231
640-801 Cisco® Certified Network Associate (CCNA®) Version 12.0

640-801kolos.math.uni.lodz.pl/~archive/Sieci komputerowe (Technologie... · Cisco® Certified Network Associate (CCNA®) Version 12.0. 640 - 801 ... Practice the questions in an exam

Embed Size (px)

Citation preview

640-801

Cisco® Certified Network Associate (CCNA®)

Version 12.0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 2 -

Important Note

Please Read Carefully

Study Tips

This product will provide you questions and answers along with detailed explanations carefully compiled and

written by our experts. Try to understand the concepts behind the questions instead of cramming the questions.

Go through the entire document at least twice so that you make sure that you are not missing anything.

Further Material

For this test TestKing provides:

* Online Testing. Practice the questions in an exam environment.

Try a demo: http://www.testking.com/index.cfm?pageid=724

For this test TestKing plans to provide:

* Study Guide. Concepts and labs. Provides a foundation of knowledge.

Latest Version

We are constantly reviewing our products. New material is added and old material is revised. Free updates are

available for 90 days after the purchase. You should check your member zone at TestKing an update 3-4 days

before the scheduled exam date.

Here is the procedure to get the latest version:

1. Go to www.testking.com

2. Click on Member zone/Log in

3. The latest versions of all purchased products are downloadable from here. Just click the links.

For most updates, it is enough just to print the new questions at the end of the new version, not the whole

document.

Feedback

Feedback on specific questions should be send to [email protected]. You should state: Exam number and

version, question number, and login ID.

Our experts will answer your mail promptly.

Copyright

Each pdf file contains a unique serial number associated with your particular name and contact information for

security purposes. So if we find out that a particular pdf file is being distributed by you, TestKing reserves the

right to take legal action against you according to the International Copyright Laws.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 3 -

Note: Section A contains 107 questions.

Section B contains 138 questions.

Section C contains 71 questions.

The total number of questions is 316.

Each section starts with QUESTION NO: 1. There are no missing questions.

QUESTION NO: 1

You can configure PPP on which of the following types of physical interfaces? (Choose two)

A. Ethernet

B. Token Ring

C. Synchronous Serial

D. Asynchronous Serial

Answers: C, D.

Explanation: Point-to-Point Protocol (PPP) provides router-to-router and host-network connections over

synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols,

including IP and IPX. It also has built in security features such PAP (Password Authentication Protocol) and

CHAP (Challenged Handshake Authentication Protocol).

Incorrect Answers:

A: Ethernet is a LAN (Local Area Network) architecture. It uses either a star or a bus topology to exchange

data.

B: Token Ring is a type of network in which the computers are arranged in a circular fashion. These

computers pass a token between each other. This token is used to communicate data.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 373.

QUESTION NO: 2

Frame Tagging is used to interconnect multiple switches and to maintain VLAN information as traffic

goes between switches. Which of the following statements about the Frame Tagging are true? (Choose

two)

A. A Filtering table is developed for each switch.

B. Frame Tagging defines a unique user defined ID to each frame.

C. A unique identifier is placed in the header of each frame as it is forwarding between switches.

D. Frame Tagging is technique that examines particular information about each frame based on user-

defined offsets.

Answer: B, C.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 4 -

Explanation: Frame tagging or frame identification uniquely assigns a user-defined ID to each frame. This is

sometimes referred to as VLAN ID. Cisco created frame tagging to be used when an Ethernet frame traverses a

trunked link.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 186-187.

QUESTION NO: 3

Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What

is the default encapsulation type for Frame Relay on a Cisco router?

A. HDLC

B. PPP

C. IETF

D. Cisco

E. ANSI

Answer: D.

Explanation: Cisco is the default encapsulation type for Frame Relay on a Cisco router.

Note: For a router to operate in a Frame Relay network the serial interface must be configured for Frame Relay

Encapsulations. There are two types of Frame Relay encapsulation types: Cisco and IETF. When you are

connecting to a non Cisco router the frame relay encapsulation type is IETF.

Incorrect Answers

A. HDLC stands for High level Data Link Control. This is the encapsulation type on synchronous serial links.

B. Point to Point Protocol (PPP). This provides for host to network and router to router connections over

synchronous and asynchronous circuits.

C. IETF should be used in this scenario. However, the default Frame Relay encapsulation type on Cisco routers

is Cisco.

E. Cisco routers support three types of LMIs: Cisco, ANSI and Q933a. This question is looking for the default

encapsulation type.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 418-420, 416, and 373-

374.

QUESTION NO: 4

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 5 -

The IP address 131.107.0.0 is a class B address. What is the range of binary values for the first octet in

this address class?

A. 10000000-11111111

B. 00000000-10111111

C. 10000000-10111111

D. 10000000-11011111

E. 11000000-11101111

Answer: C

Explanation: Class B addresses have a range of 128 – 191. One of these numbers would appear in the first

octet of a Class B address. 128 and 191 are converted to binary below:

128 64 32 16 8 4 2 1

128 1 0 0 0 0 0 0 0

191 1 0 1 1 1 1 1 1

Therefore the first octet converted to binary is 10000000 – 10111111.

Incorrect Answers

A: The 10000000-11111111 range, 128-255, does not define an address class.

B: The 00000000-10111111 range, 0-191, does not define an address class.

D: The 10000000-11011111 range, 128-223, does not define an address class.

E: The 11000000-11101111 range, 192-239, does not define an address class.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 220 – 223.

QUESTION NO: 5

TCP is a connection-oriented protocol. An advantage of operating in a connection-oriented environment

is that a connection is established between both ends before the transfer of information can begin. What

is a disadvantage of using a connection-oriented protocol such as TCP?

A. Packet acknowledgement may add overhead.

B. Packets are not tagged with sequence numbers.

C. Loss or duplication of data packets is more likely to occur.

D. The application layer must assume responsibility for correct sequencing of the data packets.

Answer: A.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 6 -

Explanation: One of the benefits of a connection-orientated protocol is that there is a guarantee of delivery of

data. This guarantee is provided as the two communicating exchange PDUs during transmission and if an

acknowledgement is not received then the data is retransmitted. As can be imagined this exchange of PDUs can

cause an increase in overhead.

Incorrect Answers:

B: Sequence numbers are added to insure correct order

C: Packet loss, duplication, and ordering are handled by connection-oriented protocols.

D: The transport layer (such as TCP) handles sequencing.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.

QUESTION NO: 6

Switches have three primary modes to handle frame switching. Which one of these modes looks at the

destination address and then immediately forwards the frame to the destination?

A. CSMA/CD

B. FULL DUPLEX

C. CUT THROUGH

D. HALF DUPLEX

E. FRAGMENTATION

F. STORE AND FORWARD

Answer: C.

Explanation:

In cut-through mode, the switch checks the destination address (DA) as soon as the header is received and

immediately begins forwarding the frame. Depending on the network transport protocol being used (connection

or connectionless orientate), there is a significant decrease in latency from input port to output port. The delay

in cut-through switching remains constant regardless of the size of the frame, because this switching mode starts

to forward the frame as soon as the switch reads the DA.

Incorrect Answers:

A: CSMA/CD is not a method of transporting frames. Rather it is a set of rules that are used to determine how

network devices will respond to two different devices attempting to communicate on a data channel at the

same time.

B: Full duplex refers to how two switches communicate with each other. In this case, there is a transmission of

data in two directions at the same time.

D: Half duplex refers to how two switches communicate with each other. With half duplex the communication

can only be in one direction and if not a collision will occur.

E: This is not a method of frame communication.

F: In store and forward the entire frame must first be received before it can be forwarded on.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 7 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-5.

QUESTION NO: 7

Which of the following are Application layer protocols that use TCP/IP? (Choose three.)

A. ARP

B. HTTP

C. SMTP

D. FTP

E. ICMP

Answer: B, C, D

Explanation: There are a number of TCP/IP application layer protocols. The common TCP/IP application

layer protocols include: FTP, Telnet, SMTP, and HTTP.

Incorrect Answers:

A. ARP operates at the Internetwork layer of the TCP/IP protocol stack.

E. ICMP operates at the Internetwork layer of the TCP/IP protocol stack.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 206 – 215.

QUESTION NO: 8

Two types of frame tagging are ISL and 802.lQ. What is the purpose of Frame Tagging?

A. They provide best path determination.

B. They allow the exchange of filtering tables.

C. They specify different implementation of the Spanning-Tree Protocol.

D. They provide inter-switch VLAN communication.

Answer: D

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 8 -

Explanation: The purpose of frame tagging (ISL tagging) is to interconnect multiple switches and to keep

VLAN information as it goes through various switches.

Incorrect Answers:

A, B, and C. This are not the purposed for frame tagging.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 186 – 187.

QUESTION NO: 9

You company has decided to use RIP version 1 as the routing on a Cisco router. What is the command to

enable rip as the routing protocol on the company’s router?

Answer: Router rip

Explanation: The key characteristics of RIP include: it is a distance vector protocol, hop count is the metric

used for path selection, it maximum allowable hop count is 15, it broadcasts it entire routing table every 30

seconds by default and it can be load balanced as many as six equal cost paths (4 paths are the default). To

configure RIP not only does the router rip command need to be inputted but also it must be followed by the

network command. The network command must be issued for each directly connected network.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-279.

QUESTION NO: 10

Your company has decided to use IP RIP version 1 as the routing protocol. Which of the following are

the commands you can use to configure IP RIP version 1 on your router?

A. Router RIP

network 172.16.1.0

network 10.1.0.1

B. Router RIP

network 172.16.0.0

network 10.0.0.0

C. Router RIP

network 172.16.1.0 172.16.1.1

network 10.1.0.0 10.1.1.1

D. Router RIP

network 172.16.1.0 265.255.255.0

Network 10.1.0.0 255.255.0.0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 9 -

Answer: B.

Explanation: To enable RIP version 1 not only does the router rip command need to be used but also it must be

followed by the network command. The network command must be issued for each directly connected

network. The network command must be followed by a valid network address.

Incorrect Answers:

A: Is this series of commands the network 10.1.0.1 is not a valid command.

C: If 4 networks are directly connected they must have their own network command.

D: There is no need to include a subnet mask with a network command.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-9.

QUESTION NO: 11

Spanning-Tree was originally developed by DEC. What is the reason Spanning-Tree is used in a

switched LAN?

A. To provide a mechanism for network monitoring in switched environments.

B. To prevent routing loops in networks with redundant paths.

C. To prevent routing switching loops in networks with redundant switched paths.

D. To manage, the addition, deletion, and naming of VLANs across multiple switches.

E. To segment a network into multiple collision domains.

Answer: B.

Explanation: The purpose of the Spanning Tree Protocol (STP) is to provide for redundant paths within a

switched environment while ensuring that there is a loop free network. This is done as the redundant ports are

blocked.

Incorrect Answers:

A. STP does not provide mechanism to monitor a switched network.

C. Loops are not referred to as “routing switching loops”.

D. STP is not used for VLAN management.

E. Switches create multiple collisions domains and not STP.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 155-156.

QUESTION NO: 12

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 10 -

Switches have three primary modes to handle frame switching. Which two statements about the store

and forward switching method are true? (Choose two)

A. Latency remains constant regardless of frame size.

B. Latency through the switch varies with frame length.

C. The switch receives the complete frame before beginning to forward it.

D. The switch checks the destination address as soon as it receives the header and begins forwarding the

frame immediately.

Answer B, C.

Explanation:

In store and forward mode, the switch must receive the complete frame before forwarding takes place. The

destination and source addresses are read, the cyclic redundancy check (CRC) is performed, relevant filters are

applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. The latency (or delay) through

the switch varies with frame length.

Incorrect Answers:

A: Is wrong because the latency changes with the frame size.

D: Is wrong because it waits for the complete name and not merely the destination address.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 162.

QUESTION NO: 13

Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers.

Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its

neighbor. The routers have been working properly.

The connection between North and Main ceases operation one day and an unauthorized entry is detected

on the South router.

Determine the problem and restore connectivity. The network has been configured with the following

characteristics:

The routers are named North, Main, South.

All networks have the default subnet mask.

RIP is the routing protocol.

The clocking signal is provided on the serial 0 interface.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 11 -

Lab 1

Name: North

E0: 192.168.159.1

S0: 192.168.75.1

Secret password : testk

Lab 2

Name: Main

E0: 192.168.112.1

S0: 192.168.201.1

S1: 192.168.75.2

Secret password : testk

Lab 3

Name: South

E0: 192.168.65.1

S1: 192.168.201.2

Secret password : testk

Start by clicking on host that is connected to the router you want to configure.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 12 -

Answer Lab 1:

<Click on Host2, which is connected to the Lab 1 router>

enable

config terminal

hostname North

enable secret testk

interface ethernet 0

ip address 192.168.159.1 255.255.255.0

no shutdown

exit

interface serial 0

ip address 192.168.75.1 255.255.255.0

clock rate 64000

no shutdown

exit

router rip

network 192.168.159.0

network 192.168.75.0

^z

copy running-config startup-config

Explanation:

Note: comments are added in text after the !-sign. They will not be shown during simulation.

First we click on the Lab 1 router.

Router Con0 is now available ! The router starts

Press RETURN to get started. ! Here we press return

Router>enable ! We must enter EXEC mode (or enable mode as it also called)

Router#config terminal ! We must enter configuration mode. Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname North ! We change the host name

North(config)#enable secret testk ! We set the password

North(config)#interface ethernet 0 ! We enter interface configuration mode for ethernet 0

North(config-if)#ip address 192.168.159.1 255.255.255.0 ! We set the IP address for Ethernet 0.

! Note that we use a 24 bit network mask.

!It is a class C address.

North(config-if)#no shutdown ! We start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 13 -

%LINK-3-UPDOWN: Interface Ethernet0, changed state to up

North(config-if)#exit ! We exit interface configuration for Ethernet 0

North(config)#interface serial0 ! We enter interface configuration mode for the serial0 interface.

! Note that there are no space in serial0

North(config-if)#ip address 192.168.75.1 255.255.255.0 ! IP address for serial0

! Cisco recommends to set the IP address of the interface before

! setting the clockrate

North(config-if)#clock rate 64000 ! We set a clockrate. We must do it to enable communication between

! the routers. They must be synchronized.

North(config-if)#no shutdown ! Start the serial0 interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up %LINK-3-UPDOWN: Interface Serial0, changed state to up

North(config-if)#exit ! Exit interface configuration mode

North(config)#router rip ! Start the routing protocol. RIP does not need further configuration.

! RIP works well in this small network.

! We enter router configuration mode.

North(config-router)#network 192.168.159.0 ! We enable RIP on the network of Ethernet E0.

North(config-router)#network 192.168.75.0 ! We enable RIP on the network of Serial0.

North(config-router)#^Z ! We exit configuration mode and return to enable mode. %SYS-5-CONFIG_I: Configured from console by console

North#copy running-config startup-config ! We save our configurations to NVRAM

Destination filename [startup-config]? ! We confirm with Enter.

North# ! We are finished.

You don't need to make full configuration because all routers have already been configured but they have some

mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but

better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add

the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks.

Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 374-403.

Note: If you are unsure of the testing environment, try the following address:

http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html

************************************

Answer Lab 2:

enable

config terminal

hostname Main

enable secret testk

interface ethernet 0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 14 -

ip address 192.168.112.1 255.255.255.0

no shutdown

exit

interface serial 0

ip address 192.168.201.1 255.255.255.0

clock rate 64000

no shutdown

exit

interface serial 1

ip address 192.168.75.2 255.255.255.0

no shutdown

exit

router rip

network 192.168.75.0

network 192.168.112.0

network 192.168.201.0^z

copy running-config startup-config

Explanation: Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make

sure that we enable RIP on all three interfaces with the network command.

******************************************

Answer Lab 3:

enable

config terminal

hostname South

enable secret testk

interface ethernet 0

ip address 192.168.65.1 255.255.255.0

no shutdown

exit

interface serial 1

ip address 192.168.201.2 255.255.255.0

no shutdown

exit

router rip

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 15 -

network 192.168.201.0

network 192.168.65.0

^z

copy running-config startup-config

Explanation: Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1.

QUESTION NO: 14

Which layer of the OSI model ensures reliable end-to-end delivery of data?

A. Application

B. Presentation

C. Session

D. Transport

E. Network

Answer: D

Explanation: The Transport Layer, Layer 4, of the OSI reference model provide to methods of end-to-end

delivery of data. These methods of delivery are reliable and unreliable. TCP is a reliable method and UDP is

unreliable.

Incorrect Answers:

A. The Application Layer is best described as the user interface. This is how users/applications access

protocols to access a network.

B. The Presentation Layer controls how data is presented and also provides other services such as encryption.

C. The Transport Layer is in charge of communication management (including establishing and terminating of

communication).

E. The Network Layer is responsible for an addressing scheme so that routers can determine a path.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 30.

QUESTION NO: 15

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 16 -

You company uses a switch in the training department. You need to be able to make changes to this

switch remotely so that you can allow different classrooms to have access to the Internet as needed. What

do you have to configure on this switch so that you can remotely make these changes? (Choose two.)

A. The switch name must match the workgroup name of the local network.

B. The switch must be configured with an IP address and default gateway.

C. The remote workstations must have access to the VSM of the switch.

D. CDP must be enabled on the switch so that other devices on the network can locate it.

Answer: B, C

Explanation:

To remotely configure a switch you will need to use the Visual Switch Manager (VSM). In order VSM to

function properly the switch will require an IP address and network connectivity. Remote locations must use a

web browser to connect to VSM.

Incorrect Answers:

A. VSM does not require that the switch name match the local workgroup name.

D. CDP is not required for VSM but it is used as an information-gathering tool.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 165 and 114.

QUESTION NO: 16

What one of the following is an example of a layer 2 MAC address?

A. 192.201.63.251

B. 19-22-01-63-25

C. 0000.1234.FEG

D. 00-00-12-34-FE-AA

Answer: D.

Explanation: MAC address is a uniquely assigned address to each device on the network. The MAC address is

48 bits in length and is expressed as hexadecimal digit. The first 6 digits specify the manufacturer ID and the

remaining 6 are unique to host. No two MAC addresses can be same. In addition MAC addresses are usually

comprised of 6 pairs, each pair can be two number, two letters or a combination of a number and a letter.

Incorrect Answers:

A: 192.201.63.251 contains to many number and is an IP address.

B: There only 6 pair combinations in 19-22-01-63-25.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 17 -

C: 0000.1234.FEG is short one letter or one number.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 20.

QUESTION NO: 17

You issue the command show ip route which of the following correctly describes the codes displayed

in your route table after you issue this command? (Choose two.)

A. I-Indicates a route was learned through an internal protocol.

B. S-Indicates a route was learned through static command.

C. R-Indicates a route was learned through RIP.

D. S-Indicates a route was learned through a serial port.

E. R-Indicates a route was learned through a reliable port.

Answer: B, C

Explanation:

B: S stands for static.

C: R stands for RIP.

Note:

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Incorrect Answers

A: I stands for a route learned through IGRP.

D: S stands for static.

E: R stands for RIP.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 280 – 281.

QUESTION NO: 18

What can you use to connect a user’s pc directly to a router?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 18 -

A. Connect the PC's COM port to the router's console port using a straight-through cable.

B. Connect the PC's COM port to the router's console port using a crossover cable.

C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable.

D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable.

E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable.

F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.

Answer: D.

Explanation: To connect the PC directly to the router we can use a cross-over RJ-45 cable and connect the

cable to an Ethernet port on the router and to the Network adapter on the PC.

Incorrect Answers

A, B: In order to connect to the console port of the router a rollover cable must be used.

C: To connect to an Ethernet port on the router we must use a network adapter on the PC.

E: A rollover cable can be used to connect a PC to the console port, not an Ethernet port, on the router.

Furthermore, one extra adapter would also be required.

F: A crossover cable must be used to directly connect a PC to a router.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 51 – 52.

QUESTION NO: 19

What are good reasons for using layer two switches? (Choose two)

A. To reduce collisions.

B. To increase collisions.

C. To increase the number of collision domains.

D. To decrease the number of collision domains.

E. To decrease the number of broadcast domains.

Answer: A, C.

Explanation:

A switch creates multiple collision domains, and reduces the number of nodes in the domain. This results in

less contention and interference which in turn reduces the number of collisions.

Incorrect Answers:

B: Switches are design to REDUCE collisions and not increase them.

D: When a switch segments a network it increase the number of domain and it does not reduce them.

E: A switch can neither increase nor decreases the broadcast domains.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 19 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 30-31.

QUESTION NO: 20

Full-duplex gives you the ability to send and receive data at the same time. Which of the following

Ethernet standards can operate in full-duplex mode? (Choose two.)

A. 10Base2

B. 10Base5

C. 10BaseT

D. 100BaseT

Answer: C, D

Explanation: In order for full duplex transmissions to be supported the “cable” requires a means by which to

receive and send transmissions at the same time. This is achieved through the use of twisted pairs. Both

10BaseT and 100BaseT utilize twisted pairs.

Incorrect Answers

A, B: Coaxial cable, either Thicknet (10Base5) or Thinnet (10Base2) only support one single transmission. If

there is more than one transmission then a collision will occur.

Reference:

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 15 – 16, and 164.

QUESTION NO: 21

Which of the following devices support Full Duplex Ethernet ? (Choose two.)

A. Switch to host.

B. Switch to switch.

C. Hub to hub.

D. Switch to hub.

E. Hub to host.

Answer: A, B

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 20 -

Explanation: Devices that are connected to switches can communicate in full duplex mode. This includes

switched that are connected to other switches.

Incorrect Answers:

C, D, and E. Hubs can only communicate in half duplex mode (CSMA/CD). Therefore none of these options

are correct.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 164 – 165.

QUESTION NO: 22

Which three are examples of the functions of connection oriented services? (Choose three)

A. Connection parameters are synchronized.

B. Any loss or duplication of packets can be corrected.

C. The data packet is independently routed and the service does not guarantee the packet will be

processed in order.

D. A data communication path is established between the requesting entity and the peer device on the

remote end system.

Answer: A, B, D.

Explanation:

In order to establish a connection-orientated service, the connection must first be established. An example of

this would the TCP/IP suites use of the three-way handshake. The sending and receiving of synchronization

and acknowledgment packets between the sending system and the receiving system accomplish a three-way

handshake. Errors can be corrected when the sender does not receive an acknowledgment, within a specified

amount of time, from the receiving system the packet will be resent.

Incorrect Answers:

C: Due to the acknowledgement of packets, the order that packets are received is ensured.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.

QUESTION NO: 23

What is the correct order of PDUs in data encapsulation?

A. Data, Frame, Packet, Segment, Bit

B. Data, Frame, Segment, Packet, Bit

C. Data, Packet, Frame, Segment, Bit

D. Data, Packet, Segment, Frame, Bit

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 21 -

E. Data, Segment, Frame, Packet, Bit

F. Data, Segment, Packet, Frame, Bit

Answer: F

Explanation: Encapsulation steps

Step 1: The application creates the data

Step 2: The transport layer segments the data.

Step 3: The network layer puts the data into packets.

Step 4: The data link layer puts data into frames.

Step 5: The physical layer transmits the bits.

Reference: Wendell Odom. Cisco CCNA Exam #640-607 Certification Guide. (Cisco Press: 2002) page 96.

QUESTION NO: 24

If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary.

Which of the following is the correct bit pattern for the first octet?

A. 0xxxxxxx

B. 10xxxxxx

C. 110xxxxx

D. 1110xxxx

E. 11110xxx

Answer: A

Explanation: The range for Class A address is 1 to 126. 10 convert into binary is 00001010. The only answer

that follows this pattern is A.

Incorrect Answers:

B. With a 1 in the first bit of the binary number the value will be at least 128. 128 is above the range of Class

A addresses.

C. With ones in the first 2 bits the value for the octet will need to be 192 or greater. This is outside the range of

Class A addresses.

D. With ones in the first 3 bits the value for the octet will need to be 224 or greater. This is outside the range of

Class A addresses.

E. With ones in the first 4 bits the value for the octet will need to be 240 or greater. This is outside the range of

Class A addresses.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 22 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 221 – 223.

QUESTION NO: 25

Which of the following statements about a reliable connection oriented data transfer are true? (Choose

two)

A. Recipients acknowledge receipt of data.

B. When buffers are filled to capacity, datagrams are discarded and not re transmitted.

C. Windows are used to control the amount in outstanding acknowledged data segments.

D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection.

E. The receiving device waits for acknowledgements from the sending device before accepting more data

segments.

Answer: A, C.

Explanation:

Connection orientated protocols, such as TCP, communication use acknowledgement of packets. This is how

error control is possible. To govern the flow of data between devices, TCP uses a flow control mechanism.

The receiving TCP reports a “window” to the sending TCP. This window specifies the number of octets,

starting with the acknowledgment number, that a receiving TCP is currently prepare to receive.

TCP windows sizes are variable during the lifetime of the connection. Each acknowledgment contains a

window advertisement that indicates how many bytes the receiver can accept. TCP also maintains a congestion

control window that is normally the size as the receiver’s window but is cut in half when a segment is lost (for

example, there is congestion). This approach permits the window to be expanded or contracted as necessary to

manage buffer space and processing.

Incorrect Answers:

B: With connection orientate protocols packet delivery is guaranteed. Packet will not be dropped. Flow

control (windowing) addresses the buffer issue.

D: If the sending system does not receive an acknowledgement from the receiving system then the packet will

be resent.

E: The receiving device sends the acknowledgement of packets and this states how much data the receiving

device can receive.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 213-4.

QUESTION NO: 26

Which two statements are valid? (Choose two.)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 23 -

A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a

private broadcast domain.

B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions.

C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth.

D. Full-duplex Ethernet provides lower throughput than half-duplex Ethernet of the same bandwidth.

E. Full-duplex Ethernet consists of a shared cable segment while half-duplex Ethernet provides a point-to-

point link.

Answer: B, C

Explanation: Full-duplex involves only two participants. Both can transmit simultaneously. Half-duplex, on

the other hand, can have many participants on the same network segment. Only one be transmitting at a time.

B: Using Full-Duplex only two participants ensures that there can be no collisions. Half-duplex must use

CSMA/CD to handle the collisions.

C: Full-duplex mode is faster than half-duplex.

Incorrect Answers

A: All nodes on a half-duplex Ethernet segment share the same broadcast domain.

D: The opposite is true.

E: The opposite is true.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 164 – 165.

QUESTION NO: 27

What is the network address for a host with the IP address 123.200.8.68/28?

A. 123.200.8.0

B. 1231.200.8.32

C. 123.200.8.64

D. 123.200.8.65

E. 123.200.8.31

F. 123.200.8.1

Answer: C

Explanation: In a network with 28 network bits only the last four bits are used for the hosts. We write the 4th

octet in binary:

68 decimal = 01000100 binary (64+4)

We have to clear all host bits:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 24 -

01000000 binary = 64 decimal

The network part is 123.200.8.64.

Incorrect Answers:

A. For the network to be represented as 123.200.8 then the IP address would need a /24 at the end. In this case

/28 was used.

B, D, E, and F. In these cases with the IP address provided these options are impossible.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 227 – 232.

QUESTION NO: 28

How does a layer two device such as a bridge or switch function?

A. It maintains a table of the IP address of the host connected to its internet segment

B. It passes packets outside of its network segment if its IP address cannot be found on its table.

C. It looks up the frames destination in its address table and sends the frame towards the destination.

D. It maintains the table of the data link layer and network layer addresses for the host connected to its

network segment.

Answer: C.

Explanation:

A transparent bridge stores information in memory in what is called a “forwarding table”. The forwarding table

lists each end station (from which the bridge has heard a frame within a particular time period) and the segment

on which it resides. When a bridge hears a frame on the network, it views the destination address and compares

it to the forwarding table to determine whether to filter, flood or copy the frame into another segment.

Incorrect Answers:

A: The forwarding table does not contain a list of IP address. Rather it contains a list of devices that it is

connect to and on which segment each device resides.

B: If the destination device is unknown to the bridge, the bridge forwards the frame to all segments except the

one on which it was received. This process is known as flooding.

D: The device maintains a list of the data link layer addresses for host connected to its network segment.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 22.

QUESTION NO: 29

Which of the following are reasons to use VLANs? (Choose three.)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 25 -

A. They increase the size of collision domains.

B. They allow logical grouping of users by function.

C. They enhance network security.

D. They increase the size of broadcast domains while decreasing the number of broadcast domains.

E. They increase the number of broadcasts domain while decreasing their size.

F. The simplify switch administration.

Answer: B, C, E

Explanation:

B: Users can logically be grouped into VLAN.

C: By grouping users into different VLANs, a secure VLAN can be created. Only some users could be allowed

to access the secure VLAN. This improves security.

E: Each separate VLAN is a separate broadcast domain. Creating VLAN increase the number of broadcast

domains and decrease the size of each broadcast domain.

Incorrect Answers

A: The size of the collision domain decreases by the use of VLANs.

D: The opposite is true.

F: VLANs must be configured so VLANs increase the switch administration.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 179 – 182.

QUESTION NO: 30

You need to segment your network which of the following hardware devices can you use to segment your

network? (Choose three.)

A. Hub

B. Repeater

C. Switch

D. Bridge

E. Router

F. Media converter

Answer: C, D, E

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 26 -

Explanation:

C: A switch is able to segment the network at the data link layer.

D: A bridge is able to segment the network at the data link layer.

E: A router is able to segment the network at the network layer.

Incorrect Answers

A: A hub regenerates and/or redistributes signal and work at physical layer of the OSI model and is unable to

segment the network.

B: A repeater only regenerates the signal and works at physical layer of the OSI model and is unable to

segment the network.

F: Media converter only connects dissimilar media, and connects them into a single segment.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 16 – 17.

QUESTION NO: 31

Your company is concerned about Security on your network. Each department has its own file server

and the company also has an enterprise server that is shared by all departments. The accounting

department is concerned about the accounting information being accessible from the other departments.

What can you as the network administrator use to control the information so that it’s not being passed

between the departments?

A. Bridge between management and sites.

B. Routers to provide the most secure segmentation.

C. A hub to provide the ease of management and a satisfactory alternative for the network security.

D. An Ethernet switch to secure separation through programming the access list of each port of the switch.

Answer: B.

Explanation:

Routers provide better separation, dividing the segments into both separate collision and broadcast domains, and

provide access lists for controlling security.

Incorrect Answers:

A, C, D: Are Layer 2 devices, which breaks up the collision domains, but is still one broadcast domain. Security

and filtering within these devices are primitive (although switching is a little more advanced). Any filtering that

can be done at layer 2 is primitive and requires a lot of administrative effort.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 18-28.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 27 -

QUESTION NO: 32

What are the advantages of using the OSI layered network model? (Choose three.)

A. Allows multiple-vendor development through standardization of network components.

B. Creates a list of communication rules that all companies must implement to get onto the Internet.

C. Allows various types of network hardware and software to communicate.

D. Prevents changes in one layer from affecting other layers, so it does not hamper development.

E. Allows companies to develop proprietary interfaces.

Answer: A, C, D

Explanation:

A: The OSI model promotes standardization.

C: The layered approach allows various types of network hardware and software to communicate.

D: Each layer should be a separate black box. A change in one layer would not impact other layers.

Incorrect Answers

B: The OSI model does not contain standardization of applications in this way.

E: Proprietary interfaces do not fit within the OSI model.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 11.

QUESTION NO: 33

You have a leased line configured at a small office that connects to the corporate office. You company

would also like to have a backup incase the lease line goes down. Which WAN service would you most

likely choose to backup the leased line?

A. Frame relay with SVC

B. Dedicated serial line

C. ISDN with DDR

D. ATM

Answer: C

Explanation: ISDN is a low-cost backup solution that only is used when it is needed. DDR (dial-on-demand)

dials up the remote site when traffic needs to be transmitted.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 28 -

Incorrect Answers

A: Frame Relay is a high-performance solution and would be a costly backup solution.

B: There is no need to use a dedicated connection. We only need to use the connection if the main line goes

down.

D: ATM is a high-performance solution and would be a costly backup.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 368 – 373 and 387 –389.

QUESTION NO: 34

What was one of the most important reasons the International Organization for Standardization released

the OSI model?

A. Users could access network server faster.

B. Different vendor’s networks could work with each other.

C. The industry could create a standard for how computers work.

D. The network administrator could increase the overall speed of their network.

Answer: B.

Explanation:

The ISO model separated the various functions so that a vendor did not have to write an entire stack. One

vendor could write device drivers for their device, and not worry about higher layers, and the work can be

contained and modularized. This also speeds up the process of bringing a product to market, as it minimizes

code that a vendor needs to write.

Incorrect Answers:

A: The ISO model does not make things faster; overall they might slow things down a bit because of the

overhead of passing data through the layers.

C: This ISO model is for networking, not computer functions.

D: The ISO model does not provide any speed boost.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10-12.

QUESTION NO: 35

Which channels are used by ISDN BRI?

A. 2d+b

B. 23d+b

C. 2b+d

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 29 -

D. 23b+d

Answer: C

Explanation: ISDN BRI has two Bearer Channels (B) and a Signaling channel (D).

Reference: Cisco CCNA Exam #640-607 Certification Guide. (Cisco Press: 2002) page 549.

QUESTION NO: 36

Access-list 122 permit ip 131.107.30.0 0.0.0.255 any

You apply the access-list above. Which is the effect?

A. Permit all packets matching the first three octets of the source address to all destinations.

B. Permit all packets matching the last of the destination address and accept all source address.

C. Permit all packets from the third subnet of the network address to all destinations.

D. Permit all packets matching the host bits in the source address to all destinations.

E. Permit all packets to destination matching the first three octets in the destination address.

Answer: A

Explanation: This is an extended access list that permits source packets matching the first three octets of the

131.107.30.0 address. Furthermore, the any keyword specifies that all destinations will be accepted.

Note: Syntax for an extended access list

access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-

wildcard [precedence precedence] [tos tos]

Incorrect Answers

B: The source-wildcard is specified first before the destination wildcard.

C: All source addresses matching the first three octets of 131.107.30.0 will be permitted.

D: The mask used in access-list does not work as a subnet masks. A 0.0.0.255 access-list mask matches the first

three octets, not the last “host” octet.

E: The first three octets in the source, not destination, address must match. All destination addresses are

allowed with the any keyword.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 30 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304 – 306.

QUESTION NO: 37

Using a class C address range 192.168.21.12 your network needs twenty-eight subnets. Which subnet

mask should you use?

A. 255.255.0.28

B. 255.255.255.0

C. 255.255.255.28

D. 255.255.255.248

E. 255.255.255.252

Answer: D

Explanation: We need to expand the class C subnet mask, and based on the calculation above, the last octet is

divided into 5 bits network, 3 bits host, which is 248.

By using 5 bits of subnetting for the network subnet, you leave 3 bits for hosts.

128 64 32 16 8 4 2 1

x x x x x 5 bits of subnetting for network

x x x 3 bits of subnetting for host

So, the value is 128+64+32+16+8 = 248

A quick way to determine the required subnet mask for Class C addresses you can also use the table below:

(Please note: in this case as you need 28 subnets you need to use the 255.255.255.248 subnet. Always pick the

subnet mask that supports your requirements. This may mean you waste subnets and hosts but you will meet

your requirements.)

NUMBER OF BITS SUBNET MASK NUMBER OF

SUBNETS

NUMBER OF

HOSTS

2 255.255.255.192 2 62

3 255.255.255.224 6 30

4 255.255.255.240 14 14

5 255.255.255.248 30 6

6 255.255.255.252 62 2

Incorrect Answers:

A and C: It is not even a valid subnet mask, a valid subnet mask is a continuous string of one bits, then

followed by a continuous string of zero bits. Answer A and C both break this rule.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 31 -

B: This is a full Class C subnet mask, and only provides for ONE network, and we need 28.

E: This gives us 6 bits of network, and the problem calls for 5.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 228 – 236.

QUESTION NO: 38

Cisco supports three types of switching modes on switches. Which mode of switching can have a variable

latency through the switch?

A. Store-and-forward.

B. Cut-through.

C. Fragment-free.

Answer: A

There are 3 primary operating modes that are used for frame switching. These modes are sore-and-forward,

cut-through and fragment free. When store-and-forward is used the switch must receive the whole frame before

it can be forwarded. This makes the latency time variable.

Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163.

Incorrect answers:

B: During a cut-through operation, the switch forwards the frame once it receives the Destination Address.

This keeps the latency constant.

C: The fragment-free mode reads only the first 64 bytes before forwarding the frame. This makes the latency

time practically constant.

QUESTION NO: 39

Your company has purchased some Cisco routers from an online auction. You need to make a backup

copy of the IOS and store it on a TFTP server. Which of the following should be done prior to copying

the IOS image to a TFTP server? (Choose three.)

A. Make sure that the network server can be accessed.

B. Check that the authentication for access is set.

C. Ensure that the network server has adequate space for the code image.

D. Verify any file naming and path requirements.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 32 -

E. Make sure that the server can load and run the bootstrap code.

Answer: A, C, D

Explanation:

A: The TFTP server must be accessible from the router.

C: The TFTP server must be able to store the IOS image.

D: The file naming convention and the path of the TFTP server must be checked.

Incorrect Answers

B: TFTP does not use authentication.

E: The TFTP server does not have to boot IOS. It can use any operating system with network functionality.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 132 – 134.

QUESTION NO: 40

Which of the following correctly identifies switched and routed data flow?

A. Switches create a single collision domain and a single broadcast domain. Routers provide separate

broadcast domains.

B. Switches create separate collision domains but a single broadcast domain. Routers provide separate

broadcast domains.

C. Switches create a single collision domain and a separate broadcast domain. Router provides a separate

broadcast domain as well.

D. Switches create separate collision domains and separate broadcast domains. Routers provide separate

collision domains.

Answer: B

Explanation:

Switches break up the collision domains, but it is still a single broadcast domain. Routers also create separate

collision domains, but also separate broadcast domains, as routers usually do not pass broadcast traffic.

Incorrect Answers:

A: Switches create multiple collision domains.

C: Switches maintain one broadcast domain, and separate/multiple collision domains.

D: Switches maintain one broadcast domain.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 30-31.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 33 -

QUESTION NO: 41

Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP

and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the

possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.)

A. Link-state advertisement (LSA)

B. Spanning Tree Protocol.

C. Shortest path first tree.

D. Split horizon.

E. Hold-down timers.

Answer: D, E

Explanation: RIP and IGRP are distance vector routing protocols. RIP and IGRP use holddown counters and

split horizon to prevent route looping.

Note: Hold-downs are used to prevent regular update messages from inappropriately reinstating a route that

might have gone bad.

Split horizons derive from the premise that it is never useful to send information about a route back in the

direction from which it came.

Incorrect Answers

A: Link-state routing protocols use LSAs. However, LSAs are not used by distance vector routing protocols

like RIP or IGRP.

B, C: The spanning tree protocol and the shortest path first tree is used by Layer 3 routing protocol such as

Enhanced IGRP or OSPF, not by RIP or IGRP.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 266 – 268.

QUESTION NO: 43

You just finished installing a new operating system on a computer located in the accounting department.

You would like to verify the network configuration from the new computer so you establish FTP

connection to a remote TFTP server. Which layer of the OSI model did you use for this operation?

A. Application

B. Presentation

C. Session

D. Transport

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 34 -

E. Data link

F. Internet

Answer: A

Explanation: The Application layer is the layer at which users use protocols to achieve access to the network.

Using FTP to connect to a TFTP server is an excellent example.

Incorrect Answers

B. The presentation layer is focused on ensuring that data is readable once it has crossed the network.

C. The session layer of the OSI model is responsible for communication. That is, the establishment,

management, and ending of communication.

D. The transport layer is focused on providing the establishment guidelines of communication.

E. The data link layer provides the details on where the data is coming from and where it is going.

F. The internet layer is not a layer of the OSI Model. It is a layer in the TCP/IP model that corresponds to the

network layer of the OSI model.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 18.

QUESTION NO: 44

Match the OSI layer with the appropriate description.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 35 -

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 36 -

Answer:

Explanation: The transport layer assembles the packets into data, and prepares the data for the session layer

above. The Network layer determines the route of moving data. Remember the Network layer is layer 3, and

routers work on layer 3. The network layer includes routing functions, and keep this in mind when the question

says determines the best way to move data. On the data link layer, the actual transmission occurs.

The physical layer does not modify the data and package it, not is involved with addressing and routing, so it

does not apply. The session layer also does not modify data or determine routes or transmit data, so it would not

apply to any of the above.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 12-13.

QUESTION NO: 45

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 37 -

You have installed a new PC to your access layer switch. You have configured the IP address, subnet

mask, default gateway, and DNS settings. You have verified that the information you have entered is

correct and that the proper cable was used however this PC is unable to access devices that are connected

to the same switch. What is the likely cause of this problem?

A. The router lacks a routing table entry for the new host.

B. The host switch port is assigned to the incorrect VLAN.

C. The host MAC address is incorrectly configured.

D. A VTP instance for the new host has not been installed.

Answer: B

Explanation: In order for a host to access a switch the host switch port must be configured for the correct

VLAN. By default VLAN 1 is configured for the ports.

Incorrect Answers

A: Hosts do not need route entries at the router.

C: This would cause this behavior.

D: There is no such ting as VTP instance.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 193 – 198.

QUESTION NO: 46

Cisco supports three different LMI types for Frame Relay. Which of the following are the type LMI

types? (Choose three.)

A. IETF

B. Q931

C. Q933A

D. IEEE

E. CISCO

F. ANSI

Answer: C, E, and F

Explanation: The Supported LMI Types are cisco (the default), ansi, and q933a.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 38 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 415 – 416.

QUESTION NO: 47

Which hardware device enables high-speed data exchange on a LAN?

A. Hub

B. Bridge

C. Switch

D. Repeater

Answer: C

Explanation:

A switch can be used to gain high-speed data transfer between segments, especially when cut through is used.

The internals of the switch are specifically designed for high-speed transfer, even with high volumes.

Incorrect Answers:

A: A hub causes the segment to be shared, and collisions slow down the segment. A hub does not cause

segmentation.

B: A bridge usually separates a small amount of segments and with large amounts of data transfer across the

bridge; the bridge can become a bottleneck.

D: A repeater extends the distance of the segment by amplifying electrical signals, but does not segment the

LAN.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 32-38.

QUESTION NO: 48

To perform password recovery on a Cisco router you have to modify which of the following? (Choose

two.)

A. Nvram

B. Configuration register

C. Boot flash

D. Cmos

E. Flash

Answer: A, B

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 39 -

Explanation: During the password recovery procedure NVRAM and the configuration register are resetted.

Reference: Password Recovery Procedure

http://www.cisco.com/warp/public/474/pswdrec_2500.html

QUESTION NO: 49

You just purchased a brand new Cisco 2621 router. By default when the router boots which search

sequence does it use to locate the IOS software?

A. Flash, TFTP server, ROM

B. NVRAM, TFTP server, ROM

C. ROM, Flash, TFTP server

D. ROM, NVRAM, TFTP server

Answer: A

Explanation: First FLASH is used to load the IOS image. If that fails, the IOS image is loaded from a TFTP

server. It that fails as well then a minimal IOS is loaded from ROM.

Incorrect Answers

B: NVRAM is used to store configuration data, not IOS images.

C, D: Only if there is no IOS image in Flash memory or at FTP server, a basic version of IOS loaded from

ROM.

QUESTION NO: 50

You would like the router to look in NVRAM upon boot up. Which one of the following would be the

correct value for the configuration register?

A. 0x42

B. 0x2102

C. 0x001

D. 0x2101

Answer: B

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 40 -

Explanation: The factory-default setting for the configuration register is 0x2102. This indicates that the router

should attempt to load an IOS image from Flash memory and load the startup configuration. Flash memory is

also known as NVRAM.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 126 – 128.

QUESTION NO: 51

Which of the following are true about connection-oriented network servers? (Choose two.)

A. Non-reliable

B. Reliable

C. Less bandwidth-intensive

D. Handshaking

Answer: B, D

Explanation: Connection orientation connections are considered reliable as they ensure the deliver of data.

This is done through acknowledgements. Further when establishing a communication a three-way handshake is

used.

Incorrect Answers:

A. Connection orientated communication is reliable.

C. Due to the acknowledgements connection orientated communications are very bandwidth intensive.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 – 30.

QUESTION NO: 52

You have been hired as a consultant to troubleshoot the company’s network. You issue the debug ip rip

command to troubleshooting the rip network. You notice your Ethernet interface 10.1.0.0 shuts down.

Which update message is seen in your routers debug ip rip output regarding that network?

A. Subnet 10.1.0.0, metric 0

B. Subnet 10.1.0.0, metric 1

C. Subnet 10.1.0.0, metric 15

D. Subnet 10.1.0.0, metric 16

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 41 -

Answer: D

Explanation: RIP (Routing Information Protocol) is a distance vector protocol. RIP uses hope counts as

metric. The designers of RIP believed that the protocol was unlikely to be practical for networks with a

diameter larger than 15. The maximum hop count is therefore set to 15. In RIP when a network in not reachable

then its metric is changed to 16.

Incorrect Answers:

A: A metric of 0 denotes a directly connected route and indicates that the interface is up,.

B: This metric indicates that the interface is up and that the destination is reached with a hop count of 1.

C: This metric indicates that the interface is up and that the destination is reached with a hop count of 15.

RFC2453, RIP Version 2

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 276 –

278.

QUESTION NO: 53

You have been assigned a class C network address. Your manager has asked to you create 30 subnets

with at least 5 hosts per subnet for the different departments in your organization. What should the

subnet mask be to create 30 subnets?

Answer: 255.255.255.248

Explanation: We need 3 bits for the hosts (2^3-2=6 > 5). This would provide for 30 subnets (2^5-2=30). A 29-

bit (24 + 5) network mask translates the 4th

octet to 248 (=11111000 binary). The network mask used should be

255.255.255.248.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 225 – 226 and 236.

QUESTION NO: 54

Your manager is concerned about security on the subnet 10.0.1.0/24 that has the accounting servers on it.

He would like to make sure users can not telnet to those accounting servers and as asked you to add a

statement to your existing access-list to prevent users from accessing those devices via telnet. Which one

of the following statements should you enter?

A. Access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet

B. Access-list 115 deny tcp any 10.0.1.0 eq telnet

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 42 -

C. Access-list 115 deny udp any 10.0.1.0 eq 23

D. Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23

E. Access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23

Answer: D

Explanation: We must use an extended access list. The correct answer is:

Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23

115 - the access-list number

deny – the access list denies traffic

any – any source is allowed

10.0.1.0 0.0.0.255 – allows any destination with addressing with the pattern 10.0.1.x

eq 23 – select the telnet port (TCP 23)

Note: Syntax extended access list.

access-list access-list-number [dynamic list-name [timeout value]] {deny | permit} protocol source source-

wildcard destination destination-wildcard [precedence precedence] [tos tos] [log| log-input]

Incorrect Answers

A: We must specify both source (source + source wildcard) and destination (destination + destination

wildcard). Furthermore the mask is incorrect. The mask cannot be used as a subnet mask.

B, C: No destination wildcard is specified.

E: We cannot specify telnet as protocol. We specify it as a port with the eq 23 (or eq telnet)

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304 – 306.

QUESTION NO: 55

You purchased a router from an online auction and you are unable to login to privileged mode because

the router has been configured with a password. You need to perform password recovery. One of the

first steps in performing password recovery is recording the current configuration register setting from

user mode. What is the command to view the configuration register?

A. Show register.

B. Show flash.

C. Show boot.

D. Show version.

Answer: D

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 43 -

Explanation:

The show version command displays version information for the hardware and firmware. This includes the

register settings.

Incorrect Answers:

A: This is not a valid command.

B: The show flash command displays information in relation to router memory and image file.

C: The show boot IOS command displays the settings of the boot environment variables.

Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 128-137.

http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1214ea1/3550cr/ccimtoc.htm

QUESTION NO: 56

What are the generic parts of a layer 3 address?

A. An internetnetwork number and a URL .

B. A vendor code and a serial number.

C. A network number and host number.

D. A broadcast number and unicast number.

E. A domain identifier and a device identifier.

Answer: C

Explanation: The network layer address exists at Layer 3 of the OSI reference model. These address are

hierarchical in that they define networks first and then devices or nodes on each of the networks.

Incorrect Answers:

A: A URL is used in the application layer, (HTTP).

B: This is describing a MAC address that is Layer 2.

D: This is not an addressing mode.

E: This is used in the application layer, Domain for DNS.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 20-29.

QUESTION NO: 57

There are some differences between routed and routing protocols. Which of the following are examples

of those differences? (Choose two.)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 44 -

A. A routed protocol is assigned to an interface and determines the method of packet delivery.

B. A routing protocol determines the path of a packet through a network.

C. A routed protocol determines the path of a packet through a network.

D. A routing protocol operates at the transport layer of the OSI model.

E. A routed protocol updates the routing table of a router.

Answer: A, B

Explanation:

A: A routed protocol delivers data.

B: A routing protocol routes data.

Incorrect Answers

C, E: A routed protocol only delivers data, it does not route data or update any routing tables.

D: A routing protocol does not work at transport layer, layer 4. Many routing protocols work at layer 3, the

network layer.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 254 – 255.

QUESTION NO: 58

Which show commands can you use to identify the local DLCI number? (Choose two.)

A. Show frame-relay local-dlci

B. Show frame-relay pvc

C. Show frame-relay dlci

D. Show frame-relay map

E. Show ip route

Answer: B, D

Explanation:

B: The Show frame-relay pvc command is used to display statistics about PVCs for Frame Relay interfaces.

The statistical information include the DLCI number of the interface..

D: The show frame-relay map command displays the current map entries and information about the

connections. This information includes the DLCI number.

Incorrect Answers

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 45 -

A, C: There are no such commands.

E: The routing information, which is produced by the show ip route command, does not include any DLCI

number.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 422 – 423 and 280.

QUESTION NO: 59

When setting up Frame Relay for point-to-point subinterfaces, you enter the following configuration:

Router(config)#int s0/0 Router(config-if)#ip address 10.39.0.1 255.255.0.0 Router(config-if)#encapsulation frame-relay Router(config-if)#interface s0/0.39 point-to-point Router(config-if)#frame-relay interface-dlci 139 Router(config-if)#exitRouter(config)#exitRouter#copy run start

Which of the following must not be configured?

A. The Frame Relay encapsulation on the physical interface.

B. The local DLCI on each subinterface.

C. An IP address on the physical interface.

D. The subinterface type as point-to-point.

Answer: C

Explanation:

When setting up Frame Relay for point-to-point subinterfaces it is recommend that the network layer address,

the IP address, should be removed from the physical interface. The network layer address should be configured

to the subinterface instead.

Incorrect Answers:

A: When establishing a Frame Relay for point-to-point subinterfaces the Frame Relay encapsulation on the

physical interface must be configured.

B: When establishing a Frame Relay for point-to-point subinterfaces the local DLCI on each subinterface must

be configured.

D: When establishing a Frame Relay for point-to-point subinterfaces the subinterface must be configured as

point-to-point.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 427-429.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 46 -

QUESTION NO: 60

What is an advantage of segmenting your LAN with a switch?

A. Smaller collision domains.

B. Elimination of broadcast.

C. Decrease cost of implementation.

D. Larger number of users within the same domain.

Answer: A

Explanation:

By making more collision domains, each domain is smaller, resulting in fewer collisions, and thus an advantage.

Incorrect Answers:

B: Broadcast still occurs on the segments, even with routers.

C: Due to extra hardware, or more advanced hardware, implementation is higher.

D: By segmenting you are decreasing the number of users, thus reducing the number of contenders for the

medium.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 30-31.

QUESTION NO: 61

Your ISP has provided you the following class B network range 131.107.0.0/24. Which of the following

statements is true regarding this network? (Choose two.)

A. There are 254 usable hosts per subnet.

B. There is one usable network.

C. There are 255 usable hosts per subnet.

D. There are 254 usable subnets.

E. There are 30 usable subnets.

F. There are 62 usable hosts per subnet.

Answer: A, D

Explanation:

A: There are 8 bits for the hosts (32-24). We use the formula 2^number_of_host_bits-2. So there are 254 hosts

(2^8-2) per subnet.

D: There are 8 bits for the subnets (8 bits for hosts, 16 bits for the class B subnet: 32-8-16). Cisco want us to

use the formula 2^number_of_subnet_bits-2. This gives 254 (2^8-2) possible subnets.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 47 -

Note: Cisco routers are able to use 256 subnets. In Microsoft exams the correct answer would be that 256

subnets are available.

Incorrect Answers

B: According to Cisco there are two unusable networks namely 131.107.0.0/24 and 131.107.255.0/24.

C: Only 254 hosts are usable on each subnet. The lowest IP address in subnet is the subnet number. The highest

address is the broadcast address.

D, E: This are incorrect as well.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 235.

QUESTION NO: 62

You just purchased a Cisco router from an online auction and now you have configured the router and

everything is working perfectly in your test lab. You then issue the command copy run start to save your

configuration to NVRAM. You turn off the power and mount the router in the production rack. After

connecting the power cord you power up the router and the router boots into setup mode. You issue the

show startup-config from privileged mode and your entire configuration is there. Which of the following

indicates a possible source of the problem?

A. Hardware failure NVRAM prevents the router from loading the configuration.

B. Startup-config in flash is corrupt and cannot be analyzed.

C. Router configuration register set to bypass startup configuration.

D. Startup-config in NVRAM is corrupt and cannot be analyzed.

Answer: C

Explanation: We must bypass the startup configuration and boot from ROM. This will enable use to select a

new user name and password which will enable us to access the router. Basically we perform a password

recovery procedure.

Reference: Password Recovery Procedure

http://www.cisco.com/warp/public/474/pswdrec_2500.html

QUESTION NO: 63

Once you have defined interesting traffic with the dialer-list command, you then must associate an ISDN

phone number with the next hop router address. Which IOS command should you use?

A. Isdn destination number.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 48 -

B. Dialer map.

C. Isdn spid1.

D. Isdn line number.

Answer: B

Explanation:

The dialer map command is used to define one or more dial-on-demand numbers to reach one or more

destinations for a particular interface. This is the exact command to associate an ISDN phone number with the

next hop router address.

Incorrect Answers:

A: This is not a valid command.

C: The isdn spid1 command specifies the SPID required for b channel to access the ISDN network when your

router makes its call to the local ISDN exchange.

D: This is not a valid command.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 397-406.

QUESTION NO: 64

You have just purchased a new Cisco router. Which mode should you use to create an initial

configuration on your router?

A. Copy mode.

B. User mode.

C. Setup mode.

D. Startup mode.

Answer: C

Explanation:

If no configuration file exists for the router in NVRAM, the operating system executes a question driven initial

configuration routine often referred to as the system configuration dialog. This special mode is also known as

the setup dialog.

Incorrect Answers:

A: There is no copy mode

B: You can’t do configurations in user mode. The router only enters this mode when it has already been

configured.

D: There is a startup procedure but nor a startup mode.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 49 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 82-84.

QUESTION NO: 65

If RIP uses hop count to determine the best path what does IGRP use?

A. The highest metric value.

B. The lowest composite metric value.

C. The lowest hop-count and delay.

D. The highest bandwidth and reliability

E. The lowest administrative distance.

Answer: B

Explanation: IGRP calculates the metric by adding together weighted values of different characteristics of the

link to the network in question.

Incorrect Answers:

A. IGRP select the route with the lowest metric value as the best route.

C. Hop count is not one of the parts of the IGRP composite metric.

D. IGRP uses the lowest bandwidth value when selecting a path.

E. Administrative distance is not part of the IGRP composite metric.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 283 – 284.

QUESTION NO: 66

Exhibit

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 50 -

You are network administrator for the network shown in the exhibit above. Adding the new router,

called TK2, the network has been augmented. You would like to backup the IOS image of the new router

to the TFTP server. However, the backup procedure fails.

What could be the cause of the problem?

A. Incorrect default gateway of the tftp server.

B. Incorrect subnet mask of the tftp server.

C. Incorrect IP address of the tftp server.

D. Incorrect IP address on E0 of the TK1 server.

E. Incorrect subnet mask on the TK2 router.

Answer: B

Explanation: The subnet mask of the tftp server must match the subnet mask of the local ethernet interface of

the TK1 router.

Incorrect Answers

A: The default gateway of the TFTP server is the local e0 interface of TK1. This is the correct setting.

C: The IP address of the TFTP server is in the appropriate network range.

D: The IP address of the E0 interface of TK1 is in the appropriate network range.

E: The subnet mask of TK2 seems to be correct. It is the same as the subnet mask of the laptop client PC.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 237 – 239.

QUESTION NO: 67

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 51 -

Central Partial Configuration

isdn switch-type basic-ni username Remote password king interface bri0

ip address 10.1.1.1 255.255.255.0 encapsulation ppp ppp authentication chap isdn spid1 51055512360001 isdn spid1 51055512360002 dialer map ip 10.1.1.2 name Remote 1238001

dialer-list 1 protocol ip permit

Your company is using ISDN to connect the Remote office to the Central office. The connection is not

working between the two routers. You issue the show running-config command looking at the

configuration above. Which additional command must be issued on the Central router before interesting

traffic will be sent to the Remote router?

A. (config-if)# dialer-group 1

B. (config-if)# dialer-list 1

C. (config-if)# dialer map 1

D. (config-if)# dialer-route 1

Answer: A

Explanation:

Once the above commands have been entered to enabled DDR, then the last step required is to bind the traffic

destination to an interface by linking the interesting traffic definition already created. This is done with the

dialer-group command. In this case the proper command would be (config-if)# dialer-group 1.

Incorrect Answers:

B: The interesting traffic was already identified the first time the dialer-list 1 command was used.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 52 -

C: The dialer map command is used to identify the router to be dialed. In this case this has already been done.

D: There is no such thing as a dialer route command.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 398-405.

QUESTION NO: 68

What one of the following protocols is an example of a link state routing protocol that uses the TCP/IP

protocol stack?

A. IP

B. IS-IS

C. NLSP

D. OSPF

E. RIP ver 2

Answer: D

Explanation: OSPF is a link-state protocol that can be used in routing that is part of the TCP/IP protocol stack.

Incorrect Answers:

A: IP is a protocol, and a routed protocol, but NOT a routing protocol.

B: IS-IS is a routing algorithm used by the ISO protocol stack.

C: NLSP is part of the Novell protocol stack.

E: RIP (and RIP V2) are distance vector protocols.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 274-276, 215-216, 331,

and 278.

QUESTION NO: 69

The default bandwidth of a high-speed serial link is 1.544 or T1. What is the correct command to change

the bandwidth of the interface to 64K?

A. Bandwidth 64

B. Band width 64

C. Bandwidth 64000

D. Band width 64000

E. Bandwidth 64K

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 53 -

Answer: A

Explanation: The command is bandwidth and the parameter should specify the bandwidth in kilobits.

Reference:

Incorrect Answers

B, D: Incorrect command. Bandwidth is one word, not two.

C: This would be 64000kbps or 64Mbps.

E: Cannot use a parameter 64K.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 105 and 420.

QUESTION NO: 70

Exhibit:

RouterA# show interface s0 Serial 0 is up, line protocol is down Hardware is HD64570 Internet address 10.1.1.1 Encapsulation HDLC, loopback not set, keepalive set (10sec)

Router A is unable to connect to Router B, which is a Nortel router, through the network cloud. Using the

command output shown what must be configured on Router A's interface s0 to change the line protocol

from down to up?

A. No shutdown.

B. Encapsulation ppp.

C. Interface serial point-to-point.

D. Clock rate 56000.

Answer: B

Explanation: To ensure that the line comes up the encapsulation type must be enabled. This is done with the

encapsulation ppp command.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 54 -

Incorrect Answers:

A: The interface is already enabled therefore this command in not required.

C: The serial interface has already been created; this command would not solve the problem.

D: This will only set the clock rate and not bring solve the problem.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 381, 105, 432, and 407.

QUESTION NO: 71

What is one benefit of using a hierarchical addressing framework?

A. Increase availability of addresses.

B. Decrease distance between routers.

C. Increase router memory requirements.

D. No need to maintain routing information.

Answer: A

Explanation:

By partitioning the address ranges increases the availability of addresses. Instead of having one size fits all, the

address ranges are pooled into different sizes to satisfy different needs, and provides a better distribution of

addresses.

Incorrect Answers:

B: Hierarchical addressing will not affect the distance between routers.

C: Hierarchical addressing should DECREASE router memory requirements.

D: Routing information is needed because the adjacent networks are not sequential in line with the current

network, so a routing table is needed to know how to get to other networks.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 24-26.

QUESTION NO: 72

Frame relay has a feature that prevents PVCs from shutting down from lack of activity.

What is the name of this feature?

A. DLCI

B. BECN

C. FECN

D. LMI

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 55 -

E. CIR

F. De

Answer: D

Explanation: The keepalive command enables the keepalive sequence, which is part of the Local Management

Interface (LMI) protocol. The keepalives will prevent the PVC from shutting down.

Incorrect Answers:

A. The Data Link Connection Identifier (DLCI) is used for identification purposes and not to maintain a

connection.

B. BECN is not a LMI signaling standard. It stands for Backward Explicit Congestion Notification.

C. FECN is not a LMI signaling standard. It stands for Forward Explicit Congestion Notification.

D. CIR stands for Committed Information Rate. It does not maintain a connection.

E. DE will not maintain a connection.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 414 – 418.

QUESTION NO: 73

Exhibit:

Frame Relay switch maps the DLCIs between Router A to Router B to create a PVC. Which statement

below correctly identifies the reference point between the local router and the Frame Relay switch to

which it is connected?

A. Locally significant DLCI

B. Globally significant DLCI

C. Locally significant LMI

D. Globally significant LMI

Answer: A

Explanation:

The DLCI (Data-Link Connection Identifier) is a number that identifies the logical circuit between the router

and the Frame Relay switch. The Frame Relay switch maps the DLCIs between each pair of routers to create a

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 56 -

PVC. DLCIs have local significance in that the identifier references the point between the local router and the

Frame Relay switch, which it is connected.

Incorrect Answers:

B: As the DLCI are significant to just the two routers involved in the exchange of information it is not proper o

refer to globally significant DLCI.

C: Locally significant LMI is not the answer. LMIs are responsible for managing the connection between the

routers and not the assignment of numbers.

D: Globally significant LMI is not the answer. LMIs are responsible for managing the connection between the

routers and not the assignment of numbers.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 414-416.

QUESTION NO: 74

Novell Netware allows multiple Layer two frame structures. Cisco supports all of the frame types. Cisco

and Novell have assigned different names for the same encapsulation type. Which of the following are

correct matches of the Novell term to the equivalent Cisco IOS term for the same framing types? (Choose

two)

A. Ethernet_II-ARPA

B. Ethernet_802.3-SAP

C. Ethernet_802.2-LLLC

D. Ethernet_SNAP-SNAP

Answer: A, D

Explanation:

When you configure an IPX network, you might need to specify a non default encapsulation type either on the

Novell servers or on the Cisco router. Cisco and Novell have assigned a different name for the same

encapsulation type. It is imperative that the encapsulations are the same for both the Novell equipment and the

Cisco devices. Some of the encapsulation type pairings include:

Novell IPX Name Cisco Name

Ethernet_802.3 novell-ether

Ethernet_802.2 sap

Ethernet_II ARPA

Ethernet_SNAP snap

Incorrect Answers:

B: The proper pairing for 802.3 is novell-ether.

C: The proper pairing for 802.2 is sap.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 57 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 335-336.

QUESTION NO: 75

Consider Frame Relay multipoint subinterfaces. Which is a valid statement?

A. An IP address is required on the physical interface of the central router.

B. All routers are required to be fully meshed.

C. All routers must be in the same subnet to forward routing updates and broadcasts.

D. Multipoint is the default configuration for Frame Relay subinterfaces.

Answer: C

Explanation: All routers must be in the same subnet to forward routing updates and broadcasts.

Incorrect Answers

A: An IP address is required for each subinterface. An IP address is not required for the physical interface.

B: Routers are not required to be fully meshed.

D: You are required to select either the multipoint or point-to-point parameter; there is no default.

QUESTION NO: 76

Encapsulation is the method of passing data down the stack of the OSI model and adding headers and

trailers. Which one of the following shows the correct order of Data Encapsulation?

A. Data, Packet, Segment, Frame.

B. Segment, Data, Packet, Frame.

C. Data, Segment, Packet, Frame.

D. Packet, Data, Segment, frame.

Answer: C.

Explanation: Data encapsulation is a process in which information is wrapped in the data section of another

protocol. In the OSI model each layer encapsulates the layer immediately above as the data flows down the

protocol stack. The order of encapsulation is

1. Application/Presentation/Session DATA

2. Transport SEGMENT

3. Network PACKET

4. Data Link FRAMES

5. Physical BITS

Incorrect Answers:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 58 -

A: With Data, Packet, Segment, Frame; packet and segment are inverted.

B: With Segment, Data, Packet, Frame; data and segment are inverted.

D: With Packet, Data, Segment, frame; the only information package in the proper order is frame.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 13.

QUESTION NO: 77

The ICMP ping used for troubleshooting a network can be used on a Cisco router in which modes?

(Choose two)

A. User.

B. Privileged.

C. Global Configuration.

D. Interface Configuration.

Answer: A, B

Explanation: The ping command is used to check network and host reachability. The ping command can be

used at both the privileged exec mode and the user exec mode.

Incorrect Answers:

C: The global configuration mode can be used to configure global parameters of the device. The ping

command cannot be used in this mode.

D: The interface configuration mode is used to configure a specific interface. The ping command cannot be

used in this mode.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 99 and 167.

http://www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr1902.htm

QUESTION NO: 78

The advanced editing features are turn on by default on Cisco routers. To turn off these features you

enter the command terminal no editing. With the advanced editing features turned on what is the effect

of Ctrl-Z?

A. Exits back to privileged exec mode.

B. Disconnects from the router.

C. Aborts the ping operation.

D. Exits privileged exec mode.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 59 -

Answer: A

Explanation: Ctrl-Z exits back to privileged exec mode (enable mode).

Incorrect Answers:

B. To end a terminal connection you will need to use the logo command to log off of a router.

C. Ctrl Z will not disable the ping command. An Access List could be used to prevent ping from functioning.

D. You would need to enter Ctrl Z one more time to exit the privileged exec mode.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 89 – 97.

QUESTION NO: 79

A soft drink company has made the decision to provide 3 branches with network connectivity. There is a

LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost

fully configured. However, it does not have the routing protocol configured. Configure the routing

protocol and publish all networks on the Plain router.

The configurations of the routers are as follows:

The routers are named Vanilla, Chocolate, and Plain.

RIP is the routing protocol used.

The clocking is provided on the serial 0 interface.

The password on the Plain router is “TestKing”

The default subnet mask is used on all interfaces

The IP addresses are listed below.

Vanilla

E0 192.168.149.1

S0 192.168.199.1

Chocolate

E0 192.168.55.1

S0 192.168.101.1

S0 192.168.199.1

Plain

E0 192.168.65.1

S0 192.168.101.1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 60 -

Lab 1

Name: Vanilla

E0 192.168.149.1

S0 192.168.199.1

Lab 2

Name: Chocolate

E0 192.168.55.1

S0 192.168.101.1

S1 192.168.199.1

Lab3

Name: Plain

E0 192.168.65.1

S1 192.168.101.2

Secret Password: TestKing

Start by clicking on host that is connected to the router you want to configure.

Answer Lab 3:

enable

config terminal

hostname Plain

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 61 -

enable secret TestKing

interface ethernet 0

ip address 192.168.65.1 255.255.255.0

no shutdown

exit

interface serial1

ip address 192.168.101.2 255.255.255.0

no shutdown

exit

router rip

network 192.168.65.0

network 192.168.101.0

network 192.168.55.0

network 192.168.149.0

network 192.168.199.0

^z

copy running-config startup-config

Explanation:

< Click on Host6, which is connected to the Lab 3 router>

Router Con0 is now available

Press RETURN to get started. ! Press enter.

Router>enable ! Enter enable mode

Router#config terminal ! Enter terminal configuration mode. Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname Plain ! Change hostname

Plain(config)#enable secret TestKing ! Enable secret password

Plain(config)#interface ethernet 0 ! Enter interface configuration mode.

! Note the space between Ethernet and 0.

Plain(config-if)#ip address 192.168.65.1 255.255.255.0 ! Configure the IP address of the interface.

! Note that we use a class C subnet mask.

Plain(config-if)#no shutdown ! Start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up

Plain(config-if)#exit ! Exit configuration of Ethernet 0 interface

Plain(config)#interface serial1 ! Configure serial1 (no space in serial1)

Plain(config-if)#ip address 192.168.101.2 255.255.255.0 ! Configure the IP address of the interface.

Plain(config-if)#no shutdown ! Start the interface

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 62 -

%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1, changed state to up

Plain(config-if)#exit ! Exit interface configuration.

Plain(config)#router rip ! Enable RIP. Enter router configuration mode.

Plain(config-router)#network 192.168.65.0 ! Enable RIP on interface Ethernet 0

Plain(config-router)#network 192.168.101.0 ! Enable RIP on interface Serial1

! We have now added the two local networks. That should

! be enough, but we are specifically been required to publish

! all networks. We add the three remote networks as well.

Plain(config-router)#network 192.168.55.0 ! The three external networks are added as well. Plain(config-router)#network 192.168.149.0 Plain(config-router)#network 192.168.199.0

Plain(config-router)#^Z ! Exit configuration mode. %SYS-5-CONFIG_I: Configured from console by console

Plain#copy running-config startup-config ! Save running configuration to NVRAM

Destination filename [startup-config]? ! Accept defaults and save it. Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration...

[OK]Plain#

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277 – 279 and 133.

QUESTION NO: 80

Exhibit:TestKing# show ipx interface e0 Ethernet0 is up, line protocol is up

IPX address is 6F2C.0000.0c5d.b36e, NOVELL_ETHER [up] line-up, RIPPQ:0, SAPPQ: 0 Delay of this IPX network, in ticks is 1 throughput 0 link delay 0 IPXWAN processing not enabled on this interface. IPX SAP update interval is 1 minute(s) IPX type 20 propagation packet forwarding is disabled Incoming access list is not set Outgoing access list is not set IPX helper access list is not set SAP GNS processing enabled, delay 0 ms, output filter list is not set SAP Input filter list is not set SAP Output filter list is not set SAP Router filter list is not set Input filter list is not set Output filter list is not set Router filter list is not set

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 63 -

Netbios Input host access list is not set Netbios Input bytes access list is not set Netbios Output host access list is not set Netbios Outpus bytes access list is not set Updates each 60 seconds, aging multiple RIP: 3 SAP: 3 SAP interpacket delay is 55 ms, maximum size is 480 bytes RIP interpacket delay is 55 ms, maximum size is 432 bytes IPX accounting is disabled IPX fast switching is configured (enabled) RIP packets received 0, RIP packets sent 1 SAP packets received 0, SAP packets sent 1

Novell IPX addressing uses a two-part address that consists of 32 bits for the network number and 48 bits

for the node number. What is the node number/layer 2 address as shown in the output of the show ipx

interface e0 command?

A. 6F2C

B. 0000.0c

C. 5d.b35e

D. 0c5d.b363

E. 0000.0c5d.b363

F. 6F2C.0000.0c5d.b363

Answer: E

Explanation:

An IPX address is composed of two parts: the network number and the node number. For IPX the node number

is usually obtain from MAC address of the network interface. In this case the network number is 6F2C and the

node number/MAC address is 0000.0c5d.b363

Incorrect Answers:

A: 6F2C is the network number, which is a layer 3 address.

B: This only part of the MAC address thus incorrect.

C: This only part of the MAC address thus incorrect.

D: This only part of the MAC address thus incorrect.

F: This is the IPX address. As stated previously this address is part layer 3 and part layer 2.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332 and 345-6.

QUESTION NO: 81

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 64 -

Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and

the total number of host per network?

A. 1 network with 254 hosts.

B. 2 networks with 128 hosts.

C. 4 networks with 64 hosts.

D. 6 networks with 30 hosts.

Answer: A

Explanation: As the last octet is for host addresses, the maximum number networks is 1 to determine the

number of host use the formula (2^8) – 2. That is 256-2=254.

Incorrect Answers:

B and C: These combinations of networks and hosts are not possible.

D: This would require a subnet mask of 255.255.255.224.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 236.

Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) page 238.

QUESTION NO: 82

Which wide area network technology was designed to work with traditional POTS lines and provide

SOHO’s and users with a higher speed digital dial-up service?

A. Frame relay

B. X.25

C. ATM

D. ISDN

Answer: D

Explanation: Compared to analog modems, ISDN provides a digital service with faster connection times and

somewhat higher speeds.

Note: POTS= plain old telephone system. SOHO= small office/home office networks

Incorrect Answers:

A. Frame relay is used to handle multiple virtual circuits.

B. X.25 defines how the connections between DTE and DCE are maintained.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 65 -

C. ATM was designed to take advantage of the speeds offer by media such as E3 and T3.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387 – 389 and 373.

QUESTION NO: 83

One of the best ways to understand how to build a network is to understand the method in which traffic

is passed across the network. One of the reasons the OSI model was created to help you understand how

a network operates. Which three devices operate at all seven layers of the OSI model? (Choose three.)

A. Network host

B. Network management station

C. Transceiver

D. Bridge

E. Web server

F. Switch

Answer: A, B, E

Explanation: The three devices that operate at all seven layers of the OSI model are network hosts, network

management station and web server. This is how these devices are able to perform their functions.

Incorrect Answers:

C: A transceiver is not used in a network environment.

D: A bridge is a Layer 2 device.

F: A switch is a Layer 2 device.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 21-22.

QUESTION NO: 84

Which of the following are functions that occur at the transport layer of the OSI model? (Choose three)

A. Route selection-IP

B. Sliding window-UDP

C. Well known ports-IP

D. Route validation-ICMP

E. Connection oriented-TCP/IP

F. Three way handshake TCP/IP

G. No acknowledgement-UDP

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 66 -

Answer: E, F, G

Explanation: The key to answering this question is the difference between connection and connectionless

protocols. TCP is a connection orientated protocol that us a three-way handshake to establish a connection.

UDP is a connectionless protocol that does not guarantee delivery therefore there is no acknowledgements.

Incorrect Answers:

A: Route selection and IP are network layer, not transport layer functions.

B: Sliding windows is used in connection oriented, and UDP is connectionless.

C: Well-known ports are functions of UDP & TCP.

D: ICMP, which is used for the ping command, does not validate routes.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 28-30.

QUESTION NO: 85

Which wide are network technology was designed to use high-performance digital lines and is packet

switched?

A. FDDI

B. ISDN

C. ATM

D. Frame Relay

Answer: D

Explanation: Frame Relay is a packet switching technology that uses digital lines.

Incorrect Answers

A: FDDI is a topology.

B: ISDN is not a packet switched service.

C: ATM is a broadband technology.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 373 – 374.

QUESTION NO: 86

IP addresses use hierarchical numbering. What portion of the address that will identify the network

number?

A. Subnet Mask.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 67 -

B. Dots between octets.

C. Class of first octet.

D. Assignments of DHCP.

E. Address Resolution Protocol.

Answer: C.

Explanation:

In general, IP addresses contain two fields: one for the network and another for host. Class A address have a

range of 1 to 126 and the network portion of the IP address is restricted to the first eight bits (octet). Class B

address have a range of 128 –191.255.0.0 and the network portion of the IP address is contain in the first 2

octets. Class C IP addresses has a range of 192.223.255.255.0 and the network portion of the IP addresses is the

first three octets of the IP address. Class D addresses include the range of 224.0.0.0 to 239.255.255.255 and are

used for multicast address. Class E addresses have a range of 224.0.0.0 to 247.255.255.255 and are reserved for

experimental purposes.

Incorrect Answers:

A: Although the subnet mask is used network devices to determine what part of the IP use address for the

network, the subnet and the host address but it is not part of the IP address hierarchy.

B: The dots are used for making the IP address readable by humans, but have no determination of the network

number.

D: DHCP (Dynamic Host Configuration Protocol) provides a mechanism for allocating IP addresses

dynamically so that addresses can be reused when hosts no longer need them.

E: Address Resolution Protocol (ARP) determines the data link layer address of the destination devices for

known destination IP addresses network number.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 215-227.

QUESTION NO: 87

Looking at this address 255.255.255.255 which one of the following is true?

A. IP, a flooded broadcast.

B. IP, a directed broadcast.

C. IPX, a flooded broadcast.

D. IPX, a remote directed broadcast.

Answer: A

Explanation: Flooded broadcast (255.255.255.255) are not propagate and are considered local and are sent to

every host on the network.

Incorrect Answers:

B: The IP identified is not directed broadcast. Direct broadcast use the IP of the network

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 68 -

C and D: 255.255.255.255 is an IP address, not an IPX address.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 231-233.

QUESTION NO: 88

Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be

some possible causes for a congested network? (Choose four.)

A. Too many hosts in a broadcast domain.

B. Full Duplex operation.

C. Broadcast storms.

D. Multicasting.

E. Segmentation.

F. Low bandwidth.

Answer: A, C, D, F

Explanation:

A: Too many hosts in a broadcast domain would cause many collisions and congestion.

C: Broadcast storms would have a negative impact on available bandwidth.

D: Multicasting targets multiple destinations and requires a lot of bandwidth.

F: Low available bandwidth would of course result in a congested network faster than a network with higher

bandwidth.

Incorrect Answers

B: Full duplex operation would decrease congestion.

E: Segmentation decreases the collisions domains, the network traffic, and the congestion.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 150 –152 and 16 – 23.

QUESTION NO: 89

RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to

RouterB (you put it administratively down). If you issue the command show interface on RouterB

what output status would you see on the interface that is connected to RouterA?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 69 -

A. Interface is down, line protocol is down.

B. Interface is down, line protocol is up.

C. Interface is up, line protocol is down.

D. Interface is up, line protocol is up.

Answer: A

Explanation: The line protocol would be down, and the interface would be down. The first part of the result

will indicate whether the interface hardware is active or not. As you put the interface administratively down the

interface will be down. The line protocol result indicates whether the process believes that interface is usable or

not. If three keepalives are missed protocol will be marked as down.

Incorrect Answers:

B. It can be assumed that the three keepalives have been missed and thus the line protocol would be done.

C and D. You put the interface administratively down as a result the interface would be down.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 106 – 109.

QUESTION NO: 90

Which layer of the OSI model handles data translation, code formatting, and encryption occur?

A. Physical

B. Data link

C. Network

D. Transport

E. Session

F. Presentation

Answer: F

Explanation:

The presentation layer provides a variety of coding and conversion functions that are applied to application

level data. These functions ensure that the data sent from the application layer of one system can be read the

application layer of another system.

Incorrect Answers:

A: The physical layer is what puts the actual data onto the wire.

B: The data link layer is involved in converting bits into bytes, converting bytes into frames and with error

detection.

C: The network layer provides logical addressing so that routers can perform route determination.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 70 -

D: The transport layer provides delivery of the data and error correction prior to retransmit.

E: The session layer is responsible for establishing, managing, and terminating communications sessions

between presentation layer entities.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 11-12.

QUESTION NO: 91

Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets.

Which subnet mask would you use?

A. 255.255.255.192

B. 255.255.255.224

C. 255.255.255.240

D. 255.255.255.248

Answer: B

Explanation: 255.255.255.224 will support the configuration.

For 5 networks, we need a minimum of 3 bits. We get this in the following way: Add two to the requirement,

then round up to the next power of 2. So, we get 5+2=7, next highest is 8, because 2 to the 3rd

power is 8. Thus

3 bits.

For 17 hosts, we do the same thing, we get 17+2=19, next highest is 32, which is 5 bits, 2 to the 5th

power is 32.

Now 3 bits network and 5 bits host make an octet. For a subnet mask, 3 bits are 128+64+32 = 224.

Incorrect Answers:

A: This supports too many hosts and not enough networks

C and D: They support too few hosts and too many networks.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 230-236.

QUESTION NO: 92

What is the protocol and what is the second part of the following network address? (Choose all that

apply.)

10.0.0.254 mask 255.0.0.0

A. IPX MAX address.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 71 -

B. IP Class C director broadcast.

C. Private IP address node number.

D. Public IP address directed broadcast.

E. Private IP address directed broadcast.

Answer: C

Explanation: The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the

IP address space for private Internets:

10.0.0.0 - 10.255.255.255 (10/8 prefix)

172.16.0.0 - 172.31.255.255 (172.16/12 prefix)

192.168.0.0 - 192.168.255.255 (192.168/16 prefix)

Remember all three ranges!

Reference: RFC 1918, Address Allocation for Private Internets

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 194.

QUESTION NO: 93

There are five different types of IP address classes. What IP address class is used for multicasting?

A. A

B. B

C. C

D. D

E. E

Answer: D

Explanation: Multicasting is possible due to Class D IP addresses. Class D address range is 224.0.0.0 to

239.255.255.255.

Incorrect Answers:

A. Class A addresses are not used for multicasting.

B. Class B addresses are not used for multicasting.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 72 -

C. Class C addresses are not used for multicasting.

E. Class E addresses are for research purposes.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 223 – 224.

QUESTION NO: 94

Which layer of the OSI model uses packets as the PDU (Protocol Data Unit)?

A. Data link

B. Session

C. Presentation

D. Network

E. Transport

Answer: D

Explanation:

The packet is the encapsulation type of the Network layer.

Incorrect Answers:

A: The data unit of the data link layer is the frame.

B: The session layer in not involved in the data encapsulation process.

C: The presentation layer ensures that the receiving system can read the data and is not involved in

encapsulation.

E: The transport layer data unit is the segment.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 11-13.

QUESTION NO: 95

Cisco supports IPX traffic using different encapsulation types can go over the same interface.

A. TRUE

B. FALSE

Answer: A

Explanation:

Multiple encapsulations can be specified on an interface, but only if multiple network numbers have also been

assigned, where each network number belongs to only one encapsulation type and each encapsulation type has

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 73 -

only one network number. Although several encapsulation types can share the same interface, clients and

servers with different encapsulation types cannot communicate directly with each other.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 335.

QUESTION NO: 96

What must you do to test connectivity on a dial on demand routing (DDR) link?

A. Increate the idle import parameter.

B. Send interesting traffic across the link.

C. Switch

D. Repeater

Answer: B

Explanation: To test DDR connectivity you will need to send interesting traffic across the link.

Incorrect Answers:

A. This will not have the desired result.

C and D. These devices will not allow you to test connectivity.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 400 – 406.

QUESTION NO: 97

Your company is considering purchasing a new accounting software application from ABC accounting

company. The ABC accounting company has decided to come in and let you install a demo copy of their

software so that you can test it in your network with a few hosts. The server and the hosts that will

connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your

company has decided to use this new accounting software application. However when you ran your

packet analyzer you noticed the rest of the hosts on your network that are not using this application have

a bandwidth problem with the new accounting system installed. Since your company has decided to use

this new application they would like you to resolve the bandwidth problem. What is the most economical

decision would you implement for resolving this problem?

A. Install new 100 Mbps switches, and change all hosts’ NIC to 100 Mbps.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 74 -

B. Segment network with router, and place all testing hosts and the new server into a separate subnet

(network).

C. Add a Bridge and separate the two networks.

Answer: B

Explanation: A router helps in creating more broadcast domains and decreasing the scope of each broadcast

domain. This will improve network utilization.

Incorrect Answers

A: A switch would increase the number of collision domains and decrease the scope of each collision domain.

However, the broadcast domain would still be the same.

C: This would only give two collision domains. A switch would provide more collision domains.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 16 – 17.

QUESTION NO: 98

What are the benefits of replacing a hub with a bridge and segmenting the network?

A. It increases the number of collision domains.

B. It decreases the number of collision domains.

C. It increases the number of broadcast domains.

D. It decreases the number of broadcast domains.

Answer: A.

Explanation:

Bridge networks have the following characteristics: each segment has its own collision domain, all connected

devices are part of the same broadcast domain, and all segments must have the same data link layer

implementation.

Incorrect Answers:

B: When a network is segmented by a bridge the collisions domains increase and not decrease.

C and D: The addition of a bridge to a network has no effect on the number of domains.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 23-4.

QUESTION NO: 99

To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the

following is true about this mechanism?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 75 -

A. TCP makes no effort to check for lost or duplicate data packets.

B. The application layer must sequence data packets when using TCP.

C. TCP controls the flow of UDP data through negative acknowledgements NAK.

D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered

reliable.

Answer: D

Explanation: Connection oriented protocols are reliable as the usually acknowledge the receipt of data packets.

TCP is connection oriented.

Incorrect Answers:

A: TCP is connection oriented and guarantees packet delivery and order.

B: TCP is connection oriented, and guarantees packet ordering

C: TCP does not mix with UDP, a different transport protocol.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 and 207.

QUESTION NO: 100

Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use

autonomous system number 130. Which is the correct command for this installation?

A. Router(config)# igrp 130

B. Router(config)# network 130

C. Router(config)# router igrp 130

D. Router(config)# enable igrp 130

Answer: C

Explanation: To enable IGRP as a routing process one uses the router igrp command. This command must

include the AS number within it. Thus the command to set IGPR for AS 130 is:

router igrp 130

Incorrect Answers:

A: Igrp 100 is not a valid command.

B: The network command it used to identify what network the AS is directly connected to. In this case

(network 100) the command is wrong as it contain the AS number and not the network number.

D: The enable command is used for entering privilege mode. Further the enable command does not use the AS

number.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 285-286 and 69.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 76 -

QUESTION NO: 101

Exhibit:TestKing1#show interface serial 0/0 Serial0/0 is down, line protocol is down Hardware is HD64570 Internet address is 172.22.5.1/30 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation HDLC, loopback not set, keepalive set (10 sec) Last input never, output 00:03:11, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max(drops): Total output drops: 0 Queuing strategy: weighted fair Output queue: 0/1000/64/0 (size/max active/threshold/drops) Conversations 0/2/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 11 packets output, 476 bytes, 0 underruns 0 output errors, 0 collisions, 27 interface resets 0 output buffer failures, 0 output buffers swapped out 11 carrier transitions DCD=down DSR=down DTR=down RTS=down CTS=down

TestKing1 cannot establish a connection to TestKing2 using the show interface serial 0/0 command on

TestKing1 command which layer of the OSI model is most likely the problem?

A. Physical layer.

B. Data layer.

C. Network layer.

D. Transport layer.

Answer: A

Explanation:

The key to answering this question is “Serial0/0 is down”. This indicates that the actual serial interface

is down. Thus there is a problem with the physical layer.

Incorrect Answers:

B: The exhibit does not indicate a problem with the data link layer.

C: The exhibit does not indicate a problem with the network layer.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 77 -

D: If the output just indicated that “line protocol is down” then a there would be a problem with the line

protocol. If this were the only problem then there would’ve been a problem with the transport layer.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 107-110.

QUESTION NO: 102

All TCP/IP hosts implement the ICMP protocol?

A. TRUE

B. FALSE

Answer: A

Explanation: This is a requirement because ICMP has other uses besides ping, for example destination

unreachable or when ICMP is sent to provide better routing information.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-218.

QUESTION NO: 103

Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the

physical connectivity between two devices? Which type of ICMP messages was carried in the IP

datagrams?

A. ICMP echo request.

B. Information request.

C. Timestamp reply.

D. Redirect.

E. Source quench.

Answer: A

Explanation: The PING utility uses ICMP echo requests.

Incorrect Answers:

B, C, D. These are all types of ICMP defined messages.

E. Source quench is not an ICMP defined message.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 78 -

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217 – 218.

QUESTION NO: 104

Exhibit:

Looking at the diagram above ports 1 through 4 are assigned to VLAN1 and ports 5 through 8 are

assigned to VLAN3 on each switch. The switches are interconnected over an ISL trunk link.

Which of the following actions would test proper VLAN and trunk operation? (Choose three.)

A. Host 2-1 can ping Host 2-2

B. Host 2-1 can ping Host 7-2

C. Host 2-1 can not ping Host 2-2

D. Host 7-1 can not ping Host 2-2

E. Host 7-1 can ping Host 7-2

Answer: A, D, E.

Explanation:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 79 -

A: Host 2-1 and Host 2-2 are both in VLAN1 and a ping should be successful.

D: Host 7-1 is in VLAN3 while Host 2-2 is in VLAN1. A ping between those hosts should fail.

E: Host 7-1 and Host 7-2 are both in VLAN1 and a ping should be successful.

Incorrect Answers

B: Host 2-1 and Host 7-2 are in different VLANs and a ping should fail.

C: Host 2-1 and Host 2-2 are both in VLAN1 and a ping should be successful.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 184 – 198 and 124.

QUESTION NO: 105

Christopher issues a show cdp neighbor command from RouterA. RouterA has connections to RouterB

and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring

routers are displayed on your console terminal? (Choose three)

A. The neighboring router’s host name.

B. The neighboring router’s hardware platform.

C. Up to one address for each protocol supported.

D. Up to two addresses for each protocol supported.

E. As many addresses as are configured for each protocol supported.

Answer: A, B, C

Explanation:

When issuing a show cdp entry command, the following information is provided:

1) Neighbor device ID

2) Layer 3 protocol information (ie IP address)

3) Local interface and Port identifiers of the neighbors remote ports

4) The hold time in seconds

5) Devices capabilities

6) Device Platform

7) IOS type and version.

Incorrect Answers:

D and E: You only display ONE address.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 116-119.

QUESTION NO: 106

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

How do you change the Console password on the Sonic router to "cisco"?

A. Sonic(config)#line con 0

Sonic(config-line)#login

Sonic(config-line)#password cisco

B. Sonic(config)#line con 0

Sonic(config-line)#login

Sonic(config-line)# password Cisco

Answer: A

Explanation: Passwords are case sensitive.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102 – 103.

QUESTION NO: 107

You have just entered the command:

Superhero(config-line)#logging sync

Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command.

Which keystroke(s) did you use to complete the above command above to the completed command

below?

Superhero(config-line)#logging synchronous

A. Ctrl+shift+6 then x.

B. Ctrl+Z

C. TAB

D. /?

E. Shift

Answer: C

Explanation: The TAB key completes a command if the command is not ambiguous.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 80 -

Section B

QUESTION NO: 1

You work as network administrator at TestKing.

Your trainee is configuring a router with both physical and logical interfaces.

He asks you what factor determines the OSPF router ID.

What should you tell him?

A. The lowest network number of any interface.

B. The lowest IP address of any logical interface.

C. The lowest IP address of any physical interface.

D. The highest network number of any interface.

E. The highest IP address of any logical interface.

F. The highest IP address of any physical interface.

Answer: C

Explanation:

The OSPF topology database includes information about routers and the subnets, or links, to which they are

attached. To identify the routers in the neighbor table’s topology database, OSPF uses a router ID (RID) for

each router. A router’s OSPF RID is that router’s lowest IP address on a physical interface when OSPF starts

running.

Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. The lowest IP

address configured on the router is the router ID. If a loopback address is configured, then it is the router ID. In

case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID is elected

it doesn't change unless the IP address is removed or OSPF restarts.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 208

QUESTION NO: 2

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 81 -

Your TestKing trainee is configuring a router. In particular, he is examining a routing table that contains

static, RIP, and IGRP routes for the same destination network with each set to its default administrative

distance.

He asks you which route will be used to forward data?

A. The IGRP route

B. The static route

C. The RIP route

D. All three will load balance.

Answer: A

Explanation:

To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a

number that denotes how believable an entire routing protocol is on a single router. The lower the number, the

better, or more believable the routing protocol.

Route Type Administrative Distance

Static 1

IGRP 100

RIP 120

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 177

QUESTION NO: 3

Three bicycle stores in the TestKing Pro chain have decided to establish network connectivity to maintain

their repair business in a centralized manner. The stores contracted a local technician, non-Cisco

certified, to configure the routers. However, the local MCP certified technician was not able to finish the

configuration in an appropriate manner. No network connectivity has been established among the

routers. The routers are named TestKing1, TestKing2, and TestKing3.

TestKing Pro has contracted you to fix the problems. Identify the fault(s) and make the necessary

change(s) to establish connectivity. The routers have been configured with the following specifications:

The routers are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol

Clocking is provided on the serial 0 interfaces

The password on each router is "testking"

The subnet mask on all interfaces is the default mask.

The IP addresses are listed in chart below.

TestKing1

E0 192.168.27.1

E1 192.168.29.1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 82 -

S0 192.168.31.1

Secret password: testking

TestKing2

E0 192.168.35.1

S0 192.168.33.1

S1 192.168.31.2

Secret password: testking

TestKing3

E0 192.168.37.1

S1 192.168.33.2

Secret password: testking

To configure the router click on the host icon that is connected to the router by a serial cable.

Answer:

Click on Host 2:

Router TestKing1:

TestKing1> enable

Password: testking

TestKing1 # config terminal

TestKing1 (config) # interface ethernet 0

TestKing1 (config-if) # ip address 192.168.27.1 255.255.255.0

TestKing1 (config-if) # no shutdown

TestKing1 (config-if) # exit

TestKing1 (config) # interface ethernet 1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 83 -

TestKing1 (config-if) # ip address 192.168.29.1 255.255.255.0

TestKing1 (config-if) # no shutdown

TestKing1 (config-if) # exit

TestKing1 (config) # interface serial 0

TestKing1 (config-if) # ip address 192.168.31.1 255.255.255.0

TestKing3 (config-if) # clock rate 64000

TestKing1 (config-if) # no shutdown

TestKing1 (config-if) # exit

TestKing1 (config) # router rip

TestKing1 (config-router) # network 192.168.27.0

TestKing1 (config-router) # network 192.168.29.0

TestKing1 (config-router) # network 192.168-31.0

TestKing1 (config-router) # Ctrl-Z

TestKing1 # copy running-config startup-config

Click on Host 4

Router TestKing2:

TestKing2> enable

Password: testking

TestKing2 # config t

TestKing2 (config) # interface ethernet 0

TestKing2 (config-if) # ip address 192.168.35.1 255.255.255.0

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # interface serial 0

TestKing2 (config-if) # ip address 192.168.33.1 255.255.255.0

TestKing2 (config-if) # clock rate 64000

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # interface serial 1

TestKing2 (config-if) # ip address 192.168.31.2 255.255.255.0

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # router rip

TestKing2 (config-router) # network 192.168.35.0

TestKing2 (config-router) # network 192.168.33.0

TestKing2 (config-router) # network 192.168.31.0

TestKing2 (config-router) # Ctrl-Z

TestKing2 # copy running-config startup-config

Router TestKing3:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 84 -

Click on Host6

TestKing3> enable

Password: testking

TestKing3 # config t

TestKing3 (config) # interface ethernet 0

TestKing3 (config-if) # ip address 192.168.37.1 255.255.255.0

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config) # interface serial 1

TestKing3 (config-if) # ip address 192.168.33.2 255.255.255.0

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config) # router rip

TestKing3 (config-router) # network 192.168.33.0

TestKing3 (config-router) # network 192.168.37.0

TestKing3 (config-router) # Ctrl-Z

TestKing3 # copy running-config startup-config

QUESTION NO: 4

Exhibit:

The exhibit above shows the TestKing.com network.

Your trainee David asks you which broadcast addresses of the subnets are shown in the exhibit?(Choose

three)

A. 172.16.32.255

B. 172.16.47.255

C. 172.16.64.255

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 85 -

D. 172.16.82.255

E. 172.16.79.255

F. 172.16.95.255

Answer: B E F

Explanation:

172.16.32.0/20 has 16 increments and the broad cast address will always be 1 before the actual number.

172.16.32.0 next increment will be 172.16.48.0 so then the broadcast address is 1 less than 172.16.48.0 =

172.16.47.255 (Broadcast address).

QUESTION NO: 5

Exhibit:

Two routers named TestKing1 and TestKing2 are connected via their serial interfaces as illustrated, but

they are unable to communicate. The TestKing1 router is known to have the correct configuration. Given

the partial configurations, identify the fault on the TestKing2 router that is causing the lack of

connectivity.

A. Incomplete IP address

B. Insufficient bandwidth

C. Incorrect subnet mask

D. Incompatible encapsulation

E. Link reliability too low

F. IPCP closed

Answer: A

Explanation:

HDLC and PPP Configuration

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 86 -

HDLC and PPP configuration is straightforward. You just need to be sure to configure the same IP address

on each end of the serial link. Otherwise, the routers will misinterpret the incoming frames, because

each IP address uses a different frame format. Other than configuring some optional features,

that’s all you need to do.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310

QUESTION NO: 6

Exhibit:

You work as a network administrator at TestKing.com. A named access list called research_block has

been written to prevent users on the research network and public Internet form access to the TestKing

Support server. All other users within the TestKing company should have access to this server. The list

contains the following statements.

deny 172.16.102.0 0.0.0.255 172.16.104.255 0.0.0.0

permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0

Which of the following commands sequences will place this list to meet these requirements?

A. TestKing1(config)# interface e0

TestKing1(config-if)# ip access-group research_block in

B. TestKing1(config)# interface s0

TestKing1(config-if)# ip access-group research_block out

C. TestKing2(config)# interface s0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 87 -

TestKing2(config-if)# ip access-group research_block out

D. TestKing2(config)# interface s1

TestKing2(config-if)# ip access-group research_block in

E. TestKing3(config)# interface s1

TestKing3(config-if)# ip access-group research_block in

F. TestKing3(config)# interface e0

TestKing3(config-if)# ip access-group research_block out

Answer: C

Explanation:

To enable the ACL on an interface and define the direction of packets to which the ACL is applied, the ip

access-group command is used.

When referring to a router, these terms have the following meanings.

Out - Traffic that has already been through the router and is leaving the interface; the source would be

where it's been (on the other side of the router) and the destination is where it's going.

In - Traffic that is arriving on the interface and which will go through the router; the source would be

where it's been and the destination is where it's going (on the other side of the router).

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 433

http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml

QUESTION NO: 7

Exhibit:

Based on the display of the command output, what does [120/3] represent?

A. 120 is the UDP port for forwarding traffic and 3 is the number of hops.

B. 120 is the administrative distance and 3 is the metric for that route.

C. 120 is the bandwidth of the link and 3 is the routing process number.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 88 -

D. 120 is the value of the update timer and 3 is the number of updates received for that route.

Answer: C

Explanation:

To decide which route to use, IOS uses a concept called the bandwidth of the link. the bandwidth of the link is a

number that denotes how believable an entire routing protocol is on a single router. The lower the number, the

better, or more believable the routing protocol.

Route Type Administrative Distance

Connected 0

IGRP 100

RIP 120

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 177

QUESTION NO: 8

David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network

connectivity. What should you tell him?

A. Switches take less time to process frames than hubs take.

B. Switches do not forward broadcasts.

C. Hubs can filter frames.

D. Using hubs can increase the amount of bandwidth available to hosts.

E. Switches increase the number of collision domains in the network.

Answer: E

Explanation: Switches increases the number of collisions domains in the network.

Note:

Switches use a couple of different types of internal processing variations. Almost of the more recently released

switches use store-and-forward processing, but all three types of switching are supported in at least one type of

currently available Cisco Switch.

Store-and-forward –The switch fully receives all bits in the frame (store) before forwarding the frame

(forward).

Cut-through – The switch performs the address table lookup as soon as the destination address field in

the header is received.

Fragment-free – This performs like cut-through switching, but the switch waits for 64 bytes to be

received before forwarding the first bytes of the outgoing frame.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 243

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 89 -

QUESTION NO: 9

Your boss at TestKing asks you about half-duplex and full-duplex Ethernet. What are unique for half-

duplex Ethernet? (Choose two)

A. Half-duplex Ethernet operates in a shared collision domain.

B. Half-duplex Ethernet operates in a private collision domain.

C. Half-duplex Ethernet has higher effective throughput.

D. Half-duplex Ethernet has lower effective throughput.

E. Half-duplex Ethernet operates in a private broadcast domain.

Answer: A C

Explanation:

A single device could not be sending a frame and receiving a frame at the same time because it would mean that

a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is

called half-duplex logic.

Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only

one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN

switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full

duplex means that an Ethernet card can send and receive concurrently.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 62-63

QUESTION NO: 10

You work as a technician at TestKing. You are required to configure PPP on an interface on a Cisco

router. A technician is configuring PPP on an interface.

Which PPP authentication methods can you use? (Choose two)

A. SSL

B. VPN

C. PAP

D. LAPB

E. CHAP

F. SLIP

Answer: C E

Explanation:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 90 -

Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)

authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method today

because the identifying codes flowing over the link are created using a MD5 one-way hash, which is more

secure that the clear-text passwords sent by PAP.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 314

QUESTION NO: 11

Exhibit:

What function does the Frame Relay DLCI provide with respect to TestKingA?

A. Defines the signaling standard between TestKingA and the frame switch.

B. Identifies the circuit between TestKingA and the frame switch.

C. Identifies the circuit between TestKingB and the frame switch.

D. Identifies the encapsulation used between TestKingA and TestKingB.

E. Defines the signaling standard between TestKingB and the frame switch,

Answer: B

Explanation:

TestKingA sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and

forwards the frame through the Frame Relay network until it reaches the switch connected to TestKingB. The

TestKingB’s local switch forwards the frame out of the access link to TestKingB.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 386

QUESTION NO: 12

A technician are configuring a router named TestKing2.

Why does she use passive-interface command?

A. Allows a routing protocol to forward updates out an interface that is missing its IP address.

B. Allows a router to send routing updates on an interface but not receive updates via that interface.

C. Allows an interface to remain up without receiving keepalives.

D. Allows interfaces to share IP addresses.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 91 -

E. Allows a router to receive routing updates on an interface but not send updates via that interface.

Answer: E

Explanation:

The passive-interface command is used to control the advertisement of routing information. The command

enables the suppression of routing updates over some interfaces while allowing updates to be exchanged

normally over other interfaces.

With most routing protocols, the passive-interface command restricts outgoing advertisements only. However,

when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This

document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello

packets between two routers, resulting in the loss of their neighbor relationship. This stops not only routing

updates from being advertised, but it also suppresses incoming routing updates. This document also discusses

the configuration required in order to allow the suppression of outgoing routing updates, while allowing

incoming routing updates to be learnt normally from the neighbor.

Reference:

http://www.cisco.com/en/US/tech/tk365/tk207/technologies_tech_note09186a0080093f0a.shtml

QUESTION NO: 13

Exhibit:

A new network is being designed for your company TestKing. Using a Class C IP network. which subnet

mask will provide one useable subnet per department while allowing enough usable host addresses for

each department specified in the graphic?

A. 255.255.255.0

B. 255.255.255.192

C. 255.255.255.224

D. 255.255.255.240

E. 255.255.255.248

F. 255.255.255.252

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 92 -

Answer: B

QUESTION NO: 14

Exhibit:

As a network technician at TestKing you are required to troubleshoot the network shown in the exhibit.

The host, TK1, is connected to the TestKing1 LAN is unable to connect to resources on other networks.

Assuming that host is configured as follows:

host address: 192.168.5.45

subnet mask: 255.255.255.240

default gateway: 192.168.5.32

Which of the following is the cause of this problem?

A. The default gateway is a subnetwork address.

B. The default gateway is on a different subnet form the host.

C. The host subnet mask does not match the subnet mask of the attached router interface.

D. The IP address of the host is on a different subnet than the default gateway.

Answer: C

QUESTION NO: 15

Your boss at TestKing asks you why you are using a router to segment the network at the main office.

What are the benefits? What should you tell her? (Choose two)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 93 -

A. Filtering can occur based on Layer 3 information.

B. Broadcasts are eliminated.

C. Routers generally cost less than switches.

D. Broadcasts are not forwarded across the router.

E. Adding a router to the network decreases latency.

Answer: A, D

QUESTION NO: 16

You work as a network technician at TestKing. You are required to divide the 172.12.0.0 network into

subnets. Each submit must have the capacity of 458 IP addresses.

Furthermore, according to the requirement you must provide the maximum number of subnets.

Which network mask should you use?

Answer: 255.255.254.0

Explanation:

To obtain 459 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned. Keep

9 bits for host means 4th

octet and last bit is 3rd

will be 0. This gives 255.255.254.0 is subnet mask.

QUESTION NO: 17

Your new Junior TestKing trainee Rutger has a problem with basic binary math. He must convert the

binary number 10011101 into its decimal and hexadecimal equivalent.

Which two numbers must Rutger provide? (Choose two)

A. 159

B. 157

C. 185

D. 0x9D

E. 0xD9

F. 0x159

Answer: B D

Explanation:

10011101 = 157

0x9D is ASCII Hexadecimal = 157

Reference:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 94 -

http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_command_reference_chapter09186a00800

7fc95.html

QUESTION NO: 18

Exhibit:

Note: SPIDs are not required for this switch.

You work as a network consultant. Your customer TestKing wants you to bring up the ISDN link (refer

to the exhibit).

Which command should you use? (Select three)

A. Router(config-if)# encapsulation ppp

B. Router(config)# isdn switch-type type

C. Router(config)# dialer-list 1 protocol ip permit

D. Router(config)# dialer map ip address name name connection number

E. Router(config-if)# ip address address subnet mask

F. Router(config-if)# dialer-group 1

Answer: A E F

Explanation:

Proper encapsulation to be defined on both routers.

IP address to be assigned for interface with subnet mask

Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal

configuration command.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310+337

QUESTION NO: 19

You are required to troubleshoot LAN connectivity on the TestKing main site in Toronto.

Which router IOS commands would be useful for you? (Choose three)

A. ping

B. tracert

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 95 -

C. ipconfig

D. show ip route

E. winipcfg

F. show interfaces

Answer: A D F

QUESTION NO: 20

As a network technician at TestKing you are required to configure an ISDN BRI interface. Specifically,

you must configure dial-on-demand routing (DDR).

Which sequence of parameters should you use to achieve this goal?

Answer:

Place 1st - next hop address

Place 2nd

- Dialer-list

Place 3rd

- protocol

Place 4th

- Dialer-String

Place 5th

- group

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 342

QUESTION NO: 21

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 96 -

Your TestKing trainee Tess wants to display the configuration register setting on her router.

Which command should she use?

A. show register

B. show flash

C. show boot

D. show version

Answer: D

Explanation:

show version

To display the configuration of the system hardware, the software version, the names and sources of

configuration files, and the boot images, use the show version command in EXEC mode.

Examples

The following is sample output from the show version command:

Router1> show version

Cisco Internetwork Operating System SoftwareIOS (tm) 7200 Software (C7200-J-M), Experimental Version 11.3(19970915:164752) [hampton-nitro-baseline 249]Copyright (c) 1986-1997 by cisco Systems, Inc.Compiled Wed 08-Oct-97 06:39 by hamptonImage text-base: 0x60008900, data-base: 0x60B98000ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWAREBOOTFLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fc1)Router1 uptime is 23 hours, 33 minutesSystem restarted by abort at PC 0x6022322C at 10:50:55 PDT Tue Oct 21 1997System image file is "tftp://171.69.1.129/hampton/nitro/c7200-j-mz"cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory.R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache)Last reset from power-onBridging software.X.25 software, Version 3.0.0.SuperLAT software copyright 1990 by Meridian Technology Corp).TN3270 Emulation software.8 Ethernet/IEEE 802.3 interface(s)2 FastEthernet/IEEE 802.3 interface(s)4 Token Ring/IEEE 802.5 interface(s)4 Serial network interface(s)1 FDDI network interface(s)125K bytes of non-volatile configuration memory.1024K bytes of packet SRAM memory.20480K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).4096K bytes of Flash internal SIMM (Sector size 256K).Configuration register is 0x0

Reference:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/fun_r/cfr_1g10.htm#1033030

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 97 -

QUESTION NO: 22

You are configuring a subnet on the TestKing branch office in Berlin.

You need to assign IP addresses to hosts in this subnet.

You have been given the subnet mask of 255.255.255.224.

Which IP address would be valid? (Choose three)

A. 15.234.118.63

B. 92.11.178.93

C. 134.178.18.56

D. 192.168.16.87

E. 201.45.116.159

F. 217.63.12.192

Answer: B, C, D

Explanation:

B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)

C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)

D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95

QUESTION NO: 23

You work as network administrator/technician at TestKing. You are configuring Frame Relay on a Cisco

router.

What is the default LMI (Local Management Interface) frame type transmitted by the Cisco router on a

Frame Relay circuit?

A. Q933a

B. B8ZS

C. IETF

D. Cisco

E. ANSI

Answer: D

Explanation:

Name Document IOS LMI-Type Parameter

Cisco Proprietary cisco

ANSI T1.617 Annex D ansi

ITU Q.933. Annex A q.933a

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 98 -

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 382

QUESTION NO: 24

You have subnetted the 210.106.14.0 network with a /24 mask.

Your boss at TestKing wants to know how many usable subnetworks and usable host addresses per

subnet this would provide.

What should you tell her?

A. 1 network with 254 hosts

B. 2 networks with 128 hosts

C. 4 networks with 64 hosts

D. 6 networks with 30 hosts

Answer: A

QUESTION NO: 25

TestKing , a fast growing company with one central headquarters site and 3 regional offices, is looking

for a scalable WAN technology. Current plans include adding an additional 7 regional offices with all

sites requiring continuous connectivity. The current HQ router has no free ports.

Which of the following WAN technologies would meet TestKing's requirements?

A. Dedicated PPP/HDLC links

B. Frame Relay

C. ISDN-BRI

D. ADSL

E. Broadband cable service

Answer: D

Explanation:

ADSL work by using a modem and is always on. The question tells you that the HQ router has no free ports, so

by using a ADSL modem, it will be the best choice for this question. The cable modem would also be a good

choice, but without much security, the ADSL is the better answer.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 465

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 99 -

QUESTION NO: 26

You work as a network technician at TestKing. You are configuring a E0 interface connected to the

192.168.1.8/29 LAN on a Cisco router.

You apply the following access list to the interface.

access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any

What consequence will this access list have?

A. All traffic will be allowed to exit E0 except FTP traffic.

B. FTP traffic from 192.168.1.22 to any host will be denied.

C. FTP traffic from 192.168.1.9 to any host will be denied.

D. All traffic exiting E0 will be denied.

E. All FTP traffic to network 192.168.1.8/29 from any host will be denied.

Answer: D

Explanation:

By default access list is having implicit deny statement at the end. In this example there is no permit statement,

so it will deny all traffic exiting E0 Interface.

Incorrect answers

A: It will deny FTP and Telnet Traffic

B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit

statement at the end.

QUESTION NO: 27

Your TestKing trainee Charles is curios about characteristics of link-state routing protocols.

What should you tell him? (Choose three)

A. Packets are routed based upon the shortest path to the destination.

B. Paths are chosen based upon the cost factor to the destination.

C. The exchange of advertisement is triggered by a change in the network.

D. In a multipoint network, all routers exchange routing tables directly with all other routers.

E. Every router in an OSPF area is capable of representing the entire network topology.

F. Only the designated router in an OSPF area is capable of representing the entire network topology.

Answer: A C E

Explanation:

Open Shortest Path First

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 100 -

Each router discovers its neighbors on each interface. The list of neighbors is kept in a neighbor table.

Each router uses a reliable protocol to exchange topology information with its neighbors.

Each router places the learned topology information into its topology database.

Each router runs the SPF algorithm against its own topology database.

Each router runs the SPF algorithm against its own topology database to calculate the best routes to each

subnet in the database.

Each router places the best roué to each subnet into the IP routing table.

The following list points out some of the key features of OSPF:

Converges very quickly – from the point of recognizing a failure, it often can converge in less than 10

seconds.

Supports VLSM.

Uses short Hello messages on a short regular interval, with the absence of hello messages indicating that

a neighbor is no longer reachable.

Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding,

however, does not happened all at once, so the overhead s minimal.

Uses cost for the metric.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 417

QUESTION NO: 28

As a network technician at TestKing you are configuring access lists on an interface of a Cisco router.

You use multiple access lists.

Which of the following statements are valid? (Select one)

A. There is no limit to the number of access lists that can be applied to an interface, as long as they are

applied in order from most specific to most general.

B. Cisco IOS allows only one access list to be applied to an interface.

C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.

D. Up to three access lists per protocol can be applied to a single interface.

E. No more than two access lists can be applied to a single interface.

F. The maximum number allowed varies depending on the amount of RAM installed in the router.

Answer: C

QUESTION NO: 29

You work as a network technician at TestKing. You are configuring a WAN link.

Which are typical Layer 2 encapsulations for this link? (Choose three)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 101 -

A. Ethernet

B. Frame Relay

C. POTS

D. HDLC

E. PPP

F. Token Ring

Answer: B, D E,

Explanation:

WAN data-link protocols used on point-to-point serial links provide the basic function of data delivery across

that one link. The two most popular WAN data-link protocols are High-Level Data Link Control (HDLC) and

PPP.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page

QUESTION NO: 30

Roger is setting up WAN connectivity between the TestKing New York and the TestKing Tokyo offices.

He uses a uses two data link layer encapsulations, one for data and one for signaling.

Which WAN Service does he use?

A. ISDN

B. Frame Relay

C. ATM

D. FDDI

Answer: A

Explanation:

ISDN Q.931 messages are used for signaling.

ISDN B channels are used to transport data.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 327

QUESTION NO: 31

You have segmented a network into two separate segments, segment 1 and segment2, with a Cisco router.

Your boss at TestKing is concerned about the cost, and wants to what the purpose of your action is.

What should you tell him?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 102 -

A. It increases the number of collisions.

B. It decreases the number of broadcast domains.

C. It connects segment 1’s broadcasts to segment 2.

D. It prevents segment 1’s broadcasts from getting to segment 2.

Answer: D

QUESTION NO: 32

Your TestKing trainee Ellen is studying the basic of distance vector and link state routing protocols.

As her mentor, what could you tell her? (Choose two)

A. Distance vector protocols send the entire routing table to directly connected neighbors.

B. Link state protocols send the entire routing table to all routers in the network.

C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the

routing table.

D. Link state protocols send updates containing the state of their own links to all other routers on the

network.

Answer: A D

Explanation:

Distance Vector Protocols:

Distance Vector Protocols advertise routing information by sending messages, called routing updates, out the

interfaces on a router. These updates contain a series of entries, with each entry representing a subnet and a

metric.

Link-State Protocols:

Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding,

however, does not happen all at once, so the overhead is minimal.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 413 + 419

QUESTION NO: 33

Your TestKing trainee Bob wants some information regarding the split horizon rule.

What should you tell him?

A. Only routers can split boundaries (horizons) between concentric networks.

B. All distance vector protocols require fall back routes that may cause momentary loops as the topology

changes.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 103 -

C. Networks can only remain fully converged if all information about routes is sent out all active interfaces.

D. Information about a route should not be sent back in the direction from which the original update came.

E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS

boundary.

Answer: D

Explanation:

Split horizon blocks information about routes from being advertised by a router out of any interface from which

that information originated.

Reference:

http://www.cisco.com/en/US/products/sw/iosswrel/ps1826/products_configuration_guide_chapter09186a00800

877c6.html

QUESTION NO: 34

Your boss at TestKing want you to brief him on differences and similarities between bridges and

switches.

What should you tell her? (Choose two)

A. Bridges are faster than switches because they have fewer ports.

B. A switch is a multiport bridge,

C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame

received.

D. A bridge will forward a broadcast but a switch will not.

E. Bridges and switches increase the size of a collision domain.

Answer: B C

Explanation:

Bridges build the bridge table by listening to incoming frames and examining the source MAC address in the

frame.

Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is

like a distinct virtual bridge within a switch.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 239

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a00801

86a3e.html

QUESTION NO: 35

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 104 -

Exhibit:o/r 0x2142

You are working with a 2500 series Cisco router. You are performing the password recovery procedure.

You have just typed the command shown in the exhibit.

Your TestKing trainee Mahmoud is curious on the purpose of this command.

What should you tell him?

A. To restart the router.

B. To bypass the configuration in NVRAM.

C. To view the lost password.

D. To save the changes to the configuration.

E. To enter ROM Monitor mode.

Answer: B

Explanation:

o/r 0x2142

!--- Changes the value of config-register to 2142, so that the Router boots,

!---ignoring the NVRAM contents.

Reference:

http://www.cisco.com/en/US/products/hw/routers/ps233/products_password_recovery09186a0080094795.shtml

QUESTION NO: 36

You have told your boss at TestKing that the OSI model has 7 layers. He is curious which protocol is on

the application layer. He asks you to give him two examples of items associated with the layer.

What should you tell him? (Select two)

A. ping

B. Telnet

C. FTP

D. TCP

E. IP

Answer: B C

Explanation:

Layer Name Examples

Application (layer 7) Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 105 -

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 34

QUESTION NO: 37

You are working as a network technician at TestKing.

You are required to troubleshooting the WAN link between the TestKing main office at Boston and the

TestKing remote office at Rio De Janeiro.

A Cisco router that was providing Frame Relay connectivity at the Rio de Janeiro site as replaced with a

different vendor’s frame relay router. Connectivity is now down between the Boston and Rio De Janeiro

site.

What is the most likely cause of the problem?

A. Mismatched LMI types.

B. Incorrect DLCI.

C. Mismatched encapsulation types.

D. Incorrect IP address mapping.

Answer: A

Explanation:

Three LMI protocol options are available in Cisco IOS software: Cisco, ITU, and ANSI. Each LMI option is

slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each

end of an access link use the same LMI standard, LMI works fine.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 381

QUESTION NO: 38

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 106 -

Five new routes need to be configured quickly for testing. While connected to a router by console, the

administrator copies and pastes a configuration from a text file, a part of which is shown in the graphic,

into the HyperTerminal window.

Why would host 192.168.10.10/29 be unable to ping the Ethernet interface of the router as a result of this

procedure?

A. The new configuration needs to be saved to the NVRAM before the changes take effect.

B. The router needs to be reloaded before the changes are implemented.

C. The Ethernet network does not show up in the routing table because the RIP configuration is incomplete.

D. The copied configuration did not overwrite the shutdown command on the Ethernet interface.

E. The subnet mask on the router prevents the host from communicating with it.

Answer: D

Explanation:

Default configuration of any interface is always shutdown and always needs the command "no shutdown" in the

interface command mode in order to enable the interface.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 379

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 107 -

QUESTION NO: 39

Exhibit:

The network administrator at TestKing has found the following problem. The remote networks

172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the testking1 router’s serial 0/0 interface.

No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what

is the most likely cause of the problem?

A. No gateway of last resort on testking1.

B. testking1router’s not receiving 172.16.20.0 update.

C. Incorrect static route for 172.16.20.0.

D. 172.16.20.0 not located in testking1’s routing table.

Answer: C

QUESTION NO: 40

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 108 -

You work as a network technician at TestKing. You have subnetted the 213.105.72.0 network with a /28

mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will

provide. What should you tell her?

A. 62 networks and 2 hosts

B. 6 networks and 30 hosts

C. 8 networks and 32 hosts

D. 16 networks and 16 hosts

E. 14 networks and 14 hosts

Answer: E

QUESTION NO: 41

Exhibit:

You are troubleshooting a Cisco router at the main office of TestKing in Toronto.

You enter the show ip route command. The output is displayed in the exhibit.

Which route will not be entered into the routing table of a neighboring router?

A. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0

B. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1

C. C 192.168.1.0/24 is directly connected, Ethernet0

D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0

Answer: C

Explanation:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 109 -

Directly connected routes do not have a next-hop router field, because the packet does not need to be sent to

another router, but instead to the destination host.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 166

QUESTION NO: 42

You work as a network technician at TestKing. You have subnetted the 201.105.13.0 network with a /26

mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will

provide. What should you tell her?

A. 64 networks and 4 hosts

B. 4 networks and 64 hosts

C. 2 networks and 62 hosts

D. 62 networks and 2 hosts

Answer: C

QUESTION NO: 43

Your TestKing trainee Fernanda is studying the spanning three algorithm. She asks you how the

spanning-tree path cost is determined by default.

What should you tell her?

A. Total hop count.

B. Sum of the costs based on bandwidth.

C. Dynamically determined based on load.

D. Individual link cost based on latency.

Answer: B

QUESTION NO: 44

You are giving a lecture on the Spanning-Tree algorithm for your TestKing trainees.

You need to connect the Spanning-Tree Protocol states with the correct functions.

(Not all options are used.)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 110 -

Answer:

Explanation:

Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward

traffic or learn MAC addresses on the interface.

Learning –learns MAC addresses and builds a filter table but does not forward frames.

Forwarding – Sends and receives all data on the bridged port.

Blocking – are used to prevent network loops.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 111 -

Reference:

CCNA Study guide Second Edition (Sybex, Todd Lammle) page 82

QUESTION NO: 45

You work as a network technician at TestKing. You are required to establish a Telnet session with a cisco

router. Which commands should you use?

A. testking1(config)# line console 0

testking1(config-if)# enable password testking

B. testking1(config)# line console 0

testking1(config-line)# enable secret testking

testking1(config-line)# login

C. testking1(config)# line console 0

testking1(config-line)# password testking

testking1(config-line)# login

D. testking1(config)# line vty 0

testking1(config-line)# enable password testking

E. testking1(config)# line vty 0

testking1(config-line)# enable secret testking

testking1(config-line)# login

F. testking1(config)# line vty 0

testking1(config-line)# password testking

testking1(config-line)# login

Answer: F

Explanation:

Access from Password Type Configuration

Telnet vty password line vty 0 4

login

password cisco

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 177

QUESTION NO: 46

A Law firm has offices in three different countries. Two of the offices have network connectivity to each

other. The third office has recently received a router and is to be connected to the other two. The names

of the routers are TestKing1, TestKing2, and TestKing3. Configure the TestKing3's router's IP addresses

on the E0 and S1 interfaces so that the E0 interface receives the first usable subnet while the S1 interface

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 112 -

receives the second usable subnet from the network 192.168.101.0/28. Both interfaces should receive the

first available IP of the subnet. The zero subnet should not be used. The routers have been configured

with the following specifications.

The routers are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol.

Clocking is provided on the serial 0 interfaces

The secret password on the TestKing3 router is "testking"

The subnet mask of all networks other than 192.168.101.0 is the default mask.

The IP addresses are listed in the chart below.

TestKing1

E0 192.168.93.1

S0 192.168.95.1

TestKing2

E0: 192.168.97.1

S0: 192.168.101.42

S1: 192.168.95.2

TestKing3

E0 to be determined

S1 to be determined

Secret password: testking

To configure the router click on the host icon that is connect to a router by a serial console cable.

Answer:

TestKing3> enable

Password: testking

TestKing3 # config terminal

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 113 -

TestKing3 (config) # interface ethernet 0

TestKing3 (config-if) # ip address 192.168.101.17 255.255.255.0

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config-) # interface serial 0

TestKing3 (config-if) # ip address 192.168.101.33 255.255.255.0

TestKing3 (config-if) # clock rate 64000

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config) # router rip

TestKing3 (config-router) # network 192.168.93.0

TestKing3 (config-router) # network 192.168.95.0

TestKing3 (config-router) # network 192.168.101.0

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 165

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 486

QUESTION NO: 47

You work as a network consultant. You are planning a network installation for a large organization

named TestKing. The design requires 100 separate subnetworks, so TestKing has acquired a Class B

network address.

What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required

per subnet?

A. 255.255.240.0

B. 255.255.246.0

C. 255.255.252.0

D. 255.255.254.0

E. 255.255.255.0

F. 255.255.255.192

Answer: D

QUESTION NO: 48

Your TestKing trainee Jose are interested in ACLs (access control lists).

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 114 -

He asks you want they can be used for.

What should you tell him? (Choose three)

A. Protect hosts from viruses.

B. Classify network traffic.

C. Provide high network availability.

D. Identify interesting traffic for DDR.

E. IP route filtering.

F. Monitor the number of bytes and packets.

Answer: C, D, E

Explanation:

IP access control lists (ACLs) cause a router to discard some packets based on criteria defined by the network

engineer. The goal of these filters is to prevent unwanted traffic in the network – whether to prevent hackers

from penetrating the network or just to prevent employees from using systems they should not be using.

IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for

prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service

features.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 427

QUESTION NO: 49

You are configuring a network at TestKing main site in Toronto. You use a distance vector routing

protocol.

What could you use to prevent rooting loops in the network? (Choose two)

A. Link-state advertisements (LSA)

B. Spanning Tree Protocol

C. Shortest path first tree

D. Split horizon

E. Hold-down timers

Answer: D E

Explanation:

Split horizon – the routing protocol advertises routes out an interface only if they were not learned from

updates entering that interface.

Hold-down timer – After finding out that a router to a subnet has failed, a router waits a certain period

of time before believing any other routing information about that subnet.

Reference:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 115 -

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 154

QUESTION NO: 50

Exhibit:

Refer to the router topology shown in the exhibit. Assuming that all routers are running RIP, which

statements describe how the routers exchange their routing tables? (Choose two)

A. TestKing1 exchanges with TestKing3.

B. TestKing1 exchanges with TestKing4.

C. TestKing1 exchanges with TestKing2.

D. TestKing4 exchanges with TestKing3.

E. TestKing4 exchanges with TestKing1.

F. TestKing4 exchanges with TestKing2.

Answer: B, D

QUESTION NO: 51

Your TestKing trainee Boris is configuring a serial interface on a Cisco router.

He asks you which encapsulations he can use on the interface.

What should you tell him? (Choose three)

A. Ethernet

B. Token Ring

C. HDLC

D. Frame Relay

E. PPP

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 116 -

Answer: A, D, E

QUESTION NO: 52

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing

requires 5 usable subnets, each capable of accommodating at least 18 hosts.

Which subnet mask should you use?

Answer: 255.255.255.224

Explanation:

Default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets , then 3 bits are

required . With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts

using 5 bits in host field. This matches with requirement.

QUESTION NO: 53

Exhibit:

Refer to the topology shown in the graphic. Each host is connected through its own 10Mbps half-duplex

switch port to the e0 interface of the router TestKing1.

What is the bandwidth available to each host?

A. 1 Mbps

B. 10 Mbps

C. 20 Mbps

D. 100 Mbps

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 117 -

Answer: D

QUESTION NO: 54

Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router

provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are

configured, and the network is functional. Configure and apply an access list will prevent telnet access to

the TestKing3 router while allowing all other traffic to pass. The access list should not contain more than

three (3) statements and should be applied to the TestKing3 router. The routers have been previously

configured with the following specifications:

The routers are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol.

The clocking signal is provided on the serial 0 interfaces.

All passwords on all routers are "testking".

The subnet mask on all the interfaces is the default mask.

IP addresses are listed in the chart below.

TestKing1

E0 192.168.149.1

S0 192.168.199.1

Secret password: testking

TestKing2

E0 192.168.155.1

S0 192.168.11.1

S1 192.168.199.2

Secret password: testking

TestKing3

E0 192.168.165.1

S1 192.168.11.2

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 118 -

To configure the router click on the host icon that is connected to a router by a serial console cable.

Answer:

Testking3(config): Interface E0 testking3(config-if): Access-list 101 deny TCP any 192.168.165.0 0.0.0.255 eq 23 testking3(config-if): Access-list 101 permit IP any any testking3(config): interface S1 testking3(config-if): Ip Access-group 101 IN

QUESTION NO: 55

You work as a network technician at TestKing. You have completed the password recovery procedure on

a Cisco router. The process is successful and the router returns to normal operation.

What is configuration register value at this point of time?

A. 0x2100

B. 0x2101

C. 0x2102

D. 0x2124

E. 0x2142

Answer: C

Explanation: It is default factory setting. Router should attempt to load an IOS from flash memory and load

startup configuration file. Flash memory also called NVRAM

Incorrect answers

A: It is ROM Monitor mode. A low level problem determination

B: Router to boot from ROM

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 119 -

E: The value 0x2142 to be set for configuration register in case of password recovery procedure

QUESTION NO: 56

What feature of a networks switch allows an administrative to create separate broadcast domains?

A. Store-and-forward switching

B. Microsegmentation

C. Transparent bridging

D. Fragment-free switching

E. Virtual LANs

F. Cut-through switching

Answer: E

Explanation: Creation of VLAN in a switch provide separate Broadcast domain . If VLAN is not there all ports

as members of one Broadcast domain.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 172

Incorrect Answers

A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast

domains

B: Not related to the question

C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the

bridges exists. It will not play any role for creating separate broadcast domain

D,F: Both are switching methods in a switch.

QUESTION NO: 57

New switches have been purchased for a network upgrade. The objective for the network design

emphasizes efficient, error-free transport instead of fast transport.

Which switching mode should be configured on the new switches to provide error-free transport to the

network?

A. cut-through

B. fragment-free

C. frame-filtering

D. store-and-forward

E. 802.1q forwarding

F. VTP transparent mode

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 120 -

Answer: D

Explanation:

The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check

the FCS before forwarding the frame. FCS is Ethernet Trailer.

Incorrect answers:

A. The Switch performs the address table lookup as soon as the destination address field in the header is

received. The first bits in the frame can be sent out to out port before the final bits in the incoming

frame are received. This does not allow the switch to discard frames that fail the FCS check.

B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the

outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision

will not be forwarded. The FCS still cannot be checked.

C,E,F : They are not related to Switch mode transport.

QUESTION NO: 58

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network

hosts? (Select three.)

A. 15.234.118.63

B. 92.11.178.93

C. 134.178.18.56

D. 192.168.16.87

E. 201.45.116.159

F. 217.63.12.192

Answer: B, C, D

Explanation:

B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)

C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)

D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95

Incorrect answers: A. is a broadcast E. is a broadcast F. is a network id

QUESTION NO: 59

A technician at TestKing needs to update the network documentation. One of the tasks includes

documenting the name of the IOS image file of each router in the network.

Which commands could be used to find this information?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 121 -

A. Router# show protocols

B. Router# show version

C. Router# show image

D. Router# show IOS

E. Router# show flash

Answer: B

"Show flash" displays all the image files in it. There could be more than one file. However, "show version"

displays the one that is currently in use by the router.)

Incorrect answers:

A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address

if configured.

C,D. There are no such commands.

QUESTION NO: 60

Which statement describes the rule of split horizon?

A. Only routers can split boundaries (horizons) between concentric networks.

B. All distance vector protocols require fall back routers that may cause momentary loops as the topology

changes.

C. Networks can only remain fully converged if all information about routers is sent out all active

interfaces.

D. Information about a route should not be sent back in the direction from which the original update come.

E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS

boundary.

Answer: D

Explanation:

Split horizon includes two related concepts that affect what routes are included in a routing update:

An update does not include the subnet of the interface out which the update is sent

All routes with outgoing interface of interface x are not included in updates sent out that same interface x.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 369

Incorrect Answers

A: There is no such requirement

B: Distance vector protocols updates routing table at regular intervals instead of Topology changes

C: This is not a feature of split horizon

E: This is not a related feature for split horizon

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 122 -

QUESTION NO: 61

Exhibit:

Which of the following is the minimum configuration commands required to bring up the ISDN link

shown in graphic.

Note : SPIDs are not required for this switch. (Choose three)

A. Router(Config-if)# encapsulation ppp

B. Router(Config-if)# isdn switch-type type

C. Router(Config-if)# dialer-list, protocol ip permit

D. Router(Config-if)# dialer map ip address name name connection number.

E. Router(Config-if)# ip address subnet mask

F. Router(Config-if)# dialer group 1

Answer: A, E, F

Explanation:

A: Proper encapsulation to be defined on both routers.

E: IP address to be assigned for interface with subnet mask

F: Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration

command.

Incorrect Answers:

B, C:The commands are executed on global configuration command.

D: Syntax is wrong. Proper syntax is dialer map ip ip address/subnet mask name connection name number.

QUESTION NO: 62

Which of the following are characteristics of PPP? (Choose three)

A. Can be used over analog circuits.

B. Maps Layer 2 to Layer 3 address.

C. Encapsulates several routed protocols.

D. Supports IP only.

E. Provides error correction.

Answer: A C E

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 123 -

Explanation:

PPP can be used on either type of line (dial or switched lines), because data-link protocols are designed

for point-to-point environment.

PPP uses one LCP per link and one Control Protocol for each Layer 3 protocol defined on the link. If a

router is configured for IPX, Apple Talk, and IP on a PPP serial link, the router configured for PPP

encapsulation automatically tries to bring I the appropriate control protocols for each layer 3 protocol.

Error recovery can be performed by the data-link protocol or a higher-layer protocol, or it might not be

performed at all. Supported but not enabled by default.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 309

QUESTION NO: 63

A user types the command ping 204.211.38.52 during a router console session.

What does this command use to test connectivity between the two devices?

A. ICMP echo request

B. Information request

C. Timestamp reply

D. Redirect

E. Source quench

Answer: A

Explanation:

The ping command sends an ICMP echo request packet to the stated destination address. The TCP/IP software

at the destination then replies to the ping echo request packet with a similar packet, called ICMP echo reply.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 146

QUESTION NO: 64

An administrator must assign static IP addresses to the servers in the network. For network

192.168.20.24/29 the router is assigned the first usable host address while the sales server is given the last

usable host address.

Which of the following should be entered into the IP properties box for the sales server?

A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9

B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 124 -

C. IP address: 192.168.20.30 Subnet Mask 255.255.255.248 Default Gateway: 192.168.20.25

D. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.17

E. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.25

Answer: E

QUESTION NO: 65

Which two statements about the store and forward switching method are true? (Choose two)

A. Latency remains constant regardless of frame size.

B. Latency through the switch varies with frame length.

C. The switch receives the complete frame before beginning to forward it.

D. The switch checks the destination address as soon as it receives the header and begins forwarding the

frame immediately.

Answer: B C

Explanation:

With store-and-forward, the entire frame is received by the switch before the first bit of the frame is forwarded.

As soon as the incoming switch port receives enough of the frame to see the destination MAC address, the

forwarding decision is made and the frame is transmitted out the appropriate outgoing port to the destination

device. So, each frame might experience slightly less latency.

Reference:

CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 243

QUESTION NO: 66

Match the hex and decimal numbers listed on the left with the corresponding binary number listed on the

right. Not all options apply.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 125 -

Answer:

Explanation:

170 (Decimal) = 10101010

192 (Decimal) = 11000000

F1 (241 = Decimal) = 11110001

9F (159 = Decimal) = 10011111

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 126 -

Reference:

http://www.cisco.com/en/US/products/hw/switches/ps2246/products_programming_reference_guide_chapter09

186a00800c33e4.html

QUESTION NO: 67

A group of bakeries wants to provide network connectivity for 3 factories in the group. Each factory is to

have one LAN. The TestKing1 and TestKing2 routers are completely configured. The TestKing3 router

has been configured except the routing protocol. Configure the routing protocol to allow a host on the

LAN of the TestKing3 router to communicate with a host on the TestKing2 router. The routers have been

configured with the following specifications:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 127 -

The routers are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol

The clocking is provided on the serial 0 interfaces.

The secret password on the TestKing3 router is "testking"

The subnet masks on all interfaces is the default mask.

The IP addresses are listed in the chart

TestKing1

E0 192.168.149.1

S0 192.168.179.1

TestKing2

E0 192.164.155.1

S0 192.168.111.1

S1 192.168.179.2

TestKing3

E0 192.168.165.1

S1 192.111.2

To configure the router click on a host icon that is connected to a router by a serial cable.

Answer: TestKing3#config t Testking3(config)#router rip Testking3(config-router)#network 192.168.165.0 Testking3(config-router)#network 192.168.111.0 Testking3(config)# Ctrl-Z **Output omitted**

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 128 -

TestKing3#copy running-config startup-config **Output omitted**

[OK]TestKing3#_

QUESTION NO: 68

Which of the following statements are characteristic of a typical VLAN arrangement? (Choose three)

A. VLANs logically divide a switch into multiple, independent switches at Layer 2.

B. A VLAN can span multiple switches.

C. VLANs typically decrease the number of broadcast domains.

D. Trunk links can carry traffic for multiple VLANs.

E. VLAN implementation significantly increases traffic on a network because trunking information must

be added to each packet.

F. VLANs extend the collision domain to include multiple switches.

Answer: A, B, D

QUESTION NO: 69

Which of the following options can be negotiated using LCP during the PPP link establishment? (Choose

three)

A. callback

B. IPCP

C. CHAP

D. multilink

E. TCP

F. Q.931

Answer: B C D

Explanation:

The NCP phase is used for establishing and configuring different network-layer protocols.

The most common layer 3 protocol negotiated is IP. The routers exchange IP Control Protocol (IPCP)

messages negotiating options specific to the protocol.

Point-to-Point Protocol (PPP) currently supports two authentication protocols: Password Authentication

Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Both are specified in RFC

1334 and are supported on synchronous and asynchronous interfaces.

Reference:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 129 -

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310+311

QUESTION NO: 70

Match the ISDN term to the appropriate description. Not all options on the left apply.

Answer:

Explanation:

LAPD – provides the data link protocol that allows delivery of messages across that D-channel to the

local switch.

LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. It

is defined by ITU-T Recommendations Q.920 and Q.921.

TE1 – ISDN –capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point.

ITU.T.430 – Defines connectors, encoding, framing, and reference points.

TE2 – Equipment that does not understand ISDN protocols and specifications (no ISDN awareness).

Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA.

NT1 – CPE equipment in North America. Connects with a U reference point (two-wire) to the telco.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page Chapter 10

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 130 -

QUESTION NO: 71

Exhibit:

An employee Tess of TestKing company has moved to an office on a different floor. Although the

administrator is able to telnet to all of the routers, the address of Switch TestKing5 is needed in order to

verify that Tess remains in the same VLAN.

Which action could be used by the administrator to find the IP address of TestKing5?

A. Issue the show ip route command on Router TestKing1.

B. Issue the show ip route command on Router TestKing3.

C. Issue the show cdp neighbors command on Router TestKing2.

D. Issue the show cdp neighbors detail command on Router TestKing3.

E. Issue the show arp command on Router TestKing1.

F. Issue the show arp command on Router TestKing2.

Answer: D

Explanation:

To display detailed information about neighboring devices discovered using Cisco Discovery Protocol (CDP),

use the show cdp neighbors privileged EXEC command.

Detail - (Optional) Displays detailed information about a neighbor (or neighbors) including network address,

enabled protocols, hold time, and software version.

Reference:

http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_command_reference_chapter09186a00800

d983f.html#1019534

QUESTION NO: 72

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 131 -

Which of the following commands can be used to configure the address on the TestKing2 serial interface?

A. TESTKING2(config-if)# ip address 172.16.17.1 255.255.255.0

B. TESTKING2(config-if)# ip address 172.16.18.255 255.255.252.0

C. TESTKING2(config-if)# ip address 172.16.17.2 255.255.255.252

D. TESTKING2(config-if)# ip address 172.16.16.0 255.255.255.0

Answer: C

Explanation: The IP address on the S0/0 interface must be on the same subnet as the S0/0 interface on

TestKing. A 22 bit subnet mask must be used.

QUESTION NO: 73

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 132 -

Users on the TestKing2 site Ethernet are unable to access the TestKing1 site network. After reviewing the

command output, what is the most likely cause of the problem?

A. Incorrect IP addressing

B. Frame relay is incorrectly configured.

C. IGRP is incorrectly configured.

D. Link state routing protocol is needed.

Answer: C

Explanation:

router igrp

To configure the Interior Gateway Routing Protocol (IGRP) routing process, use the router igrp global

configuration command. To shut down an IGRP routing process, use the no form of this command.

router igrp autonomous-system

autonomous-system- Autonomous system number that identifies the routes to the other IGRP routers. It is also

used to tag the routing information.

Reference:

http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_command_summary_chapter09186a00800

f0ab0.html#3674

QUESTION NO: 74

Exhibit:

Company TestKing has just added an employee workstation to its network. The employee is unable to

connect to the server TestKingA at IP address 192.168.10.98/27. Identify the incorrectly configured

network parameter in the workstation configuration.

A. Workstation IP address

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 133 -

B. Workstation subnet mask

C. Workstation default gateway

D. IP address of the Ethernet 0 router interface

Answer: B

QUESTION NO: 75

Your TestKing trainee Bob asks you what 11111000 binary is in decimal. What should you tell him?

A. 5

B. 192

C. 224

D. 240

E. 248

Answer: E

Explanation:

128 + 64+32+16+8 = 248

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 559

QUESTION NO: 76

Exhibit:

Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network. The network

administrator connected to router TestKing1 via the console port, issued the show ip route command,

and was able to ping the server. Based on the output of the show ip route command and the topology

shown in the graphic, what is the cause of the failure?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 134 -

A. The network has not fully converged.

B. IP routing is not enabled.

C. A static route is configured incorrectly.

D. The FastEthernet interface on TestKing1 is disabled.

E. The neighbor relationship table is not correctly updated.

F. The routing table on TestKing1 has not updated.

Answer: E

QUESTION NO: 77

Exhibit:

Refer to the displayed graphic. TestKing2 and TestKing3 are configured for RIPv1 and have complete

connectivity. TestKing1 is added to the network.

What is the most appropriate TestKing1 configuration for full connectivity?

A. TestKing1(config)# router rip

TestKing1(config-router)# network 10.0.0.0

TestKing1(config-router)# network 172.16.0.0

TestKing1(config-router)# network 192.168.1.0

B. TestKing1(config)# router rip

TestKing1(config-router)# network 10.0.0.0

C. TestKing1(config)# router rip

TestKing1(config-router)# network 10.0.0.0

TestKing1(config-router)# network 172.16.0.0

D. TestKing1(config)# router rip

TestKing1(config-router)# network 10.0.0.0

TestKing1(config-router)# network 192.168.1.0

Answer: A

Reference:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 135 -

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 167

QUESTION NO: 78

You are working as network administrator/technician at TestKing Inc.

While troubleshooting a network connectivity problem, you observe steady link lights on both the

workstation NIC and the switch port to which the workstation is connected. However, when the ping

command is issued from the workstation, the output message “Request timed out” is displayed.

At which layer of the OSI model does the problem most likely exist?

A. The session layer

B. The protocol layer

C. The data link layer

D. The access layer

E. The network layer

F. The application layer

Answer: E

Explanation:

TCP/IP includes ICMP, a protocol designed to help manage and control the operation of a TCP/IP network. The

ICMP protocol provides a wide variety of information about a network’s health and operational status. Control

message is the most descriptive part of a name. ICMP helps control and manage IP’s work and therefore is

considered part of TCP/IP’s network layer.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 277

QUESTION NO: 79

Exhibit:

Your boss Dr King studies the network diagram shown in the exhibit. She asks you which function the

Frame Relay DLCI provides with respect to TestKing1. What should you tell her?

A. Defines the signaling standard between TestKing1 and the frame switch.

B. Identifies the circuit between TestKing1 and the frame switch.

C. Identifies the circuit between TestKing2 and the frame switch.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 136 -

D. Identifies the encapsulation used between TestKing1 and TestKing2.

E. Defines the signaling standard between TestKing2 and the frame switch.

Answer: B

Explanation:

TestKing1 sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and

forwards the frame through the Frame Relay network until it reaches the switch connected to TestKing2. The

TestKing2’s local switch forwards the frame out of the access link to TestKing2.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 386

QUESTION NO: 80

Exhibit:

Refer to the graphic. TestKingA is communicating with the server.

What will be the source MAC address of the frames received by TestKingA from the server?

A. The MAC address of router interface e0.

B. The MAC address of router interface e1.

C. The MAC address of the server network interface.

D. The MAC address of TestKingA.

Answer: A

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 137 -

QUESTION NO: 81

You work as network administrator at TestKing Ltd. TestKing has three different sites with one router

at each site. The routers are named TestKing1, TestKing2, and TestKing3. A non-certified technician has

configured all the routers, but no connectivity exists between the routers. You task is to identify all

error(s) and make the necessary adjustment(s) to establish network connectivity.

The routers have been configured with the following configuration:

They are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol

Clocking is provided on the serial 0 interface.

The password on each router is "testking"

The subnet mask on all interfaces is the default subnet mask.

The IP addresses are listed in the chart below.

TestKing1

E0 192.168.3.1

S0 192.168.5.1

TestKing2

E0 192.168.8.1

S0 192.168.11.1

S1 192.168.5.2

TestKing3

E0 192.168.13.2

S1 192.168.11.2

To configure the router click on a host icon that is connected to the router by a serial console cable.

Answer:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 138 -

Explanation:

Click on Host 2:

Router TestKing1:

TestKing1> enable

Password: testking

TestKing1 # config terminal

TestKing1 (config) # interface ethernet 0

TestKing1 (config-if) # ip address 192.168.3.1 255.255.255.0

TestKing1 (config-if) # no shutdown

TestKing1 (config-if) # exit

TestKing1 (config) # interface serial 0

TestKing1 (config-if) # ip address 192.168.5.1 255.255.255.0

TestKing1 (config-if) # no shutdown

TestKing1 (config-if) # exit

TestKing1 (config) # router rip

TestKing1 (config-router) # network 192.168.3.1

TestKing1 (config-router) # network 192.168.5.1

TestKing1 (config-router) # Ctrl-Z

TestKing1 # copy running-config startup-config

Click on Host 4

Router TestKing2:

TestKing2> enable

Password: testking

TestKing2 # config t

TestKing2 (config) # interface ethernet 0

TestKing2 (config-if) # ip address 192.168.8.1 255.255.255.0

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # interface serial 0

TestKing2 (config-if) # ip address 192.168.11.1 255.255.255.0

TestKing2 (config-if) # clock rate 64000

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # interface serial 1

TestKing2 (config-if) # ip address 192.168.5.2 255.255.255.0

TestKing2 (config-if) # no shutdown

TestKing2 (config-if) # exit

TestKing2 (config) # router rip

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 139 -

TestKing2 (config-router) # network 192.168.8.0

TestKing2 (config-router) # network 192.168.11.0

TestKing2 (config-router) # network 192.168.5.0

TestKing2 (config-router) # Ctrl-Z

TestKing2 # copy running-config startup-config

Router TestKing3:

Click on Host F

TestKing3> enable

Password: testking

TestKing3 # config t

TestKing3 (config) # interface ethernet 0

TestKing3 (config-if) # ip address 192.168.13.2 255.255.255.0

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config) # interface serial 1

TestKing3 (config-if) # ip address 192.168.11.2 255.255.255.0

TestKing3 (config-if) # no shutdown

TestKing3 (config-if) # exit

TestKing3 (config) # router rip

TestKing3 (config-router) # network 192.168.13.0

TestKing3 (config-router) # network 192.168.11.0

TestKing3 (config-router) # Ctrl-Z

TestKing3 # copy running-config startup-config

QUESTION NO: 82

An OSPF interface has been configured with the bandwidth 64 command.

What will be the calculated OSPF cost of this link?

A. 1

B. 10

C. 1562

D. 64000

E. 128000

Answer: C

cost = 10^8 / bandwidth in bps

= 1562

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 140 -

QUESTION NO: 83

What is the purpose of DLCIs in Frame Relay?

A. The determine the Frame Relay encapsulation type.

B. They identify the logical circuit between a local router and a Frame Relay WAN switch.

C. They represent the keepalives used to maintain the PVC in an active state.

D. They represent the physical address of the router attached to a Frame Relay network.

Answer: B

Explanation:

Routers use the data-link connection identifier (DLCI) as the Frame Replay address, which identifies the VC

over which the frame should travel.

Reference:

CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 377

QUESTION NO: 84

Which statements is true regarding the command sequence shown below? (Choose three)

RouterA(config)# interface loopback 0

RouterA(config-if)# ip address 192.168.31.33 255.255.255.255

A. It creates a virtual, software only, interface.

B. It uses a wildcard mask of 255.255.255.255.

C. It ensures that an interface is always active for OSPF processes.

D. It provides a way to test the convergence of OSPF routing updates.

E. The mask of 255.255.255.255 is called a host mask.

F. These commands can only be issued to configure serial interfaces.

Answer: A B F

QUESTION NO: 85

TestKing wants to implement 1000mbps Ethernet. Which IEEE standards apply in this scenario? (chose 2)?

A. 802.3ae

B. 802.3u

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 141 -

C. 802.3z

D. 802.3i

E. 802.3ab

F. 802.3e

Answer: C. E

IEEE 802.3z 1000BASE-SX.

The 1000BaseT standard was released in June 1999, defined by IEEE 802.3ab.

Incorrect Answer:

On June 17, 2002 the IEEE 802.3ae specification for 10 Gigabit Ethernet was approved as an IEEE standard

by the IEEE Standards Association (IEEE-SA) Standards Board.

IEEE 802.3u 100BASE-TX

QUESTION NO: 86

Which statement describes the routing protocol OSPF( Choose 3)?

A. it supports VLSM

B. it is used to router between Autonomous System.

C. It confines network instability to one area of network.

D. It increases routing overhead over the network

E. It allows extensive control of the routing update

F. It is simpler to configure than RIPv2

Answer: A, D, E

QUESTION NO: 87

Error detection schemes use which field of frame to detect error?

A. .MTU

B. MAC

C. FCS

D. PDU

E. ERR

F. Flag

Answer: C

Explanation: The FCS is used for error checking.

Reference: Todd Lammle's 4th edition study guide, Chapter 5 ip routing pages.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 142 -

QUESTION NO: 88

Your TestKing trainee Tess asks you to list options for Frame LMI types. (Choose three)

A. IETF

B. Q.931

C. Q933a

D. IEEE

E. Cisco

F. ANSI

Answer: C, E, F

QUESTION NO: 89

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network

hosts? (Choose three)

A. 15.234.118.63

B. 82.11.178.93

C. 134.178.18.56

D. 192.168.16.87

E. 201.45.116.159

F. 217.63.12.192

Answer: B, C, E

QUESTION NO: 90

Which command will provide you with information regarding the Layer 3 configuration of directly

connected router interfaces?

A. show ip interface

B. show cdp neighbors

C. show cdp neighbors detail

D. show ip route

E. show ip link status

F. telnet

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 143 -

Answer: C

QUESTION NO: 91

Exhibit:

You work as a network administrator at TestKing Inc. Hosts in the TestKing sales department are

unable to access a new server at the Branch Office. Consider the IP addressing scheme in the

accompanying graphic to determine the problem.

A. The default gateway of the workstations in the sales department is incorrect.

B. The subnet mask of the workstations in the sales department is incorrect.

C. The default gateway of the server at the Branch Office is incorrect.

D. The host address of the server at the Branch Office is invalid.

E. The serial 0 interface on the Main Office router and the serial 1 interface on the Branch Office router are

not on the same subnetwork.

Answer: D

Explanation: When you convert the IP address (205.113.20.96) of the server and the subnet mask

(255.255.255.240) to binary you will get the following results: (IP address first and then the subnet mask.)

11001101 01110001 00010100 01100000

11111111 11111111 11111111 11100000

Thus it is determined that the IP address on the host is in fact the subnet address. This is what would be causing

the network problems.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 144 -

Incorrect Answers:

A. The default gateway in the sales department is correct.

B. The subnet mask is correct.

C. The default gateway in the branch office is correct.

E. This is no problem here.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 234.

QUESTION NO: 92

You have a Class B network address with a subnet mask of 255.255.255.0.

Which of the following statements are true regarding the resulting network? (Choose two)

A. There are 254 usable hosts per subnet.

B. There is one usable network.

C. There are 255 usable hosts per subnet.

D. There are 254 usable subnets.

E. There are 30 usable subnets.

F. There are 64 usable hosts per subnet.

Answer: A, D

QUESTION NO: 93

When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be

configured?

A. The Frame Relay encapsulation on the physical interface.

B. The local DLCI on each subinterface.

C. An IP address on the physical interface.

D. The subinterface type as point-to-point.

Answer: B

QUESTION NO: 94

The following access list was applied outbound on the E0 interface connected to the 192.168.1.8/29 LAN:

access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 145 -

access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any

What effect will this access list have?

A. All traffic will be allowed to exit E0 except FTP traffic.

B. FTP traffic from 192.168.1.22 to any host will be denied.

C. FTP traffic from 192.168.1.9 to any host will be denied.

D. All traffic exiting E0 will be denied.

E. All FTP traffic to network 192.168.1.9/29 from any host will be denied.

Answer: A

QUESTION NO: 95

Which command is used to display the placement and direction of an IP access control list on a router?

A. show access-list

B. show ip route

C. show ip interface

D. show interface

E. show interface list

F. show ip interface brief

Answer: C

QUESTION NO: 96

Which of the following are characteristics of microsegmentation? (Choose two)

A. Dedicated paths between sending and receiving hosts are established.

B. The number of collision domains is decreased.

C. Broadcast domains are enlarged.

D. Multiple subnetwork broadcast addresses are created.

E. Multiple ARP tables are required on the connected hosts.

F. Bandwidth is dedicated to connect hosts.

Answer: A, F

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 146 -

QUESTION NO: 97

You are the network administrator of the TestKing company and receive a call from a user who is unable

to reach a server at a remote site. After further review your discover the following information.

local PC 10.0.3.35/24

default gateway 10.0.3.1

remote server 10.0.5.250/24

You then conduct the following tests from the offending local PC.

ping 127.0.0.1 – unsuccessful

ping 10.0.3.35 – unsuccessful

ping 10.0.3.1 – unsuccessful

ping 10.0.5.250 – unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed.

B. Local physical layer problem.

C. Default gateway down.

D. Remote physical layer problem.

Answer: B

QUESTION NO: 98

Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN?

A. To provide a mechanism for network monitoring in switched environments.

B. To prevent routing loops in networks with redundant paths.

C. To prevent switching loops in networks with redundant switched paths.

D. To manage, the addition, deletion, and naming of VLANs across multiple switches.

E. To segment a network into multiple collision domains.

Answer: C

QUESTION NO: 99

You TestKing trainee Tess ask you which parameter must be supplied when initializing the IGRP routing

process. What should you tell her?

A. Connected network numbers

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 147 -

B. IP address mask

C. Metric weights

D. Autonomous system number

E. Register administrative id

Answer: E

QUESTION NO: 100

You work as a network technician at TestKing. You need to add a new VLAN, named ACCOUNTS, to

your switched network.

Which of the following are true regarding configuration of this VLAN? (Choose three)

A. The VLAN must be created.

B. The VLAN must be named.

C. An IP address must be configured for the ACCOUNTS VLAN.

D. The desired ports must be added to the new VLAN.

E. The VLAN must be added to the STP domain.

Answer: A, C, D

QUESTION NO: 101

Bob, your TestKing trainee, want to segment a network. What devices could he use?

(Choose three)

A. hub

B. repeater

C. switch

D. bridge

E. router

F. media converter

Answer: C, D, E

QUESTION NO: 102

The junior TestKing trainee Ellen asks you to describe what is specific for a global command.

What should you tell her?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 148 -

A. A command that is available in every release of IOS, regardless of the version or deployment status.

B. A command that can be entered in any configuration mode.

C. A command that is universal in application that supports all protocols.

D. A command that is implemented in all foreign and domestic IOS versions.

E. A command that is set once and affects the entire router.

Answer: D

QUESTION NO: 103

What is the range of binary values for the first octet in Class B addresses?

A. 10000000-11111111

B. 00000000-10111111

C. 10000000-10111111

D. 10000000-11011111

E. 11000000-11101111

Answer: C

QUESTION NO: 104

Which of the following access list statements will deny all telnet connections to subnet 10.0.1.0/24?

A. access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet

B. access-list 115 deny tcp any 10.0.1.0 eq telnet

C. access-list 115 deny udp any 10.0.10 eq 23

D. access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23

E. access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23

Answer: D

QUESTION NO: 105

Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN?

A. To provide a mechanism for network monitoring in switched environments.

B. To prevent routing loops in networks with redundant paths.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 149 -

C. To prevent switching loops in networks with redundant switched paths.

D. To manage, the addition, deletion, and naming of VLANs across multiple switches.

E. To segment a network into multiple collision domains.

Answer: C

QUESTION NO: 106

Which wireless data command type has a high data rate but is limited to very short distances?

A. narrowband

B. spread spectrum

C. infrared

D. broadband personal comm. Service (PCS)

Answer: Pending. Send your suggestions to [email protected].

QUESTION NO: 107

Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be

distributed to all the switches in a domain?

A. STP

B. VTP

C. GVRP

D. SNMP

E. DHCP

Answer: B

Explanation :

Sybex CCNA Study Guide 4th Edition (Page 359)

” The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched

internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete,

and rename VLANs—information that is then propagated to all other switches in the VTP domain.”

QUESTION NO: 108

Which of the follow types of crosstalk?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 149 -

A. near-end crosstalk(NEXT)

B. jitter crosstalk(JEXT)

C. far end crosstalk(FEXT)

D. middle closed-end crosstalk(MCEXT)

E. power sum near-end crosstalk(PSNEXT)

Answer: B, C

QUESTION NO: 109

Which of the following are VLAN frame encapsulation types that may be configured on a catalyst

switch? (Choose 2)

A. VTP

B. ISL

C. CDP

D. 802.1Q

E. LLC

Answer: B, D

ISL and 802.1Q are the two trunking encapsulations.

QUESTION NO: 110

What command will configure an interface on a Catalyst 2900 series switch to carry traffic from all

VLANs to another directly connected switch? (Choose two)

A. Switch(config-if)# vlan all

B. Switch(config-if)# switchport access clan 30

C. Switch(config-if)# switchport access vlan all

D. Switch(config-if)# switchport mode trunk

E. Switch(config-if)# switchport trunk encapsulation dot1q

Answer: D, E

QUESTION NO: 111

Why do large OSPF networks use a hierarchical design? (Choose three)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 150 -

A. To decrease latency by increasing bandwidth

B. To reduce routing overhead

C. To speed up convergence

D. To confine network instability to single areas of the network

E. To reduce the complexity of router configuration

F. To lower costs by replacing routers with distribution layer switches

Answer: B, C, D

QUESTION NO: 112

A network administrator is trying to add a new router into a established OSPF network. The networks

attached to the new router do not appear in the routing tables of the other OSPF routers. Given the

information in the partial configuration shown below, what configuration error is causing this problem?

Router(config)# router ospf 1

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0

A. The process id is configured improperly

B. The OSPF area is configured improperly

C. The network wildcard mask is configured improperly

D. The network number is configured improperly

E. The AS is configured improperly

F. The network subnet mask is configured improperly

Answer: D

QUESTION NO: 113

Which commands are required to properly configure a router to run OSPF and to add network

192.168.16.0/24 to OSPF area 0? (Choose two)

A. Router(config)# router ospf 0

B. Router(config)# router ospf 1

C. Router(config)# router ospf area 0

D. Router(config-router)# network 192.168.16.0 0.0.0.255 0

E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0

F. Router(config-router)# network 192.168.0 255.255.255.0 area 0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 151 -

Answer: B, E

QUESTION NO: 114

Network broadcast traffic from the Business Department is needlessly reaching the Engineering

Department LAN.

What can be done to contain this traffic within the Business Department network while maintaining

connectivity with enterprise servers and the Internet? (Choose two)

A. Establish a VTP domain to contain the extraneous traffic

B. Provide greater bandwidth to the Engineering Department LAN

C. Utilize full-duplex Ethernet on the Engineering Department LAN

D. Place the business department on a separate subnet and route between networks

E. Change the switch IP address to an address on the Engineering Department LAN

F. Create separate VLANs and subnets for the two departments and route between the two

Answer: D, E

QUESTION NO: 115

OSPF routing uses the concept of areas.

What are the characteristics of OSPF areas? (Choose three)

A. Each OSPF area requires a loopback interface to be configured

B. Areas may be assigned any number from 0 to 65535

C. Area 0 is called the backbone area

D. Hierarchical OSPF networks do not require multiple areas

E. Multiple OSPF areas must connect to area 0

F. Single area OSPF networks must be configured in area 1

Answer: B, C, F

QUESTION NO: 116

How is spanning-tree path cost determined by default?

A. Total hop count

B. Sum of the costs based on bandwidth

C. Dynamically determined based on load

D. Individual link cost based on latency

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 152 -

Answer: B

Explanation: Sybex CCNA Study Guide 4th

Edition (Page 323)

“The STP cost is an accumulated total path cost based on the available bandwidth of each of the links.”

QUESTION NO: 117

Refer to the graphic.

What should be the IP address of the host?

A. 192.168.5.14

B. 192.168.5.32

C. 192.168.5.40

D. 192.168.5.47

E. 192.168.5.55

Answer: C

QUESTION NO: 118

Which mode can be used to quickly configure a router for basic operations?

A. RXBOOT mode

B. SETUP mode

C. ROM Monitor mode

D. Autoflash mode

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 153 -

Answer: C

QUESTION NO: 119

Acknowledgements, sequencing, and flow control are characteristics of which OSI layer?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 5

E. Layer 6

F. Layer 7

Answer: C

QUESTION NO: 120

On which types of network will OSPF elect a backup designated router?

A. Point-to-point and multiaccess

B. Point-to-multipoint and multiaccess

C. Point-to-point and point-to-multipoint

D. Nonbroadcast and broadcast multipoint

E. Nonbroadcast and broadcast multiaccess

Answer: D

Explanation:

Sybex CCNA Study Guide 4th Edition (Page 283)

” DR and BDR are elected on broadcast and nonbroadcast multi-access networks.”

QUESTION NO: 121

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 154 -

Popcorn# show ip protocols

Routing Protocol is “rip”

Sending updates every 30 seconds, next due in 13 seconds

Invalid after 180 seconds, hold down 180, flushed after 240

Outgoing update filter list for all interfaces is

Incoming update filter list for all interfaces is

Redistribution: rip

Default version control: send version 1, receive any version

Interface Send Recv Triggered RIP Key-chain

Ethernet0 1 12

Ethernet1 1 12

Serial 1 12

Routing for Networks:

222.8.4.0

10.1.1.0

Routing Information Sources:

Gateway Distance Last Update

222.8.4.1 120 00:00:04

An administrator who is consoled into the Peanut router is able to ping the Serial0 and Ethernet0 ports of

the Popcorn router but unable to ping its Ethernet1 interface.

Use the graphic and command output to identify possible causes for this problem. (Choose two)

A. The Serial interface of the Popcorn router is shutdown.

B. The Ethernet1 interface of the Popcorn router is shutdown.

C. The Popcorn router did not include network 192.168.12.0 in its routing configuration.

D. The Popcorn router is not forwarding RIP updates.

E. The clockrate is missing from the configuration of one of the routers.

Answer: A, C

QUESTION NO: 122

RtrA#debug ip rip

Rip protocol debugging is on

RtrA#

1d05h: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1)

1d05h: RIP: build update entries

1d05h: network 10.0.0.0 metric 1

1d05h: network 192.168.1.0 metric 2

1d05h: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1)

1d05h: RIP: build update entries

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 155 -

1d05h: network 172.16.0.0 metric 1

RtrA#

1d05h: RIP: received v1 update from 10.0.15.2 on Serial0/0

1d05h: 192.168.1.0 in 1 hops

1d05h: 192.168.0 in 16 hops (inaccessible)

Which of the following are true regarding the command output shown in the display? (Choose two)

A. There are at least two routers participating in the RIP process.

B. A ping to 192.168.168.2 will be successful.

C. A ping to 10.0.15.2 will be successful.

D. RtrA has three interfaces participating in the RIP process.

Answer: A, D

QUESTION NO: 123

What is the binary equivalent of the decimal number 231?

A. 11010011

B. 11011011

C. 11100111

D. 11101011

E. 11110011

Answer: C

QUESTION NO: 124

Which type of EIGRP route entry describes a feasible successor?

A. A backup route, stored in the routing table

B. A primary route, stored in the routing table

C. A backup route, stored in the topology table

D. A primary route, stored in the topology table

Answer: A

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 156 -

QUESTION NO: 125

What are the advantages of using full-duplex Ethernet instead of single-duplex? (Choose two)

A. Uses inexpensive hubs

B. Provides faster data transfer

C. Utilizes fewer pairs of wires

D. Operates without collisions

E. Operates on coaxial cable

Answer: B, C

QUESTION NO: 126

While troubleshooting a network problem, a technician discovers that the current copy of the Cisco IOS

is outdated and needs to be updated.

Which of the following commands would the technician issue to replace the Cisco router IOS with the

newer version?

A. Router# copy tftp flash

B. Router(config)# restore flash

C. Router(config)# repair flash

D. Router# copy flash run

E. Router> copy start flash

F. Router# copy start flash

Answer: A

QUESTION NO: 127

Which of the following is a Layer 2 protocol used to maintain a loop-free network?

A. VTP

B. STP

C. RIP

D. CDP

Answer: B

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 157 -

QUESTION NO: 128

Which WAN protocol is used for out-of-band signaling?

A. NCP

B. HDLC

C. LAPB

D. LAPD

Answer: C

QUESTION NO: 129

A Cisco router and a router from another manufacturer are directly connected via a serial link.

Which command can be used on the Cisco router to form a WAN connection between the routers?

A. Lab(config-if)# encapsulation hdlc ansi

B. Lab(config-if)# encapsulation ppp

C. Lab(config-if)# encapsulation frame-relay default

D. Lab(config-if)# encapsulation isdn

Answer: C

QUESTION NO: 130

Which address represents a unicast address?

A. 224.1.5.2

B. FFFF.FFFF.FFFF

C. 192.168.24.59/30

D. 255.255.255.255

E. 172.31.128.255./18

Answer: E

QUESTION NO: 131

Which characteristics describe the routing protocol EIGRP? (Choose two)

A. Has a maximum hop count of 255

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 158 -

B. Uses a 32-bit metric

C. Can differentiate between internal and external routes

D. Supports a single routed protocol

E. Can maintain only a single routing table

F. Required all networks within an AS to use the same subnet mask

Answer: B, C

QUESTION NO: 132

What type of packets do routers running OSPF send to maintain connectivity with neighboring routers?

A. dead interval packets

B. hello packets

C. LSU packets

D. OSP packets

E. keepalive packets

Answer: B

QUESTION NO: 133

What information does a router running a link-state protocol use to build and maintain its topological

database? (Choose two)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. Beacons received on point-to-point links

E. Routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A, D

QUESTION NO: 134

Which form of NAT maps multiple private IP addresses to a single registered IP address by using

different ports?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 159 -

A. static NAT

B. dynamic NAT

C. overloading

D. overlapping

E. port loading

Answer: D

QUESTION NO: 135

A catalyst switch must be in which VTP mode in order to delete and add VLANs to a management

domain?

A. Client

B. Server

C. Domains

D. Transparent

E. Designated.

Answer: A

Explanation:

VTP Modes

If you intend to make a switch part of a VTP management domain, each switch must be configured in one of

three possible VTP modes. The VTP mode assigned to a switch will determine how the switch interacts with

other VTP switches in the management domain. The three VTP modes that can be assigned to a Cisco switch

include server mode, client mode, and transparent mode. Each of these roles is outlined below:

Server Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any

given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a

switch can be used to add, delete, and modify VLANs, and this information will be passed to all other

switches in the VTP management domain.

Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any

VLANs added, deleted, or modified by a switch in Server Mode within the same management domain.

A switch in VTP client mode cannot make any changes to VLAN information.

Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in

Server Mode to other switches in the VTP management domain, but will not actually process the

contents of these messages. When individual VLANs are added, deleted, or modified on a switch

running in transparent mode, the changes are local to that particular switch only, and are not passed to

other switches in the VTP management domain.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 160 -

Based on the roles of each VTP mode, the use of each should be more or less obvious. For example, if you had

15 Cisco switches on your network, you could configure each of them to be in the same VTP management

domain. Although each could theoretically be left in the default Server Mode, it would probably be easier to

leave only one switch in this configuration, and then configure all remaining switches for VTP Client Mode.

Then, when you need to add, delete, or modify a VLAN, that change can be carried out on the VTP Server

Mode switch and passed to all Client Mode switches automatically. In cases where you need a switch to act in a

relatively standalone manner, or dont want it to propagate information about its configured VLANs, use

Transparent Mode.

Define flow control and describe the three basic methods used in networking.

Flow control is a function that prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data. Flow control is used to ensure data reliability. There are a number of possible causes of network congestion. In basic terms, flow control is used to control the flow of a message from the sender to the receiver by starting and stopping the message transmission as necessary based on the receivers buffer. It is a protocol mechanism that allows the receiver to control the rate at which the sender can transmit data. It makes it possible for a receiver running on a low speed computer to accept data from high speed sender, without being overrun. Usually it is because a high-speed computer generates data faster than the network can transfer it, or faster than the destination device can receive and process it.

There are three commonly used methods for handling network congestion:

BufferingBuffering is used by network devices to temporarily store bursts of excess data in memory until they can be processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data continues at high speeds

Source Quench Messages Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The receiving device sends a source quench message to request that the source reduce its current rate of data transmission.

Windowing Windowing is a flow-control method in which the source device requires an acknowledgement from the destination after a certain number of packets have been transmitted. 1. The source device sends a few packets to the destination device. 2. After receiving the packets, the destination device sends an acknowledgment to the source. 3. The source receives the acknowledgment and sends the same amount of packets. 4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate.

Windowing is reliable because it uses positive acknowledgement which requires the recipient device to communicate with the sending device, sending back an acknowledgement when it receives data. If the sending device does not receive an acknowledgement it knows to retransmit the packets at a reduced transmission rate. If the receiving device sends a packet with a zero window size, it means it’s buffers are full and it cannot receive any more data. Transmission is resumed when the receiving device sends a packet with a window size higher than zero. TCP at the Transport layer uses Windowing as a method flow control. Two mechanisms used with windowing ensure the delivery of segments with no duplication or data loss. These include Acknowledgements and Negative Acknowledgements and also sequencing and necessary retransmission. All these technologies work together to provide data reliability and optimal performance.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

QUESTION NO: 136

Which of the following are types of flow control? (Choose 3)

A. Buffering.

B. Cut-Through.

C. Windowing.

D. Congestion Avoidance.

E. Load Balancing.

Answer: A, C, D

Explanation:

There are three commonly used methods for handling network congestion:

BufferingBuffering is used by network devices to temporarily store bursts of excess data in memory until they can be processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data continues at high speeds

Source Quench Messages Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The receiving device sends a source quench message to request that the source reduce its current rate of data transmission.

Windowing Windowing is a flow-control method in which the source device requires an acknowledgement from the destination after a certain number of packets have been transmitted. 1. The source device sends a few packets to the destination device. 2. After receiving the packets, the destination device sends an acknowledgment to the source. 3. The source receives the acknowledgment and sends the same amount of packets. 4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate.

QUESTION NO: 137

A training company called TestKing has three production facilities. Two of the facilities have network

connectivity to each other. The third facility has recently received a router and is to be connected to the

other two. The names of routers are QA, StudyGuide, and Examinator. Configure the Examinator

router's IP addresses on the E0 and S1 interfaces so that the E0 resolves the first usable subnet while S1

receives the second usable subnet from the network 192.168.81.0/27. Both interfaces should receive the

first available IP of the subnet. The zero subnet should not be used. The routers have been configured

with the following specifications:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

The routers are named QA, StudyGuide, and Examinator

RIP is the routing protocol

Clocking is provided on the serial 0 interfaces.

The secret password on the Examinator router is "testking"

The IP address are listed in the chart below.

Name: QA

E0 : 192.168.83.1

S0 : 192.168.85.1

Name: StudyGuide

E0 : 192.168.88.1

S0 : 192.168.81.89

S1 : 192.168.85.2

Name: Examinator

E0 : to be determined

S1 : to be determined

Secret Password: testking

Task: To configure the router click on the host icon that is connected to the router by a serial cable.

Answer:

Examinator#config t

Enter configuration commands, one per line. End with END.

Examinator(config)#int e 0

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

Examinator(config-if)#ip add 192.168.81.33 255.255.255.224

Examinator(config-if)#no shut

Examinator(config-if)#exit

Examinator(config)#int s 1

Examinator(config-if)#ip add 192.168.81.65 255.255.255.224

Examinator(config-if)#no shut

Examinator(config-if)#CTRL+Z

Examinator#copy ru st

..

..

[OK]

Examinator#

QUESTION NO: 138

Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router

provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are

configured, and the network is functional. Configure and apply an access list will prevent telnet access to

the TestKing1 router while allowing all other traffic to pass. The access list should not contain more than

three (3) statements and should be applied to the TestKing3 router. The routers have been previously

configured with the following specifications:

The routers are named TestKing1, TestKing2, and TestKing3.

RIP is the routing protocol.

The clocking signal is provided on the serial 0 interfaces.

All passwords on all routers are "testking".

The subnet mask on all the interfaces is the default mask.

IP addresses are listed in the chart below.

TestKing1

E0 192.168.1.1

S0 192.168.118.1

Secret password: testking

TestKing2

E0 192.168.121.1

S0 192.168.5.1

S1 192.168.118.2

Secret password: testking

TestKing3

E0 192.168.134.1

S1 192.168.5.2

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

To configure the router click on the host icon that is connected to a router by a serial console cable.

Answer: Pending. Send your suggestion to [email protected].

Note: Compare to Question 54.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 162 -

Section C – practice questions

QUESTION NO: 1 RouterTK#show ip route Codes: C-connected, s-static, l –IGRP, R –RIP, M –mobile, B –BGP, D –EIGRP, EX – EIGRP external,

O – OSPF, IA –OSPF inter area, EI –OSPF external type 1, E2 –OSPF external type 2, E –EGP, i –IS-IS, L1 –IS-IS level-1, L2 –IS-IS level-2, * -candidate default, U – per-user static

route

Gateway of last resort is not set

R 202.30.8.0 /24[120/1] via 202.30.2.2, 00:00:16, Serial 0 C 202.30.9.0 /24 is directly connected, Serial 1 R 202.30.10.0 /24 is possibly down, routing via 202.30.9.1, Serial 1 R 202.30.11.0 /24 is possibly down, routing via 202.30.9.1, Serial 1 C 202.30.1.0 /24 is directly connected, Ethernet 0 C 202.30.2.0 /24 is directly connected, Serial 0 R 202.30.3.0 /24 [120/1] via 202.30.2.2, 00:00:17. Serial 0 R 202.30.4.0 /24 [120/15/ via 202.30.2.2, 00:00:17, Serial 0 R 202.30.5.0 /24 [120/15] via 202.30.2.2, 00:00:17, Serial 0 R 192.158.6.0 /24 [120/15] via 202.30.2.2, 00:00:17, Serial 0 R 202.30.7.0 /24 [120/1] via 202.30.2.2, 00:00:17, Serial 0

You are troubleshooting a router with default settings. You are concerned about the 202.30.10.0 and

202.30.11.0 routes. In particular you are interested how long they will be kept in the routing table. What

would be the maximum time these routes would be kept in the routing table?

A. 30 seconds

B. 60 seconds

C. 240 seconds

D. 360 seconds

E. 630 seconds

Answer: C

Explanation: The Rs on the 202.30.10.0 and 202.30.11.0 lines (see below) indicates that the routes were

learned from the RIP protocol. :

R 202.30.10.0 /24 is possibly down, routing via 202.30.9.1, Serial 1 R 202.30.11.0 /24 is possibly down, routing via 202.30.9.1, Serial 1

Note: The hold down timer for RIP is 180 sec. The flush timer for RIP is 240 sec.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 163 -

QUESTION NO: 2 RouterTK#show ip route Codes: C-connected, s-static, l –IGRP, R –RIP, M –mobile, B –BGP, D –EIGRP, EX – EIGRP external,

O – OSPF, IA –OSPF inter area, EI –OSPF external type 1, E2 –OSPF external type 2, E –EGP, i –IS-IS, L1 –IS-IS level-1, L2 –IS-IS level-2, * -candidate default, U – per-user static

route

Gateway of last resort is not set

R 202.30.8.0 /24[120/1] via 202.30.2.2, 00:00:10, Serial 0 C 202.30.9.0 /24 is directly connected, Serial 1 R 202.30.10.0 /24 [120/7] via 202.30.9.1, 00:00:02, Serial 1 R 202.30.11.0 /24 [120/7] via 202.30.9.1, 00:00:03, Serial 1 C 202.30.1.0 /24 is directly connected, Ethernet 0 C 202.30.2.0 /24 is directly connected, Serial 0 R 202.30.3.0 /24 [120/1] via 202.30.2.2, 00:00:10. Serial 0 R 202.30.4.0 /24 [120/15/ via 202.30.2.2, 00:00:10, Serial 0 R 202.30.5.0 /24 [120/15] via 202.30.2.2, 00:00:10, Serial 0 R 202.30.6.0 /24 [120/15] via 202.30.2.2, 00:00:10, Serial 0 R 202.30.7.0 /24 [120/1] via 202.30.2.2, 00:00:10, Serial 0

You examine the routing table of your router named RouterTK. This routing table will be send to

neighboring routers via broadcasts. Some routes might be discarded and not entered in to the routing

tables of the neighboring RIP routers. Which of the following routes would be discarded in this way?

A. R 202.30.8.0/24 [120/1] via 202.30.2.2, 00:00:10, Serial0

B. R 202.30.11.0/24 [120/7] via 202.30.9.1, 00:00:03, Serial1

C. C 202.30.1.0/24 is directly connected, Ethernet0

D. R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0

Answer: D

Explanation: RIP has the maximum hop count of 15. This route already has a hop count of 15 and adding one

would make it unreachable (see below). This route will be discarded.

R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0

QUESTION NO: 3

At Layer 2 of the OSI model, which component connects a host to the network media?

A. Hub

B. Switch

C. Bridge

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 164 -

D. NIC

E. Transceiver

Answer: D

Explanation: The data link layer is layer 2 of the OSI model. The data link layer involves frames and uses the

burned in MAC addresses that NIC cards and router interfaces have.

Incorrect Answers

A: A hub operates at the physical layer, layer 1.

C: Bridges operate the Data Link layer, layer 2, of the OSI model. However, they are used to connect network

segments, not to connect hosts to the network media.

B: Bridges operate the Data Link layer, layer 2, of the OSI model. However, they are not used to connect hosts

to the network media.

E: A transceiver works at the physical layer, layer 1.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 21 – 24.

QUESTION NO: 4

You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure

is stopped and you are prompted to erase the current flash contents before continuing.

What is most plausible reason for this?

A. There is insufficient room for more than one image.

B. The router has detected a copy of the current software image on the TFTP server.

C. The file can be relocated and not compressed.

D. The image to load is a binary executable file.

Answer: A

Explanation: There might not be enough free Flash memory to store the new image.

Incorrect Answers:

B. Detecting a copy of the image will not stop the procedure nor prompt you to erase the current version.

C. This would not stop the copying of the file.

D. The image is a binary executable file but this will not result in the prompt above.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 137 – 140.

QUESTION NO: 5

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 165 -

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240.

(Choose three)

A. 192.168.27.33

B. 192.168.27.112

C. 192.168.27.119

D. 192.168.27.126

E. 192.168.27.175

F. 192.168.27.208

Answer: A, C, D

Explanation: A subnet mask of 255.255.255.240 divides the 4th

octet into a subnet parts: the highest four bits,

and a host port: the lowest four bits. We simply check the 4th

octet to check that all subnet and host parts are ok.

i.e that cannot be: 0000 or 1111

A: 33 decimal is 00100001. Both the subnet and the host part are ok.

C: 119 decimal is 01110111. Both the subnet and the host part are ok.

D: 126 decimal is 1111110. Both the subnet and the host part are ok.

Incorrect Answers

B: 112 decimal is 1110000 binary. This is not a valid host address in this network. It has all host bits 0.

E: 175 decimal is 10101111. All host bits are 1’s. This is the local broadcast address and cannot be used as a

host address.

F: 208 decimal is 11010000 binary. This is not a valid host address in this network. It has all host bits 0.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 234.

QUESTION NO: 6

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 166 -

A network administrator in London has been instructed to prevent all traffic originating on the Paris

LAN from entering the TestKing2 router.

Which statement would accomplish this filtering?

A. access-list 101 deny ip 192.168.45.0 0.0.0.255 any

B. access-list 101 deny ip 192.168.45.0 0.0.0.0 any

C. access list 101 deny ip 192.168.46.0 0.0.0.0.255 198.168.45.0 0.0.0.255

D. access-list 101 deny ip 192.168.46.0 0.0.0.255 any

Answer: A

Explanation: The access-list is configured to deny all the traffic from Paris router network 192.168.45.0 to any

network in london. The wild card mask also correctly defined for Class C network.

Incorrect Answers

B: Wild card mask for 192.168.45.0 network is wrong. Wild card mask should be 0.0.0.255 instead of 0.0.0.0

C: This access list deny all traffic from 192.168.46.0 network to 192.168.45.0 network( There is type in this

answer 192 as printed as 198.This can be defined at Testking 1 router if we want to deny traffic from

London network (192.168.46.0) to Paris Network(192.168.45.0)

D: This access-list deny traffic from network 192.168.46.0 to any network.

QUESTION NO: 7

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not

operational?

A. frame-relay arp

B. frame-relay map

C. frame-relay interface-dlci

D. frame-relay lmi-type

Answer: B

Explanation: If inverse arp is not in use,frame-relay map command maps next-hop router's Layer 3 address

with Local DLCI to reach that router.

Incorrect answers

A: There is no such command.

C. This Command is used to define DLCI to particular physical interface or Sub Interface. Eg. frame-relay

interface-dlci 40

D: This Command is used to define type of LMI messages sent to the switch. The supported LMI types are

ansi,q933a,cisco

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 167 -

QUESTION NO: 8

A Class C network address has been subnetted with a /27 mask.

Which of the following addresses is a broadcast address for one of the resulting subnets?

A. 201.57.78.33

B. 201.57.78.64

C. 201.57.78.97

D. 201.57.78.97

E. 201.57.78.159

F. 201.57.78.254

Answer: E

Explanation: First task is which IP address is valid Broadcast address for any of the 201.57.78.0/27 subnets.

By definition broad cast address means all the host bits are 1. In this example 5 bits are used for host. Verify

each IP address 4 th byte in binary form to see 5 least significant bits are 1.

In this example answer E , 4 th byte in the IP address is 159. Decimal value is 1011111. So This is broadcast

address for 201.57.78.0/27 network.

Incorrect answers

A: Binary value for 33 is 00100001. This is not broadcast address for 201.57.78.0/27 network

B: Binary value for 64 is 01000000. This is not broadcast address for 201.57.78.0/27 network

C, D: Binary value for 97 is 01100001 .This is not broadcast address for 201.57.78.0/27 network

F: Binary value for 254 11111110 .This is not broadcast address for 201.57.78.0/27 network

QUESTION NO: 9

Which of the following describe router functions? (Choose three)

A. Packet switching

B. Collision prevention on a LAN segment

C. Packet filtering

D. Broadcast domain enlargement

E. Broadcast forwarding

F. Internetwork communication

Answer: B, C, F

Explanation:

C: In Packet switching process, packet will be filtered at a particular physical Interface during packet switching.

F: In OSI Model each layer dependent on the layer below and above layer for Internetwork communication.

Here Router works with Data Link layer and Transport layer.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 168 -

Incorrect answers

D, E: Broadcast activity is not the function of Router. Router will not transmit Broadcast information out to

another router.

QUESTION NO: 10

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN: access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 any

What effect will this access list have?

A. All traffic will be allowed to exit E0 except FTP traffic.

B. FTP traffic from 192.168.1.22 to any host will be denied.

C. FTP traffic from 192.168.1.9 to any host will be denied.

D. All traffic exiting E0 will be denied.

E. All FTP traffic to network 192.168.1.8/29 from any host will be denied.

Answer: D

Explanation:

By default access list is having implicit deny statement at the end. In this example there is no permit statement,

so it will deny all traffic exiting E0 Interface.

Incorrect answers

A: It will deny FTP and Telnet Traffic

B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit

statement at the end.

QUESTION NO: 11

Exhibit:hostname TESTKING-A !!interface Ethernet0 ip address 192.168.10.9 255.255.255.248 !interface Serial0 ip address 172.16.25.1 255.255.255.0 clockrate 56000 !interface Serial1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 169 -

ip address 10.1.1.1 255.255.255.0 !router rip network 192.168.10.0 !line con 0 password testking loginline aux 0 line vty 0 4 password testking login!end

Five new routers need to be configured quickly for testing. While connected to a router by console, the

administrator copies and pastes a configuration from e text file, a part of which is shown in the exhibit,

into the HyperTerminal window. Why would host 192.168.10.10/29 be unable to ping the Ethernet

interface of the router as a result of this procedure?

A. The new configuration needs to be saved to the NVRAM before the changes take effect.

B. The router needs to be reloaded before the changes are implemented.

C. The Ethernet network does not show up in the routing table because the RIP configuration is incomplete.

D. The copied configuration did not overwrite the shutdown command on the Ethernet interface.

E. The subnet mask on the router prevents the host from communicating with it.

Answer: A

QUESTION NO: 12

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 170 -

A network administrator has been instructed to prevent all traffic originating on the TestKing1 LAN

from entering the TestKing2 router.

Which command would implement the access list on the interface of the TestKing2 router?

A. access-list 101 in

B. access-list 101 out

C. ip access-group 101 in

D. ip access-group 101 out

Answer: C

Explanation:

In order to use access list for an interface ip access-group command to be defined on interface. Before defining

ip access group in an interface one should configure access-list. If ip access-group is not defined it will permit

all traffic.

Incorrect answers

A, B: There are no such commands.

D: This will apply on an interface for outgoing packets from the interface. Our question requires access-list to

be applied for incoming packets to a particular interface on Testking2.

QUESTION NO: 13

A training company called TestKing has three production facilities. Two of the facilities have network

connectivity to each other. The third facility has recently received a router and is to be connected to the

other two. The names of routers are QA, StudyGuide, and Examinator. Configure the Examinator

router's IP addresses on the E0 and S1 interfaces so that the E0 resolves the first usable subnet while S1

receives the second usable subnet from the network 192.168.81.0/27. Both interfaces should receive the

first available IP of the subnet. The zero subnet should not be used. The routers have been configured

with the following specifications:

The routers are named QA, StudyGuide, and Examinator

RIP is the routing protocol

Clocking is provided on the serial 0 interfaces.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 171 -

The secret password on the Examinator router is "testking"

The IP address are listed in the chart below.

Name: QA

E0 : 192.168.83.1

S0 : 192.168.85.1

Name: StudyGuide

E0 : 192.168.88.1

S0 : 192.168.81.89

S1 : 192.168.85.2

Name: Examinator

E0 : to be determined

S1 : to be determined

Secret Password: testking

Task: To configure the router click on the host icon that is connected to the router by a serial cable.

Answer:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 172 -

Explanation: The network address is 192.168.81.0/27. Here 5 bits are used for host. Total valid hosts in each

subnetwork are 2 to the power of 5 –2 . This gives 30 hosts on each subnetwork. The range of each network is

below.

Subnet 0. Valid Host addresses are 192.168.81.1 to 192.168.81.30

Subnet 1: Valid Host addresses are 192.168.81.33 to 192.168.81.62

Subnet 2: Valid host addresses are 192.168.81.65 to 192.168.81.94

Use first available IP address to Ethernet 0 from 1st usable subnet.

Use first available IP address to interface s1 from 2nd

usable subnet.

QUESTION NO: 14

Which of the following statements regarding routed and routing protocols are true? (Choose two)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 173 -

A. A routed protocol is assigned to an interface and determines the method of packet deliver.

B. A routing protocol determines the path of a packet through a network.

C. A routed protocol determines the path of a packet through a network.

D. A routing protocol operates at the transport layer of the OSI model.

E. A routed protocol updates the routing table of a router.

Answer: A, B

Explanation:

A: Routed Protocol delivers data to an interface or host.

B: Routing Protocol Routes data.

Incorrect answers

C, E: Routed protocol only delivers data, Routed Protocol will not update any routing tables.

D: A Routing Protocol operates on Layer 3 of OSI Model. ie Network layer.

QUESTION NO: 15

What is the subnetwork address for a host with IP address 201.100.5.68/28?

A. 201.100.5.0

B. 201.100.5.32

C. 201.100.5.64

D. 201.100.5.65

E. 201.100.5.31

F. 201.100.5.1

Answer: D

Explanation:

Using the subnet mask prefix value 28 , 4 bits are left for host portion. Total number of hosts are 16 ( 2 are

reserved for Network and Broadcast in each subnetwork).

201.100.5.68 host will reside in subnetwork 201.100.5.64. Valid Hosts in this network are 201.100.5.65 to

201.100.5.79.

Incorrect answers

A: It is network address for subnet 0 . Valid hosts are 201.100.5.1 to 201.100.5.14

B: It is network address. Valid hosts are 201.100.5.33 to 201.100.5.46.

C: It is one of the valid host in subnetwork 201.100.5.65.

E: It is broadcast address

F: It is valid host in subnetwork 201.100.5.0.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 174 -

QUESTION NO: 16

Exhibit:

The network administrator of the TestKing1 router adds the following command to the router

configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1

What are the results of adding this command? (Choose two)

A. The command establishes a static route.

B. The command invokes a dynamic routing protocol for 192.168.12.0.

C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.

D. Traffic for all networks is forwarded to 172.16.12.1.

E. This route is automatically propagated throughout the entire network.

Answer: A, C

Explanation:

IP route command defines static route on a particular router, Traffic from 192.168.12.0 network is forwarded to

172.16.12.1 ( IP address of next hop interface).

Incorrect answers

B: It will not invoke any routing Protocol. It defines static route.

D: Only traffic from 192.168.12.0 network is forwarded to 172.16.12.1.

E: It will not propagate route automatically by using ip route command. Route will be propagated only if you

defined routing protocol configured networks.

QUESTION NO: 17

An administrator would like to configure a switch over a virtual terminal connection from locations

outside of the local LAN.

Which of the following are required in order for the switch to be configured from a remote location?

(Select two)

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 175 -

A. The switch must be configured with an IP address, subnet mask, and default gateway.

B. The switch must be connected to a router over a VLAN trunk.

C. The switch must be reachable through a port connected to its management VLAN.

D. The switch console port must be connected to the Ethernet LAN.

E. The switch management VLAN must be created and have a membership of at least one switch port.

F. The switch must be fully configured as an SMTP agent.

Answer: A, C

Explanation:

A: You need IP address, subnet mask and default gateway.

C: The switch must be reachable from outside of the LAN.

Incorrect Answers:

B: It does not need to be connected to a router over a VLAN trunk (This is router-on-the-stick configuration)

and not a requirement of the question.

D: The switch console port must not be connected to the Ethernet LAN but instead to the host (PC) using roll-

over cable.

E: The switch management VLAN is already created by default (VLAN1).

F: You don't need SMTP agent for this question, SMTP is for email.

QUESTION NO: 18

Which of the following belong to the ISDN TE2 function group? (Choose two)

A. A standard PC.

B. An ISDN phone.

C. An ISDN terminal adapter.

D. A router serial interface.

E. A router ISDN BRI “U” interface.

Answer: A, D

Explanation:

TE2 is used to connect any non –isdn device by using TA ( Terminal adaptor). In this example Standard PC and

router serial interface on non-ISDN Terminals. Router BRI or PRI interface are ISDN compatible ports.

Incorrect answers

B,C, E: Theses are ISDN compatible devices. It uses ISDN TE1 function.

QUESTION NO: 19

Five minutes after issuing the show running-config command, a technician enters the command again

and notices that several access list statements have been altered. Because of this, the technician believes

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 176 -

that the router is being configured by an unknown person through Telnet. Before changing the router

passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop

them from making further changes.

Which commands will accomplish these options? (Choose two)

A. show hosts

B. show sessions

C. show connections

D. disconnect

E. CTRL+SHIFT+6x

F. exit

Answer: B, D

Explanation:

Show sessions will display connection id, hostname and IP address details. Disconnect will inform closing the

connection for specified hostname.

Incorrect answers

A: Show hosts list all hostnames and corresponding ip address in a router.

C: Show connections will provide connection id.

E,F: These are used for exiting from the present mode.

QUESTION NO: 20

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 177 -

The RIP network shown in the exhibit has been fully operational for two days. Each routing table is

complete.

Which networks will be included in the next routing update from the TestKing1 router to the TestKing3

router?

A. A,B,C,D,E,F

B. A,C

C. A,B,C,D

D. B,D

E. D,E,F

F. A,B,C

Answer: F

Explanation: TestKing3 gets routing update from TestKing1 with the following information:

Network A, metric 1

Network B, metric 1

Network C, metric 2

Incorrect Answers:

A: Not A because of split horizon. It is never useful to send information about a route back in the direction from

which the original update came.

B: Not B because it is missing one routing update information (Network B).

C, D, E: Not C, D & E because you don't get a routing update for your directly connected network (Network

D).

QUESTION NO: 21

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?

A. To restart the router.

B. To bypass the configuration in Flash.

C. To view the password before changes are made.

D. To bypass setup configuration mode.

E. To access ROM Monitor mode.

Answer: E

Explanation:

The value 0x2142 to be set for configuration register in case of password recovery procedure. The value to be

set in ROM Monitor mode.

Incorrect answers:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 178 -

A: To restart the router one can execute reload command in Privilege mode.

B: Ctrl+ Break will not bypass the configuration in the flash

C: Ctrl + Break will not show the password

E: Ctrl+Break will not bypass Setup mode. Setup mode is Router configuration mode that prompts the user for

basing configuration Parameters.

QUESTION NO: 22

Which connections allow the use of full-duplex Ethernet? (Choose three)

A. Switch to host

B. Switch to switch

C. Hub to hub

D. Switch to hub

E. Host to host

Answer: A, B, E

Explanation:

Host and Switch works in full duplex mode.

Incorrect answers:

C,D: Hub Operates in half duplex mode. So connection from Hub to hub or Hub to switch works in half duplex

mode.

QUESTION NO: 23

Which of the following host addresses are member of networks that can be routed across the public

Internet?

A. 10.172.13.65

B. 172.16.223.125

C. 172.64.12.29

D. 192.168.23.252

E. 198.234.12.95

F. 212.192.48.254

Answer: C, E, F

Explanation:

These addresses are not Private addresses defined by RFC 1918. These addresses can be routed across public

Internet.

Incorrect answers:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 179 -

A,B,D: These addresses are in Private address Range:

The range of Private addresses are 10.0.0.0 to 10.255.255.255,172.16.0.0 to 172.31.255.255 and

192.168.0.0 to 192.168.255.255.

QUESTION NO: 24

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network

hosts? (Select three.)

G. 15.234.118.63

H. 92.11.178.93

I. 134.178.18.56

J. 192.168.16.87

K. 201.45.116.159

L. 217.63.12.192

Answer: B, C, D

Explanation:

B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)

C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)

D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95

Incorrect answers: A. is a broadcast E. is a broadcast F. is a network id

QUESTION NO: 25

A technician at TestKing needs to update the network documentation. One of the tasks includes

documenting the name of the IOS image file of each router in the network.

Which commands could be used to find this information?

F. Router# show protocols

G. Router# show version

H. Router# show image

I. Router# show IOS

J. Router# show flash

Answer: B

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 180 -

"Show flash" displays all the image files in it. There could be more than one file. However, "show version"

displays the one that is currently in use by the router.)

Incorrect answers:

A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address

if configured.

C,D. There are no such commands.

QUESTION NO: 26

Exhibit:hostname tess hostname tess ! ! username tess password testking ! username tess password testking ! ! interface serial 0 interface serial 0 ip address 172.23.56.2 255.255.255.0 ip address 172.23.56.3 255.255.255.0 encapsulation ppp encapsulation ppp ppp authentication chap ppp authentication chap clockrate 56000

The output shown in the exhibit was taken from two directly connected routers. Based on the output,

which of the following would be displayed when the command Router# show interface serial 0 is entered?

(Choose two)

A. Serial 0 is up, line protocol is up

B. Serial 0 is up, line protocol is down

C. LCP open

D. LCP closed

Answer: B, D

Explanation:

For Chap Authentication to perform both Routers should have different hostnames. Each router will refer other

router hostname in username command. In this both routers are same hostname. Chap will not perform during

PPP negotiation phase. LCP will be terminated.

Incorrect answers:

A, C: Chap will not be successful because both are pointing to same username . These conditions will not

occur.

QUESTION NO: 27

Exhibit:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 181 -

Which of the following will configure a static route on Router TestKing1 to network 180.18.30.0/24 with

an administrative distance of 90?

A. Testking1(config)# ip route 90 180.18.30.0 255.255.255.0 182.18.20.2

B. Testking1 (config)# ip route 90 180.18.20.1 255.255.255.0 182.18.20.2

C. Testking1 (config)# ip route 180.18.20.1 255.255.255.0 182.18.30.0 90

D. Testking1 (config)# ip route 180.18.30.1 255.255.255.0 182.18.20.1 90

E. Testking1 (config)# ip route 180.18.30.0 255.255.255.0 182.18.20.2 90

Answer: E

Explanation:

The syntax is:

ip route (Destination prefix) (Destination Prefix mask) (Forwarding Router’s address) (Distance metric for

this route).

In this example it is defined according to syntax.

Incorrect answers:

A, B: Destination prefix is not matching according to question, Administrative distance also not configured.

C: IP address 180.18.20.1 is not network address. It is one of the interface address on Router TestKing1.

D: IP address 180.18.30.1 is not network address . It is one of the interface address on Router TestKing2.

QUESTION NO: 28

A router with a serial interface will be used for an ISDN link.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 182 -

What other function group devices are required to complete the connection to the service provider?

(Choose two)

A. TE1

B. TE2

C. TA

D. NT1

E. NT2

Answer: C, D

Explanation:

C: TA is used connect Non ISDN Device. Serial Interface is non-ISDN port. BRI Port is IDSN port.

D: NT1 is required to Connect to Service Provider. It converts 2-wire line from Service Provider into 4-wire

line.

Incorrect answers:

A: TE1 is used to connect ISDN Terminal.

B: TE2 is used to connect non-ISDN terminal via TA

E: Equipment that uses T interface point to Telco outside North America.

QUESTION NO: 29

The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP

addresses.

What would be the correct subnet mask to accomplish this division keeping the number of subnets at the

maximum?

Answer: 255.255.254.0

Explanation:

To obtain 459 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned.

Keep 9 bits for host means 4th

octet and last bit is 3rd

will be 0. This gives 255.255.254.0 is subnet mask.

QUESTION NO: 30

New switches have been purchased for a network upgrade. The objective for the network design

emphasizes efficient, error-free transport instead of fast transport.

Which switching mode should be configured on the new switches to provide error-free transport to the

network?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 183 -

A. cut-through

B. fragment-free

C. frame-filtering

D. store-and-forward

E. 802.1q forwarding

F. VTP transparent mode

Answer: D

Explanation:

The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check

the FCS before forwarding the frame. FCS is Ethernet Trailer.

Incorrect answers:

C. The Switch performs the address table lookup as soon as the destination address field in the header is

received. The first bits in the frame can be sent out to out port before the final bits in the incoming

frame are received. This does not allow the switch to discard frames that fail the FCS check.

D. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the

outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision

will not be forwarded. The FCS still cannot be checked.

C,E,F : They are not related to Switch mode transport.

QUESTION NO: 31

What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?

A. To restart the router.

B. To bypass the configuration in NVRAM.

C. To view the lost password.

D. To save the changes to the configuration.

E. To enter ROM Monitor mode.

Answer: B

Explanation:

On setting 0x2142 in ROM Mon mode Router will bypass configuration in NVRAM. After that user can set

new password.

Incorrect answers:

A. Restart the router can be executed by reload command

C: Directly one can not view the lost password by changing the config register 0x2142

D: One can save the config by write command.

E: Pressing Ctrl+ break Router will enter into ROM Mon mode.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 184 -

QUESTION NO: 32

Which command is used to display the placement and direction of an IP access control list on a router?

A. show access-list

B. show ip route

C. show ip interface

D. show interface

E. show interface list

F. show ip interface brief

Answer: C

Explanation: Page 324 of Interconnecting Cisco Network Devices by Steve McQuerry, “The show ip interface command

displays IP interface information and indicates whether any access lists are set for a specific interface.”

Incorrect answers: A. show access-list will display all configured access lists but not the placement or directionB. show ip route will show the contents of the ip routing tableD. show interface will display the status of an interface, including the encapsulation method, but not the access control list. E. show interface list is not a valid command F. show ip interface brief is not a valid command

QUESTION NO: 33

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other

network segments within your enterprise.

Which of the following are required to allow remote management of the switch over IP? (Choose two)

A. The switch name must match the workgroup name of the local network.

B. The switch must be configured with an IP address and default gateway.

C. The remote workstations must have access to the management VLAN of the switch.

D. CDP must be enabled on the switch so that it can be located by other devices on the network.

Answer: B, C

Explanation:

For managing switch remotely an IP address and default gateway to be defined on the Switch. The workstations

should have access to Management VLAN. I.e. VLAN 1 of the switch.

Incorrect answers:

A: There is no such requirement

D:CDP will determine directly connected devices. It will not play any role for managing switch remotely.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 185 -

QUESTION NO: 34

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN

design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be

assigned to LAN on the resulting subnets (Choose three)

A. 199.141.27.33

B. 199.141.27.112

C. 199.141.27.119

D. 199.141.27.126

E. 199.141.27.175

F. 199.141.27.208

Answer: A, C, D

Explanation: These are valid addresses used for hosts.

Incorrect Answers:

B, F: These are network addresses.

E: This is the broadcast address of network 199.141.27.144.

QUESTION NO: 35

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is

required to complete this connection?

A. TE1

B. TE2

C. NT1

D. NT2

Answer: C

Explanation: NT1 is used to connect Service Provider.

Reference: ICND by Steve McQuerry (Cisco Press: 2000) pages 392 - 394.

Incorrect answers:

A: TE1 is used for connecting ISDN Terminal

B: TE2 is used for connecting non ISDN terminal with TA

D: NT2 Equipment that uses T interface point to Telco outside North America

QUESTION NO: 36

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is

sub netted with a mask of /26?

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 186 -

A. 64 network and 4 hosts

B. 4 network and 64 hosts

C. 2 network and 62 hosts

D. 62 network and 2 hosts

Answer: C

Explanation: On the 4th. octet, /26 will have 2 bits (Subnetwork) and 6 bits (Hosts).

Formula: 2^n-2

Networks: 2^2-2 = 2 networks

Hosts: 2^6-2 = 62 hosts

QUESTION NO: 37

Which of the following if addresses can be assigned to host devices (Choose two)

A. 205.7.8. 32/27

B. 191.168. 10. 2/23

C. 127.0.0.1

D. 224.0.0.10

E. 203.123.45. 47/28

F. 10.10.0.0/13

Answer: B, F

Explanation:

Incorrect Answer:

A: This is a network address.

C: That is a loop-back address.

D: That is a Type D (Multicast) address.

E: This is a broadcast address.

QUESTION NO: 38

All WAN links is side the TestKing.com network use PPP with for authentication security. Which

command will display the CHAP authentication process as it occurs between two routers in the network.

A. show CHAP authentication

B. show interface serial 0

C. debug PPP authentication

D. debug CHAP authentication

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 187 -

E. show PPP authentication CHAP

Answer: C

Explanation: This command displays all PPP events occurred between two Routers. ( LCP and NCP phase)

Incorrect Answers:

A, B, E: Show command won't show the process as it occurs between the 2 routers.

D: That is an invalid command.

QUESTION NO: 39

Exhibit:

Refer to the exhibit. Host TK1 has established a connection with the HTTP Server attached to interface

E0 of the TestKing2 Router.

Which of the following statements describe the information in protocol data units send from host TK1 to

this server? (Choose three)

A. The destination port number in a segment. Header will have a value of 80.

B. The destination port number in a segment. Header will have a unique value greater than or equal to

1023.

C. The destination address of a frame will be the MAC address of the HTTP Server inter face.

D. The destination address of a frame will be the MAC address of the E0 interface of the ABC router.

E. The destination IP address of a Packet will be the IP address the E0 interface of the ABC router

F. The destination IP address of a packet will the IP address of the network interface of the HTTP.

Answer: A, D, F

Explanation:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 188 -

A: The destination port should be port 80 and the source port should be dynamically assigned.

D & F: The preceding explanation is taken from the reference book Internetworking Technologies Handbook,

3rd Edition (Cisco Press: 2001) pages 63 - 64.

Having acquired a router's address by some means, the source host sends a packet addressed specifically to a

router's physical (MAC) address, this time with the protocol (network layer) address of the destination host.

As it examines the packet's destination protocol address, the router determines that it either knows or does not

know how to forward the packet to the next hop. If the router does not know how to forward the packet, it

typically drops the packet. If the router knows how to forward the packet, however, it changes the destination

physical address to that of the next hop and transmits the packet.

The next hop may be the ultimate destination host. If not, the next hop is usually another router, which

executes the same switching decision process. As the packet moves through the internetwork, its physical

(MAC) address changes, but its protocol (network layer - ip address) address remains constant.

QUESTION NO: 40

Exhibit:

Refer to the Router Topology show in exhibit Assuming that all routers are running RIP. Which

statement describe how the Router Exchange their routing table. (Choose two).

A. Utah Exchanges With TestKing.

B. Utah Exchanges With Berlin.

C. Utah Exchanges With Paris.

D. Berlin Exchanges With TestKing.

E. Berlin Exchanges With Utah.

F. Berlin Exchanges With Paris.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 189 -

Answer: A, D

Explanation: In RIP routing protocol Routers exchange routing table only with directly connected Routers. In

this case Utah and Berlin are directly connected to Testking.

Incorrect answers:

B,C,E,F: In these cases Routers defined in the example are not directly connected.

QUESTION NO: 41

What does a configuration Register Setting of 0x2105 indicate to the Router?

A. The Boot IOS Code is Located in the NVRAM.

B. Check NVRAM for boot system Commands.

C. Bypass NVRAM Configurations.

D. Boot the IOS Code Located in ROM.

E. Perform a Password Recovery.

F. Bypass The Code In ROM.

Answer: B

Explanation:

It is stated in the book ICND by Steve McQuerry page 127 that if the configuration register boot field value is

from 0x2 to 0xF, the bootstrap code parses any configuration in NVRAM for boot system commands.

Incorrect Answers:

A: Statement is wrong because IOS code is located in flash not NVRAM (startup-configuration)

C: Register setting of 0x2105 where 5 is the boot field. Boot field value of 0x2 to 0xF will look for startup-

configuration in the NVRAM and won't be bypass.

D: Statement is wrong because IOS code is located in flash not ROM (RxBoot).

E: This register is not for password recovery.

F: This statement is wrong.

QUESTION NO: 42

Exhibit:

The Frame relay circuit between TestKing1 & TestKing2 is experiencing congestion. Which type of

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 190 -

notification are used to alleviate the congestion? (Choose three)

A. FECN

B. CIR

C. BECN

D. DE

E. DLCI 100 is Down

Answer: A, C, D

Explanation:

A: The FECN is the bit in the Frame relay header that signals any one receiving the frame that congestion is

occurring in the same direction of the frame.

C: BECN is same as FECN, but congestion is occurring in the opposite direction of the frame.

D: The DE is the bit in the frame relay header that signals to a switch to, if frames must be discarded, please

choose this frame to discard instead of another frame without the DE bit set.

Incorrect answers:

B: CIR is the rate at which DTE can send data for an individual virtual circuit. It is not related to congestion.

E: DLCI is used for identifying virtual circuit. It will not give any information for congestion.

QUESTION NO: 43

Exhibit:

Given a Network with a switched topology as illustrated.

What will be the result if the Spanning-Tree Protocol is disabled on all the switches? (Choose two)

A. Broadcast Storm will occur.

B. Broadcast Storm will be detected quickly.

C. At least one link will be placed in standby.

D. Loops will occur.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 191 -

E. Loops will be detected quickly.

Answer: A, C

Explanation:

Each switch broad casts data to other switch; It will create Broadcast storm and generate loops with in switches.

Incorrect answers:

B: Broadcast storm will be detected after all switches sending broadcast information

D: There is no Standby mode in Spanning Tree protocol. ( Blocking,Listening,Learning and Forwarding are the

modes)

QUESTION NO: 44

Exhibit:

After Configuring the router show in the exhibit, the TestKing technician decides to test and document

the network, pings from the technician’s laptop to all of the interface on each router were successful, if a

technician initiates a telnet session to Router TestKing1 and issues the show arp command, which of the

following items will be among the entries displayed in the output?

A. The MAC address of the S0 interface on Router TestKing1

B. The MAC address of the E0 interface on Router TestKing1

C. The MAC address of the S0 interface on Router TestKing2

D. The MAC address of the E0 interface on Router TestKing2

Answer: B

Explanation: Because the question stated that the technician initiated a telnet session to Testking1 not

TestKing2 so the layer 2 destination address will have the TestKing1 MAC address.

Incorrect Answers:

A, C: Serial interfaces don't have layer 2 addresses (MAC addresses)?

D: Telnet initiated from Testking 1. It will not show Mac address of EO on Testking2

QUESTION NO: 45

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 192 -

Exhibit:*** Out Put Omitted***

MTU 1500 bytes, Bw 10000 kbit, Dly 100 Usec. reliability 128/255, txload 1/255. rx 253/255 Encapsulation Arpa, Loopback not set Keepalive set (10 sec) Arp type: Arpa Timeout 04:00:00 Last Input 21:24:36, output 00:00:08, Output hang never

*Out Put Omitted***

Users have been complaining that network applications are running very slowly and responding to input

commands intermittently. While troubleshooting the problem, a TestKing technician issues the slow

interface E0 command on the router attached to the network. Based on the partial output shown in the

exhibit.. Which of the following items indicates that interface E0 is overloaded and causing the network

to perform slowly?

A. MTU 1500 bytes

B. BW 10000 kbit

C. DLY 1000 usec

D. Reliability 128/255

E. txload 1/255

F. rxload 253/255

Answer: D

Explanation: Interface E0 is only 50% reliable (128/255) where 255/255 being 100% reliable.

Incorrect Answers:

A, B, C: Because those are default settings and those output are the output readings in normal operation.

QUESTION NO: 46

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

A. Transport layer divides a data stream into segments & adds reliability & flow control information

B. Data link layer adds physical source & destination address & an FCS to the segment

C. Packets are created when the network layer encapsulate a frame with source & destination host address

& protocol related control information

D. Packets are created when the network layers adds layers 3 address & control information to a segment

E. The presentation layer translated bits into bits into voltages for transmission across the physical link

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 193 -

Answer: A, D

Explanation:

A: It is the function of Transport layer. TCP and UDP operates in this layer

D: It is the function of the network layer.

Incorrect answers:

B: It will use frames instead of segments.

C: The network layer can not encapsulate frame. It adds Layer 3 address to segment received from transport

layer.

E: It is not the function of Presentation layer. It is function of Physical layer.

QUESTION NO: 47

Exhibit:

Given the topology as illustrated, what commands are needed to configure IGRP on the TestKing1

Router? (Choose three)

A. TestKing1 (config ) # Router IGRP 100

B. TestKing1 (config) # router IGRP

C. TestKing1 (config - router) # network 192.168.6.0

D. TestKing1 (config - router) # network 192.168.7.0

E. TestKing1 (config - router) # network 192.168.8.0F. TestKing1 (config - router) # network 192.168.9.0

Answer: A, ?, ?

More information needed. In particular the IP configuration of the routers.

Explanation:

A. The 100 in the answer is process-id

Network addresses are not defined on each Router in the Exhibit Topology.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 194 -

QUESTION NO: 48

Exhibit:MTU 1500 bytes, Bw 10000 Kbit, Dly 1000 usec, reliability 128/255, txload 1/255, rxload 1/255 Encapsulation Arpa, loopback not set Keepalive set (10 Sec) ARP type: Arpa, Arp Timeout 04:00:00 Last Input 21:24:36, output 00:00:08, output hang never last clearing of “show interface” countees never Queuing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75: drops 5 min input rate 0 bits/sec, 0 packets/sec 5 min output rate 0 bits/sec, packets/sec 75427 packet input, 10685636 bytes, 0 buffer Received 75427 broadcast, 933 runts, 253 giants, 0 throttles 0 input error, 0 cvc, 0 frame. 0 overrun, 0 ignored 0 input packet with dribble condition detected 78387 packet output, 7329230 bytes, 0 undernuns

During routine network maintenance, a technician issues the show interface E0 command. A partial

output of the command is shown in exhibit which values displayed in the command output could indicate

that collisions have occurred (Choose two)

A. MTV 1500 bytes

B. Reliability 128/255

C. 933 runts

D. 75427 broadcasts

E. 78387 packets output

F. 253 giants

Answer: C, F

Explanation:

C. Runts means number of packets that are discarded because they are smaller than the minimum packet size of

the medium.

F. Giants means number of packets that are discarded because they exceed the maximum packet size for the

medium.

QUESTION NO: 49

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 195 -

The command frame – relay map ip 10.121.16.8.102 broadcast was entered on the router. Which of the

following statement is true concerning this command?

A. This command should be executed from the global configuration mode.

B. The IP address 10.121.16.8 is the local router part used to forward data.

C. 102 is the remote DLCI that will receive the information.

D. Command is required for all frame relay configuration.

E. The broadcast option allows packet, such as RIP update, to be forwarded across the PVC.

Answer: E

Explanation:

Incorrect Answers:

A: The mentioned command is executed at the interface configuration mode.

B: The ip address is the adjacent router's address not the local router.

C: 102 is the local significant DLCI not remote DLCI.

D: Command is not required for all frame relay configuration. You can use the frame interface-dlci command

using sub-interface (point-to-point).

QUESTION NO: 50

Exhibit:

Which of the following is the minimum configuration commands required to bring up the ISDN link

shown in graphic.

Note : SPIDs are not required for this switch. (Choose three)

G. Router(Config-if)# encapsulation ppp

H. Router(Config-if)# isdn switch-type type

I. Router(Config-if)# dialer-list, protocol ip permit

J. Router(Config-if)# dialer map ip address name name connection number.

K. Router(Config-if)# ip address subnet mask

L. Router(Config-if)# dialer group 1

Answer: A, E, F

Explanation:

A: Proper encapsulation to be defined on both routers.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 196 -

E: IP address to be assigned for interface with subnet mask

F: Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration

command.

Incorrect Answers:

B, C:The commands are executed on global configuration command.

D: Syntax is wrong. Proper syntax is dialer map ip ip address/subnet mask name connection name number.

QUESTION NO: 51

Which of the following contribute to congestion on an Ethernet network. (Choose two)

A. Use of full duplex mode.

B. Creation of new collision domain.

C. Creation of new broadcast domain.

D. Addition of hub to the network.

E. Use of switches in the network.

F. Amount of ARP or IPX SAP traffic.

Answer: D, F

Explanation:

D: Hub works on Half duplex mode. If more devices connect to a hub and sending simultaneously collision will

occur .It contributes to congestion.

F: ARP also creates congestion in the network

Incorrect answers:

A: Full Duplex will not generate congestion in the network.

B: Creation of new collision domain means connecting a switch instead of Hub will not contribute congestion.

Switch isolates collision domain.

C: Creation of VLAN’s in a switch isolate broadcast domain. Each Vlan is separate broadcast domain. It will

not generate congestion in network.

QUESTION NO: 52

Which characteristics are representative of a link-state routing protocol? (Choose three)

A. Provide common view of entire topology

B. Exchange routing tables with neighbors.

C. Calculates shortest path.

D. Utilizes event triggered updates.

E. Utilizes frequent periodic updates.

Answer: A, C, D

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 197 -

Explanation: These are unique features of Link-State protocols.

Incorrect Answers:

B: Link-state routing protocol (OSPF) does not exchange routing tables but instead exchanges routing updates

(changes).

E: This statement is correct but not a unique feature of Link-state routing protocol.

QUESTION NO: 53

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not

shut down because of inactivity?

A. DLCI

B. BECN

C. FECN

D. LMI

E. CIR

F. DE

Answer: D

Explanation:

LMI is the protocol used between a DCE and DTE to manage the connection.Signalling messages for

SVCs,PVC Status messages, and keepalives are all LMI Messages

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 531.

Incorrect Answers

A: DLCI is a Frame Relay address and is used in Frame Relay headers to identify the virtual circuit.

B: The BECN is the bit in the Frame Relay header that signals to anyone receiving the frame that congestion is

occurring in backward direction of the frame. Switches and DTEs can react by slowing the rate by which

data is sent in that direction.

C: The FECN is same as B, that congestion is occurring in the same direction as the frame.

E: The CIR is the rate at which the DTE can send data for an individual virtual circuit,for which the provider

commits to deliver that amount of data

F: The DE is the bit in the Frame Relay header that signals to a switch to,if frames must be discarded,please

choose this frame to discard instead of another frame without the DE bit set.

QUESTION NO: 54

Which of the following options lists the steps in PPP session establishment in the correct order?

A. Optional authentication phase, link establishment phase, network layer protocol phase.

B. Network layer protocol phase, link establishment phase, optional authentication phase.

C. Network layer protocol phase, optional authentication phase, link establishment phase.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 198 -

D. Link establishment phase, network layer protocol phase, optional authentication phase.

E. Link establishment phase, optional authentication phase, network layer protocol phase.

F. Optional authentication phase, network layer protocol phase, link establishment phase.

Answer: E

Explanation:

Link establishment is a function in Link Control Protocol (LCP).It is first phase in PPP. In LCP only

authentication phase is defined. It is optional phase. Authentication can be done by PAP or CHAP method to

authenticate the device on the other end of the link.Network layer protocol is last phase in PPP. PPP is designed

to allow the simultaneous use of multiple

Network layer protocols. They are IPCP and IPXCP

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 525

Incorrect Answers

A: Authentication phase is after Link establishment phase. Order is reversed here

B: Network Layer protocol is last phase in PPP instead of first phase

C: Order is wrong in this answer also

D: Network layer mentioned as Second phase instead of 3rd

phase, and Authentication mentioned as 3rd

phase

instead of 2nd

phase.

E: Order of all three are not in proper order.

QUESTION NO: 55

Construct the correct parameter sequence used to configure dial-on-demand routing (DDR) on an ISDN

BRI interface.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 199 -

Answer:

Explanation:

At Global configuration mode:

dialer-list [listnum] protocol [protocol-type] permit/deny

At BRI Interface:

dialer-group n ( Enables dialer list on this interface)

dialer string string

dialer map protocol next-hop-address [broadcast] dial-string

First define types of traffic considered interesting. Like IP

At interface level define dialer group dial string which is used when dialing only one

Site.

Dialer map to be defined when dialing more than one site. Broadcast ensures that copies of broadcasts go to this

next-hop address

Note: In the question Broadcast to be mentioned instead of unicast.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 200 -

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 579

QUESTION NO: 56

Exhibit:

You are the network administrator on TestKing. It has become necessary to prevent accounting

department users on the TestKing1 router from accessing the human resources server attached to

interface E0 of the TestKing2 router. The following access control list has been created:

access-list 19 deny 192.168.16.128 0.0.0.31

access-list 19 permit any

On which interface and in which direction should this access list be placed to prevent accounting users

from accessing the network attached to the E0 interface of the TestKing2 router? Access to other

networks should be unaffected.

A. TestKing1 S0, out

B. TestKing1 E1, in

C. TestKing1 E1, out

D. TestKing2 S1, in

E. TestKing2 E0, out

Answer: E

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 201 -

Explanation:

The subnetwork address for accounting users in Testking1 is 192.168.16.128. Aim is to prevent accounting

users to access Human resource server in Testking 2. E0 is entry point in Testking 2 for accessing Human

resource server. So we have to place an access list at interface E0 at Testking 2 to prevent traffic from

Accounting users from Testking 1does not sent out to Human resource server. The second line in access-list

permit all other traffic entering into interface E0. One has enable access-list inside an interface with ip access-

group command.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 494

Incorrect Answers

A: If enable access list this interface it will stop accounting users traffic from Testking 1 will not enter in to

Testking2.

B: Question asked outgoing traffic for accounting users for Testking 1 users. This will not provide any

solution to the problem

C: If enable access-list in this interface stops all outgoing traffic for accounting users in Testking 1 to other

interfaces in Testking1 itself

D: If enable access list in this interface will stop sending out accounting users of Test King1 to Human resource

server in Testking 2 and ISDN cloud also. This is not the requirement for the question.

QUESTION NO: 57

What feature of a networks switch allows an administrative to create separate broadcast domains?

G. Store-and-forward switching

H. Microsegmentation

I. Transparent bridging

J. Fragment-free switching

K. Virtual LANs

L. Cut-through switching

Answer: E

Explanation: Creation of VLAN in a switch provide separate Broadcast domain . If VLAN is not there all ports

as members of one Broadcast domain.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 172

Incorrect Answers

A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast

domains

B: Not related to the question

C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the

bridges exists. It will not play any role for creating separate broadcast domain

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 202 -

D,F: Both are switching methods in a switch.

QUESTION NO: 58

An administrator has decided to use the private address 172.20.0.0 for the internal network. If the

maximum number of hosts allowed on a subnet is 62, which of the following is true regarding the

addressing scheme?

A. 172.20.62.255 is a host address.

B. Ten bits were borrowed for subnets.

C. 255.255.255.252 is the subnet mask.

D. 172.20.255.64 is a subnet address.

E. Seven host bits must be used to meet the addressing scheme requirement.

Answer: B

Explanation:

The given address is Class B address. Default mask prefix is 16. In the remaining 16 bits of the IP address 6

bits are sufficient for achieve 62 hosts. So Remaining 10 bits are used for subnetting.

Reference:

Incorrect Answers

A: It is a broadcast address

C: This subnet mask allow only 2 hosts. Because only 2 bits are remaining for host.

D: The correct subnet address is 172.20.255.192 instead of 172.20.255.64.

E: If one uses 7 host bits, we can achieve 124 hosts. It is more than the requirement. It is wasting one extra bit

for host.

QUESTION NO: 59

A small enterprise, TestKing.com Publishing, has a class C network license. TestKing.com requires 5

usable subnets, each capable of accommodating at least 18 hosts.

What is the appropriate subnet mask?

Answer: 255.255.255.224

Explanation:

Default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets , then 3 bits are

required . With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts

using 5 bits in host field. This matches with requirement.

QUESTION NO: 60

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 203 -

What is a global command?

A. A command that is available in every release of IOS, regardless of the version or deployment status.

B. A command that can be entered in any configuration mode.

C. A command that is universal in application and supports all protocols.

D. A command that is implemented in all foreign and domestic IOS version.

E. A command that is set once and affects the entire router.

Answer: D

Explanation:

Global command is implemented in all foreign and domestic IOS version.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 36

Incorrect Answers

B: It can be entered from usermode or exit from interface mode mainly

C: It is not mandatory to support all protocols

D: Not clear about foreign and Domestic IOS version

E: An interface config may overwrite global config parameter

QUESTION NO: 61

You work as network administrator for the TestKing.com Inc. A static route to a TestKing branch office

LAN needs to be configured on the testking1 router. The address of the branch office LAN is

172.16.16.0/24. The point-to-point link between the corporate router and the branch office is configured

with the first two usable IP addresses on the 172.16.14.0/24 network, with the corporate router serial

interface receiving the first address, and the branch office serial interface receiving the second. In the box

below, enter the command to configure the corporate router with this static route. No optional

parameters are required.

testking1(config)# __________

Answer: ip route 172.16.16.0 255.255.255.0 172.16.14.2

Explanation:

The syntax for ip route is ip route prefix mask { next –hop-router/ output-interface).

In Our example prefix is 172.16.16.0. Mask is 24 bits, ie 255.255.255.0. Branch office serial interface address is

second usable address in the network 172.16.14.0. That is 172.16.14.2.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 272

QUESTION NO: 62

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 204 -

Exhibit:

Several frames from Host TestKing13 were captured while it was communicating with the TestKing.com

web server.

Which of the following are true regarding the captured and decoded frames? (Choose two)

A. The destination address in the packet header is the IP address from the Ethernet interface on the

TestKingBerlin router.

B. The destination address in the packet header is the IP address of TestKing.com web server.

C. The destination address in the packet header is the IP address of the Ethernet interface on the

TestKingHongKong router.

D. The destination address in the frame header is the MAC address of the TestKing.com web server.

E. The destination address in the frame header is the MAC address of the Ethernet interface on the

TestKingHongKong router.

F. The destination address in the frame header is the MAC address of the Ethernet interface is on the

TestKingBerlin router

Answer: B, F

Explanation:

B.Packet operates in network layer. In IP header sending the packet from Host testking13 to Webserver

contains IP address of Web server is destination address. Router finds the route in its routing table for switching

the packet

F. Routing table at Berlin’s router having an entry for web server’s network address or default gateway address

via Ethernet interface of the Berlin’s router. The destination address of the frame header contains Mac address

of the Ethernet interface on the Berlin’s router.

Reference:

Incorrect Answers

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 205 -

A,C: The destination address in packet header is final destination address ,not intermediate IP address

D,E: Frame header Mac address is Mac address of nearest interface Mac Address. This can be obtained by ARP

QUESTION NO: 63

You have configured a new Frame Relay link on a router that is using IGRP.

Which command would you use to set the IGRP metric for the speed of this link?

A. TestKingRouter(config)# IGRP metric 256K

B. TestKingRouter(config)# bandwidth 256

C. TestKingRouter(config-if)# metric 256K

D. TestKingRouter(config-if)# bandwidth 256

Answer: D

Explanation:

Bandwidth and delay are used for calculating IGRP metric. They are interface sub commands. (config-if)#

mode is interface sub command. This answer is matching with requirement

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 378

Incorrect Answers

A: It is Global configuration mode. There is no such command

B: It is Global configuration mode

C: There is no such command

QUESTION NO: 64

A network host is configured as follows:

Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190

Which of the following statements describe the network to which this host is attached? (Choose three)

A. The default gateway is configured on a different subnet form this host.

B. The host is a member of the fifth usable subnet of the 192.168.16.0 network.

C. The subnetwork address for this host is 192.168.16.160/28.

D. The address of the next higher subnet is 192.168.16.192.

E. The address of the router interface that is attached to this subnetwork is 192.168.16.190.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 206 -

F. There are 60 usable host addresses on this subnet.

Answer: B,D,E

Explanation:

B: According to subnet mask , 5 bits are used for hosts. So each subnet contains 30 hosts .The fifth usable

subnet range is 192.168.16.160 to 192.168.16.191. Here first address is network and later address is broad cast.

Our host .183 is member of this subnetwork.

D: The next subnet address after fifth usable subnet is 192.168.16.192

E: 192.168.16.190 is the router interface in the fifth usable subnet

Incorrect Answers

A: Default gateway is same subnet as Host

C: Subnet mask is different as compared to mask defined in the question

F: There are 30 usable hosts in each subnetwork.

QUESTION NO: 65

Which statement describes the rule of split horizon?

A. Only routers can split boundaries (horizons) between concentric networks.

B. All distance vector protocols require fall back routers that may cause momentary loops as the topology

changes.

C. Networks can only remain fully converged if all information about routers is sent out all active

interfaces.

D. Information about a route should not be sent back in the direction from which the original update come.

E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS

boundary.

Answer: B

Explanation:

Split horizon includes two related concepts that affect what routes are included in a routing update:

An update does not include the subnet of the interface out which the update is sent

All routes with outgoing interface of interface x are not included in updates sent out that same interface x.

Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 369

Incorrect Answers

A: There is no such requirement

B: Distance vector protocols updates routing table at regular intervals instead of Topology changes

C: This is not a feature of split horizon

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 207 -

E: This is not a related feature for split horizon

QUESTION NO: 66

Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers.

Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its

neighbor. The routers have been working properly.

The connection between North and Main ceases operation one day and an unauthorized entry is detected

on the South router.

Determine the problem and restore connectivity. The network has been configured with the following

characteristics:

The routers are named North, Main, South.

All networks have the default subnet mask.

RIP is the routing protocol.

The clocking signal is provided on the serial 0 interface.

Lab 1

Name: North

E0: 192.168.159.1

S0: 192.168.75.1

Secret password : testk

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 208 -

Lab 2

Name: Main

E0: 192.168.112.1

S0: 192.168.201.1

S1: 192.168.75.2

Secret password : testk

Lab 3

Name: South

E0: 192.168.65.1

S1: 192.168.201.2

Secret password : testk

Start by clicking on host that is connected to the router you want to configure.

Answer Lab 1:

<Click on Host2, which is connected to the Lab 1 router>

enable

config terminal

hostname North

enable secret testk

interface ethernet 0

ip address 192.168.159.1 255.255.255.0

no shutdown

exit

interface serial 0

ip address 192.168.75.1 255.255.255.0

clock rate 64000

no shutdown

exit

router rip

network 192.168.159.0

network 192.168.75.0

^z

copy running-config startup-config

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 209 -

Explanation:

Note: comments are added in text after the !-sign. They will not be shown during simulation.

First we click on the Lab 1 router.

Router Con0 is now available ! The router starts

Press RETURN to get started. ! Here we press return

Router>enable ! We must enter EXEC mode (or enable mode as it also called)

Router#config terminal ! We must enter configuration mode. Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname North ! We change the host name

North(config)#enable secret testk ! We set the password

North(config)#interface ethernet 0 ! We enter interface configuration mode for ethernet 0

North(config-if)#ip address 192.168.159.1 255.255.255.0 ! We set the IP address for Ethernet 0.

! Note that we use a 24 bit network mask.

!It is a class C address.

North(config-if)#no shutdown ! We start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up

North(config-if)#exit ! We exit interface configuration for Ethernet 0

North(config)#interface serial0 ! We enter interface configuration mode for the serial0 interface.

! Note that there are no space in serial0

North(config-if)#ip address 192.168.75.1 255.255.255.0 ! IP address for serial0

! Cisco recommends to set the IP address of the interface before

! setting the clockrate

North(config-if)#clock rate 64000 ! We set a clockrate. We must do it to enable communication between

! the routers. They must be synchronized.

North(config-if)#no shutdown ! Start the serial0 interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up %LINK-3-UPDOWN: Interface Serial0, changed state to up

North(config-if)#exit ! Exit interface configuration mode

North(config)#router rip ! Start the routing protocol. RIP does not need further configuration.

! RIP works well in this small network.

! We enter router configuration mode.

North(config-router)#network 192.168.159.0 ! We enable RIP on the network of Ethernet E0.

North(config-router)#network 192.168.75.0 ! We enable RIP on the network of Serial0.

North(config-router)#^Z ! We exit configuration mode and return to enable mode. %SYS-5-CONFIG_I: Configured from console by console

North#copy running-config startup-config ! We save our configurations to NVRAM

Destination filename [startup-config]? ! We confirm with Enter.

North# ! We are finished.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 210 -

You don't need to make full configuration because all routers have already been configured but they have some

mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but

better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add

the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks.

Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 374-403.

************************************

Answer Lab 2:

enable

config terminal

hostname Main

enable secret testk

interface ethernet 0

ip address 192.168.112.1 255.255.255.0

no shutdown

exit

interface serial 0

ip address 192.168.201.1 255.255.255.0

clock rate 64000

no shutdown

exit

interface serial 1

ip address 192.168.75.2 255.255.255.0

no shutdown

exit

router rip

network 192.168.75.0

network 192.168.112.0

network 192.168.201.0^z

copy running-config startup-config

Explanation: Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make

sure that we enable RIP on all three interfaces with the network command.

******************************************

Answer Lab 3:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 211 -

enable

config terminal

hostname South

enable secret testk

interface ethernet 0

ip address 192.168.65.1 255.255.255.0

no shutdown

exit

interface serial 1

ip address 192.168.201.2 255.255.255.0

no shutdown

exit

router rip

network 192.168.201.0

network 192.168.65.0

^z

copy running-config startup-config

Explanation: Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1.

QUESTION NO: 67

A soft drink company has made the decision to provide 3 branches with network connectivity. There is a

LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost

fully configured. However, it does not have the routing protocol configured. Configure the routing

protocol and publish all networks on the Plain router.

The configurations of the routers are as follows:

The routers are named Vanilla, Chocolate, and Plain.

RIP is the routing protocol used.

The clocking is provided on the serial 0 interface.

The password on the Plain router is “TestKing”

The default subnet mask is used on all interfaces

The IP addresses are listed below.

Vanilla

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 212 -

E0 192.168.149.1

S0 192.168.199.1

Chocolate

E0 192.168.55.1

S0 192.168.101.1

S0 192.168.199.1

Plain

E0 192.168.65.1

S0 192.168.101.1

Lab 1

Name: Vanilla

E0 192.168.149.1

S0 192.168.199.1

Lab 2

Name: Chocolate

E0 192.168.55.1

S0 192.168.101.1

S1 192.168.199.1

Lab3

Name: Plain

E0 192.168.65.1

S1 192.168.101.2

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 213 -

Secret Password: TestKing

Start by clicking on host that is connected to the router you want to configure.

Answer Lab 3:

enable

config terminal

hostname Plain

enable secret TestKing

interface ethernet 0

ip address 192.168.65.1 255.255.255.0

no shutdown

exit

interface serial1

ip address 192.168.101.2 255.255.255.0

no shutdown

exit

router rip

network 192.168.65.0

network 192.168.101.0

network 192.168.55.0

network 192.168.149.0

network 192.168.199.0

^z

copy running-config startup-config

Explanation:

< Click on Host6, which is connected to the Lab 3 router>

Router Con0 is now available

Press RETURN to get started. ! Press enter.

Router>enable ! Enter enable mode

Router#config terminal ! Enter terminal configuration mode. Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname Plain ! Change hostname

Plain(config)#enable secret TestKing ! Enable secret password

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 214 -

Plain(config)#interface ethernet 0 ! Enter interface configuration mode.

! Note the space between Ethernet and 0.

Plain(config-if)#ip address 192.168.65.1 255.255.255.0 ! Configure the IP address of the interface.

! Note that we use a class C subnet mask.

Plain(config-if)#no shutdown ! Start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up

Plain(config-if)#exit ! Exit configuration of Ethernet 0 interface

Plain(config)#interface serial1 ! Configure serial1 (no space in serial1)

Plain(config-if)#ip address 192.168.101.2 255.255.255.0 ! Configure the IP address of the interface.

Plain(config-if)#no shutdown ! Start the interface%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1, changed state to up

Plain(config-if)#exit ! Exit interface configuration.

Plain(config)#router rip ! Enable RIP. Enter router configuration mode.

Plain(config-router)#network 192.168.65.0 ! Enable RIP on interface Ethernet 0

Plain(config-router)#network 192.168.101.0 ! Enable RIP on interface Serial1

! We have now added the two local networks. That should

! be enough, but we are specifically been required to publish

! all networks. We add the three remote networks as well.

Plain(config-router)#network 192.168.55.0 ! The three external networks are added as well. Plain(config-router)#network 192.168.149.0 Plain(config-router)#network 192.168.199.0

Plain(config-router)#^Z ! Exit configuration mode. %SYS-5-CONFIG_I: Configured from console by console

Plain#copy running-config startup-config ! Save running configuration to NVRAM

Destination filename [startup-config]? ! Accept defaults and save it. Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration...

[OK]Plain#

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277 – 279 and 133.

QUESTION NO: 68

A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal

and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a

password for the first 5 virtual lines, password for console, and an encrypted password for privileged

mode.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 215 -

Configure the passwords on the Patton router according to the table below.

Type Password

Telnet apple

Console pear

Privileged peach

The routers are named Marshal, Sherman, and Patton.

The network is subnetted with a mask 255.255.255.224

The routing protocol is RIP

The serial 0 interface is provided with clocking.

The chart below includes the IP addresses.

Lab 1

Name : Marshal

E0 : 192.168.12.33

S0 : 192.168.12.65

Lab 2

Name : Patton

E0 : 192.168.12.97

S0 : 192.168.12.129

S1 : 192.168.12.68

Lab 3

Name : Sherman

E0 : 192.168.12.97

S0 : 192.168.12.129

S1 : 192.168.12.68

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 216 -

Start by clicking on host that is connected to the router you want to configure.

Answer Lab 2:

<Click Host4, which is connected to Router Lab 2>

enable

config terminal

hostname Patton

enable secret peach

line con 0

login

password pear

line vty 0 4

login

password apple

^Z

copy running-config startup-config

Explanation:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 217 -

We should configure the passwords, not any IP configuration on the interfaces.

First we click on the Lab2 router. Router Con0 is now available

Press RETURN to get started. ! We press enter.

Router>enable ! We enter enable mode

Router#config terminal ! We enter terminal configuration mode Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname Patton ! We change the host name. This is however not required.

Patton(config)#enable secret peach ! Set the secret password.

Patton(config)#line con 0 ! Configure the terminal connection

Patton(config-line)#login ! Specify the terminal connection password Patton(config-line)#password pear

Patton(config-line)#line vty 0 4 ! Configure the telnet connections. Numbered 0, 1, 2, 3, 4.

Patton(config-line)#login ! Specify password Patton(config-line)#password apple

Patton(config)#^Z ! Exit from configuration mode. %SYS-5-CONFIG_I: Configured from console by console

Patton#copy running-config startup-config ! Save the running config to NVRAM.

Destination filename [startup-config]? ! Confirm default selections Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration...

[OK]Patton#

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102 – 103.

QUESTION NO: 69

A Web consulting business has three routers in their systems. These router, Venus, Afrodite, and Zeus,

are placed in separate local area networks. The Venus and Afrodite routers need no further

configuration. The configuration of Zeus is also complete, except the password for the first 5 virtual lines,

the password for the console, and the password for the privileged mode. The CIO has told you that the

privileged password must be encrypted to achieve highest possible security.

Your task is to configure the passwords on the Zeus router. The passwords to configured are:

Type Password

Telnet Testking

Console Andorra

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 218 -

Lab 1

Name: Zeus

E0 : 213.197.14.189

SO : 213.197.14.211

Lab 2

Name: Venus

E0 : 213.197.14.23

SO : 213.197.14.37

Lab 3

Name: Afrodite

E0 : 213.197.14.73

SO : 213.197.14.113

S1 : 213.197.14.120

Start by clicking on host that is connected to the router you want to configure.

Simulation answer:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 219 -

Lab 1

<Click on Host2, which is connected to the Lab 1 router>

enable

config terminal

enable secret whatsoever

line vty 0 4

login

password Testking

line console 0

login

password andorra

^z

copy running-config startup-config

Explanation:

For the task you don't need to change anything but passwords and we only have to perform Lab 1.

Router Con0 is now available

Press RETURN to get started. ! We press enter.

Zeus>enable ! Enter enable mode for configuration. Zeus#config terminal Enter configuration commands, one per line. End with CNTL/Z.

Zeus(config)#enable secret whatsoever ! Define an enable password (choose something).

! Make sure that you use the secret keyword.

Zeus(config)#line vty 0 4 ! We configure the telnet keyword on all 5 telnet

! connections: 0, 1, 2, 3, 4 Zeus(config-line)#login

Zeus(config-line)#password Testking ! Specify the telnet password.

Zeus(config-line)#line console 0 ! We configure the console password Zeus(config-line)#login

Zeus(config-line)#password Andorra ! We specify the console password.

Zeus(config-line)#^Z ! We exit configuration mode with Ctrl-Z. %SYS-5-CONFIG_I: Configured from console by console

Zeus#copy running-config startup-config ! We copy the running configuration to NVRAM.

Destination filename [startup-config]? ! We accept the default target location (press enter) Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image.

Overwrite the previous NVRAM configuration?[confirm] ! We confirm the overwrite (press enter) Building configuration...

[OK]Zeus#

Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 28-30.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 220 -

QUESTION NO: 70

You are a network administrator for an Insurance company TestK. The company has three routers

named Tokyo, Kobe and Yokohama. You have already configured the Tokyo and the Kobe routers, but

Yokohama still need some further configuration. The Yokohama router need:

a password for the for the first 5 virtual lines

a password for the console

a password for the privileged mode. These password must be encrypted.

The following passwords should be used:

Type Password

Telnet Test

Console King

Privileged TestKing

The network use a 255.255.255.0 subnet mask, RIP is the only routing protocol used, and clocking is

provided on the serial 0 interface.

Lab 1

Name: Tokyo

E0: 30.15.7.1

S0: 30.15.8.1

Lab 2

Name: Kobe

E0: 30.15.9.1

S0: 30.15.10.1

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 221 -

S1: 30.15.8.2

Lab 3

Name: Yokohama

E0: 30.15.11.1

S1: 30.15.10.2

Start by clicking on host that is connected to the router you want to configure.

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 222 -

Answer:

Answer Lab 3:

<Click on Host6, which is connected to the Lab 3 Router>

enable

config terminal

hostname Yokohama

enable secret TestKing

line con 0

login

password King

line vty 0 4

login

password Test

^Z

copy running-config startup-config

Explanation:

We should configure the passwords, not any IP configuration on the interfaces.

First we click on the Lab3 router. Router Con0 is now available

Press RETURN to get started. ! We press enter.

Router>enable ! We enter enable mode

Router#config terminal ! We enter terminal configuration mode Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname Yokohama ! We change the host name. This is however not required.

Yokohama(config)#enable secret TestKing ! Set the secret password.

Yokohama(config)#line con 0 ! Configure the terminal connection

Yokohama(config-line)#login ! Specify the terminal connection password Yokohama(config-line)#password King

Yokohama(config-line)#line vty 0 4 ! Configure the telnet connections. Numbered 0, 1, 2, 3, 4.

Yokohama(config-line)#login ! Specify password Yokohama(config-line)#password Test

Yokohama(config)#^Z ! Exit from configuration mode. %SYS-5-CONFIG_I: Configured from console by console

Yokohama#copy running-config startup-config ! Save the running config to NVRAM.

Destination filename [startup-config]? ! Confirm default selections Warning: Attempting to overwrite an NVRAM configuration

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 223 -

previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration...

[OK]Yokohama#

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102 –103.

QUESTION NO: 71

A German fast food group, TestKing GmbH, has decided to connect three stores to place all ordering and

inventory in a central database. The manager has partially configured the routers and named them

TestKing1, TestKing2, and TestKing3. No network connectivity has been established among the three

stores. Identify the fault(s), and make the necessary change(s) to establish connectivity. The routers have

been configured with the following specifications:

The routers are named TestKing1, TestKing2, TestKing3

RIP is the routing protocol

Clocking is provided on the serial 0 interface

The password on each router is "testking"

The subnet mask on all interfaces is the default mask.

The IP addresses are listed in the chart below.

Name TestKing1

E0 : 192.168.17.1

E1 : 192.168.19.1

S0 : 192.168.21.1

Secret password: testking

Name TestKing2

E0 : 192.168.23.1

S0 : 192.168.25.1

S1 : 192.168.21.2

Secret password: testking

Name TestKing3

E0 : 192.168.26.1

S1 : 192.168.25.2

Secret password: testking

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 224 -

Task: To configure the router click on a host icon that is connected to a router by a serial console cable.

Answer:

TestKing1 configuration:

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 225 -

TestKing2 configuration:

Click on Host 4. enable config terminal

640 - 801

Leading the way in IT testing and certification tools, www.testking.com

- 226 -

hostname testking2enable secret testkinginterface ethernet 0ip address 192.168.23.1 255.255.255.0no shutdown exitinterface serial 0ip address 192.168.25.1 255.255.255.0clock rate 64000no shutdown exitinterface serial 1ip adress 192.168.21.2 255.255.255.0no shutdown exitrouter ripnetwork 192.168.21.0network 192.168.25.0network 192.168.23.0ctrl^zcopy runnning-config startup-config

TestKing3 configuration:

Click on Host 6. enable config terminalhostname testking3enable secret testking interface Ethernet 0ip address 192.168.26.1 255.255.255.0no shutdown exitinterface serial 1ip address 192.168.25.2 255.255.255.0no shutdownexitrouter ripnetwork 192.168.25.0network 192.168.26.0ctrl^zcopy running-config startup-config