C2-BD-F8 when the interface ID is generated by using the EUI -64 process? ✔✔1E6F:65FF:FEC2:BDF8 An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID spa ce? ✔✔256 Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? ✔✔BB:BB:BB:BB:BB:BB - Explain:When a host sends information to a distant network, the Layer 2 frame header wil l contain a source and destination MAC address. The source address will be the originating host device. The destination address will be the router interface that connects to the same network. In the case of host A sending information to host B, the source address is AA:AA:AA:AA:AA:AA and the destination address is the MAC address assigned to the R2 Ethernet interface, BB:BB:BB:BB:BB:BB. When a switch configuration includes a user -defined error threshold on a per -port basis, to which switching method will t he switch revert when the error threshold is reached? ✔✔store -and-
forward Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) ✔✔-Destination IP addresses in a packet header remain cons tant along the entire path to a target host. -Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. What is one main characteristic of the data link layer? ✔✔It shields the upper layer pro tocol from being aware of the physical medium to be used in the communication. What are three characteristics of the CSMA/CD process? (Choose three.) ✔✔-A device listens and waits until the media is not busy before transmitting. -After detecting a collisi on, hosts can attempt to resume transmission after a random time delay has expired. -All of the devices on a segment see data that passes on the network medium. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) ✔✔-
accessing the media -data encapsulation Which two commands can be used on a Windows host to display the routing table? (Choose two.) ✔✔-netstat -r -route print Explain:On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat -s command is used to di splay per -
protocol statistics. The tracert command is used to display the path that a packet travels to its destination. What are two functions that are provided by the network layer? (Choose two.) ✔✔-directing data packets to destination hosts on other n etworks -providing end devices with a unique network identifier Which two statements describe features of an IPv4 routing table on a router? (Choose two.) ✔✔-
Directly connected interfaces will have two route source codes in the routing table: C and S. -If a default static route is configured in the router, an entry will be included in the routing table with source code S. How does the service password -encryption command enhance password security on Cisco routers and switches? ✔✔-It encrypts passwords tha t are stored in router or switch configuration files. Why would a Layer 2 switch need an IP address? ✔✔to enable the switch to be managed remotely What characteristic describes identity theft? ✔✔the use of stolen credentials to access private data