1,001 CCNA Questions Chapter 16: ICND1 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

B. Source IP address Standard ACLs are able to filter traffic based only on source IP address.

A standard ACL is able to filter traffic based only on which of these items? (A) Destination IP address (B) Source IP address (C) Source MAC address (D) Protocol (E) VLAN (F) TCP and UDP ports

A. Switch 1 will be root bridge. G. Port I will be blocking. Each switch or bridge has a Bridge ID, which is created by concatenating its priority and MAC address. The switch with the lowest Bridge ID is the root bridge for the network. Each switch then identifies a root port, which will be the least cost path to the root bridge, based on link speeds and types. When there are ties, the port that connects to the bridge with the lowest Bridge ID is used. For Switch 4, that means that the root port will be H, rather than I, because Switch 3 has a lower Bridge ID than Switch 2. Switch 4 is in a loop situation, and it is the farthest point from the root bridge, so Switch 4 will set its non-root port to blocking to resolve the loop.

Given the network shown in the figure below, what switch will be the root bridge and what port will be the blocking port? (Select one switch and one port.) (A) Switch 1 will be root bridge (B) Switch 2 will be root bridge (C) Switch 3 will be root bridge (D) Switch 4 will be root bridge (E) Port B will be blocking (F) Port E will be blocking (G) Port I will be blocking (H) Port H will be blocking

A. 192.168.15.0/25 A subnet mask of 25 bits leaves 7 bits for network hosts. The formula for this is 2^7-2 to calculate the number of possible hosts, or 126 hosts.

Given the network shown in the figure below, which network ID would be the smallest that can be used for segment A? (A) 192.168.15.0/25 (B) 172.18.0.0/22 (C) 10.222.0.0/10 (D) 192.168.7.0/24

B. 172.18.0.0/26 If you use 26 bits for the subnet mask, that leaves 6 bits available for the hosts. Using the formula 2^6-2, you have support for 62 hosts. While you only need a mask of 27 bits, since that is not available, the next closest valid mask is 26 bits.

Given the network shown in the figure below, which network ID would be the smallest that can be used for segment B? (A) 192.168.15.0/25 (B) 172.18.0.0/26 (C) 10.222.0.0/29 (D) 192.168.7.0/24

B. 172.18.0.0/22 The number of bits required to support 545 hosts is 10 bits (2^10-2), which allows for 1,022 hosts on the network segment. Since you need 10 bits for the host, that leaves 22 bits in the subnet mask.

Given the network shown in the figure below, which network ID would be the smallest that can be used for segment C? (A) 192.168.15.0/25 (B) 172.18.0.0/22 (C) 10.222.0.0/10 (D) 192.168.7.0/24

C. 128 IPv6 addresses are 128 bits in length, while IPv4 addresses are only 32 bits in length.

How many bits are in an IPv6 address? (A) 32 (B) 64 (C) 128 (D) 256

C. Access The port must be configured in access mode before configuring port security on the port.

In order to configure port security on a Cisco switch, what mode does the port need to be running in? (A) Trunk (B) Link (C) Access (D) Network

A. OUI D. Vendor assigned values A 48-bit MAC address is composed of two main pieces, a 24-bit Organizational Unique Identifier (OUI) assigned by the IEEE, and a 24-bit vendor assigned end station address, which is assigned by the network card manufacturer.

MAC addresses are composed of two main components. What are they? (Select two.) (A) OUI (B) Hexadecimal (C) Datalink values (D) Vendor assigned values

C. Console E. Straight The following are the correct cables to use: A - Straight, B - Straight, C - Console, D - Crossover, E - Straight, and F - Straight

Refer to the figure below. Each cable used has been assigned a letter and the cables that have been used are listed in your choices. Select the letter choices which specify the locations in which the correct cables have been used. (Select two.) (A) Console (B) Crossover (C) Console (D) Straight (E) Straight (F) Crossover

D. OUI The first half of the MAC address is a unique identifier assigned to the manufacturer of the network card; this is known as the Organizational Unique Identifier (OUI ).

The first 24 bits of the MAC address is known as the __________. (A) CDP (B) ACL (C) NAP (D) OUI

A. 5 The output shows 5 input errors and all 5 of those errors are CRC errors. This identifies that the payload data was damaged in transit.

The output of the show interface command is shown in the figure below. How many CRC errors have been encountered on this switch port? (A) 5 (B) 11 (C) 329 (D) 629

B. An excessive number of hosts in a broadcast domain D. Broadcast storms E. Half-duplex interfaces Half-duplex interfaces only transfer data in one direction at a time; broadcast storms generates excessive traffic, slowing down legitimate traffic; and an excessive number of hosts generates traffic that needs to be processed by other devices in the broadcast domain.

There are many reasons for network congestion that can affect data movement and delivery. Which of the following are leading causes of congestion? (Select three.) (A) Multicasting (B) An excessive number of hosts in a broadcast domain (C) Full duplex interfaces (D) Broadcast storms (E) Half-duplex interfaces

C. VTP VLAN Trunking Protocol (VTP) is designed to synchronize the VLAN database on all switches on the network or within a VTP domain.

VLAN information is propagated to all switches on a network through which protocol? (A) RIP (B) STP (C) VTP (D) CDP

A. Data can be sent only in one direction at a time C. There will be an increase in the number of collisions. Half-duplex settings only allow data to be sent in one direction at a time. This means that even on a port with a single device attached, there is an increased chance that another device will send data to the end node when that end node is attempting to send data, which will yield a collision. Full duplex settings would not have collisions in the same situation.

What are effects of using a half-duplex setting on a switch port? (Select two.) (A) Data can be sent only in one direction at a time. (B) Data can be sent in both directions at any time. (C) There will be an increase in the number of collisions. (D) There will be an increase in throughput. (E) There will be a decrease in the number of collisions.

B. Blocking C. Learning F. Forwarding When a switch port has a device connected to a port, if the port is configured for STP, then the port will initially enter a Listening state, where the switch will look for and process BPDU data. If the switch determines that it will not cause a network topology loop, the port will enter a Learning state, when the switch will record a list of MAC addresses that exist on a network connected to that port. After a Learning period concludes, the port will enter a Forwarding state, where the port will forward traffic. If the switch (and the STP root bridge) determines that this port will create a loop on the network, then the port will enter a Blocking state.

What are possible port states for a switch port that is participating in Spanning Tree Protocol (STP)? (Select three.) (A) Passing (B) Blocking (C) Learning (D) Negotiating (E) Participating (F) Forwarding

C. SYN, SYN/ACK, ACK The three-way handshake process starts with a Synchronize request (which sets a sequence value for the sender); this is followed by a dual purpose message from the receiver, which acknowledges the sequence value and sets its own sequence value; and this process is finalized by an acknowledgement from the sender of the receiver's sequence value.

What are the three steps and order of the TCP three-way handshake process? (A) ACK, SYN, SYN/ACK (B) SYN/ACK, ACK, SYN (C) SYN, SYN/ACK, ACK (D) SYN/ACK, SYN, ACK

A. hop count B. bandwidth C. delay Hop count, bandwidth, and delay are commonly used metrics for routing protocols.

What are three metrics that are used by routing protocols to determine an optimal network path? (Select three.) (A) hop count (B) bandwidth (C) delay (D) packet length (E) distance (F) quantity

D. How the system was last restarted The version will usually display hardware model, IOS version, compilation date, uptime, what initiated the last restart, the system image filename, the active configuration register, and hardware configuration, such as ports, RAM, and NVRAM.

What information is displayed by the show version command? (A) Current date and time (B) Number of configured VLANs (C) Current configuration version (D) How the system was last restarted

C. IP route filtering ACLs filter IP-based traffic as it passes through the router.

What is a valid purpose for implementing ACLs? (A) Virus detection (B) Monitoring bytes and packets (C) IP route filtering (D) Traffic classification

B. 1 Directly connected routes have an AD of 0, while static routes have an AD of 1.

What is the Administrative Distance of a static route? (A) 0 (B) 1 (C) 5 (D) 20

A. Initiate a copy of a file from a TFTP server to flash memory. After issuing this command, you will be prompted for a TFTP server and file to copy from it, as well as being prompted for the location in flash to save the file.

What is the effect of the command copy tftp flash? (A) Initiate a copy of a file from a TFTP server to flash memory. (B) Initiate a copy of a file from flash memory to a TFTP server. (C) Copy files between two TFTP servers using the faster flash protocol. (D) This is an invalid command.

C. It changes the function of NAT to PAT. Adding overload to your NAT configuration, either with a pool of addresses or with a single external address, changes the function to PAT.

What is the purpose of the overload option when working with NAT? (A) It changes the function of PAT to NAT. (B) It reverses the role of the inside and outside interfaces. (C) It changes the function of NAT to PAT. (D) It serves no purpose for NAT.

B. CTRL-SHIFT-6, then X To suspend your telnet session, you use the CTRL-SHIFT-6, then press X. You can then resume the session with the resume command.

What keystroke is used to suspend a telnet session? (A) CTRL-S (B) CTRL-SHIFT-6, then X (C) CTRL-SHIFT-DEL, then X (D) CTRL-X

D. Data Link CDP is a layer-2 protocol, so the answer is Data Link (layer 2).

What layer of the OSI model does CDP run at? (A) Transport (B) Network (C) Physical (D) Data Link

D. IEEE Institute of Electrical and Electronics Engineers (IEEE) is the organization responsible for Ethernet and many other networking standards.

What organization is responsible for defining standards for Ethernet networking? (A) ISO (B) IEC (C) CSA (D) IEEE

B. Lowest priority D. Lowest MAC address When choosing the root bridge on a STP network, the switches will concatenate their configured priority and MAC address together, and the switch with the lowest value will be chosen as the root bridge.

When a switch is participating in a STP network, how is the root bridge determined on the network? (Select two.) (A) Highest priority (B) Lowest priority (C) Highest MAC address (D) Lowest MAC address

C. 255.255.252.0 A mask of 22 bits would be 11111111.11111111.11111100.00000000, or 255.255.252.0.

When working with a mask that is 22 bits long, which subnet mask is an alternate representation of 22 bits? (A) 255.255.240.0 (B) 255.255.248.0 (C) 255.255.252.0 (D) 255.255.254.0

B. TCP TCP makes use of windowing as part of its flow control system, which allows it to ensure that all data arrives completely and in order.

When working with the TCP/IP protocol suite, what protocol makes use of windowing? (A) IP (B) TCP (C) UDP (D) ARP

C. show cdp neighbors The figure is showing the output of the show cdp neighbors command. You can use this command to locate network devices that are close to you.

Which Cisco command was used to create the output in the figure below? (A) show ip route (B) show ip interface brief (C) show cdp neighbors (D) show controllers

C. Network The network layer header contains the source and destination address information for the packet. A packet is the term used for the message at layer 3, while a frame is the term used to reference the message when it is at layer 2.

Which OSI model header contains the source and destination fields of the packet? (A) Data link (B) Physical (C) Network (D) Transport

B. TCP The TCP protocol is responsible for reliable delivery. It does this by using sequence numbers and acknowledgement numbers.

Which TCP/IP protocol is responsible for reliable delivery? (A) UDP (B) TCP (C) IP (D) ICMP

B. Router Routers will reduce the size of broadcast domains, while these domains will stretch across repeaters, bridges, and switches.

Which devices added to your network will reduce the size of a broadcast domain? (A) Switch (B) Router (C) Bridge (D) Repeater

A. EIGRP C. RIP v2 D. OSPF Only EIGRP, RIP v2, and OSPF support both route summarization and VLSM.

Which dynamic routing protocols support both route summarization and VLSM? (Select three.) (A) EIGRP (B) RIP v1 (C) RIP v2 (D) OSPF (E) IGRP (F) VTP

C. Network Logical addressing and routing is handled by layer 3 of the OSI model, also known as the network layer.

Which layer of the OSI model handles logical addressing and routing? (A) Data Link (B) Transport (C) Network (D) Physical

A. 802.3ab The IEEE standard for Gigabit Ethernet on copper wires (1000BaseT) is defined in 802.3ab.

Which of the IEEE standards defines Gigabit Ethernet over copper wires? (A) 802.3ab (B) 802.5 (C) 802.11 (D) 802.3u

A. ::1 D. 0000:0000:0000:0000:0000:0000:0000:0001 The IPv6 loopback address is known as 0000:0000:0000:0000:0000:0000:0000:0001, or can be abbreviated as ::1.

Which of the following IPv6 addresses is the equivalent to the 127.0.0.1 IPv4 address? (Select two.) (A) ::1 (B) 2001::1 (C) fe80::0 (D) 0000:0000:0000:0000:0000:0000:0000:0001

D. Anycast Anycast addressing involves sending the information to the closest device that can service the request.

Which of the following IPv6 communication methods is best known as "1-to-nearest"? (A) Multicast (B) Broadcast (C) Unicast (D) Anycast

B. SMTP D. FTP SMTP and FTP use TCP as the transport layer protocol. The other protocols use UDP.

Which of the following application layer protocols use TCP as the transport layer protocol? (Select two.) (A) SNMP (B) SMTP (C) TFTP (D) FTP (E) DNS Query

B. 172.25.56.10 E. 10.45.3.20 Private addresses are IP addresses that are not routable on the Internet. The following are the private IP address ranges: - 10.0.0.1 to 10.255.255.255 - 172.16.0.0 to 172.31.255.255 - 192.168.0.0 to 192.168.255.255

Which of the following are considered private IP addresses? (Select two.) (A) 12.45.28.10 (B) 172.25.56.10 (C) 127.0.0.1 (D) 192.148.44.5 (E) 10.45.3.20

C. OSPF D. IS-IS OSPF and IS-IS are link-state routing protocols, while RIP and IGRP are not.

Which of the following are link-state routing protocols? (Select two.) (A) RIP (B) IGRP (C) OSPF (D) IS-IS

B. 3524XL(vlan)#vlan 2 name MKT To create a VLAN, you can navigate to the VLAN database and use the vlan command followed by the number and the name.

Which of the following commands creates a VLAN named MKT? (A) 3524XL#no vlan 2 name MKT (B) 3524XL(vlan)#vlan 2 name MKT (C) 3524XL(vlan)#create vlan 2 name MKT (D) 3524XL(vlan)#set vlan 2 name MKT

D. R1(config)#ip default-gateway 23.0.0.1 You should configure your switch for a default gateway if you're going to telnet into the switch from a different network. Use the ip default-gateway global configuration command.

Which of the following commands is used to assign a default gateway to a Cisco switch? (A) R1(config)#default-router 23.0.0.1 (B) R1(config)#ip default-router 23.0.0.1 (C) R1(config)#default-gateway 23.0.0.1 (D) R1(config)#ip default-gateway 23.0.0.1

A. Use the following commands: R1(config)#ip dhcp pool NY_Network R1(dhcp-config)#network 192.168.1.0 255.255.255.0 R1(dhcp-config)#default-router 192.168.1.1 R1(dhcp-config)#lease 7 0 0 To configure DHCP on your router, use the ip dhcp pool command in global configuration mode. You then need to specify the network range that the DHCP service is to have addresses out for, and then you can configure settings such as the default-router address and lease time. The lease time is in the days_hours_mins format.

Which of the following commands would configure your router as a DHCP server, give out the address 192.168.1.1 as the default gateway value to clients, and lease the address to clients for 7 days? (A) Use of the following commands: R1(config)#ip dhcp pool NY_Network R1(dhcp-config)#network 192.168.1.0 255.255.255.0 R1(dhcp-config)#default-router 192.168.1.1 R1(dhcp-config)#lease 7 0 0 (B) Use of the following commands: R1(config)#ip dhcp pool NY_Network R1(dhcp-config)#network 192.168.1.0 255.255.255.0 R1(dhcp-config)#default-router 192.168.1.1 R1(dhcp-config)#lease 0 0 7 (C) Use of the following commands: R1(config)#ip pool NY_Network R1(dhcp-config)#network 192.168.1.0 0.0.0.255 R1(dhcp-config)#default-router 192.168.1.1 R1(dhcp-config)#lease 7 0 0 (D) Use of the following commands: R1(config)#ip dhcp pool NY_Network R1(dhcp-config)#network 192.168.1.0 255.255.255.0 R1(dhcp-config)#default-gateway 192.168.1.1 R1(dhcp-config)#lease 7 0 0

A. R1(config-if)#switchport port-security mac-address sticky Use the sticky option with port security to indicate to the switch you wish it to learn the MAC address of the connected system and configure port security with that address. This saves a lot of typing of MAC addresses!

Which of the following commands would you use if you wanted the port security feature to learn the MAC addresses of connected systems? (A) R1(config-if)#switchport port-security mac-address sticky (B) R1(config-if)#switchport port-security mac-address learnmac (C) R1(config-if)#switchport sticky (D) R1(config-if)#switchport mac-address 00-00-00-00-00-00

B. show ip route D. show ip protocols IP runs at layer 3, so any commands that deal with routing or the IP protocol would be used to troubleshoot layer issues.

Which of the following commands would you use to troubleshoot layer 3 issues? (Select two.) (A) show interfaces (B) show ip route (C) show controllers (D) show ip protocols

A. Use the following commands: R1#config term R1(config)#line con 0 R1(config-line)#password P@ssw0rd R1(config-line)#login To configure a password on a console port, you navigate to the port and use the password command. You then use the login command to tell the Cisco device to prompt for the password.

Which of the following configures a console password on your Cisco device? (A) Use of the following commands: R1#config term R1(config)#line con 0 R1(config-line)#password P@ssw0rd R1(config-line)#login (B) Use of the following commands: R1#config term R1(config)#line con 0 R1(config-line)#password P@ssw0rd R1(config-line)#login local (C) Use of the following commands: R1#config term R1(config)#line aux 0 R1(config-line)#password P@ssw0rd R1(config-line)#login (D) Use of the following commands: R1#config term R1(config)#line con 0 R1(config-line)#login

B. Bridge C. Switch Bridges and switches are layer-2 devices.

Which of the following devices are considered layer-2 devices? (Select two.) (A) Hub (B) Bridge (C) Switch (D) Router (E) Repeater

D. Bandwidth OSPF calculates cost using the bandwidth of the link.

Which of the following does OSPF use to calculate the cost of a link? (A) Hop count (B) Delay (C) Load (D) Bandwidth

C. Switch E. Bridge Switches and bridges are layer-2 devices, while routers are layer-3 devices.

Which of the following is a layer-2 device found on a network? (Select two.) (A) Firewall (B) Router (C) Switch (D) Repeater (E) Bridge (F) Gateway

B. fe80:d351:3f16:dc41:ed36:317e:410e:3f28 Each character of the IPv6 address can be a value from 0 to 9 or A to F. Any other characters are illegal. Also, there are eight sections to the IPv6 address and you can replace any sections with 0000 that are side by side with a ::, but only once in the address.

Which of the following is a valid IPv6 address? (A) fec0:3d16:xyz5:92c4:ed36:317e:410e:3f28 (B) fe80:d351:3f16:dc41:ed36:317e:410e:3f28 (C) 2001:d351::dc41:ed36::3f28 (D) 2002:dc41:ed36:317e:410e:3f28

D. Configure sub-interfaces on the router. You can configure sub-interfaces on the router along with the encapsulation protocol used to tag VLAN traffic.

Which of the following is one of the things you need to do to configure a router to route between VLANs using only a single connection to the switch? (A) Install RIPv1. (B) Install RIPv2. (C) Install OSPF. (D) Configure sub-interfaces on the router.

D. 216.83.25.127 With a /26, the increment value is 64, so that means that the next network ID is 128 - one number before that is the current network's broadcast address.

Which of the following is the broadcast address of 216.83.25.87/26? (A) 216.83.25.128 (B) 216.83.25.63 (C) 216.83.25.64 (D) 216.83.25.127

B. 220.19.36.99 /27 means that the increment is 32, so the network ID that the .112 address is in is the 220.19.36.96 - this makes the third valid address of that network, 220.19.36.99.

Which of the following is the third valid address of the network containing 220.19.36.112/27? (A) 220.19.36.131 (B) 220.19.36.99 (C) 220.19.36.67 (D) 220.19.36.115

A. 195.56.78.0/30 If you have a WAN link that just requires two IP addresses, then you can use the /30 because this leaves 2 bits for the host bits. Two host bits creates four addresses, but two of those are illegal to use (network ID and broadcast ddress), so that leaves two valid addresses.

Which of the following network IDs should be used on a WAN link with just two routers using a single IP address each? (A) 195.56.78.0/30 (B) 195.56.78.0/27 (C) 195.56.78.0/28 (D) 195.56.78.0/31

A. Computer to router B. Switch to switch D. Computer to computer You use a crossover cable when connecting similar devices together. Watch out for situations where the computer is connecting to the router (unlikely in real world, but is a good exam question).

Which of the following scenarios require a crossover cable? (Select three.) (A) Computer to router (B) Switch to switch (C) Switch to router (D) Computer to computer (E) Computer to switch

A. All packets are sent individually. D. Packet delivery is not guaranteed. UDP is a best effort delivery protocol; as such, data is not guaranteed to arrive in order, or even arrive at all. Each data packet that travels via UDP is treated individually.

Which of the following statements are true about the UDP protocol? (Select two.) (A) All packets are sent individually. (B) All packets will arrive in order. (C) Packet delivery is guaranteed. (D) Packet delivery is not guaranteed. (E) Lost or damaged packets will be resent.

B. Routers increase the number of broadcast domains C. Switches increase the number of collision domains. Routers will split up broadcast domains, while switches will split up collision domains but will not affect the broadcast domains.

Which of the following statements are true when discussing routers and switches? (Select two.) (A) Routers decrease the number collision domains. (B) Routers increase the number of broadcast domains. (C) Switches increase the number of collision domains. (D) Switches decrease the number of broadcast domains.

A. Upgrading a hub to a switch C. Adding a bridge between two hubs A collision domain is created when there is no filtering and directing of traffic based on MAC addresses. All ports on a hub will exist in a single collision domain; while each port on a bridge or switch is a separate collision domain. Implementing a bridge or switch to a network will increase the number of collision domains, but reduce the size of each collision domain. If there are fewer collisions on a network, then data will move more efficiently.

Which of the selections will reduce the size of a collision domain? (Select two.) (A) Upgrading a hub to a switch (B) Implementing VLANs (C) Adding a bridge between two hubs (D) Adding a router between two switches

A. RIP v1 E. IGRP VLSM is not supported on either RIP v1 or IGRP.

Which of these dynamic routing protocols do not support VLSM? (Select two.) (A) RIP v1 (B) RIP v2 (C) EIGRP (D) OSPF (E) IGRP

C. Shutdown The shutdown mode specifies to disable the interface till the administrator enables it.

Which port security violation mode disables the interface on the switch if an invalid system connects to the port until the administrator enables the interface? (A) Disable (B) Protect (C) Shutdown (D) Restrict

D. EIGRP Only EIGRP provides support for all three listed protocols.

Which routing protocol supports transport protocols of IP, IPX, and Appletalk? (A) IGRP (B) RIP v2 (C) OSPF (D) EIGRP

A. R1(config)#access-list 1 permit 192.168.3.0 0.0.0.255 To create a standard access list, you use the access-list global configuration command and include the access list number you are creating, with a deny or permit, and then the source network address and wildcard mask.

You are configuring NAT on your router and need to create an access list that includes all IP addresses in the 192.168.3.0 network so that they can use NAT services. Which of the following would you use as the access list? (A) R1(config)#access-list 1 permit 192.168.3.0 0.0.0.255 (B) R1#access-list 1 permit 192.168.3.0 0.0.0.255 (C) R1(config)#access-list 1 permit 192.168.3.0 255.255.255.0 (D) R1(config)#access-list 1 deny 192.168.3.0 0.0.0.255

C. clock rate 32000 The correct command to set the clock rate to 32Kb/s is clock rate 32000.

You are configuring a serial port on the router. What command would set the clock rate to 32 Kb/s? (A) clock rate 32 (B) clock speed 32 (C) clock rate 32000 (D) clock speed 32000

A. 255.255.255.224 To create eight networks, you would need to use three subnet bits, which would give you a custom subnet mask of 224.

You are designing an IP scheme for a network that will contain up to 8 subnets with no more than 26 hosts on each. Which of the following subnet masks will be used? (A) 255.255.255.224 (B) 255.255.255.192 (C) 255.255.255.240 (D) 255.255.255.248

A. OSPF EIGRP and IGRP are propriety Cisco protocols, so the choice is between OSPF and RIP v1; but RIP v1 does not support VLSM, leaving OSPF as the only available choice.

You are looking to implement a routing protocol with the following features: ✓ Scalable ✓ Support for VLSM ✓ Vendor compatibility ✓ Low overhead Which protocol should you choose? (A) OSPF (B) RIP v1 (C) EIGRP (D) IGRP

B. R1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 To add a static route, you use the ip route global configuration mode command and specify the destination network you wish to add to the routing table. This is followed by the subnet mask and the next hop where the router should send data destined for that network.

You are the administrator for router R1 shown in the figure below. You need to add a static route for the 13.0.0.0 network. What command would you use? (A) R1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.1 (B) R1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 (C) R1#ip route 13.0.0.0 255.0.0.0 12.0.0.2 (D) R1(config)#ip route 13.0.0.0 255.0.0.0 13.0.0.1

B. You have configured the wrong wildcard mask. When configuring OSPF networks, you specify the network ID and the wildcard mask - not the subnet mask. The quickest way to calculate the wildcard mask is to take the subnet masks away from 255.255.255.255. For example: 255.255.255.255 -255. 0. 0. 0 ——————— 0.255.255.255 So, 0.255.255.255 should be the wildcard mask used with the network statement.

You are the network administrator for a network that is already running OSPF. You configure OSPF on your router with the following commands, but your router is not sharing routing information with other OSPF routers. What is wrong? Enable Config term Router ospf 1 Network 12.0.0.0 255.0.0.0 area 0 (A) You have configured the wrong subnet mask. (B) You have configured the wrong wildcard mask. (C) You have configured the wrong process ID. (D) You have configured the wrong network ID.

C. show ip route In order to view the routing table, you can use the show ip route command.

You are troubleshooting a routing problem and need to view your routing table. What command would you use? (A) show route (B) route show (C) show ip route (D) enable show route

C. Between 25% and 50% If all the LEDs were lit up, then the switch would be using more than 50% of its bandwidth; since there is still one LED that is out, the usage is between 25% and 50%.

You are using Catalyst 2950 24 port switch. You have pressed the mode button to enable UTIL mode. All the port LEDs turn green except for the last GBIC port. What is the bandwidth utilization on the switch? (A) Less than 12.5% (B) Between 12.5% and 25% (C) Between 25% and 50% (D) Between 50% and 100%

D. 2.2.2.2 The router ID that OSPF uses if one has not been configured is the highest IP address assigned to a loopback interface. If a loopback interface does not exist, then it is the highest IP address assigned to a physical interface.

You have a router with the following configuration. What is the OSPF router ID of the router? Loopback 0: 1.1.1.1 Loopback 1: 2.2.2.2 FastEthernet 0/0: 12.0.0.1 FastEthernet 0/1: 13.0.0.1 Serial 0/0: 14.0.0.1 (A) 1.1.1.1 (B) 13.0.0.1 (C) 14.0.0.1 (D) 2.2.2.2 (E) 12.0.0.1

B. clear ip nat translations * The clear ip nat translations * will remove all NAT associations. You will be able to verify this with the show ip nat translations command.

You have client computers on your network that are having issues establishing sessions with a remote website. The router is performing NAT. You would like to reset their dynamic NAT addresses through the router. What command will erase their NAT entries in the router? (A) clear ip nat translations (B) clear ip nat translations * (C) no ip nat translations (D) no ip nat translations *

B. Static route The static route would be placed in the routing table because it has a lower administrative distance than the RIP route.

You have configured RIP routing on your routers. You have configured a static route to the same destination that your router learns of through RIP. Which entry is placed in the routing table? (A) RIP route (B) Static route (C) Neither (D) Both

D. Switch Trunk ports are typically used to connect a switch to another switch; most other devices will typically use access ports. A trunk mode port will pass traffic for all VLANs.

You have configured a switch port for trunk ode. What type of device is typically connected to this type of port? (A) Computer (B) Router (C) Printer (D) Switch

C. EIGRP This is based on the default administrative distance for each of the routing protocols, which leads to the believability of the routing information. Routing protocols have these administrative distances: OSPF (110), IGRP (100), EIGRP internal (90), and RIP (120). In this case, the protocol offering the lowest distance is EIGRP.

You have configured multiple routing protocols on your network. There is a path discovered to a remote network segment by each routing protocol. Which protocol's path will be chosen by your router? (A) OSPF (B) IGRP (C) EIGRP (D) RIP

A. ip nat inside source list 1 interface FastEthernet 0/0 overload D. ip nat pool no-overload 192.168.1.2 192.168.1.63 prefix 24 The difference between these two options is based on the final result that you desired. If your goal was to support a PAT configuration, then answer A enables overloading, which would allow your configuration to function, allowing more than one user out; but if you were attempting to perform NAT, then choice D defines a pool of outside addresses and assigns it to be used for NAT.

You have configured your router for NAT as per the figure below, but most of your network users are not able to connect to external resources. What command will fix the problem? (Select two.) (A) ip nat inside source list 1 interface FastEthernet 0/0 overload (B) ip nat pool no-overload 10.0.0.2 10.0.0.63 prefix 8 ip nat inside source list 1 pool no-overload (C) ip nat pool no-overload 192.168.1.2 192.168.1.63 prefix 24 ip nat inside source list 2 pool no-overload (D) ip nat pool no-overload 192.168.1.2 192.168.1.63 prefix 24 ip nat inside source list 1 pool no-overload

D. Change the crossover to straight-through In this example, you are using the wrong type of cable to connect the switches to the routers; you should use straight-through because they are dissimilar devices.

You have connected the switches to the routers using crossover cables, and the client systems to the straight-through cables. You have configured Network A with the 192.168.3.0/24 IP range, and Network B with the 192.168.4.0/24 range. The systems cannot communicate off the network. What should you do? (A) Change the straight-through to crossover (B) Change the IP range of Network A to 192.168.4.0/24 (C) Change the IP range of Network B to 192.168.3.0/24 (D) Change the crossover to straight-through

D. ip nat inside source list 1 interface serial 0/0 overload To configure NAT using the access list, you use the ip nat inside source list <#> command and continue by specifying which interface you wish to overload.

You have created access list I to include all IP address that can use NAT. How would you configure NAT on the router to have all internal IP assress use the public IP assigned to the serial 0/0 interface? (A) ip nat interface serial 0/0 overload 1 (B) ip nat list 1 interface serial 0/0 overload (C) nat interface serial 0/0 overload (D) ip nat inside source list 1 interface serial 0/0 overload

D. Router A router is required to allow devices on different VLANs to communicate with each other. If you are using a layer-3 switch, you have router functionality built into the switch.

You have one switch on which you have created three VLANs. You have decided that you need to have devices on these VLANs communicate with each other. You need to add which device to your network to allow the communication? (A) Repeater (B) Switch (C) Bridge (D) Router

C. 10.10.10.0/24 When choosing a gateway, the router will always choose the entry in the routing table which most closely matches the destination address.

You have routing tables specifying gateways for the networks of 10.0.0.0/8, 10.10.0.0/16, 10.10.10.0/24, and 10.10.10.10/32. You have attempted ping a device with an address of 10.10.10.11. Which entry in the routing table will direct your traffic to a gateway or router? (A) 10.0.0.0/8 (B) 10.10.0.0/16 (C) 10.10.10.0/24 (D) 10.10.10.10/32 (E) The first matching entry in the routing table (F) The last matching entry in the routing table

C. R1>show sessions The show sessions command will display any telnet sessions you have.

You have shelled out of your telnet session and wish to view the telnet sessions that are currently running in the background. What command would you use? (A) R1>show telnet (B) R1>show telnet sessions (C) R1>show sessions (D) R1>show background sessions

A. Use the secret password. When both passwords are set, the enable password is no longer used, and you will only use the secret password.

You have used both enable secret and enable password commands to set passwords for your router. How do you get to the # prompt? (A) Use the secret password. (B) Use the enable password. (C) Use either the secret or enable passwords. (D) Use both the secret and enable passwords.

C. Multiple addresses let you know that the port is connected to another switch or hub. If you see multiple MAC addresses associated with a port, it means that there are multiple devices connected to that port on the switch, so the port is likely connected to a switch or hub. When IP telephony is in use, most phones have a two-port switch in them, allowing the desktop computer to be connected to the network through the phone. In this case, the switch port would show two MAC addresses, one for the phone and one for the computer.

You issue the command show mac-address-table on your switch. There are several MAC addresses listed for many of the ports. What is the significance of multiple addresses being listed on a port? (A) Identifies an internal problem on the switch. (B) Multiple addresses are normal if STP is in use on the switch. (C) Multiple addresses let you know that the port is connected to another switch or hub. (D) There is no significance because this cannot happen.

B. R1#copy running-config tftp To back up your configuration to a TFTP server, you use the copy command and specify running-config as the source and tftp as the destination.

You need to back up your router configuration to a TFTP server. Which of the following commands would you use? (A) R1#copy tftp running-config (B) R1#copy running-config tftp (C) R1#backup running-config tftp (D) R1#restore running-config tftp

B. router ospf 3 E. network 192.168.2.0 0.0.0.255 area 0 You use the route ospf <#> command to start the OSPF process and give it a process ID. You then use the network command with the wildcard mask and area for the networks you want to enable OSPF on.

You need to configure OSPF on your router for network 192.168.2.0. What two commands would you use? (Select two.) (A) router ospf (B) router ospf 3 (C) network 192.168.2.0 255.255.255.0 area 0 (D) network 192.168.2.0 0.0.0.255 (E) network 192.168.2.0 0.0.0.255 area 0

D. Use the following commands: R1#config term R1(config)#interface f0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#no shutdown In order to assign an IP address to an interface, you must use the interface command in global configuration mode to navigate to the interface. You then configure the IP address and use the no shutdown command to enable the interface.

You need to configure your Fast Ethernet port 0/0 for the IP address of 14.0.0.1 and ensure that the card is enabled. What commands would you use? (A) Use of the following commands: R1#config term R1(config)#interface f0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#shutdown (B) Use of the following commands: R1#config term R1(config)#ip address 14.0.0.1 255.0.0.0 R1(config)#no shutdown (C) Use of the following commands: R1#config term R1(config)#interface f0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#encapsulation ppp (D) Use of the following commands: R1#config term R1(config)#interface f0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#no shutdown

D. R1(config)#cdp run To enable CDP, you use the cdp run command in global configuration.

You need to ensure that CDP is enabled on your Cisco device. What command would you type? (A) R1#cdp run (B) R1(config)#enable cdp (C) R1#cdp enable (D) R1(config)#cdp run

D. exec-timeout 15 30 The exec-timeout command is used to set a timeout on console and vty ports.

You want to set a session timeout on your router for 15 minutes and 30 seconds. Which command will do what you are looking for? (A) console timeout 15 30 (B) timeout 15 30 (C) set exec timeout 15 30 (D) exec-timeout 15 30

A. Use the following commands: R1#config term R1(config)#username bob password P@ssw0rd R1(config)#line vty 0 4 R1(config-line)#login local After creating the username and password in global configuration, you must navigate to the vty ports and use the login local command to force the local usernames and passwords to be used.

You wish to configure a username bob and ensure telnet requires a username and password before allowing access to the device. Which of the following configuration allows this? (A) Use of the following commands: R1#config term R1(config)#username bob password P@ssw0rd R1(config)#line vty 0 4 R1(config-line)#login local (B) Use of the following commands: R1#config term R1(config)#username bob password P@ssw0rd R1(config)#line vty 0 4 R1(config-line)#login (C) Use of the following commands: R1#config term R1(config)#username bob password P@ssw0rd R1(config)#line vty 0 4 (D) Use of the following commands: R1#config term R1(config)#line vty 0 4 R1(config-line)#password P@ssw0rd R1(config-line)#login

D. SW1(config-if-range)#switchport mode access To configure multiple ports at once, you use the interface range <port #> command to navigate to multiple ports and then you can use the switchport mode access command at the range prompt.

You wish to configure all the ports on the switch for access mode. What command should you use? (A) SW1(config-if)#switchport mode access (B) SW1(config-if)#switchport mode access all_ports (C) SW1(config-if)#switchport all mode access (D) SW1(config-if-range)#switchport mode access

B. SW1(config-if)#duplex full To configure full duplex mode, you navigate to the interface and then use the duplex full command.

You wish to configure an interface on the switch for full duplex mode. What command would you use? (A) SW1(config-if)#full duplex (B) SW1(config-if)#duplex full (C) SW1(config)#duplex full (D) SW1#full duplex

B. Use the following commands: R1#config term R1(config)#interface S0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#encapsulation ppp R1(config-if)#clock rate 64000 R1(config-if)#no shutdown When configuring the DCE end of a serial link, you need to configure the encapsulation protocol and the clock rate for the link.

You wish to configure your serial 0/0 interface as the DCE end of a point-to-point link. Which of the follow represents the commands you would use? (A) Use of the following commands: R1#config term R1(config)#interface f0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#encapsulation ppp R1(config-if)#clock rate 64000 R1(config-if)#shutdown (B) Use of the following commands: R1#config term R1(config)#interface S0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#encapsulation ppp R1(config-if)#clock rate 64000 R1(config-if)#no shutdown (C) Use of the following commands: R1#config term R1(config)#interface S0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#encapsulation ppp R1(config-if)#no shutdown (D) Use of the following commands: R1#config term R1(config)#interface S0/0 R1(config-if)#ip address 14.0.0.1 255.0.0.0 R1(config-if)#no shutdown

C. no ip route To delete a route on a router, you use the no ip route command in global configuration mode.

You wish to delete a route from the routing table, what command would you use? (A) delete route (B) no route (C) no ip route (D) route delete

B. service password-encryption In order to encrypt all passwords in the configuration file, you can use the service password-encryption command.

You wish to encrypt all passwords on the Cisco device. What command would you use? (A) password encrypt (B) service password-encryption (C) set password-encryption (D) enable password-encryption

D. 2142 To bypass the password you have forgotten on the Cisco device, you will interrupt the boot process and then change the configuration register value to 2142 in order to not have the startup config applied when you reboot the router.

You wish to recover a forgotten password on your router. What value would you set the configuration register to? (A) 2102 (B) 2100 (C) 2122 (D) 2142

A. show port-security interface f0/6 You can verify that port security was configured on an interface by using the show port-security command along with the interface.

You wish to verify that port security was configured on port 6 of the switch. What command would you use? (A) show port-security interface f0/6 (B) show port-security 6 (C) show interface port-security (D) show interface f0/6 port-security

C. ping <ip_address> In order to verify communication on the network, you use the ping command.

You wish to verify that you can communicate with a host on the network. What command would you use? (A) ip arp (B) ip rarp (C) ping <ip_address> (D) cdp run

A. show cdp neighbors detail The show cdp neighbors detail command will display the IP addresses of neighboring devices.

You wish to view the IP addresses of Cisco devices closest to you. Which command would you use? (A) show cdp neighbors detail (B) show ip route (C) show ip interface brief (D) show cdp neighbors

A. show vlan To view a list of VLANs, you can use the show vlan command.

You wish to view the list of VLANs and the ports associated with each VLAN. What command would you use? (A) show vlan (B) show ip vlan (C) show net vlan (D) show ip interface brief

A. Ensure that virtual terminal port communication is encrypted The set of commands configures the virtual terminal port and more importantly ensures that SSH is used as the protocol to communicate through the virtual terminal ports. This ensures that the communication is encrypted when remoting into the device.

Your coworker has configured the router with the following commands. What do they do? line vty 0 4 password telnetP@ss login transport input ssh (A) Ensure that virtual terminal port communication is encrypted (B) Allow secure virtual terminal port communication if a nonsecure channel cannot be established first (C) First attempt a non-secure virtual terminal port session before attempting a secure session (D) Attempt a secure session before attempting an unsecure session if the secure session fails

C. fe80:d351:3f16:dc41:ed36:317e:410e:3f28 You can always identify link local addresses because they start with FE80.

Your manager has asked about the new IPv6 address format. He asks which of the following addresses is a link-local address. What is your answer? (A) 2001:d4b1:c526:e929:cd14:2d1e:3b14:92ef (B) ::1 (C) fe80:d351:3f16:dc41:ed36:317e:410e:3f28 (D) 2005::2


Conjuntos de estudio relacionados

#1: Information and Communication Technology

View Set

Turning Points of the Revolution

View Set

Chapter 7 -- Benign Disorders of the Female Reproductive Tract

View Set