Searching for "HO"

Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

What command will permit SMTP mail to only host 1.1.1.1?

A) access-list 10 permit smtp host 1.1.1.1 B) access-list 110 permit ip smtp host 1.1.1.1
C) access-list 10 permit tcp any host 1.1.1.1 eq smtp D) access-list 110 permit tcp any host 1.1.1.1 eq smtp
 
Answer & Explanation Answer: D) access-list 110 permit tcp any host 1.1.1.1 eq smtp

Explanation:

when trying to find the best answer to an access - list question, always check the access - list bnumber and then the protocol. When filtering to an upper - layer protocol, you must use an extended list, numbers 100 - 199 and 2000 - 2699. Also, when you filter to the port of an upper - layer protocol, you must use either tcp or udp in the ACL protocol field. If it says ip in the protocol field, you cannot filoter on the port number of an upper - layer protocol. SMTP uses TCP

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

A) access - list 10 deny 192.168.160.0 255.255.224.0 B) access - list 10 deny 192.168.160.0 0.0.191.255
C) access - list 10 deny 192.168.160.0 0.0.31.255 D) access - list 10 deny 192.168.0.0 0.0.31.255
 
Answer & Explanation Answer: C) access - list 10 deny 192.168.160.0 0.0.31.255

Explanation:

The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255 . The 31 is used for a block size of 32. The wildcard is always one less than the block size.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

What type of Cisco tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method?

Answer

Inter-Switch Link (ISL)

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

Q:

Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

A) Switch (config) #switchport trunk encapsulation ietf B) Switch (config) #switchport trunk encapsulation dot1q
C) Switch (config-if) #switchport trunk encapsulation ietf D) Switch (config-if) #switchport trunk encapsulation dot1q
 
Answer & Explanation Answer: D) Switch (config-if) #switchport trunk encapsulation dot1q

Explanation:

If you are on a 2950 switch, then the interface command is just swichport mode trunk since the 2050 can only run the  IEEE 802.1q version. However, a 3550 can run both ISL and 802.1q, so you must also use the encapsulation command. The argument to choose 802.1q for a trunking protocol is dot1q.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?

A) The router is not configured for the new host B) The VTP configuration on the switch is not updated for the new host
C) The host has an invalid MAC address D) The switch port the host is connected to is not configured with the correct VLAN membership
 
Answer & Explanation Answer: D) The switch port the host is connected to is not configured with the correct VLAN membership

Explanation:

This question is a little Vague, but the best answer is that the VLAN membership for the port is not configured

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?

A) Managed hubs B) Bridges
C) Switches D) Switches configured with VLANs
 
Answer & Explanation Answer: D) Switches configured with VLANs

Explanation:

By creating and implementing VLANs in your switched network, you can break up broadcast domains at layer2. For hosts on different VLANs to communicate, you must have a router or layer 3 switch. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

You get a call from a network administrator who tells you that he typed the following into his router:

Router (config) #router ospf 1

Router (config-router) # network 10.0.0.0. 255. 0.0.0 area 0

He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?

A) The wildcard mask is incorrect B) The OSPF area is wrong
C) The OSPF Process ID is incorrect. D) The AS configuration is wrong
 
Answer & Explanation Answer: A) The wildcard mask is incorrect

Explanation:

The administrator typed in the wrong wildcard mask configuration. The wildcard should have been 0.0.0.255 or even 0.255.255.255.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA