCORRECT CABLE TYPE
HALF-DUPLEX OPERATIONS
18 WHICH TWO DEVICES WOULD BE DESCRIBED AS INTERMEDIARY
DEVICES? (CHOOSE TWO.)
WIRELESS LAN CONTROLLER
GAMING CONSOLE
RETAIL SCANNER
ASSEMBLY LINE ROBOTS
SERVER
IPS
19 WHICH STATEMENT DESCRIBES NETWORK SECURITY?
IT SUPPORTS GROWTH OVER TIME IN ACCORDANCE WITH
APPROVED NETWORK DESIGN PROCEDURES.
IT ENSURES SENSITIVE CORPORATE DATA IS AVAILABLE FOR
AUTHORIZED USERS.
IT SYNCHRONIZES TRAFFIC FLOWS USING TIMESTAMPS.
IT PRIORITIZES DATA FLOWS IN ORDER TO GIVE PRIORITY TO
DELAY-SENSITIVE TRAFFIC.
20 WHAT CHARACTERISTIC DESCRIBES SPYWARE?
THE USE OF STOLEN CREDENTIALS TO ACCESS PRIVATE DATA
A NETWORK DEVICE THAT FILTERS ACCESS AND TRAFFIC
COMING INTO A NETWORK
AN ATTACK THAT SLOWS OR CRASHES A DEVICE OR NETWORK
SERVICE
SOFTWARE THAT IS INSTALLED ON A USER DEVICE AND
COLLECTS INFORMATION ABOUT THE USER
21 A ROUTER BOOTS AND ENTERS SETUP MODE. WHAT IS THE REASON
FOR THIS?
THE IOS IMAGE IS CORRUPT.
CISCO IOS IS MISSING FROM FLASH MEMORY.
THE CONFIGURATION FILE IS MISSING FROM NVRAM.
THE POST PROCESS HAS DETECTED HARDWARE FAILURE.
22 FLOOR(CONFIG)# INTERFACE GI0/1
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE REGISTRAR LAN
FLOOR(CONFIG-IF)# IP ADDRESS 192.168.235.234 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE GI0/0
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE MANAGER LAN
FLOOR(CONFIG-IF)# IP ADDRESS 192.168.234.114 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE S0/0/0
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE ISP
FLOOR(CONFIG-IF)# IP ADDRESS 10.234.235.254 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE S0/0/1
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE HEAD OFFICE WAN
FLOOR(CONFIG-IF)# IP ADDRESS 203.0.113.3 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# END
REFER TO THE EXHIBIT. A NETWORK ADMINISTRATOR IS CONNECTING A
NEW HOST TO THE REGISTRAR LAN. THE HOST NEEDS TO COMMUNICATE
WITH REMOTE NETWORKS. WHAT IP ADDRESS WOULD BE CONFIGURED
AS THE DEFAULT GATEWAY ON THE NEW HOST?
203.0.113.3
10.234.235.254
192.168.235.1
192.168.234.114
192.168.235.234
24 WHICH TWO ICMP MESSAGES ARE USED BY BOTH IPV4 AND IPV6
PROTOCOLS? (CHOOSE TWO.)
ROUTER SOLICITATION
NEIGHBOR SOLICITATION
ROUTE REDIRECTION
ROUTER ADVERTISEMENT
PROTOCOL UNREACHABLE
25 NETWORK INFORMATION:
* LOCAL ROUTER LAN INTERFACE: 172.19.29.254 / FE80:65AB:DCC1::10
* LOCAL ROUTER WAN INTERFACE: 198.133.219.33 / 2001:DB8:FACE:39::10
* REMOTE SERVER: 192.135.250.103
WHAT TASK MIGHT A USER BE TRYING TO ACCOMPLISH BY USING
THE PING 2001:DB8:FACE:39::10 COMMAND?
CREATING A NETWORK PERFORMANCE BENCHMARK TO A
SERVER ON THE COMPANY INTRANET
VERIFYING THAT THERE IS CONNECTIVITY TO THE INTERNET
VERIFYING THAT THERE IS CONNECTIVITY WITHIN THE LOCAL
NETWORK
DETERMINING THE PATH TO REACH THE REMOTE SERVER
26 A NETWORK TECHNICIAN TYPES THE COMMAND PING 127.0.0.1 AT THE
COMMAND PROMPT ON A COMPUTER. WHAT IS THE TECHNICIAN TRYING
TO ACCOMPLISH?
CHECKING THE IP ADDRESS ON THE NETWORK CARD
TRACING THE PATH TO A HOST COMPUTER ON THE NETWORK
AND THE NETWORK HAS THE IP ADDRESS 127.0.0.1
TESTING THE INTEGRITY OF THE TCP/IP STACK ON THE LOCAL
MACHINE
PINGING A HOST COMPUTER THAT HAS THE IP ADDRESS
127.0.0.1 ON THE NETWORK
27
REFER TO THE EXHIBIT. WHAT IS THE MAXIMUM POSSIBLE THROUGHPUT
BETWEEN THE PC AND THE SERVER?
10 MB/S
1000 MB/S
128 KB/S
100 MB/S
28 WHAT OSI PHYSICAL LAYER TERM DESCRIBES THE MEASURE OF THE
TRANSFER OF BITS ACROSS A MEDIUM OVER A GIVEN PERIOD OF TIME?
LATENCY
GOODPUT
BANDWIDTH
THROUGHPUT
29 WHICH TWO STATEMENTS DESCRIBE THE CHARACTERISTICS OF
FIBER-OPTIC CABLING? (CHOOSE TWO.)
MULTIMODE FIBER-OPTIC CABLING CARRIES SIGNALS FROM
MULTIPLE SENDING DEVICES.
FIBER-OPTIC CABLING USES LEDS FOR SINGLE-MODE CABLES
AND LASER TECHNOLOGY FOR MULTIMODE CABLES.
FIBER-OPTIC CABLING HAS HIGH SIGNAL LOSS.
FIBER-OPTIC CABLING IS PRIMARILY USED AS BACKBONE
CABLING.
FIBER-OPTIC CABLING DOES NOT CONDUCT ELECTRICITY.
31 TWO STUDENTS ARE WORKING ON A NETWORK DESIGN PROJECT. ONE
STUDENT IS DOING THE DRAWING, WHILE THE OTHER STUDENT IS
WRITING THE PROPOSAL. THE DRAWING IS FINISHED AND THE STUDENT
WANTS TO SHARE THE FOLDER THAT CONTAINS THE DRAWING SO THAT
THE OTHER STUDENT CAN ACCESS THE FILE AND COPY IT TO A USB
DRIVE. WHICH NETWORKING MODEL IS BEING USED?
CLIENT-BASED
POINT-TO-POINT
PEER-TO-PEER
MASTER-SLAVE
32 WHICH COMMAND IS USED TO MANUALLY QUERY A DNS SERVER TO
RESOLVE A SPECIFIC HOST NAME?
NET
TRACERT
IPCONFIG /DISPLAYDNS
NSLOOKUP
33 WHAT SERVICE IS PROVIDED BY POP3?
USES ENCRYPTION TO PROVIDE SECURE REMOTE ACCESS TO
NETWORK DEVICES AND SERVERS.
AN APPLICATION THAT ALLOWS REAL-TIME CHATTING AMONG
REMOTE USERS.
ALLOWS REMOTE ACCESS TO NETWORK DEVICES AND
SERVERS.
RETRIEVES EMAIL FROM THE SERVER BY DOWNLOADING THE
EMAIL TO THE LOCAL MAIL APPLICATION OF THE CLIENT.
34 WHICH TWO OSI MODEL LAYERS HAVE THE SAME FUNCTIONALITY AS
TWO LAYERS OF THE TCP/IP MODEL? (CHOOSE TWO.)
TRANSPORT
SESSION
DATA LINK
NETWORK
PHYSICAL
35 WHICH THREE LAYERS OF THE OSI MODEL ARE COMPARABLE IN
FUNCTION TO THE APPLICATION LAYER OF THE TCP/IP MODEL? (CHOOSE
THREE.)
PHYSICAL
NETWORK
TRANSPORT
DATA LINK
PRESENTATION
SESSION
APPLICATION
36 WHICH PDU IS PROCESSED WHEN A HOST COMPUTER IS DE-
ENCAPSULATING A MESSAGE AT THE TRANSPORT LAYER OF THE TCP/IP
MODEL?
PACKET
BITS
FRAME
SEGMENT
37 GIVEN NETWORK 172.18.109.0, WHICH SUBNET MASK WOULD BE USED
IF 6 HOST BITS WERE AVAILABLE?
255.255.255.252
255.255.255.192
255.255.192.0
255.255.224.0
255.255.255.248
38 WHAT DOES THE IP ADDRESS 192.168.1.15/29 REPRESENT?
MULTICAST ADDRESS
UNICAST ADDRESS
SUBNETWORK ADDRESS
BROADCAST ADDRESS
40 WHAT TYPE OF ADDRESS IS 198.133.219.162?
LINK-LOCAL
LOOPBACK
MULTICAST
PUBLIC
41 A NETWORK TEAM IS COMPARING TOPOLOGIES FOR CONNECTING ON
A SHARED MEDIA. WHICH PHYSICAL TOPOLOGY IS AN EXAMPLE OF A
HYBRID TOPOLOGY FOR A LAN?
RING
PARTIAL MESH
EXTENDED STAR
BUS
42 WHICH TWO ACRONYMS REPRESENT THE DATA LINK SUBLAYERS
THAT ETHERNET RELIES UPON TO OPERATE? (CHOOSE TWO.)
LLC
CSMA
FCS
MAC
SFD
43 WHAT DOES A ROUTER DO WHEN IT RECEIVES A LAYER 2 FRAME
OVER THE NETWORK MEDIUM?
RE-ENCAPSULATES THE PACKET INTO A NEW FRAME
FORWARDS THE NEW FRAME APPROPRIATE TO THE MEDIUM OF
THAT SEGMENT OF THE PHYSICAL NETWORK
DE-ENCAPSULATES THE FRAME
DETERMINES THE BEST PATH
44 ALTHOUGH CSMA/CD IS STILL A FEATURE OF ETHERNET, WHY IS IT NO
LONGER NECESSARY?
THE USE OF CSMA/CA
THE USE OF GIGABIT ETHERNET SPEEDS
THE VIRTUALLY UNLIMITED AVAILABILITY OF IPV6
ADDRESSES
THE DEVELOPMENT OF HALF-DUPLEX SWITCH OPERATION
THE USE OF FULL-DUPLEX CAPABLE LAYER 2 SWITCHES
45 ONLY EMPLOYEES CONNECTED TO IPV6 INTERFACES ARE HAVING
DIFFICULTY CONNECTING TO REMOTE NETWORKS. THE ANALYST
WANTS TO VERIFY THAT IPV6 ROUTING HAS BEEN ENABLED. WHAT IS
THE BEST COMMAND TO USE TO ACCOMPLISH THE TASK?
SHOW RUNNING-CONFIG
SHOW INTERFACES
COPY RUNNING-CONFIG STARTUP-CONFIG
SHOW IP NAT TRANSLATIONS
46 WHICH TWO COMMANDS COULD BE USED TO CHECK IF DNS NAME
RESOLUTION IS WORKING PROPERLY ON A WINDOWS PC? (CHOOSE TWO.)
PING CISCO.COM
NSLOOKUP CISCO.COM
NBTSTAT CISCO.COM
IPCONFIG /FLUSHDNS
NET CISCO.COM
47 A SMALL ADVERTISING COMPANY HAS A WEB SERVER THAT
PROVIDES CRITICAL BUSINESS SERVICE. THE COMPANY CONNECTS TO
THE INTERNET THROUGH A LEASED LINE SERVICE TO AN ISP. WHICH
APPROACH BEST PROVIDES COST EFFECTIVE REDUNDANCY FOR THE
INTERNET CONNECTION?
ADD MULTIPLE CONNECTIONS BETWEEN THE SWITCHES AND
THE EDGE ROUTER.
ADD A CONNECTION TO THE INTERNET VIA A DSL LINE TO
ANOTHER ISP.
ADD ANOTHER WEB SERVER TO PREPARE FAILOVER SUPPORT.
ADD A SECOND NIC TO THE WEB SERVER.
48 WHICH STATEMENT DESCRIBES THE CHARACTERISTICS OF PACKET-
FILTERING AND STATEFUL FIREWALLS AS THEY RELATE TO THE OSI
MODEL?
A STATEFUL FIREWALL CAN FILTER APPLICATION LAYER
INFORMATION, WHEREAS A PACKET-FILTERING FIREWALL
CANNOT FILTER BEYOND THE NETWORK LAYER.
BOTH STATEFUL AND PACKET-FILTERING FIREWALLS CAN
FILTER AT THE APPLICATION LAYER.
A PACKET-FILTERING FIREWALL TYPICALLY CAN FILTER UP TO
THE TRANSPORT LAYER, WHEREAS A STATEFUL FIREWALL CAN
FILTER UP TO THE SESSION LAYER.
A PACKET-FILTERING FIREWALL USES SESSION LAYER
INFORMATION TO TRACK THE STATE OF A CONNECTION, WHEREAS
A STATEFUL FIREWALL USES APPLICATION LAYER INFORMATION
TO TRACK THE STATE OF A CONNECTION.
49 WHAT ARE TWO WAYS TO PROTECT A COMPUTER FROM MALWARE?
(CHOOSE TWO.)
KEEP SOFTWARE UP TO DATE.
DEFRAGMENT THE HARD DISK.
DELETE UNUSED SOFTWARE.
USE ANTIVIRUS SOFTWARE.
EMPTY THE BROWSER CACHE.
50 A NETWORK ADMINISTRATOR IS ISSUING THE LOGIN BLOCK-FOR 180
ATTEMPTS 2 WITHIN 30 COMMAND ON A ROUTER. WHICH THREAT IS THE
NETWORK ADMINISTRATOR TRYING TO PREVENT?
AN UNIDENTIFIED INDIVIDUAL WHO IS TRYING TO ACCESS THE
NETWORK EQUIPMENT ROOM
A USER WHO IS TRYING TO GUESS A PASSWORD TO ACCESS
THE ROUTER
A WORM THAT IS ATTEMPTING TO ACCESS ANOTHER PART OF
THE NETWORK
A DEVICE THAT IS TRYING TO INSPECT THE TRAFFIC ON A LINK
51 THE EMPLOYEES AND RESIDENTS OF CISCOVILLE CANNOT ACCESS
THE INTERNET OR ANY REMOTE WEB-BASED SERVICES. IT WORKERS
QUICKLY DETERMINE THAT THE CITY FIREWALL IS BEING FLOODED
WITH SO MUCH TRAFFIC THAT A BREAKDOWN OF CONNECTIVITY TO THE
INTERNET IS OCCURRING. WHICH TYPE OF ATTACK IS BEING LAUNCHED
AT CISCOVILLE?
DOS
TROJAN HORSE
RECONNAISSANCE
ACCESS
52 REFER TO THE EXHIBIT. AN ADMINISTRATOR IS TRYING TO
CONFIGURE THE SWITCH BUT RECEIVES THE ERROR MESSAGE THAT IS
DISPLAYED IN THE EXHIBIT. WHAT IS THE PROBLEM?
THE ADMINISTRATOR MUST CONNECT VIA THE CONSOLE PORT
TO ACCESS GLOBAL CONFIGURATION MODE.
THE ENTIRE COMMAND, CONFIGURE TERMINAL , MUST BE
USED.
THE ADMINISTRATOR MUST FIRST ENTER PRIVILEGED EXEC
MODE BEFORE ISSUING THE COMMAND.
THE ADMINISTRATOR IS ALREADY IN GLOBAL CONFIGURATION
MODE.
53 WHAT IS A USER TRYING TO DETERMINE WHEN ISSUING A PING 10.1.1.1
COMMAND ON A PC?
IF THE TCP/IP STACK IS FUNCTIONING ON THE PC WITHOUT
PUTTING TRAFFIC ON THE WIRE
THE PATH THAT TRAFFIC WILL TAKE TO REACH THE
DESTINATION
WHAT TYPE OF DEVICE IS AT THE DESTINATION
IF THERE IS CONNECTIVITY WITH THE DESTINATION DEVICE
55 WHAT IS A CHARACTERISTIC OF A SWITCH VIRTUAL INTERFACE (SVI)?
SVIS COME PRECONFIGURED ON CISCO SWITCHES.
AN SVI IS CREATED IN SOFTWARE AND REQUIRES A
CONFIGURED IP ADDRESS AND A SUBNET MASK IN ORDER TO
PROVIDE REMOTE ACCESS TO THE SWITCH.
SVIS DO NOT REQUIRE THE NO SHUTDOWN COMMAND TO
BECOME ENABLED.
ALTHOUGH IT IS A VIRTUAL INTERFACE, IT NEEDS TO HAVE
PHYSICAL HARDWARE ON THE DEVICE ASSOCIATED WITH IT.