296
CCNA OSI Model Questions Question 1 Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two) A. The transport layer divides a data stream into segments and may add reliability and flow control information. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol- related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link. Answer: A D Explanation The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival. The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part. -> A is correct. The data link layer adds physical source and destination addresses and an Frame Check Sequence (FCS) to the packet (on Layer 3), not segment (on Layer 4) -> B is not correct. Packets are created when network layer encapsulates a segment (not frame) with source and destination host addresses and protocol-related control information. Notice that the network layer encapsulates messages received from higher layers by placing them into datagrams (also called packets) with a network layer header -> C is not correct. The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the network layer determines the best path to a particular destination network, and routes the data appropriately. -> D is correct. The Physical layer (not presentation layer) translates bits into voltages for transmission across the physical link -> E is not correct. Question 2 Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN? A. physical B. data link C. network D. transport Answer: B Explanation The hardware address of a device or the Media Access Control (MAC) address is added in the Data Link layer. An Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits (for example: 00:15:A4:CB:03:CA).

CCNA – OSI Model Questions

Embed Size (px)

Citation preview

CCNA – OSI Model Questions

Question 1

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

A. The transport layer divides a data stream into segments and may add reliability and flow control information.

B. The data link layer adds physical source and destination addresses and an FCS to the segment.

C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-

related control information.

D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

E. The presentation layer translates bits into voltages for transmission across the physical link.

Answer: A D

Explanation

The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the

receiving device can reassemble the data on arrival.

The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For

example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits

for this acknowledgment before sending the next part.

-> A is correct.

The data link layer adds physical source and destination addresses and an Frame Check Sequence (FCS) to the packet (on Layer

3), not segment (on Layer 4) -> B is not correct.

Packets are created when network layer encapsulates a segment (not frame) with source and destination host addresses and

protocol-related control information. Notice that the network layer encapsulates messages received from higher layers by placing

them into datagrams (also called packets) with a network layer header -> C is not correct.

The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the

network layer determines the best path to a particular destination network, and routes the data appropriately.

-> D is correct.

The Physical layer (not presentation layer) translates bits into voltages for transmission across the physical link -> E is not

correct.

Question 2

Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a

LAN?

A. physical

B. data link

C. network

D. transport

Answer: B

Explanation

The hardware address of a device or the Media Access Control (MAC) address is added in the Data Link layer. An Ethernet

MAC address is a 48-bit binary value expressed as 12 hexadecimal digits (for example: 00:15:A4:CB:03:CA).

Question 3

Which layer of the OSI reference model uses flow control, sequencing, and acknowledgments to ensure that reliable networking

occurs?

A. data link

B. network

C. transport

D. presentation

E. physical

Answer: C

Question 4

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to

see if enough resources exist for that communication?

A. transport

B. network

C. presentation

D. session

E. application

Answer: E

Question 5

Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI

reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?

A. presentation

B. session

C. transport

D. network

E. physical

Answer: D

Question 6

Which protocols are found in the network layer of the OSI reference model and are responsible for path determination and traffic

switching?

A. LAN

B. routing

C. WAN

D. network

Answer: B

Question 7

Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer

is the problem?

C:\> ping 10.10.10.1

Pinging 10.10.10.1 with 32 bytes of data:

Request timed out.

Request timed out.

Request timed out.

Request timed out.

Ping statistics for 10.10.10.1:

Packets: sent – 4, Received = 0, Lost – 4 (100% loss)

A. data link layer

B. application layer

C. access layer

D. session layer

E. network layer

Answer: E

Explanation

The Network layer is responsible for network addressing and routing through the internetwork. So a ping fails, you may have an

issue with the Network layer (although lower layers like Data Link & Physical may cause the problem).

Question 8

Which of the following are types of flow control? (Choose three)

A. buffering

B. cut-through

C. windowing

D. congestion avoidance

E. load balancing

Answer: A C D

Explanation

Three types of flow control are buffering, windowing & congestion avoidance:

+ Buffering: If a device receives packets too quickly for it to handle then it can store them in a memory section called a buffer

and proceed them later.

+ Windowing: a window is the quantity of data segments that the transmitting device is allowed to send without receiving an

acknowledgment for them. For example:

With the window size of 1, the sending device sends 1 segment and the receiving device must reply with 1 ACK before the

sending device can send the next segment. This “waiting” takes some time.

By increasing the window size to 3, the sending device will send up to 3 segments before waiting an ACK -> helps reduce the

waiting time.

+ Congestion avoidance: lower-priority traffic can be discarded when the network is overloaded -> minimize delays.

Question 9

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote

server. What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. application

B. presentation

C. session

D. transport

E. internet

F. data link

Answer: A

Explanation

FTP belongs to Application layer and it is also the highest layer of the OSI model.

Question 10

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At

which OSI layer did this happen?

A. session

B. network

C. physical

D. data link

E. transport

Answer: D

Explanation

When using the term “frame” we can easily recognize it belongs to the Data Link layer. In this layer, an Frame Check Sequence

(FCS) field is added to the frame to verify that the frame data is received correctly.

Question 11

As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the

device. For what two reasons can this happen? (Choose two)

A. The data is moving from 10BASE-TX to 100BASE-TX.

B. The WAN encapsulation type has changed.

C. The data format has changed from analog to digital.

D. The source and destination hosts are in the same subnet.

E. The source and destination MAC addresses have changed.

Answer: B E

Question 12

Acknowledgement, Sequencing, and Flow control are characteristics of which OSI layer?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 5

E. Layer 6

F. Layer 7

Answer: C

Q4. Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking

to see if enough resources exist for that communication?

A. transport

B. network

C. presentation

D. session

E. application

Answer: E

True statements about the operation of a full-duplex Ethernet network

There are no collisions in full-duplex mode.

A dedicated switch port is required for each full-duplex node.

The host network card and the switch port must be capable of operating in full-duplex mode.

Which OSI layer header contains the address of a destination host that is on another network?

Network Layer

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

Network access layer

Which protocol uses a connection-oriented service to deliver files between end systems?

FTP

What do switches do?

Prevent Ethernet Collisions, Create less collision domains.

Mac Address

Physical Address, Layer 2 devices,

Which network device functions only at Layer 1 of the OSI model?

Hub

Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt

required?

UDP

Which layer of the OSI model controls the reliability of communications between network devices

using flow control, sequencing and acknowledgments?

Transport Layer

True statements regarding ICMP packets

TRACERT uses ICMP packets.

They are encapsulated within IP datagrams

Statements that accurately describe CDP

CDP is a Cisco proprietary protocol.

CDP is a datalink layer protocol.

CDP can discover directly connected neighboring Cisco devices.

How does a switch differ from a hub?

A switch tracks MAC addresses of directly-connected devices.

What must occur before a workstation can exchange HTTP packets with a web server?

A TCP connection must be established between the workstation and the web server.

How does TCP differ from UDP?

TCP provides sequence numbering of packets.

TCP provides synchronized communication.

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the

workstation now use to determine the destination MAC address to be placed into frames directed

toward the server?

ARP

What destination MAC address is used in the ARP request?

ff-ff-ff-ff-ff-ff

What are two common TCP applications?

SMTP and FTP

Describe the operation of the CSMA/CD access method?

...

The operation of the CSMA/CD access method

In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.

After a collision, all stations run a random backoff algorithm. When the backoff delay period has

expired, all stations have equal priority to transmit data.

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from

another vendor?

CDP

At which layer of the OSI model does the protocol that provides the information that is displayed by

the show cdp neighbors command operate?

data link

Characteristics that apply to Layer 2 switches?

Decreases the number of collision domains and Implements VLAN.

Which two characteristics describe the access layer of the hierarchical network design model?

Port security and vlans

To what type of port would a cable with a DB-60 connector attach?

Serial port

Types of flow control

cut-through, windowing & load balancing

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the

destination MAC address. What will the switch do with the frame?

A. drop the frame

forward it out of all ports except the one that received it

What does a host on an Ethernet network do when it is creating a frame and it does not have the

destination address?

Sends out an ARP request with the destination IP address

Please allow access to your computer’s microphone to use Voice Recording.

http://www.aiotestking.com/cisco/which-two-of-these-functions-do-routers-perform-on-packets-2/

http://www.aiopass4sure.com/cisco-exams/640-822-exam

Braindumps of 640-821

Introduction to Cisco Networking Technologies

Exam Questions, Answers, Braindumps (640-821)

Thanks to www.exams.ws and www.4exam.com But there’s no need to have it from both of them,

only questions from only one are sufficient I think.

QUESTION 1

Which command will reinitialize the router and totally replace the running

configuration with the current startup configuration?

A. Abc B#reload

B. Abc B# copy tftp startup-config

C. Abc B# copy startup.-config running-config

D. Abc B# copy running-config flash

E. Abc B# setup

Answer: A.

QUESTION 2

Which is the correct fallback sequence for loading the Cisco IOS?

A. ROM, Flash, NVRAM

B. ROM, TFTP server, Flash

C. Flash, TFTP server ROM

D. Flash NVRAM, RAM

Answer: C

QUESTION 3

You are the network administrator at Abc . Abc users report that they cannot access

resources on the LAN attached to interface e0 of router ABC1 . You want to view the

current IP addressing and the Layer 1 and Layer 2 status of this interface. Which of

the following commands could you use? (Choose three.)

A. ABC1 # show version

B. ABC1 # show protocols

C. ABC1 # show interfaces

D. ABC1 # show controllers

E. ABC1 # show ip interface

F. ABC1 # show startup-config

Answer: C, D, E

Explanation:

showinterfaces is used to see the IP addresses and layer 2 information configured on

the interfaces.

showcontrollers is used to see the layer 1 statistics. It tells about the V.35 cables

whether they are physically attached or not.

showip interfaces is used to see the IP addresses configured on the interfaces.

QUESTION 4

You are a network technician at Abc . You are troubleshooting a LAN connectivity

problem. Which of the following router IOS commands could you use? (Select three

options.)

A. show ip route

B. winipcfg

C. tracert

D. show interfaces

E. traceroute

F. ping

Answer: A D F

Explanation

A: The show ip route command displays the IP route table.

D: The show interfaces EXEC command to display statistics for all interfaces

configured on the router or access server.

F: The ping command tests connectivity to a remote node.

QUESTION 5

You are a technician at Abc . Your newly appointed Abc trainee wants to know what

command she can use to verify the active configuration on a Cisco router. What

would your reply be?

A. Router# show memory

B. Router# show startup-config

C. Router# show running-config

D. Router# show flash

Answer: C

Explanation:

The two commands that list the currently used configuration in a router is reloaded are

show running-config and write terminal.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-

58720-094-5) page 494

QUESTION 6

You are a technician at Abc . Your newly appointed Abc trainee is troubleshooting a

connectivity problem on the Abc network. She asks you what command she should

use to test application layer connectivity the between source and destination. What

would your reply be?

A. ping

B. telnet

C. traceroute

D. verify

E. trace

Answer: B

Explanation:

Telnet - The standard terminal emulation protocol in the TCP/IP protocol stack.

Telnet is used for remote terminal connection, enabling users to log in to remote

systems and use resources as if they were connected to a local system.

I was going to choose answer A (ping), but the keyword in the question is "application

layer". Ping only needs to hit the NIC and that would mean layer 1 (Physical layer).

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-

58720-094-5) page 589

QUESTION 7

You are the network administrator at Abc . Your assistant made a number of errors

when utilizing the router setup mode facility. You want to exit setup mode without

applying the changes that your assistant made. What should you do? (Select two.)

A. Type exit at the setup dialog.

B. Type close at the setup dialog.

C. Press the Ctrl-C key combination.

D. Press the Ctrl-X key combination.

E. Issue the copy startup-config command.

F. Issue the 'write e" command.

G. Issue the "write mem" command

Answer: A, C

Explanation:

The command 'exit' will set you back from wherever you were without saving any

changes. Pressing Ctrl-C will do the same thing.

Incorrect Answers:

B. This is an invalid command

E. This command is used to save the configuration stored on NVRAM to a location.

F. This will have the effect of erasing the running configuration, and setting the router

configuration back to the factory default settings.

G. This is an old command that is still supported on the latest Cisco IOS. It is short for

"write memory" and has the same effect as the "copy running-config startup-config"

command.

QUESTION 8

With regard to bandwidth, which of the following statements are true? (Choose all

that apply.)

A. Bandwidth availability is decreasing.

B. Bandwidth availability is infinite.

C. Bandwidth is used when analyzing network performance.

D. Bandwidth availability is finite.

E. Bandwidth availability is fixed.

Answer: C, D

Explanation:

C is correct because performance analyzing software is notorious for consuming

bandwidth. Most network management devices use SNMP, which consumes

bandwidth. D is correct because although new technologies are providing for more

bandwidth and a network can be engineered to give more priority to different devices,

there is a finite amount of bandwidth available at any given time.

Incorrect Answers:

A. This is incorrect because new technologies are actually increasing the amount of

potential bandwidth.

B. For any given network, the amount of bandwidth available to end users is usually

fixed, and based on the speed of the connection to access connection. For example,

any given PC with a 10/100 NIC will be limited to 100Mbps of throughput at any

given time.

E. This is incorrect because it's always possible to upgrade a scalable technology or

allocate resources differently.

http://www.braindumps.org/Cisco/640-821/640-821-1.htm

http://www.aiopass4sure.com/cisco-exams/100-101-v-1-exam-questions/how-many-collision-and-broadcast-domains-exist-on-

the-switch-collision-broadcast-3.html

https://www.studyblue.com/notes/note/n/switch/deck/13773248

Incorrect IP or Subnet

You configure a serial connection with PPP. When you enter: show int fa 0/0 you see the

interface is up/up and LCP is open but you can't communicate. What is the problem?

To communicate on point to point links between non Cisco devices

Why do you use PPP?

Discarding, Learning, Forwarding

What are the possible RSTP states?

forward it out of all ports except the one that received it

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the

destination MAC address. What will the switch do with the frame?

Disabled, Blocking, Listening, Learning, Forwarding

What are the possible STP states?

destination MAC address

Which address type does a switch use to make selective forwarding decisions?

sends out an ARP request with the destination IP address

What does a host on an Ethernet network do when it is creating a frame and it does not have the

destination address?

Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.

No routing protocols or other static routes are configured on the router. Which statement is true

about this command?

Assign the addresses statically on each node.

What is the best practice when assigning IP addresses in a small office of six hosts?

Multiple internal hosts will use one IP address to access external network resources.

In the configuration of NAT, what does the keyword overload signify?

The router uses the same IP address but a different TCP source port number for each connection.

What happens when computers on a private network attempt to connect to the Internet through a

Cisco router running PAT?

outside

When configuring NAT, the Internet interface is considered to be what?

relays a DHCP request across networks

The ip helper-address command does what?

It will encrypt all current and future passwords.

What is the effect of using the service password-encryption command?

Enable port security and use the keyword sticky.

An administrator has connected devices to a switch and, for security reasons, wants the

dynamically learned MAC addresses from the address table added to the running configuration.

What must be done to accomplish this?

Enable port security, create the port as an access port, and statically assign the MAC address to

the address table.

A company has placed a networked PC in a lobby so guests can have access to the corporate

directory. A security concern is that someone will disconnect the directory PC and re-connect

their laptop computer and have access to the corporate network. For the port servicing the lobby,

which three configuration steps should be performed on the switch to prevent this?

to prevent unauthorized hosts from accessing the LAN

Why would a network administrator configure port security on a switch?

Configure the server MAC address as a static entry of port security.

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?

broadcast storms

If a host experiences intermittent issues that relate to congestion within a network while

remaining connected, what could cause congestion on this LAN?

HDLC is Cisco specific while PPP can be used between vendors

Why would you select PPP over HDLC for a WAN network?

30 seconds

How often does RIP send routing updates?

Network will fragment it

When a frame is too big to fit on an intermediate LAN, what happens?

destination

When placing a standard access list, do you want to placer it as close as possible to source or

destination?

Source address

What do standard access lists filter on?

Source IP, Destination IP, Protocol, Port Numbers

What can extended access list filter on?

defines new port roles and is compatible with the original IEEE 802.1D STP

Which two of these statements regarding RSTP are correct?

discarding

Which port state is introduced by Rapid-PVST?

discarding and forwarding

Which two states are the port states when RSTP has converged?

allows the root switch location to be optimized per VLAN

What is one benefit of PVST+?

converged

Which term describes a spanning-tree network that has all switch ports in either the blocking or

fowarding state?

All traffic exceeding the CIR is marked discard eligible.

What occurs on a Frame Relay network when the CIR is exceeded?

IP addresses can be conserved if VLSM is not being used for subnetting

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces

when configuring a Frame Relay hub in a hub-and-spoke topology?

defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?

local DLCI on the subinterface

What does the frame-relay interface-dlci command configure?

This is an Ethernet port operating at half duplex.

A network interface port has collision detection and carrier sensing enabled on a shared twisted

pair network. From this statement, what is known about the network interface port?

discarding

Which port state is introduced by Rapid-PVST?

http://www.memrise.com/course/214008/ccna-prep/13/

http://www.aiopass4sure.com/cisco-exams/100-101-v-1-exam-questions/which-address-type-does-a-switch-use-to-make-

selective-forwarding-decisions-3.html

http://www.orbitco-ccna-pastquestions.com/Cisco-CCNA%3A-OSPF-Questions.php

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

three.)

A. There are no collisions in full-duplex mode.

B. A dedicated switch port is required for each full-duplex node.

C. Ethernet hub ports are preconfigured for full-duplex mode.

D. In a full-duplex environment, the host network card must check for the availability of the network

media before transmitting.

E. The host network card and the switch port must be capable of operating in full-duplex mode.

Answer: A,B,E

Which OSI layer header contains the address of a destination host that is on another network?

A. application

B. session

C. transport

D. network

E. data link

F. physica

Answer: D

Explanation:

Only network address contains this information. To transmit the packets the sender uses network

address and datalink address. But the layer 2 address represents just the address of the next hop

device on the way to the sender. It is changed on each hop. Network address remains the same.

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

A. Internet layer

B. transport layer

C. application layer

D. network access layer

D. network access layer

Which protocol uses a connection-oriented service to deliver files between end systems?

A. TFTP

B. DNS

C. FTP

D. SNMP

E. RIP

C. FTP

Which transport layer protocol provides best-effort delivery service with no acknowledgment

receipt required?

E. UDP

Which layer of the OSI model controls the reliability of communications between network devices

using flow control, sequencing and acknowledgments?

C. Transport

Which statements are true regarding ICMP packets? (Choose two.)

A. They acknowledge receipt of TCP segments.

B. They guarantee datagram delivery.

C. TRACERT uses ICMP packets.

D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.

Answer: C,D

Which statements accurately describe CDP? (Choose three.)

A. CDP is an IEEE standard protocol.

B. CDP is a Cisco proprietary protocol.

C. CDP is a datalink layer protocol.

D. CDP is a network layer protocol.

E. CDP can discover directly connected neighboring Cisco devices.

F. CDP can discover Cisco devices that are not directly connected.

Answer: B,C,E

How does a switch differ from a hub?

A. A switch does not induce any latency into the frame transfer time.

B. A switch tracks MAC addresses of directly-connected devices.

C. A switch operates at a lower, more efficient layer of the OSI model.

D. A switch decreases the number of broadcast domains.

E. A switch decreases the number of collision domains.

Answer: B

What must occur before a workstation can exchange HTTP packets with a web server?

A. A UDP connection must be established between the workstation and its default gateway.

B. A UDP connection must be established between the workstation and the web server.

C. A TCP connection must be established between the workstation and its default gateway.

D. A TCP connection must be established between the workstation and the web server.

E. An ICMP connection must be established between the workstation and its default gateway.

F. An ICMP connection must be established between the workstation and the web server.

D. A TCP connection must be established between the workstation and the web server.

Explanation:

HTTP uses TCP port 80.

How does TCP differ from UDP? (Choose two.)

A. TCP provides best effort delivery.

B. TCP provides synchronized communication.

C. TCP segments are essentially datagrams.

D. TCP provides sequence numbering of packets.

E. TCP uses broadcast delivery.

Answer: B,D

Explanation:

TCP differs from UDP in the following ways:

TCP provides best effort delivery.

TCP provides synchronized communication.

TCP segments are essentially datagrams.

TCP provides sequence numbering of packets.

TCP uses broadcast delivery.

What are two common TCP applications? (Choose two.)

A. TFTP

B. SMTP

C. SNMP

D. FTP

E. DNS

Answer: B,D

Explanation:

SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21.

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

A. In a CSMA/CD collision domain, multiple stations can successfully transmit data

simultaneously.

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before

transmitting.

C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the

CSMA/CD access method.

D. After a collision, the station that detected the collision has first priority to resend the lost data.

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has

expired, all stations have equal priority to transmit data.

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize

with each other prior to transmitting data.

Answer: B,E

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from

another vendor?

A. RTP

B. TCP

C. CDP

D. UDP

Answer: C

The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per

port power management details, and Quality of Service (QoS) configuration information with the

Cisco Catalyst switch.

At which layer of the OSI model does the protocol that provides the information that is displayed

by the show cdp neighbors command operate?

A. application

B. transport

C. network

D. physical

E. data link

Answer: E

Explanation:

CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all

Ciscomanufactured

devices (routers, bridges, access servers, and switches)

Which two characteristics apply to Layer 2 switches? (Choose two.)

A. increases the number of collision domains

B. decreases the number of collision domains

C. implements VLAN

D. decreases the number of broadcast domains

E. uses the IP address to make decisions for forwarding data packets

Answer: A,C

Explanation:

Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch

port is in its own separate collision domain, thus eliminating collisions on the segment.

Which two characteristics describe the access layer of the hierarchical network design model?

(Choose two.)

A. layer 3 support

B. port security

C. redundant components

D. VLANs

E. PoE

Answer: A,B

Which two options will help to solve the problem of a network that is suffering a broadcast storm?

(Choose two.)

A. a bridge

B. a router

C. a hub

D. a Layer 3 switch

E. an access point

Answer: B,D

Explanation:

Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the

use of these devices is the best method for eliminating broadcast storms.

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the

destination MAC address. What will the switch do with the frame?

A. drop the frame

B. forward it out of all ports except the one that received it

C. forward it out of all ports

D. store it until it learns the correct port

Answer: B

Which address type does a switch use to make selective forwarding decisions?

A. source IP address

B. destination IP address

C. source and destination IP address

D. source MAC address

E. destination MAC address

Answer: E

Explanation:

Switches analyze the destination MAC to make its forwarding decision since it is a layer 2 device.

Routers use the destination IP address to make forwarding decisions.

What does a host on an Ethernet network do when it is creating a frame and it does not have the

destination address?

A. drops the frame

B. sends out a Layer 3 broadcast message

C. sends a message to the router requesting the address

D. sends out an ARP request with the destination IP address

Answer: D

Explanation:

In this case, it will send out an ARP request for MAC address of the destination IP (assuming it

doesn't already have it in its table) and then address it to the destination's MAC address.

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the

switch (collision, broadcast)?

A. 4, 48

B. 48, 4

C. 48, 1

D. 1, 48

E. 4, 1

Answer: B

Explanation:

A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast

domain.

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.)

A. 10.1.168.0

B. 10.1.176.1

C. 10.1.174.255

D. 10.1.160.255

E. 10.1.160.0

F. 10.1.175.255

Answer: A,C,D

Explanation:

Explanation

All IP address in IP ranges between : 10.1.160.1 and 10.1.175.254 are valid as shown below

Address: 10.1.160.0 00001010.00000001.1010 0000.00000000

Netmask:255.255.240.0 = 2011111111.11111111.1111 0000.00000000

Wildcard:0.0.15.25500000000.00000000.0000 1111.11111111

Which implies that

Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000

HostMin:10.1.160.100001010.00000001.1010 0000.00000001

HostMax:10.1.175.25400001010.00000001.1010 1111.11111110

Broadcast:10.1.175.25500001010.00000001.1010 1111.11111111

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?

A. 192.168.1.8/29

B. 192.168.1.32/27

C. 192.168.1.40/29

D. 192.168.1.16/28

E. 192.168.1.48/29

Answer: C

Explanation: 248 mask uses 5 bits (1111 1000)

42 IP in binary is (0010 1010)

The base subnet therefore is the lowest binary value that can be written without changing the

output of an AND operation of the subnet mask and IP ...

1111 1000 AND

0010 1010 equals

0010 1000 - which is .40

/24 is standard class C mask.

adding the 5 bits from the .248 mask gives /29

Which two statements describe the IP address 10.16.3.65/23? (Choose two.)

A. The subnet address is 10.16.3.0 255.255.254.0.

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.

C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0

D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.

E. The network is not subnetted.

Answer: B,D

What is the purpose of assigning an IP address to a switch?

A. provides local hosts with a default gateway address

B. allows remote management of the switch

C. allows the switch to respond to ARP requests between two hosts

D. ensures that hosts on the same LAN can communicate with each other

Answer: B

What two things does a router do when it forwards a packet? (Choose two.)

A. switches the packet to the appropriate outgoing interfaces

B. computes the destination host address

C. determines the next hop on the path

D. updates the destination IP address

E. forwards ARP requests

Answer: A,C

Explanation: Without following these two processes namely switching the packet to appropriate

interface and telling the packet where to go by providing it with a destination IP address, the

purpose of the same would not be solved.

Question 1

On a network of one department, there are four PCs connected to a switch, as shown in the following figure:

After the Switch1 restarts. Host A ( the host on the left ) sends the first frame to Host C (the host on the right). What the first

thing should the switch do?

A. Switch1 will add 192.168.23.12 to the switching table.

B. Switch1 will add 192.168.23.4 to the switching table.

C. Switch1 will add 000A.8A47.E612 to the switching table.

D. None of the above

Answer: C

Explanation

When Switch1 receives the first frame from Host A, it will write Host A’s MAC address into its MAC address table (including

the corresponding port Fa0/4) and flood the frame to all other ports.

Question 2

The user of Host1 wants to ping the DSL modem/router at 192.168.1.254. Based on the Host1 ARP table that is shown in the

exhibit, what will Host1 do?

A. send a unicast ARP packet to the DSL modem/router

B. send unicast ICMP packets to the DSL modem/router

C. send Layer 3 broadcast packets to which the DSL modem/router responds

D. send a Layer 2 broadcast that is received by Host2, the switch, and the DSL modem/router

Answer: B

Explanation

Because Host1 has already had information about DSL modem so it doesn’t need to broadcast an ARP Request to find out the

MAC address of DSL modem. It just needs to send unicast ICMP packets directly to that modem.

Question 3

Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two)

A. amount of RAM

B. bridge priority

C. IOS version

D. IP address

E. MAC address

F. speed of the links

Answer: B E

Question 4

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose

two.)

A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.

B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.

C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.

D. Router C will send a Destination Unreachable message type.

E. Router C will send a Router Selection message type.

F. Router C will send a Source Quench message type.

Answer: A D

Explanation

Host 1 is trying to communicate with Host 2. Its packets travel from routerA to routerB and router C. Router C (the last router)

then broadcast an ARP frame onto the network looking for the MAC address of Host 2. If Host 2 can answer then router C can

forward the frame. But e0 interface is down so no answer from Host 2 will be received so router C will send a Destination

Unreachable message back to the originator. This message also informs that the middle network is still working correctly.

Also notice that the Destination Unreachable message is an ICMP message.

Question 5

Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network has converged, and the

routers in this network are functioning properly. The FastEthernet0/0 interface on R1 goes down. In which two ways will the

routers in this network respond to this change? (Choose two)

A. All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.

B. Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-

down timers expire.

C. Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 about connectivity to

the 192.168.1.0 network.

D. When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond by sending a route

back to R1 with an infinite metric to the 192.168.1.0 network.

E. R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updates at an increased

rate until the network again converges.

Answer: C D

Explanation

When Fa0/0 on R1 goes down, R1 will try to inform with R2 that its Fa0/0 interface is currently down. R2 in turn will inform to

R3 that Fa0/0 of R1 is down. The split-horizon rule states that “a router never sends information about a route back in same

direction which is original information came”. It means when R1 sends information about its downed network 192.168.1.0, R2 is

not allowed to send back that information to R1 -> C is correct.

But maybe you will ask “Why answer D is also correct when it seems contradictory to answer C?” Yes, it is really contradictory!

This is called the “Poison Reverse” rule:

The poison reverse rule overwrites split horizon rule. For example, if router R2 receives a route poisoning of network 192.168.1.0

from router R1 then router R2 will send an update back to router R1 (which breaks the split horizon rule) with the same poisoned

hop count of 16. This ensures all the routers in the domain receive the poisoned route update.

Notice that the “Poison Reverse” doesn’t send erroneous information to R1 but just only one message to make sure R1 is working

correctly.

For your information, answer B is not correct because if R2 and R3 get an update with a better metric than the originally recorded

metric (1 for R2 and 2 for R3) within the hold-down timer period, the hold-down timer is removed and data can be sent to that

network. It means that now R2 and R3 have a better way to reach R1.

For more information about RIP, please read my RIP tutorial.

Question 6

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)

A. It is locally significant.

B. It is globally significant.

C. It is needed to identify a unique instance of an OSPF database.

D. It is an optional parameter required only if multiple OSPF processes are running on the router.

E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

Answer: A C

Explanation

The process identifier used in OSPF is locally significant, which means it does not need to be the same on other OSPF routers

and is not passed between routers -> A is correct.

Each process identifier is a unique instance of an OSPF database. We can create many process identifiers as we want (but ranges

from 1 to 65,535) but it is not recommended because the router needs many resources to maintain these OSPF databases -> C is

correct.

Process identifier is a “must” parameter even if we only run only one OSPF process -> D is not correct.

Routers in the same OSPF area can have different process identifier (process ID) because it is only locally significant -> E is not

correct.

Question 7

Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The

Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two

technologies should be implemented to help prevent unauthorized access to the server? (Choose two)

A. access lists

B. encrypted router passwords

C. STP

D. VLANs

E. VTP

F. wireless LANs

Answer: A D

Explanation

Access lists and VLANs can be used to prevent unauthorized to the Payroll Server. By assigning the server to a secure VLAN

and using access list to permit only Accounting1, CEO, Mgr1, and Mgr2 workstations to access that VLAN, we can dramatically

enhance the security of the whole network.

We don’t need to encrypt router password because it only helps prevent unauthorized access to the router, not Payroll server -> B

is not “totally” correct ^^.

Question 8

Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)

A. It establishes a static route to the 172.16.3.0 network.

B. It establishes a static route to the 192.168.2.0 network.

C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.

D. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.

E. It uses the default administrative distance.

F. It is a route that would be used last if other routes to the same destination exist.

Answer: A E

Explanation

The command “ip route 172.16.3.0 255.255.255.0 192.168.2.4″ means that “if there is a packet to the network 172.16.3.0/24 then

route it to 192.168.2.4 first.

The syntax of static route is:

ip route <subnet-mask> <next-hop-IP-address | exit-interface> [metric]

+ destination-network-address: destination network address of the remote network

+ subnet mask: subnet mask of the destination network

+ next-hop-IP-address: the IP address of the receiving interface on the next-hop router

+ exit-interface: the local interface of this router where the packets will go out

+ metric: the distance metric for this route. If not specified, it uses the default administrative distance of 1

Question 9

Which three statements are correct about RIP version 2? (Choose three)

A. It has the same maximum hop count as version 1.

B. It uses broadcasts for its routing updates.

C. It is a classless routing protocol.

D. It has a lower default administrative distance than RIP version 1.

E. It supports authentication.

F. It does not send the subnet mask in updates.

Answer: A C E

Explanation

A and E are correct according to the theory of RIP.

RIP version 1 updates are broadcasts, and RIP version 2 updates are multicast to 224.0.0.9 -> B is not correct.

RIP v1 is a classful routing protocol but RIP v2 is a classless routing protocol -> C is correct.

RIPv1 and RIPv2 have the same default administrative distance of 120 -> D is not correct.

RIPv2 is a classless routing protocol so it does send the subnet mask in updates -> F is not correct.

Question 10

How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing

routing updates?

A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.

B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.

C. Configure many sub-interfaces on the same subnet.

D. Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.

Answer: A

Explanation

In Frame Relay, one router’s interface is often connected to many other routers. According to the split horizon rule, it is not

allowed to send and receive routing updates on the same interfaces so we need to configure sub-interface to overcome this

problem.

Question 11

A network administrator is configuring the routers in the graphic for OSPF. The OSPF process has been started and the networks

have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB

to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks

could be used to establish this preference? (Choose three)

A. Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet

network.

B. Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.

C. Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.

D. Change the priority value of the Fa0/0 interface of RouterB to zero.

E. Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.

F. No further configuration is necessary.

Answer: A C E

Explanation

DR and BDR election is done via the Hello protocol. The router with the highest OSPF priority on a segment will become the DR

for that segment -> A is correct.

In case of a tie, the router with the highest Router ID will win. The Router ID (RID) is an IP address used to identify the router

and is chosen using the following sequence:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

+ The router ID can be manually assigned

In this case, the router ID of RouterB is 198.18.0.101 (regardless that interface does not run OSPF). So if we assign the IP

address 172.16.1.130/24 to the Fa0/0 interface of RouterB, the router ID of RouterB is not changed and we can not guarantee

RouterB will take DR role -> B is not correct.

C is correct as mentioned above.

A priority value of zero indicates an interface will not be elected as DR or BDR. So:

+ If we “change the priority value of the Fa0/0 interface of RouterB to zero”, RouterB will never be elected as DR -> D is not

correct.

+ If we “change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero”, router A and RouterC will not be

elected as DR for that segment -> E is correct.

For answer F, if there is no loopback interface configured on RouterA or RouterC then F is correct (as RouterB has the highest IP

address on active physical interface 198.18.0.101) but we are not sure about that.

Routing Protocol Administrative distance

Directly connected interface 0

Static route out an interface 1

Static route to next-hop address 1

DMNR - Dynamic Mobile Network Routing 3

EIGRP summary route 5

External BGP 20

Internal EIGRP 90

IGRP 100

OSPF 110

IS-IS 115

Routing Information Protocol (RIP) 120

Exterior Gateway Protocol (EGP) 140

On Demand Routing (ODR) 160

External EIGRP 170

Internal BGP 200

Next Hop Resolution Protocol (NHRP) 250

Floating Static Route (ex. DHCP-learned) 254

Unknown 255

QUESTION 1

CCNA 120-200

Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)

A. With a network wide mask of 255.255.255.128, each interface does not require an IP

B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a

unique IP subnet.*

C. With a network wide mask of 255.255.255.0, it must be a Layer 2 device for the PCs to

communicate with each other.

D. With a network wide mask of 255.255.255.0, it must be a Layer 3 device for the PCs to

communicate with each other.*

E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.*

Correct Answer: BDE

QUESTION 2

Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to

support this transmission?

A

B

C

D

E

F

Correct Answer: D

QUESTION 3

Which destination addresses will be used by Host A to send data to Host C? (Choose two.)

A. the IP address of Switch 1

B. the MAC address of Switch 1

C. the IP address of Host C*

D. the MAC address of Host C

E. the IP address of the router’s E0 interface

F. the MAC address of the router’s E0 interface*

Correct Answer: CF

QUESTION 4

Which two benefits are provided by using a hierarchical addressing network addressing scheme?

(Choose two.)

A. reduces routing table entries.*

B. auto-negotiation of media rates.

C. efficient utilization of MAC addresses.

D. dedicated communications between devices.

E. ease of management and troubleshooting.*

Correct Answer: AE

QUESTION 5

Refer to the exhibit.

In this VLSM addressing scheme, what summary address would be sent from router A?

A. 172.16.0.0/16*

B. 172.16.0.0/20

C. 172.16.0.0/24

D. 172.32.0.0/16

E. 172.32.0.0/17

F. 172.64.0.0/16

Correct Answer: A

QUESTION 6

Refer to the exhibit.

What is the most efficient summarization that R1 can use to advertise its networks to R2?

A. 172.1.4.0/25

172.1.4.128/25

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

B. 172.1.0.0/22

C. 172.1.4.0/24

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

D. 172.1.0.0/21

E. 172.1.4.0/22*

Correct Answer: E

QUESTION 7

Which address range efficiently summarizes the routing table of the addresses for router main?

A. 172.16.0.0/18

B. 172.16.0.0/16

C. 172.16.0.0/20*

D. 172.16.0.0/21

Correct Answer: C

QUESTION 8

What two things will a router do when running a distance vector routing protocol? (Choose two.)

A. Send periodic updates regardless of topology changes.*

B. Send entire routing table to all routers in the routing domain.

C. Use the shortest-path algorithm to the determine best path.

D. Update the routing table based on updates from their neighbors.*

E. Maintain the topology of the entire network in its database.

Correct Answer: AD

QUESTION 9

Which command is used to display the collection of OSPF link states?

A. show ip ospf neighbors

B. show ip ospf database*

C. show ip ospf link-state

D. show ip ospf Isa database

Correct Answer: B

QUESTION 10

If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?

(Choose two.)

A. ip default-gateway 0.0.0.0

B. ip route 172.16.2.1 0.0.0.0 0.0.0.0

C. ip default-network 0.0.0.0*

D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1

E. ip route 0.0.0.0 0.0.0.0 172.16.2.1*

Correct Answer: CE

QUESTION 11

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic

protocol is also being used?

A. hop count

B. administrative distance*

C. link bandwidth

D. link delay

E. link cost

Correct Answer: B

QUESTION 12

Refer to the exhibit.

A network associate has configured OSPF with the command:

City(config-router)# network 192.168.12.64 0.0.0.63 area 0

After completing the configuration, the associate discovers that not all the interfaces are participating

in OSPF.

Which three of the interfaces shown in the exhibit will participate in OSPF according to this

configuration statement? (Choose three.)

A. FastEthernet0/0

B. FastEthernet0 /1*

C. Serial0/0*

D. Serial0/1.102*

E. Serial0/1.103

F. Serial0/1.104

Correct Answer: BCD

QUESTION 13

Refer to the exhibit.

The Lakeside Company has the internetwork in the exhibit. The administrator would like to reduce

the size of the routing table on the Central router.

Which partial routing table entry in the Central router represents a route summary that represents the

LANs in Phoenix but no additional subnets?

A. 10.0.0.0/22 is subnetted, 1 subnets

D 10.0.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

B. 10.0.0.0/28 is subnetted, 1 subnets

D 10 2 0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

C. 10.0.0.0/28 is subnetted, 1 subnets

D 10.4.4.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

D. 10.0.0.0/30 is subnetted, 1 subnets

D 10.4.4.4 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

E. 10.0.0.0/22 is subnetted, 1 subnets

D 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1*******

F. 10.0.0.0/30 is subnetted, 1 subnets

D 10.2.2.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

Correct Answer: E

QUESTION 14

Refer to the graphic.

A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Which commands

will accomplish this? (Choose two.)

A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0

B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6

C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0*

D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6*

E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0

F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0

Correct Answer: CD

QUESTION 15

What information does a router running a link-state protocol use to build and maintain its topological

database? (Choose two.)

A. hello packets.*

B. SAP messages sent by other routers.

C. LSAs from other routers.*

D. beacons received on point-to-point links.

E. routing tables received from other link-state routers.

F. TTL packets from designated routers.

Correct Answer: AC

QUESTION 16

Which statements describe the routing protocol OSPF? (Choose three.)

A. It supports VLSM.*

B. It is used to route between autonomous systems.

C. It confines network instability to one area of the network.*

D. It increases routing overhead on the network.

E. It allows extensive control of routing updates.*

F. It is simpler to configure than RIP v2.

Correct Answer: ACE

QUESTION 17

What is the default administrative distance of OSPF?

A. 90

B. 100

C. 110*

D. 120

Correct Answer: C

QUESTION 18

Which characteristics are representative of a link-state routing protocol? (Choose three.)

A. provides common view of entire topology.*

B. exchanges routing tables with neighbors.

C. calculates shortest path.*

D. utilizes event-triggered updates.*

E. utilizes frequent periodic updates.

Correct Answer: ACD

QUESTION 19

Refer to the exhibit.

Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26

LAN be forwarded to 192.168.10.1?

A. The router will forward packets from R3 to R1.

B. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.*

C. The router will forward packets from R3 to R1 to R2.

D. The router will forward packets from R3 to R2 to R1.

Correct Answer: B

QUESTION 20

Refer to the exhibit. According to the routing table, where will the router send a packet destined for

10.1.5.65?

A. 10.1.1.2

B. 10.1.2.2

C. 10.1.3.3*

D. 10.1.4.4

Correct Answer: C

QUESTION 21

Refer to the exhibit. Which address and mask combination represents a summary of the routes

learned by EIGRP?

A. 192.168.25.0 255.255.255.240

B. 192.168.25.16 255.255.255.252

C. 192.168.25.0 255.255.255.252

D. 192.168.25.28 255.255.255.240

E. 192.168.25.16 255.255.255.240*

F. 192.168.25.28 255.255.255.240

Correct Answer: E

QUESTION 22

Refer to the Exhibit.

Assuming that the entire network topology is shown, what is the operational status of interfaces R2

as indicated by the command output shown?

A. One interface has a problem.

B. Two interfaces have problems.

C. The interfaces are functioning correctly.*

D. The operational status of the interfaces cannot be determined from the output shown.

Correct Answer: C

QUESTION 23

Refer to the exhibit.

Given the output for this command, if the router ID has not been manually set, what router ID will

OSPF use for this router?

A. 10.11.2

B. 10.154.154.1

C. 172.16.5.1*

D. 192.168.5.3

Correct Answer: C

QUESTION 24

Which commands are required to properly configure a router to run OSPF and to add network

192.168.16.0/24 to OSPF area 0? (Choose two.)

A. Router(config)# router ospf 1*

B. Router(config)# router ospf 0

C. Router(config)# router ospf area 0

D. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0*

E. Router(config-router)# network 192.168.16.0 0.0.0.255 0

F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0

Correct Answer: AD

QUESTION 25

A router receives information about network 192.168.10.0/24 from multiple sources.

What will the router consider the most reliable information about the path to that network?

A. an OSPF update for network 192.168.0.0/16.

B. a static router to network 192.168.10.0/24.

C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next

D. a RIP update for network 192.168.10.0/24.

E. a directly connected interface with an address of 192.168.10.254/24.*

F. a default route with a next hop address of 192.168.10.1 416.

Correct Answer: E

QUESTION 26

What is the default maximum number of equal-cost paths that can be placed into the routing table of

a Cisco OSPF router?

A. 16

B. 2

C. unlimited

D. 4*

Correct Answer: D

QUESTION 27

Which type of EIGRP route entry describes a feasible successor?

A. a primary router, stored in the topology table.

B. a backup router, stored in the routing table.

C. a backup route, stored in the topology table.*

D. a primary router, stored in the routing table.

Correct Answer: C

QUESTION 28

Refer to the exhibit.

When running EIGRP, what is required for Router A to exchange routing updates with Router C?

A. AS numbers must be changed to match on all the routers.*

B. Loopback interfaces must be configured so a DR is elected.

C. The no auto-summary command is needed on Router A and Router C.

D. Router B needs to have two network statements, one for each connected network.

Correct Answer: A

QUESTION 29

Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.

The network administrator connected to router Coffee via the console port, issued the show ip route

command, and was able to ping the server.

Based on the output of the show ip route command and the topology shown in the graphic, what is

the cause of the failure?

A. The network has not fully converged.

B. IP routing is not enabled.

C. A static route is configured incorrectly.*

D. The FastEthernet interface on Coffee is disabled.

E. The neighbor relationship table is not correctly updated.

F. The routing table on Coffee has not updated .

Correct Answer: C

QUESTION 30

A network administrator is trying to add a new router into an established OSPF network.

The networks attached to the new router do not appear in the routing tables of the other OSPF Given

the information in the partial configuration shown below, what configuration error is causing this

problem?

Router(config)# router ospf 1

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0

A. The process id is configured improperly.

B. The OSPF area is configured improperly.

C. The network wildcard mask is configured improperly.*

D. The network number is configured improperly.

E. The AS is configured improperly.

F. The network subnet mask is configured improperly.

Correct Answer: C

QUESTION 31

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the

following are true? (Choose two.)

A. Router C will send a Destination Unreachable message type.*

B. Router C will send a Source Quench message type.

C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be

D. Router C will send a Router Selection message type.

E. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.*

F. Router C will use ICMP to inform Router B that Host 2 cannot be reached.

Correct Answer: AE

QUESTION 32

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The

routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows

the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information

in the graphic, what is the cause of this problem?

A. The OSPF area is not configured properly.

B. The priority on R1 should be set higher.

C. The cost on R1 should be set higher.

D. The hello and dead timers are not configured properly.*

E. A backup designated router needs to be added to the network.

F. The OSPF process ID numbers must match.

Correct Answer: D

QUESTION 33

A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the

IP addresses of the devices with which the router has established adjacency. The retransmit interval

and the queue counts for the adjacent routers also need to be checked. What command will display

the required information?

A. Router# show ip eigrp adjacency

B. Router# show ip eigrp topology

C. Router# show ip eigrp interfaces

D. Router# show ip eigrp neighbors*

Correct Answer: D

QUESTION 34

Refer to the graphic.

R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this

problem? (Choose two.)

A. All of the routers need to be configured for backbone Area 1.

B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.

C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from

being established.

D. The hello and dead interval timers are not set to the same values on R1 and R3.*

E. EIGRP is also configured on these routers with a lower administrative distance.

F. R1 and R3 are configured in different areas.*

Correct Answer: DF

QUESTION 35

Refer to the exhibit.

HostA cannot ping HostB. Assuming routing is properly configured, what could be the cause of this

problem?

A. HostA is not on the same subnet as its default gateway

B. The Fa0/0 interface on RouterB is using a broadcast address.

C. The Fa0/0 interface on RouterA is on a subnet that can’t be used.

D. The address of SwitchA is a subnet address.

E. The serial interfaces of the routers are not on the same subnet.*

Correct Answer: E

QUESTION 36

Refer to the exhibit.

A network administrator attempts to ping Host2 from Host1 and receives the results that are shown.

What is a possible problem?

A. The link between Host1 and Switch1 is down.

B. Interface Fa0/0 Router1 is shutdown.

C. TCP/IP is not functioning on Host1.

D. The link between Router1 and Router2 is down.*

E. The link between Switch1 and Router1 is down.

F. The default gateway on Host1 is incorrect.

Correct Answer: D

QUESTION 37

Refer to the exhibit.

Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output

from RouterA, what are two possible reasons for the failure?(Choose two)

A. The cable that is connected to S0/0 on RouterA is faulty.

B. Interface S0/0 on RouterB is administratively down.

C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.

D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet.

E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.*

F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is

configured on S0/0 of RouterA.*

Correct Answer: EF

QUESTION 38

Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the

exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct

configuration. Given the partial configurations shown in the exhibit, what is the problem on the

Brevard router that is causing the lack of connectivity?

A. incompatible IP addresses*

B. insufficient bandwidth

C. incorrect subnet mask

D. incompatible encapsulation

E. Link reliability too low

F. IPCP closed

Correct Answer: A

QUESTION 39

Refer to the exhibit.

The company uses EIGRP as the routing protocol. What path will packets take from a host on

192.168.10.192/26 network to a host on the LAN attached to router R1?

A. The path of the packets will be R3 to R2 to R1.

B. The path of the packets will be R3 to R1 to R2.

C. The path of the packets will be both R3 to R2 to R1 AND R3 to R1.

D. The path of the packets will be R3 to R1.*

Correct Answer: D

QUESTION 40

A router has learned three possible routes that could be used to reach a destination network. One

route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a

metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router

install in the routing table?

A. the OSPF route

B. the EIGRP route*

C. the RIPv2 route

D. all three routes

E. the OSPF and RIPv2 routes

Correct Answer: B

QUESTION 41

Refer to the exhibit.

The speed of all serial links is E1 and the speed of the all Ethernet links is 100Mb/s. A static route

will be established on the Manchester router to the direct traffic toward the internet over the most

direct path available. What configuration on the Manchester router will establish a router toward the

internet for traffic that originates from workstation on the Manchester LAN?

A. ip route 0.0.0.0 255.255.255.0 172.16.100.2

B. ip route 0.0.0.0 255.255.255.252 128.107.1.1

C. ip route 0.0.0.0 0.0.0.0 128.107.1.1

D. ip route 0.0.0.0 0.0.0.0 172.16.100.1

E. ip route 0.0.0.0 255.255.255.255 172.16.100.2

F. ip route 0.0.0.0 0.0.0.0 172.16.100.2*

Correct Answer: F

QUESTION 42

Refer to the exhibit.

The network administrator must establish a route by which London workstations can forward traffic

to the Manchester workstations. What is the simplest way to accomplish this?

A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.

B. Configure a dynamic routing protocol on London to advertise summarized routes to

C. Configure a dynamic routing protocol on Manchester to advertise a default route to the

London router.

D. Configure a static default route on London with a next hop of 10.1.1.1.

E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2.*

F. Configure Manchester to advertise a static default route to London.

Correct Answer: E

QUESTION 43

Refer to the exhibit.

The network administrator requires easy configuration options and minimal routing protocol What

two options provide adequate routing table information for traffic that passes between the two routers

and satisfy the requests of the network administrator? (Choose two)

A. a dynamic routing protocol on InternetRouter to advertise all routes to CentralRouter.

B. a dynamic routing protocol on InternetRouter to advertise summarized routes to

C. a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to*

D. a dynamic routing protocol on CentralRouter to advertise all routes to InternetRouter.

E. a dynamic routing protocol on CentralRouter to advertise summarized routes to

F. a static, default route on CentralRouter that directs traffic to InternetRouter.*

Correct Answer: CF

QUESTION 44

Refer to the exhibit.

When running OSPF, What would cause router A not to form an adjacency with router B?

A. The loopback addresses are on different subnets.

B. The values of the dead timers on the routers are different.*

C. Route summarization is enabled on both routers.

D. The process identifier on router A is different than the process identifier on router B.

Correct Answer: B

QUESTION 45

Which two are advantages of static routing when compared to dynamic routing? (Choose two.)

A. Configuration complexity decreases as network size increases.

B. Security increases because only the network administrator may change the routing table.*

C. Route summarization is computed automatically by the router.

D. Routing tables adapt automatically to topology changes.

E. An efficient algorithm is used to build routing tables, using automatic updates.

F. Routing updates are automatically sent to neighbors.

G. Routing traffic load is reduced when used in stub network links.*

Correct Answer: BG

QUESTION 46

You have been asked to come up with a subnet mask that will allow all three web servers to be on the

same network while providing the maximum number of subnets. Which network address and subnet

mask meet this requirement?

A. 192.168.252.8 255.255.255.252

B. 192.168.252.16 255.255.255.252

C. 192.168.252.8 255.255.255.248*

D. 192.168.252.0 255.255.255.252

E. 192.168.252.16 255.255.255.240

Correct Answer: C

QUESTION 47

Why do large OSPF networks use a hierarchical design? (Choose three)

A. to confine network instability to single areas of the network.*

B. to reduce the complexity of router configuration.

C. to speed up convergence.*

D. to lower costs by replacing routers with distribution layer switches.

E. to decrease latency by increasing bandwidth.

F. to reduce routing overhead.*

Correct Answer: ACF

QUESTION 48

The left provides some routing protocols, while the right gives several Cisco default

administrator distances. Drag the items on the right to the proper locations.

QUESTION 49

Which is true about OSPF router-id? (Choose two .)

A. It is used for type 1 router LSA*

B. router-id needs to be matched on OSPF neighbors

C. Highest IP address of the loopback is used*

D. router-id is 16 bit

Correct Answer: AC

QUESTION 50

Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the

10.1.3.0/24 network when different routing protocols are configured? (Choose three.)

A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the

routing table.*

B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if

RIPv2 is the routing protocol.

C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table

by default.

D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY- ORL

will be installed in the routing table by default.*

E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP

paths will be installed in the routing table.*

F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the

network with their default configurations.

Correct Answer: ADE

QUESTION 51

Refer to the exhibit.

What is the cause of the Syslog output messages?

A. The EIGRP neighbor on Fa0/1 went down due to a failed link.

B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the

adjacency to go down.

C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.*

D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

Correct Answer: C

QUESTION 52

What are two enhancements that OSPFv3 supports over OSPFv2? (Choose two.)

A. It requires the use of ARP.

B. It can support multiple IPv6 subnets on a single link.*

C. It supports up to 2 instances of OSPFv3 over a common link.

D. It routes over links rather than over networks.*

Correct Answer: BD

Question:

Refer to the exhibit. After adding R3 router on the network, no routing updates are being exchanged between R3 and the

new location. All other interconnectivity and Internet access for the existing locations of the company are working

properly.

The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.

Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are Cisco.

IP addresses are listed in the chart below.

Answer and Explanation:

Its advised that you should read the question properly so as to understand what you are asked to do. Firstly, in this case;

verify the configuration of the newly added router since it does not function properly. Use the show running-config

command from the command line interface of R3 router, (it’s also recommended to use this command on other routers on

the network)

From the output above, we can verify that the Eigrp autonomous number (AS) of 22 configuration on router 3 is wrong.

On other routers it is 212. If the AS numbers on routers in a network are mismatched, this will hinder the routers on that

network from forming adjacency.

To resolve this problem, you re-configure router R3 using the following command:

R3>enable (remember to enter cisco as the password here)

R3#configure terminal

R3(config)#no router eigrp 22 (this will erase the initial configuration)

R3(config)#router eigrp 212

R3(config-router)#network 192.168.60.0

R3(config-router)#network 192.168.77.0

R3(config-router)#no auto-summary

R3(config-router)#end

R3#copy running-configstartup-config (remember to use this command after every configuration)

Verify the configuration on R1 router with the show running-config command:

You will notice that R3 network is missing in the configuration . R3 network address need to be added for it to be

linkable. Use the following command:

R1>enable (remember to enter cisco as password here)

R1#configure terminal

R1(config)#router eigrp 212

R1(config-router)#network 192.168.77.0

R1(config-router)#end

R1#copy running-config startup-config

After configuration, use the ping command from R3 to verify connectivity.

eigrp_1.jpg (50.18 kB, 584x522 - viewed 184 times.)

eigrp_2.jpg (29.84 kB, 291x346 - viewed 174 times.)

Question:

To configure the router (R2-RC) click on the console host icon that is connected to a router by a serial console cable

(shown in the diagram as a dashed black line)

Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing

the initial router configurations and configuring RIPV2 routing using the router command line interface (CLI) on the R2-

RC.

Router configuration:

Name of the router is R2-RC

Enable-secret password is cisco1

The password to access user EXEC mode using the console is cisco2

The password to allow telnet access to the router is cisco3

IPV4 addresses must be configured as follows:

Ethernet network 209.165.202.128/27- router has last assignable host address in subnet

Serial network is 192.0.2.16/28- router has last assignable host address in the subnet. Interfaces should be enabled.

Router protocol is RIPV2

Solution:

1. Configure router name:

Router>enable

Router#configure terminal

Router(config)#hostname R2-RC

2. Configure secret password:

R2-RC(config)# enable secret cisco1

3) Configure console Password:

R2-RC(config)#line console 0

R2-RC(config-line)#password cisco2

R2-RC(config-line)#login

R2-RC(config-line)#exit

4) Configure Telnet password:

R2-RC(config)#line vty 0 4

R2-RC(config-line)#password cisco3

R2-RC(config-line)#login

R2-RC(config-line)#exit

5) Assign IP address for Ethernet interface(Fa0/0):

Know or cram this table below; you might be given an opportunity to write it down before the exam:

Bit Value 128 64 32 16 8 4 2 1

BitsBorrowed 1 2 3 4 5 6 7 8

Subnetmask 128 192 224 240 248 252 254 255

SubnetPrefix /CIDR /25 /26 /27 /28 /29 /30

Normal 0 false false false EN-GB X-NONE X-NONE MicrosoftInternetExplorer4

The Ethernet network 209.165.202.128/27: looking at the table above, you can see that the /27 has a bit value of 32

(increment) and mask should be 224 or /27

That means:

Network address: 209.165.202.128

Subnet mask: 255.255.255.224

Broadcast address: 209.165.202.159 (because 128 + 32 - 1 = 159)

Therefore, according to the question; the last assignable host address in this subnet should be: 209.165.202.158. Assign it

to fa0/0 using these commands:

R2-RC(config)# interface fa0/0

R2-RC(config-if)#ip address 209.165.202.158 255.255.255.224

R2-RC(config-if)#no shutdown

R2-RC(config-if)#exit

6) Assign IP address for Serial interface(S0/0/0): (follow the same above)

Serial network 192.0.2.16 /28

Looking at the table above, you can see that the /28 has a bit value of 16 (increment) and mask should be 240 or /28

That means:

Serial network 192.0.2.16

Subnet mask: 255.255.255.240

Broadcast address:192.0.2.31 (because 16 + 16 - 1 = 31)

According to the question the last assignable host address in this subnet is 192.0.2.30. Assign it to s0/0/0 interface using

the following command:

R2-RC(config)# interface s0/0/0

R2-RC(config-if)#ip address 192.0.2.30 255.255.255.240

R2-RC(config-if)#no shutdown

R2-RC(config-if)#exit

7) Configure RIP v2 routing protocol using the following command:

R2-RC(config)#router rip

R2-RC(config-router)#version 2

R2-RC(config-router)#network 209.165.202.128

R2-RC(config-router)#network 192.0.2.16

R2-RC(config-router)#end

R2-RC#copy running-configstartup-config (don’t forget this bit)

Question 1

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)

A. It is locally significant.

B. It is globally significant.

C. It is needed to identify a unique instance of an OSPF database.

D It is an optional parameter required only if multiple OSPF processes are running on the router.

E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

Answer: A C

Question 2

Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior

Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). What is the default administrative

distance of the OSPF routing protocol?

A. 90

B. 100

C. 110

D. 20

E. 130

F. 170

Answer: C

Question 3

Which statements describe the routing protocol OSPF? (Choose three)

A. It supports VLSM.

B. It is used to route between autonomous systems.

C. It confines network instability to one area of the network.

D. It increases routing overhead on the network.

E. It allows extensive control of routing updates.

F. It is simpler to configure than RIPv2.

Answer: A C E

Explanation

Answer A and C are obviously correct. For answer E, it allows extensive control of routing updates via Link-State

Advertisement (LSA). Administrators can filter these LSAs to meet their requirements easily.

Question 4

R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose

two)

A. All of the routers need to be configured for backbone Area 1.

B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.

C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established.

D. The hello and dead interval timers are not set to the same values on R1 and R3.

E. EIGRP is also configured on these routers with a lower administrative distance.

F. R1 and R3 are configured in different areas.

Answer: D F

Explanation

A is not correct because the backbone area of OSPF is always Area 0.

B is not correct because R1 or R3 must be the DR or BDR -> it has to establish neighbor adjacency with the other.

C is not correct because OSPF neighbor relationship is not established based on static routing. It uses multicast address

224.0.0.5 to establish OSPF neighbor relationship.

E is not correct because configure EIGRP on these routers (with a lower administrative distance) will force these routers to

run EIGRP, not OSPF.

D and F are correct because these entries must match on neighboring routers:

- Hello and dead intervals

– Area ID (Area 0 in this case)

– Authentication password

– Stub area flag

Question 5

Which address are OSPF hello packets addressed to on point-to-point networks?

A. 224.0.0.5

B. 172.16.0.1

C. 192.168.0.5

D. 223.0.0.1

E. 254.255.255.255

Answer: A

Question 6

RouterD# show ip interface brief

Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this

router?

A. 10.1.1.2

B. 10.154.154.1

C. 172.16.5.1

D. 192.168.5.3

Answer: C

Explanation

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID.

Question 7

ROUTER# show ip route

192.168.12.0/24 is variably subnetted, 9 subnets, 3 masks C 192.168.12.64 /28 is directly connected, Loopback1

C 192.168.12.32 /28 is directly connected, Ethernet0

C 192.168.12.48 /28 is directly connected, Loopback0

O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

C 192.168.12.232 /30 is directly connected, Serial0

O 192.168.12.245 /30 [110/782] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.253 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.249/30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.240/30 [110/128] via 192.168.12.233, 00:35:36, Serial0

To what does the 128 refer to in the router output above?

A. OSPF cost

B. OSPF priority

C. OSPF hop count 5

D. OSPF ID number

E. OSPF administrative distance

Answer: A

Explanation

OSPF uses a metric referred to as cost. The cost of the entire path is the sum of the costs of the outgoing interfaces along

the path. Cisco uses a simple formula to calculate OSPF cost:

OSPF cost = 108 / Bandwidth (byte)

Therefore, a 100 Mbps FastEthernet interface will have the cost of 108 / 100,000,000 (bytes) = 1

Note: Cost for interfaces with bandwidth equal or larger than 10^8 bps is normalized to 1 so a 1Gbps interface will also

have OSPF cost of 1.

For “O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0″ line, the first number in the brackets is the

administrative distance of the information source; the second number is the metric for the route -> In this case the second

number is the OSPF cost.

Question 8

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern

that a lack of router resources is impeding internetwork performance.

As part of examining the router resources the OSPF DRs need to be known.

All the router OSPF priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as DR? (Choose two)

A. Corp-1

B. Corp-2

C. Corp-3

D. Corp4

E. Branch-1

F. Branch-2

Answer: D F

Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment will have a DR so we

have 2 DRs.

To select which router will become DR they will compare their router-IDs. The router with highest (best) router-ID will

become DR. The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active

router’s physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20) have highest “active” IP addresses so

they will become DRs.

Question 9

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose

two)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A C

Question 1

After the network has converged, what type of messaging, if any, occurs between R3 and R4?

A. No messages are exchanged.

B. Hellos are sent every 10 seconds.

C. The full database from each router is sent every 30 seconds.

D. The routing table from each router is sent every 60 seconds.

Answer: B

Explanation

HELLO messages are used to maintain adjacent neighbors so even when the network is converged, hellos are still exchanged. On

broadcast and point-to-point links, the default is 10 seconds, on NBMA the default is 30 seconds.

Although OSPF is a link-state protocol but the full database from each router is sent every 30 minutes (not seconds) -> C and D

are not correct.

Question 2

R1 is configured with the default configuration of OSPF.

From the following list of IP addresses configured on R1, which address will the OSPF process select as the router ID?

A. 192.168.0.1

B. 172.16.1.1

C. 172.16.2.1

D. 172.16.2.225

Answer: A

Explanation

The Router ID (RID) is an IP address used to identify the router and is chosen using the following sequence:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

+ The router ID can be manually assigned

In this case, because a loopback interface is not configured so the highest active IP address 192.168.0.1 is chosen as the router

ID.

Question 3

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A C

Question 4

R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two)

A. All of the routers need to be configured for backbone Area 1.

B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.

C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established.

D. The hello and dead interval timers are not set to the same values on R1 and R3.

E. EIGRP is also configured on these routers with a lower administrative distance.

F. R1 and R3 are configured in different areas.

Answer: D F

Explanation

To become OSPF neighbors, routers must meet these requirements: Hello interval, Dead interval and AREA number -> D and F

are correct.

Question 5

ROUTER# show ip route

192.168.12.0/24 is variably subnetted, 9 subnets, 3 masks

C 192.168.12.64 /28 is directly connected, Loopback1

C 192.168.12.32 /28 is directly connected, Ethernet0

C 192.168.12.48 /28 is directly connected, Loopback0

O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

C 192.168.12.232 /30 is directly connected, Serial0

O 192.168.12.245 /30 [110/782] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.253 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.249 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.240/30 [110/128] via 192.168.12.233, 00:35:36, Serial 0

To what does the 128 refer to in the router output above?

A. OSPF cost

B. OSPF priority

C. OSPF hop count

D. OSPF ID number

E. OSPF administrative distance

Answer: A

Explanation

The first parameter is the Administrative Distance of OSPF (110) while the second parameter is the cost of OSPF.

Question 6

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)

A. It is locally significant.

B. It is globally significant.

C. It is needed to identify a unique instance of an OSPF database.

D. It is an optional parameter required only if multiple OSPF processes are running on the router.

E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

Answer: A C

Question 7

Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway

Protocol (IGP) working group of the Internet Engineering Task Force (IETF). What is the default administrative distance of the

OSPF routing protocol?

A. 90

B. 100

C. 110

D. 20

E. 130

F. 170

Answer: C

Question 8

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic.

There is concern that a lack of router resources is impeding internetwork performance.

As part of examining the router resources the OSPF DRs need to be known.

All the router OSPF priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as DR? (Choose two)

A. Corp-1

B. Corp-2

C. Corp-3

D. Corp4

E. Branch-1

F. Branch-2

Answer: D F

Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment will have a DR so we have 2

DRs.

To select which router will become DR they will compare their router-IDs. The router with highest (best) router-ID will become

DR. The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s

physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become

DRs.

Question 9

Which address are OSPF hello packets addressed to on point-to-point networks?

A. 224.0.0.5

B. 172.16.0.1

C. 192.168.0.5

D. 223.0.0.1

E. 254.255.255.255

Answer: A

Question 10

Which statements describe the routing protocol OSPF? (Choose three)

A. It supports VLSM.

B. It is used to route between autonomous systems.

C. It confines network instability to one area of the network.

D. It increases routing overhead on the network.

E. It allows extensive control of routing updates.

F. It is simpler to configure than RIP v2.

Answer: A C E

Question 11

R1 is unable to establish an OSPF neighbor relationship with R3

What are possible reasons for this problem? (Choose two)

A. All of the routers need to be configured for backbone Area 1

B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3

C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established.

D. The hello and dead interval timers are not set to the same values on R1 and R3

E. EIGRP is also configured on these routers with a lower administrative distance

F. R1 and R3 are configured in different areas

Answer: D F

Question 12

RouterD# show ip interface brief

Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this router?

A. 10.1.1.2

B. 10.154.154.1

C. 172.16.5.1

D. 192.168.5.3

Answer: C

Question 1

Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two)

A. It ensures that data will be forwarded by RouterB.

B. It provides stability for the OSPF process on RouterB.

C. It specifies that the router ID for RouterB should be 10.0.0.1.

D. It decreases the metric for routes that are advertised from RouterB.

E. It indicates that RouterB should be elected the DR for the LAN.

Answer: B C

Explanation

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we

use that loopback interface as the router-id) -> B is correct.

The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

-> The loopback interface will be chosen as the router ID of RouterB -> C is correct.

Question 2

Which characteristics are representative of a link-state routing protocol? (Choose three)

A. provides common view of entire topology

B. exchanges routing tables with neighbors

C. calculates shortest path

D. utilizes event-triggered updates

E. utilizes frequent periodic updates

Answer: A C D

Explanation

Each of routers running link-state routing protocol learns paths to all the destinations in its “area” so we can say A is correct

although it is a bit unclear.

Link-state routing protocols generate routing updates only (not the whole routing table) when a change occurs in the network

topology so B is not correct.

Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> C is correct.

Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state routing protocol utilizes event-

triggered updates (only sends update when a change occurs) -> D is correct but E is not correct.

Question 3

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a

lack of router resources is impeding internetwork performance.

As part of examining the router resources the OSPF DRs need to be known.

All the router OSPF priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as DR? (Choose two)

A. Corp-1

B. Corp-2

C. Corp-3

D. Corp4

E. Branch-1

F. Branch-2

Answer: D F

Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment will have a DR so we have 2

DRs.

To select which router will become DR they will compare their router-IDs. The router with highest (best) router-ID will become

DR. The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s

physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become

DRs.

Question 4

A network associate has configured OSPF with the command:

City(config-router)# network 192.168.12.64 0.0.0.63 area 0

After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF.

Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? (Choose

three)

A. FastEthernet0/0

B. FastEthernet0/1

C. Serial0/0

D. Serial0/1.102

E. Serial0/1.103

F. Serial0/1.104

Answer: B C D

Explanation

The “network 192.168.12.64 0.0.0.63″ equals to network 192.168.12.64/26. This network has:

+ Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000)

+ Network address: 192.168.12.64

+ Broadcast address: 192.168.12.127

Therefore all interface in the range of this network will join OSPF -> B C D are correct.

Question 5

When running OSPF, what would cause router A not to form an adjacency with router B?

A. The loopback addresses are on different subnets.

B. The values of the dead timers on the routers are different.

C. Route summarization is enabled on both routers.

D. The process identifier on router A is different than the process identifier on router

Answer: B

Explanation

To form an adjacency (become neighbor), router A & B must have the same Hello interval, Dead interval and AREA number.

Question 6

Refer to the exhibit. The network is converged. After link-state advertisements are received from Router_A, what information

will Router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96?

A. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, FastEthernet0/0

208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0

B. 208.149.23.64[110/1] via 190.173.23.10, 00:00:00:07, Serial1/0

208.149.23.96[110/3] via 190.173.23.10, 00:00:00:16, FastEthernet0/0

C. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0

208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0

208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0

D. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0

208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0

Answer: A

Explanation

Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A through FastEthernet interface. The

interface cost is calculated with the formula 108 / Bandwidth. For FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1.

Therefore the cost is 12 (learned from Router_A) + 1 = 13 for both subnets -> B is not correct.

The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps = 64; T3 cost = 108 / 45 Mbps = 2) so

surely OSPF will choose the path through T3 link -> Router_E will choose the path from Router_A through FastEthernet0/0, not

Serial1/0 -> C & D are not correct.

In fact, we can quickly eliminate answers B, C and D because they contain at least one subnet learned from Serial1/0 -> they are

surely incorrect.

Question 7

Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use

for this RouterD?

RouterD# show ip interface brief

A. 10.1.1.2

B. 10.154.154.1

C. 172.16.5.1

D. 192.168.5.316

Answer: C

Explanation

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID.

Question 8

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?

(choose two)

A. Router(config)#router ospf 1

B. Router(config)#router ospf 0

C. Router(config)#router ospf area 0

D. Router(config-router)#network 192.168.16.0 0.0.0.255 area 0

E. Router(config-router)#network 192.168.16.0 0.0.0.255 0

F. Router(config-router)#network 192.168.16.0 255.255.255.0 area 0

Answer: A D

Explanation

In the router ospf

command, theranges from 1 to 65535 so o is an invalid number -> A is correct but B is not correct.

To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this

process -> D is correct.

Question 9

Which parameter or parameters are used to calculate OSPF cost in Cisco routers?

A. Bandwidth, Delay and MTU

B. Bandwidth

C. Bandwidth and MTU

D. Bandwidth, MTU, Reliability, Delay and Load

Answer: B

The well-known formula to calculate OSPF cost is

Cost = 108 / Bandwidth

so B is the correct answer.

Question 10

Refer to the exhibit. Why are two OSPF designated routers identified on Core-Router?

Neighbor_ID Pri State Dead Time Address Interface

208.149.23.194 1 Full/DR 00:00:33 190.172.32.10 Ethernet1

208.149.23.60 1 Full/BDR 00:00:33 190.172.32.10 Ethernet0

208.149.23.130 1 Full/DR 00:00:39 190.172.32.10 Ethernet0

A. Core-Router is connected more than one multi-access network

B. The router at 208.149.23.130 is a secondary DR in case the primary fails.

C. Two router IDs have the same OSPF priority and are therefore tied for DR election

D. The DR election is still underway and there are two contenders for the role.

Answer: A

Explanation

OSPF elects one DR per multi-access network. In the exhibit there are two DR so there must have more than one multi-access

network.

Question 11

What is the default maximum number of equal-cost paths that can be placed into the routing of a Cisco OSPF router?

A. 16

B. 2

C. unlimited

D. 4

Answer: D

Explanation

The default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router is 4. We can change this

default value by using “maximum-paths” command:

Router(config-router)#maximum-paths 2

Note: Cisco routers support up to 16 equal-cost paths. In detail, the default number of maximum paths is 32 for Cisco CRS-1

routers and 16 for Cisco XR 12000 Series Routers. The range is from 1 to 32 for Cisco CRS-1 routers and 1 to 16 for Cisco XR

12000 Series Routers.

(Reference: http://www.cisco.com/en/US/docs/ios_xr_sw/iosxr_r3.7/routing/configuration/guide/rc37ospf.html)

Question 12

What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multiaccess network?

A. 10

B. 40

C. 30

D. 20

Answer: A

Explanation

On broadcast multiacess and point-to-point links, the default is 10 seconds. On NBMA, the default is 30 seconds.

Question 13

What is the default administrative distance of OSPF?

A. 120

B. 100

C. 90

D. 110

Answer: D

Question 14

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A C

Question 1

Which characteristics are representative of a link-state routing protocol? (Choose three)

A. provides common view of entire topology

B. exchanges routing tables with neighbors

C. calculates shortest path

D. utilizes event-triggered updates

E. utilizes frequent periodic updates

Answer: A C D

Question 2

Which statements describe the routing protocol OSPF? (Choose three)

A. It supports VLSM.

B. It is used to route between autonomous systems.

C. It confines network instability to one area of the network.

D. It increases routing overhead on the network.

E. It allows extensive control of routing updates

F. It is simpler to configure than RIPv2.

Answer: A C E

Explanation

Answer A and C are obviously correct. For answer E, it allows extensive control of routing updates via Link-State

Advertisement (LSA). Administrators can filter these LSAs to meet their requirements easily.

Question 3

A network administrator is trying to add a new router into an established OSPF network. The networks attached to

the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial

configuration shown below, what configuration error is causing this problem?

Router(config)# router ospf 1

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0

A. The process id is configured improperly.

B. The OSPF area is configured improperly.

C. The network wildcard mask is configured improperly.

D. The network number is configured improperly.

E. The AS is configured improperly.

F. The network subnet mask is configured improperly.

Answer: C

Question 4

A network associate has configured OSPF with the command:

City(config-router)# network 192.168.12.64 0.0.0.63 area 0

After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF.

Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration

statement? (Choose three)

A. FastEthernet0/0

B. FastEthernet0/1

C. Serial0/0

D. Serial0/1.102

E. Serial0/1.103

F. Serial0/1.104

Answer: B C D

Explanation

The “network 192.168.12.64 0.0.0.63″ equals to network 192.168.12.64/26. This network has:

+ Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000)

+ Network address: 192.168.12.64

+ Broadcast address: 192.168.12.127

Therefore all interface in the range of this network will join OSPF -> B C D are correct.

Question 5

What is the default maximum number of equal-cost paths that can be placed into the routing of a Cisco OSPF

router?

A. 16

B. 2

C. unlimited

D. 4

Answer: D

Explanation

The default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router is 4. We can

change this default value by using “maximum-paths” command:

Router(config-router)#maximum-paths 2

Note: Cisco routers support up to 6 equal-cost paths

Question 6

Which two statements describe the process identifier that is used in the command to configure OSPF on a router?

(Choose two)

Router(config)# router ospf 1

A. All OSPF routers in an area must have the same process ID.

B. Only one process number can be used on the same router.

C. Different process identifiers can be used to run multiple OSPF processes

D. The process number can be any number from 1 to 65,535.

E. Hello packets are sent to each neighbor to determine the processor identifier.

Answer: C D

Question 7

Why do large OSPF networks use a hierarchical design? (Choose three)

A. to confine network instability to single areas of the network.

B. to reduce the complexity of router configuration

C. to speed up convergence

D. to lower costs by replacing routers with distribution layer switches

E. to decrease latency by increasing bandwidth

F. to reduce routing overhead

Answer: A C F

Explanation

Hierarchical design of OSPF (basically means that you can separate the larger internetwork into smaller

internetworks called areas) helps us create a network with all features listed above (decrease routing overhead, speed

up convergence, confine network instability to single areas of the network).

Question 8

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to

OSPF area 0? (choose two)

A. Router(config)#router ospf 1

B. Router(config)#router ospf 0

C. Router(config)#router ospf area 0

D. Router(config-router)#network 192.168.16.0 0.0.0.255 area 0

E. Router(config-router)#network 192.168.16.0 0.0.0.255 0

F. Router(config-router)#network 192.168.16.0 255.255.255.0 area 0

Answer: A D

Explanation

In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> A is correct but B is not

correct.

Question 9

Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID

will OSPF use for this RouterD?

RouterD# show ip interface brief

A. 10.1.1.2

B. 10.154.154.1

C. 172.16.5.1

D. 192.168.5.316

Answer: C

Explanation

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID.

Question 10

What is the default administrative distance of OSPF?

A. 120

B. 100

C. 90

D. 110

Answer: D

Question 11

Why R1 can’t establish an OSPF neighbor relationship with R3 according to the following graphic? (Choose two)

A – Configure EIGRP on these routers with a lower administrative distance

B – All routers should be configured for backbone Area 1

C – R1 and R3 have been configured in different areas

D – The hello and dead interval timers are not configured the same values on R1 and R3

Answer: C D

Explanation

A is not correct because configure EIGRP on these routers (with a lower administrative distance) will force these

routers to run EIGRP, not OSPF.

B is not correct because the backbone area of OSPF is always Area 0.

C and D are correct because these entries must match on neighboring routers:

- Hello and dead intervals

– Area ID (Area 0 in this case)

– Authentication password

– Stub area flag

Question 12

Which parameter or parameters are used to calculate OSPF cost in Cisco routers?

A. Bandwidth, Delay and MTU

B. Bandwidth

C. Bandwidth and MTU

D. Bandwidth, MTU, Reliability, Delay and Load

Answer: B

Explanation

The well-known formula to calculate OSPF cost is

Cost = 108 / Bandwidth

so B is the correct answer.

Question 13

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot

establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ip ospf

interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this

problem?

A. The OSPF area is not configured properly.

B. The priority on R1 should be set higher.

C. The cost on R1 should be set higher.

D. The hello and dead timers are not configured properly.

E. A backup designated router needs to be added to the network.

F. The OSPF process ID numbers must match.

Answer: D

Explanation

D is correct because these entries must match on neighboring routers:

- Hello and dead intervals

– Area ID (Area 0 in this case)

– Authentication password

– Stub area flag

In this case Ethernet0 of R1 has Hello and Dead Intervals of 5 and 20 while R2 has Hello and Dead Intervals of 10

and 40 -> R1 and R2 cannot form OSPF neighbor relationship.

Question 14

What information does a router running a link-state protocol use to build and maintain its topological database?

(Choose two)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A C

Question 15

Which command is used to display the collection of OSPF link states?

A. show ip ospf link-state

B. show ip ospf lsa database

C. show ip ospf neighbors

D. show ip ospf database

Answer: D

Question 16

When running OSPF, what would cause router A not to form an adjacency with router B?

A. The loopback addresses are on different subnets.

B. The values of the dead timers on the routers are different.

C. Route summarization is enabled on both routers.

D. The process identifier on router A is different than the process identifier on router

Answer: B

Explanation

To form an adjacency (become neighbor), router A & B must have the same Hello interval, Dead interval and

AREA number.

Question 17

Which is true about OSPF router-id? (Choose two)

A. It is used for type 1 router LSA

B. Highest IP address of the loopback is used

C. router-id needs to be matched on ospf neighbors

D. router-id is 16 bit

Answer: A B

Explanation

OSPF LSA Type 1 (or Router LSA) is generated by all routers in an area to describe their directly attached links. An

example below shows this type of LSA:

As you can see, the LSA Type 1 uses the router ID to advertise itself (1.1.1.1 or 2.2.2.2).

The Router ID (RID) is an IP address used to identify the router and is chosen using the following sequence:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be

chosen.

+ The router ID can be manually assigned

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

QUESTION 21

Which two are advantages of static routing when compared to dynamic routing? (Choose two.)

A. Configuration complexity decreases as network size increases.

B. Security increases because only the network administrator may change the routing table.

C. Route summarization is computed automatically by the router.

D. Routing tables adapt automatically to topology changes.

E. An efficient algorithm is used to build routing tables, using automatic updates.

F. Routing updates are automatically sent to neighbors.

G. Routing traffic load is reduced when used in stub network links.

Answer: BG

Explanation:

http://www.ciscopress. com/articles/article. asp?p=24090&seqNum=6

http://www.ciscopress. com/articles/article. asp?p=24090

QUESTION 22

Which command enables IPv6 forwarding on a Cisco router?

A. ipv6 local

B. ipv6 host

C. ipv6 unicast-routing

D. ipv6 neighbor

Answer: C

Explanation:

Administrative distance is the feature that routers use in order to select the best path. Administrative

distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of

most to least reliable (believable) with the help of an administrative distance value. Lowest

Administrative distance will be choose first.EIGRP has 90 , RIP has 120 , OSPF has 110.

Route Source

Default Distance Values

Connected interface

Static route

Enhanced Interior Gateway Routing Protocol (EIGRP) summary route External Border Gateway

Protocol (BGP)

Internal EIGRP

IGRP

OSPF

Intermediate System-to-lntermediate System (IS-IS)

Routing Information Protocol (RIP)

Exterior Gateway Protocol (EGP)

On Demand Routing (ODR)

External EIGRP

Internal BGP

Unknown*

QUESTION 23

A router is running three routing processes: RIP, OSPF, and EIGRP, each configured with default

characteristics. Each process learns a route to the same remote network. If there are no static

routes to the destination and none of the routes were redistributed, which route will be placed in

the IP routing table?

A. the route learned through EIGRP

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

B. the route learned through OSPF

C. the route learned through RIP

D. the route with the lowest metric

E. all three routes with the router load balancing

QUESTION 24

Refer to the exhibit. Given the output for this command, if the router ID has not been manually set,

what router ID will OSPF use for this router?

RouterDS show ip interface brief

A. 10.1.1.2

B. 10.154.154.1

C. 172.16.5.1

D. 192.168.5.3

Answer: C

Explanation:

OSPF uses the highest IP address of the loopback interfaces first. If there are no loopback

interfaces then OSPF will use the highest IP address of the active interfaces.

QUESTION 25

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the

graphic. There is concern that a lack of router resources is impeding internetwork performance. As

part of examining the router resources, the OSPF DRs need to be known. All the router OSPF

priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as PR? (Choose two.)

Answer: A

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

A. Corp-1

B. Corp-2

C. Corp-3

D. Corp-4

E. Branch-1

F. Branch-2

Answer: DF

Explanation:

There are 2 segments on the topology above which are separated by Corp-3 router.

Each segment will have a DR so we have 2 DRs.

To select which router will become DR they will compare their router-IDs. The router with highest

(best) router-ID will become DR. The router-ID is chosen in the order below:

The highest IP address assigned to a loopback (logical) interface.

If a loopback interface is not defined, the highest IP address of all active router's physical interfaces

will be chosen.

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP

addresses of all active router's physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2

(10.2.20.20) have highest "active" IP addresses so they will become DRs.

QUESTION 26

What does a router do if it has no EIGRP feasible successor route to a destination network and the

successor route to that destination network is in active status?

A. It routes all traffic that is addressed to the destination network to the interface indicated in the

routing table.

B. It sends a copy of its neighbor table to all adjacent routers.

C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths

to the destination network.

D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

Answer: C

Explanation:

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml

QUESTION 27

Refer to the exhibit. The network is converged. After link-state advertisements are received from

Router_A, what information will Router_E contain in its routing table for the subnets 208.149.23.64

and 208.149.23.96?

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

Route e_A# show ip route

<output omitted>

208.149.23.0/27 is subnetted, 2 subnets

0 208.149.23.64 [110/12] via 190.171.23.10, 00:29:52, Serial 1/0

0 208.149.23.96 [110/12] via 19 0.171.23.10, 00:29:52, Serial 1/0

<output omitted>

A. O 208.149.23.64 [110/13] via 190.173.23.10, 00:00:07, FastEthernet 0/0 O 208.149.23.96 [110/13]

via 190.173.23.10, 00:00:16, FastEthernet 0/0

B. O 208.149.23.64 [110/1] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/3] via

190.173.23.10, 00:00:16, FastEthernet 0/0

C. O 208.149.23.64 [110/13] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/13] via

190.172.23.10, 00:00:16, Serial 1/0 O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0

D. O 208.149.23.64 [110/3] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/3] via

190.172.23.10, 00:00:16, Serial 1/0

Answer: A

Explanation:

Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A through

FastEthernet interface. The interface cost is calculated with the formula 108 / Bandwidth. For

FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1. Therefore the cost is 12 (learned from

Router_A) + 1 = 1 3 for both subnets - B is not correct. The cost through T1 link is much higher than

through T3 link (T1 cost = 108 / 1.544 Mbps = 64; T3 cost = 108/45 Mbps = 2) so surely OSPF

will choose the path through T3 link -> Router_E will choose the path from Router_A through

FastEthernetO/0, not Serial1/0 - C & D are not correct. In fact, we can quickly eliminate answers B,

C and D because they contain at least one subnet learned from Serial1/0 - they are surely incorrect.

QUESTION 28

Which command is used to display the collection of OSPF link states?

A. show ip ospf link-state

B. show ip ospf Isa database

C. show ip ospf neighbors

D. show ip ospf database

Answer: D

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

http://wwwxiscoxom/en/US/docs/ios/iproute_ospf/command/reference/iro_osp3.html#wp1 01 21 7

3

QUESTION 29

What is the default administrative distance of OSPF?

A. 90

B. 100

C. 110

D. 120

Answer: C

Explanation:

Route Source

Default Distance Values

Connected interface

Static route

Enhanced Interior Gateway Routing Protocol (EIGRP) summary route External Border Gateway

Protocol (BGP)

Internal EIGRP

IGRP

OSPF

Intermediate System-to-lntermediate System (IS-IS)

Routing Information Protocol (RIP)

Exterior Gateway Protocol (EGP)

On Demand Routing (ODR)

External EIGRP

Internal BGP

Unknown*

QUESTION 30

The following configuration is applied to a Layer 2 Switch:

interface fastethernet 0/4

switchport mode access

switchport port-security

switchport port-security mac-address 0000.1111.1111

switchport port-security maximum 2

swithcport port-security

What is the result of the above configuration being applied to the switch?

A. A host with a mac address of 0000.1 1 11.1111 and up to two other hosts can connect to FastEthernet 0/4

simultaneously

B. A host with a mac address of 0000.1 111.1111 and one other host can connect to Fast Ethernet 0/4

simultaneously

C. Violating addresses are dropped and no record of the violation is kept

D. The switch can send an SNMP message to the network management station

E. The port is effectively shutdown

Answer: BD

Explanation:

http://www.cisco.eom/en/US/docs/switches/lan/catalyst4500/12.2/20ewa/configuration/guide/port_

sec. html

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

QUESTION 31

Refer to the exhibit. Which of these correctly describes the results of port security violation of an

unknown packet?

Switch feonfiig}«tnB«rf«c* f«jcach«ra«t 0/1 \ \ \ \ \3

Switch iconfig-if) *»wi^chpcrt mod* ten mo ( ^~\^>'

Sw2-T,di i config— ifi | switchpozr, j}n*-t*- ^BfijAiSy ■

3ki-c£l ■; cenzig-i i : fsvi-Eeiipcrr,, pari-jeauriLj igninim 3

Switch ■! config-i ft (switch?-: ri poet -security mac-address sticky

Switch teoef ig-ii \ »ihi^^I^ \\

A. port enabled; unknown packets dropped; no SNMP or syslog messages

B. port enabled; unknown packets dropped; SNMP or syslog messages

C. port disabled; no SNMP or syslog messages

D. port disabled; SNMP or syslog messages

Answer: D

Explanation:

http://www.cisco.eom/en/US/docs/switches/lan/catalyst4500/12.2/20ewa/configuration/guide/port_

sec. html

QUESTION 32

A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise,

the routers are configured with their default configurations. A ping from Hostl to Host2 fails, but the

technician is able to ping the SO/0 interface of R2 from Hostl . The configurations of the hosts have

been verified as correct. What is the cause of the problem?

A. The serial cable on R1 needs to be replaced.

B. The interfaces on R2 are not configured properly.

C. R1 has no route to the 192.168.1.128 network.

D. The IP addressing scheme has overlapping subnetworks.

E. The ip subnet-zero command must be configured on both routers.

Answer: C

Explanation:

Whenever a node needs to send data to another node on a network, it must first know where to

send it. If the node cannot directly connect to the destination node, it has to send it via other nodes

along a proper route to the destination node. A remote network is a network that can only be

reached by sending the packet to another router. Remote networks are added to the routing table

using either a dynamic routing protocol or by configuring static routes. Static routes are routes to

networks that a network administrator manually configured. So R should have static route for the

192.168.1.128.

QUESTION 33

Refer to the exhibit. What three actions will the switch take when a frame with an unknown source

MAC address arrives at the interface? (Select three.)

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

Switch# show port- security interface faO/2 0

port becurity :

hnajo lea

Port status ;

Secure -up

Violation Mode ;

Re strict

J h V — 1 V~S .■ — V 1 1 1 ~ 1 >~r - i . — - 1

Ag ing i line

Aging Type ;

inactivity

Secure Stat ic Address Aging :

ui saJoiea

Maximum MAC Addresses ;

2

Total MAC Addresses : 2

Configured MAC Addresses : 0

Sticky MAC Addresses : 2

Last Source Address :Vlan :

0009. 7C10 .8E8C:50

Security Violation Count : 1

A. Send an SNMP trap.

B. Send a syslog message.

C. Increment the Security Violation counter.

D. Forward the traffic.

E. Write the MAC address to the startup-config.

F. Shut down the port.

Answer: ABC

Explanation:

http://www.cisco.eom/en/US/docs/switches/lan/catalyst4500/12.2/20ewa/configuration/guide/port_

sec. html

QUESTION 34

What does the frame-relay interface-dlci command configure?

A. local DLCI on the subinterface

B. remote DLCI on the main interface

C remote DCLI on the subinterface

D. local DLCI on the main interface

Answer: A

Explanation:

To assign a data-link connection identifier (DLCI) to a specified Frame Relay subinterface on the

router or access server, or to assign a specific permanent virtual circuit (PVC) to a DLCI, or to apply

a virtual template configuration for a PPP session, use the frame-relay interface-dlci interface

configuration command

QUESTION 35

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A. Administratively shut down the interface.

B. Physically secure the interface.

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Answer: DE

Explanation:

It is a waste to administratively shut down the interface. Moreover, someone can still access the

virtual terminal interfaces via other interfaces -> A is not correct. We can not physically secure a

virtual interface because it is "virtual" -> B is not correct. To apply an access list to a virtual terminal

interface we must use the "access-class" command. The "access-group" command is only used to

apply an access list to a physical interface -> C is not correct; E is correct.

The most simple way to secure the virtual terminal interface is to configure a username & password

to prevent unauthorized login -> D is correct.

QUESTION 36

Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the

192.168.10.192/26 LAN be forwarded to 192.168.10.1?

192. 168.1 0.64.'26 192.168.10.192.26

1 92 . 1 68 . 1 0 .0/24 is variab ly subnetted, 6 subnets, 2 masks

D 192.168.10.64/26 [90/2195456] via 192.168.10.9, 00:03:31, SerialO/0

D 192.168.10.0/30 [90/2681856] via 192.168.10.9, 00:03:31, SerialD/0

[90/26S1856] via 192.168.10.5, 00:03:31, SerialD/1

C 1 92 . 1 6 8 . 1 0 .4/30 is directly comiected, S erial 0/ 1

C 1 92 . 1 6 8 . 1 0 .8/30 is directly connected, S eiial 0/0

C 1 92 . 1 6 8 . 1 0 . 1 92 S26 is dire ctly connected, FastEthemetO/0

D 192.168.10.128/26 [90/2195456] via 192.168.10.5, 00:03:31, Seiial0/1

A. The router will forward packets from R3 to R2 to R1 .

B. The router will forward packets from R3 to R1 to R2.

C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1 .

D. The router will forward packets from R3 to R1 .

Answer: C

Explanation:

From the routing table we learn that network 192.168.10.0/30 is learned via 2 equal- cost paths

(192.168.10.9 &1 92. 168. 10. 5) - traffic to this network will be load-balancing.

QUESTION 37

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

Refer to the exhibit. What information about the interfaces on the Main_Campus router is true?

Main_Campus

10.2.3.4/30

Main_Campus# show ip iirteface brief

Interface

FastEthernetO/0

FastEthernetO/0.1

FastEthemetOffl.2

FastEthernetO/D.3

Fast Ethernet*) 0.4

SerialOffl

Serial0/1

Main Campus#

| FaO.D

10.2.3.8/30

IP-Address

OK?

Method

unassigned YES

unset 192.168.1.254 YES

manual 192.168.2.254 YES

manual 192.168.3.254 YES

manual 192.168.4.254 YES

manual 10.2.3.5 YES

manual 10.2.3.9 YES

manual Status Protocol up up up up up up up up up up up up up up

A. The LAN interfaces are configured on different subnets.

B. Interface FastEthernet 0/0 is configured as a trunk.

C. The Layer 2 protocol of interface Serial 0/1 is NOT operational.

D. The router is a modular router with five FastEthernet interfaces.

E. Interface FastEthernet 0/0 is administratively deactivated.

Answer: B

Explanation:

Interface fa0/0 breaks into sub interface and Main_Campus router is connected with switch via

fa0/0 .Subinterfaces configured with different subnet mask so its seem switch has multiple vlans

and allow communication between vlan , router and inter-vlan we need to make a trunk port. So B

will be the correct answer.

QUESTION 38

Refer to the exhibit. C-router is to be used as a "router-on-a-stick" to route between the VLANs. All

the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs

have been configured with the appropriate default gateway. What is true about this co nfiguration?

FaO/0.1 - 172.19.1.254 I24 VLAN 1

FaO/0.2 - 1 72.1 9.2.254 124 VLAN 2

FatV0.3 - 1 72.1 9.3.254 124 VLAN 3

VLAfl2

A. These commands need to be added to the configuration:

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

C-router(config)# router eigrp 123

C-router(config-router)# network 172.19.0.0

B. These commands need to be added to the configuration:

C-router(config)# router ospf 1

C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0

C. These commands need to be added to the configuration:

C-router(config)# router rip

C-router(config-router)# network 172.19.0.0

D. No further routing configuration is required.

Answer: D

Explanation:

http://www.cisco.com/en/US/tech/tk389/tk815/technologies_configuration_example09186a00800

949fd.shtml

QUESTION 39

Refer to the exhibit. Assume that all router interfaces are operational and correctly configured. In

addition, assume that OSPF has been correctly configured on router R2. How will the default route

configured on R1 affect the operation of R2?

network 172.16.100.0 0.0.0.3 area 0

network 172.16.100.64 0.0.0.63 area 0

network 172.16.100.128 0.0.0.31 area 0

default-information originate

A. Any packet destined for a network that is not directly connected to router R1 will be dropped.

B. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately.

C. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately

because of the lack of a gateway on R1 .

D. The networks directly connected to router R2 will not be able to communicate with the 172.16.100.0,

172.16.100.128, and 172.16.100.64 subnetworks.

E. Any packet destined for a network that is not referenced in the routing table of router R2 will be directed

to R1. R1 will then send that packet back to R2 and a routing loop will occur.

Answer: E

Explanation:

First, notice that the more-specific routes will always be favored over less-specific routes regardless

R1 Routing Commands:\

ip route 0.0.0.0 0.0.0.0 serialO/0

router ospf 1

ICND2 - Interconnecting Cisco Networking Devices Part 2 (200-101)

of the administrative distance set for a protocol. In this case, because we use OSPF for three

networks (172.16.100.0 0.0.0.3, 172.16.100.64 0.0.0.63, 172.16.100.128 0.0.0.31) so the packets

destined for these networks will not be affected by the default route. The default route configured

on R1 "ip route 0.0.0.0 0.0.0.0 serial0/0 will send any packet whose destination network is not

referenced in the routing table of router R1 to R2, it doesn't drop anything so answers A, B and C

are not correct. D is not correct too because these routes are declared in R1 and the question says

that "OSPF has been correctly configured on router R2, so network directly connected to router R2

can communicate with those three subnetworks. As said above, the default route configured on R1

will send any packet destined for a network that is not referenced in its routing table to R2; R2 in

turn sends it to R1 because it is the only way and a routing loop will occur.

QUESTION 40

Refer to the exhibit. Assume that all of the router interfaces are operational and configured correctly.

How will router R2 be affected by the configuration of R1 that is shown in the exhibit?

network 1 72.1 6.1 00.1 28 0.0.0.31 area 0

default- information originate

A. Router R2 will not form a neighbor relationship with R1 .

B. Router R2 will obtain a full routing table, including a default route, from R1 .

C. R2 will obtain OSPF updates from R1 , but will not obtain a default route from R1 .

D. R2 will not have a route for the directly connected serial network, but all other directly connected networks

will be present, as well as the two Ethernet networks connected to R1.

Answer: A

Explanation:

"ip route 0.0.0.0 0.0.0.0 serial0/0" is causing a loop, configuration is going to cause a loop and the

link between R1 and R2 will be congested, OSPF will not perform relationship between them. From

its name, OSPF is a Link-State routing protocol, and the link state between R1 and R2 is simply

down or something like that.

The output of the “show ip ospf database” is shown below:

From the output above we can see LSA Type 1 (Router Link State) and LSA Type 3 (Summary Net Link State).

Question 2

Question 3

Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment will have a DR so we have 2

DRs.

To select which router will become DR they will compare their router-IDs. The router with highest (best) router-ID will become

DR. The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s

physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become

DRs.

Question 4

Explanation

The default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router is 4. We can change this

default value by using “maximum-paths” command:

Router(config-router)#maximum-paths 2

Note: Cisco routers support up to 16 equal-cost paths

Question 5

Explanation

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID.

Question 6

Explanation

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we

use that loopback interface as the router-id) -> B is correct.

The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.

+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

-> The loopback interface will be chosen as the router ID of RouterB -> C is correct.

Question 7

Explanation

The question states that the link to ISP should not participate in OSPF -> answers A, B are not correct.

In answer D, the “network 10.10.2.32 0.0.0.31 area 0” does not cover the IP address of S0/0.103 (10.10.2.21) -> D is not correct.

The default-information originate command advertises a default route to other routers, telling something like “please send me

your unknown traffic”. So in this case, besides a full routing table, other routers will also receive a default route from Core router.

But please notice that Core router needs to have a default route in its routing table. That is why the command “ip route 0.0.0.0

0.0.0.0 10.10.2.14” is added to Core router. By adding the “always” (after “default-information originate” command) the default

route will be advertised even if there is no default route in the routing table of router Core.

Question 8

Explanation

The “network 192.168.12.64 0.0.0.63″ equals to network 192.168.12.64/26. This network has:

+ Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000)

+ Network address: 192.168.12.64

+ Broadcast address: 192.168.12.127

Therefore all interface in the range of this network will join OSPF -> B C D are correct.

http://www.aiotestking.com/cisco/what-does-the-128-refer-to-in-the-router-output-above/

http://wap.testsnow.net/1/1768/22177.html

http://www.2passeasy.com/dumps/200-101/demo-2.html

Interconnecting Cisco Networking Devices Part 1 (ICND1) (100-101)

QUESTION 41

Which one of the following IP addresses is the last valid host in the subnet using mask

255.255.255.224?

A. 192.168.2.63

B. 192.168.2.62

C. 192.168.2.61

D. 192.168.2.60

E. 192.168.2.32

Answer: B

Explanation:

With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is

broadcast so 62 is last valid host out of given choices.

QUESTION 42

An administrator is in the process of changing the configuration of a router. What command will

allow the administrator to check the changes that have been made prior to saving the new

configuration?

A. Router# show startup-config

B. Router# show current-config

C. Router# show running-config

D. Router# show memory

E. Router# show flash

F. Router# show processes

Answer: C

Explanation:

This command followed by the appropriate parameter will show the running config hence the admin

will be able to see what changes have been made, and then they can be saved.

QUESTION 43

Which statements accurately describe CDP? (Choose three.)

A. CDP is an IEEE standard protocol.

B. CDP is a Cisco proprietary protocol.

C. CDP is a datalink layer protocol.

D. CDP is a network layer protocol.

E. CDP can discover directly connected neighboring Cisco devices.

F. CDP can discover Cisco devices that are not directly connected.

Answer: BCE

Explanation:

CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators

collect information about both locally attached and remote devices. By using CDP, you can gather

hardware and protocol information about neighbor devices containing useful info for

troubleshooting and documenting the network.

QUESTION 44

On a live network, which commands will verify the operational status of router interfaces? (Choose

two.)

A. Router# show interfaces

B. Router# show ip protocols

C. Router# debug interface

D. Router# show ip interface brief

E. Router# show start

Answer: AD

Explanation:

Both these commands will show the current status of the interfaces, either in show or debug mode

both will display the information.

QUESTION 45

Which router command will configure an interface with the IP address 10.10.80.1/19?

A. router(config-if)# ip address 10.10.80.1/19

B. router(config-if)# ip address 10.10.80.1 255.255.0.0

C. router(config-if)# ip address 10.10.80.1 255.255.255.0

D. router(config-if)# ip address 10.10.80.1 255.255.224.0

E. router(config-if)# ip address 10.10.80.1 255.255.240.0

F. router(config-if)# ip address 10.10.80.1 255.255.255.240

Answer: D

Explanation:

255.255.224 equal /19 in CIDR format hence the answer

QUESTION 46

Refer to the exhibit. If CDP is enabled on all devices and interfaces, which devices will appear in

the output of a show cdp neighbors command issued from R2?

A. R2 and R3

B. R1 and R3

C. R3 and S2

D. R1, S1, S2, and R3

E. R1, S1, S2, R3, and S3

Answer: C

Explanation:

A Cisco device enabled with CDP sends out periodic interface updates to a multicast address in

order to make itself known to neighbors. Since it is a layer two protocol, these packets are not

routed. So the devices detected would be immediate connected neighbors.

QUESTION 47

Refer to the exhibit. The two routers have had their startup configurations cleared and have been

restarted. At a minimum, what must the administrator do to enable CDP to exchange information

between R1 and R2?

A. Configure the router with the cdp enable command.

B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.

C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces.

D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces.

Answer: B

Explanation:

If the shut down commands are not entered, then CDP can exchange information between the two

routers, else it would fail.

QUESTION 48

Refer to the exhibit. The network administrator is testing connectivity from the branch router to the

newly installed application server. What is the most likely reason for the first ping having a success

rate of only 60 percent?

HQ

172.16.1.0(24

SO 0 Branch

1010. 10,2/24 ,

S0.O 10.10.10,1/24 E0

l92.16*,2.254/24

Application Server 192.168.2.167/24 tr

Type aicspa S4q>j«ifi4 t« Abo

Sending 5, 100-byce ICHP Eclnos co 192.163.2.167, tinecut is Z seconds:

Succas* r«^il^^^p^^«wfe^3/S) , romd-erip Bin/avoj/max ■ 1/2/4 Bf

Bl inn-.: ping 11? 14t ? 167

Type escape sequence to abort.

2«ndin? S, 100-byca XCHP Bchos to 192. 166. Z . 167, ciMOUt it Z saconds:

Success rate is 100 percent (5/5 J:, rtHind^trip ■in/avg/max

Brandt*

1/1/1

A. The network is likely to be congested, with the result that packets are being intermittently dropped.

B. The branch router had to resolve the application server MAC address.

C. There is a short delay while NAT translates the server IP address.

D. A routing table lookup delayed forwarding on the first two ping packets.

E. The branch router LAN interface should be upgraded to FastEthernet.

Answer: B

Explanation:

Initially the MAC address had to be resolved, but later on it was confirmed to ping went straight

away

QUESTION 49

What two things does a router do when it forwards a packet? (Choose two.)

A. switches the packet to the appropriate outgoing interfaces

B. computes the destination host address

C. determines the next hop on the path

D. updates the destination IP address

E. forwards ARP requests

Answer: AC

Explanation:

Without following these two processes namely switching the packet to appropriate interface and

telling the packet where to go by providing it with a destination IP address, the purpose of the same

would not be solved.

QUESTION 50

Which two of these functions do routers perform on packets? (Choose two.)

A. examine the Layer 2 headers of inbound packets and use that information to determine the next

hops for the packets

B. update the Layer 2 headers of outbound packets with the MAC addresses of the next hops

C. examine the Layer 3 headers of inbound packets and use that information to determine the next

hops for the packets

D. examine the Layer 3 headers of inbound packets and use that information to determine the complete

paths along which the packets will be routed to their ultimate destinations

E. update the Layer 3 headers of outbound packets so that the packets are properly directed to valid

next hops

F. update the Layer 3 headers of outbound packets so that the packets are properly directed to their

ultimate destinations

Answer: BC

Explanation:

This is the basic function of the router to receive incoming packets and then forward them to their

required destination. This is done by reading layer 3 headers of inbound packets and update the

info to layer 2 for further hopping.

QUESTION 51

Refer to the exhibit. Which two statements are correct? (Choose two.)

Stub Network

Network 10.0.0.0 172.1 < sO/0/0

RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.2.2

A. This is a default route.

B. Adding the subnet mask is optional for the ip route command.

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA.

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address.

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1 .0 network can

reach network 10.0.0.0.

Answer: AC

Explanation:

This is obviously the default value for the route which is set between the routers and since it is

entered in such a manner that it ensures connectivity between the stub network and any host lying

beyond RouterA.

QUESTION 52

Which statements are true regarding ICMP packets? (Choose two.)

A. They acknowledge receipt of TCP segments.

B. They guarantee datagram delivery.

C. TRACERT uses ICMP packets.

D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.

Answer: CD

QUESTION 53

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.

No routing protocols or other static routes are configured on the router. Which statement is true

about this command?

A. The interface with IP address 192.168.10.2 is on this router.

B. The command sets a gateway of last resort for the router.

C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.

D. The command creates a static route for all IP traffic with the source address 192.168.100.160.

Answer: C

160 it's actually network address of /27 so any address within the range of 160 network will be sent

to 192.168.10.2

QUESTION 54

Refer to the exhibit. Host A can communicate with Host B but not with Hosts C or D. How can the

network administrator solve this problem?

192.168.1.2/24

A. Configure Hosts C and D with IP addresses in the 192.168.2.0 network.

B. Install a router and configure a route to route between VLANs 2 and 3.

C. Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the

original switch.

D. Enable the VLAN trunking protocol on the switch.

Answer: B

Explanation:

Two VLANs require a router in between otherwise they cannot communicate through a simple

switch mechanism

QUESTION 55

Refer to the exhibit. What is the simplest way to configure routing between the regional office

network 10.89.0.0/20 and the corporate network?

A. routerl(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2

B. router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2

C. routerl(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1

D. router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1

Answer: D

Explanation:

The fourth command makes it possible for all hosts beyond R2 and all hosts beyond

R1 to interact with each other, hence it is the most simplest technique.

QUESTION 56

Refer to the exhibit. Which command would you use to configure a static route on Routerl to

network 192.168.202.0/24 with a nondefault administrative distance?

Routerl 192.168.201.1 192.168.201.2 Router2

A. routerl (config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2

B. routerl (config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1

C. routerl (config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2

D. routerl (config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5

Answer: D

Explanation:

Since it has /24 CIDR and it also has a non default administrative distance, the answer has to be

option D.

QUESTION 57

What does administrative distance refer to?

A. the cost of a link between two neighboring routers

B. the advertised cost to reach a network

C. the cost to reach a network that is administratively set

D. a measure of the trustworthiness of a routing information source

Answer: D

Explanation:

Administrative distance is the first criterion that a router uses to determine which routing protocol

to use if two protocols provide route information for the same destination. Administrative distance

is a measure of the trustworthiness of the source of the routing information. The smaller the

administrative distance value, the more reliable the protocol.

QUESTION 58

Which IOS command is used to initiate a login into a VTY port on a remote router?

A. router# login

B. router# telnet

C. router# trace

D. router# ping

E. router(config)# line vty 0 5

F. router(config-line)# login

Answer: B

Explanation:

VTY ports are telnet ports hence command B will initiate login to the telnet port.

QUESTION 59

In the configuration of NAT, what does the keyword overload signify?

A. When bandwidth is insufficient, some hosts will not be allowed to access network translation.

B. The pool of IP addresses has been exhausted.

C. Multiple internal hosts will use one IP address to access external network resources.

D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.

Answer: C

Explanation:

Overload simply means using multiple hosts to access the network using the same translated IP

address.

QUESTION 60

What happens when computers on a private network attempt to connect to the Internet through a

Cisco router running PAT?

A. The router uses the same IP address but a different TCP source port number for each connection.

B. An IP address is assigned based on the priority of the computer requesting the connection.

C. The router selects an address from a pool of one-to-one address mappings held in the lookup table.

D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of

the connection.

Answer: A

Explanation:

Port Address Translation makes the PC connect to the Internet but using different TCP source port

QUESTION 61

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.

No routing protocols or other static routes are configured on the router. Which statement is true about this

command?

A. The interface with IP address 192.168.10.2 is on this router.

B. The command sets a gateway of last resort for the router.

C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.

D. The command creates a static route for all IP traffic with the source address 192.168.100.160.

Correct Answer: C

QUESTION 62

Which two of these functions do routers perform on packets? (Choose two.)

A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for

the packets

B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops

C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for

the packets

D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths

along which the packets will be routed to their ultimate destinations

E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next

hops

F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate

destinations

Correct Answer: BC

QUESTION 63

Refer to the exhibit. Which two statements are correct? (Choose two.)

A. This is a default route.

B. Adding the subnet mask is optional for the ip route command.

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA.

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address.

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach

network 10.0.0.0.

Correct Answer: AC

QUESTION 64

Refer to the exhibit. If CDP is enabled on all devices and interfaces, which devices will appear in the output of

a show cdp neighbors command issued from R2?

A. R2 and R3

B. R1 and R3

C. R3 and S2

D. R1, S1, S2, and R3

E. R1, S1, S2, R3, and S3

Correct Answer: C

QUESTION 65

Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At a

minimum, what must the administrator do to enable CDP to exchange information between R1 and R2?

A. Configure the router with the cdp enable command.

B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.

C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces.

D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces.

Correct Answer: B

QUESTION 66

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface?

(Choose two.)

A. router#show version

B. router#show ip interface

C. router#show protocols

D. router#show controllers

E. router#show running-config

Correct Answer: CD

QUESTION 67

An administrator is in the process of changing the configuration of a router. What command will allow the

administrator to check the changes that have been made prior to saving the new configuration?

A. Router# show startup-config

B. Router# show current-config

C. Router# show running-config

D. Router# show memory

E. Router# show flash

F. Router# show processes

Correct Answer: C

QUESTION 68

On a live network, which commands will verify the operational status of router interfaces? (Choose two.)

A. Router# show interfaces

B. Router# show ip protocols

C. Router# debug interface

D. Router# show ip interface brief

E. Router# show start

Correct Answer: AD

QUESTION 69

Which router command will configure an interface with the IP address 10.10.80.1/19?

A. router(config-if)# ip address 10.10.80.1/19

B. router(config-if)# ip address 10.10.80.1 255.255.0.0

C. router(config-if)# ip address 10.10.80.1 255.255.255.0

D. router(config-if)# ip address 10.10.80.1 255.255.224.0

E. router(config-if)# ip address 10.10.80.1 255.255.240.0

F. router(config-if)# ip address 10.10.80.1 255.255.255.240

Correct Answer: D

QUESTION 70

Refer to the exhibit. If the resume command is entered after the sequence that is shown in the exhibit, which

router prompt will be displayed?

A. Router1>

B. Router1#

C. Router2>

D. Router2#

Correct Answer: C

QUESTION 61

When configuring NAT, the Internet interface is considered to be what?

A. local

B. inside

C. global

D. outside

Answer: D

Explanation:

Network address translation or NAT requires the Internet to be considered as an outside interface

else it won't serve the purpose it intends to.

QUESTION 62

The ip helper-address command does what?

A. assigns an IP address to a host

B. resolves an IP address from a DNS server

C. relays a DHCP request across networks

D. resolves an IP address overlapping issue

Answer: C

Explanation:

When the DHCP client sends the DHCP request packet, it doesn't have an IP address. So it uses

the all-zeroes address, 0.0.0.0, as the IP source address. And it doesn't know how to reach the

DHCP server, so it uses a general broadcast address, 255.255.255.255, for the destination. So the

router must replace the source address with its own IP address, for the interface that received the

request. And it replaces the destination address with the address specified in the ip helper-address

command. The client device's MAC address is included in the payload of the original DHCP request

packet, so the router doesn't need to do anything to ensure that the server receives this information.

QUESTION 63

Refer to the exhibit. The network administrator made the entries that are shown and then saved

the configuration. From a console connection, what password or password sequence is required

for the administrator to access privileged mode on Routerl?

Route r# configure terminal

Router (conf ig) # hostname Routerl

Routerl (config) § enable secret sanfran

Routerl (config) § enable password cisco

Routerl (config) § line irty 0 4

Routerl (conf ig-line) § password sanjose

Routerl (conf ig-line) §

A. Cisco

B. sanfran

C. sanjose

D. either cisco or sanfran

E. either cisco or sanjose

F. sanjose and sanfran

Answer: B

Explanation:

The enable secret password takes precedence over the enable password, so sanfran will be used.

QUESTION 64

The following commands are entered on the router:

Burbank(config)# enable secret fortress

Burbank(config)# line con 0

Burbank(config-line)# login

Burbank(config-line)# password nOwayln

Burbank(config-line)# exit

Burbank(config)# service password-encryption

What is the purpose of the last command entered?

A. to require the user to enter an encrypted password during the login process

B. to prevent the vty, console, and enable passwords from being displayed in plain text in the

configuration files

C. to encrypt the enable secret password

D. to provide login encryption services between hosts attached to the router

Answer: B

QUESTION 65

What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.

B. Only the enable secret password will be encrypted.

C. Only passwords configured after the command has been entered will be encrypted.

D. It will encrypt the secret password and remove the enable secret password from the configuration.

E. It will encrypt all current and future passwords.

Answer: E

Explanation:

Encryption further adds a level of security to the system as anyone having access to the database

of passwords cannot reverse the process of encryption to know the actual passwords which isn't

the case if the passwords are stored simply.

QUESTION 66

An administrator has connected devices to a switch and, for security reasons, wants the

dynamically learned MAC addresses from the address table added to the running configuration.

What must be done to accomplish this?

A. Enable port security and use the keyword sticky.

B. Set the switchport mode to trunk and save the running configuration.

C. Use the switchport protected command to have the MAC addresses added to the configuration.

D. Use the no switchport port-security command to allow MAC addresses to be added to the

configuration.

Answer: A

Explanation:

One can configure MAC addresses to be sticky. These can be dynamically learned or manually

configured, stored in the address table, and added to the running configuration. If these addresses

are saved in the configuration file, the interface does not need to dynamically relearn them when

the switch restarts, hence enabling security as desired.

QUESTION 67

A company has placed a networked PC in a lobby so guests can have access to the corporate

directory. A security concern is that someone will disconnect the directory PC and re-connect their

laptop computer and have access to the corporate network. For the port servicing the lobby, which

three configuration steps should be performed on the switch to prevent this? (Choose three.)

A. Enable port security.

B. Create the port as a trunk port.

C. Create the port as an access port.

D. Create the port as a protected port.

E. Set the port security aging time to 0.

F. Statically assign the MAC address to the address table.

G. Configure the switch to discover new MAC addresses after a set time of inactivity.

Answer: ACF

Explanation:

If port security is enabled and the port is only designated as access port, and finally static MAC

address is assigned, it ensures that even if a physical connection is done by taking out the directory

PC and inserting personal laptop or device, the connection cannot be made to the corporate

network, hence ensuring safety.

QUESTION 68

Why would a network administrator configure port security on a switch?

A. to prevent unauthorized Telnet access to a switch port

B. to prevent unauthorized hosts from accessing the LAN

C. to limit the number of Layer 2 broadcasts on a particular switch port

D. block unauthorized access to the switch management interfaces

Answer: B

Explanation:

You can use the port security feature to restrict input to an interface by limiting and identifying MAC

addresses of the stations allowed to access the port. When you assign secure MAC addresses to

a secure port, the port does not forward packets with source addresses outside the group of defined

addresses. If you limit the number of secure MAC addresses to one and assign a single secure

MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a

port is configured as a secure port and the maximum number of secure MAC addresses is reached,

when the MAC address of a station attempting to access the port is different from any of the

identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC

address configured or learned on one secure port attempts to access another secure port, a

violation is flagged.

QUESTION 69

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Configure the server MAC address as a static entry of port security.

C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from

spoofing

the server IP address.

Answer: B

Explanation:

When the MAC address is configured as static entry, no other address is allowed.

QUESTION 70

Refer to the exhibit. A network administrator has configured a Catalyst 2950 switch for remote

management by pasting into the console the configuration commands that are shown in the exhibit.

However, a Telnet session cannot be successfully established from a remote host. What should be

done to fix this problem?

interface vlan 1 login exit

A. Change the first line to interface fastethernet 0/1 .

B. Change the first line to interface vlan 0/1 .

C. Change the fifth line to ip default-gateway 192.168.17.241.

D. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1.

E. Change the sixth line to line con 0.

Answer: C

Explanation:

The default gateway for remote session is 192.168.17.241 and not the one given in the exhibit.

QUESTION 71

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.)

A. 10.1.168.0

B. 10.1.176.1

C. 10.1.174.255

D. 10.1.160.255

E. 10.1.160.0

F. 10.1.175.255

Answer: ACD

Explanation:

All IP address in IP ranges between : 10.1 .160.1 and 10.1.175.254 are valid as shown below

Address: 10.1.160.0 00001010.00000001.1010 0000.00000000 Netmask:255.255.240.0 =

201 1 1 1 1 1 1 1 .1 1 1 1 1 1 1 1 .1 1 1 1 0000.00000000 Wildcard^. 0. 1 5.25500000000.00000000.0000

1111.11111111 Which implies that

Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000

HostMin:10. 1.160. 100001010.00000001. 1010 0000.00000001

HostMax:10. 1.175.25400001010. 00000001. 1010 1111.11111110

Broadcast: 10.1.1 75.25500001 0 1 0.00000001 .1010 1111.11111111

QUESTION 72

Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem,

the administrator has entered the command shown in the exhibit. Based on the output shown, what

could be the problem?

ip address 192.168.17.253 255.255.255.240

no shutdown

ip default -gate way 19:

line vty 0 15

192.168.10.64»26

192.168. 10 .8.' 30

Rl^show controllers serial 0/0

HD miit 0, idb=QxD21B4, driver stmture 0xD7640

Buffer sr^ej 524 HDUnit 0,

V.35 cable

RX ring witli 16 entiles at 0x622800

«Outpnt oniitted»

TXring with 16 entries at 0x623000

«Output oinitted»

ft .168.10.192/26

A. The serial interface is configured for half duplex.

B. The serial interface does not have a cable attached.

C. The serial interface has the wrong type of cable attached.

D. The serial interface is configured for the wrong frame size.

E. The serial interface has a full buffer.

Answer: C

Explanation:

since the output is not forthcoming it shows that the type of cable attached is wrong, though the

cable is connected since it shows the cable type. According to the figure DTE cable should connect

to R1 on interface but while examining using show controllers serial 0/0 command it showing that

a DCE is connected so the wrong type of cable is being used.

QUESTION 73

Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network

administrator is located in the NY office and has made a console connection to the NY router. After

establishing the connection they are unable to backup the configuration file and IOS of the NY

router to the TFTP server. What is the cause of this problem?

172.16.2.5 129

TFTP Seiver

172.16.1.101

255.255.255.240

A. The NY router has an incorrect subnet mask.

B. The TFTP server has an incorrect IP address.

C. The TFTP server has an incorrect subnet mask.

D. The network administrator computer has an incorrect IP address.

Answer: C

Explanation:

The subnet mast of the TFTP server needs to be in tune with the other network requirements else

it wont be possible.

QUESTION 74

If a host experiences intermittent issues that relate to congestion within a network while remaining

connected, what could cause congestion on this LAN?

A. half-duplex operation

B. broadcast storms

C. network segmentation

D. multicasting

Answer: B

Explanation:

A broadcast storm can consume sufficient network resources so as to render the network unable

to transport normal traffic.

QUESTION 75

Refer to the exhibit. The junior network support staff provided the diagram as a recommended

configuration for the first phase of a four-phase network expansion project. The entire network

expansion will have over 1000 users on 14 network segments and has been allocated this IP

address space.

192.168.1.1 through 192.168.5.255

192.168.100.1 through 192.168.100.255

What are three problems with this design? (Choose three.)

router

500 users 1 92.1 68.1 .0/24 AREA 1

GO ysers 192.168.2.0/24 AREA 2

200 users 192.168.3.0124 AREA 3

J Network Expansion Project Phase 1 Planning

A. The AREA 1 IP address space is inadequate for the number of users.

B. The AREA 3 IP address space is inadequate for the number of users.

C. AREA 2 could use a mask of /25 to conserve IP address space.

D. The network address space that is provided requires a single network-wide mask.

E. The router-to-router connection is wasting address space.

F. The broadcast domain in AREA 1 is too large for IP to function.

Answer: ACE

Explanation:

The given IP addresses of areas 1 and 3 along with network masks of 24 cannot accommodate

500 users so are inadequate, while the area 2 is having over capacity so its network mask can be

reduced to 25 to accommodate the only 60 users it has.

QUESTION 76

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?

A. 192.168.1.8/29

B. 192.168.1.32/27

C. 192.168.1.40/29

D. 192.168.1.16/28

E. 192.168.1.48/29

Answer: C

Explanation:

248 mask uses 5 bits (1111 1 000)

42 IP in binary is (0010 1010)

The base subnet therefore is the lowest binary value that can be written without changing the output

of an AND operation of the subnet mask and IP ...

1111 1000 AND

0010 1010 equals

0010 1000 - which is .40

124 is standard class C mask.

adding the 5 bits from the .248 mask gives 129

QUESTION 77

Which OSI layer header contains the address of a destination host that is on another network?

A. application

B. session

C. transport

D. network

E. data link

F. physical

Answer: D

Explanation:

Only network address contains this information. To transmit the packets the sender uses network

address and datalink address. But the layer 2 address represents just the address of the next hop

device on the way to the sender. It is changed on each hop. Network address remains the same.

QUESTION 78

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

A. Internet layer

B. transport layer

C. application layer

D. network access layer

Answer: D

Explanation:

The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet.

The TCP/IP model was created after the OSI 7 layer model for two major reasons. First, the

foundation of the Internet was built using the TCP/IP suite and through the spread of the World

Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the

Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD's goal was to

bring international standards which could not be met by the OSI model. Since the DOD was the

largest software consumer and they preferred the TCP/IP suite, most vendors used this model

rather then the OSI. Below is a side by side comparison of the TCP/IP and OSI models.

TCP/IP Model VS. OSI Model Application Layer 7

Application

Layer 6

Presentation

Layer 5

Session Transport Layer 4

Transport Internet Layer 3

Network Network Access Layer 2

Data Link

Layer 1

Physical

QUESTION 79

Which protocol uses a connection-oriented service to deliver files between end systems?

A. TFTP

B. DNS

C. FTP

D. SNMP

E. RIP

Answer: C

QUESTION 80

Refer to the exhibit. If the hubs in the graphic were replaced by switches, what would be virtually

eliminated?

A. broadcast domains

B. repeater domains

C. Ethernet collisions

D. signal amplification

E. Ethernet broadcasts

Answer: C

Explanation:

Modern wired networks use a network switch to eliminate collisions. By connecting each device

directly to a port on the switch, either each port on a switch becomes its own collision domain (in

the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full

duplex links.

http://www.aiotestking.com/cisco/what-will-the-switch-do-when-it-receives-the-frame-from-host-a-2/

http://www.ccna5ccnp.com/ccna1-v5-1/ccna1-chapter-5-exam-v5-1/

QUESTION 21

Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is

shown arrives at the switch. What two operations will the switch perform when it receives this frame?

(Choose two.)

MAC Address Table

Fa0/1 0000.00bb.bbbb

FaO/2 0000.00cc.occc

0000 .00 1) I). I) I) I) I)

000.00aa.aaaa

0000.00cc.cccc

ETHERNET FRAME

ffff.ffff.fffT

OOOO.OOaa.aaaa

Destination MAC

Source MAC

Data

A. The switch will not forward a frame with this destination MAC address.

B. The MAC address of OOOO.OOaa.aaaa will be added to the MAC Address Table.

C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.

D. The frame will be forwarded out all active switch ports except for port fa0/0.

E. The frame will be forwarded out fa0/0 and fa0/1 only.

F. The frame will be forwarded out all the ports on the switch.

Answer: BD

Explanation:

If the switch already has the MAC address in its table for the destination, it will forward the frame

directly to the destination port. If it was not already in its MAC table, then they frame would have

been flooded out all ports except for the port that it came from.

QUESTION 22

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from

another vendor?

A. RTP

B. TCP

C. CDP

D. UDP

Answer: C

Explanation:

The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per

port power management details, and Quality of Service (QoS) configuration information with the

Cisco Catalyst switch.

QUESTION 23

Refer to the exhibit. What must be configured to establish a successful connection from Host A to

switch SW-A through router RT-A?

A. VLAN 1 on RT-A

B. IP routing on SW-A

C. default gateway on SW-A

D. crossover cable connecting SW-A and RT-A

Answer: C

Explanation:

In order for the switch to reach networks that are not local, such as networks attached to different

interfaces of the router, it will need to set its default gateway to be the IP address of the attached

router.

QUESTION 24

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the

destination MAC address. What will the switch do with the frame?

A. drop the frame

B. forward it out of all ports except the one that received it

C. forward it out of all ports

D. store it until it learns the correct port

Answer: B

QUESTION 25

At which layer of the OSI model does the protocol that provides the information that is displayed by

the show cdp neighbors command operate?

A. application

B. transport

C. network

D. physical

E. data link

Answer: E

Explanation:

CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-

manufactured devices (routers, bridges, access servers, and switches) and allows network

management applications to discover Cisco devices that are neighbors of already known devices.

With CDP, network management applications can learn the device type and the Simple Network

Management Protocol (SNMP) agent address of neighboring devices running lower-layer,

transparent protocols.

QUESTION 26

Which two characteristics apply to Layer 2 switches? (Choose two.)

A. increases the number of collision domains

B. decreases the number of collision domains

C. implements VLAN

D. decreases the number of broadcast domains

E. uses the IP address to make decisions for forwarding data packets

Answer: AC

Explanation:

Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch

port is in its own separate collision domain, thus eliminating collisions on the segment.

QUESTION 27

Which two commands will display the current IP address and basic Layer 1 and 2 status of an

interface? (Choose two.)

A. router#show version

B. router#show ip interface

C. router#show protocols

D. router#show controllers

E. router#show running-config

Answer: CD

Explanation:

Router#show protocols displays status of configured Layer 2 and 3 protocols while show controllers

Displays statistics for interface hardware including the current IP address

QUESTION 28

Which two characteristics describe the access layer of the hierarchical network design model?

(Choose two.)

A. layer 3 support

B. port security

C. redundant components

D. VLANs

E. PoE

Answer: AB

Explanation:

Benefits of a Hierarchical Network Scalability:

The modularity of the design of hierarchical networks allows you to replicate design elements as

the network grows including the use of layer 3 support on network swithces.

Because each instance of the module is consistent, expansion is easy to plan and implement.

Redundancy: Redundancy at the core and distribution layers ensures path availability in case of

any hardware failure in any of the devices on these layers. Performance: Link aggregation between

levels and high- performance core and distribution level switches allows for near wire speed

throughout the network. Properly designed hierarchical networks can achieve near wire speed

between all devices. Security: Port security at the access level, and policies at the distribution layer

make the network more secure, is important to keep the core layer free from any tasks that may

compromise the speed of the link, all security should be handled at the access and distrubution

layers. Manageability: Consistency between switches at each level makes management more

simple. Each layer of the hierarchical design performs specific functions that are consistent

throughout that layer. Therefore, if you need to change the functionality of an access layer switch,

you could repeat that change across all access layer switches in the network because they

presumably perform the same functions at their layer. Maintainability:

Because hierarchical networks are modular in nature and scale very easily, they are easy to

maintain. With other network topology designs, manageability becomes increasingly complicated

as the network grows. In the hierarchical model, switch functions are different at each layer. You

can save money by using less expensive access layer switches at the lowest layer, and spend

more on the distribution and core layer switches to achieve high performance on the network.

QUESTION 29

Refer to the topology and switching table shown in the graphic. Host B sends a frame to Host C.

What will the switch do with the frame?

Host A

Host B

HostC

Host D

Switch 1 switch table

Host MAC Address Port

A ^

00-0A-SA-47-E6-12

0/5

D

01-00-CD-22-03-14

0/9

B

01-1B-25-AB-32-E8 0/2

A. drop the frame

B. send the frame out all ports except port 0/2

C. return the frame to Host B

D. send an ARP request for Host C

E. send an ICMP Host Unreachable message to Host B

F. record the destination MAC address in the switching table and send the frame directly to Host C

Answer: B

Explanation:

An Ethernet switch appeal's to use the same logic as a transparent bridge. However, the internal

logic of the switch is optimized for performing the basic function of choosing when to forward

and when to filter a frame. Just as with a transparent bridge, the basic logic of a LAN switch is

as follows:

Step 1 A frame is received.

Step 2 If the destination is a broadcast or multicast, forward on all ports.

Step 3 If the destination is a nnicast and the address is not in tile address

table, forward on ah ports.

Step 4 If the destination is a unicast and the address is in the address

table, forward the frame out the associated port, unless the MAC

addies s is associated with the incoming port.

QUESTION 30

What is the purpose of assigning an IP address to a switch?

A. provides local hosts with a default gateway address

B. allows remote management of the switch

C. allows the switch to respond to ARP requests between two hosts

D. ensures that hosts on the same LAN can communicate with each other

Answer: B

Explanation:

Switch is a layer 2 device and doesn't use network layer for packet forwarding. The IP address may

be used only for administrative purposes such as Telnet access or for network management

purposes.

QUESTION 31

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

three.)

A. There are no collisions in full-duplex mode.

B. A dedicated switch port is required for each full-duplex node.

C. Ethernet hub ports are preconfigured for full-duplex mode.

D. In a full-duplex environment, the host network card must check for the availability of the network

media before transmitting.

E. The host network card and the switch port must be capable of operating in full-duplex mode.

Answer: ABE

Explanation:

Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire

pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol

to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached

to a switch, it must operate in half-duplex mode because the end stations must be able to detect

collisions. Half-duplex Ethernet-typically 1 0BaseT-is only about 30 to 40 percent efficient as Cisco

sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps-at most. Full-

duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex

uses a point-to-point connection between the transmitter of the transmitting device and the receiver

of the receiving device, which means that with full-duplex data transfer, you get a faster data

transfer compared to half duplex. And because the transmitted data is sent on a different set of

wires than the received data, no collisions occur. The reason you don't need to worry about

collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the

single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent

efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full

duplex, or 200Mbps for FastEthernet.

QUESTION 32

What is the subnet address for the IP address 172.19.20.23/28?

A. 172.19.20.0

B. 172.19.20.15

C. 172.19.20.16

D. 172.19.20.20

E. 172.19.20.32

Answer: C

QUESTION 33

What is the subnet address of 172.16.159.159/22?

A. 172.16.0.0

B. 172.16.128.0

C. 172.16.156.0

D. 172.16.159.0

E. 172.16.159.128

F. 172.16.192.0

Answer: C

Explanation:

Converting to binary format it comes to

11111111.11111111.111111 00.00000000 or

255.255.252.0

Starting with 172.16.0.0 and having increment of 4 we get.

QUESTION 34

An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26

mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.)

A. 192.168.4.61

B. 192.168.4.63

C. 192.168.4.67

D. 192.168.4.125

E. 192.168.4.128

F. 192.168.4.132

Answer: CD

Explanation:

Only the values of host with 67 and 125 fall within the range of /26 CIDR subnet mask, all others

lie beyond it.

QUESTION 35

Refer to the exhibit. The internetwork is using subnets of the address 192.168.1.0 with a subnet

mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be

assigned to the FastEthernet interface on RouterA?

A. 192.168.1.31

B. 192.168.1.64

C. 192.168.1.127

D. 192.168.1.190

E. 192.168.1.192

Answer: D

QUESTION 36

What is the network address for the host with IP address 192.168.23.61/28?

A. 192.168.23.0

B. 192.168.23.32

C. 192.168.23.48

D. 192.168.23.56

E. 192.168.23.60

Answer: C

Explanation:

convert bit-length prefix to quad-dotted decimal representation, then from it find the number of bits

used for subnetting you can find previously calculated number of subnets by separating subnets

each having value of last bit used for subnet masking Find that your IP address is in which subnet,

that subnet's first address is network address and last address is broadcast address. Based on

above steps the answer is option C.

QUESTION 37

What is the best practice when assigning IP addresses in a small office of six hosts?

A. Use a DHCP server that is located at the headquarters.

B. Use a DHCP server that is located at the branch office.

C. Assign the addresses by using the local CDP protocol.

D. Assign the addresses statically on each node.

Answer: D

Explanation:

Its best to use static addressing scheme where the number of systems is manageable rather than

use dynamic protocol as it is easy to operate and manage.

QUESTION 38

Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The

network administrator needs to design a classful addressing scheme to accommodate the three

subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network?

Net bits Subnet mask total -ad dresses per subnet m 255.255.240.0 4096 m 255.255.248.0 2048 122

255.255.252.0 1024 m 255.255.254.0 512 m 255 255 255 0 255 255.255 123 128 ,'26 255 255 255 192

64 /27

255.255.255.224 32 /28

255.255.255.240 16

255.255.255.248 8 m

255.255.255.252 4

A. 255.255.255.192

B. 255.255.255.224

C. 255.255.255.240

D. 255.255.255.248

E. 255.255.255.252

Answer: A

Explanation:

Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are

sufficient to accommodate even the largest subnet of 50 hosts.

QUESTION 39

Which two statements describe the IP address 10.16.3.65/23? (Choose two.)

A. The subnet address is 1 0.1 6.3.0 255.255.254.0.

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.

C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0

D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.

E. The network is not subnetted.

Answer: BD

Explanation:

The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits

and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2,

4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the

broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254

QUESTION 40

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses

are available on each of the subnets?

A. 1

B. 2

C. 4

D. 8

E. 252

F. 254

Answer: B

Explanation:

/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11 1 11 100 which means 6 subnet

bits and 2 host bits which means 62 subnets and 2 hosts per subnet.

Questions 181. Refer to the exhibit.

SwitchA receives the frame with the addressing shown in the exhibit.

According to the command output also shown in the exhibit, how will

SwitchA handle this frame?

A. It will drop the frame.

B. It will forward the frame out port Fa0/6 only.

C. It will forward the frame out port Fa0/3 only.

D. It will flood the frame out all ports.

E. It will flood the frame out all ports except Fa0/3.

Answer: E

Questions 182. Refer to the exhibit.

The exhibit is showing the topology and the MAC address table. Host A

sends a data frame to host

D. What will the switch do when it receives the frame from host A?

A. The switch will add the source address and port to the MAC address table

and forward the frame to host D.

B. The switch will discard the frame and send an error message back to host

C. The switch will flood the frame out of all ports except for port Fa0/3.

D. The switch will add the destination address of the frame to the MAC

address table and forward the frame to host D.

Answer: A

Questions 183. Which two statements describe the operation of the

CSMA/CD access method? (Choose two.)

A. In a CSMA/CD collision domain, multiple stations can successfully

transmit data simultaneously.

B. In a CSMA/CD collision domain, stations must wait until the media is not

in use before transmitting.

C. The use of hubs to enlarge the size of collision domains is one way to

improve the operation of the CSMA/CD access method.

D. After a collision, the station that detected the collision has first priority to

resend the lost data.

E. After a collision, all stations run a random backoff algorithm. When the

backoff delay period has expired, all stations have equal priority to transmit

data.

F. After a collision, all stations involved run an identical backoff algorithm

and then synchronize with each other prior to transmitting data.

Answer: B,E

Questions 184. Refer to the exhibit.

A network has been planned as shown. Which three statements accurately

describe the areas and devices in the network plan? (Choose three.)

A. Network Device A is a switch.

B. Network Device B is a switch.

C. Network Device A is a hub.

D. Network Device B is a hub.

E. Area 1 contains a Layer 2 device.

F. Area 2 contains a Layer 2 device.

Answer: A,D,E

Questions 185. On a Cisco switch, which protocol determines if an attached

VoIP phone is from Cisco or from another vendor?

A. RTP

B. TCP

C. CDP

D. UDP

Answer: C

Questions 186. Refer to the exhibit.

What must be configured to establish a successful connection from Host A to

switch SW-A through router RT-A?

A. VLAN 1 on RT-A

B. IP routing on SW-A

C. default gateway on SW-A

D. crossover cable connecting SW-A and RT-A

Answer: C

Questions 187. At which layer of the OSI model does the protocol that

provides the information that is displayed by the show cdp neighbors

command operate?

A. application

B. transport

C. network

D. physical

E. data link

Answer: E

Questions 188. Which two characteristics apply to Layer 2 switches? (Choose

two.)

A. Increases the number of collision domains

B. Decreases the number of collision domains

C. Implements VLAN

D. Decreases the number of broadcast domains

E. Uses the IP address to make decisions for forwarding data packets

Answer: A,C

Questions 189. Which two characteristics describe the access layer of the

hierarchical network design model? (Choose two.)

A. layer 3 support

B. port security

C. redundant components

D. VLANs

E. PoE

Answer: B,D

Questions 190. Refer to the topology and switching table shown in the

graphic.

Host B sends a frame to Host

C. What will the switch do with the frame?

A. Drop the frame

B. Send the frame out all ports except port 0/2

C. Return the frame to Host B

D. Send an ARP request for Host C

E. Send an ICMP Host Unreachable message to Host B

F. Record the destination MAC address in the switching table and send the

frame directly to Host C

Answer: B

Questions 211. At startup, what does a router do if it cannot access a

configuration file?

A. It shuts down in 10 seconds.

B. It enters global configuration mode.

C. It prompts the user to enter setup mode.

D. It displays the prompt for user exec mode.

E. It prompts for the location of the configuration file.

Answer: C

Questions 212. The following commands are entered on the router:

Burbank(config)# enable secret fortress

Burbank(config)# line con 0

Burbank(config-line)# login

Burbank(config-line)# password n0way1n

Burbank(config-line)# exit

Burbank(config)# service password-encryption

What is the purpose of the last command entered?

A. to require the user to enter an encrypted password during the login process

B. to prevent the vty, console, and enable passwords from being displayed in

plain text in the configuration files

C. to encrypt the enable secret password

D. to provide login encryption services between hosts attached to the router

Answer: B

Questions 213. Which IOS command results in the output shown in the

following?

--- System Configuration Dialog ---

At any point you may enter a question mark '?' for help.

Use ctrl-c to abort configuration dialog at any prompt.

Default settings are in square brackets '[]'.

Would you like to enter the initial configuration dialog? [yes/no]:

A. router# configure terminal

B. router# configure memory

C. router# copy running-config startup-config

D. router# copy startup-config running-config

E. router# setup

Answer: E

Questions 214. Which IOS command is used to initiate a login into a VTY

port on a remote router?

A. router# login

B. router# telnet

C. router# trace

D. router# ping

E. router(config)# line vty 0 5

F. router(config-line)# login

Answer: B

Questions 215. Which of the following are found in a TCP header, but not in

a UDP header? (Choose three.)

A. sequence number

B. acknowledgment number

C. source port

D. destination port

E. window size

F. checksum

Answer: A,B,E

Questions 216. What is the purpose of assigning an IP address to a switch?

A. provides local hosts with a default gateway address

B. allows remote management of the switch

C. allows the switch to respond to ARP requests between two hosts

D. ensures that hosts on the same LAN can communicate with each other

Answer: B

Questions 217. Refer to the topology and switching table shown in the

graphic. Host B sends a frame to Host

C.

What will the switch do with the frame?

A. drop the frame

B. send the frame out all ports except port 0/2

C. return the frame to Host B

D. send an ARP request for Host C

E. send an ICMP Host Unreachable message to Host B

F. record the destination MAC address in the switching table and send the

frame directly to Host C

Answer: B

Questions 218. From which IP address class can 15 bits be borrowed to

create subnets?

A. A

B. B

C. C

D. D

E. E

Answer: A

Questions 219. A small company has a Class C network address and needs to

create five subnets, each

accommodating 25 hosts. Which subnet mask needs to be configured?

A. 255.255.240.0

B. 255.255.255.128

C. 255.255.255.192

D. 255.255.255.224

E. 255.255.255.240

F. 255.255.255.248

Answer: D

Questions 220. Which IP addresses are valid public Class A host addresses?

Assume the default Class A subnet mask is in use. (Choose two.)

A. 10.154.16.87

B. 11.22.33.44

C. 68.95.255.100

D. 127.0.0.1

E. 128.16.89.72

F. 131.241.78.3

Answer: B,C http://www.testsnow.net/txt/1/1770/22231.html CCNA 640-802 Ver 22-09-2008 page13

QUESTION 121

Part of the Certkiller switched LAN is shown below:

Based on the information show above, which device will provide the spanning-treedesignated port role for the Certkiller network

segment that services the printers?

A. Switch Certkiller A

B. Hub Certkiller E

C. Switch Certkiller C

D. Switch Certkiller B

E. Switch Certkiller D

F. None of the switches will provide the designated port role

Answer: C

Explanation:

Designated port A designated port is one that has been determined as having the best (lowest) cost. A designated port will be

marked as a forwarding port.

QUESTION 122

The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched

network. What can be done to ensure that CK1 will always assume the role as the root bridge?

A. Assign the switch a higher MAC address than the other switches in the network have

B. Establish a direct link from the switch to all other switches in the network

C. Configure the switch full-duplex operation and configure the other switches for half-duplex operation

D. Configure the switch so that it has lower priority than other switches in the network

E. None of the above

Answer: D

Explanation:

Switch having lowest bridge ID will become the root bridge. The bridge ID is how STP keeps track of all the switches in the

network. It is determined by a combination of the bridge priority (32,768 by default on all Cisco switches) and the base MAC

address. The bridge with the lowest bridge ID becomes the root bridge in the network. To elect the desired switch as a root

bridge, set the bridge priority lowest than other switch.

QUESTION 123

Four Certkiller PCs connect to a single switch as shown below:

In the Certkiller network shown above, switch Certkiller 1 has just been restartedand has passed the POST routine. Host

Certkiller A (the one on the left) sends its initial frame to Host Certkiller C. What is the first thing the switch will do as regards to

populating the switching table?

A. Switch Certkiller 1 will add 192.168.23.12 to the switching table

B. Switch Certkiller 1 will add 192.168.23.4 to the switching table

C. Switch Certkiller 1 will add 000B.DB95.2EE9 to the switching table

D. Switch Certkiller 1 will add 000A.8A47.E612 to the switching table

E. None of the above

Answer: D

QUESTION 124

CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?

A. Broadcast frames are never sent to switches

B. A broadcast frame is never forwarded by a switch

C. Broadcasts only use network layer addressing

D. A broadcast address will never be the source address of a frame

E. Broadcast addresses use an incorrect format for the switching table

F. None of the above

Answer: D

Explanation:

There are three different address types:

* Unicast : One source to One destination

* Broadcast: One source to multiple destination

* Multicast: One source to multiple destination joined to group On unicast or broadcast or multicast communication, the source

address is always the unicast address but the destination address can be unicast, broadcast or multicast.

QUESTION 125

DRAG DROP

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in basic switch configurations.

Match the IOS command with theappropriate purpose.

Answer:

Explanation:

enable : This command is used to enter into User Privileges Mode

configure terminal: This command is used to enter into global configuration mode

hostname : This command is used to set the hostname of switch

ip default-gateway : This command should enter should enter on global configuration mode to set default gateway of switch.

Interface vlan 1 : Enters into the vlan 1 SVI (Switched Virtual Interface) configuration mode, where you can enter vlan 1 SVI

interface specific configuration

ip add x.x.x.x y.y.y.y : Use to assign the ip address on interface

no shutdown: Brings the interface on up state from administratively down state

QUESTION 126

A Certkiller LAN is displayed in the diagram below:

Host Certkiller B sends a frame to host Certkiller C. What will the switch do with the frame?

A. Drop the frame

B. Send the frame out all ports except port 0/2

C. Return the frame to host Certkiller B

D. Send an ARP request for host Certkiller C

E. Send an ICMP Host Unreachable message to Host Certkiller B

F. Record the destination MAC address in the switching table and send the frame directly to Host Certkiller C

Answer: B

Explanation:

QUESTION 127

The following was seen on a Certkiller switch.

Certkiller 1 receives the frame with the addressing shown. According to thecommand output shown in the exhibit, how will

Certkiller 1 handle this frame?

A. It will forward the frame out port Fa0/3 only.

B. It will drop the frame.

C. It will flood the frame out all ports except Fa0/3.

D. It will flood the frame out all ports.

Answer: C

Explanation:

Switches learn the MAC addresses of PCs or workstation the are connected to their switch ports by examining the source address

of frames that are received on that port. Machines may have been removed from a port ,turned off, or moved to another port on

the same switch or a different switch. This could cause confusion in frame forwarding the MAC address entry is automatically

discard or ages out after 300 seconds if there is not MAC address of destination host in MAC table, switch sends broadcast to

all ports except the source to find out the destination host. In the output there is no MAC address of the given host so the switch

will flood to all ports except the source port, which is port fa 0/3.

QUESTION 128

Refer to the topology and MAC address table shown in the exhibit:

Host Certkiller A sends a data frame to host Certkiller D. What will the Certkiller 1 switch do when it receives the frame from

host A?

A. The Certkiller 1 switch will flood the frame out of all ports except for port Fa0/3.

B. The Certkiller 1 switch will discard the frame and send an error message back to host Certkiller A.

C. The Certkiller 1 switch will add the destination address of the frame to the MAC address table and forward the frame to host

D.

D. The Certkiller 1 switch will add the source address and port to the MAC address table and forward the frame to host Certkiller

D.

E. None of the above

Answer: D

Explanation:

When switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC

address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in it's

table for the destination, as it is in this case, it will forward the frame directly to the destination port. If it was not already in it's

MAC table, then they frame would have been flooded out all ports except for the port that it came from.

QUESTION 129

Switch Certkiller A receives the frame with the addressing shown in the exhibit.

According to the command output also shown in the exhibit, how will Switch Certkiller A handle this frame?

A. It will flood the frame out all ports except Fa0/3.

B. It will forward the frame out port Fa0/3 only.

C. It will flood the frame out all ports.

D. It will forward the frame out port Fa0/6 only.

E. It will drop the frame.

F. None of the above

Answer: D

Explanation:

When frame receives the frame, it checks the source address on MAC table if MACaddress found in MAC table it tries to

forward if not in MAC table adds the Address on MAC table. After checking the source address, it checks the destination address

on MAC table, if MAC address found on MAC table it forwards to proper ports otherwise floods on all ports except the source

port. In this case, the MAC address shown is already in the table so it will be forwarded directly.

QUESTION 130

Please study the exhibit shown below carefully.

Why does the switch have two MAC addresses assigned to the FastEthernet 0/1 port in the switch address table?

A. Either Host3 or Host4 has just had the NIC replaced.

B. Data from Host3 and Host4 has been received by switch port FastEthernet 0/1.

C. Host3 and Host4 are on two different VLANs.

D. Data from two of the devices connected to the switch has been sent to Host3.

E. None of the above

Answer: B

Explanation:

Switches learn the MAC addresses of PCs or workstations that are connected to their switch ports by examining the source

address of frames that are received on that port. When more than one device is attached to a switch port, such as via the use of a

hub as shown in this example, the switch will retain the MAC address of each of the known devices on that port

CCNA 200-120

QUESTION 1

Refer to the exhibit.

Host A pings interface S0/0 on router 3. What is the TTL value for that ping?

A. 252

B. 253*

C. 254

D. 255

Correct Answer: B

QUESTION 2

Which command can be used from a PC to verify the connectivity between hosts that connect

through a switch in the same LAN?

A. ping address*

B. tracert address

C. traceroute address

D. arp address

Correct Answer: A

QUESTION 3

An administrator must assign static IP addresses to the servers in a network. For network

192.168.20.24/29, the router is assigned the first usable host address while the sales server is given

the last usable host address. Which of the following should be entered into the IP properties box for

the sales server?

A. IP address: 192.168.20.14

Subnet Mask: 255.255.255.248

Default Gateway: 192.168.20.9

B. IP address: 192.168.20.254

Subnet Mask: 255.255.255.0

Default Gateway: 192.168.20.1

C. IP address: 192.168.20.30

Subnet Mask: 255.255.255.248

Default Gateway: 192.168.20.25**************

D. IP address: 192.168.20.30

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.20.17

E. IP address: 192.168.20.30

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.20.25

Correct Answer: C

QUESTION 4

Which subnet mask would be appropriate for a network address range to be subnetted for up to eight

LANs, with each LAN containing 5 to 26 hosts?

A. 0.0.0.240

B. 255.255.255.252

C. 255.255.255.0

D. 255.255.255.224*

E. 255.255.255.240

Correct Answer: D

QUESTION 5

A national retail chain needs to design an IP addressing scheme to support a nationwide network. The

company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per

subnet. Working with only one Class B address, which of the following subnet masks will support an

appropriate addressing scheme? (Choose two.)

A. 255.255.255.0

B. 255.255.255.128*

C. 255.255.252.0

D. 255.255.255.224

E. 255.255.255.192*

F. 255.255.248.0

Correct Answer: BE

QUESTION 6

When a DHCP server is configured, which two IP addresses should never be assignable to hosts?

(Choose two.)

A. network or subnetwork IP address*

B. broadcast address on the network*

C. IP address leased to the LAN

D. IP address used by the interfaces

E. manually assigned address to the clients

F. designated IP address to the DHCP server

Correct Answer: AB

QUESTION 7

What will happen if a private IP address is assigned to a public interface connected to an ISP?

A. Addresses in a private range will be not routed on the Internet backbone.*

B. Only the ISP router will have the capability to access the public network.

C. The NAT process will be used to translate this address in a valid IP address.

D. Several automated methods will be necessary on the private network.

E. A conflict of IP addresses happens, because other public routers can use the same range.

Correct Answer: A

QUESTION 8

Refer to the exhibit.

An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI

layer is the problem?

A. data link layer

B. application layer

C. access layer

D. session layer

E. network layer*

Correct Answer: E

QUESTION 9

Refer to the exhibit. A new subnet with 60 hosts has been added to the network. Which subnet

address should this network use to provide enough usable addresses while wasting the fewest

addresses?

A. 192.168.1.56/27

B. 192.168.1.64/26*

C. 192.168.1.64/27

D. 192.168.1.56/26

Correct Answer: B

QUESTION 10

Refer to the exhibit.

All of the routers in the network are configured with the ip subnet-zero command. Which network

addresses should be used for Link A and Network A? (Choose two.)

A. Network A – 172.16.3.48/26

B. Network A – 172.16.3.128/25*

C. Network A – 172.16.3.192/26

D. Link A – 172.16.3.0/30*

E. Link A – 172.16.3.40/30

F. Link A – 172.16.3.112/30

Correct Answer: BD

QUESTION 11

Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with

the least amount of wasted addresses?

A. 255.255.255.0

B. 255.255.254.0*

C. 255.255.252.0

D. 255.255.248.0

Correct Answer: B

QUESTION 12

Refer to the exhibit. What is the most appropriate summarization for these routes?

A. 10.0.0.0 /21

B. 10.0.0.0 /22*

C. 10.0.0.0 /23

D. 10.0.0.0 /24

Correct Answer: B

QUESTION 13

Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network

address?

A. 172.16.16.0*

B. 172.16.24.0

C. 172.16.0.0

D. 172.16.28.0

Correct Answer: A

QUESTION 14

You are working in a data center environment and are assigned the address range 10.188.31.0/23.

You are asked to develop an IP addressing plan to allow the maximum number of subnets with as

many as 30 hosts each. Which IP address range meets these requirements?

A. 10.188.31.0/27*

B. 10.188.31.0/26

C. 10.188.31.0/29

D. 10.188.31.0/28

E. 10.188.31.0/25

Correct Answer: A

QUESTION 15

The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol

in use on the network and subnet 0 is not being used. What is the maximum number of usable IP

addresses that can be supported on each LAN if the organization is using one class C address block?

A. 8

B. 6

C. 30*

D. 32

E. 14

F. 16

Correct Answer: C

QUESTION 16

Refer to the exhibit. The networks connected to router R2 have been summarized as a

192.168.176.0/21 route and sent to R1. Which two packet destination addresses will R1 forward to

R2? (Choose two.)

A. 192.168.194.160

B. 192.168.183.41*

C. 192.168.159.2

D. 192.168.183.255

E. 192.168.179.4*

F. 192.168.184.45

Correct Answer: BE

CCNA 2 v5.02 R&S Essentials Final Exam 2016

Last update Feb. 2016

1.

What are two features of a link-state routing protocol? (Choose two.)

The database information for each router is obtained from the same source.

Routers send triggered updates in response to a change.

Routers create a topology of the network by using information from other routers.

Paths are chosen based on the lowest number of hops to the designated router.

Routers send periodic updates only to neighboring routers.

2.

Fill in the blank.

In IPv6, all routes are level ” 1 ” ultimate routes.

3.

Which switching method drops frames that fail the FCS check?

ingress port buffering

cut-through switching

store-and-forward switching

borderless switching

4.

Which summary IPv6 static route statement can be configured to summarize only the routes to

networks 2001:db8:cafe::/58 through 2001:db8:cafe:c0::/58?

ipv6 route 2001:db8:cafe::/54 S0/0/0

ipv6 route 2001:db8:cafe::/60 S0/0/0

ipv6 route 2001:db8:cafe::/62 S0/0/0

ipv6 route 2001:db8:cafe::/56 S0/0/0

5.

1

3

4

2

6.

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic

switched to by default?

data VLAN ID

native VLAN ID

unused VLAN ID

management VLAN ID

7.

A college marketing department has a networked storage device that uses the IP address 10.18.7.5,

TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT

on the router that connects to the Internet. The router interface has the public IP address of

209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from

209.165.200.228-236. Which configuration would the network administrator add to allow this device

to be accessed by the marketing personnel from home?

ip nat pool mktv 10.18.7.5 10.18.7.5

ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443

ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 4365

ip nat inside source static tcp 209.165.200.225 443 10.18.7.5 443

ip nat inside source static udp 209.165.200.225 4365 10.18.7.5 4365

No additional configuration is necessary.

ip nat outside source static 10.18.7.5 209.165.200.225

8.

Which statement describes a route that has been learned dynamically?

It is automatically updated and maintained by routing protocols.

It is unaffected by changes in the topology of the network.

It has an administrative distance of 1.

It is identified by the prefix C in the routing table.

9.

A network administrator is explaining to a junior colleague the use of the lt and gt keywords when

filtering packets using an extended ACL. Where would the lt or gt keywords be used?

in an IPv6 extended ACL that stops packets going to one specific destination VLAN

in an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific

network device

in an IPv4 named standard ACL that has specific UDP protocols that are allowed to be used on a

specific server

in an IPv6 named ACL that permits FTP traffic from one particular LAN getting to another LAN

10

Refer to the exhibit. How did the router obtain the last route that is shown?

The ip address interface configuration mode command was used in addition to the network routing

protocol configuration mode command.

The ipv6 route command was used.

the ip route command was used.

Another router in the same organization provided the default route by using a dynamic routing

protocol.

11

Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router for Internet

connectivity. Which two configurations would be applied to the switch? (Choose two.)

(config)# interface gigabitethernet 1/1

(config-if)# no switchport

(config-if)# ip address 192.168.1.2 255.255.255.252

(config)# interface vlan 1

(config-if)# ip address 192.168.1.2 255.255.255.0

(config-if)# no shutdown

(config)# interface gigabitethernet1/1

(config-if)# switchport mode trunk

(config)# interface fastethernet0/4

(config-if)# switchport mode trunk

(config)# ip routing

12.

A network contains multiple VLANs spanning multiple switches. What happens when a device in

VLAN 20 sends a broadcast Ethernet frame?

Only devices in VLAN 20 see the frame.

Devices in VLAN 20 and the management VLAN see the frame.

Only devices that are connected to the local switch see the frame.

All devices in all VLANs see the frame.

13

the correct answer of question 13 is

1- Each router learns about its own directly connected networks.

2- Each router is responsible for “saying hello” to its neighbors on directly connected networks.

3- Each router builds a Link-State Packet (LSP) containing the state of each directly connected link

4- Each router floods the LSP to all neighbors, who then store all LSPs received in a database

5- Each router uses the database to construct a complete map of the topology and computes the best

14.

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose

two.)

computer type

source TCP hello address

ICMP message type

destination UDP port number

destination MAC address

15

Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224

255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach

resources on the Internet. How should this static route be changed to allow user traffic from the LAN

to reach the Internet?

Add an administrative distance of 254.

Change the destination network and mask to 0.0.0.0 0.0.0.0

Change the exit interface to S0/0/1.

Add the next-hop neighbor address of 209.165.200.226.

16.

How is the router ID for an OSPFv3 router determined?

the highest IPv6 address on an active interface

the highest EUI-64 ID on an active interface

the highest IPv4 address on an active interface

the lowest MAC address on an active interface

17.

Two employees in the Sales department work different shifts with their laptop computers and share

the same Ethernet port in the office. Which set of commands would allow only these two laptops to

use the Ethernet port and create violation log entry without shutting down the port if a violation

occurs?

switchport mode access

switchport port-security

switchport mode access

switchport port-security

switchport port-security maximum 2

switchport port-security mac-address sticky

switchport port-security violation restrict

switchport mode access

switchport port-security maximum 2

switchport port-security mac-address sticky

switchport mode access

switchport port-security maximum 2

switchport port-security mac-address sticky

switchport port-security violation protect

18.

Which two factors are important when deciding which interior gateway routing protocol to use?

(Choose two.)

speed of convergence

scalability

ISP selection

the autonomous system that is used

campus backbone architecture

19

ultimate route

child route

default route

level 1 parent route

20.

What caused the following error message to appear?

01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-

disable state

01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by

MAC address 0011.a0d4.12a0 on port FastEthernet0/8.

01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to

down

01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down

An unauthorized user tried to telnet to the switch through switch port Fa0/8.

NAT was enabled on a router, and a private IP address arrived on switch port Fa0/8.

Port security was enabled on the switch port, and an unauthorized connection was made on switch

port Fa0/8.

Another switch was connected to this switch port with the wrong cable.

A host with an invalid IP address was connected to a switch port that was previously unused.

21.

Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)

In a switched network, they are mostly configured between switches at the core and distribution

layers.*

They support subinterfaces, like interfaces on the Cisco IOS routers.

The interface vlan command has to be entered to create a VLAN on routed ports.

They are used for point-to-multipoint links.

They are not associated with a particular VLAN.*

22.

A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is

automatically added implicitly at the end of an ACL so that two adjacent routers can discover each

other?

permit ip any host ip_address

permit icmp any any nd-na

permit ip any any

deny ip any any

23

24.

What does the cost of an OSPF link indicate?

A lower cost indicates a better path to the destination than a higher cost does.

Cost equals bandwidth.

A higher cost for an OSPF link indicates a faster path to the destination.

Link cost indicates a proportion of the accumulated value of the route to the destination.

25

Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface

numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print

to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What

interface and in what direction should you place a standard ACL that allows printing to P1 from data

VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)

outbound

R2 S0/0/1

R1 S0/0/0

inbound

R1 Gi0/1.12

R2 Gi0/1.20

26.

On a switch that is configured with multiple VLANs, which command will remove only VLAN 100

from the switch?

Switch(config)# no vlan 100

Switch(config-if)# no switchport access vlan 100

Switch(config-if)# no switchport trunk allowed vlan 100

Switch# delete flash:vlan.dat

27.

A router needs to be configured to route within OSPF area 0. Which two commands are required to

accomplish this? (Choose two.)

RouterA(config-router)# network 192.168.2.0 255.255.255.0 0

RouterA(config-router)# network 192.168.2.0 0.0.0.255 0

RouterA(config)# router ospf 1

RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0

RouterA(config)# router ospf 0

28.

What is a function of the distribution layer?

interconnection of large-scale networks in wiring closets

network access to the user

fault isolation

high-speed backbone connectivity

29.

A small-sized company has 20 workstations and 2 servers. The company has been assigned a group

of IPv4 addresses 209.165.200.224/29 from its ISP. What technology should the company implement

in order to allow the workstations to access the services over the Internet?

static NAT

dynamic NAT

port address translation

DHCP

30.

Which three requirements are necessary for two OSPFv2 routers to form an adjacency? (Choose

three.)

The link interface subnet masks must match.

The two routers must include the inter-router link network in an OSPFv2 network command.

The OSPFv2 process ID must be the same on each router.

The OSPF hello or dead timers on each router must match.

The OSPFv2 process is enabled on the interface by entering the ospf process area-id command.

The link interface on each router must be configured with a link-local address.

31.

Which three pieces of information does a link-state routing protocol use initially as link-state

information for locally connected links? (Choose three.)

the cost of that link

the type of network link

the link bandwidth

the link next-hop IP address

the link router interface IP address and subnet mask

32.

What is a disadvantage of NAT?

The internal hosts have to use a single public IPv4 address for external communication.

There is no end-to-end addressing.

The costs of readdressing hosts can be significant for a publicly addressed network.

The router does not need to alter the checksum of the IPv4 packets.

33

Refer to the exhibit. The partial configuration that is shown was used to configure router on a stick

for VLANS 10, 30, and 50. However, testing shows that there are some connectivity problems

between the VLANs. Which configuration error is causing this problem?

There is no IP address configured for the FastEthernet 0/0 interface.

A configuration for the native VLAN is missing.

The wrong VLAN has been configured on subinterface Fa0/0.50.

The VLAN IP addresses should belong to the same subnet.

34

Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4

address. What is the problem?

R1 is not configured as a DHCPv4 server.

A DHCP server must be installed on the same LAN as the host that is receiving the IP address.

The ip address dhcp command was not issued on the interface Gi0/1.

The ip helper-address command was applied on the wrong interface.

35.

What best describes the operation of distance vector routing protocols?

They use hop count as their only metric.

They send their routing tables to directly connected neighbors.

They flood the entire network with routing updates.

They only send out updates when a new network is added.

36.

A network administrator is using the router-on-a-stick method to configure inter-VLAN routing.

Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this

port for the task?

Switch(config)# interface gigabitethernet 1/1

Switch(config-if)# spanning-tree vlan 1

Switch(config)# interface gigabitethernet 1/1

Switch(config-if)# spanning-tree portfast

Switch(config)# interface gigabitethernet 1/1

Switch(config-if)# switchport mode trunk

Switch(config)# interface gigabitethernet 1/1

Switch(config-if)# switchport access vlan 1

37.

Which three advantages are provided by static routing? (Choose three.)

The path a static route uses to send data is known.

No intervention is required to maintain changing route information.

Static routing does not advertise over the network, thus providing better security.

Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing

does.

Configuration of static routes is error-free.

Static routes scale well as the network grows.

38.

When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the

crypto key generate rsa command?

show active SSH ports on the switch

disconnect SSH connected hosts

create a public and private key pair

show SSH connected hosts

access the SSH database configuration

39.

Which information does a switch use to populate the MAC address table?

the destination MAC address and the outgoing port

the source MAC address and the incoming port

the source and destination MAC addresses and the incoming port

the source MAC address and the outgoing port

the source and destination MAC addresses and the outgoing port

the destination MAC address and the incoming port

40

Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The

administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement

explains the reason that the number of active clients is 0?

The IPv6 DHCP pool configuration has no IPv6 address range specified.

The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

The default gateway address is not provided in the pool.

No clients have communicated with the DHCPv6 server yet.

41.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

What is the problem preventing PC0 and PC1 from communicating with PC2 and PC3?

The routers are using different OSPF process IDs.

The serial interfaces of the routers are in different subnets.

No router ID has been configured on the routers.

The gigabit interfaces are passive.

42

Which command will create a static route on R2 in order to reach PC B?

R1(config)# ip route 172.16.2.0 255.255.255.0 172.16.2.254

R1(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

R1(config)# ip route 172.16.2.1 255.255.255.0 172.16.3.1

R1(config)# ip route 172.16.3.0 255.255.255.0 172.16.2.254

43.

Which problem is evident if the show ip interface command shows that the interface is down and the

line protocol is down?

The no shutdown command has not been issued on the interface.

There is an IP address conflict with the configured address on the interface.

A cable has not been attached to the port.

An encapsulation mismatch has occurred.

44.

Which three values or sets of values are included when creating an extended access control list entry?

(Choose three.)

access list number between 100 and 199

source subnet mask and wildcard mask

default gateway address and wildcard mask

source address and wildcard mask

destination subnet mask and wildcard mask

access list number between 1 and 99

destination address and wildcard mask

45.

A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25,

192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard

mask, if any, is the most efficient to use when specifying all of these networks in a single ACL

permit entry?

0.0.0.127

0.0.0.255

0.0.1.255

0.0.255.255

A single ACL command and wildcard mask should not be used to specify these particular networks

or other traffic will be permitted or denied and present a security risk.

46.

Which kind of message is sent by a DHCP client when its IP address lease has expired?

a DHCPREQUEST unicast message

a DHCPREQUEST broadcast message

a DHCPDISCOVER broadcast message

a DHCPDISCOVER unicast message

47.

What happens immediately after two OSPF routers have exchanged hello packets and have formed a

neighbor adjacency?

They request more information about their databases.

They negotiate the election process if they are on a multiaccess network.

They exchange DBD packets in order to advertise parameters such as hello and dead intervals.

They exchange abbreviated lists of their LSDBs

48.

What benefit does NAT64 provide?

It allows sites to use private IPv4 addresses, and thus hides the internal addressing structure from

hosts on public IPv4 networks.

It allows sites to connect multiple IPv4 hosts to the Internet via the use of a single public IPv4

address.

It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4

addresses.

It allows sites to use private IPv6 addresses and translates them to global IPv6 addresses.

49.

What is the purpose of setting the native VLAN separate from data VLANs?

The native VLAN is for routers and switches to exchange their management information, so it should

be different from data VLANs.

A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth

contention on data VLANs.

The native VLAN is for carrying VLAN management traffic only.

The security of management frames that are carried in the native VLAN can be enhanced

50.

Which command, when issued in the interface configuration mode of a router, enables the interface

to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?

ip helper-address

ip address dhcp

ip dhcp pool

service dhcp

51.

Which statement is correct about IPv6 routing?

IPv6 routing is enabled by default on Cisco routers.

IPv6 routes appear in the same routing table as IPv4 routes.

IPv6 uses the link-local address of neighbors as the next-hop address for dynamic routes.

IPv6 only supports the OSPF and EIGRP routing protocols

52.

A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command

will implement a backup floating static route to this network?

ip route 172.16.32.0 255.255.0.0 S0/0/0 100

ip route 172.16.32.0 255.255.224.0 S0/0/0 200

ip route 172.16.0.0 255.255.240.0 S0/0/0 200

ip route 172.16.0.0 255.255.224.0 S0/0/0 100

53

Refer to the exhibit. How many broadcast and collision domains exist in the topology?

5 broadcast domains and 11 collision domains

10 broadcast domains and 5 collision domains

16 broadcast domains and 11 collision domains

5 broadcast domains and 10 collision domains

54.

Which two commands can be used to verify the content and placement of access control lists?

(Choose two.)

show processes

show cdp neighbor

show access-lists

show ip route

show running-config

55.

Which type of traffic would most likely have problems when passing through a NAT device?

IPsec

DNS

Telnet

HTTP

ICMP

56.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Which keyword is displayed on the web browser?

NAT works!

Goodjob!

Welldone!

NAT configured!

57

Refer to the exhibit.

What summary static address would be configured on R1 to advertise to R3?

192.168.0.0/24

192.168.0.0/23

192.168.0.0/22

192.168.0.0/21

58

Fill in the blank.

Static routes are configured by the use of the ” ip route” global configuration command.

NEW QUESTIONS

59. A network technician has been asked to secure all switches in the campus network. The security

requirements are for each switch to automatically learn and add MAC addresses to both the address

table and the running configuration. Which port security configuration will meet these requirements?

auto secure MAC addresses

dynamic secure MAC addresses

static secure MAC addresses

sticky secure MAC addresses

60. Which three pairs of trunking modes will establish a functional trunk link between two Cisco

switches? (Choose three.)

dynamic desirable – dynamic auto*

dynamic auto – dynamic auto

access – dynamic auto

dynamic desirable – dynamic desirable*

access – trunk

dynamic desirable – trunk*

61. Fill in the blank.

The OSPF Type 1 packet is the _________ packet.

ANS: hello

62. Which value represents the “trustworthiness” of a route and is used to determine which route to

install into the routing table when there are multiple routes toward the same destination?

routing protocol

outgoing interface

metric

administrative distance*

63. Refer to the exhibit. What is the OSPF cost to reach the R2 LAN 172.16.2.0/24 from R1?

782

74

128

65

64. Fill in the blank.

The default administrative distance for a static route is .

ANS: 1

65. Fill in the blank.

Static routes are configured by the use of the global configuration command.

ANS: ip route

66. Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies,

which routers will become the new DR and BDR?

Router R3 will become the DR and router R1 will become the BDR.

Router R1 will become the DR and router R2 will become the BDR.

Router R4 will become the DR and router R3 will become the BDR.*

Router R1 will become the DR and router R2 will become the BDR.

67. What is the purpose of an access list that is created as part of configuring IP address translation?

The access list permits or denies specific addresses from entering the device doing the translation.

The access list defines the private IP addresses that are to be translated.*

The access list prevents external devices from being a part of the address translation.

The access list defines the valid public addresses for the NAT or PAT pool.

68. The computers used by the network administrators for a school are on the 10.7.0.0/27 network.

Which two commands are needed at a minimum to apply an ACL that will ensure that only devices

that are used by the network administrators will be allowed Telnet access to the routers? (Choose

two.)

-ip access-group 5 out

-access-list standard VTY

permit 10.7.0.0 0.0.0.127

-access-list 5 deny any

-access-list 5 permit 10.7.0.0 0.0.0.31*

-ip access-group 5 in

-access-class 5 in*

69. While analyzing log files, a network administrator notices reoccurring native VLAN mismatches.

What is the effect of these reoccurring errors?

The control and management traffic on the error-occurring trunk port is being misdirected or

dropped.*

Unexpected traffic on the error-occurring trunk port is being received.

All traffic on the error-occurring trunk port is being misdirected or dropped.

All traffic on the error-occurring trunk port is being switched correctly regardless of the error.

70. Which two characteristics describe the native VLAN? (Choose two.)

This VLAN is necessary for remote management of a switch.

Designed to carry traffic that is generated by users, this type of VLAN is also known as the default

VLAN.

The native VLAN provides a common identifier to both ends of a trunk.*

The native VLAN traffic will be untagged across the trunk link.*

High priority traffic, such as voice traffic, uses the native VLAN.

71. Refer to the exhibit. The Branch Router has an OSPF neighbor relationship with the HQ router

over the 198.51.0.4/30 network. The 198.51.0.8/30 network link should serve as a backup when the

OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/1/1 100 was

issued on Branch and now traffic is using the backup link even when the OSPF link is up and

functioning. Which change should be made to the static route command so that traffic will only use

the OSPF link when it is up?

Add the next hop neighbor address of 198.51.0.8.

Change the administrative distance to 1.

Change the destination network to 198.51.0.5.

Change the administrative distance to 120.*

72. Refer to the exhibit. An attacker on PC X sends a frame with two 802.1Q tags on it, one for

VLAN 40 and another for VLAN 12. What will happen to this frame?

SW-A will drop the frame because it is invalid.

SW-A will leave both tags on the frame and send it to SW-B, which will forward it to hosts on

VLAN 40.

SW-A will remove both tags and forward the rest of the frame across the trunk link, where SW-B

will forward the frame to hosts on VLAN 40.*

SW-A will remove the outer tag and send the rest of the frame across the trunk link, where SW-B

will forward the frame to hosts on VLAN 12.

73. Which statement is true about the difference between OSPFv2 and OSPFv3?

OSPFv3 routers use a different metric than OSPFv2 routers use.

OSPFv3 routers do not need to elect a DR on multiaccess segments.

OSPFv3 routers do not need to have matching subnets to form neighbor adjacencies.*

OSPFv3 routers use a 128 bit router ID instead of a 32 bit ID.

74. What are two ways of turning off DTP on a trunk link between switches? (Choose two.)

Change the native VLAN on both ports.

Configure attached switch ports with the nonegotiate command option.*

Configure attached switch ports with the dynamic desirable command option.

Configure one port with the dynamic auto command option and the opposite attached switch port

with the dynamic desirable command option.

Place the two attached switch ports in access mode.*

75. Why would an administrator use a network security auditing tool to flood the switch MAC

address table with fictitious MAC addresses?

to determine if the switch is forwarding the broadcast traffic correctly

to determine which ports are functioning

to determine which ports are not correctly configured to prevent MAC address flooding*

to determine when the CAM table size needs to be increased in order to prevent overflows

76. A new network policy requires an ACL to deny HTTP access from all guests to a web server at

the main office. All guests use addressing from the IPv6 subnet 2001:DB8:19:C::/64. The web server

is configured with the address 2001:DB8:19:A::105/64. Implementing the NoWeb ACL on the

interface for the guest LAN requires which three commands? (Choose three.)

permit tcp any host 2001:DB8:19:A::105 eq 80

deny tcp host 2001:DB8:19:A::105 any eq 80

deny tcp any host 2001:DB8:19:A::105 eq 80*

permit ipv6 any any*

deny ipv6 any any

ipv6 traffic-filter NoWeb in

ip access-group NoWeb in

77. An OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and

172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to

neighbors?

router(config-router)# network 172.16.1.0 0.0.255.255 area 0*

router(config-router)# network 172.16.0.0 0.0.15.255 area 0

router(config-router)# network 172.16.1.0 255.255.255.0 area 0

router(config-router)# network 172.16.1.0 0.0.0.0 area 0

78. Refer to the exhibit. Which type of route is 172.16.0.0/16?

child route

level 1 parent route

default route

ultimate route

79. Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

fully specified static route

recursive static route*

directly attached static route

floating static route

80. Which subnet mask would be used as the classful mask for the IP address 192.135.250.27?

255.0.0.0

255.255.0.0

255.255.255.0*

255.255.255.224

81. Which subnet mask would be used as the classful mask for the IP address 128.107.52.27?

255.0.0.0

255.255.0.0*

255.255.255.0

255.255.255.224

82. Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a

trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are

being implemented?

1

5

8

20

25

30

83. The buffers for packet processing and the running configuration file are temporarily stored in

which type of router memory?

Flash

NVRAM

RAM*

ROM

84. A network technician is configuring port security on switches. The interfaces on the switches are

configured in such a way that when a violation occurs, packets with unknown source address are

dropped and no notification is sent. Which violation mode is configured on the interfaces?

off

restrict

protect*

shutdown

85. A standard ACL has been configured on a router to allow only clients from the 10.11.110.0/24

network to telnet or to ssh to the VTY lines of the router. Which command will correctly apply this

ACL?

access-group 11 in*

access-class 11 in

access-list 11 in

access-list 110 in

86. Refer to the exhibit.

What address will summarize the LANs attached to routers 2-A and 3-A and can be configured in a

summary static route to advertise them to an upstream neighbor?

10.0.0.0/24

10.0.0.0/23

10.0.0.0/22

10.0.0.0/21*

87. A security specialist designs an ACL to deny access to a web server from all sales staff. The sales

staff are assigned addressing from the IPv6 subnet 2001:db8:48:2c::/64. The web server is assigned

the address 2001:db8:48:1c::50/64. Configuring the WebFilter ACL on the LAN interface for the

sales staff will require which three commands? (Choose three.)

permit tcp any host 2001:db8:48:1c::50 eq 80

deny tcp host 2001:db8:48:1c::50 any eq 80*

deny tcp any host 2001:db8:48:1c::50 eq 80*

permit ipv6 any any

deny ipv6 any any*

ip access-group WebFilter in

ipv6 traffic-filter WebFilter in

88. To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64

was entered by the network administrator. What address, if any, appears in the running configuration

file to identify this network?

192.168.5.64

192.168.5.0*

192.168.0.0

No address is displayed.

89. Refer to the exhibit. An ACL preventing FTP and HTTP access to the interval web server from

all teaching assistants has been implemented in the Board Office. The address of the web server is

172.20.1.100 and all teaching assistants are assigned addresses in the 172.21.1.0/24 network. After

implement the ACL, access to all servers is denied. What is the problem?

inbound ACLs must be routed before they are processed

the ACL is implicitly denying access to all the servers

**named ACLs requite the use of port numbers**

the ACL is applied to the interface using the wrong direction

90. Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are

needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?

1

2

3

4

5

6

91. a router learns of multiple toward the same destination. Which value in a routing table replesents

the trustworthiness of learned routes and is used by the router to determine which route to install into

the routing table for specific situation?

answer : metric*

92. What is the minimum configuration for a router interface that is participating in IPv6 routing?

to have only a link-local IPv6 address*

93. Which two statements are true about half-duplex and full-duplex communications? (Choose two.)

Full duplex offers 100 percent potential use of the bandwidth.*

Full duplex allows both ends to transmit and receive simultaneously.*

94. Fill in the blank.

The acronym describes the type of traffic that has strict QoS requirements and utilizes a one-way

overall delay less than 150 ms across the network.

VoIP*

95. Which two commands should be implemented to return a Cisco 3560 trunk port to its default

configuration? (Choose two.)

S1(config-if)# no switchport trunk native vlan*

S1(config-if)# no switchport trunk allowed vlan*

96. Which command will enable auto-MDIX on a device?

S1(config-if)# mdix auto *

97. What is the effect of issuing the passive-interface default command on a router that is configured

for OSPF?

It prevents OSPF messages from being sent out any OSPF-enabled interface.*

98. A network administrator is implementing a distance vector routing protocol between neighbors

on the network. In the context of distance vector protocols, what is a neighbor?

routers that share a link and use the same routing protocol*

99. Refer to the exhibit. A network administrator has just configured address translation and is

verifying the configuration. What three things can the administrator verify? (Choose three.)

1. The name of the NAT pool is refCount.*

2. A standard access list numbered 1 was used as part of the configuration process.*

3. Address translation is working.*

100. Match the router memory type that provides the primary storage for the router feature. (Not all

options are used.)

A. flash

B. NVRAM

C. RAM

D. ROM

console access

full operating system > flash

limited operating system > ROM

routing table > RAM

startup configuration file > NVRAM

101. Match the order in which the link-state routing process occurs on a router. (Not all options are

used.)

A. step 1

B. step 2

C. step 3

D. step 4

E. step 5

Each router is responsible for “saying hello” to its neighbors on directly connected networks. > step 2

Each router builds a Link-State Packet (LSP) containing the state of each directly connected link

> step 3

Each router learns about its own directly connected networks. > step 1

Each router increments the hop count for the destination network.

Each router floods the LSP to all neighbors, who then store all LSPs received in a database > step 4

Each router uses the database to construct a complete map of the topology and computes the best

> step 5

102. Which two methods can be used to provide secure management access to a Cisco switch?

(Choose two.)

Configure specific ports for management traffic on a specific VLAN.*

Configure SSH for remote management.*

103. Refer to the exhibit. Which highlighted value represents a specific destination network in the

routing table?

0.0.0.0

10.16.100.128

10.16.100.2

110

791

104. Refer to the exhibit. An ACL preventing FTP and HTTP access to the internal web server from

all teaching assistants has been implemented in the Board office. The address of the web server is

172.20.1.100 and all teaching assistants are assigned addresses in the 172.21.1.0/24 network. After

implementing the ACL, access to all servers is denied. What is the problem?

Inbound ACLs must be routed before they are processed.

The ACL is implicitly denying access to all the servers.

Named ACLs require the use of port numbers.

The ACL is applied to the interface using the wrong direction.

105. Refer to the exhibit. If RIPng is enabled, how many hops away does R1 consider the

2001:0DB8:ACAD:1::/64 network to be?

1

4

2

3

106. Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP

addresses on the packet when it arrives at host B?

Source MAC: 00E0.FE91.7799

Source IP: 10.1.1.1

Source MAC: 00E0.FE10.17A3

Source IP: 10.1.1.10

Source MAC: 00E0.FE91.7799

Source IP: 192.168.1.1

Source MAC: 00E0.FE10.17A3

Source IP: 192.168.1.1

Source MAC: 00E0.FE91.7799

Source IP: 10.1.1.10

107. Which network design may be recommended for a small campus site that consists of a single

building with a few users?

a network design where the access and distribution layers are collapsed into a single layer

a network design where the access and core layers are collapsed into a single layer

a collapsed core network design

a three-tier campus network design where the access, distribution, and core are all separate layers,

each one with very specific functions

108. Refer to the exhibit. The network administrator needs as many switch ports as possible for end

devices and the business is using the most common type of inter-VLAN method. What type of inter-

VLAN interconnectivity is best to use between the switch and the router if R1 routes for all VLANs?

one link between the switch and the router with the router using three router subinterfaces

one link between the switch and the router with the one switch port being configured in access mode

three links between the switch and the router with the three switch ports being configured in access

mode

two links between the switch and the router with the two switch ports being configured in access

mode

109. Which type of router memory temporarily stores the running configuration file and ARP table?

flash

NVRAM

RAM

ROM

110. A network administrator is configuring port security on a Cisco switch. The company security

policy specifies that when a violation occurs, packets with unknown source addresses should be

dropped and no notification should be sent. Which violation mode should be configured on the

interfaces?

off

restrict

protect

shutdown

111. A network administrator is configuring an ACL with the command access-list 10 permit

172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?

172.16.20.2

172.16.26.254

172.16.47.254

172.16.48.5

112. What are two reasons that will prevent two routers from forming an OSPFv2 adjacency?

(Choose two.)

mismatched subnet masks on the link interfaces

a mismatched Cisco IOS version that is used

use of private IP addresses on the link interfaces

one router connecting to a FastEthernet port on the switch and the other connecting to a

GigabitEthernet port

mismatched OSPF Hello or Dead timers

113. Which three addresses could be used as the destination address for OSPFv3 messages? (Choose

three.)

FF02::5

FF02::6

FF02::A

2001:db8:cafe::1

FF02::1:2

FE80::1

114. Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?

65*

115. The network address 172.18.9.128 with netmask 255.255.255.128 is matched by which wildcard

mask?

0.0.0.31

0.0.0.255

0.0.0.127*

0.0.0.63

116. As part of the new security policy, all switches on the network are configured to automatically

learn MAC addresses for each port. All running configurations are saved at the start and close of

every business day. A severe thunderstorm causes an extended power outage several hours after the

close of business. When the switches are brought back online, the dynamically learned MAC

addresses are retained. Which port security configuration enabled this?

auto secure MAC addresses

dynamic secure MAC addresses

static secure MAC addresses

sticky secure MAC addresses

117. Refer to the exhibit. A small business uses VLANs 2, 3, 4, and 5 between two switches that

have a trunk link between them. What native VLAN should be used on the trunk if Cisco best

practices are being implemented?

1

2

3

4

5

6

11

118. A router learns of multiple routes toward the same destination. Which value in a routing table

represents the trustworthiness of learned routes and is used by the router to determine which route to

install into the routing table for this specific situation?

routing protocol

outgoing interface

metric

administrative distance

How often do switches send Bridge Protocol Data Units (BPDUs)?

Every 2 sec

Name the STP port states in order

Blocking, Listening, Learning, Forwarding and Disabled

What's the default Cisco Bridge ID?

32768

Which command will show you the Root Bridge and priority for a VLAN?

show spanning-tree vlan x

What's the STP port cost for a 100 Mbps link?

19

When a port that's configured with the _ _ feature receives a BPDU, it immediately transitions to the

errdisable state

BPDU Guard

The _ _ feature effectively disables STP on the selected ports by preventing them from sending or

receiving any BPDUs

BPDU Filter

Which 2 commands will force the switch to become the Root Bridge for a VLAN?

spanning-tree vlan x priority x

spanning-tree vlan x root [primary|secondary]

Contrary to popular belief, the Port Fast feature does not disable Spanning Tree on the selected port

as the port can still send and receive BPDUs. T/F?

True

The Backbone Fast feature provides fast failover when a direct link failure occurs. T/F?

False. Backbone Fast enables immediate expiration of the Max Age timer in the event of an indirect

link failure.

RSTP is not backward compatible w/ the original IEEE 802.1D STP standard. T/F?

False

What are the RSTP port states?

Discarding, Learning, Forwarding

What are the 4 RSTP port roles?

Root, Designated, Alternate, Backup

Which command enables RSTP?

spanning-tree mode rapid-pvst

By default, when RSTP is enabled on a Cisco switch, RPVST+ is enabled. T/F?

True

What type of ports does a FastEtherChannel contain?

100Mbps

How many ports can a standard EtherChannel contain?

Up to 8

What are the 2 protocol options you have when configuring EtherChannels on a Cisco switch?

PAgP or LACP

Which of the EtherChannel protocols is Cisco proprietary?

PAgP

PAgP packets are sent to the destination Multicast MAC address 01-00-0C-CC-CC-CC. T/F?

True

What are the 2 port modes supported by PAgP?

Auto, Desirable

What are the 2 port modes supported by LACP?

Active, Passive

If more than 8 links are assigned to an EtherChannel bundle running LACP, the protocol uses the

port priority to determine which ports are placed into standby mode. T/F?

True

LACP auto configs an admin key value on each port config to use LACP. The admin key defines the

ability of a port to aggregate with other ports. Only ports that have the same admin key are allowed

to be aggregated into the same port channel group. T/F?

True

What is the command used to assign a port to a channel group?

Switch1(config-if-range)#channel-group [number] mode

Name 2 FHRP protocols that are Cisco proprietary.

HSRP, GLBP

Name the open standard FHRP protocol.

VRRP

By default, when HSRP is enabled in Cisco IOS software, version 1 is enabled. T/F?

True

Which Multicast address does HSRP ver 2 use to send Hello packets?

224.0.0.102

HSRP ver 1 group #s are restricted to the range of 0-255, whereas ver 2 group #s are 0-4095. T/F?

True

Which parameter can be adjusted in order to influence the HSRP primary gateway election?

HSRP priority

How does HSRP interface tracking influence the primary gateway election process?

It modifies HSRP priority based on int status

Which command can you use to config an HSRP address on an int?

standby [number] ip [virtual address]

Just like HSRP, VRRP has the option of allowing the gateway to use the BIA or a static address as

the MAC address for VRRP groups. T/F?

False

Which command can you use to config a GLBP group IP address on a router int?

glbp [number] ip [virtual address]

Which files would you usually find in DRAM?

Running Config, Full IOS, routing tables

Where is the compressed IOS held?

Flash

You want to boot the router and skip startup config. Which command to modify config reg?

config-register [version]

Which command puts the running config into NVRAM?

copy run start

Which command will copy your startup config onto a network server?

copy start tftp:

You want to boot your router from a network server holding the IOS. How?

boot system [option]

The universal image includes all the feature sets you require, but in order to gain access to the

advanced features you need to buy the appropriate license and verify it on the actual device. T/F?

True

The ROM monitor has a very small code called bootstrap or boothelper to check for attached

memory interfaces. T/F?

True

Which command do you use to view the files stored on the flash memory on a Cisco router?

show flash/dir

What is the purpose of the POST?

Power On Self Test: tests hardware to verify components are present and healthy (memory, CPU,

ASICs...)

You can see the ASN with the show ip _ command

show ip protocols

Every router you want to communicate with in your routing domain must have a different ASN. T/F?

False

What is the purpose of the EIGRP topology table?

Allows all EIGRP routers to have a consistent view of the entire network. All known dest networks

and subnets that are advertised by neighbor EIGRP routers are stored here.

By default, EIGRP uses the _ bandwidth on the path to a destination network and the total _ to

compute routing metrics.

Minimum, Delay

Dynamic neighbor discovery is performed by sending EIGRP Hello packets to the destination

Multicast group address _

224.0.0.10

Eigrp packets are sent directly over IP using protocol # _

88

To populate the topology table, EIGRP runs the _ algorithm.

DUAL

The _ _ includes both the metric of a network as advertised by the connected neighbor, plus the cost

of reaching that particular neighbor.

Feasible Distance

Cisco IOS software supports equal cost load sharing for a default of up to 4 paths for all routing

protocols. T/F?

True, however, up to 6 can be configured via maximum-paths <1-6> command

What EIGRP command can be used to enable unequal cost load sharing?

variance

Name at least 3 reasons for EIGRP neighbor relationships not forming.

Neighbor routers not on a common subnet; mismatched primary/secondary subnets; mismatched K

vals; mismatched ASN; ACLs filtering out EIGRP packets; L1 issues; L2 issues; mismatched auth

params

Which command verifies EIGRP K vals?

show ip protocols

Which command verifies EIGRP packet stats?

show ip eigrp traffic

Name at least 2 common reasons for EIGRP route installation failures.

The same route is received via another protocol with a lower AD; EIGRP summarisation; duplicate

router IDs present within EIGRP domain; routes do not meet the Feasibility Condition

The AD concept is used to determine how reliable the route source is. T/F?

True

By default, EIGRP auto summarises at classful boundaries and creates a summary route pointing to

the Null0 int. T/F?

True

Which command debugs FSM events?

debug eigrp fsm

Which command shows the originating router ID of a specific prefix?

show ip eigrp topology x.x.x.x y.y.y.y

Which command shows the EIGRP event log?

show ip eigrp events

What is the best command to use when debugging various routing issues?

debug ip routing

IPv6 security for EIGRPv6 is built-in. T/F?

True

Because EIGRPv6 uses the Link-Local address of the neighbor as the next-hop address, the global

IPv6 Unicast subnets don't need to be the same in order for a neighbor relationship to be established

between 2 routers that reside within the same AS and are on a common net segment. T/F?

True

Which command to enter EIGRP for IPv6 router config mode?

ipv6 router eigrp [ASN]

Which state is the EIGRP for IPv6 initially in, active or shutdown?

shutdown

How do you enable EIGRP for IPv6 on a router int?

ipv6 eigrp [ASN]

Which of the following affect the calculation of EIGRP metrics when all possible default vals are

used? (Choose 2)

a. Bandwidth

b. Delay

c. Load

d. Reliability

e. MTU

f. Hop count

A and B

How does EIGRP notice when a neighboring router fails?

a. The failing neighbor sends a message before failing.

b. The failing neighbor sends a "dying gasp" message.

c. The router notices a lack of routing updates for a period of time.

d. The router notices a lack of Hello messages for a period of time.

D

Which of the following is true about the concept of EIGRP feasible distance?

a. A route's feasible distance is the calculated metric of a feasible successor route.

b. A route's feasible distance is the calculated metric of the successor route.

c. The feasible distance is the metric of a route from a neighboring router's perspective.

d. The feasible distance is the EIGRP metric associated with each possible route to reach a subnet.

B. The FD is the metric for the best of those routes. The best route is called the successor route, and

it's added to the IP table.

Which of the following is true about the concept of EIGRP reported distance?

a. A route's reported distance is the calculated metric of a feasible successor route.

b. A route's reported distance is the calculated metric of the successor route.

c. A route's reported distance is the metric of a route from a neighboring router's perspective.

d. The reported distance is the EIGRP metric associated with each possible route to reach a subnet.

C. A route's RD is the metric used by the neighbor that advertised the route. A router uses it to

determine which routes meet the feasibility condition for whether the route can be a feasible

successor route.

Which of the following network commands, following the command router eigrp 1, tells this router

to start using EIGRP on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1, and

10.1.120.1?(Choose 2)

a. network 10.0.0.0

b. network 10.1.1x.0

c. network 10.0.0.0 0.255.255.255

d. network 10.0.0.0 255.255.255.0

A and C. The EIGRP network command supports a parameter of a classful network, enabling EIGRP

on all interfaces in that classful network, or an address and wildcard mask. In the latter case, int IP

addresses that match the configured address, when applying ACL-like logic with the wildcard mask,

match the command.

Routers R1 and R2 attach to the same VLAN with IP addresses 10.0.0.1 and 10.0.0.2. R1 is

configured with router eigrp 99 and network 10.0.0.0. Which of the following commands might be

part of a working EIGRP config on R2 that ensures that the 2 routers become neighbors and

exchange routes?(Choose 2)

a. network 10

b. router eigrp 98

c. network 10.0.0.2 0.0.0.0

d. network 10.0.0.0

C and D. The EIGRP network 10.0.0.2 0.0.0.0 command exactly matches the int with address

10.0.0.2 because of the wildcard mask, enabling EIGRP on the int. The EIGRP ASN val must match

both routers. The network 10 command is syntactically incorrect; the entire classful network must be

configured.

Which of the following must occur to config MD5 auth for EIGRP?(Choose 2)

a. Setting the MD5 auth key via some int subcommand

b. Config at least 1 key chain

c. Defining a valid lifetime for the key

d. Enabling EIGRP MD5 auth on an int

B and D. The MD5 key must be configured. It's not configured with an int subcommand, but as part

of a chain. The useful lifetime of a key may be configured, but not required.

In the show ip route command, what code designation implies that a route was learned with EIGRP?

a. E

b. I

c. G

d. R

e. P

f. D

F

Which of the following affects the calculation of OSPF routes when all possible default vals are

used?

a. Bandwidth

b. Delay

c. Load

d. Reliability

e. MTU

f. Hop count

A. OSPF calculates metrics based on the cost associated with each int. OSPF, by default, calculates

int cost based on the bandwidth setting.

OSPF runs an algorithm to calculate the currently best route. Which of the following terms refer to

that algorithm?(Choose 2)

a. SPF

b. DUAL

c. Feasible successor

d. Dijkstra

e. Good old common sense

A and D. OSPF uses the SPF algorithm by mathematician Dijkstra.

Two OSPF routers connect to the same VLAN using their Fa0/0 int. Which of the following settings

on the interfaces of these 2 potentially neighboring routers would prevent the 2 routers from

becoming OSPF neighbors?(Choose 2)

a. IP addresses of 10.1.1.1/24 and 10.1.1.254/25

b. The addition of a secondary IP address on one router's int, but not the other

c. Both router interfaces assigned to area 3

d. One router is configured to use MD5 auth, the other is not config for auth

A and D. Routers must use the same auth type and the same auth key. The subnet # and range of

addresses must be the same subnet.

Which of the following OSPF neighbor states is expected when the exchange of topology info is

complete so that neighboring routers have the same LSDB?

a. Two-way

b. Full

c. Exchange

d. Loading

B. Neighboring OSPF routers that complete the database exchange are considered fuly adjacent and

rest in a Full neighbor state.

Which of the following is true about an existing OSPF designated router?(Choose 2)

a. A newly connected router in the same subnet, with a higher OSPF priority, preempts the existing

DR to become the new DR.

b. A newly connected router in the same subnet, with a lower OSPF priority, preempts the existing

DR to become the new DR.

c. The DR may be elected based on the lowest OSPF Router ID.

d. The DR may be elected based on the highest OSPF Router ID.

e. The DR attempts to become fully adjacent with every other neighbor on the subnet.

D and E. The DR is elected based on the highest OSPF priority. If there's a tie, it's based on highest

OSPF RID. Once the DR is elected, the role can't be taken over by a better router until the DR and

BDR have lost connectivity to the subnet. The DR attempts to be fully adjacent to all other routers on

the subnet as part of the optimized database exchange process.

Which of the following network commands, following the command router ospf 1, tells this router to

start using OSPF on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1 and 10.1.120.1?

a. network 10.0.0.0 255.0.0.0 area 0

b. network 10.0.0.0 0.255.255.255 area 0

c. network 10.0.0.1 255.0.0.255 area 0

d. network 10.0.0.1 0.255.255.0 area 0

B. The network 10.0.0.0 0.255.255.255 area 0 command works as it matches all interfaces whose

first octet is 10.

Which of the following network commands, following the command router ospf 1, tells this router to

start using OSPF on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1 and 10.1.120.1?

a. network 0.0.0.0 255.255.255.255 area 0

b. network 10.0.0.0 0.255.255.0 area 0

c. network 10.1.1.0 0.x.1x.0 area 0

d. network 10.1.1.0 255.0.0.0 area 0

e. network 10.0.0.0 255.0.0.0 area 0

A. The network 0.0.0.0 255.255.255.255 area 0 command matches all IP addresses as a result of the

255.255.255.255 wildcard mask so this command enables OSPF in Area 0 on all interfaces.

Which of the following commands list the OSPF neighbors off int s0/0?(Choose 3)

a. show ip ospf neighbor

b. show ip ospf int

c. show ip neighbor

d. show ip int

e. show ip ospf neighbor s0/0

A, B and E

An OSPF router learns about 6 possible routes to reach subnet 10.1.1.0/24. All 6 routes have a cost of

55 and are interarea routes. By default, how many routes are placed in the routing table?

a. 1

b. 2

c. 3

d. 4

e. 5

f. 6

D. The OSPF maximum-paths number router subcommand sets the number of equal cost routes

added to the routing table. This command defaults to a setting of 4.

Which of the following IPv4-to-IPv6 transition methods allows an IPv4-only host to communicate

with an IPv6-only host?

a. 6to4 tunneling

b. Dual-stack

c. ISATAP tunneling

d. NAT-PT

d. Network Address Translation-Protocol Translation translates between IPv4 and IPv6 and vice

versa. The two tunneling methods allow IPv6 hosts to communicate with other IPv6 hosts, sending

the packets through an IPv4 network. Dual-stack allows a host or router to concurrently support both

protocols.

Which of the following tools requires the end user to telnet to a router to gain access to hosts on the

other side of the router?

a. Reflexive ACLs

b. Named ACLs

c. Time-based ACLs

d. Dynamic ACLs

d. Dynamic ACLs require the user to telnet to the router and authenticate using a username and

password, which then causes the router to permit packets sent by the host.

Which of the following summarized subnets represent routes that could have been created for CIDR's

goal to reduce the size of Internet routing tables?

a. 10.0.0.0 255.255.255.0

b. 200.1.0.0 255.255.0.0

c. 10.1.0.0 255.255.0.0

d. 200.1.1.0 255.255.255.0

b. Only 200.1.0.0 255.255.0.0, a Class C address, summarizes multiple networks.

Classes:

A: 1-126, 255.0.0.0

B: 128-191, 255.255.0.0

C: 192-223, 255.255.255.0

What command disables the use of Frame Relay LMI messages?

a. no frame relay lmi messages

b. no frame relay status lmi

c. no keepalive

d. no lmi

c. no keepalive

Which of the following IEEE 802.1d port states are stable states used when STP has completed

convergence? Choose 2

a. Blocking

b. Forwarding

c. Listening

d. Learning

e. Discarding

A and B. Listening and Learning are transitory port states, used only when moving from the

Blocking to the Forwarding State. Discarding is not an 802.1d STP port state.

Which of the following are transitory IEEE 802.1d port states used only during the process of STP

convergence? Choose 2

a. Blocking

b. Forwarding

c. Listening

d. Learning

e. Discarding

C and D. Listening and Learning are transitory port states, used only when moving from the

Blocking to the Forwarding state. Discarding is not an 802.1d STP port state. Forwarding and

Blocking are stable states

Which of the following bridge IDs would win election as root, assuming that the switches with these

bridge IDs were in the same network?

a. 32769:0200.1111.1111

b. 32769:0200.2222.2222

c. 4097:0200.1111.1111

d. 4097:0200.2222.2222

e. 40961:0200.1111.1111

C. The smallest numeric bridge ID wins the election.

Which of the following facts determines how often a nonroot bridge or switch sends an 802.1d STP

Hello BPDU message?

a. The Hello timer as configured on that switch.

b. The Hello timer as configured on the root switch.

c. It's always every 2 seconds.

d. The switch reacts to BPDUs received from the root switch by sending another BPDU 2 seconds

after receiving the root BPDU.

B. Nonroot switches forward Hellos received from the root; the root sends these Hellos based on the

root's configured Hello timer.

What STP feature causes an interface to be placed in the Forwarding State as soon as the interface is

physically active?

a. STP

b. RSTP

c. Root Guard

d. 802.1w

e. PortFast

f. EtherChannel

E

Which answer lists the name of the IEEE standard that improves the original STP standard and

lowers convergence time? Choose 2

a. STP

b. RSTP

c. Root Guard

d. 802.1w

e. PortFast

f. Trunking

B and D. The IEEE 802.1w standard, Rapid STP, provides much faster STP convergence.

Which of the following RSTP port states have the same name as a similar port state in traditional

STP? Choose 2

a. Blocking

b. Forwarding

c. Listening

d. Learning

e. Discarding

f. Disabled

B and D. RSTP uses port states of Forwarding, Learning, and Discarding. Forwarding and Learning

states perform the same basic functions as the STP port states with the same names.

On a 2960 switch, which of the following commands change the value of the bridge ID? Choose 2

a. spanning-tree bridge-id [value]

b. spanning-tree vlan [vlan-number] root {primary | secondary}

c. spanning-tree vlan [vlan-number] priority [value]

d. set spanning-tree priority [value]

B and C

Which of the following is the most likely organization from which an enterprise could obtain an

administrative assignment of a block of IPv6 global unicast IP addresses?

a. ICANN

b. An ISP

c. Global unicast addresses are not administratively assigned by an outside organization.

d. An RIR

b. One method for IPv6 global unicast address assignment is that ICANN allocates large address

blocks to RIRs, RIRs assign smaller address blocks to ISPs, and ISPs assign even smaller address

blocks to their customers.

Which of the following is the shortest valid abbreviation for

FE80:0000:0000:0100:0000:0000:0000:0123?

a. FE80::100:0:0:0:123:4567

b. FE80::100::123

c. FE80:0:0:100::123

d. FE8::1::123

c. Inside a quartet, any leading 0s can be omitted, and one sequence of 1 or more quartets of all 0s

can be replaced with double colons (::). The correct answer replaces the longer 3-quartet sequence of

0s with ::.

Which of the following answers lists a multicast IPv6 address?

a. FD80::1:1234:5678:9ABC

b. FF80::1:1234:5678:9ABC

c. FE80::1:1234:5678:9ABC

d. 2000::1:1234:5678:9ABC

b. FF80::1:1234:5678:9ABC

Global unicast addresses begin with 2000::/3, meaning the first 3 bits match the value in hex 2000.

Unique local addresses match FD00::/8, and link local addresses match FE80::/10. Multicast IPv6

addresses begin with FF00::/8, meaning the first 2 hex digits are F.

PC1 and PC2 reside on the same VLAN and both use IPv6. When PC1 pings PC2's IPv6 address,

PC1 doesn't know PC2's MAC address. How does PC1 learn PC2's MAC address?

a. DHCP

b. stateless autoconfiguration

c. ARP

d. NDP

d. Neighbor Discovery Protocol (NDP) acts as a replacement for several IPv4 protocols, including

ARP, as well as providing several new functions for IPv6. ARP does not exist in IPv6.

If the interface subcommand ip ospf cost is not used under an interface, what would be the calculated

bandwidth setting of a serial interface?

If the interface subcommand ip ospf cost is not used under an interface, Cisco routers calculate the

OSPF cost with the formula 100 Mbps / bandwidth (Mbps). Given a cost of 64 (line 4 of the output),

the bandwidth is 100 Mbps / 64, or 1.5 Mbps (T1).

There is a requirement to enable IPS and IPSec on a router. What license do you need?

A. ipbasek9

B. securityk9

C. datak9

D. uck9

B

Routing tables can be populated in a number of different ways. Which of the following describes the

static routing route type.

A. Router attached to this network

B. The router interface has a local IP address

C. A system administrator manually enters static routes directly into the configuration

D. Learned by exchanging routing information

E. Used when no explicit route to a destination is found

C

Which of the following commands will display the general status of the EtherChannel interface?

A. show etherchannel summary

B. show interface port-channel

C. show etherchannel port-channel

B

Which of the following commands specifies who the NetFlow collector is?

A. ip flow ingress

B. ip flow-export destination ip-address udp-port

C. show ip flow export

D. ip flow-export version version

B

What are the functions of the active router when there is L3 redundancy?

A. Sends out hello messages

B. Knows the IP address of the virtual router

C. Active forwarding of packets for the virtual router is assumed

D. Default gateway ARP requests are responded to with the virtual router MAC

E. Listens for periodic hello messages

F. If the other router is not heard from, it assumes active forwarding of packets

A B C D

You are troubleshooting a connectivity issue on the Branch router when you realize that a ping test to

the destination network is not successful. The Branch and corresponding HQ router have their

neighbor adjacency set up. What could be the problem?

A. The HQ router isn't advertising the route

B. There is an OSPF area mismatch

C. The HQ router is not enabled for OSPF

D. There is a route missing to the destination in the Branch router`s routing table

E. Layer 2 connectivity is not established between the two routers

A D

Which of the following characteristics belongs to the PPP protocol?

A. Used by Cisco devices on serial lines, by default

B. Supports PAP and CHAP authentication

C. Has a link-quality feature to take down the link if too many errors are detected

D. Used when connecting to a device that is not a Cisco device

B C D

Which troubleshooting steps are used when a trunk is not established?

A. Use the [show interfaces trunk] command to check if a trunk has been established between

switches

B. Use the [show interfaces trunk] command to see if the VLAN membership is assigned correctly

C. Use the [show interfaces trunk] command to check whether the local and peer native virtual

LANs, or VLANs, match

D. Use the [show interfaces trunk] command to verify which Media Access Control, or MAC,

addresses were learned on the interface

A C

What is needed to have multiple routers functioning as a single virtual router?

A. IP routing must be disabled on the primary router

B. The default gateway must be configured on the routers

C. EtherChannel must be configured between the routers

D. The routers must have the same IP address and MAC

D

What happens if there are no boot system commands in the configuration?

A. The router attempts to boot from a network TFTP server

B. The router defaults to loading and running the first valid Cisco IOS image in the Flash memory

C. The router loads the ROM monitor

D. The router parses the startup configuration file in NVRAM

B

Which of the following is describing the Trunk mode of Dynamic Trunking Protocol?

A. Creates a trunk with the neighboring switch based on the DTP request

B. Enables trunking on the interface

C. Trunking cannot take place on the port regardless of DTP requests

D. Sends a DTP communication that it wants to create a trunk with the neighboring switch

E. DTP frames are prevented from being generated from the port

B

What commands describe the implemented outcomes when configuring multiarea OSPF?

A. The [ip ospf area] command can be used to enable OSPF directly on an interface.

B. The [ip ospf cost] command specifies the OSPF cost of directing a packet across the network to

the destination.

C. The [network area] command defines the network boundary and ospf routing process number.

D. The [router ospf] command configures an OSPF routing process.

A D

What are the functions of the standby router when there is L3 redundancy?

A. Sends out hello messages

B. Knows the IP address of the virtual router

C. Active forwarding of packets for the virtual router is assumed

D. Default gateway ARP requests are responded to with the virtual router MAC

E. Listens for periodic hello messages

F. If the other router is not heard from, it assumes active forwarding of packets

E F

Which of the following is valid for Multi-area OSPF design type?

A. Using summarization results in smaller routing tables

B. A better solution for efficient routing

C. Every router is required to process many link-state advertisements (LSAs)

D. Larger routing tables are required

A B

Which actions must be performed to implement SNMP access to the router?

A. Configure a community access string with a read-write privilege to permit access to SNMP

B. Authenticate access to MIB objects and functions as embedded passwords

C. Set the system contact and location of the SNMP agent on the router

D. Obtain values for the 5 minute exponentially moving average of the CPU busy percentage

A C

You are looking for an inexpensive yet secure solution for one of the telecommuting employees to a

corporate site. Which WAN link option would be most suitable?

A. Frame Relay

B. T1/E1 line

C. ATM

D. DSL

E. ISDN

D

Which problems can manifest in a redundant switched topology?

A. Media Access Control, or MAC, database instability

B. Virtual LAN, or VLAN, mismatch errors

C. Broadcast storms

D. Multiple frame transmission

E. Trunk ports failing establishment

A C D

Which options are true regarding the operation of ROM in a Cisco router?

A. POST brings up the router on start-up

B. The ROM monitor includes a low-level operating system that is used for manufacturing and

password recovery

C. Bootstrap tests and troubleshoots the Cisco IOS software

D. Power-on self test or POST tests the basic functionality of the router hardware

B D

A user is experiencing a loss of end-to-end connectivity in an IPv4 network. You have verified that

there is no physical connectivity issue. Logically, what should you check next?

A. Whether the current path is undesirable

B. Whether there is a physical connectivity issue

C. Whether the name resolutions are correct

D. Whether an access control list, or ACL is blocking traffic

A

Which of the following components contains the running copy of the configuration file?

A. Interface

B. ROM

C. Flash

D. RAM

E. CPU

F. NVRAM

D

Identify the commands used to correctly configure multiarea OSPF.

A. OSPF can be enabled universally within an area by using the [ip ospf area] command on any

router within a specific area.

B. The [ip ospf cost] command specifies the OSPF cost of sending a packet on an interface.

C. The [network area] command defines the interfaces on which OSPF runs and defines the area IDs

for those interfaces.

D. Individual routers can only be configured with a single OSFP routing process number using the

[router ospf] command.

B C

Which of the following commands enables NetFlow on interface?

A. ip flow ingress

B. ip flow-export destination ip-address udp-port

C. show ip flow export

D. ip flow-export version version

A

By which methods does spanning tree operate when electing a designated port?

A. All ports transition to blocking while the election of the designated port takes place

B. If necessary, designated port election ties are broken by upstream root cost path

C. Root ports and designated ports transition to the forwarding state

D. When a stable spanning-tree state is reached, Bridge Protocol Data Units, or BPDUs, are

transmitted by designated ports only

C D

Which of the following commands will display information about the specific port channel interface?

A. show etherchannel summary

B. show interface port-channel

C. show etherchannel port-channel

C

How do you config and verify syslog?

R1#logging 192.168.1.1

R1#show logging

How do you monitor Netflow stats?

R1(config)#int s0/0

R1(config-if)#ip flow ingress

R1#show ip cache flow

How do you utilize Netflow data?

Network traffic accounting

usage-based network billing

network planning

security

Denial of Service (DoS)

monitoring capabilities

network monitoring

Describe SNMPv2:

Describe SNMPv3:

v2

Performance, security, confidentiality and manager 2 manager communication were all improved

from v1.

GetBulkRequest for large data requests was added.

Simpler community based security model was added.

v3

Encryption was added.

Cryptographic Security was added.

Clear text passwords were replaced with security encoded passwords.

Main difference --> Upgrades in Security

How do you enable a PAgP EtherChannel?

Switch2(config)#int range fa0/1 - 3

Switch2(config-if-range)#switchport mode trunk

Switch2(config-if-range)#channel-group 1 mode auto

Verify Config and troubleshoot:

Switch2#show EtherChannel summary

Switch2#show EtherChannel detail

Switch2#show pagp neighbor

Switch2#show pagp internal

Switch2#show interfaces port-channel 1 switchport

How do you enable HSRP for virtual router redundancy?

R1(config-if)#int fa0/0

R1(config-if)#standby 10 ip 192.168.1.10

R1(config-if)#standby 10 priority 110

R1#show standby

R1#show standby brief

Which is applied to an ACL on a secure vty line?

Access-group or Access-class?

Access-class, for example:

access-class 105 in

The access-group is applied to an ACL on an interface and will filter packets as they enter/leave the

interface.

Which of the following is a protocol used between the Frame Relay DTE and the Frame Relay

switch?

a. VC

b. CIR

c. LMI

d. Q.921

e. DLCI

f. FRF.5

g. Encapsulation

C. The LMI manages the link between the DTE and the switch, including noticing when a VC comes

up or goes down.

Which of the following statements about Frame Relay are true? Choose 2

a. The DTE typically sits at the customer site.

b. Routers send LMI messages to each other to signal the status of a VC.

c. A frame's source DLCI must remain unchanged, but the frame's destination DLCI is allowed to

change, as the frame traverses the Frame Relay cloud.

d. The Frame Relay encapsulation type on the sending router should match the encapsulation type on

the receiving router for the receiving router to be able to understand the frame's contents.

A and D. The DTE typically sits at the customer site, and the DCE sits at the service provider site.

Frame Relay switches send LMI messages to DTEs (typically routers) to signal VC status. A Frame

Relay frame does not have a source and destination DLCI, but a single DLCI field.

What does DLCI stand for?

a. Data-link connection identifier

b. Data-link connection indicator

c. Data-link circuit identifier

d. Data-link circuit indicator

A

Router R1 receives a frame from router R2 with DLCI value 222 in it. Which of the following

statements about this network is most accurate?

a. 222 represents Router R1

b. 222 represents Router R2

c. 222 is the local DLCI on R1 that represents the VC between R1 and R2

d. 222 is the local DLCI on R2 that represents the VC between R1 and R2

C. The DLCI addresses a VC, not a router. The DLCI value in the frame as it crosses the local link

represents that VC on that link. Because the question refers to a frame crossing the access link

connected to R1, 222 is the local DLCI on R1 that identifies that VC.

A Frame Relay planning diatram shows the number 101 beside R1, 102 by R2, 103 by R3 and 104 by

R4. No other DLCIs are listed. The lead network engineer tells you that the planning diatram uses

global DLCI addressing and that a full mesh of VCs exist. Which of the following are true? Choose 2

a. Frames sent by R1 to R2, as they cross R2s access link, have DLCI 102

b. Frames sent by R1 to R2, as they cross R2s access link, have DLCI 101

c. Frames sent by R3 to R2, as they cross R3s access link, have DLCI 102

d. Frames sent by R3 to R1, as they cross R3s access link, have DLCI 101

B and C. The global DLCIs represent the dLCI the other routers use when sending frames over their

local access links. So, when R1 sends a frame to R2, when the frame crosses R2's access link, the

network has changed the DLCI to R1's global DLCI, 101. Similarly, when R3 sends a frame to R1, as

the frame crosses R3's access link, the frame has R1's global DLCI in it, 101.

FredsCo has 5 sites, with routers connected to the same Frame Relay network. Virtual circuits (VC)

have been defined between each pair of routers. What is the fewest subnets that FredsCo could use

on the Frame Relay network?

a. 1

b. 2

c. 3

d. 4

e. 5

f. 10

A. A single sibnet can be used in any Frame Relay topology, but with a full mesh, a single subnet can

be used with no tricky issues related to routing protocols.

BarneyCo has 5 sites, with routers connected to the same Frame Relay network. VCs have been

defined between each pair of routers. Barney, the company president, will fire anyone who

configures Frame Relay without using point-to-point subinterfaces. What is the fewest subnets that

BarneyCo could use on the Frame Relay network?

a. 1

b. 4

c. 8

d. 10

e. 12

f. 15

D. BarneyCo has a total of 10 VCs. With all of them configured on point-to-point subinterfaces, you

need 1- subnets, because you need 1 subnet per VC.

R1 sends a Frame Relay frame over a VC to router R2. About the same time, a Frame Relay switch

notices that too many packets are trying to exit the Frame Relay network over the access link

connected to R2. Which of the following is the most likely result that could be caused by this

scenario?

a. R1 eventually receives a frame with BECN set

b. R1 eventually receives a frame with FECN set

c. R1 eventually receives a frame with DE set

d. None of the above

A. The frame that experienced the congestion was going from R1 to R2, so the frame with the

Backward (opposite direction) Explicit Congestion Notification (BECN) bit set would go in the

opposite direction, from R2 back to R1.

Imagine 2 Cisco routers, R1 and R2, using Frame Relay. R1 connects to a switch that uses LMI type

ANSI T1.617, and R2 connects to a switch that uses ITU Q.933a. What keywords could be used in

the R1 and R2 config so that the LMIs work correctly?

a. ansi and itu

b. T1617 and q933a

c. ansi and q933a

d. T1617 and itu

e. None of the above

C. However, the routers autodetect the LMI type by default, so not configuring the LMI also works

BettyCo has 5 sites, w/ routers connected to the same Frame Relay network. VCs have been defined

between each pair of routers. Betty, the company president, will fire anyone who configs anything

that could be left as default. Which of the following config commands would get you fired? Choose 3

a. ip address

b. encapsulation

c. lmi-type

d. frame-relay map

e. frame-relay inverse-arp

C, D, and E. The LMI type is autosensed by default. Inverse ARP is on by default, meaning that it

doesn't need to be enabled with the frame-relay inverse-arp command, nor do any static mapping

statements need to be added.

WilmaCo has some routers connected to a Frame Relay network. R1 is a router at a remote site, w/ a

single VC back to WilmaCo's headquarters. The R1 config looks like this:

int s0/0

ip address 10.1.1.1 255.255.255.0

encapsulation frame-relay

Wilma, the company president, has heard that point-to-point subinterfaces are cool and she wants

you to change the config to use it. Which commands do you need to use to migrate the config?

Choose 2

a. no ip address

b. interface-dlci

c. no encapsulation

d. encapsulation frame-relay

e. frame-relay interface-dlci

A and E. The IP address moves to the subinterface, so it needs to be removed from the serial

interface first (no ip address command). The encapsulation stays on the physical interface. The

frame-relay interface-dlci command must be used on the subinterface so that the router knows which

DLCI goes with which subinterface-even if only one DLCI exists.

WilmaCo has another network, w/ the main site router that has 10 VCs connecting to the 10 remote

sites. Wilma now thinks that multipoint subinterfaces are even cooler than point-to-point. The current

config looks like this:

int s0/0

ip address 172.16.1.1 255.255.255.0

encapsulation frame-relay

Which commands do you need to use to migrate the config? (DLCIs 101-110 are used for the 10

VCs)

a. interface-dlci 101 110

b. interface dlci 101-110

c. Ten different interface-dlci commands

d. frame-relay interface-dlci 101 110

e. frame-relay interface dlci 101-110

f. Ten different frame-relay interface-dlci commands

F. You can code only 1 DLCI on a frame-relay interface-dlci command, and you need one for each

VC under the multipoint interface.

Which of the following commands lists the info learned by inverse ARP?

a. show ip arp

b. show arp

c. show inverse arp

d. show frame-relay inverse-arp

e. show map

f. show frame-relay map

F

Which of the following are Frame Relay PVC status codes for which a router sends frames for the

associated PVC? Choose 2

a. Up

b. Down

c. Active

d. Inactive

e. Static

f. Deleted

C and E. Up and down are not PVC status codes. Inactive means that the switch thinks a defined

PVC is not working, and deleted means that the DLCI is nto defined at the switch.

Question 1:

Place the DTP mode with its correct description:

Answer:

1) Trunk: Set the switch port to trunk mode and negotiate to become a trunk.

2) Nonegotiate: Specify that the DTP packets are not sent out of this interface.

3) Access: Set a switch port to permanent nontrunking mode.

4) Dynamic Auto: Set the switch port to respond, but not actively send DTP frames.

5) Dynamic Desirable: Make the interface actively attempt to convert the link to a trunk link. (This means the interface is ready

to autonegotiate trunking encapsulation and form a trunk link (using DTP) with a neighbor port in desirable, auto, or on mode.)

Explanation:

Dynamic Trunking Protocol (DTP) is the Cisco-proprietary that actively attempts to negotiate a trunk link between two switches.

Below is theswitchport modes (or DTP modes) for easy reference:

Mode Function

Dynamic Auto Creates the trunk based on the DTP request from the neighboring switch.

Dynamic Desirable Communicates to the neighboring switch via DTP that the interface would like

to become a trunk if the neighboring switch interface is able to become a trunk.

Trunk Automatically enables trunking regardless of the state of the neighboring switch

and regardless of any DTP requests sent from the neighboring switch.

Access Trunking is not allowed on this port regardless of the state of the neighboring

switch interface and regardless of any DTP requests sent from the neighboring

switch.

Nonegotiate Prevents the interface from generating DTP frames. This command can be

used only when the interface switchport mode is access or trunk. You must

manually configure the neighboring interface as a trunk interface to establish a

trunk link.

Question 2:

This is a drag and drop question which is about the correct sequence of steps that a wireless client takes during the process of

association with an access point (AP). Drag the items to the proper locations.

Answer:

Explanation:

Any wireless client attempting to use the wireless network must first arrange a membership with the AP. Membership with the

AP is called an association. The client must send an association request message, and the AP grants or denies the request by

sending an association reply message. Once associated, all communications to and from the client must pass through the AP.

Clients associate with access points as follows:

1) The client sends a probe request.

2) The AP sends a probe response.

3) The client initiates an association to an AP. Authentication and any other security information is sent to the AP.

4) The AP accepts the association.

5) The AP adds the client’s MAC address to its association table.

Question 3:

Drag and drop question. Drag the items to the proper locations.

Answer:

1) Listening: sends and receives BPDUs to determine root, but does not update the MAC address table.

2) Disabled: does not participate in frame forwarding or in STP.

3) Blocking: does not participate in frame forwarding.

4) Fowarding: sends and receives data frames.

5) Learning: populates the MAC address table, but will not forward user data.

Notice: A port begins its life in a Disabled state, moving through several passive states and, finally, into an active state if allowed

to forward traffic.

Question 4 (not sure about the question)

verify that the vlan is assigned to the proper ports

verify that creation of the virtual interface

Verify that there is inter-switch connectivity

verify that switchports are properly pruned

Number of IP Subnets

VLAN to IP mapping

Location of each VLAN

VLAN assignments

CCNA 2

Last update Jan. 2016

A network administrator needs to configure a standard ACL so that only the workstation of the

administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router.

Which two configuration commands can achieve the task? (Choose two.)

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0*

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255

Router1(config)# access-list 10 permit host 192.168.15.23*

2

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0

network. The administrator attempts to add a new ACE to the ACL that denies packets from host

172.16.0.1 and receives the error message that is shown in the exhibit. What action can the

administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from

the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.*

Manually add the new deny ACE with a sequence number of 15.

Add a deny any any ACE to access-list 1.

Create a second access list denying the host and apply it to the same interface.

3

Launch PT – Hide and Save PT

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Why is the ACL not working?

The ACL is missing a deny ip any any ACE.

The ACL is applied in the wrong direction.

The access-list 105 command or commands are incorrect.

The ACL is applied to the wrong interface.*

No ACL is needed for this scenario.

4 Which statement describes a characteristic of standard IPv4 ACLs?

They are configured in the interface configuration mode.

They can be created with a number but not with a name.

They filter traffic based on source IP addresses only.*

They can be configured to filter traffic based on both source IP addresses and source ports.

5

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have

access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is

accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should

be allowed to this server. Which extended ACL would be used to filter this traffic, and how would

this ACL be applied? (Choose two.)

access-list 105 permit ip host 10.0.70.23 host 10.0.54.5

access-list 105 permit tcp any host 10.0.54.5 eq www

access-list 105 permit ip any any

R1(config)# interface s0/0/0

R1(config-if)# ip access-group 105 out

R1(config)# interface gi0/0

R1(config-if)# ip access-group 105 out ******************

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21

access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www

access-list 105 deny ip any host 10.0.54.5

access-list 105 permit ip any any ********************

access-list 105 permit tcp host 10.0.54.5 any eq www

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21

R2(config)# interface gi0/0

R2(config-if)# ip access-group 105 in

6 What are two possible uses of access control lists in an enterprise network? (Choose two.)

limiting debug outputs*

reducing the processing load on routers

controlling the physical status of router interfaces

controlling virtual terminal access to routers*

allowing Layer 2 traffic to be filtered by a router

7 An administrator has configured an access list on R1 to allow SSH administrative access from host

172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 out

R1(config-line)# access-class 1 in*

R1(config-if)# ip access-group 1 out

R1(config-if)# ip access-group 1 in

8 Which three statements are generally considered to be best practices in the placement of ACLs?

(Choose three.)

Place extended ACLs close to the source IP address of the traffic.*

For every inbound ACL placed on an interface, there should be a matching outbound ACL.

Place extended ACLs close to the destination IP address of the traffic.

Place standard ACLs close to the destination IP address of the traffic.*

Filter unwanted traffic before it travels onto a low-bandwidth link.*

Place standard ACLs close to the source IP address of the traffic.

9 Which three implicit access control entries are automatically added to the end of an IPv6 ACL?

(Choose three.)

deny icmp any any

deny ipv6 any any*

permit icmp any any nd-ns*

permit ipv6 any any

deny ip any any

permit icmp any any nd-na*

10 Which two characteristics are shared by both standard and extended ACLs? (Choose two.)

Both filter packets for a specific destination host IP address.

Both can be created by using either a descriptive name or number.*

Both include an implicit deny as a final ACE.*

Both can permit or deny specific services by port number.

Both kinds of ACLs can filter based on protocol type.

11

Place the options in the following order:

192.168.15.65 255.255.255.240 ==> the first valid host address in a subnet

192.168.15.144 0.0.0.15 ==> subnetwork address of a subnet with 14 valid host addreses

host 192.168.15.2 ==> all IP address bits must match exactly

192.168.5.0 0.0.3.255 ==> hosts in a subnet with SM 255.255.252.0

192.168.3.64 0.0.0.7 ==> address with a subnet 255.255.255.248

12

Consider the following access list that allows IP phone configuration file transfers from a particular

host to a TFTP server:

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5

range 1024 5000

R1(config)# access-list 105 deny ip any any

R1(config)# interface gi0/0

R1(config-if)# ip access-group 105 out

Which method would allow the network administrator to modify the ACL and include FTP transfers

from any source IP address?

R1(config)# interface gi0/0

R1(config-if)# no ip access-group 105 out

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21

R1(config)# interface gi0/0

R1(config-if)# ip access-group 105 out

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21

R1(config)# access-list 105 deny ip any any

R1(config)# interface gi0/0

R1(config-if)# no ip access-group 105 out

R1(config)# no access-list 105

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21

R1(config)# access-list 105 deny ip any any

R1(config)# interface gi0/0

R1(config-if)# ip access-group 105 out ******************

13 What two functions describe uses of an access control list? (Choose two.)

ACLs provide a basic level of security for network access.*

ACLs can control which areas a host can access on a network.*

Standard ACLs can restrict access to specific applications and ports.

ACLs can permit or deny traffic based upon the MAC address originating on the router.

ACLs assist the router in determining the best path to a destination.

14 Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?

an implicit permit of neighbor discovery packets*

an implicit deny any any ACE

the use of named ACL entries

the use of wildcard masks

15 Which three statements describe ACL processing of packets? (Choose three.)

Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is

made.

A packet that has been denied by one ACE can be permitted by a subsequent ACE.

Each statement is checked only until a match is detected or until the end of the ACE list.*

An implicit deny any rejects any packet that does not match any ACE.*

A packet that does not match the conditions of any ACE will be forwarded by default.

A packet can either be rejected or forwarded as directed by the ACE that is matched.*

16 Which statement describes a difference between the operation of inbound and outbound ACLs?

On a network interface, more than one inbound ACL can be configured but only one outbound ACL

can be configured.

In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after

the routing is completed.*

Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on

routers.

17 What is the only type of ACL available for IPv6?

named standard

numbered extended

named extended*

numbered standard

18 Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network

2001:DB8:10:10::/64?

permit tcp any host 2001:DB8:10:10::100 eq 23

permit tcp host 2001:DB8:10:10::100 any eq 23

permit tcp host 2001:DB8:10:10::100 any eq 25

permit tcp any host 2001:DB8:10:10::100 eq 25*

19

Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of

R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?

neighbor advertisements that are received from the ISP router

ICMPv6 packets that are destined to PC1*

packets that are destined to PC1 on port 80

HTTPS packets to PC1

20 If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be

created and applied to it?

4

8*

6

16

12

21 . Which IPv4 address range covers all IP addresses that match the ACL filter specified by

172.16.2.0 with wildcard mask 0.0.1.255?

172.16.2.1 to 172.16.255.255

172.16.2.1 to 172.16.3.254

172.16.2.0 to 172.16.2.255

172.16.2.0 to 172.16.3.255*

22.What packets would match the access control list statement that is shown below?

access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22

SSH traffic from any source network to the 172.16.0.0 network

any TCP traffic from any host to the 172.16.0.0 network

SSH traffic from the 172.16.0.0 network to any destination network*

any TCP traffic from the 172.16.0.0 network to any destination network

23. What single access list statement matches all of the following networks?

192.168.16.0

192.168.17.0

192.168.18.0

192.168.19.0

access-list 10 permit 192.168.0.0 0.0.15.255

access-list 10 permit 192.168.16.0 0.0.15.255

access-list 10 permit 192.168.16.0 0.0.0.255

access-list 10 permit 192.168.16.0 0.0.3.255*

24. What is a limitation when utilizing both IPv4 and IPv6 ACLs on a router?

IPv6 ACLs perform the same functions as standard IPv4 ACLs.

A device can run only IPv4 ACLs or IPv6 ACLs.

IPv4 ACLs can be numbered or named whereas IPv6 ACLs must be numbered.

Both IPv4 and IPv6 ACLs can be configured on a single device, but cannot share the same name.*

25. In which configuration would an outbound ACL placement be preferred over an inbound ACL

placement?

when a router has more than one ACL

when the ACL is applied to an outbound interface to filter packets coming from multiple inbound

interfaces before the packets exit the interface *

when an outbound ACL is closer to the source of the traffic flow

when an interface is filtered by an outbound ACL and the network attached to the interface is the

source network being filtered within the ACL

26. What method is used to apply an IPv6 ACL to a router interface?

the use of the access-class command

the use of the ip access-group command

the use of the ipv6 traffic-filter command*

the use of the ipv6 access-list command

27. Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before

any other commands are implemented?

The ACEs of access list 10 will be deleted.

The ACEs of access list 10 will be renumbered.*

The ACEs of access list 10 wildcard masks will be converted to subnet masks.

The ACEs of access list 10 will not be affected.

28. Refer to the exhibit. What is the result of adding the established argument to the end of the ACE?

Any IP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network as long as it is in

response to an originated request.

Any traffic is allowed to reach the 192.168.254.0 255.255.254.0 network.

Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to

an originated request.*

192.168.254.0 /23 traffic is allowed to reach any network

CCNA Discovery 4 Module 1, 2, 3, 4, 5 Exam Answers

Version 4.0 Quantcast

1. What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)

• Rapid Spanning Tree Protocol

• Hot Standby Routing Protocol

2. The ability to connect securely to a private network over a public network is provided by which WAN

technology?

• VPN

3. Which three statements describe the functions of the Cisco hierarchical network design model?

(Choose three.)

• The distribution layer is responsible for traffic filtering and isolating failures from the core.

• Two goals of the core layer are 100 percent uptime and maximizing throughput.

• The access layer provides a means of connecting end devices to the network.

4. A network designer is creating a new network. The design must offer enough redundancy to provide

protection against a single link or device failure, yet must not be too complex or expensive to implement.

What topology would fill these needs?

• partial mesh

5. Refer to the exhibit. If the firewall module has been correctly configured using best practices for

network security, which statement is true about the security design for the network?

• Servers in the DMZ are protected from internal and external attacks.

6. Which statement is true about a DMZ in a traditional network firewall design?

• Servers in the DMZ provide limited information that can be accessed from external networks.

7. What network connection would be most cost efficient while still meeting the security and connectivity

needs of this teleworker?

• DSL VPN connection with a dialup backup link

8. Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic

from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet

access for all networks. On which router interface and in which direction should it be applied?

• interface fa0/1, outbound

9. Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its default gateway.

If STP is not enabled, what is the result of this ARP request?

• Switch_A and Switch_B continuously flood the message onto the network.

10. What are two best practices in wireless LAN design to ensure secure wireless access to the corporate

network? (Choose two.)

• Use a separate WLAN for employees.

• Configure WPA.

11. In a well-designed, high-availability network, which device significantly affects the most users if a

failure occurs?

• small workgroup switch in the network access layer

12. Which two statements are true regarding network convergence? (Choose two.)

• In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may improve

convergence time.

• Route summarization improves convergence time by minimizing the size of the routing table.

13. Centralizing servers in a data center server farm can provide which benefit over a distributed server

environment?

• It is easier to filter and prioritize traffic to and from the data center.

14. Refer to the exhibit. What effect does the ACL shown have on network traffic, assuming that it is

correctly applied to the interface?

• All Telnet traffic from the 172.16.0.0 network to any destination is denied.

15. Which Cisco IOS function can be configured at the distribution layer to filter unwanted traffic and

provide traffic management?

• access control lists

16. What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to

traffic that belongs to these established sessions?

• reflexive ACL

17. Which three functions are performed at the distribution layer of the hierarchical network model?

(Choose three.)

• summarizing routes from the access layer

• isolating network problems to prevent them from affecting the core layer

18. Refer to the exhibit. Which two devices are part of the access design layer? (Choose two.)

• FC-AP

• FC-ASW-2

19. What is true about implementing a centralized server farm topology?

• provides defined entry and exit points so that filtering and securing traffic is easier

20. Refer to the exhibit. What happens when Host 1 attempts to send data?

• Frames from Host 1 cause the interface to shut down, and a log message is sent.

21. Which two considerations are valid when designing access layer security?(Choose two.)

• SSH is more secure than Telnet to administer network devices.

• Disabling unused ports on the switches helps prevent unauthorized access to the network.

22. What address can be used to summarize only networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24,

and 172.16.3.0/24?

• 172.16.0.0/22

23. Which two items in a physical WLAN design can be identified through a site survey? (Choose two.)

• the types of antennas that are required

• the access point hardware that is required

24. Refer to the exhibit. Which two statements correctly describe the benefits of the network access layer

design that is shown? (Choose two.)

• If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame.

• Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS.

25. What are three ways to ensure that an unwanted user does not connect to a wireless network and view

the data? (Choose three.)

• Disable SSID broadcasting.

• Use authentication between clients and the wireless device.

CCNA Discovery 4 Module 2 Exam Answers Version 4.0

Quantcast

1. During an evaluation of the currently installed network, the IT staff performs a gap analysis to

determine whether the existing network infrastructure can support the desired new features. At which

stage of the Cisco Lifecycle Services approach does this activity occur?

• Plan Phase

2. Which stage of the Cisco Lifecycle Services strategy is usually completed before an organization issues

a Request For Proposal (RFP) or Request For Quotation (RFQ)?

• Prepare Phase

3. What is the purpose of SNMP?

• to facilitate the exchange of information between devices and the NMS

4. During an analysis of a customer network, several possible opportunities for network improvement are

identified. At which stage of the Cisco Lifecycle Services does this process occur?

• Design Phase

5. What provides the initial data for the Optimize Phase?

• performance monitoring

6. Which two statements are true regarding the response to an RFQ?(Choose two.)

• it should strictly conform to the formatting requirements specified by the RFQ.

• The response helps the customer compare pricing with other potential contractors.

7. What are two disadvantages of using a bottom-up approach instead of a top-down approach to network

design? (Choose two.)

• It can result in an inappropriate network design.

• It does not take into account the business goals of the company.

8. What is a business constraint that may impact the WAN design of a company?

• company policy requiring the use of specific vendor networking equipment due to partnerships

9. What is the purpose of preparing a business case?

• to justify the financial investment in implementing the technology change

10. What is the purpose of creating a prioritized list of technical requirements?

• defines the project scope

11. A network engineer is analyzing the network of a potential client company to identify problems and

determine whether a network upgrade or addition is needed. Which role in the sales team is this engineer

assuming?

• pre-sales engineer

12. Which two statements best describe the responsibilities of an account manager? (Choose two.)

• acts as the primary point of contact between the company and the client

• directs the sales teams and support personnel

13. What is the purpose of system-level acceptance testing?

• to check that the newly installed network meets the business goals and design requirements

• to justify the financial investment required to implement the technology change

14. What is a purpose of establishing a network baseline?

• It creates a point of reference for future network evaluations.

15. When should a network baseline be performed within the stages of the Cisco Lifecycle Services?

• Operate Phase

16. What are two benefits of using a top-down approach instead of a bottom-up approach to network

design? (Choose two.)

• incorporates organizational requirements

• clarifies design goals from the perspective of applications and network solutions

17. Which software component is installed on network devices that are managed through SNMP?

• management agents

18. A network engineer working for a contracting company is informed of a pre-bid meeting with a

potential client. What purpose does the network engineer have for attending the pre-bid meeting?

• to clarify project scope and timelines not included in the original request for proposal

19. A major corporation has decided to hire someone to upgrade their network infrastructure. A network

consulting company wants the job. What document must the network consulting company obtain to learn

about the business goals, the project scope, the requirements for the new network and the expected

deliverables?

• Request for Proposal

20. A corporation (client) wants a network upgrade and is putting out a request for services to various

network consulting companies (contractors). A RFQ is required. Which statement is true concerning the

RFQ?

• sent from the client to the contractors in place of a RFP when the technical specifications of a project are

known

21. Which stage of the Cisco Lifecycle Services involves proactive management to identify and resolve

issues before the organization is affected?

• Optimize Phase

22. Why is it important to prioritize business goals when developing network design?

• to adhere to the best opportunities to contribute to the success of the business

23. Which two items help identify business goals and priorities before a new network project starts?

(Choose two.)

• motivation

• profitability

24. A network engineer working for ABC company is writing a response to an RFP for a network upgrade

and must create an executive summary. Which statement describes the basic components of an executive

summary?

• quick overview of the problem, the recommended solution, and the justification for ABC company

doing the job

25. In a network management architecture, which statement best describes a management agent?

• software running on a managed device to collect network information and allow that device to be

managed by a management station

CCNA Discovery 4 Module 3 Exam Answers Version 4.0

1. It is important to identify the details of network sections and devices that will be affected or involved in

a new design. This information is included in which section of the Network Design Requirements

Document?

• Project Goal

• Project Scope

• Technical Requirements

• Current State of the Network

2. Which two pieces of information does the network designer need to determine if the Cisco IOS of a

router requires an upgrade? (Choose two.)

• amount of NVRAM installed

• model number of the router

• number of interfaces and installed HWICs

• installed Cisco IOS feature set and version

• error statistics for each interface

3. Which three pieces of information need to be considered when selecting the proper Cisco IOS version

for an upgrade? (Choose three.)

• processor ID

• interface type

• amount of DRAM

• bootstrap version

• device make and model

• size of system flash memory

4. What are two practices a network technician should follow when installing a new interface card in a

router? (Choose two.)

• Be sure the interface card faceplate does not touch the chassis rear panel.

• Do not tighten the captive screws until the router has been powered on and recognizes the card.

• Store the blank faceplate inside the card slot to be used if the card is removed.

• Handle the interface card by the edges to avoid static discharge.

• Push the interface card into place until the edge connector is seated securely

5. The new serial interface card for the router arrives and the network technician reads that it is

hotswappable. What does this mean?

• The card cannot be installed while the router is powered on because static discharge could damage the

card.

• The card cannot be installed until the router is powered off and completely cooled down.

• The card can be installed while the router is powered on if the router supports this technology.

• The card is a replacement and must be installed in the same slot as the card it is replacing.

6. Refer to the exhibit. A network administrator issues the command shown to gain knowledge about a

poorly documented network. Which two pieces of information can the network administrator discover

from the command output? (Choose two.)

• One connected device has router capability.

• The entire network contains a total of five Cisco devices with CDP enabled.

• None of the directly connected network devices have been configured with an IP address.

• Device EDGE_2811 is connected to port Fast Ethernet 0/0 on device C3750-24_MDF.

• Five Cisco devices with CDP enabled are directly connected to device C3750-24_MDF

7. Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?

• The router selects an image depending on the value of the configuration register.

• The router selects the third Cisco IOS image because it is the most recent IOS image.

• The router selects the second Cisco IOS image because it is the smallest IOS image.

• The router selects an image depending on the boot system command in the configuration.

• The router selects the third Cisco IOS image because it contains the advipservicesk9 image.

8. An administrator wants to download a new Cisco IOS software version to the local router. Which

command performs this task?

• copy tftp flash

• copy flash run

• copy start tftp

• copy flash tftp

• copy tftp start

9. Refer to the exhibit. The top of the output shows the Cisco Feature Navigator regarding a Cisco IOS

image that the administrator wants to install on a router. Below it is the output from the show version

command for that router. Which statement is true regarding the capacity of the router to run this Cisco

IOS image?

• There is not enough DRAM and flash.

• There is enough DRAM and flash.

• There is enough DRAM but not enough flash.

• There is enough flash but not enough DRAM.

10. Which two items are objectives of a WLAN design site survey? (Choose two.)

• identify coverage areas

• determine primary AP locations

• determine what AP equipment should be purchased

• determine how many users will access the WLAN

• identify the bottleneck of the LAN infrastructure

11. Refer to the exhibit. Which two actions improve the weaknesses of the topology shown, assuming that

each access layer segment is in its own subnet? (Choose two.)

• Implement redundant links to each server by adding additional NICs.

• Implement a reduntant link from all access layer switches to Admin, Dist, and Server Farm.

• Implement a backup firewall with a link to a secondary ISP and implement a redundant link to the

DMZ.

• Implement reduntant links from the existing firewall to all access layer switches.

• Implement redundant links from the DMZ to Admin and Dist.

12. A company is beginning to analyze their new Cisco IOS upgrade requirements. What is one of the

router components that a network administrator must consider when selecting a new Cisco IOS version?

• processor type

• storage space in NVRAM

• interfaces and modules to be supported

• compatibility of the bootstrap version with the new Cisco IOS software

13. An employee at a company notices that the wireless signal strength indicator on his laptop fluctuates

from good to low. The network administrator decides to do a site survey of that area. Which three factors

need to be included in the survey? (Choose three.)

• type and model number of the WNIC of the laptop

• number of users in the area

• location of the AP

• list of MAC addresses filtered by the AP

• number of simultaneous applications running on the laptop of the employee

• location of walls and filing cabinets in the office

14. The new network design for AnyCompany must include support of voice and video traffic. Before

upgrading, the network designer checks whether the existing devices can support the new requirements.

Which three items does the designer need to check? (Choose three.)

• number of routers and switches owned by AnyCompany

• routers that will support extra ASICs and WWICs

• size of DRAM and flash on each device

• routers that will support HWICs and VWICs

• system bootstrap version on each router and switch

• modules supported on the loaded Cisco IOS

15. A new Cisco IOS version has been copied into flash from a TFTP server. When a reload is issued to

upgrade the Cisco IOS, the router freezes part of the way through the loading process. What could be the

problem?

• There is enough flash but not enough RAM in the router.

• The new HWIC cards have not been installed yet.

• The TFTP server needs to be present during a reload.

• The new Cisco IOS should have been loaded into NVRAM.

• The new bootstrap version is not compatible with the original version on the router.

16. Refer to the exhibit. A network designer has no documentation and is attempting to create a logical

diagram of the network using the output from show commands. What can be determined from the output

shown?

• The device with the ID of ISP is a router on the Internet.

• The attached switch is a VTP server in the Toronto domain.

• The designer cannot telnet to the attached switch.

• The Cisco router IOS supports enterprise-level voice and video technologies.

17. A production router is reloaded and finishes with a Router> prompt. What three facts can be

determined? (Choose three.)

• POST occurred normally.

• The boot process was interrupted.

• There is not enough RAM or flash on this router.

• A full version of the Cisco IOS was located and loaded.

• A configuration file was not located in NVRAM or from a TFTP server.

• The router did not locate the Cisco IOS in flash, so it defaulted to ROM.

18. During a site survey, the network designer noticed that people were accessing the company wireless

network from the parking lot. What should be done to stop the wireless signal from radiating out into the

parking lot?

• change the channel on the wireless AP

• connect the wireless AP to a firewall

• change the type of antenna attached to the AP

• move the wireless AP to a secure VLAN

• move the wireless AP to a port on a Layer 3 switch

19. A network design project includes a review of the existing network. What is the purpose of this phase

of the project?

• eliminate the need for a site survey

• shorten the timeframe of the project

• lower the cost of the project by removing redundant links and devices

• determine if the number of applications used within the company can be reduced

• To determine what existing network devices require upgrades to meet the new

20. Refer to the exhibit. Based upon the Cisco IOS file naming convention, what is represented by the

value ipvoicek9 listed in the IOS filename?

• version

• file format

• feature set

• hardware platform

21. Refer to the exhibit. What two items can be determined from the output? (Choose two.)

• R2 is a Cisco 2600 device.

• R2 has 22 MB of RAM installed.

• The version of the IOS is 12.3.

• Over 8 MB of NVRAM is installed.

• A new 36 MB IOS file can be installed on the device.

22. During a wireless site survey, a consultant is determining the hours of peak usage and the estimated

number of users in each location. The consultant is currently in what step of the site survey process?

• the defining of customer requirements

• the identification of coverage areas

• the determining of preliminary AP locations

• the measurement of signal strength

23. Refer to the exhibit. The network administrator is attempting to install a new version of the IOS on

R2. Based on the exhibited output, what are two possible reasons that the transfer failed?(Choose two.)

• The administrator did not enable TFTP on R2.

• There is not enough flash available to store the new IOS.

• Connectivity between R2 and the TFTP server was not verified.

• The copy command was incorrectly entered.

• The administrator did not verify that the TFTP server is running.

24. In which section of the Network Design Requirements document would a network consulting team

detail names and IP addresses of important networking components and servers, provide network

diagrams and topologies, and define strengths and weaknesses of the network?

• network requirements

• project scope

• overall project goal

• state of the network

CCNA Discovery 4 Module 4 Exam Answers Version 4.0

1. In addition to the technical considerations, what other major factor is used to evaluate the success of

a network installation?

• final project costs

• maintenance costs

• user satisfaction

• statistics describing the performance of network devices

2. Which two network applications are most affected by network congestion and delays? (Choose

two.)

• IP telephony

• live video webcasts

• audio file downloads

• online banking services

• file archival and retrieval

3. What two Cisco tools can be used to analyze network application traffic? (Choose two.)

• NBAR

• NetFlow

• AutoQoS

• Wireshark

• Custom Queuing

4. In network design, which technology can be implemented to prioritize traffic based on its

importance and technical requirements?

• STP

• QoS

• RTP

• TCP

• VPN

5. What are two characteristics of voice over IP traffic? (Choose two.)

• Voice packets tend to be small.

• Voice packets must be processed in real time.

• Voice packets can effectively use TCP reliability features.

• Voice traffic can survive packet drops and retransmission delays.

• Voice packets must be converted to analog before being sent across the IP network.

• Voice packets automatically receive a higher priority value than other types of packets.

6. What are two things that a network designer can do to determine current and anticipated network

traffic flows? (Choose two.)

• Survey end users to obtain customer input.

• Upgrade the Cisco IOS software in all networking devices to optimize traffic flow.

• Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant.

• Run a network traffic analysis to determine which applications are in use and by whom.

• Conduct an inventory of all networking devices that includes model numbers and memory

configurations

7. A company that has a traditional telephone system wants to convert to IP telephony. Which two

factors should be considered for the design? (Choose two.)

• Digital communications systems have greater noise than analog systems when processing voice traffic.

• Voice-enabled routers or a server must be used for call control and signaling.

• Voice to IP conversions can cause router overhead.

• Power to the phones can be supplied through properly equipped patch panels or switches.

• The cost to combine voice and data VLANs can be a considerable amount.

8. Several web and email servers have recently been installed as part of an enterprise network. The

security administrator has been asked to provide a summary of security features that can be implemented

to help prevent unauthorized traffic from being sent into or out of sensitive internal networks. Which

three features should the security administrator recommend? (Choose three.)

• firewalls

• priority queuing

• access control lists

• intrusion detection systems

• DHCP

• 128-bit WEP

9. The design of an IP telephony system needs to meet the technical requirements to provide a

connection to the PSTN as well as provide high-quality voice transmissions using the campus network.

Which two elements directly affect the ability of the design to meet these requirements?(Choose two.)

• voice-enabled firewall

• PoE switches and patch panels

• redundant backbone connectivity

• voice-enabled router at the enterprise edge

• separate voice and data VLANs with QoS implemented

10. When implementing VoIP services, which two design considerations should be followed?(Choose

two.)

• Confirm that network jitter is minimal.

• Use TCP to reduce delays and dropped packets.

• Establish priority queuing to ensure that large data packets are sent uninterrupted.

• Disable real-time protocols to reduce queuing strategy demands.

• Ensure that packet delays do not exceed 150 ms.

11. What design strategy should be followed when designing a network that uses video on demand?

• implement the appropriate routing protocol to ensure that data segments arrive in order

• implement different QoS queues based on the type of video traffic being distributed

• install servers to store the data in a centrally located server farm

• configure queuing in the core routers to ensure high availability

12. When implementing QoS in traffic queues, what is the first step the designer should take to ensure

that traffic is properly prioritized?

• define QoS policies

• define traffic classes

• determine traffic patterns

• identify traffic requirements

• identify networking equipment

13. Which two statements are characteristics of file transfer traffic flows? (Choose two.)

• RTP should be used.

• Traffic is predictable.

• Packets are small in size.

• Transfers are throughput intensive.

• Response-time requirements are low.

14. Which two items can be determined by diagramming internal traffic flow? (Choose two.)

• the type of ISP services needed

• the capabilities of end-user devices

• the areas where network congestion may occur

• the location of VPN servers used to connect teleworkers

• locations where high-bandwidth connections are required

15. Which two traffic types are examples of external traffic flows? (Choose two.)

• A user in the IT department telnets to the core layer router.

• A user in marketing connects to the web server of a competitor.

• A user in the IT department telnets into the access layer switch.

• A user in the services department logs in to a web-based email program.

• A user in accounting connects to an FTP server that is connected to the access layer switch.

16. Which service can be provided by the NetFlow Cisco utility?

• network planning and mapping

• IDS and IPS capabilities

• peak usage times and traffic routing

• network billing and accounting application

• security and user account restrictions

• source and destination UDP port mapping

17. Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no

other traffic, which queue will voice traffic from other networks use?

• high

• normal

• medium

• default

18. Refer to the exhibit. After configuring QoS, a network administrator issues the command show

queueing interface s0/1. What two pieces of information can an administrator learn from the output of this

command? (Choose two.)

• queue traffic definitions

• priority list protocol assignments

• type of queuing being implemented

• number of packets placed in each queue

• queuing defaults that have been changed

• queuing has not been applied to this interface

19. An analysis of network protocols reveals that RTP and RTCP are being used. What uses these

protocols?

• IDS

• VPN

• WLAN

• firewall

• real-time video

20. A company is considering adding voice and video to the data networks. Which two statements are

true if voice and video are added? (Choose two.)

• PoE switches must be purchased.

• More UDP-based traffic flows will be evident.

• Response times will be increased even if QoS is implemented.

• QoS will most likely be implemented to prioritize traffic flows.

• VPNs will most likely be implemented to protect the voice traffic.

21. Refer to the exhibit. Which option correctly matches the terms on top with its definition on the

bottom?

• A=1, B=3, C=2, D=4

• A=2, B=1, C=4, D=3

• A=2, B=4, C=1, D=3

• A=3, B=2, C=4, D=1

• A=4, B=3, C=1, D=2

• A=4, B=2, C=3, D=1

22. A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days

old are to be purged. However, there is a failure halfway through the transaction, and the entire

transaction is voided. What type of transaction action occurred?

• atomic

• consistent

• durable

• isolated

23. What is the primary goal of QoS?

• classification of traffic

• filtering and queuing voice traffic

• reducing bandwidth requirements

• providing priority service to selected traffic

24. Which technology provides a mechanism for implementing QoS at Layer 2?

• ToS

• CoS

• DSCP

• IP precedence

25. A customer purchases tickets online and pays using a credit card, but the system goes down before

the transaction is complete. What transaction type retains a record of this transaction after the system

failure so that the customer will still receive the tickets and the credit card account will be debited

accordingly?

• atomic

• consistent

• durable

• isolated

26. Refer to the exhibit. The network design documents include requirements to prevent switching loops,

to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols would be needed

to provide the support? (Choose two.)

• HDLC

• HSRP

• PPP

• RSTP

• VTP

27. network design must minimize latency to support real-time streaming applications. Which two

protocols enable control and scalability of the network resources and minimize latency by incorporating

QoS mechanisms? (Choose two.)

• RTCP

• HSRP

• RSTP

• RTP

• RPC

28. Which two major differences are associated with IP telephony when compared to traditional

telephony that uses a PBX? (Choose two.)

• manages phones centrally

• utilizes centralized call routing

• creates peer-to-peer relationships between phones

• requires a separate infrastructure to support data transfer

• requires significant manual configuration when adding, moving, or changing phones

29. When QoS is implemented in a converged network, which two factors can be controlled to improve

performance? (Choose two.)

• link speed

• delay

• packet routing

• jitter

• packet addressing

CCNA Discovery 4 Module 5 Exam Answers Version 4.0

1. Which rule should be followed when implementing the security requirements of a network design?

• Avoid reducing security in order to add additional network capabilities.

2. What limitations of the 2960 switch prevent it from providing the services needed in the Distribution

layer?

• It does not support route summarization.

3. When considering converged network designs, it is important to identify appropriate service demands.

What is a concern when preparing a network design to fit this environment?

• voice-level quality of service

4. Which three design requirements are implemented at the access layer? (Choose three.)

• PoE

• VLANs

• QoS traffic classification and marking

5. Refer to the exhibit. Which statement is true regarding how the ISP router filters traffic?

• All traffic from the 64.100.0.0/21 network can access the Internet.

6. Which two factors should be considered when designing a wireless LAN that provides seamless

roaming capabilities? (Choose two.)

• use of a wireless controller to manage IP addressing

• coverage

7. What are three features of a Catalyst 2960 switch? (Choose three.)

• redundant power availability

• SNMP

• switch clustering

8. A company lists this equipment in their network design:

Two Catalyst 4503 Layer 3 switches

One 5500 security appliance firewall

Two Catalyst 6509 switches

Two lightweight access points

Two Catalyst 2960 switches

Which two types of devices would be appropriate to use at the access layer to provide end-user

connectivity? (Choose two.)

• lightweight access points

• Catalyst 2960 switches

9. Which two statements are true regarding the following extended ACL? (Choose two.)

• access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 20

access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 21

access-list 101 permit ip any any

• Telnet traffic originating on network 172.16.3.0/24 is denied.

10. Which statement applies to a large network with thousands of nodes?

• Intrusion detection is more likely to be performed by a separate device rather than integrated into a

switch or router

11. on campus. The college currently has only wired network device access. Which two devices must be

incorporated into the network design to best accommodate roaming for wireless IP phones?(Choose two.)

• Cisco wireless LAN controller

• lightweight access points

12. What type of WAN service is Frame Relay?

• packet switched

13. Refer to the exhibit. What is an advantage of having two links connected between the two switches

shown?

• provides connectivity when one of the connections between the switches fails

14. What is the function of the access layer in the Cisco three-layer hierarchical internetworking model?

• provides QoS classification and marking

15. When applying network security, what security measure should be implemented first?

• securing the network devices

16. What characteristic of a network supports high availability

• redundancy

17. What is integrated into a Cisco IP phone to reduce the number of ports needed in the wiring closet?

• switch

18. Which network design process identifies where to place access points?

• site survey

19. Using expandable, modular network devices is a key element of what network design criteria?

• scalability

20. What is a primary function of a wireless LAN controller?

• tuning each AP channel for optimal coverage

21. What characteristic in a routing protocol allows it to support the network design criteria for

availability?

• fast convergence

22. A network designer is evaluating the network security implementation for an organization. The

designer recommends adding network security devices in front of the server farm, although network

security devices have been deployed in the Enterprise Edge for two years. What type of attack can be

effectively prevented with this recommendation?

• internal attack

23. Refer to the exhibit. The branch office needs constant access to the servers in the enterprise

headquarters. Therefore, a backup Frame Relay link is added. A network

• administrator is configuring the routers in the branch office to make sure that when the backup Frame

Relay link is used, only the traffic to access the enterprise headquarters is allowed. Which statement is

true about the routing configuration on branch office edge routers?

• The command ip route 128.107.0.0 255.255.0.0 serial 0/0 50 should be configured on BE1.

24. An automobile sales company is establishing a new, small sales showroom in a downtown area. To

update the inventory database, the new sales office will need a WAN connection to the headquarters that

is located in the suburban area. The WAN connection should be around a 4 Mb/s connection. Which

WAN service will provide the most economical approach to meet the requirement?

• DSL

25. A network designer is selecting a WAN technology for connections between the headquarters of an

organization and its branch offices. In this context, what is one advantage of choosing Frame Relay over a

T1 line?

• flexible bandwidth

1. Which three of the following components are common to routers, switches, and

computers? (Choose 3)

RAM

CPU

motherboard

keyboard

2. Which two types of ports do routers have? (Choose 2.)

printer

console

network

CD-ROM

USB

3. Which two statements best describe the functions of a router in a network?

(Choose 2.)

Routers maintain their routing tables and ensure that other routers know of

changes in the network.

Routers use the routing table to determine where to forward packets.

Routers strengthen the signal over large distances in a network.

Routers create larger collision domains.

Routers use ICMP to communicate network information from the router’s own

routing table with other routers.

4. Which three of the following statements about the path determination process are

accurate? (Choose 3.)

Routers evaluate the available paths to a destination

The routing process uses metrics and administrative distances when evaluating

network paths.

Dynamic routing occurs when the network administrator configures

information on each router.

Dynamic routing occurs when information is learned using routing information

that is obtained from routing protocols.

A default route holds an explicit route to every network.

The routing table holds multiple entries per network

5a. The router de-encapsulates the frame and uses the protocol information of the

frame to determine that the network layer packet will pass to the IP process.

Step 1

Step 2

Step 3

Step 4

Step 5

5b. If the destination network is on a directly attached network, the router will use

the ARP process to obtain the MAC address of the host and forward it to the

network segment. If the network is reachable through another router, the router will

use the MAC address of the next-hop router and forward the packet out the interface

indicated in the routing table.

Step 1

Step 2

Step 3

Step 4

Step 5

5c. The router checks the destination address in the IP header. Either the packet is

destined for the router itself or it needs to be forwarded. If the packet needs to be

forwarded, the router searches its routing table to determine where to send the

packet.

Step 1

Step 2

Step 3

Step 4

Step 5

5d. The outgoing interface process encapsulates the packet appropriately to the

media and sends the packet onto the network segment.

Step 1

Step 2

Step 3

Step 4

Step 5

5e. The router receives a packet on one of its interfaces.

Step 1

Step 2

Step 3

Step 4

Step 5

6. Which of the following contains routing information that helps a router in

determining the routing path?

IP Address

MAC Address

routing table

routing protocol

7. Which three of the following statements describe the function of routing tables?

(Choose 3.)

Routing tables provide an ordered list of known network addresses.

Routing tables are maintained through the transmission of MAC addresses.

Routing tables contain metrics that are used to determine the desirability of the

route.

Routing table associations tell a router that a particular destination is either

directly connected to the router or that it can be reached via another router (the

next-hop router) on the way to the final destination.

When a router receives an incoming packet, it uses the source address and

searches the routing table to find the best path for the data from that source.

Although routing protocols vary, routing metrics do not.

8a. This entry comes from having interfaces attached to network segments. This

entry is obviously the most certain; if the interface fails or is administratively shut

down, the entry for that network will be removed from the routing table.

Static routing

Dynamic routing

Default route

Directly connected network

8b. This is an optional entry that is used when no explicit path to a destination is

found in the routing table. This entry can be manually inserted or be populated from

a dynamic routing protocol.

Static routing

Dynamic routing

Default route

Directly connected network

8c. These routes are entered manually by a system administrator directly into the

configuration of a router.

Static routing

Dynamic routing

Default route

Directly connected network

8d. These routes are learned by the router, and the information is responsive to

changes in the network so that it is constantly being updated.

Static routing

Dynamic routing

Default route

Directly connected network

9. Which three metrics are most commonly used by routing protocols to determine a

network path? (Choose 3.)

hop count

bandwidth

delay

packet length

distance

quantity

10. Which three statements accurately describe a distance vector protocol? (Choose

3.)

IGRP was developed by Cisco to address the issues associated with routing in

medium-size LANs.

Examples of this protocol include RIP and IGRP.

This protocol determines the direction and distance to any network in the

internetwork.

Using this protocol, a router needs to know the entire path to every network

segment.

This process is also known as “routing by rumor.”

11. Which three statements accurately describe a link-state routing protocol?

(Choose 3.)

The link-state database is used to calculate the paths with the highest

bandwidths on the network.

Link-state routing protocols respond quickly to network changes.

In link-state routing protocols, each router periodically sends messages to the

network, listing the routers to which it is directly connected and also

information about whether the link to each router is active.

Link-state routing protocols send periodic updates (link-state refreshes) at long

time intervals, approximately once every 30 minutes.

In link-state routing protocols, every router tries to build its own internal map

of the network topology.

Link-state routing protocols send periodic updates even if no network changes

have occurred.

12. All computers function using the _____.

base-10 system

decimal system

numeric system

binary system

13. The decimal number 10 converts to the binary number _____.

10

1010

110

1000

14. Which of the following binary octets has an LSB of 0? (tip: LSB stands for least

significant bit, a fancy name of the right-most bit)

01100011

10100101

10011010

10011001

15. IP addresses are represented using _____.

32-bit binary numbers

16-bit decimal numbers

8-bit binary numbers

8 sets of 4-bit decimal numbers

16. 2 to the fifth power is _____.

2 X 5

128

2 multiplied by itself 5 times

none of the above

17. The decimal number 205 converted into a binary number is _____.

11011101

11001001

11000101

11001101

18. The binary equivalent of decimal number 452 is _____.

111000100

110000100

111001100

101000100

19. What is the decimal equivalent of the binary number 11000111?

218

199

179

208

20. The binary number 11101000111 converted into a decimal number is _____.

1183

1873

1638

1863

21. How many octets does a Class A network have in the host field?

3

2

1

4

22. What is the practical minimum number of bits that can be borrowed to form a

subnet?

1

2

3

4

23. Using 6 subnet bits, how many usable subnets are created?

58

60

64

66

24. How many host addresses can be used in a Class C network?

253

254

255

256

25. What is the maximum number of bits that can be borrowed to create a subnet for

a Class C network? (hint: Number of Valid Hosts On A Subnet = (2 to the power of the

number fo host bits) – 2, leave 2 bits for host field in order to get 2 hosts per subnet.)

2

4

6

8

26. A subnet mask tells the router to look at which portions of an IP address?

mask and host bits

host and network bits

host and subnet bits

network and subnet bits

27. If a router does not match the appropriate address portions to a number on its

routing table, it _____.

sends the packet back to the sender

passes the packet to the next router in the hierarchy

adds that number to its table

discards the packet

28. Which of the following subnet masks falls on octet boundaries?

255.0.0.0

255.255.0.0

255.255.255.0

all of the above

29. Which two of the following are binary default subnet masks? (Choose 2.)

11111111.00000000.00000000.00000000

11111111.11111111.01000000.00000000

11111111.11111111.11111111.00000000

255.255.224.0

30. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0

tell the router to look for?

172.17.128.47

172.17.128

172.17

10.172.47

31. 255.255.224.0 translates into the binary number _____.

11111111.00000000.11100000.00000000

11111111.11100000.00000000.00000000

11111111.11111111.11100000.00000000

11111111.11111111.11110000.00000000

32. To see how many bits you should borrow from the host portion of the network

address to give you the number of subnets you need, you should _____.

subtract the number of subnets you need from the host portion

add the bit values from right to left until the total (decimal value) is just greater

than the number of subnets you need

add the bit values from left to right until the total (decimal value) is just greater

than the number of subnets you need

none of the above

33. How should you power up a Cisco router?

Press the Reset button.

Turn the power switch to “on.”

Connect the fiber cable to another router.

Attach the power cable plug to the router power supply socket.

34. When you start a Cisco router, what should you see on the console?

Cisco IOS debug messages

the Diagnostic Console menu

Cisco IOS software output text

a graphical picture showing the real-time status of the LED

35. What is the primary purpose of setup mode on a Cisco router?

to display the current router configuration

to complete hardware and interface testing

to bring up a minimal feature configuration

to fully configure a Cisco router for IP routing

36. Which statement best describes what the user EXEC mode commands allow you

to configure on a Cisco router?

You cannot configure anything; the user mode commands are used to display

information.

The user EXEC mode allows you to perform global configuration tasks that

affect the entire router.

The user EXEC mode commands allow you to enter a secret password so that

you can configure the router.

The user EXEC mode commands allow you to configure interfaces,

subinterfaces, lines, and routers.

37. Which Cisco IOS command is used to return to user EXEC mode from the

privileged EXEC mode?

exit

quit

disable

userexec

38a. Provides a list of commands and the arguments associated with a specific

command

context-sensitive help

console error messages

command history buffer

38b. Allows recall of long or complex commands or entries for reentry, review, or

correction

context-sensitive help

console error messages

command history buffer

38c. Identifies problems with router commands incorrectly entered so that you can

alter or correct them

context-sensitive help

console error messages

command history buffer

39. What information does the show running-config command provide on a Cisco

router?

current (running) configuration in RAM

system hardware and names of configuration files

amount of NVRAM used to store the configuration

version of Cisco IOS software running on the router

40. Which Cisco IOS command displays the configuration of the system hardware

and the software information?

show version

show interfaces

show startup-config

show running-config

41a. Router(config-if)#

Line

Router

Interface

Controller

Subinterface

41b. Router(config-line)#

Line

Router

Interface

Controller

Subinterface

41c. Router(config-subif)#

Line

Router

Interface

Controller

Subinterface

14d. Router(config-router)#

Line

Router

Interface

Controller

Subinterface

41e. Router(config-controller)#

Line

Router

Interface

Controller

Subinterface

42. If you enter a major command on a Cisco router, what happens?

The router returns you to user EXEC mode.

The router returns a list of possible commands.

The router invokes a global configuration command.

The router switches you from one configuration mode to another.

43. Which Cisco IOS command creates a message to be displayed upon router

login?

hostname hostname

banner motd message

hostname interface description

description interface description

44. If both the enable secret and the enable password commands are configured on

your router, how do you get to the # prompt?

Enter the enable secret command.

Enter the enable password command.

Enter either the enable secret or the enable passwordcommand.

Enter both the enable secret and the enable passwordcommands.

45. Which Cisco IOS command will you use to set the console session timeout to 15

minutes and 30 seconds?

set exec timeout 15 30

console timeout 15 30

timeout 15 30

exec-timeout 15 30

46. Which Cisco IOS command configures a serial port in slot 0, port 1 on a

modular router?

interface serial 0-0-1

interface serial 0 0 1

interface serial 0/0/1

interface serial 0/0-1

47. Which Cisco IOS command should you use to set the clock speed to 64 kbps on

a serial interface on a Cisco router?

clock rate 64

clock speed 64

clock rate 64000

clock speed 64000

48. A serial interface displays “Serial1 is up, line protocol is down.” Which two

situations may cause this error? (Choose 2.)

The clock rate has not been set.

The interface has been manually disabled.

No cable is attached to the serial interface.

There are no keepalives.

There is a mismatch in the encapsulation type.

49. Which two of the following would be considered a physical threat? (Choose 2)

A user leaving their password in their desk.

Someone turning off the power to the switch to block network access.

Someone turning off the air conditioning system in the network closet.

Someone breaking into the cabinet that contains the network documentation.

50. Which four of the following can be protected with a password? (Choose 4)

Console access

VTY access

TTY access

User level access

Exec level access

51. Which of the following is the most secure method of remotely accessing a

network device?

http

telnet

ssh

rmon

snmp

52. Which of the following describes the Cisco Router and Security Device

Manager ?

It is a PC based management system that can be used to configure features like

DHCP sever.

It is a WEB based management system that can be used to configure features

like DHCP sever.

It is a server based management system that can be used to configure features

like DHCP sever.

It is a client based management system that can be used to configure features

like DHCP sever.

53. Where do the Cisco Router and Security Device Manager files reside?

The PC

The Router

The local client

A Network server

54. What the two of the following are functions of DHCP? (Choose 2.)

DHCP dynamically assigns host names to client devices

DHCP dynamically assigns IP addresses to client devices.

DHCP dynamically assigns a default gateway to client devices.

DHCP dynamically assigns security access levels to client devices.

55. Which of the following describes the DHCP server provided by Cisco IOS?

It is a full DHCP server

Its support is limited to assigning IP addresses to clients.

It has to get is DHCP information for a master DHCP server.

It has limited DHCP support and can only assign IP addresses and default

gateways to clients.

56. Which of the following are required DHCP parameters when configuring a

DHCP server on a Cisco router? (Choose 2)

Pool Name

Domain Name

Default Router

DNS Server Address

WINS Server Address

DHCP Network and Subnet

57. Which command can be used to see if an address in the DHCP pool is already in

use by another device?

sh ip dhcp bindings

sh ip dhcp database

sh ip dhcp mapping

sh ip dhcp conflict

58. Which of the following is a Cisco IOS tool that can be used for secure remote

access to another device?

SSH

SDM

ping

Telnet

traceroute

59. Which command would you use to see who has Telnet sessions to your router?

show user

show telnet

show sessions

show connections

60. Which of the following would you use to suspend a Telnet sessions?

end keyword

suspend keyword

CTRL-Shift-6 key sequence

CTRL-Shift-Del key sequence

A host receives a frame and computes the checksum, and determines that

the frame is damaged. The frame is discarded. At what layer of the OSI

model did this happen?

Data link

Which layer of the OSI model is responsible for creating packets?

Network

Acknowledgments, sequencing, and flow control are characteristics of

which OSI layer?

layer 4

A receiving host has failed to receive all of the segments that it should

acknowledge. What can the host do to improve the reliability of this

communication session?

decrease the window size

Which term applies to the Transport layer's Protocol Data Unit (PDU):

Segment

Which of the following are associated with the application layer of the OSI

model?

Telnet

Routers operate at layer __. LAN switches operate at layer __. Ethernet

hubs operate at layer __. Word processing operates at layer __.

3,2,1, none

If a switch has three computers connected to it, with no VLANs present,

how many broadcast and collision domains is the switch creating?

one broadcast and three collision

When data is encapsulated, which is the correct order?

data, segment, packet, frame, bit

What is the purpose of flow control?

two provide a means for the receiver to govern be amounts of data sent by

the sender

The following names are given to packets at various stages in the

encapsulation process.

1. Packets

2. Bits

3. Segments

4. Frames

To which OSI model layer do the packet names correspond?

Network, Physical, Transport, Data Link

Which two of the following statements accurately describe full-duplex

Ethernet?

It is collision free.

It uses direct point-to-point connections between the sender and receiver.

Which two of the following statements accurately describe half-duplex

Ethernet?

It sends both signals along the same wire.

It uses built-in loopback and collision detection.

The employees using your network have complained about slow data

transfers. You have decided to upgrade to full-duplex Ethernet. What

requirements do you have to meet to run it? (Select two.)

Full-duplex NICs.

Network media that can provide 10 or 100 Mbps data transport between

nodes.

You want to enable full-duplex on your Ethernet network. Which of the

following would you do? (Select two.)

Disable loopback and collision detection.

Make sure each switch port has only a single device connected.

An Ethernet network meets the specifications for Ethernet 100BaseTx.

Connected to a port on the switch is a single server. The switch port is

configured for auto-detect. What is the available bandwidth on the server

cable segment?

100 Mbps if the server NIC is half duplex; 200 Mbps if the server NIC is

full duplex.

What is the purpose of the backoff on an Ethernet network?

It is the random amount of time a device waits before retransmitting after a

collision.

Which of the following mechanisms are used on Ethernet networks to

control access to the transmission medium? (Select two.)

Backoff interval.

Collision detection.

What is the first thing that happens when a collision occurs on an Ethernet

network?

The device that detected the collision transmits a jam signal.

Which of the following are true about Gigabit Ethernet? (Select two.)

Can use both copper and fiber optic.

Uses CSMA/CD

You want to implement an Ethernet network using the 1000BaseT standard

using the minimum hardware specifications possible. Which of the

following should you include in your plan? (Select two.)

Cat5e twisted pair cable

RJ-45 connectors.

You want to implement an Ethernet network using the 100BaseFX standard

using the minimum hardware specifications possible. You need to support

distances of up to 1,000 meters. Which of the following should you include

in your plan? (Select two.)

Single-mode fiber optic cable.

LC connectors.

You manage a small network with two buildings, 1,000 meters apart. You

want to connect the two buildings together with a switch. You are

concerned about electromagnetic interference on the cable connecting the

two buildings. What should you include in your plan? (Select two.)

Fiber optic cables with LC connectors.

1000BaseLX Ethernet.

Which part of a MAC address is called the organizationally unique

identifier (OUI)?

The first 24 bits, or 3 bytes

What prevents a sending host on one side of the connection from

overflowing the buffers in the receiving host?

Flow control

You want to implement a network medium that is not susceptible to EMI.

What type of cabling should you use?

Fiber-optic cable

You have the following binary number: 10110111. What are the decimal

and hexadecimal equivalents?

183/B7

What type of RJ45 UTP cable do you use to connect a PC's COM port to a

router or switch console port?

Rolled

What is the maximum distance of 100BaseTX?

100 meters

In the operation of CSMA/CD, which host(s) have priority after the

expiration of the backoff algorithm?

All hosts have equal priority.

Which of the following is correct?

Full-duplex Ethernet uses one pair of wires.

Full-duplex Ethernet uses to pairs of wires.

Half-duplex Ethernet uses two pairs of wires

Full-duplex Ethernet uses three pairs of wires.

Full-duplex Ethernet uses to pairs of wires.

Which of the following statements is false with respect to full duplex?

There are few collisions in full -- duplex mode.

How does a host on an Ethernet network know when to resume

transmissions after a collision has occurred?

The hosts will attempt to resume transmission after a time delay has

expired.

What must happen if a DHCP IP conflict occurs?

The administrator must fix the conflict by hand at the DHCP server

The binary equivalent of the decimal number 192 is:

11000000

You want to implement a mechanism that automates the IP configuration,

including IP address, subnet mask, default gateway, and DNS information.

Which protocol will you use to accomplish this?

DHCP

When discussing reserved IP addresses which of the following is

interpreted to mean "all networks?"

Network address of all 1s

Which class of IP address provides a maximum of only 254 host addresses

per network ID?

Class C

Which of the following describes a web browser?

provides a way to look at and interact with information on the Internet

Match the following protocols with their port numbers:

FTP » 5 : port 21

News » 6 : port 144

Telnet » 2 : port 23

TFTP » 1 : port 69

DNS » 8 : port 53

POP3 » 4 : port 110

UDP » 7 : port 17

TCP » 3 : port 6

Which of the following protocols uses both TCP and UDP?

DNS

How does a DHCP client ensure that no other computer has its assigned IP

address?

Ping to its own address to see if a response is detected.

The DoD model (also called the TCP/IP stack) has four layers. Which layer

of the DoD model is equivalent to the Network layer of the OSI model?

Internet

If a host on a network has the address 172.16.45.14/30, what is the

subnetwork this host belongs to?

172.16.45.12

What is the subnetwork address for a host with the IP address

200.10.5.68/28?

200.10.5.64

What is the class of address, the subnet address, and the host address of the

following IP address: 172.16.10.5 255.255.248.0?

Class B, 172.16.8.0, and 10.5.

When discussing reserved IP addresses which of the following is

interpreted to mean "all networks?"

Network address of all 1s

What is the maximum number of IP addresses that can be assigned to hosts

on a local subnet that uses the 255.255.255.224 subnet mask?

30

You have a network that needs 29 subnets while maximizing the number of

host addresses available on each subnet. How many bits must you borrow

from the host field to provide the correct subnet mask?

5

Which mask should you use on point-to-point WAN links in order to reduce

the waste of IP addresses?

/30

You have an interface on a router with the IP address of 192.168.192.10/29.

What is the broadcast address the hosts will use on this LAN?

192.168.192.15

You have an interface on a router with the IP address of 192.168.192.10/29.

Including the router interface, how many hosts can have IP addresses on the

LAN attached to the router interface?

6

Which privileged EXEC commands begin with the letters ac? (Select all

that apply)

access-enable

access-template

What information does the privileged exec show lacp command display?

Port channel information

How many commands in global configuration mode begin with the letters

"de"?

3

Which of the follow partial commands are unique, first-level commands in

global configuration mode (i.e. recognized as valid commands without

typing additional characters)? (Select all that apply)

al

q

rm

Which of the following parameters are valid second-level parameters for

the ip command in FastEthernet interface configuration mode? (Select all

that apply)

access-group

dhcp

igmp

Which of the following commands are complete commands (i.e. they do not

require additional parameters or keywords)? (Select all that apply)

Branch1#show version

Branch1#conf t

Branch1(config-if)#duplex half

You are working with a single active router. You would like to gather

information about the router. Use the CLI to answer the following

questions:

What's the iOS version?

How much Non-volatile RAM is available on the router?

How much DRAM does the router have?

How many serial interfaces does the router have?

12.4

191 KB

256 MB

4

If you wanted administrators to see a message when logging into the router,

which command would you use?

banner motd

In the Setup dialog, what do the square brackets ([ ]) indicate?

Default settings

What command will take you from privileged mode to user mode?

disable

Which of the following commands will configure all the default VTY ports

on a router?

Router(config)#line vty 0 4

Which command will show you whether a DTE or a DCE cable is plugged

into serial 0?

show controllers s 0

Which command is used to manually encrypt your passwords?

Service password-encryption

Which command is used to manually encrypt passwords on a Cisco router?

Router(config)#service password-encryption

Which of the following is a correct combination of file type and default

location in a Cisco router?

IOS/flash memory

Which switch IOS command allows access to high-level commands, such

as debug?

enable

Which command will delete the contents of NVRAM on a router?

erase start

For security reasons, you want to prevent the Toronto router from sharing

any information about itself with neighboring devices. What should you

do?

From global configuration mode on Toronto, type no cdp run.

You are physically seated at a Host connected to the console of the Seattle

router as shown in the exhibit. You need to know what IP address has been

configured on the E0 interface on the New York router. What are your

options? (Select two.)

Telnet to Toronto. From privileged mode type show cdp neighbors detail.

Telnet to New York. From privileged mode, type show interface E0.

You are working with a router connected to your network. You would like

to gather information about the devices connected to this router. Use the

necessary commands to answer the following questions: Which device is

connected to the Memphis FastEthernet0/1 interface? Which device is

connected to the Memphis Serial0/0/1 interface? What is the IP address of

the device connected to the Memphis Serial0/0/0 interface? What is the IP

address of the device connected to the Memphis FastEthernet0/0 interface?

Which remote port connects Branch3 to the Memphis router? Which remote

port connects Miami to the Memphis router? Which platform is running on

the device connected to the S0/0/2 interface?

Branch3

Miami

172.16.224.2

192.168.30.130

GigabitEthernet0/1

Serial0/0/0

1841

You are configuring a router that has a previous configuration. You need to

turn CDP on for the entire router, but turn it off for the serial 0/0/1

interface. Match the correct command on the left with the configuration

task on the right.

Enter global configuration mode > router#config t

Turn CDP on for the router > router(config)#cdp run

Enter interface configuration mode > router(config)#int s0/0/1

Turn CDP off for the interface > router(config-if)#no cdp enable

Which of the following commands would you use to modify the CDP

packet exchange interval to send CDP packets every 30 seconds?

cdp timer 30

What is the difference between data packets and route update packets?

Data packets transport user data through the internetwork and route update

packets are used to update neighbor routers about network connections.

Which of the following is the best description of the operation of split

horizon?

Information about a route should not be sent back in the direction from

which the original update came.

What metric does RIPv2 use to find the best path to a remote network?

Hop count

____________________ is the process of using protocols to find and

update routing tables on routers.

Dynamic routing

State the three classes of routing protocols:

Distance-vector Routing

Protocols Link-state Routing Protocols

Hybrid Routing Protocols

Which of the following is true about route poisoning?

It describes when a router sets the metric for a downed link to infinity.

Two connected routers are configured only with RIP routing. What will be

the result when a router receives a routing update that contains a higher-cost

path to a network already in its routing table?

The update will be ignored and no further action will occur.

What command will prevent RIP routing updates from exiting an interface

but will still allow the interface to receive RIP route updates?

Router(config-router)#passive-interface s0

Which command displays RIP routing updates?

debug ip rip

Which of the following information will enable a router to route packets?

All of the above.

Which of the following statements about RIP are true? (Select two.)

RIP uses hop counts as the cost metric.

RIP is susceptible to the count-to-infinity problem

When the network is using RIPv2 for the routing protocol, which address is

used to send router updates?

Multicast address

You are configuring the PDX router to maximize available bandwidth. You

realize that because the network connected to the Ethernet interface does

not contain any RIP-enabled devices, RIP updates do not need to be sent

out this interface. Which command can you use to prevent RIP updates

from being sent out the E0 interface?

pdx(config-router)#passive-interface e0

How do link-state routing protocols determine the topology of the network?

Each router initially exchanges LSP messages which are used to build a

topological database.

Which of the following are components of a link-state routing protocol?

(Select three.)

Routing table of paths and ports

SPF tree

Hello packets

What are the common elements of a network hierarchy used by link-state

routing protocols? (Select two.)

Autonomous System

Area

Which of the following are true about the link state routing method? (Select

three.)

Link state routers send updates immediately.

Convergence is faster than with the distance vector method.

Network traffic due to sharing routing information is less than with the

distance vector method.

Which of the following techniques are used to overcome problems inherent

with the link state routing method? (Select three.)

Areas.

Time stamps, sequence numbers, or aging timers.

Designated (authoritative) routers.

How are distance vector routing protocols different from link-state routing

protocols? (Select three.)

Distance vector routing algorithms do not calculate the exact topology of a

network.

Link-state routing protocols are faster to converge than distance vector

routing protocols.

Distance vector routing protocols are easier to implement than link-state

routing protocols.

Which of the following are true about the distance vector method of sharing

routing table information? (Select two.)

The entire routing table is sent to other routers.

Routers send routing information only to their neighbor routers.

Which of the following are true about the distance vector routing method?

(Select three.)

Distance vector routing is susceptible to routing loops.

Distance vector routers share the entire contents of their routing table with

their neighbors.

Distance vector routers have less hardware and software requirements than

link state routers.

Which of the following methods of preventing the count-to-infinity

problem with distance vector routers will send a hop count of 16 back up

the path from which the information was obtained?

Split horizon with poison reverse

One method of preventing routing loops is to not send information about a

route back to the router from which the information came. What is this

technique called?

Split horizon

Hold downs use triggered updates to help prevent routing loops by letting

routers know of changes in the network. Which of the following events can

reset the hold-down timer? (Select two.)

The hold-down timer runs out.

The hold-down timer receives notification of a change in network status.

Which of the following methods of preventing routing loops prevents

routing table changes from taking place too quickly and prevents downed

links from being added back into the routing table?

Hold-downs

Which of the following best describes the Platform as a Service (PaaS)

cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the

cloud infrastructure.

Which of the following cloud computing solutions will deliver software

applications to a client either over the Internet or on a local area network?

SaaS

Which of the following is not true regarding cloud computing?

Cloud computing requires end-user knowledge of the physical location and

configuration of the system that delivers the services.

Which of the following are benefits of EIGRP? (Select two.)

Operates within a controlled hierarchy.

Supports multiple protocols.

Low use of network resources.

Uses an open standard.

Supports multiple protocols.

Low use of network resources.

Which of the following are benefits of EIGRP? (Select two.)

Operates within a controlled hierarchy.

Uses an open standard.

Supports manual route summarization.

Rapid convergence.

Supports manual route summarization.

Rapid convergence.

To configure EIGRP on a router, what are the minimum commands you

must use? (Select two.)

router eigrp 12

network 1.0.0.0

You want to configure Router B to run EIGRP. The networks attached to

both interfaces S0 and S1 on router B are to be advertised with

Autonomous System 100. Which set of commands should you enter?

router eigrp 100

network 172.16.0.0

network 172.17.0.0

Which of the following are true of EIGRP configuration to enable two

routers to become adjacent? (Select two.)

Authentication parameters must match.

The AS number used to configure EIGRP must match.

You have configured Router A, Router B and Router C as show in in the

exhibit. Users in network 10.1.1.0 claim they cannot access resources in

network 192.168.2.0. What is the problem?

Router C has been configured with the incorrect AS number.

You have configured Router A, Router B and Router C as shown in the

exhibit. Users in network 10.0.0.0 report that they have no trouble

accessing resources within their own network, but claim they cannot access

a database located on subnet 192.168.0.0. Users all the other networks

claim they are having no problems accessing the database. What is the

problem?

Router A has been configured with an incorrect network address.

You just configured Router_London as show in in the Exhibit. The router is

part of EIRGP autonomous system 200. Both directly connected networks

172.17.0.0 and 172.18.0.0 are to be advertised to neighbor routers within

AS200. When testing your router, you discover the neighboring routers

have no entries in their routing table for your subnets. What is the problem?

The AS has been incorrectly configured.

You are reviewing the configuration of a router that uses EIGRP for its

routing protocol. Shown below is the output from the show ip protocols

command:

Routing Protocol is "eigrp 1"

Outgoing update filter list for all interfaces is not set.

Incoming update filter list for all interfaces is not set.

EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5-0

EIGRP maximum hopcount 100

EIGRP maximum metric variance 2

Redistributing: eigrp 1

EIGRP NSF-aware route hold timer is 240s

Automatic network summarization is in effect

Maximum path: 5

Routing for Networks:

192.168.1.0

192.168.2.0

192.168.3.0

Routing Information Sources:

Gateway Distance Last Update

192.168.1.12 90 00:55:50

192.168.2.15 90 00:55:50

Distance: internal 90 external 170

Based on the output, what is true of this configuration?

EIGRP will load balance on up to 5 unequal-cost routes.

You are reviewing the configuration of a router that uses EIGRP for its

routing protocol. Shown below is the output from the show ip protocols

command:

Routing Protocol is "eigrp 1"

Outgoing update filter list for all interfaces is not set

Incoming update filter list for all interfaces is not set

Default networks flagged in outgoing updates

Default networks accepted from incoming updates

EIGRP maximum hopcount 100

EIGRP maximum metric variance 2

Redistributing: eigrp 1

EIGRP NSF-aware route hold timer is 240s

Automatic network summarization is in effect

Maximum path: 5

Routing for Networks:

192.168.1.12 90 00:55:50

192.168.2.15 90 00:55:50

Distance: internal 90 external 170

Based on the output, what is true of this configuration? (Select two.)

The routing process has 2 neighbors.

EIGRP is sharing information about 3 networks.

You are reviewing the configuration for a router that uses EIGRP for its

routing protocol. Shown below is the output from the show ip eigrp

topology all-links command:

Router# show ip eigrp topology all-links

IP-EIGRP Topology Table for process 77

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply

status

P 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776

via 172.16.80.28 (46251776/46226776), Ethernet0

via 172.16.81.28 (46251776/46226776), Ethernet1

via 172.16.80.31 (46277376/46251889), Serial0

P 172.16.81.0 255.255.255.0, 1 successors, FD is 307200

via 172.16.82.28 (307200/281600), Ethernet1

via 172.16.80.28 (308500/281600), Ethernet0

via 172.16.80.31 (332800/307900), Serial0

Based on the output, which of the following is true for the route to network

172.16.81.0/24?

The route through Ethernet1 is the successor route.

You are reviewing the configuration of a router that uses EIGRP for its

routing protocol.. Shown below is the output from the show ip eigrp

topology all-links command:

Router# show ip eigrp topology all-links

IP-EIGRP Topology Table for process 77

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply

status

P 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776

via 172.16.80.28 (46251776/46226176), Ethernet0

via 172.16.81.28 (46251776/46226176), Ethernet1

via 172.16.80.31 (46277376/46251889), Serial0

P 172.16.81.0 255.255.255.0, 1 successors, FD is 397200

via 172.16.82.28 (307200/281600), Ethernet1

via 172.16.80.28 (308500/281600), Ethernet0

via 172.16.80.31 (332800/307900), Serial0

Based on the output, what will happen when both successor routes to

network 172.16.90.0/24 are lost?

The router will recalculate the route to network 172.16.90.0/24.

You are reviewing the configuration of a router that uses EIGRP for its

routing protocol. Shown below is the output from the show ip eigrp

topology all-links command:

Router# show ip eigrp topology all-links

IP-EIGRP Topology Table for process 77

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply

status

P 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776

via 172.16.80.28 (46251776/46226176), Ethernet0

via 172.16.81.28 (46251776/46226176), Ethernet1

via 172.16.80.31 (46277376/46251000), Serial0

P 172.16.81.0 255.255.255.0, 1 successors, FD is 397200

via 172.16.82.28 (307200/281600), Ethernet1

via 172.16.80.28 (308500/281600), Ethernet0

via 172.16.80.31 (332800/307900), Serial0

Based on the output, what will happen when both successor routes to

network 172.16.90.0/24 are lost?

The route through Serial0 will automatically be used.

You are reviewing the configuration of a router that uses EIGRP for its

routing protocol. Shown below is the output from the show ip eigrp

topology all-links command:

Router# show ip eigrp topology all-links

IP-EIGRP Topology Table for process 77

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply

status

P 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776

via 172.16.80.28 (46251776/46226176), Ethernet0

via 172.16.81.28 (46251776/46226176), Ethernet1

via 172.16.80.31 (46277376/46251000), Serial0

via 172.16.81.31 (46277400/46251800), Serial1

Based on the output, which of the following are true? (Select two.)

Serial0 is a feasible successor route

Ethernet0 and Ethernet1 are successor routes

You have configured EIGRP routing on Router A. A partial configuration is

shown below:

hostname RouterA

!

interface FastEthernet 0/0

ip address 192.168.1.65 255.255.255.224

duplex auto

speed auto

!

interface FastEthernet 0/1

ip address 192.168.1.97 255.255.255.240

duplex auto

!

interface Serial 0/1/0

ip address 10.21.177.85 255.255.255.252

encapsulation ppp

!

router eigrp 100

network 192.168.1.0

network 10.0.0.0

auto-summary

!

RouterA is connected to RouterB through the serial link. When you check

the routing table on RouterA, you see a single route reported learned

through EIGRP to network 192.168.1.0/24. You want RouterA to have

routes to the individual networks connected to RouterA. How should you

modify the configuration of RouterA?

Use the no auto-summary command.

Which of the following are true of OSPF configuration to enable two

routers to become adjacent? (Select two.)

Hello and dead timer intervals must match on all routers.

The area assigned to each network must match.

You have configured two routers, LondonA and LondonB for OSPF

routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The

partial configuration of each router is shown below:

When you check the routing table on LondonA, you find that it has not

learned about network 172.17.1.16 from LondonB. What is the problem?

The areas defined in the network statements do not match.

You have configured to routers, LondonA and LondonB for OSPF routing.

Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial

configuration of each router is shown below: When you check the routing

table on LondonA, you find that it has not learned about network

172.17.1.16 from LondonB. What is the problem?

The IP address assigned to Serial0/0 on LondonA is not the same subnet as

the Ip address assigned to Serial0/1 on LondonB.

You have configured two routers, LondonA and LondonB for OSPF

routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The

partial configuration of each router is shown below: When you check the

routing table on LondonA, you find that it has not learned about network

172.17.1.16 from LondonB. What is the problem?

Wildcard mask values for the network statements are incorrect.

The Houston router is connected to the Dallas router with a serial link. You

have configured both routers with OSPF. You use the debug ip ospf events

command and see the following output: What is the problem?

The hello timer configured on the Dallas router is incorrect.

You have configured OSPF routing on RouterA. A partial configuration is

shown below: RouterA is connected to RouterB through the serial link.

What routes will RouterB have in its routing table that it has learned from

RouterA?

172.16.1.64/27 and 172.16.1.96/28

You have configured OSPF routing on RouterA. A partial configuration is

shown below: RouterA is connected to RouterB through the serial link.

When you check RouterA, it is not learned of any routes connected to

RouterB. What should you do to correct the problem?

Add a network statement that uses a network of 172.16.1.32 and a wildcard

mask of 0.0.0.31.

Using route distribution, routers within an autonomous system can use

different AS numbers to communicate routing information.

True

True or False: Routers that belong to different AS automatically share

routing information, and they don't become neighbors.

False

You need the IP address of the devices with which the router has

established an adjacency. Also, the retransmit interval and the queue counts

for the adjacent routers need to be checked. What command will display the

required information?

show IP EIGRP neighbors

What conditions must be met for Neighborship establishment?

Hello or ACK received

Which command will display all the EIGRP feasible successor routes

known to a router?

show ip eigrp topology

You want to use a routing protocol that utilizes the benefits of both distance

vector and link state. Which routing protocol will you use?

EIGRP

What is the default administrative distance of a static route if you use an

exit interface instead of a next hop address?

0

With which network type will OSPF establish router adjacencies but not

perform the DR/BDR election process?

Point-to-point

What is the administrative distance of OSPF?

110

Correctly identify the type of routing protocols required for the following

protocols:

EIGRP <==> ______

IGRP <==> ______

RIP <==> ______

OSPF <==> ______

Hybrid or Advanced Distance vector

Distance vector

Distance vector

Link state

A switch has a port that is alternating between green and amber. Which

condition could this indicate?

The port is experiencing errors

What command will display the forward/filter table?

show mac address-table

What will a switch do with a frame received on a port that has a destination

MAC address not in the mac address-table?

The switch will flood the data out all ports, except the port from which the

data originated.

What does a switch do when a frame is received on an interface and the

destination hardware address is unknown or not in the filter table?

Floods the network with the frame looking for the device

How does a switch populate the switch table?

by reading the source hardware address of a frame

Which of the following will prevent a broadcast storm?

Loop avoidance scheme

MMC which of the following are Layer 2 switch functions?

Address learning.

What is the purpose of Spanning Tree Protocol in a switched LAN?

To provide a mechanism for network monitoring in switched environments

Which statement describes a spanning-tree network that has converged?

All switch and bridge ports are in either the forwarding or blocking state.

Which protocol will find all links in a network and shut down redundant

links?

STP