You are on page 1of 23

July – December 2023

Supplementary Summative Assessment 1 Examination Revision

Module: Telecommunications 3 (HTCP300-1)

Instructions:
In preparation for the upcoming Supplementary Summative Assessment 1, please see below 50 example
Multiple Choice Questions with solutions:

Question 1 (1 mark)
The Department of Health of the Republic of South Africa has hosted its servers with
Amazon Web Services (AWS) Cloud. This means that the different health offices around
the country can access these servers from anywhere at any anytime. What name is used
to refer to such a network?

A. Local area network (LAN)


B. Metropolitan area network (MAN)
C. Campus area network (CAN)
D. Wide Area Network (WAN)

Question 2 (1 mark)
The Boston City Campus firewall is configured to filter messages at the application level.
It doesn’t allow the client to make a direct connection with the destination, it fetches the
desired content on behalf of the client, saving a copy in case it is needed by other clients.
What type of firewall is used by Boston City Campus?

A. Packet filter
B. Stateful inspection firewall
C. Proxy firewall
D. Next-generation firewalls

1 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 3 (1 mark)
What is the responsibility of the Presentation layer of the Open System Interconnection
(OSI) model?

A. Defining protocols for tasks such as transferring files, sending emails, and saving
data to a network server.
B. Providing protocols that allow applications to access utilities and services on the
network.
C. Specifying procedures for the connection, termination, and reestablishment of
sessions.
D. Encoding data into a standard network-compatible format.

Question 4 (1 mark)
You are the Network Administrator for Boston City Campus. One positive case of
COVID19 has been reported at your office. As a result, the office will be closed for two
weeks so that everything can be disinfected. You want to be able to remotely configure
some services while the office is closed. Which service will allow you to do this?

A. Trivial File Transfer Protocol (TFTP)


B. Transmission Control Protocol (TCP)
C. File Transfer Protocol (FTP)
D. Telnet

Question 5 (1 mark)
You are the Network Administrator for Samsoft Inc. One positive case of COVID19 has
been reported at your office. As a result, the office will be closed for two weeks so that
everything can be disinfected. You want to be able to remotely configure some services
while the office is closed. Which port number will you use to achieve this goal?

A. 80
B. 25
C. 23
D. 22

2 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 6 (1 mark)
You are configuring a DHCP server at the organisation that you work for. In the process,
you need to exclude some devices like network printers from the DHCP pool such that
they will have static IP addresses. Which of the following choices will allow you to
uniquely identify the devices that you want to exclude?

A. Internet Protocol (IP) address


B. Media Access Control (MAC) Addresses
C. Device Name
D. Logical Address

Question 7 (1 mark)
When a switch receives a frame, the switch compares the source MAC address in the
frame with the entries in the MAC address table. What happens if the switch finds a
match in the addressing table? (Choose the most appropriate answer)

A. The switch floods the frame out all ports except the port that received it
B. The switch floods the frame out all ports including the port that received it
C. The switch forwards the frame only to the outgoing interface corresponding to that
MAC address
D. The switch forwards the frame only to the outgoing interface corresponding to that IP
address

3 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 8 (1 mark)
You can use Cisco Discovery Protocol (CDP) in the show command to view details about
neighbors. Isolate the command that has been executed to display the following
outcome.

A. show cdp neighbors


B. show cdp neighbors detail
C. show cdp entry
D. show run

4 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 9 (1 mark)
One of your switches which was designated as the root bridge has become unavailable
and you had not prepared for this eventuality. In the future, you don’t want this to happen
so you want to configure a secondary root bridge such that if the root bridge fails, the
secondary root bridge will take over immediately. How would you designate a secondary
root bridge?

A. Set its Bridge Priority to the lowest value


B. Set its Bridge Priority to the second-lowest value
C. Set its Bridge Priority to the highest value
D. Set its Bridge Priority to the second-highest value

Question 10 (1 mark)
Which of the following commands is used to configure the VLAN membership of a port?

A. switchport access vlan <vlan-id>


B. switchport mode access |dynamic | auto | desirable | trunk
C. switchport trunk encapsulation dot1q
D. vlan <vlan-id>

Question 11 (1 mark)
A unicast address is an IP address that is used to communicate information from one
node in a network to another node. Identify an application that uses unicast addressing.

A. Hyper-Text Transfer Protocol (HTTP)


B. Routing Information Protocol (RIP)
C. Address Resolution Protocol (ARP)
D. Dynamic Host Configuration Protocol (DHCP)

Question 12 (1 mark)

5 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Choose which of the following addresses are true for Class B host if the default Class B
mask is in use?

A. 190.6.5.4
B. 10.6.8.35
C. 192.168.5.9
D. 127.0.0.1

Question 13 (1 mark)
Given the scenario assume all ports are on layer two and the devices are in the VLAN.
Which network device should be placed at the highlighted box, to produce a total of two
domains for broadcast and seven domains for collision in the network?

A. Hub
B. Switch
C. Bridge
D. Router
Question 14 (1 mark)

6 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Select the correct formula to calculate how many host addresses are available in a
subnet.

A. 2𝑛 − 2 , where n is the number of 1s on the right side of the subnet mask.


B. 2𝑛 − 2, where n is the number of 0s on the right side of the subnet mask.
C. 2𝑛 − 2, where n is the number of 0s on the left side of the subnet mask.
D. 2𝑛 − 2, where n is the number of 1s on the left side of the subnet mask.

Question 15 (1 mark)
Which of the following multicast addresses are reserved for routing packets to a subset
of routers that use the Open Shortest Path First (OSPF) protocol?

A. FF02::1
B. FF02::2
C. FF02::A
D. FF02::6

Question 16 (1 mark)
The company that you work for has two offices in the Stellenbosch area. Each of the
office has its own network. Top management wants these two networks two
communicate. Which device is used to select the best path for transferring data packets
from one network to the other?

A. Switch
B. Hub
C. Router
D. Firewall

Question 17 (1 mark)

7 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
When a router is making forwarding decisions, what happens when the destination does
not match any other entry in the routing table? (choose the most appropriate answer)

A. The packet is forwarded through the interface specified for the default route
B. The packet is discarded
C. The packet is forwarded out of the interface associated with the route that has the
longest match
D. The packet if flooded to all the ports

Question 18 (1 mark)
A packet that is destined for 192.168.10.1 arrives on an interface with the following routes
in the routing table:

192.168.11.0/24 gateway 10.1.1.2

192.168.11.0/19 gateway 10.1.1.3

No default gateway has been configured for this network.

Where will this packet be directed to?

A. 10.1.1.2
B. 10.1.1.3
C. 0.0.0.0/0
D. It will be discarded

Question 19 (1 mark)

8 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Administrative distance is a feature that routers use to select the best path when there
are two or more different routes to the same destination from two different routing
protocols. If two or more routing protocols present the router with a route, which route is
placed in the routing table?

A. The route with the highest administrative distance


B. The route with the lowest administrative distance
C. The rout that is presented first
D. The route that is presented last

Question 20 (1 mark)
Which of the following is an example of a Link state protocol?

A. Border Gateway Protocol (BGP)


B. Routing Information Protocol version 2 (RIPv2)
C. Interior Gateway Routing Protocol (IGRP)
D. Open Shortest Path First (OSPF)

Question 21 (1 mark)
Study the graphic below.

What name is given to the device that is pointed by an arrow in the graphic above?

9 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
A. Router
B. Switch
C. Access point
D. Client

Question 22 (1 mark)
To prevent the interference caused by channel overlap, the Wi-Fi protocol calls for
channel separation of 16.25 to 22 MHz, which corresponds to three non-overlapping
channels on 2.4 GHz. Identify the three non-overlapping channels on 2.4GHz.

A. 1, 2 and 3
B. 1, 6, and 11
C. 7, 9 and 18
D. 16, 22 and 25

Question 23 (1 mark)
When you use the CLI to configure Cisco network devices, you have the option of using
a direct serial connection, or you can use a remote network session. Select the cable
that is used when you want to configure your devices using a direct connection.

A. Crossover Cable
B. Console cable
C. Straight through cable
D. Rolled cable

Question 24 (1 mark)

10 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Terminal Access Controller Access Control System Plus (TACACS+) is a Cisco
proprietary protocol that enables centralized authentication of remote user access to
network devices through authentication, authorization, and accounting (AAA). Which
port does TACACS use?

A. UDP port 49
B. TCP port 49
C. TCP port 23
D. UDP port 80

Question 25 (1 mark)
Remote Authentication Dial-In User Service (RADIUS) is an open standard that enables
a server to provide standardized and centralized authentication for remote users through
AAA. Which ports does RADIUS use?

A. TCP ports 1812 and 1813


B. UDP ports 1812 and 1813
C. UDP ports 1814 and 1815
D. TCP ports 1810 and 1813

Question 26 (1 mark)
What name is given to the process of encoding information so that only those authorized
to view it can view it?
A. Authentication
B. Authorisation
C. Encryption
D. Decoding

Question 27 (1 mark)
11 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Differentiate Implicit and Explicit File Transfer Protocol Secure (FTPS).

A. With explicit FTPS, a SSL connection is established first, then login and file transfer
can occur while with implicit FTPS, a traditional FTP connection is established, and
then a secure SSL connection is established prior to login.
B. With implicit FTPS, a SSL connection is established first, then login and file transfer
can occur while with explicit FTPS, a traditional FTP connection is established, and
then a secure SSL connection is established prior to login.
C. With implicit FTPS, a SSL connection is not established, file transfer just occurs while
with explicit FTPS, a traditional FTP connection is established, and then a secure
SSL connection is established prior to login.
D. Explicit FTPS clients send the AUTH command after logging in so that credentials
are secured while implicit FTPS clients send the AUTH command prior logging in so
that credentials are secured
Question 28 (1 mark)
Boston City Campus is opening a new call centre in a rural area. You have been
requested to setup a network that ensures the highest Quality of Service (QoS) for voice
over wireless. Identify the QoS profile that you will use to achieve this.

A. Platinum/Voice
B. Gold/Voice
C. Silver/Best Effort
D. Bronze/Background

Question 29 (1 mark)
Samsoft Inc. is planning to open an internet café in Pretoria. They need a network that
provides normal bandwidth for clients. This is normally the default service. Select the
Quality of Service (QoS) profile that you will recommend them to use.

A. Platinum/Voice
B. Gold/Voice
C. Silver/Best Effort
D. Bronze/Background
Question 30 (1 mark)

12 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Determine the command that is used to reserve IP addresses for network devices like
printers.

A. ip dhcp pool <pool-name>


B. ip dhcp client lease <days> <hours> <minutes> | infinite
C. ip dhcp excluded-address <ip-address> <last-ip-address>
D. ip dhcp reserve-address <ip-address> <last-ip-address>

Question 31 (1 mark)
Cisco classifies Network Address Translation (NAT) addresses into four types. Choose
an answer that suits, “An IP address assigned to a remote host and used for
communicating with other remote hosts. These are public IP addresses.”

A. Inside local address


B. Inside global address
C. Outside global address
D. Outside local address

Question 32 (1 mark)
Dynamic NAT is a NAT implementation in which each private IP address used in the
local network is dynamically mapped to a registered public IP address. What step is
performed first when a packet reaches the router from an internal host?

A. Performs NAT translation and routes the packet to the external network
B. Adds an entry in the NAT table showing the inside global address corresponding to
the inside local address
C. Applies the matching logic and allocates the first address from the address pool
D. Performs NAT translation and routes the packet to the internal network

Question 33 (1 mark)

13 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Network attackers have various methods of operation, motivations, and intentions.
Attackers can be categorized into different types. Which of the following sentences
describes the term, “Academic hacker?”

A. A hacker who discovers and exposes security flaws for financial gain or for some
other malicious purpose
B. A hacker who breaks into the telecommunication system without permission
C. An ethical hacker who discovers and exposes security flaws in the organizational
network so they can be resolved
D. A hacker who exposes security vulnerabilities with the intention of improving the
existing infrastructure or establishing a new secure setup

Question 34 (1 mark)
Stephanie is a Systems Administrator for Samsoft Inc. He doesn’t feel appreciated for
the role that he plays at work. He discovers some security loopholes in the system and
crashes the system temporarily on a busy day so that he can get all the attention, resolve
the problem and prove himself a worthy employee to top management. What type of
attacker is Stephanie?

A. Black hat hacker


B. Cracker
C. White hat hacker
D. Phreaker
Question 35 (1 mark)
Chengetai is working for FNB bank. She discovers some security loopholes in the
system, which may allow fraudsters to transfer small amounts of money from all the FNB
customer accounts. She decides to expose these loopholes to a group of fraudsters for
a financial gain. How do you classify Chengetai?

A. Black hat hacker


B. Cracker
C. White hat hacker
D. Phreaker
Question 36 (1 mark)

14 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Melody is a Programmer at Finepick investments. She also runs Samsoft Investments,
a small programming company in Technopark. Melody identifies a security loophole on
the system at Finepick Investiments and reports it to top management. She decides to
take advantage of the company and says she can’t fix it as it requires lots of resources
when she knows that she can fix it. She the recommends that Samsoft Investments is
the best company to resolve the issue at hand so that she can gain financially. Which
name best suits Melody?

A. Black hat hacker


B. Gray hat hacker
C. White hat hacker
D. Phreaker

Question 37 (1 mark)
Refer to the following graphic. As the Network Administrator for Bank ABC, you need to
block traffic from the host 192.168.2.6 to the HR web application server but allow it to
get to all other servers and the Internet.

Select the command(s) that will achieve this.

15 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
A. Router(config)#access-list 101 deny tcp host 192.168.2.6 host 192.168.1.3 eq 80
Router(config)#access-list 101 permit any any
B. Router(config)#access-list 101 deny tcp host 192.168.2.6 host 192.168.1.3 eq 80
Router(config)#access-list 101 permit ip any any
C. Router(config)#access-list 101 deny host 192.168.2.6 host 192.168.1.3 eq 80
Router(config)#access-list 101 permit any any

D. Router(config)#access-list 101 deny tcp host 192.168.2.6 host 192.168.1.3 eq 80


Router(config)#access-list 101 permit ip any any eq 80

Question 38 (1 mark)
Refer to the graphic below.

A port on your switch is showing inactive. You determine that a port-security violation
has been experienced. Once the violation has been discovered, how will you reset the
port so that it functions again?

A. SwitchA(config-if)#no port-security
B. SwitchA(config-if)#no switchport port-security
C. SwitchA(config-if)#shutdown
D. SwitchA(config-if)#no shutdown

16 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 39 (1 mark)
Bank Tellers are being replaced by machines that can do tasks such as withdrawing and
deposing money into the bank. What name is given to the process of reducing the need
for human interaction to perform certain tasks?

A. Redundancy
B. Automation
C. Delegation of duties
D. Authentication

Question 40 (1 mark)
Which of the following architectural components is responsible for providing
programmatic control of all forwarding operations, capabilities advertisement, statistics
reporting, and event notification?

A. Software Defined Networking (SDN) applications


B. Software Defined Networking (SDN) controllers
C. Software Defined Networking (SDN) datapaths
D. Data-Plane Interface (CDPI)

Question 41 (1 mark)
Define the term, Authentication.

A. A method for collecting information, and then logging the information locally or
sending the information to a remote AAA server for the purposes of billing, auditing,
and reporting
B. The process of verifying the identity of the person or device accessing a network
device or resource
C. The process of assembling a set of attributes that describe the action the user is
allowed to perform and then providing suitable access to the user
D. The process of converting information or data into a code, especially to prevent
unauthorized access

17 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 42 (1 mark)
An application-programming interface (API) is a collection of commands, functions,
protocols, and objects that programmers use to create software or interact with other
computers or devices without the need for creating all the code from scratch. Which of
the following APIs enable applications to communicate with controllers?

A. Eastbound APIs
B. Southbound APIs
C. Westbound APIs
D. Northbound APIs

Question 43 (1 mark)
Representational State Transfer (REST) is a software architecture that defines
constraints that are used during the creation of web services. Which of the following
constraints enables servers to transfer code to a client to provide any additional or
different functionality required to complete a request.

A. Cacheability
B. Layered systems
C. Uniform interface
D. Code on demand

Question 44 (1 mark)
There is no ASCII character for a space or various punctuation marks often included in
URLs. These spaces are replaced with the percent symbol, %, followed by two hex digits,
such as %20, for a space. What name is given to this process of converting URL data
from one form to another?

A. URL encryption
B. URL encoding
C. URL authentication
URL encapsulation

18 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Question 45 (1 mark)
One of the users has reported a network error. As the Network Administrator, you want
to resolve this error as quickly as possible. Which of the following CISCO troubleshooting
methods would you start with?

A. Gather detailed information


B. Devise a plan to solve the problem
C. Define the problem
D. Consider probable cause for the failure
Question 46 (1 mark)
When setting up a network, you must ensure that you use the correct cable type for the
connections. What is the correct type of cable to use 10/100 Mbps connections?

A. Category 3 copper cable


B. Category 5 UTP copper cable
C. Category 5e or Category 6 UTP copper cable
D. Category 6A cable

Question 47 (1 mark)
When you want to troubleshoot IPv4 addressing and subnetting problems, which of the
following guidelines do you have to consider?

i. Eliminate non-IP issues such as Physical and Data Link Layer problems,
firewalls, and incorrect VLAN configurations.
ii. Use a Time-Domain Reflectometer (TDR) to find any unterminated Ethernet
cables.
iii. Test network connectivity by using the traceroute and ping commands.
iv. Look for any transceiver attached to a host that is constantly sending
unwanted signals, which can disrupt the communication within the network.
v. Determine the current status at a Cisco router by using the show ip interface
and show ip route connected commands.
vi. Check for late collisions by using a protocol analyzer.
vii. Check the DNS server addresses, subnet masks, and default router settings
specified at the host, and correct them if necessary.

19 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
A. I, ii,iii, iv
B. Iv, v, vi, vii
C. Ii,iv,vi, viii
D. I, iii, v, vii

Question 48 (1 mark)
You are configuring inter-VLAN routing and you realise that remote switches have no
pathway to the VLAN interfaces. How would you fix this?

A. Ensure that you create a VLAN that correspond with the VLAN interface
B. Ensure that trunk links are created between the switches so that hosts on any VLAN
can access their default gateway, even if it is on a remote switch
C. Ensure that hosts that are plugged into a particular VLAN are configured to use the
VLAN interface as their default gateway
D. Ensure that L3 switches provide a VLAN interface for each VLAN that needs to have
its traffic routed

Question 49 (1 mark)
You have configured Open Shortest Path First (OSPF) and one of the OSPF area-type
is stub on one neighbor, but the adjoining neighbor in the same area is not configured
as a stub. Which command would you use to isolate this problem?

A. show ip ospf interface


B. show interface <int-type><int-num>
C. show memory processor
D. show memory summary
Question 50 (1 mark)
You have noticed that the access list that is configured is blocking all the packets.
Choose the possible cause of this problem.

A. The permit filter may be too high in the access list order
B. The filter might be applied to the wrong interface
C. The filter might be applied to the right interface, but in the wrong direction
D. The access list might be empty

20 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
Solution:

1. D. Wide Area Network (WAN) (Lesson 1, pages 3-4)


2. C. Proxy firewall (Lesson 1, page 10)
3. D. Encoding data into a standard network-compatible format (Lesson 1, page
24)
4. D. Telnet (Lesson 1, page 28-29)
5. C. 23 (Lesson 1, page 28-29)
6. B. Media Access Control (MAC) Addresses (Lesson 2, page 46)
7. C. The switch forwards the frame only to the outgoing interface corresponding
to that MAC address (Lesson 2, page 47)
8. B. show cdp neighbors detail (Lesson 2, pages 50-51)
9. B. Set its Bridge Priority to the second-lowest value (Lesson 2, page 53)
10. B. switchport mode access |dynamic | auto | desirable | trunk (Lesson 2, page
59)
11. A. Hyper-Text Transfer Protocol (HTTP) (Lesson 3, pages 70-71)
12. A. 190.6.5.4 (Lesson 3, page 70)
13. A. Hub (Lesson 2, page 59)
14. B. 2^n-2, where n is the number of 0s on the right side of the subnet mask
(Lesson 3, page 75)
15. D. FF02::6 (Lesson 3, page 89)
16. C. Router (Lesson 4, page 98)
17. A. The packet is forwarded through the interface specified for the default route
(Lesson 4, page 98)
18. D. It will be discarded (Lesson 4, page 99)
19. B. The route with the lowest administrative distance (Lesson 4, page 105)
20. D. Open Shortest Path First (OSPF) (Lesson 4, page 110)
21. C. Access point (Lesson 5, page 122)
22. B. 1, 6, and 11 (Lesson 5, page 125)
23. B. Console cable (Lesson 5, page 129)
24. B. TCP port 49 (Lesson 5, page 130)

21 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
25. B. UDP ports 1812 and 1813 (Lesson 5, page 132)
26. C. Encryption (Lesson 5, page 129)
27. B. With implicit FTPS, a SSL connection is established first, then login and file
transfer can occur while with explicit FTPS, a traditional FTP connection is
established, and then a secure SSL connection is established prior to login
(Lesson 6, page 140)
28. A. Platinum/Voice (Lesson 5, page 136)
29. C. Silver/Best Effort (Lesson 5, page 136)
30. C. ip dhcp excluded-address <ip-address> <last-ip-address> (Lesson 6, page
145)
31. C. Outside global address (Lesson 6, page 150)
32. C. Applies the matching logic and allocates the first address from the address
pool (Lesson 6, page 150)
33. D. A hacker who exposes security vulnerabilities with the intention of
improving the existing infrastructure or establishing a new secure setup
(Lesson 7, page 178)
34. C. White hat hacker (Lesson 7, page 178)
35. A. Black hat hacker (Lesson 7, page 178)
36. B. Gray hat hacker (Lesson 7, pages 178-179)
37. B. Router(config)#access-list 101 deny tcp host 192.168.2.6 host 192.168.1.3
eq 80 Router(config)#access-list 101 permit ip any any (Lesson 7, page
184-185)
38. D. SwitchA(config-if)#no shutdown (Lesson 7, page 190)
39. B. Automation (Lesson 8, page 206)
40. D. Data-Plane Interface (CDPI) (Lesson 8, page 209)
41. B. The process of verifying the identity of the person or device accessing a
network device or resource (Lesson 7, page 178)
42. D. Northbound APIs (Lesson 8, page 212)
43. D. Code on demand (Lesson 8, pages 214-215)
44. B. URL encoding (Lesson 8, page 215)
45. C. Define the problem (Lesson 9. Page 222)
46. B. Category 5 UTP copper cable (Lesson 9, page 225)

22 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023
47. D. i, iii, v, vii (Lesson 9, page 232)

48. B. Ensure that trunk links are created between the switches so that hosts on
any VLAN can access their default gateway, even if it is on a remote switch
(Lesson 9, page 235)
49. A. show ip ospf interface (Lesson 9, page 237)
50. D. The access list might be empty (Lesson 9, page 251)

23 HTCP300-1-Jul-Dec2023-SuppSA1-Exam-Revision-CZ-V.1-27112023

You might also like