Cache web pages, Block employees from accessing certain websitesWhich of the following functions are performed by proxies?
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. Install a proxy server
Which of the following allows you to save frequently-accessed websites on your local network for later retrieval? Proxy
Which of the following devices accepts incoming client requests and distributes those requests to specific servers? Load balancer
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? VPN concentrator
How does a proxy server differ from a packet filtering firewall? A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port? Switch
Which network component connects a device with the transmission media and allows it to send and receive messages? Network interface card
Which of the following hardware devices links multiple networks and directs traffic between networks? Router
Which of the following best describes how a switch functions? It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
An access point that conforms to the IEEE 802. 11b standard acts most closely to what other networking device? Hub
What device sends signals from a computer onto a network? Transceiver
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? Hub, Repeater
Which of the following statements accurately describes how a modem works? It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.
How do switches and bridges learn where devices are located on a network? When a frame enters a port, the source MAC address is copied from the frame header.
Which of the following is a firewall function? Packet filtering
As a security precaution, you have implemented IPsec that is used between any two devices on your network. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Host-based IDS
What security mechanism can be used to detect attacks originating on the Internet or from within an internal, trusted subnet? IDS
Which of the following is the best device to deploy to protect your private network from a public untrusted network? Firewall
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? An alert is generated and delivered via e-mail, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations? IDS
Which of the following activities are considered passive in regards to the functioning of an intrusion detection system? Listening to network traffic, Monitoring the audit trails on a server
An active IDS system often performs which of the following actions? Update filters to block suspect traffic, Perform reverse lookups to identify an intruder
Which of the following prevents access based on website ratings and classifications? Content filter
What does an IDS that uses signature recognition use for identifying attacks? Comparison to a database of known attacks
Which of the following is the most common detection method used by an IDS? Signature
You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis? Update the signature files
Which of the following devices can monitor a network and detect potential security attacks? IDS
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? VPN concentrator
Which of the following devices accepts incoming client requests and distributes those requests to specific servers? Load balancer
Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code? IDS, IPS
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? Enforcement of the organization’s Internet usage policy, An increase in bandwidth availability
Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. what step must be taken to ensure that the information is useful in maintaining a secure environment? Periodic reviews must be conducted to detect malicious activity or policy violations.
Which of the following devices is capable of detecting and responding to security threats? IPS
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want to take immediate action when possible to stop or prevent the attack. Which tool should you use? IPS
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? Send the frame out to ports 2-8.
Which of the following devices does not segment the network? Hub
Which of the following devices is capable of performing routing of IP packets at wire speeds using an ASIC module instead of the CPU or software? Layer 3 switch
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static Web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your Web content. The device should not be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Content Switch
Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.
HubUnmanaged switch802. 11n wireless access pointRouterBridgeRepeaterLayer 3 Switch
Single broadcast domainSingle broadcast domainSingle broadcast domainMultiple broadcast domainsSingle broadcast domainSingle broadcast domainMultiple broadcast domains
You manage a server that runs your company website. The website includes streaming video that shows features of some of your products. The link connecting your server to the Internet charges based on bandwidth use. when the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level. Which solution should you implement? Traffic shaper
Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth? Switch
Which of the following devices can monitor a network and detect potential security attacks? IDS
which of the following devices is capable of detecting and responding to security threats? IPS
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet? IDS
What actions can a typical passive intrusion Detection System (IDS) take when it detects an attack? (Select two.)An alert is generated and delivered via Email, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use? IPS
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations? IDS
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for a traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement? Host based IDS
What IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a databaseSignature based
You are concerned about protecting your network from network-based attack from the Internet. Specifically, you are concerned about zero-day attacks (attacks that have not yet been identified or that do not have prescribed protections.) Which type of device should you use? Anomaly based IDS
You have a Web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement? Load balancing
You manage a server that runs your company website. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for website content. Which solution should you implement? Load balancin
You are concerned about protecting your network from network-based attacks from the Internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use? Anomaly based IDS
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization’s order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration (Select two.)Configure the browser to send HTTPS requests through the VPN connection, Configure the VPN connection to use IPsec
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)RADIUS, TACACS+
You have decided to implement a remote access solution that uses multiple remote access servers. you want to implement RADIUS to centralize remove access authentication and authorization. Which of the following would be a required part of your configuration? Configure remote access servers as RADIUS clients.
Which of the following are characteristics of TACACS+ (Select two.)Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting.
Which of the following are differences between RADIUS and TACACS+? RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to split between different servers.
Which of the following protocols can be used to centralize remote access authentication? TACACS
A VPN is used primarily for what purpose? Support secured communications over an untrusted network
You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. what service should you implement? RAS
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? PPTP
You are configuring your computer to dial up to the Internet. What protocol should you use? PPP
Which of the following protocols or services is commonly used on cable Internet connections for user authentication? PPPoE
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need? Remote access
Which of the following protocols can your portable computer use to connect to your company’s network via a virtual tunnel through the Internet? (select two.)PPTP, L2TP
IPsec is implemented through two separate protocols. What are these protocols called? (Selected two.)ESP, AH
Which of the following network layer protocols provides authentication and encryption services for IP based network traffic? IPsec
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection? PPPoE
RADIUS is primarily used for what purpose? Authenticating remote clients before access to the network is granted.
Which of the following is a characteristics of TACAS+Encrypts the entire packet, not just the authentication packets
Which of the following ports are used with TACAS? 49
Which of the following statements about SSL VPN are true? (Select two.)encrypts the entire communication session, uses port 443
Which of the following can route layer 3 protocols across an IP network? GRE
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. Which unified communication feature is this? Presence information
You’ve been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them? Unified communication
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? Port forwarding
You need to enable hosts on your network to find the IP address of logical names such as srv1. myserver. com. Which device would you use? DNS Server
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement? DNS
After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a windows XP client system and using the ipconfig command, receive the following information
Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . : CardBus-I 10/100 PC CardPhysical Address . . . . . . . : 02-00-4C-4F-3F-50DHCP Enabled . . . . . . . . . . . : YesAutoconfiguration enabled . . . . . . YesAutoconfiguration IP Address . . . . . . . : 169. 254. 25. 129Subnet Mask . . . . . . . . . . . 255. 255. 0. 0Default Gateway . . . . . . . . : DNS Servers . . . . . . . . :
Which of the following statements are true? (Select two).
The client system is configured to use DHCP, the client system is unable to reach the DHCP server.
You have configured your organizations dHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user’s workstation is powered on and receives addressing information from this DHCP server Monday morning at 8: 00AM. When will the client contact the DHCP server to renew the lease (by default)? Wednesday Morning
Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? A DHCP server assigns addresses to requesting hosts. It can deliver other configuration information in addition to IP addresses.
Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (select two.)Install a DHCP server on the network. Use Automatic Private IP Addressing
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use? DHCP Server
You are implementing a DHCP server for your segment. Your Segment’s IP address is 192. 168. 1. 0. Your default gateway address is 192. 168. 1. 254. Your DNS server address is 192. 168. 1. 1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on youe DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem? You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06)
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192. 168. 2. 1 to addres 192. 168. 2. 100. You use the subnet mask of 255. 255. 255. 0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure? The clients must be configured to obtain IP addressing from a DHCP server.
You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 89, and Macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user’s computer and receive the following output:
0 ethernet adapter: IP address . . . . . . . . . : 169. 254. 1. 17Subnet Mask . . . . . . . . . : 255. 255. 0. 0Default Gateway . . . . . . . :
You also check your NIC and see the link light on. what might the problem be?
Unavailable DHCP server
Which of the following functions are performed by proxies? (Select two.)Cache web pages, block employees from accessing certain websites
You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem? A proxy server is blocking access to the websites
Which fo the following solutions would you implement to track which websites network users are accessing? Proxy
You would like to control Internet access based on users, time of day, and websites visited. How can you do this? Install a proxy server. Allow Internet access only through the proxy server.
You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content. Proxy Server
Which of the following are true of a circuit proxy filter firewall (Select two.)Operates at the Session layer. Verifies sequencing of session packets.
Which of the following are true about reverse proxy? (Select two.)Can perform load balancing, authentication, and caching. Handles requests from the Internet to a server in a private network.
Listed below are several DNS record types. Match the record type on the left with its function on the right.
Drag: A, CNAME. MX. PTR. AAAA
Drop: Points a hostname to an IPv4 addressProvides alternate names to hosts that already have a host record. Points an IP address to a hostname. Points a hostname to an IPv6 addressIdentifies servers that can be used to deliver mail.
A, CNAME, PTR, AAAA, MX
You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem? Implement an IP Helper address on the router.
You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration? Specify which server network interface the agent listens on for DHCP messages.
Which of the following services automatically creates and deletes host records when an IP address lease is created or released? Dynamic DNS
If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two.)The ipconfig /release command is entered on a workstation. The DHCP server renews an IP address lease.
You have a WIndows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you use to do this? Routing and Remote Access
You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172. 16. 30. 1Which of the following commands would be used to configure the router? ip helper-address 172. 16. 30. 1
Based on the diagram, which type of proxy server is handling the client’s request?
Client —-> Internet —-> Proxy —-> Server 1
Proxy and Server 1 are an internal network
Reverse Proxy
You have installed an ISDN connection into your home so you can connect to the Internet and talk on the phone at the same time. While you are talking on the telephone, what is the maximum data rate of your internet connection?
ISDN supports 128Kbps total
64Kbps
What is the speed of an OC-3 connection
OC-1= 51. 84 Mbps
155. 52mbps
Which two of the following describe the channels and data transfer rates used for ISDN BRI? One D channel operating at 16KbpsTwo B channels operating at 64 Kbps each
Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels? ISDN BRI
Which three of the following are advantages of ISDN BRIIt uses existing telephone lines for digital data transmission. It can be used to transmit multiple data types on the same line (data, voice, video, and so on). It has faster connect times than traditional dial-up access.
Which three of the following are characteristics of ISDN? It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop. It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines.
If the SONET (OC-1) based data rate is 51. 84Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second622. 08Mbps
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Satellite
Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly? Wireless
You are moving to an area where DSL will be available in the next six moths. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal? PSTN
Which of the following is most susceptible to interference related to atmospheric conditions? Satellite
To access the Internet through the PSTN, what kind of connectivity device must you use? Modem
Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking? SONET
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic? MPLS
Which of the following are characteristics of MPLS? (Select two.)Supports variable-length data units, Adds labels to data units
Which of the following are characteristics of ATM (Select two.)Adds labels to data units, Uses fixed-length cells of 53-bytes
Which of the following are characteristics of SONET? (Select two.)Transport protocol used for other traffic types (such as ATM) Dual counter-rotating fiber optic rings
Which of the following describes the lines used in the local loop for dial-up telephone access? POTS
Which of the following terms identifies the network of dial-up telephone and long-distance lines? PSTN
Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)ISDN BRI, ADSL
Which four of the following are the responsibility of the WAN service providerDCE, CO, PSE, Local loop
Which network type divides transmitted data into smaller pieces and allows for multiple communications on the network medium? Packet-switched
Which network type establishes a dedicated physical connection between two hosts in order to transmit time-sensitive data? Circuit-switched
Which of the following WAN technologies provides packet switching over high-quality digital liens at speeds greater than 1. 544 MbpsFrame Relay
Which WAN connection types use digital communications over public telephone lines? (Select two.)DSL, ISDN
Which of the following correct describes the T1 carrier system? (Select two.)A single T1 channel can transfer data at 64 KbpsT1 lines use two pairs of copper wire
Which of the following WAN technologies is a dial-up only service? ISDN BRI
You are implementing Internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implementT3
When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites? Packets
Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels? MPLS
Which of the following is true of Multiprotocol Label Switching? (Select two.)It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.
Which of the following is true of Multiprotocol Label Switching? (Select two.)MLPS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not the packet contents.
What is the maximum data rate of an ISDN BRI line? 128Kbps
Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)Two B channels operating at 64 Kbps each, One D channel operating at 16 Kbps
Which of the following are characteristics of ISDN? (Select three.)It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office? DSL
Which of the following services are available regardless of whether the telephone company network is available? Cable modem
You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel? PSTN
Which WAN connection types use digital communications over POTS? (Select two.)ISDN, DSL
Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use? PPP
RouterA is connected to RouterB through Serial 1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which sent of commands would you use on RouterA to complete the configuration?
A. RouterA(config)#username RouterB password ciscoRouterA (config)#int s1RouterA(config-if)#encap pppRouterA(config-if)#ppp auth chap
B. RouterA(config)#int s1RouterA(config-if)#encap pppRouterA(config-if)#ppp auth chapRouterA(config-if)#ppp chap username RouterB password cisco
C. RouterA(config)#int s1RouterA(config-if)#encap pppRouterA(config-if)#ppp chap username RouterA password cisco
A
Which of the following statements about the functionality of LCP are true? (Select three.)Data can be compressed at the source and decompressed at the destination. LCP provides multilink support. Usernames and passwords may be required during the handshake.
Which of the following are benefits of LCP? (Select three.)Monitors data dropped on the link and avoids frame looping. Provides load balancing across multiple links. Negotiates the use (or lack) of authentication before starting the session.
What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?
1 authentication2 NCP3 LCP
LCP, authentication, NCP
PPP supports authentication, compression, and multiple Network-layer protocols. Which of the following correctly sequences these functions when a PPP link is established?
1 Negotiate compression Settings2 Negotiate Network-layer protocols3 Perform authentication
Negotiate compression Settings, Perform authentication, Negotiate Network-layer protocols
Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols? NCP
Which of the following Internet services provides equal upload and download bandwidth? SDSL
Which of the following are characteristics of VDSL? (Select two.)Unequal download and upload speeds, Supports both data and voice at the same time
Which of the following is a characteristic of SDSL? Supports data traffic only( no voice)
Which of the following technologies does GSM use to allow multiple connections on the same frequency? Time division multiple access
Which of the following cellular network types does not provide Internet connectivity?
4G, LTE, 2G, EDGE, HSPA+
2G
Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)HSPA+, LTE
Drag the cellular network specification on the left to its corresponding mobile technology generation on the right.
Drag: LTE, GSM, WiMAX, HSPA+, CDMA
Drop: 2G: __, __3G: __, __4G: __, __
2G: GSM, CDMA3G: LTE, HSPA+4G: WiMAX
Which of the following describe the EDGE cellular technology? (Select two.)Offers speeds of 400-1000Kbps, The first internet compatible technology
Which of the following geographic network types are typically managed by a city as a public utility? Metropolitan Area Network (MAN)
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are sever kilometers apart? Single mode
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.)Greater cable distances without a repeater, Immunity to electromagnetic interference
Which pins in an RJ45 connetor are used to transmit data when used on a 100BaseT Ethernet network? (Select two.)
Pin 1: Tx+Pin 2: Tx-Pin 3: Rx+Pin 4: UnusedPin 5: UnusedPin 6: Rx-Pin 7: UnusedPin 8: Unused
Pin 1, Pin 2
You are installing networking wiring for a new Ethernet network at your company’s main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of CAtegory 3 network cable in storage. Upon investigation it appears very similar to Category 5 wiring. Should you use Category 3 cabling as a substitute for Category 5 cabling to finish the project? No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates.
Which of the following are characteristics of coaxial network cable? (choose three.)The ends of the cable must be terminated, It has a conductor made from copper in the center of the cable, It uses two concentric metallic conductors.
Which of the following is true about single mode fiber optic network cabling? The central core is smaller than that of multimode fiber optic cabling.
What is the minimum cable specification that supports 1000Mbps Ethernet? Cat 5e
Which of the following cable types often includes a solid plastic core? Cat 6
Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.)RG-6, RG-59
You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can’t find any RG-6 cable. Which cable types could you use instead?
RG-8 and RG-58 have an impedance rating of 50 ohmsRG-59 and RG-6 have an impedance rating of 75 ohms
RG-59
You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use? Plenum
Of the following cables, which offer the best protection against EMI?
Cat 5, RG-6, Single mode fiber optic, Cat 5e
Single mode fiber optic
Of the following cables, which offer the best protection against EMI?
RG-6, Cat 6e, Cat 5, Cat5e
RG-6
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use? Crossover
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use? Crossover
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use? Crossover
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use? Straight-through
You have purchased a new router that you need to configure. You need to connect a workstation to the router’s console port to complete the configuration tasks. Which type of cable would you most likely use? Rollover
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BasTX switch ports. Which device should you use? Media converter
At which OSI model layer does a media converter operate? Layer 1
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.)GBIC, SFP
You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use? F-type
Which of the following connectors usually require polishing as part of the assembly process? (select two.)SC, ST
Which of the following connectors is used with Ethernet 10BaseT networks? RJ-45
In which of the following situations might you use an RJ-11 connector?
You want to connect the 10BaseT network card in your computer to a switch
You want to connect your computer to the internet with a dial-up connection
You want to upgrade your 10BaseT to 100BaseT
You want to connect your computer to the internet with a dial-up connection
Which of the following are characteristics of an LC fiber optic connector? (choose two.)They use a housing and latch system similar to an RJ-45 UTP connector. They are half the size of standard connectors.
Which of the following are characteristics of an MT-RJ fiber optic connector? (select two.)They use metal guide pins to ensure accurate alignment. They can be used with multimode fiber optic cables.
You want to use the T568A standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
Which of the following connectors is used with fiber optic cables and connects using a twisting motion? ST
Which of the following connectors are used with fiber optic cables andi nclude both cables in a single connector? (Select two.)LC, MT-RJ
Which of the following connectors is typically used on one end of a rollover cable? Serial
When would you typically use an RJ-11 connector? When connecting a phone to a phone line.
Which of the following standards is typically used in a rollover cable? RS-232
F-type connectors are typically used with cables using which of the following standards? (select two.)RG-6, RG-59
Which of the following uses metal clips placed over plastic slots for connecting individual copper wires? 110 block
When using 110 blocks for connecting Cat5 and higher data cables, which recommendation should you follow? Keep wire pairs twisted up to within one-half of an inch of the connector.
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task? Crimping tool
What tool should you use to extend network services beyond the demarc? Punchdown tool
You are making Ethernet drop cables using Cat5e and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use? Cable stripper
You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. Which tool should you use? Punchdown tool
Which of the following tests can be performed by a TDR? (Select two.)Identify the location of a fault on a cable. Measure the length of a cable.
You are working with an existing fiber optic installation in your building. You want to know how long each length of a cable is that runs through the walls. Which tool should you use? OTDR
You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use? TDR
You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time, which of the following should you do? Point the cut side of the tool towards the wire end. Use a punchdown tool with a notched blade.
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100Mbps. Which tool should you use to test the drop cable and the connection to the network? Certifier
You’ve connected a cable certifier to an RJ45 walljack, and the output shown below is displayed on the device. What does this output indicate? (Select two.)
1 – 32 – 63 – 14 – 75 – 86 – 27 – 48 – 5
This is a crossover cableThe cable is functioning correctly.
You’ve connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. what does this output indicate?
1 x 12 x 23 – 34 – 45 – 56 – 67 – 78 – 8
Pins 1 and 2 are shorted
You’ve connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. What does this output indicate? (Select two.)
1 – 12 – 23 – 34 45 – 56 67 – 78 – 8
Pin 4 is open, Pin 6 is open
You’re responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference (EMI) Which type of cabling would operate best in this environment? (Choose two.)Fiber-optic cable, shielded twisted pair cable
Which of the following connector types would you most likely use to connect to a T1 WAN service? RJ48c
You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter? BNC
Which of the following connector types are used with UTP cables? (Select two.)RJ-45, RJ-11
Match cable heads in Testout question 211 B. 2 Network+ Domainm 1: Network Architecture, All QuestionsDB-25, DB-9, RJ-45, RJ-11, LC, BNC < F-Type
You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable’s ferrule has a slight slant to it. Which polish grade should you use to replace the existing cableAngled Physical Contact polish
Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type? Angled Physical Contact
You have a network that sues a logical ring topology. How do messages travel through the network? Messages travel from one device to the next until they reached the destination device.
You have a network that uses a logical bus topology. How do messages travel through the network? Messages are broadcast to all devices connected to the network
Which of the following topologies connects all devices to a trunk cable? Bus
Which of the following topologies connects each device to a neighboring device? Ring
In which of the following topologies does each device on the network act as a repeater, s ending the signal to the next device? Ring
Which of the following topologies connects each network device to a central hub? Star
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? Mesh
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? Mesh
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs? Mesh
What device is used to create a physical star topology? Switch
You have a small network that uses a hub to connect multiple devices. What physical topology is used? Star
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link. What type of connection is being used? Point-to-point
You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites. What type of connection is being used? Point-to-multipoint
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following describes what happens to the network communications? No devices will be able to communicate
You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications? All devices except the device connected with the drop cable will be able to communicate
You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications? Device A will be able to communicate with all other devices.
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer-to-peer
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have? Client-server
Which of the following physical topologies are used with Ethernet networks? (Select two.)Bus, Star
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don’t have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Partial Mesh
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)Install the latest firmware updates from the device manufacturer. Verify that your network’s existing security infrastructure is working properly.
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)Install the latest firmware updates from the device manufacturer. Verify that your network’s existing security infrastructure is working properly.
Why do attackers prefer static environment devices to conduct distributed network attacks? (Select two.)These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices.
Match the Definition on the left with the SCADA technology term on the right.
Drag
1 A network of components that work together in order to remotely manage industrial equipment
2 Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process
3 Connects the supervisory computer to the RTUs or PLCs
4 Communicates with and sends control commands to connected SCADA devices
5 Connects equipment to the network via a phsical medium and converts digital data into signals that the equipment can process.
Drop
1 Remote Terminal Unit
2 DCS
3 Network Link
4 Supervisory Computer
5 Programmable Logic Controller
RTU – Connects the equipment to the network via wireless signal and converts digital data from the network into signals that the equipment can process.
DCS – A network of components that work together in order to remotely manage industrial equipment.
Network Link – Connects the supervisory computer to the RTUs or PLCs
Supervisory Computer – Communicates with and sends control commands to connected SCADA devices
Programmable Logic Controller – Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process.
Which of the following protocols is used during the call control process of multimedia communications? Session Initiation Protocol
Which of the following is a valid IPv4 address? (Select two.)
172. 16. 1. 2610. 384. 0. 52. 2. 2. 21. 254. 1. 1024192. 168. 1. 512254. 7. 1. 417256. 0. 01
172. 16. 1. 26, 2. 2. 2. 2
Which of the following is a valid MAC address?
34-9A-86-1G-B3-2473-99-12-61-15255. 255. 255. 083-5A-5B-0B-31-55-F1C0-34-FF-15-01-8E192. 168. 12. 15
C0-34-FF-15-01-8E
Which of the following is a valid MAC address?
FABC. 875E. 9BG6145. 65. 254. 10AB. 07. CF. 62. 16. BD95ABC2F4. ABC5. 569D. 43BF
AB. 07. CF. 62. 16. BD
Consider the following IP addresses. 1. 124. 77. 8. 52. 131. 11. 0. 93. 190. 66. 250. 104. 196. 5. 89. 44Which lists represents the ID address class of each listed IP address?
Class B, Class B, Class C, Class CClass B, Class B, Class C, Class DClass A, Class B, Class C, Class CClass B, Class C, Class C, Class DClass, A, Class B, Class B, Class C
A= 0-126 B= 128-191 C= 192-223 D= 223-239 E= 240-255
Class A, Class B, Class B, Class C
Which of the following are valid IPv6 IP addresses? Select all that apply.
6384: 1319: 7700: 7631: 446A: 5511: 8940: 2552127. 0. 0. 1165. 15. 78. 53. 100. 1192. 168. 2. 15343F: 1EEE: ACDD: 2034: 1FF3: 5012141: 0: 0: 0: 15: 0: 0: 1
6384: 1319: 7700: 7631: 446A: 5511: 8940: 2552141: 0: 0: 0: 15: 0: 0: 1
Which three of the following are not valid IP addresses?
257. 0. 122. 55116. 0. 0. 116132. 64. 32. 845. 22. 156. 2561. 55. 254. 3145. 8. 260. 7122. 0. 0. 0
257. 0. 122. 5545. 22. 156. 256145. 8. 260. 7
Your network has been assigned the Class B address of 130. 15. 0. 0 Which of the following is not an address you can assign to a node on a your network? 130. 16. 61. 3
Which of the three of the following IP addresses are Class B addresses?
129. 0. 0. 0195. 155. 0. 0115. 33. 0. 0132. 12. 0. 0190. 65. 2. 064. 2. 2. 64224. 15. 55. 2
0-126 128-191 192-223 224-239 240-255
129. 0. 0. 0132. 12. 0. 0190. 65. 2. 0
Which three of the following IP addresses are Class C addresses222. 55. 0. 0223. 16. 5. 0192. 15. 5. 55
Your network has been assigned the Class C network address of 200. 78. 151. 0. Which three of the following addresses can be assigned to hosts on your network? 200. 78. 151. 111200. 78. 151. 252200. 78. 151. 12
Your network has been assigned the Class B network address of 179. 113. 0. 0. Which three of the following addresses can be assigned to hosts on your network? 179. 113. 65. 12179. 113. 0. 118179. 113. 89. 0
Which three of the following IP addresses belong to the Class A network 114. 0. 0. 0? (assume the network is indicated by the default portion of the IP address.)114. 122. 66. 12114. 0. 0. 15114. 58. 12. 0
In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host? 132. 70. 254. 15
Which of the following IP addresses have a default subnet mask of 255. 255. 0. 0? (Select all that apply.)
A= 1 B= 2 C= 3
168. 16. 5. 1129. 0. 0. 1191. 168. 2. 15
What is the default subnet mask for the IP address 203. 111. 3. 3? 255. 255. 255. 0
Which of the following is the first IP address that can be assigned to hosts on the 166. 70. 0. 0 network using the default subnet mask? 166. 70. 0. 1
Which of the following is the last IP address that can be assigned to hosts on the 211. 70. 0. 0 network using the default subnet mask? 211. 70. 0. 255
Which of the following is the last IP address that can be assigned to hosts on the 166. 70. 0. 0 network using the default subnet mask? 166. 70. 255. 254
Which of the following is true about MAC address? (Select two.)It is a 48-bit address. It is typically represented by hexadecimal numbers.
What is the binary format for the following decimal IP address? 131. 9. 202. 11110000011. 00001001. 11001010. 01101111
What is the decimal format of the following binary IP address? 11001110. 00111010. 10101010. 01000011206. 58. 170. 67
You have been told to assign the IP address 21. 155. 67. 188 to a host on the network using the default subnet mask. Which mask should you use? 255. 0. 0. 0
A host on the network has an IP address of 129, 11, 88, 78 using the default subnet mask. How would you identify the address and mask using CIDR notation?
255. 0. 0. 0 is 8 bits
129. 11. 99. 78/16
You are configuring the IP address for a host and have been asked to use the address 192. 160. 99. 110/16. What subnet mask value would you use? 255. 255. 0. 0
Which of the following IP address ranges is reserved for Automatic Private IP Addressing? 169. 254. 0. 1 – 169. 254. 255. 254
Which of the following is a valid IPv6 address?
FEC0: AB98:: A7:: 9845: 4567199. 12. 254. 11FEC0:: AB: 9007FEC0: AB04: 899AFEC0: 9087: AB04: 9900: 7GA2: 7788: CEDF: 349A
FEC0:: AB: 9007
Which of the following is not a reason to use subnets on a networkCombine different media types on to the same subnet.
Which of the following best describes the purpose of using subnets? Subnets divide an IP network address into multiple network addresses.
What is the network address and subnet mask used by APIPA? (Select two.)169. 254. 0. 0255. 255. 0. 0
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use aPIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are ahving trouble configuring Internet access. What is the likely cause of the problem? Private addresses can not directly communicate to hosts outside the local subnet.
Your computer has an IP address of 161. 13. 5. 15. Your computer is on a:
Class C networkPrivate networkMulticast networkPublic network
Public network
Which of the following IP addresses is a valid IP address for a host on a public network?
10. 3. 125. 2192. 168. 16. 45172. 16. 254. 12142. 15. 6. 1
142. 15. 6. 1
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
10. 0. 0. 1 – 10. 255. 255. 254169. 254. 0. 1 – 169. 254. 255. 254172. 16. 0. 1 – 172. 31. 255. 254192. 168. 0. 1 – 192. 168. 255. 254
169. 254. 0. 1 – 169. 254. 255. 254
Which type of address is used in a packet to address the packet to a single host? Unicast
A host has the address 100. 55. 177. 99/16. Which of the following is the broadcast address for the subnet? 100. 55. 255. 255
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.)
224. 15. 166. 1232. 188. 99. 10240. 12. 188. 1172. 18. 188. 67192. 168. 12. 25310. 0. 12. 15127. 0. 0. 1
172. 16-31. 0. 0
172. 18. 188. 67192. 168. 12. 25310. 0. 12. 15
What type of address is the IP address 198. 162. 12. 254/24Unicast
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream? Multicast
A switch receives a frame addressed to the MAC address FF: FF: FF: FF: FF: FF. What will the switch do with the frame? Send it out to all ports except for the port it was received on.
Which of the following terms are often synonymous with or made possible with CIDR (Select two.)
NAT, OSPF, Classful, Classless, VLSM
Classless Inter-Domain Routing
VLSM, Classless
You manage a subnet that sues the following subnet address: 198. 162. 1. 0/23. Which of the following best describes how addressing is configured for that subnet?
ClassfulSubnettingSupernettingPrivate
Supernetting
You manage a server that uses an IP address of 192. 168. 255. 188 with a mask of 255. 255. 0. 0. Which of the following describes the address type?
MulticastClasslessPublicClassfulBroadcast
Classless
Which type of address is the IP address 232. 111. 252. 250? Multicast
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192. 168. 55. 199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other host son the Internet. Why can’t you access the server? Private addresses are not accessible through the internet.
Which organization is responsible for allocating public IP addressesIANA
Which of the following associates a port number with a host on a private network?
VLSMPATNATCIDR
PAT
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192. 168. 55. 199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access? Static NAT
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
10. 0. 0. 0 – 10. 255. 255. 255192. 168. 0. 0 – 192. 168. 255. 255172. 16. 0. 0 – 172. 31. 255. 255169. 254. 0. 0 – 169. 254. 255. 255
169. 254. 0. 0 – 169. 254. 255. 255
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers? Static
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement? Dynamic
Which of the following best describes the purpose of using subnets? Subnets divide an IP network address into multiple network addresses
Which of the following is not a reason to use subnets on a network?
Improve securityCombine different media type on the same subnetExtend the networkIsolate network problems
Combine different media type on the same subnet
You’ve decided to use a subnet mask of 255. 255. 192. 0 on the 172. 17. 0. 0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)
172. 17. 32. 0172. 17. 128. 0172. 17. 0. 0172. 17. 16. 0172. 17. 96. 0
172. 17. 128. 0172. 17. 0. 0
You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the Internet. Which address would you use for the default gateway address?
The IP address assigned to Fa0/1 on Router1The IP address assigned to Fa0/0 on Router2The IP address assigned to SwitchAThe IP address assigned to Fa0/1 on Router 2The IP address assigned to Fa0/0 on Router 1
Wrk1 – SwitchA – Fa0/0 – Router1 – Fa0/1 – SwitchB – Fa0/0 – Router2 – Fa0/1 – Internet
The IP address assigned to Fa0/0 on Router 1
You have a small network as shown in the Exhibit you have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the Internet to connect to sites like www. cisco. com. What other parameters are required on the work station? (Select two.)
WINS Server addressDNS Server addressDefault gatewayHostnameDHCP server address
Wrk1 – SwitchA – Fa0/0 – Router1 – Fa0/1 – SwitchB – Fa0/0 – Router2 – Fa0/1 – Internet
DNS Server address, Default gateway
You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network? IP address and subnet mask
You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop downs, select the appropriate parameters to configure the workstations TCP/IP settings.
DNS1 – 198. 162. 1. 22Internet – 166. 11. 199. 77/22RouterA – 192. 168. 12. 34/28Wrk1
IP address – 192. 168. 12. 30192. 168. 12. 32192. 168. 12. 46192. 168. 12. 47Subnet Mask – 255. 255. 255. 0255. 255. 255. 240255. 255. 255. 224Default Gateway – 166. 11. 199. 77192. 168. 12. 34198. 162. 1. 22DNS Server – 166. 11. 199. 77192. 168. 12. 34198. 162. 1. 22
IP address – 192. 168. 12. 46Subnet Mask – 255. 255. 255. 240Default Gateway – 192. 168. 12. 34DNS Server – 198. 162. 1. 22
A host wants to send a message to another host with the IP address 115. 99. 80. 157. IP does not known the hardware address of the destination device. Which protocol can be used to discover the MAC address? ARP
Match the IPv6 address configuration method on the right with its definition on the left.
Drag
1 – Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP).
2 – Provides each client with an IP address, default gateway, and other IP configuration information.
3 – The prefix is statically assigned and the interface ID is derived from the MAC address.
4 – The entire 128-bit address and all other configuration information is statically assigned to the host.
5 – Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.
Drop –Static Full Assign