Cisco Routing and Switching Pro all chapters
You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two
The virtual IP address is 172.16.0.1 Router B will serve as active router, and Router A will serve as standby router
The Serial 0/1/0 interface on RouterA is connected to the Serial0/0/1 interface on routerB. The link between the routers uses subnet address 10.198.166.184 with a mask of 255.255.255.248. RouterA is unable to communicate with RouterB. You view the interface status on RouterA and see the following information. What is the problem?
The wrong subnet mask is used.
RouterA and RouterB are connected with a serial link. A portion of the router configuration files is shown below. RouterA cannot communicate with RouterB. What is the problem
There is an encapsulation mismatch between the routers
Your router generates a log message with a severity level of 6. What does this indicate?
This message is only information in nature
Which of the following are characteristics of Teredo tunneling? select three
Works through NAT Dual stack host Tunnel endpoints configured on hosts
Which of the following are characteristics of 6-to-4 tunneling? select three
Works through NAT Tunnel endpoints configured on routers Dual stack routers
You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDI/MDIX is not enabled on these devices, drag the appropriated type of cabling on the left to each connection type on the right
Workstation to switch Straight-through ethernet cable Router to switch Straight-through ethernet cable Switch to switch Crossover ethernet cable Workstation to router Crossover ethernet cable Router to router Crossover ethernet cable
You have a small network as shown in the exhibit. Wrk1 is unable to communicate with Wrk2. Wrk1 can ping the router and all internet hosts. Wrk2 can ping Wrk3. What is the most likely cause of the problem?
Wrk1 and Wrk2 are on separate VLANs
Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?
You can create multiple broadcast domains
Which of the following statements apply only to extended access lists (ACLs), not to standard ACLs? select two
You can filter traffic for a specific TCP/IP protocol You can filter traffic based on destination IP addresses
Which of the follwong commands would you use to modify the CDP packet enhance interval to send CDP packets every 30 seconds?
cdp timer 30
You are configuring a serial connection and need to configure the DCE to provide a clocking signal. Given that you have been leased a 128 Kbps line from the WAN service provider. Which command should you use to accomplish this?
clock rate 128000
What type of resources offer the following advantages? Flexibility of access, ease of use, self-service provisioning of resources, API availability, Metering of services, Ability to try out software application
cloud
You want to enable full duplex on your ethernet network. Which of the following should you do?
configure NICs and switch interfaces to use full Duplex
You have three switches configured as shown in the exhibit. How could you guarantee that switch C becomes the root bridge?
configure switch C with a lower priority value
You have a layer 3 switch that is capable of interVLAN routing. What process must you complete to allow interVLAN routing on a layer 3 switch interface?
Configure the interface as a switch virtual interface
Which of the following is not required when configuring a Cisco router as a PPPoE DSL client?
Configuring PPP authentication
Consider the following IPv6 address FE80:55:0000:0000:A:AB00 Which of the following valid shortened forms of this address? select two
FE80:55:0000:0000:A:AB00 FE80:0000:0000:0055::000A:AB00
You are on a workstation with the following mac address: 10-01-64-AB-78-96 Which of the following will be the link-local address using the modified EUI-64 format?
FE80::1201:64FF:FEAB:7896
You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What is the true concerning the role and state of interface fa0/5 for VLAN 1? select two
IF Gi0/2 stops receiving configuration BPDUs, Fa0/5 will transition to the STP root port start The interface is in the Rapid PVST+ blocking state
Which of the following is true of Mutliprotocol Label Switching? select two
MPLS-enabled routers switch packets based on the label information, not on the packet contents MPLS is designed to work with many different protocols
Match each characteristic on the left with the appropriate fiber optic connector on the right
MT-RJ Uses metal guided pins to ensure proper alignment LC Uses a connector that is half the size of the otters fiber optic connectors ST Uses a bayonet-type connector SC Uses a separate push-on, pull-off connector with a locking tab for each wire
Your client has acquired several small companies and would like to connect them into one network. Not all the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?
PPP
An Internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and the HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?
Port and Socket number
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following does the privileged exec show isco command profile information about?
Port channel information
While working at the console of a Cisco device, you need to use the same command repeatedly. Given that the command is quite long, what can you do to avoid having to retype it over and over?
Press the up arrow key
Which of the following describes the role of Core switches and how they are implemented in the design of a local area network on a university or corporate campus? select three
Provide high speed connections between distribution switches Not used in two-tier (collapsed core) network design Reduce the number of uplinks required to connect each building to the campus network.
You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from tagging packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?
Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk native vlan3
You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from forwarding packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?
Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk allowed vlan remove 3
How are routing tables created by link-state routing protocols?
The SPF algorithm is applied to the topological database to create a routing table
Which statement best describes the fragment-free switching method?
The switch reads the first 64 bytes of the frame, verifies that a collision has not occurred, and switches the frame to the correct port.
You need to backup the current IOS image on your router to the TFTP server. The TFTP servers IP address is 192.56.145.23. Which of the following commands do you use?
copy flash tftp
You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use?
copy start tftp
Which command do you use to copy a file named ATL-1.cfg on the TFTP server to the running-config on the router?
copy tftp run
Which two of the following commands can you use to copy files from a TFTP server with address 10.0.0.5 to a router?
copy tftp run copy tftp start
You have a small network as shown in the exhibit. You want to configure a route so that packets sent to any non-directly connected network get sent to RouterB. Which command would you use?
ip route 0.0.0.0 0.0.0.0 192.168.4.14
You need to enable the security feature set on a router. You visited the Cisco website to purchase the feature set and created a product authorization key (PAK). Cisco emailed you the license file (FTX1788948P_201304123432565291.lic), which you copied to a USB drive. You connect the USB drive to the device and now need to install the license. Which commands should you use to accomplish this? select two
reload license install usbflash1:FTX1788948P_201304123432565291.lic
You have finished configuring ACL 101 and are ready to apply it to an interface. Before you do, however, you would like to view the ACL to ensure there are no mistakes. Which command displays access list 101?
show access-list 101
You need to add the security feature set to a router. Prior to accessing Ciscos website to purchase the appropriate license, you need to record the UDI of the router. Which commands can you use to do this? select two
show version show license udi
You have four switches configured as shown in the exhibit. Which switch becomes the root bridge?
D
You have a network with three routers as shown in the exhibit. All routers are configured to share information for all know routes using the same routing protocol. Automatic summarization is enabled. Router B shares its known network with router C. Which of the following routes will be routers Cs routing table?
172.16.0.0/16
You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. What routes will routerB have in its routing table that it has learned from routerA?
172.16.0.0/16
What is the correct decimal form of the following binary IP address? 00001010.00000000.01100100.00011101
10.0.100.29
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %lineproto-updown:line protocol on interface fastethernet0/0, change state to down What is the severity level of this message?
-5-
Consider the following IPv6 address 2001:0BEF:0BAD:0006::32/64 Drag the component part of this address on the left to the corresponding description on the right. Not all descriptions on the right have corresponding components on the left.
-Global routing Prefix 2001:0BEF:0BAD -Subnet ID 2001:0BEF:0BAD:0006 -Interface ID ::32 Prefix Length /64 Global ID Blank
A network host has an IP address of 137.65.1.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address?
/16
A network host IP address of 10.10.0.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address?
/8
Match each route type o the left with its default administrative distance on the right
0-Connnected 1-Static 20-BGP 90-EIGRP 110-OSPF 120-RIP
You want to create an ACL statement that allows traffic from any network. Which network address and wildcard mask value should you use?
0.0.0.0 255.255.255.255
You are configuring OSPF for area 0. SubnetA uses an address of 172.16.20.48/28. which wildcard mask value would you use for the network statement?
0.0.0.15
You want to create an ACL that prevents all traffic sent from network 178.68.48.0/20. Which wildcard mask value would you use?
0.0.15.255
You are configuring ACLs on a router and want to deny traffic being sent to the 10.10.16.0/21 network. Which wildcard mask should you use with the access-list statement?
0.0.7.255
You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a photograph to workstation3. Which destination MAC address does workstation1 use?
000b5f2a2222
You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a text document to workstation2. Which destination address does workstation1 put in the ethernet frame header?
080046987654
Which of the following configurations register values tells the router to use configuration information from NVRAM>
0x2102
A host on the network has an IP address of 197.65.251.125 with a subnet mask of 255.255.255.240. What is the subnet address of this host?
197.65.251.112
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %lineproto-updown:line protocol on interface fastethernet0/0, change state to down What facility generated this message?
%lineproto
What is the last host IP address on a subnet 202.177.48.64 if the mask value is 255.255.255.240?
202.177.48.78
You have been assigned the IP network address of 135.65.0.0 and have selected 255.255.240.0 as the subnet mask. How many valid subnet addresses are available?
16
A configured threshold has been exceeded by an network host that is being monitored by an SNMP agent. The agent sends a trap to its SNMP manager with a notification that the threshold has been exceeded. Which IP port is used by the agent to send the trap?
162
Which of the following are private IP addresses? select two
10.244.12.16 192.168.250.11
You have issued the following commands at the server console router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any router(config)#int eth router(config-if)#ip access-group 122 out from which three of the following address will TCP traffic be forwarded out the eth 0 interface?
10.6.0.12 10.6.0.224 10.6.0.11
An Ethernet network meets the specification for ethernet 1000BaseT. A single server is connected to a port on the switch. the switch port is configured for auto-detect. What is the available bandwidth on the server cable segment
1000 Mbps if the server NIC is half duplex; 2000 Mbps if the server NIC is set to full duplex
What is the default administrative distance for OSPF?
110
What is the correct binary form of the decimal IP address 192.168.1.1?
11000000.10101000.00000001.00000001
What is the maximum data rate of an ISDN Bri line?
128Kbps
You have a network address of 129.111.0.0 and a subnet mask of 255.255.224.0. Which two of the following are valid subnet address?
129.111.96.0 129.111.160.0
You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which three of the following are valid host addresses for the subnet 132.66.160.0?
132.66.188.88 132.66.161.0 132.66.175.252
You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which four of the following are valid subnet addresses?
132.66.192.0 132.66.224.0 132.66.96.0 132.66.0.0
You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many possible host addresses are one each subnet, excluding subnet address and broadcast address?
14
Which of the following IP addresses is a valid IP address for a host on a public network?
142.15.6.1
Which of the following is not one of the ranges of private P addresses that are commonly used behind a NAT router?
169.254.0.1 - 169.254.255.254
You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set 172.16.0.0/28 is subsetted, 5 subnets C 172.16.0.0 is directly connected, fastethernet0/0 C 172.16.0.32 is directly connected, fastethernet0/1 R 172.16.0.96[120/1] via 172.16.0.12, 00:00:25, fi0/0 R 172.16.0.128 [120/2] via 172.16.0.12, 00:00:25, fi0/0 R 172.16.0.144 [120/1] via 172.16.0.33, 00:00:25, fi0/1 Match the router interface on the left with the address used to reach the destination network
172.16.0.19 Dropped Packet 172.16.0.109 fastethernet0/0 172.16.0.158 fastethernet0/1 172.16.0.178 Dropped Packet
Which of the following statements about the dynamic host configurations protocol (DHCP) are true? select two
A DHCP server assigns addresses to requested hosts It can deliver other configuration information in addition to IP addresses
You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. What routes will routerB have in its routing table that it has learned from routerA?
172.16.1.64/27 and 172.16.1.96/28
You have configured OSPF routing on RouterA. A partial configuration is shown below. RouterA is connected to RouterB thorough the serial link. What routes will ROuterB have in its routing table that it has learned from RouterA
172.16.1.64/27 and 172.16.1.96/28
You have a network with three routers as shown in the exhibit. All routers are configured to share information for all known routes using the same routing protocol. Automatic summarization is enabled. RouterB shares its know networks with routerA. Which of the following routes will be in router As routing table?
172.16.2.0/27, 172.16.2.32/28, abd 172.16.2.48/28
A workstation has been assigned the following IP addressing information: IP address 192.168.1.26 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.254 DNS server: 192.168.1.1 Given this information, what is the IP address of the network this host resides?
192.168.1.0
Which VSAT component provides data reception capabilities over a satellite link?
Low-noise Block Downconverter (LNB)
You use the show ip route command on your router and see the information shown below. Gateway of last resort is 192.168.2.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 C 192.168.11.0/24 is directly connected, fastehternet1/0 R 192.168.15.0/24 [120/1] via 192.168.1.15, 00:00:25, fi0/0 R 192.168.20.0/24 [120/1] via 192.168.1.15, 00:00:25, fi0/0 R 192.168.25.0/24 [120/1] via 192.168.1.15, 00:00:12, fi1/0 S* 0.0.0.0/0 [1/0] via 192.168.2.12 Match the router interface on the left with the address used to reach the destination network
192.168.1.45 fastethernet0/0 192.168.11.166 fastehternet1/0 192.168.3.45 fastethernet0/1 192.168.15.192 fastethernet0/0 192.168.25.211 fastehternet1/0 192.168.111.30 fastethernet0/1
You have several hosts, a switch and a router as shown in the exhibit. Workstation2 sends an IP packet to workstation3. Which default gateway address is used by workstation2?
192.168.10.1
You have a network with two routers as shown in the exhibit. RouterA and RouterB are configured to use RIP version 2 with auto-sumerization enabled. Which summarized network entry will RouterA have in its routing for the subnets connected to routerB?
192.168.12.0/24
You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. Which of the following addresses could Srv2 receive when it boots?
192.168.12.166
You have configured routerA, routerB, and routerC as shown in the exhibit. No loopbacks interfaces have been configured. hostname C router ospf 600 network 172.16.32.1 0.0.0.0 area 100 network 192.168.2.1 0.0.0.0 area 100 What is the default router id of router C?
192.168.2.1
Based on the address prefix, for each IPv6 address on the right, identify the address type from the list on the left. Addresses used might not represent actual addresses used in production)
2001:6789:9078:ABCE:AFFF:FE98:0001 Global Unicast FD00::8907:FF:FE76:ABC Unique Local FEA0::AB89:9FF:FE77:1234 Link-Local FF00:98BD:6532::1 Multicast FF02::1:2 Multicast
You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?
2
Which of the following numbering ranges are used by extended ACLs? select two
2000-2699 100-199
Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that has been configured incorrectly
2001:0BAD:0003::2/64
Given that an IPv4 address is a 32-bit binary number in four octets (four 8-bit values), which of the following are valid IP addresses? select three
224.0.0.1 137.65.1.1 172.12.1.3
Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network? select two
254 host addresses are available 172.17.2.0 is a valid subnet
Drag each binary subnet mask on the left to the appropriate decimal equivalent on the right.
255.0.0.0 11111111.00000000.00000000.00000000 255.255.255.128 11111111.11111111.11111111.10000000 255.254.0.0 11111111.11100000.00000000.00000000 255.255.0.0 11111111.11111111.00000000.00000000 255.255.255.252 11111111.11111111.11111111.11111100
Drag each binary subnet mask on the left to the appropriate decimal equivalent on the right.
255.254.0.0 11111111.11111110.00000000.00000000 255.255.255.224 11111111.11111111.11111111.11100000 255.248.0.0 11111111.11111000.00000000.00000000 255.255.255.0 11111111.11111111.11111111.00000000 255.255.255.248 11111111.11111111.11111111.11111000
You have been assigned the iP address of 140.225.0.0 for your network. You have determined that you need 39 subnets to allow for growth. What subnet mask value would you use?
255.255.252.0
You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 host per subnet. Which subnet mask should you use?
255.255.255.224
You have been assigned the IP address of 195.11.13.0 for your network. You have determined that you need 8 subnets to allow for growth. What subnet mask value would you use?
255.255.255.224
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. how many commands in global configuration mode begin with the letters de?
3
You have three switches configured as shown in the exhibit. For each port, identify the port role and statues after spanning tree convergence by matching the port states on the left with the ports on the graphic.
A GI0/1 Altn BLK A GI0/2 Root FWD B GI0/1 Desg FWD B GI0/2 Desg FWD C GI0/1 Desg FWD C GI0/2 Root FWD
You have a network consisting of routers, switches, a hub, and workstations connected as shown in the graphic. No VLANs have been configured. How many collision domains exist in this network?
4
You have a network address of 132.66.0.0 and a subnet mask of 255.255.254.0. How many possible host addresses are one each subnet, excluding subnet address and broadcast address?
510
Your network uses a network address of 137.65.0.0 with a subnet mask of 255.255.0.0. How many address are available for assignment to network hosts on this network?
65534
Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?
::1
Which of the following are correctly-formatted IPv6 addresses? select three
::DAFC:8904 2001::78:ABC:891F FE80::AB01:7894
While working at the console of a Cisco device, you need to view a list of the commands that are available in the current mode. Which command should you use?
?
RouterA is connected to RouterB through serial1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which set of commands would you use on RouterA to complete the configuration?
A
You have three switches configured as shown in the exhibit. For each port, identify the port role and statues after spanning tree convergence by matching the port states on the left with the ports on the graphic.
A GI0/1 Root FWD A GI0/2 Desg FWD B GI0/1 Root FWD B GI0/2 Altn BLK C GI0/1 Desg FWD C GI0/2 Desg FWD
Which of the following is required before you can create an SVI?
A VLAN must be created in the VLAN database
What is the effect of using the channel-group 3 mode desirable interface configuration command? select two
A channel is formed with another port group interface in either the auto or desirable mode The command configures the interface to actively negotiate the ether channel for PAgP channel group 3
What is the effect of using the channel-group 2 mode passive interface configuration command? select two
A channel is formed with another port group interface only if it is in active mode The command configures the interface in a passive negotiating state and forms an ether channel if the port receives LACP packets
Revue te iytoyr fri tge sgiw ubterfaces fa0/1 command on the switch2 with in the exhibit. What is wrong with the fat/1 interface in this example?
A duplex mismatch exist with the device on teh oterh end of the connection
You have issues the following command on your router. Router9config)#ip route 202.22.12.0 255.255.255.0 192.168.1.1 Which of the following are configured by the parameters in this command? select two
A route to network 202.22.12.0 is added The next hop router address is 192.168.1.1
IP traffic from a device configured with the address 10.10.34.4/24 is congesting the network. The network administrator issues a trace route command from the local router and receives the output show below. What is the cause of the problem?
A loop exists between two of the routers
Which of the following best describes the various VRRP group roles? select two
A master router forwards traffic destined to the virtual IP address A backup router will become the master router should the existing master router fail
Which of the following best describes a switch virtual interface (SVI) on a multi-layer switch? select two
A multi-layer switch treats SVI as a physical link through witch it can route traffic. A SVI is most commonly implemented to interconnect the VLANs between distributed and access switches in a multi-switch network
Which of the following devices is most likely to be assigned a public IP address?
A router that connects your home network to the internet.
Multiple VLANs have been created on a switched internetwork. How will these VLANs affect the functions of the spanning tree protocol?
A separate Spanning Tree exists for each VLAN
Which of the following correctly describes the T1 carrier system? select two
A single T1 channel can transfer data at 64 Kbps T1 lines use two pairs of copper wire
Which of the following best describes the various HSRP group roles? select two
A standby router will become the active router should the existing active router fail An active router forwards traffic destined to the virtual IP address
What is true regarding the following partial output in the running configuration file? select two Router#show run !interface fa 0/0 ip address 10.2.30.2 255.255.255.224 ! <output omitted> ! logging on logging host 10.2.30.253 logging trap 4 logging source-interface fa 0/0 !
A syslog server will receive error messages sent from 10.2.30.2 A syslog server will receive warning messages sent from 10.2.30.2
What primary advantages does the 802.1Q Trunking Protocol offer compared to ISL. choose two
Can be used with a mix of Cisco and non-disco devices IEEE standard
What happens when an HSRP act router fails? select two
Additional HSRP member routers transition from the listen starts after the hold time expires on the hello message The HSRP stands router becomes the active router after the hold time expires on the hello message
A host wants to send a message to another host with the IP address 115.99.80.157. The host does not know the hardware address of the destination device. which protocol can be used to discover the MAC address?`
ARP
Shown below is the partial configuration for a router as shown by the show run command. ! line con 0 exec-timeout 0 0 password cisco login line aux 0 line vty 0 4 exec-timeout 0 0 password study no login ! What will be the result of the configuration? select two
Access to the router through Telnet sessions is allowed without using a password. Access to the console require the use of cisco for the password
Your company has an email server with the IP address 172.16.2.13 as shown in the exhibit. You want to deny all traffic destined to this email server except email traffic. Which of the following set of statements will accomplish your goal?
Access-list 101 permit tcp any 172.16.2.13 0.0.0.0 eq smtp interface ethernet 1 ip access-group 101 out
You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. When it boots, it does not receive and IP address from the DHCP service. What should you do?
Add a DHCP pool for network 192.168.12.0/24
You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. When it boots, it is assigned the IP address of 192.168.11.166. However, it can only communicate with hosts on the same subnet. What should you do to correct the problem?
Add a default-router statement to dhcp pool 2
You have configured OSPF routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. When you check routerA, it has bot learned of any routes connected to routerB. What should you do to correct the problem?
Add a network statement that uses a network of 172.16.1.32 and a wildcard mask of 0.0.0.31
Use the exhibit to answer this question. To creat a separate broadcast domains, you enable four VLANs on your Catalyst 2950 switch. You then places a single host computer in each VLAN. Now the computer in VLAN1 can no longer communicate with the computers in the other VLANs. What must you do to enable communications between VLANs?
Add a router-on-a-stick
You have decided to use ACLs on your router to restrict NTP traffic between networks. Specifically, you want to allow only the server with an IP address of 172.17.8.1 to synchronize time with an NTP time provider with an IP address of 10.0.0.1 on a different network. The NTP protocol runs on UDP port 123. To accomplish this, you create the following ACL on the router connecting the two networks. After applying the ACL to inbound traffic on the interface connected to the 172.17.8.0/24 network, you find that now only 172.17.8.1 can synchronize rime with 10.0.0.1 using the NTP protocol, as intended. No otters NTp time clients on the 172.17.8.0/24 network can synchronize time with 10.0.0.1. However, you also quickly notice that no other host on the 172.17.8.0/24 network can communicate with hosts on any other network using any IP protocol. What can you do to fix this issue?
Add an additional ACL line of access-list 100 permit IP any any
Which Cisco express forwarding mechanism maintains layer 2 information linked to a particular entry in the routing table, reducing the need to send ARP requests before forwarding packets?
Adjacency tables
If you have multiple IPv6 address prefixes on a single OSPF interface, which of the following statements are true? select two
All address prefixes on an interface are included by default Users cannot select some address prefixes to be imported into OSPF for IPv6; either all address prefixes on an interface are imported, or not address prefixes on an interface are imported
Which three statements about creating VLANs with Cisco switches are true?
All devices connected to the same switch port are on the same VLAN Each VLAN runs an independent copy of the Spanning Tree algorithm By default, all Cisco switches run the Spanning Tree Protocol
Match each OSPF communication state on the let with the corresponding attributes on the right. Each state may be used once, more then once, or not at all.
All of the information in the hello packet matches the routers settings Init The routers negotiate how the data transfer will take place Exstart The routers trade database descriptions Exchange Both routers have matching databases Full The router receives a hello packet and checks the information it contains Attempt The routers exchange LSUs that contain LSAs Loading A router receives a help packet that includes its own RID in a list of neighbors 2-way
Use the exhibit to answer this question. Your network has four VLANs with multiple computers in each VLAN. You want to enable interVLAN routing. How must you assign the IP addresses for each VLAN.
All the computers within the same VLAN must belong to the same IP subnet
Which of the following describes how ACLs can be used to improve network security?
An ACL filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
When attempting to make a Telnet connection to a remote router, the connection fails. You check the interface statues on your local router and find the following. Which of the following are likely causes of the problem? select two
An ACL is preventing Telnet traffic The wrong IP address has been configured on the local or remote router
Which of the following statement about Switch Virtual Interface (SVI) characteristics are true? select three
An SVI is configured with an IP address and is associated wit a single VLAN The IP address associated with the SVI is the default gateway of the workstation A layer 3 switch treats each interface as a physical link through which it can route traffic
The users of a network are complaining that they can connect to resources within the company, but cannot use the internet. The network administrator begins troubleshooting the problem by entering privileged exec mode on the company router and typing show ip route command. The results are shown in the exhibit. What is the most probable cause of the problem?
An incorrect next-hop route has been statically configured on the local router
Which of the following internet connection technologies requires that the location be within a limited distance of telephone company central office?
DSL
Which WAN connection types use digital communications over POTS? select two
DSL ISDN
When configuring an HSRP group, which router(s) should be configured with the virtual IP address?
Any one of the routers in the HSRP group
To reduce your networks exposure to denial-of-service attacks, you have decided to use ACLs on your router to restrict ICMP traffic between networks. What can you do to fix the issue?
Apply the ACL to inbound traffic on the router interface connected to the 192.168.1.0/24 network
You have decided to use ACLs on your router to restrict TFTP between networks. What can you do to fix the issue?
Apply the ACL to outbound traffic on the router interface connected to the 10.0.0.0/8 network
What are the common elements of a network hierarchy used by link-state routing protocols? select two
Area Autonomous system
Which of the following are true of EIGRP configuration to enable two routers to become adjacent? select two
Authentication parameters must match The AS number used to configure EIGRP must match
You are planning to implement IPv6 in your organization network. As a result, you must migrate your routing protocol from EIGRPv4 to EIGRPv6. Which of the following are issues you must keep in mind during the migration process? select two
Auto-summarization is not needed in EIGRPv6 EIGRPv6 advertises IPv6 prefixes instead of IPv4 subnets
Which of the following concepts does an EBGP outer use to identify routers that belong to the same grouping of eBGP routers?
Autonomous system numbers (ASN)
Cisco router us the IOS image in flash memory. You can have the router boot from alternate locations if the IOS image in flash is corrupt. Which of the following commands will load the IOS image in the following orders?
B
YOu have just connected four switches as shown in the exhibit. Assuming the default swath configuration which switch will become the root bridge?
B
After using the show run command on a 2960 Cisco switch, you receive the following output. Which of the following is true?
Both fastethernet 0/9 and 0/10 are configured as unconditional access ports.
When BGP routers establish a neighbor (peer) relationship with a connected router, they exchange information. What kind of information do they exchange?
BGP routers advertise information about know networks (called prefixes) to neighbor routers
For each operation on the right, match the appropriate command from the list on the left.
Back up an IOS image in NVRAM to a network server copy flash tftp Copy an IOS image saved on a network server to the router copy tftp flash During startup, use an IOS image stored on a server boot system tftp
How does configuring banners add to the security of your router?
Banners provide a notice of intent, informing users that access is controlled or that activity my be logged.
You need to connect a PC to the router console port to establish a console connection. For each of the parameters listed below, select the appropriate parameter to establish the connections.
Baud rate=9600 Data=8 Bit Parity=None Stop=1 Bit Flow control=None
Many queue schedulers are able to identify whats know as a low-latency queue. What dow queue schedulers do when processing low-latency queues?
Before the scheduler moves on to the otters queues, the low-latency queue must first be cleared
Which VSAT component provides data transmission capabilities over a satellite link?
Block Upconverter (BUC
A switch running STA is a backup bridge. What stat is it in?
Blocking
When the router boots, it looks for the IOS image in the following locations: ROM, Flash, Locations specified by the boot system statement in startup-config, Default TFTP server. In what order are these locations checked?
Boot system statements, Flash, TFTP server, ROM
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following commands are complete commands? select all that apply
Branch1#show version Branch1# conf t Branch1(config-if)#duplex half
Which of the following statements are true about bridges? select two
Bridges broadcast messages from one network segment to another bridges connect two network segment to the same address
Which of the following is an advantage of using a bridge?
Bridges can be used to increase the maximum physical distance of a LAN
Which of the flowing statement describe how VLANs affect broadcast traffic within an internetwork? select two
Broadcast traffic is transmitted only within a VLAN Devices on the same VLAN have the same subnet address
Which internal routing logic organizes routing data using a tree structure for very fast searches, requiring less time to route packets?
Cisco express forwarding
Which routing logic organizes routing data in the forwarding information base (FIB)?
Cisco express forwarding
Which of the following is true of Multiprotocol Label Switching? select two
CEF is required for all MPLS-enabled Cisco routers MPLS can carry ATM, SONET, and ethernet traffic
You have a small network as shown in the Exhibit. You are unable to pink Wrk2 from Wrk1. What should you do to fix the problem
Change the IP address assigned to Wrk2
You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. When Srv2 boots, it is configured with an IP address of 169.254.0.55/16. IT needs to be assigned the address of 192.168.12.166. What should you do to correct the problem?
Change the IP address assigned to fa0/1
S0/0/0 in configured and is connected to another Cisco router with default settings. Which of the following are possible actions you can take to correct the problem indicated for s0/0/0? Note: you will not be able to use the show run or show start commands in this lab.
Change the encapsulation type
Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. a cable has been plugged in to the port and is connected to a device. You press the mode button to select Stat, and the port light alternately flashes amber and green. What should you do to correct the problem?
Check the NIC in Wrk1 for frame errors or excessive collisions
You are troubleshooting a basic serial connection on your router. The show interface serial0/1/0 command shows the following information. What should be your first step in troubleshooting the problem?
Check the cable connector on the router
Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communications is complete?
Circuit-switched
Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the gi0/1 interface. what does the statistic indicate?
Collisions are occurring
Two common AAA server solutions are RADIUS and TACACS+. Match the AAA server solution on the left with the appropriate description on the right
Combines authentication, authorization, and accounting RADIUS Uses TCP port 49 TACACS+ Does not transmit passwords in clear text between the client and the server RADIUS Provides three protocols, one each for authentication authorization, and accounting TACACS+ Encrypts the entire packet contents, not just authentication packets TACACS+ Uses UDP ports 1812 and 1813 and can be vulnerable to buffer overflow attacks RADIUS
You want to make a console connection to a router using the serial port on a PC. Select the necessary components to make the console connection. Select only the necessary components
Components Rollover cable, Console port, Terminal emulation program
Match the common threat mitigation techniques that are used to protect against attacks, list on the left with the appropriate description on the right
Composed of supplicant, authenticator, and authentication server 802.1x A port-based protocol that provides an authentication method for devices attempting to establish a wired or wireless network connection 802.1x Protects against rogue servers being connected to the network and performing man-in=the=middle attacks DHCP snooping Uses EAP to exchange authentication messages 802.1x Protects against network issues caused by an employee connecting a consumer-grade router to a network port DHCP snooping
Computer A and B are on the same VLAN and are separated by two switches, as show in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?
Computer A sends a normal frame. The first switch appends a VLAN ID to the Frame. The second switch removes the VLAN ID before forwarding it to computer B.
For each operation on the right match the appropriate command from the list on the left.
Configure DNS server addresses for the router to use for resolving host names ip name-server Create static entries for hosts, associating a host name with an IP address ip host Prevent the router from using DNS to resolve host names no ip domain-lookup Set the DNS name used by the router hostname
Which of the following measures can you take to increase the security of remote connections to your router?
Configure SSH
You have a small network connected to the Internet as shown in the exhibit. Router1 will provide NAT services to all hosts on the private network, and DHCP services to hosts connected to SubnetA. Srv1 is located on SubnetA. You want to make sure that this server is assigned the same IP address every time it boots, but you still want to mentally manage the address that is uses. What should you do?
Configure a DHCP binding for Srv1
The administrator of a corporate network is receiving complaints from internal users that they cannot access the internet. The administrator displays the routing table of the local router using the show ip route command. The results of the routing table are show in the exhibit. What should the administrator do on the local router to provide internal users access to the internet?
Configure a default route using ip route 0.0.0.0 0.0.0.0 131.108.2.2
Which of the following are true when configuring a serial connection between two routers? select two
Configure the clock rate on the DCE device Use PPP encapsulation when connecting a Cisco router to a non-Cisco router
You are configuring a Cisco router as a DSL PPPoE client as shown int eh image. You have already configured interface e0/0 for the local network but have not configured anything else. Which of the following is NOT required in configuring the Cisco router as a PPPoE client?
Configure a router map
You have a small network connected to the internet as shown in the exhibit. Both Srv1 and Srv2 need to be contacted by internet hosts. Which of the following task are required part so this solution? select two
Configure a static NAT mapping for Srv1 Define fa0/0 as an inside NAT interface
Use the exhibit to answer this question. A Catalyst 1900 switch with multiple VLANs is connected to a single physical interface on a Cisco 2600 router. The switch is using ISL trunking. You want to permit interVLAN routing between each of the VLANs. What should you do? choose two
Configure a subinterface for each VLAN and assign a unique IP network address for each VLAN Encapsulate ISL on each router sub interface for the VLAN it supports
Use the exhibit to answer this question. A Catalyst 2950 switch supporting only VLAN2 is connected to router interface fa0/1. A second catalyst 2950 switch supporting VLAN3 disconnected to the same router on fa0/2. Each switch is using 802.1Q trunking. You want to permit interVLAN routing between VLAN2 and VLAN3. what should you do? choose two
Configure a unique IP network address for each VLAN on each router interface ON the router, encapsulate 802.1Q for VLAN2 on fa0/1 and VLAN3 on fa0/2
You are working at the console of a new router. You want to check the configuration of the neighboring router called Sales5. You type telnet Sales5 at the router prompt and receive the following message Translating "sales5....domain server (255.255.255.255)% unknown command or computer name, or unable to find computer address. What should you do?
Configure an address of a DNS server for the router connected
You have three switches configured as shown in the exhibit. How could you guarantee that FA0/1 on switch B is in the blocking state following STP convergence?
Configure fa0/1 on switch B with a higher cost value
Using the exhibit to answer the following questions. You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a Catalyst 2960 switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?
Configure port security on the switch.
You have just connected four switches as shown in the exhibit. Assuming the default switch configuration, how can you force switch c to become the root bridge?
Configure priority number of 4096 for switch c
You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17, but that it an send and receive frames from the five workstations on the network. What should you do?
Configure swtichport security on fa0/17 to allow only the MAC address of SrvFS
You have a small network as shown in the Exhibit. You configure DHCP on Router1 to provide IP addresses to all hosts connected to SwitchA. Following the configuration, you verify that Wrk1 has received an IP address from the DHCP service. Wrk1 can ping every host on the subnet, but cannot communicate with any hosts connected to Switch B or on the internet. What should you do.
Configure the DHCP server to deliver the default gateway address along with the IP address
You have a small network with two switches, A and B. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: You need to connect switch and switchB so that workstations connected to A and B can communicate to eachother
Connect SwitchA and B using a crossover cable.
You have a small network with two switches, SwitchA and SwitchB. Each switch has three client computers connected. WrKA_1,2,3 are cibbected ti SwitchA using their won subnet, while WrKB_4,5,6 are connected to SwitchB using a different subnet. You need to connect switchA and switchB so that workstations connect to A can communicate with workstations on B. Which should you do?
Connect SwitchA and SwitchB to a router using a straight-through cabling on each side.
Listed on the right are various connections between networking devices. For each connection, drag a cable type from the left to match it with the connection type.
Connect a workstation to a switch Ethernet straight-through cable Connect a workstation to the console port on a Cisco devic Rollover cable Connect a hub to a switch Ethernet crossover cable Connect a router to a switch Ethernet straight-through cable Connect a switch to a switch Ethernet crossover cable Connect a workstation to a router Ethernet crossover cable
You manage a small LAN for a branch office. The branch office has six file servers, You want to use full-duplex ethernet and offer guaranteed bandwidth to each server. How should you design the network?
Connect all network devices to a switch, connect each server to its own switch port.
You have two switches as shown in the following diagram. Each switch has host from two separate VLANs. How would you connect the switches so that the hosts in VLAN1 on one switch can communicate with hosts in the same VLAN on the other switch?
Connect both switches with a crossover cable
You have two separate switches as shown in the following diagram. Each switch has hosts from two separate VLANS. how would you connect the switches so that host in VLAN1 can communicate with hosts on VLAN2?
Connect both switches with a router using straight-through cables
You are a field technician for a large company. You have been sent to a remote site to troubleshoot a downed router. When you arrive at the remote site, how will you connect your laptop to the router? select two
Connect the laptop's Ethernet port to the router's Ethernet port using a crossover cable. Connect the Laptops COM port to the router's console port using a rollover cable.
Each connection in the Exhibit is labeled A-G. Drag the cable type from the left that you would use to make each connection type.
ConnectionA Ethernet straight-through cable ConnectionB Ethernet crossover cable ConnectionC Ethernet straight-through cable ConnectionD Rollover cable ConnectionE Ethernet crossover cable ConnectionF Ethernet straight-through cable ConnectionG Ethernet crossover cable
Drag each leased line component on the left with its corresponding description on the right. Each component may be used once, more then once, or not at all.
Connects the WIC in the router to the telecom equipment Serial Cable Controls the speed and timing of the routers serial interfaces CSU/DSU Provides the clocking function of the link CSU/DSU The equipment at the customer site CPE Provides a Layer 1 interface between the router and the telecom providers equipment CSU/DSU
Match the OSPF database on the left with its corresponding description on the right. Each database may be used once, more then once, or not at all.
Contains LSAs and list all possible routes Topology Lists all neighbors that the router has learned about from the hello packets Adjacency Built from the information gathered in the adjacency database Topology Built from information in the topology database Routing table Lists the best possible route calculated from the SPF algorithm Routing table Also know as the neighbor relationship table Adjacency
You want to configure DHCP on your Cisco router to provide automatic IP address assignment to a single subnet. You will use 192.168.12.0/27 for the subnet address. The router interface has been configured with an IP address of 192.168.12.1. Additionally, you want to make sure that a specific server, called SrvFS, always gets the last IP address on the subnet as its IP address. How should you configure DHCP on the router? select two
Create a DHCP finding for address 192.168.12.30 Create and address pool with start address of 192.168.12.2 and end address of 192.168.12.30
Your router currently has two ACLs one list denies SAP broadcast and allows all other traffic, This list is applied to outbound traffic on Serial0 The second list denies Telnet traffic and allows all other traffic. This list is applied to inborn traffic on Serial1. You want to also restrict all outbound traffic sent through Serial0 from network 192.168.2.0/24. How should you configure ACLs on the router to meet all current and new requirements with an little effort as possible?
Create a new ACL that denies traffic from network 192.168.2.0/24 and permits all other traffic. Apply ACL on the Serial0 interface for outbound traffic.
Your router has the following access lists: list 91 denies all traffic from network 12.1.6.0/24 and allows all other traffic List 101 denies all telnet traffic and allows all other traffic Access list 91 is apples to the Serial0 interface for outbound traffic. Access list 101 is applies to Serial0 interface for inbound traffic You now want to modify the access list configuration to deny outbound ICMP traffic while keeping all other restrictions in place as closely as possible. How should you modify the access lists to accomplish your goal with the least amount of effort?
Create an access list 102 that denies ICMP traffic and traffic from network 12.1.6.0/24. Apply the list to Serial for outbound traffic
You have configured NAT on your router to connect your small company network to the internet. Shown below is a partial configuration for the router. Following the configuration, you find that no hosts on fa0/0 or fa0/1 can connect to the internet. What should you do so that hosts can connect to the internet?
Create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24
Map each OSPFv3 LSA type on the left with its corresponding description on the right. Each LSA type may be used once, more than once, or not at all.
Created for each ABR in the area Type 1 Provides summary information for each area Type 3 Created for each router in the area Type 1 Lists the routers that are joined together by the segment Type 2 Created for each segment on which a DR/BDR has been elected Type 2
Listed below are several places that a workstation checks to resolve DNS host names. A-Primary DNS server B-Secondary DNS servers C-Host files D-Local DNS cache
D,C,A,B
You are setting ups a new branch office for you r company. You will like to implement solutions to provide the following services. Hosts should be able to contact other hosts using names such as server1.westsim.com. IP address assignment should be centrally managed Which services should you implement on your network to meet the requirements? select two
DNS DHCP
Shown here is a diagram of the back of a sample router. IF Port E is a serial port, what type of cable and connector would you use to connect the router to an another router if this router provides the clocking signal?
DB-60 serial DCE cable
You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?
DHCP
You have a DHCP server on your network. Which of the following is the correct order of DHCP messages exchanged between a client and server when the client obtains an IP address?
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
You have entered the following command to enable automatic trunking discovery and configuration. switch(config-if)#switchport mode dynamic auto What is the name of the protocol the switch will use to configure trunking?
DTP
Which of the following statements about the functionality of LCP are true? select three
Data can be compressed at eh source and decompressed at the destination Usernames and passwords may be required during the handshake LCP provides multilink support
At which layer of the OSI model do network switches operate?
Data link
The following terms describe the functions performed at various OSI model layers. 1.Logical topology 2. logical device ID 3. Flow control 4. Convert data to 0s and 1s Which of the following correctly identifies the layers that perform each of the functions listed here?
Data link, Network, Transport, Physical
You have a small network as shown in the exhibit. You have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the internet to connect to sites like www,cisco.com. What other parameters are required on the workstation? select two
Default gateway DNS server address
Match each LSA type on the left with the appropriate description on the right
Describes a network that has a DR and BDR Type 2 Describes a subnet in other area Type 3 Describes routers Type 1
Cloud resources are implemented in several ways. Match the cloud implementation listed on the left with the appropriate description on the right.
Designed to be shared by several organizations Community cloud Gmail and Google Docs, for example Public cloud Provides resources to a single organization Private cloud Can be accessed by anyone Public cloud Can be accessed only by users within the single organization Private cloud
You have several hosts, a switch and a router as shown in the exhibit. Workstation 3sends an IP packet to workstation1. The packet is received baby the Cisco 2600 router as shown in the diagram. When the packet leaves the router, which source and destination IP addresses will be contained in the IP packet? select two
Destination IP address=192.168.10.11 Source IP addresses= 192.168.11.11
What is the purpose of the CRC in network communications?
Detect data errors
Drag each network plane on the left wot the appropriate troubleshooting task on the right. Each plane may be used once, more than once, or not at all.
Determine how traffic moves from one place to another Control Plane Determine whether the VLANs have been configured on each switch Data Plane Examine the forwarding logic on each device Data Plane Use SNMP to monitor network switches Management Plane Isolate Filtering and port security problems Data Plane
Which of the following statements describe how VLANs affect broadcast traffic within and internetwork? select two
Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted only within a VLAN
You have partially configured a router as a PPPoE client. The show running-config command produces the following output. Which of the following commands must be added to complete the dialer configuration?
Dialer pool 1
How are distance vector routing protocols different from link-state routing protocols?select three
Distance vector routing algorithms do not calculate the exact topology of a network Distance vector routing protocols are easier to implement than link-state routing protocols Link-state routing protocols are faster to converge that distance vector routing protocols
You have a small network as shown in the exhibit. You have configured RIP on both RouterA and RouterB. the show ip route command on RouterA shows the following information. RouterA receives a packet addresses to 172.16.0.1. What will routerA do with he packet.
Drop the packet.
You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?
Drop the packet.
Which of the following are characteristics of ISATAP for IPv6 tunneling? select two
Dual stack routers Dual stack host
Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. A cable has been plugged into the port and is conencted to a device. The port should be using full-duplex communications at 100 Mbps. You press the MODE button to select Stat, Duplex, and Speed. the results are shown below. -Stat= Solid Green -Duplex=off -SPeed= Solid green Which command(s) should you use for the interface to configure the appropriate settings?
Duplex full
A 5-port hub is attached to interface fa0/1 on your switch. Users of the workstation attached to the hub are complaining that their pings are erratic. When you run the show interface fa0/1 command you receive the following output. fastethernet0/1 is up, line protocol is up (connected) hardware is fast ethernet, address is 0019.e744.7401 (bia 0019.e774.7401) what is the problem?
Duplex mismatch
You are the network administrator for a medium-sized company the owns a Class C IP address block. You do not have enough registered IP address for the 1000 hosts in your network; however, you've determined that no more then 20% of your hosts use the internet. And the bandwidth you've budgeted cannot support more then this number anyway. So you decide to implement NAT and allocate 200 of your registered IP address to support external translations. Which method of NAT translations should you implement?
Dynamic
You have just enabled port security on a switch port. What are the default settings? select three
Dynamically-learned allowed addresses Maximum of 1 device Shutdown violation mode
Shown here is a diagram of the back of a sample router. Which port would you use if you wanted to connect the router to a CSU/DSU using a serial connections?
E
Match the routing protocol characteristic on the left with the routing protocol on the right
EIGRP Characteristics Supports autosummarization Unequal-cost load balancing DUAL OSPF Characteristics Open standard DR and BDR Dijkstra SPF
Match the default administrative distance with the route type. Each routing method may be used once, more then once, or not at all.
EIGRP internal routes 90 EIGRP external routes 170 OSPF 110 RIP 120 Static routes 1
A Cisco router boots but cannot locate a valid IOS image in flash memory or on the TFTP server. Assuming the default configuration, what will the router do next?
Enter ROM monitor mode
You are reviewing the configuration of a router that uses IGRP for its routing protocol. Shown below is the output from the show ip protocols command. Based on the output, what is true of this configuration?
EIGRP will load balance on up to 5 unequal-cost routes
You are reviewing the output of the show interfaces command for the gi0/1 interface on a switch. You notice a significant number of CRC error displayed. What are the most likely causes? Select two
EMI, or cross-talk, on the UT cabling is damaging frames in transit to this interface Collisions are causing frame contents to arrive at this interface in a corrupted state
IPsec is implemented through two separate protocols. What are these protocols called? select two
ESP AH
Ho do link-state routing protocols determine the topology of the network?
Each router initially exchanges LSP messages which are used to build a topological database
Router_1 is connected to three networks, 192.168.0.0, 172.16.16.0, and 172.16.32.0. AN administrator enables the RIP routing protocol on Router_1. However, the router isn't forwarding packets to network 172.16.16.0. The administrator examine the configurations on Router_1 using the sh run command. The results are displayed are seen in the exhibit. What should the administrator do to correct the problem?
Enable serial0 interface.
Match each OSPFv3 command on the left with its corresponding description on the right. Each command may be used once, more then once, or not at all
Enables OSPF for IPv6 router configuration ipv6 router ospf [process id] Generates a default external route into an OSPF routing domain default-information originate Displays the current contents of the IPv6 routing table show ipv6 route Enables OSPFv3 for IPv6 on an interface ipv6 ospf [process id] area [number] Displays OSPFv3 adjacency events debug ipv6 ompf adj
IN addition to AH, IPsec is composed of which other service?
Encapsulating Security Payload (ESP)
Which IPsec subprotocol provides data encryption?
Encapsulating Security Payload (ESP)
YOu are configuring a router that has a previous configuration. You need to turn CDP on for the entire router, but turn it off for the serial 0/0/1 interface. Match the correct commands on the left with the configuration task on the right.
Enter global configuration mode router#config t Turn CDP on for the router router(config)#cdp run Enter interface configuration mode router(config)#int s0/0/1 Turn CDP off for the interface router(config-if)# no cdp enable
You have a PC that you connect to the ethernet network, and that you use to create a console connection to the router through a Telnet sessional You want to require a password before the Telnet session is allowed. Match the commands on the left with the requirement steps on the right.
Enter global configuration mode. router#config t Enter configuration mode for Telnet sessions router(config)#line vty 0 4 Set the password router(config-line)#password cisco Require the password for login router(config-line)#login
The fastethernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode= conf t Enter interface configuration= ing fa0/0 Enable the interface= no shutdown Verify the interface is disabled= show interface status
You need to disable the fastehternet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode= conf t Enter interface configuration= ing fa0/0 Disable the interface= shutdown Verify the interface is disabled= show ip interface brief
You need to configure the fastethernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode= conf t Enter interface configuration= ing fa0/1 Set speed of the interface= speed auto Set duplex setting for the interface= duplex auto
A Cisco router boots but cannot locate the startup-config file. Assuming the default configuration, what will the router do next?
Enter setup mode
You want to establish a console session to a new router using a Telnet session. Which of the following components will you need? select two
Ethernet Port IP adress Ethernet cable
Which of the following describe the attributes that extended ACLs can use to filter network traffic?
Extended ACLs can filter network traffic based on destination hostname or host IP address Extended ACLs can filter network traffic based on source protocol (I, TCP UDP, ect)
Which of the following is a good general rule regarding the placement of extended ACLs?
Extended ACLs hold be placed as close as possible to the source router
Which of the following IPv6 addresses is used by a host to contact a DHCP server?
FF02::1:2
you have a small network with four switches as shown in the diagram. which of the following are true. select two
Fa0/3 on switch B is an access port Fa0/2 on switch B is a trunk port
You are designing a routing solution for your organization. You want to improve routing efficiency by ensuring that routers save frequently used data link headers to encapsulate packets. Which type of routing logic could you implement? select two
Fast switching Cisco express forwarding
Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a product authorization key (PAK).
Feature: ipbasek9 Feature: securityk9
You manage a small network with two buildings, 1,000 meters apart. You want to connect the two buildings together with a switch, You are concerned about electromagnetic interference on the cable connecting the two buildings. What should you include in your plan? select two
Fiber optic cables with LC connectors 1000BaseLX ethernet
You can configure two types of IPv6 access control list (ACLs) Router ACL, Port ACL Match the IPv6 ACL types on the left with the appropriate descriptions of their usage on the right.
Filters inbound and outbound traffic Router ACL Applies only to packets that are routed Router ACL Filters traffic on layer 2 interfaces Port ACL Apples to all packets Port ACL Filters traffic on layer 3 interfaces Router ACL Filters inbox traffic Port ACL
You have two Cisco 2960switches with 12 fastethernet ports and 2 gigabitehternet prots on each switch. You connect fa0/1 on switchA to fa0/1 on switchB with a crossover cable. A partial configuration for both switches is shown below. You notice that VLAN traffic for VLAN 2 is not being carried from switchA to switchB. what should you do?
For fa0/1 on switchA, set swithport mode to dynamic desirable
You have a medium-sized business network with twelve subnets (192.168.1.0/24-192.168.12.0/24). You use OSPF for your routing protocol. One ethernet subnet has five routers, all in the same OSPF area as shown in the exhibit. You want to ensure that routerC becomes the designated router on the subnet. Assuming that no additional configuration parameters have been configured other than what is shown, how could you accomplish this? select three
For fa0/1, set the OSPF priority to 2 For the OSPF process, set the router-id to 200.1.1.1 Change the IP address assigned to fa0/1 to 192.168.12.254
You want to prevent users from accessing a router through a Telnet session. What should you do?
For the VTY lines, add the login parameter and remove any passwords.
You have a switch connected to a small network as shown in the Exhibit. A hub connects Wrk1 and Wrk5 to the switch. The switch has the following information in its CAM table: Wrk 1 sends a frame addressed to Wrk5. What will the switch do with the frame? select two
Forward the frame out all ports except Fa0/1. It will not record the location of any device.
You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set 172.16.0.0/28 is subsetted, 4 subnets C 172.16.0.0 is directly connected, fastethernet0/0 C 172.16.0.32 is directly connected, fastethernet0/1 R 172.16.0.96[120/1] via 172.16.0.1, 00:00:25, fi0/0 R 172.16.0.128 [120/1] via 172.16.0.33, 00:00:25, fi0/1 The router receives a packet addressed to 172.16.0.19 and one addressed 172.16.0.109. What will the router do with each packet? select two
Forward the packet addressed to 172.16.0.109 to router 172.16.0.1 Drop the packet addressed to 172.16.0.19
You use the show ip route command on your router and see the information shown below. Gateway of last resort is 172.16.11.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R 10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 S* 0.0.0.0/0 [1/0] via 172.16.11.12 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?
Forward the packet out Serial0/1/0
You use the show ip route command on your router and see the information shown below. Gateway of last resort is 172.16.11.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R* 10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?
Forward the packet out Serial0/1/0
Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds up to 1.544 Mbps or greater?
Frame relay
Which of the following are true of store-and-forward switches? select three
Frames are checked for errors before being forwarded Frames with errors are dropped Latency is greater than with cut-through switches
You are configuring a new 2960 switch. You issue the following commands. Switch(config)#interface fast 0/15 switch(config-if)#swtichport modes access switch(config-if)#switchport port-security switch(config-if)#switchport port-security maximum 1 switch(config-if)#switchport port-securitymac-address sticky switch(config-if)#switchport port-security violation protect you connect a hub with two workstation to port fa0/15. You power on first device1 and then device2. what will be the result?
Frames from device1 will be allowed; frames from device2 will be dropped
For security reasons, you want to prevent the Toronto router from sharing any information about itself with neighboring devices. What should you do?
From global configuration mode on Toronto, type no cdp run
Which can be stored in NVRAM on a Cisco device? select two
Full IOS image startup-config file
Consider the following IPv6 address FD01:0001:0001:005::7/64 Drag the component part of this address on the left to the corresponding description on the right. Not all descriptions on the right have corresponding components on the left.
Global Routing Prefix Blank Subnet ID FD01:0001:0001:005 Interface ID ::7 Prefix length /64 Global ID 01:0001:0001 Unique Local Unicast Prefix FD
You need to design an IPv6 addressing scheme for your network. The following are key requirements for your design. *infrastructure hosts, such as routers and servers, will be assigned static interface IDs while workstations, netbooks, tablets, and phones will be assigned interface IDs dynamically. *Internet access must be available to all hosts through an ISP *Site-to-Site WAN connections will be created using leased lines. Which type of IPv6 addressing is most appropriate for hosts in this network?
Global Unicast Addressing
Match the TCP/IP protocols with their functions by dragging the protocol name on the left and dropping it next to the description on the right
Group 1 Used to get IP address of the host from a know MAC address. RARP/BOOTP Group 2 Used to transfer files. FTP/TFTP Group 3 Used to identify routes through an internetwork. RIP/OSPF
Which of the default layer 2 encapsulation method for serial interfaces on a Cisco router?
HDLC
Drag each layer of the TCP/IP model on the left to the networking component associated with it on the right. Each layer of the TCP/IP model my be used once, more then once, or not at all
Host IP addresses/internet layer Sequencing information/transport layer MAC addresses/Link layer Acknowledgements/ transport layer Network addresses/ internet layer
You have a small network with a single subnet connected to the internet as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstations should use RouterA as the default gateway, and DNS1 as the DNS server address. From the down-down list, select the appropriate parameters to configure the workstations TCP/IP settings.
IP Address 192.168.12.46 Subnet Mask 255.255.255.240 Default Gateway 192.168.12.34 DNS Server 198.162.1.22
You have a small business network with a single subnet connected to the internet rhtpugh a Cisco router (RouterA). IP addresses have been assigned as shown in the exhibit. A browser session on the workstation tries to connect to the www.westsim.com web server using 16.177.85.116 and port 80. What IP address and port number will the Web server use as the destination address when responding to the workstation request?
IP address 199.67.111.89 and a dynamic port assigned by RouterA
Which of the following statements are true about IPv6 ACLs? select two
IPv6 ACLs are similar to IPv4 extended named ACLs in functionality IPv6 ACLs do not use wildcard masks
Your organization has been assigned a registered global routing prefix of 2001:FEED:BEEF::/48 by an ISP. Using your organizations IPv6 addressing scheme, you've used the next 16 bits beyond the global routing prefix to define the following subnets: *2001:FEED:BEEF:0001::/64 *2001:FEED:BEEF:0002::/64 *2001:FEED:BEEF:0003::/64 *2001:FEED:BEEF:0004::/64 Which interface configuration command would you use to do this?
IPv6 address 2001:FEED:BEEF:0003::1/64
Your organization has decided to implement unique local unicast IPv6 addressing. A global ID of FD01:A001:0001::/48 been selected for the organizations IPv6 addressing scheme. The next 16 bits beyond the global ID have been used to define the following subnets: FD01:A001:0001:0001::/64 FD01:A001:0001:0002::/64 FD01:A001:0001:0003::/64 FD01:A001:0001:0004::/64 Which interface configuration command would you use to do this?
IPv6 address FD01:A001:0001:0003::/64 eui-64
Your company wants to begin the transition from IPv4 to IPv6. You want to stage the implementation on a host-by-host basis. You will enable IPv6 on existing hosts as time and budget allows. During the transition, all hosts in your site need to communicate with all other hosts. IPv6 should be used between hosts when both hosts support IPv. NAT support is not required. Which method should you use?
ISATAP
Which WAN connection type use digital communications over public telephone lines? select two
ISDN DSL
Which of the following WAN technologies is a dial-up only service?
ISDN BRI
You have a small network as shown in the exhibit. With the portion configuration shown below, which of the following stamens are true? select two
If HostA and HostB are the only hosts on the subnet to receive their IP address, HostC will receive 172.18.2.102 as an IP address if requested. HostD will have 172.18.1.132 as a DNS server configured through DHCP
Which of the following is true of CSMA/CD? select two
If collisions are detected, an interrupt jam signal is broadcasted to stop all transmissions. A device with data to send first listens to the transmission medium to determine if it is free
You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two
If router A fails and then recovers, it will serve as the standby router Router A will serve as active router, and Router B will serve as standby router
Which of the following is true when tracking an interface configured within a HSRP group? select two
If the interface goes down, the priority of the HSRP group is reduced to allow the HSRP standby router to become the active router The HSRP group priority of the active router is decreased by 10 by default
A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The ethernet interface in the workstation has been manually configured to use a 100Mbps link speed and full duplexing. Which of the following are true in this scenario? select three
If the link speed is 1000 Mbps or faster, full-duplex is used If the link speed is 10 Mbps, half-duplex is used The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected.
Which of the following is true concerning the native VLAN and VLAN trunking? select three
If the native VLAN on one end of the trunk is different that the native VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk Frames are placed on the native VLAN when they enter an 802.1Q trunking interface but do not have an 802.1Q header With 802.1Q trunking, frames from the native VLAN are not tagged
What role does ARP play in the routing process?
If the router does not know a destination devices MAC address, it sends an ARP broadcast containing the IP address and requesting the MAC address
Your router generates a log message with a severity level of 1. What does this indicate?
Immediate action needed
Which of the following is not a benefit of NAT
Improving the throughput rate of traffic
You want to enter a password before being able to access the router through a Telnet session. You use the following commands. router#config t router(config)#line vty 0 4 router(config-line)#password cisco router(config-line)#exit router(config)#exit You ope a Telnet session with the router and discover that the session starting without being promoted for a password. What should you do.
In line configuration mode, add the login parameter.
Which statements accurately describe port states of both bridges and switches? select two
In the learning stat, the MAC address table can be populated bur frames are not forwarded Ports in the blocked state still receive BPDUs
Which of the following statements about ACLs are true? select two
Inbound ACLs are applied before the routing process An ACL without a permit traffic will not allow any traffic.
You have used a set of bridges and routers to segment your LAN into smaller networks. What result will you get? select two
Increased number of collision domains Decreased congestion on each segment
Which of the following are results of using a router to segment a network? select two
Increased number of collision domains Fewer devices per broadcast domain
Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs?
Increased security Increased number of broadcast domains
Which of the following are problems typically associated with the link-state routing method? select two
Increased use of router hardware resources High traffic to build routing tables
Quality of Service (QoS) prioritizes traffic from different data streams by using two classification systems. Match the name of the QoS classification system on the left with the appropriate description on the right. (each classification system may be used once, more then once, or not at all)
Individual frames are marked and classified at layer 2 Class of Service (COS) Classification occurs at layer 3 Differential Service Code Point (DSCP) Precedence values are interested in the DiffServ field of an IP packet Differential Service Code Point (DSCP) A priority value between 0 and 7 is assigned to a 3-bit field Class of Service (COS) Up to 64 different classifications are possible Differential Service Code Point (DSCP)
Review the image to answer the following questions. You would like to manually configure the trunk status on each port for switchA so that the appropriate type is selected and so that a trunking protocol is not used. Match the command on theft with the correct port on switch A. (commands on the left can be used once, more then once, or not at all)
Interface fa0/1 switch port mode access Interface fa0/2 switch port mode access Interface fa0/3 switch port mode trunk Interface fa0/4 switch port mode access
Which of the following symptoms indicate a layer 1 problem with serial0/1/1 interface?
Interface status shows serial0/1/1 is down, line protocol is down
Which of the following systems indicate a layer 2 problem with the serial0/1/1 interface?
Interface status shows serial0/1/1 is up, line protocol down
What are the main types of cloud services? select two
Internet cloud services External cloud services
You have a Cisco router connected to a local ISP. The ISP dictates that the router use DHCP to receive its IP address and other configuration information. Which command should you use?
Ip address dhcp
You have a network with two routers as shown in the exhibit. You would like to configure a single static route on RouterA that summarizes the routes accessible through RouterB. Which static route would you configure?
Ip route 172.17.1.64 255.255.255.192 serial 0/1/0
You issue the show version command at the CLI of the router. From where does the router boot?
ROM
A switch running STA is in the listening state. A message arrives at the switch destined for a different network segment. Which of the following best describes what the switch will do?
It does not record address or segment information. It does not forward the message
Which of the following is true of the system ROM on a Cisco device?
It holds a limited version of the IOS software to be used if the full IOS image can't be found.
When referring to cloud computing, what does the term cloud mean?
It is a metaphor for the internet, based on the basic cloud drawing used to represent the telephone network
What is the back off on the ethernet network?
It is the random amount of time a device waits before retransmitting after a collision
Which of the following describes the purpose of the exterior Border Gateway Protocol (eBGP) ?
It is used when organizations need to share routing information across organizations and to advertises their block of public IP addresses to the world through their ISP
Which of the following are characteristics of ISDN? select three
It lets you transmit voice, video, and data over the same line It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It is a dial-up service that uses existing copper wire for the local loop
Which processes are used by Cisco express forwarding (CEF) to optimize packet processing through a router? select two
It organizes routing data in the forwarding information bas (FIB) It maintains adjacency tables
A switch is running the STA is sin the learning starts. A message arrives at the switch destined for a different network segment. Which of the following best describes what the switch will do?
It places the source address and segment in its database, but does not forward the message
What protocol does the Spanning Tree protocol prevent?
It prevents message loops from developing when a switch or bridge is connected to the same location more then once
You are deploying a new 10GB Ethernet network using Cat6 cabling. which of the following are true connecting this media? select two
It supports 10 Mpbs Ethernet connections It includes a solid plastic core
Which two of the following statements accurately describe full-duplex ethernet?
It uses direct point to point connections between the sender and receiver It is collision free
You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. Which of the following addresses could Srv2 receive when it boots?
It will not be assigned an IP address
You have a switch connected to a small network as shown in the Exhibit. A hub connects Wrk1 and Wrk5 to the switch. The switch has the following information in its CAM table: Wrk 1 sends a frame addressed to Wrk5. What will the switch do with the frame? select two
It will not record the location of any device. Drop the frame
Which of the following measures can you implement to help secure access to a router through the con 0 line? select two
Keep the router in a locked room Set a password and use the login command
Review the IPv6 addressing scheme used in the network shown in the figure below. The goals of this network design include the following.... click on the LAN subnets and/or WAN subnets in this design that have not been addressed corectly
LAN FD01:0001:0001:001::/64 LAN FD01:0001:0001:005::/64
What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?
LCP. authentication, NCP
Which of the following protocols enables Cisco devices to discover non-Cisco devices?
LLDP
Queue schedulers are used for congestion management and define how a device will work through its queue. Match the names of the most commonly used queue schedules on the left with the appropriate description on the right. each name can only be used once
Labels one queue as priority. Rotates the queue and sends out multiple packets from the priority queue. Weighted Round Robin Rotates through each queue and processes and sends the next available packet Round Robin Assigned each queue a minimum bandwidth percentage Class-Based Weighted Fair Queuing
Workstation3 has started communications with workstation2. it sends a frame to the default gateway. Identify the layer 2 and layer 3 addresses used by the Cisco 2600 router to forward the data to workstation2 by dragging the corresponding address from the list on the left to its location on the right
Layer 2 source address 000b5f2a2222 Layer 3 source address 192.168.11.11 Layer 2 destination address 080046987654 Layer 3 destination address 192.168.10.12
Workstation 2 needs to send data to workstation3. Identify the layer 2 and layer 3 address used by workstation2 to send the data by dragging the corresponding address from the list on the left to its location on the right
Layer 2 source address 080046987654 Layer 3 source address 192.168.10.12 Layer 2 destination address 000b5f2a2222 Layer 3 destination address 192.168.11.11
When attempting to make a Telnet connection to a remote router, the connection fall. You check the interface status on your local router and find the following. You ping the remote router but that fails as well. At which layer of the OSI model does the problem originate?
Layer 3
Which of the following are functions of the MAC sublayer in the OSI model? select two
Letting devices on the network have access to the lan Defining a unique hardware address for each device on the network
Which of the following are true about the link-state routing method? select three
Link state routing send updates immediately Network traffic due to sharing routing information is less than with the distance vector method Convergente is faster than with the distance vector method
Match the IPv6 prefix on the left with its description on the right.
Link-Local FE80::/10 Multicast FF00::/8 Unique Local FC00::/7
Which IPv6 address type is only valid within a subnet?
Link-local
Which of the following describes the role of Distribution switches and how they are implemented in the design of a local area network on a university or corporate campus? select three
Linked to each other via high-speed connections Constitute the second tier in a two-tier network design Connected to high-speed core switches
Switches running the STA are in the process of exchanging BPDUs and defining heir roles. In what state are the switches in?
Listening
Which of following is true concerning GLBP? select two
Load balancing is achieved by the AVG replying to the hosts ARP requests with different virtual MAC addresses A GLBP group can have up to four member routers acting as IP default gateways
Which four of the following are the responsibility of the WAN service provider?
Local loop CO DCE PSE
Which items are held in a routers ram?
Log file entries Routing table entries The current router configuration file
You are configuring a router to redirect and consolidate log messages to a syslog server. The router has multiple interfaces. However, you want all log messages being sent to the syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router fro. Which command is used to accomplish this?
Logging source-interface <interface>
Which of the following are benefits of EIGRP? select two
Low use of network resources Supports multiple protocols
You have implemented VLAN trunking on your network. You have two switches that are both configured to use dynamic auto mode. You discover that they are not trunking. Which of the following trunking configuration options can be used to make these two switches trunk successfully? select two
Manually configure trunking on at least one of the switches. Configure at least one of the switches to use dynamic desirable mode
You have decided to use ACLs on your router to restrict TFTP traffic between networks. Which of the following options can be used to fix this issue? select two
Modify the first line to access-list 100 permit ups host 172.17.8.1 host 10.0.0.1 eq 69 Modify the first ACL line to access-list 100 permit ups 172.17.8.1 0.0.0.0 host 10.0.0.1 eq 69
Which of the following are benefits of LCP? select three
Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links Negotiates the use (or lack) of authentication before starting the session
Match each routing method on the left with its associated characteristics on the right. Each routing method may be used once, more then once, or not at all.
Most appropriate on small networks Static routing Propagates changes in the network topology Dynamic routing Provides complete control over routes Static routing Most appropriate on networks that don't change frequently Static routing Keeps routing tale on each router up to date Dynamic routing
You are currently using OSPF on you r network. Which of the following would you gain by switching to EIGRP? select three
Multiprotocol support Faster recovery from primary link failure Autosummarization
Which of the following benefits are offered to an organization using network addresses translation (NAT)?
NAT provides a measure of network security
Your company has just started contracting with the government. As part of the contract, you have to configure a special server for funning custom application. Contract terms dictate that this server use only IPv6. You have several hosts that need to communicate with this server. Host run only IPv4 and cannot be configured. Which solution would you use to allow the IPv4 clients to communicate with the IPv6 server?
NAT-PT
Which of the following protocols is used by PPP to enable support for multiple network-layer protocols?
NCP
Which of the following must you modify to recover a lost password on a Cisco router? select two
NVRAM Configuration register
You have entered the following command to enable dynamic trunking configuration: switch(config-if)#switchport mode dynamic desirable If the switch interface is connected to another switch, what will it attempt to do?
Negotiate a link using the desired trunking protocol
PPP support authentication, compression, and multiple network-layer protocols. Which of the following correctly sequences these functions as performed when a PPP link is established?
Negotiate compression settings, perform authentication, negotiate network-layer protocols
Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right
Network layer/Packets Data link layer/Frames Physical layer/Bits Transport layer/Segments Application layer/Data
The following names are given to data at various stages in the encapsulation process. 1. Packet 2.Bits 3. Segments 4.Frames To which layer of the OSI model do the names correspond?
Network, Physical, transport, datalink
You have issued the following command and have received the response as shown. Touter#sh start %%Non-volatile configuration memory has not been set up or has bad checksum Which of the following is a reason for this response?
No configuration file has been saved to NVRAM
Which of the following best describes OSPF?
OSPF is a classless link-state routing protocol.
Which of the following statements are true regarding authentication for IPv6 OSPF routing? select two
OSPFv3 uses IPv6 IPsec authentication support and protection OSPFv3 header authentication fields have been removed from IPv6
Two routers with the hostnames SLC and PROVO have been configured to connect using PPP and CHAP authentication through their BRI) interfaces. Attempts to establish a session between the two routers falls. You check the running configuration on both routers and find the output shown below.. What should you do to correct the problem?
On SLC, change the username password to chocolate
YOU have been using PVST+ on your Cisco switches. You'd like to start using rapid spacing tree instead. Which of the following would you do? select two
One each switch, configure the mode with the spanning-tree rapid-pvst command On each switch, use no spanning-tree portfast
Workstation2 needs to send data to workstation3. It sends out an ARP request for the address of the default gateway. Which of the following are true of this request? select two
Only the router will respond with an address of 000b5f2a2222 the switch sends the ARP request to workstation1 and the router
You are currently using EIGRP on your network, Which of the following would you gain by switching to OSPF? select two
Open standard Hierarchical netowrk design
You want to create an ACL that prevents traffic from network A that is sent to host 1. You want the ACL applied after the routing decision is made. Which of the following would be part of your design? select two
Outbound filter Extended ACL
You are designing a new network that will support 6000 computers You only have 8 registered IP addresses that can be allocated to the employees for external network communications so you decide to implement NAT and share the addresses. You want all of these computers to be able to access the internet at the same time if necessary. Which method of NAT translation should you implement?
Overloading
Which type of network divides data to be transmitted into small units and then routes these units from originating system to the destination system, allowing multiple, concurrent communications on the network medium?
Packet-switching
When implementing a Multiprotocol Label Switching (MPLS) WAN, what data unit is managed by the routers at different sites?
Packets
What is the main security weakness in using the service password-encryption command?
Passwords can be easily broken
Authentication, authorization , and accounting (AAA) are the three security components used to protect network access and communications. Which of the following describes the authorization security component?
Permits or denies access to the network resources a suer needs to perform tasks
You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not wastes IP addresses. How should you implement your plan?
Place all hosts on the same subnet. Use a mask of 255.255.254.0
Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored device?
Poll
Cloud resources serve models include infrastructure as a Service (IaaS), platform as a service (Paps), and software as a service (SaaS). Match the service models listed on the left with the appropriate description on the right.
Provider delivers everything a developer needs to build an application PaaS Providers deliver processing, storage, networks and virtualized environment services IaaS Clients deploy and run software without purchasing servers, data center space, or network equipment IaaS Provider delivers applications to the client either over the internet or on a local area network SaaS Client avoids the cost and complexity of buying and managing the underlying hardware and software layers PaaS
RTR1, RTR2, and RTR3 have been configured to use the OSPF protocol. RTR1 and RTR2 are neighbors; RTR3 and RTR2 are also neighbors. RTR2 fails to receive a hello packet from RTR3 within the dead interval. what happens next?
RTR2 declares RTR3 to be down
Which of the following is NOT a VPN tunnel protocol?
RADIUS
In comparing RADIUS vs. TACACS+, which of the following statements are true? select three
RADIUS is more interoperable because TACACS+ is Cisco proprietary TACACS+ is considered more reliable than RADIUS because of TCP TACACS+ is more secure than RADIUS encrypts only the password
You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your Plan? select two
RJ-45 connectors Cat5e twisted pair cable
Shown here is a diagram of the back of a sample router. If Port C is the console port, what type of cable and connector would you use to connect to the console port?
RJ-45 rollover cable
You have a Cisco router with an integrated CSU/DSU. Which of the following connector types will you most likely y use to connect the router to the WAN service?
RJ-48
An ompf router named RTR5 has been selected as the designated router (DR). which of the following are true for RTR5? select two
RTR5 has the highest OSPF priority All non-designated routers in the internetwork exchange link-state data with RTR5, but not with each other
You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What is the spanning tree mode for VLAN 1?
Rapid PVST+
Which of the following are benefits of EIGRP? select two
Rapid convergence Supports manual route summarization
You have a new switch that you have just connected to the network as shown in the exhibit. After connecting the switch to the network: Host A sends a frame addressed to Host D. Host A sends a frame addressed to Host A. Host B sends a frame addressed to Host C. The switch receives a frame on Fa0/3 addressed to the MAC address of Host D. What will the switch do?
Record the MAC address of Host C, then forward the frame out all ports except Fa0/3
What are Drs and BDRs used for when using the OSPF routing protocol?
Reduce routing table updates in a broadcast type network
Which of the fowling are ways you can prevent routing loops with loops with a distance vector routing protocol? select four
Route poisoning Split horizon Static routes Hold-downs
You have several traveling sales representatives that need to connect to your company network while traveling. They will connect to the Internet at hotels and kiosks using a variety of computers, many of which will be managed by other organizations. You want to provide them with a secure solution for accessing company resources. Which should you include in your configuration? select two
Remote access VPN SSL VPN in clientless mode
You are troubleshooting the connection on a switch. The device connected to the switch on fa0/8 is powered on. Which would you do to coeected the status of fa0/8. Note: you will not be able to use the show run or show start commands in this lab.
Replace the cable
You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that has a source address that appears to be coming from the two internal networks. However, you find that no traffic is being accepted on the s0/1/0 interface. What should you do?
Rewrite the ACL statement to use the format: access-list 107 deny ip 192.168.1.0 0.0.0.255 any
You are asked to design a LAN segmentation solution for a Company AHG. They have three workgroups, Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the needs while providing the most economical and simplest administration?
Router
You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx ethernet network with an older token ring network. Most traffic will be localized with each network, with only a little traffic crossing between networks. Bothe networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation.
Router
You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two
Router A will serve as acrtive router, and Router B will serve as standby router If the permeated router fails and then recovers, it will send a coup message to return as the active router.
You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two
Router B will serve as the AVG for GLBP group 5 GLBP load balancing for group 2 will be host-dependent
You would like to clear the OSPF database, have it repopulated, and then perform the shortest path first (SPF) algorithm for IPv6 routing. Which commands would you use?
Router#clear ipv6 ospf process
You want to configure static NAT so that packets from host 192.168.2.100 will always be assigned the registered IP address 24.1.2.11 as shown in the exhibit. Match the missing lines with the required commands.
Router(config)# ip nat inside source static 192.168.2.100 24.1.2.11 Router(config)# interface ethernet 0 Router(config-if)# ip nat inside Router(config-if) interface serial 0 Router)config-if)# Ip nat outside
Which of the following commands demonstrates the first step in configuring a new multilink interface>
Router(config)#interface multilink [number]
Which commands uses the correct syntax and argument to create an IPv6 ACL?
Router(config)#ipv6 access-list DENY_FTP
Which of the following commands defines a BGP process and ASN?
Router(config)#router bgp [number]
You would like to enable an OSPFv3 routing process on a single interface and begin to use route IPv6 traffic. Which commands would you use?
Router(config-if)#ipv6 ospf <process id> area
You have configured routerA, B, and C as shown in the exhibit. Users in network 10.0.0.0 report that they have no trouble accessing resources within their worn network, but claim they cannot access a database located on subnet 192.168.0.0. Users all the other networks claim they are basing no problems accessing the database. what is the problem?
RouterA has been configured with an incorrect network address
You are running OSPF as your touring protocol. One ethernet subnet has five OSPF routers on the subnet. A partial configuration for two of the routers is shown below. Both routers are connected to the subnet through the fa0/1 interface. All interfaces are up. Assuming that either routerA or routerB will become the DR, which one will be elected the DR for the subnet?
RouterA will be the DR because of the loopback interface IP address
You are running OSPF as your routing protocol. One ethernet subnet has five OSPF routers not eh subnet. A partial configuration for two of the routers is shown below. Both routers are connected to the subnet through the fa0/1 interface. All interfaces are up. Given the configuration, which of the following statements are there for both routers on SubnetA? select three
RouterA will never become the DR or the BDR The router ID for routerB is 12.0.0.1 The router ID for RouterA is 15.1.1.1
You have established an SSH connection to your router. You use the following command and receive the error message below. Router>enable % Error in authentication Which command would correct the problem
RouterA(config)#enable secret cisco
You have a small network with IP addresses assigned to router interfaces as shown in the exhibit. You need to configure a static route on RouterA for SubnetC. Which command would you use?
RouterA(config)#ip route 10.155.64.96 255.255.255.240 fa0/1
To secure remote console sessions, you have just configured your router to require SSH with the following command: Routera(config-line)#transport input ssh When you go to connect, the system prompts you for a username and password. You recall that you did not configure this information. Which command(s) would complete the SSH configuration?
RouterA(config)#username admin password canyon
You have five routers running OSPF on a single subnet. RouterB has been elected as the DR. You remove routerB from the network for a hardware upgrade. The next day, you add the router back onto the network. What will happen when you add RouterB back onto the network?
RouterB will become the DR only if a new election occurs?
You have three hosts on a network 192.168.10.0/24 as shown in the exhibit. If interface fa0/0 on RouterB has the ip helper-address 172.12.10.20 configuration command in its running configuration, which of the following statements are true? select two
RouterB will forward broadcast packets sent to the following ports: Time, DNS, BOOTP, and TFTP The host may receive their IP address information through DHCP
You have a small network with IP addresses assigned to router interfaces as shown in the exhibit. You need to configure a static route on RouterB for SubnetA. Which command would you use? select two
RouterB(config)# ip route 192.168.111.128 255.255.255.128 172.18.12.197 RouterB(config)#ip route 192.168.111.128 255.255.255.128 fa0/0
You have an office connected to the internet as shown in the exhibit. The network has three subnets, all with client computers. The Web1 server on subnet1 host as small website used for traveling employees. Employees must be able to contact the web server from the internet. All other hosts on the private networked to have full internet connectivity for browsing the web and sending email. On which routers should you configure NAT?
RouterC
You have configured routerA, B, and C as shown in the exhibit. Users in network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. What is the problem
RouterC has been configured with the incorrect AS number
Which of the following are general advantages of using routers on your network? Select three
Routers provide multiple links between devices to support load balancing Routers provide more features, such as flow control, error detection, and congestion control, then switches or bridges Routers support multiple routing protocols for better flexibility
Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?
Routers use ARP to resolve known IP addresses into MAC addresses by broadcasting request to the network.
Which two of the following functions are performed by IP?
Routing datagrams to host Identifying hosts with the IP address
You are in the process of configuring a new router. You have configured a hostname and ip domain name for the router. you continue with the following commands. RouterA(config)#enable secret highway RouterA(config)#username admin password television RouterA(config)#crypto key generate rsa RouterA(config)#aaa new-model RouterA(config-line)#login RouterA(config-line)#line vty 0 4 RouterA(config-line)#password garage RouterA(config-line)#transport input ssh RouterA(config)# line con 0 RouterA(config-line)#passwork airplane What owl you do to establish a remote console session with the router? select two
Run SSH Use admin for a username and television for the password
Which of the following internet services provides equal upload and download bandwidth
SDSL
Which SNMP component monitors individual network devices?
SNMP agent
Which component is responsible for collecting and consolidating data from network devices that are being monitored with SNMP?
SNMP manager
Which of the following are true recurring SNMP? select two
SNMPv3 employs the encryption of packets to prevent snooping by an unauthorized source SNMPv1 and SNMPv2c can be compromised because the community string for authentication is sent in clear text
You implemented SNMPv2 as a part of your overall network management plan. You configured an SNMP manager to gather traps from SNMP agents that run on monitored network devices. To secure communications between the SNMP manager and the agent, you configure a trap community name of abc123. After funning the system for some time, you notice that traps contained questionable events are being sent to SNMP manager. Upon investigation, you discover that a malicious insider has been spoofing these events, attempting to cover her tracks as she tried to compromise several network hosts. What could have been done to prevent this from happening?
SNMPv3 should have been implemented instead of SNMPv2
Which of the following are components of a link-state routing protocol? select three
SPC algorithm Topological database LSA packets
You have several remote clients that need to connect to your company network while traveling. They will connect to the internet at hotels and airports using company-issued laptops. You would like to allow access without the use of a browser. You want to provide them with a secure solution for accessing company resources. Which should d you include in your configuration? select two
SSL VPN in full tunnel mode Remote access VPN
Which VPN solution provides access through Java plug-ins, port forwarding, and shared folder content?
SSL VPN in thin-client mode
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges?
STP prevents message loops from forming STP lets you provide redundancy by using more then one connection between devices, which makes your network more stable. STP identifies the most efficient path through a bridged network
For each operation listed on the right, drag and drop the corresponding command from the list on the left.
Save the current configuration to NVRAM copy run start Load the current configuration saved in NVRAM into memory copy start run Save the current configuration to a network server copy run tftp copy a configuration file from a network server into NVRAM copy tftp start
You have been assigned a network address of 131.189.0.0. You have submitted the network using 255.255.224.0 as the subnet mask. Which of the host address assignments in the graphic will to cause problems.
Scenario 2
You have been assigned a network address of 211.155.189.0. You have submitted the network using 255.255.255.240 as the subnet mask. Which of the host address assignments in the graphic will to cause problems.
Scenario 4
Which of the following methods helps to detect lost packets? select two
Sequencing Acknowledgement
Shown below is a digram of the back of a sample router. Match the connector type with the router port.
Serial0 Smart Serial FE 0/0 RJ-45 Console RJ-45 T1 DSU/CSU RJ-48
You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, which of the following are true? select two
Serial0 is a feasible successor route Ethernet0 and ethernet1 are successor routes
A client computer starts to download some files from an FTP server named FTPSrv1. While the first download is in progress, the user opens the second instance of the FTP program and initiates a second download. What does the server and the client use to keep each download separate?
Session ID
YOu want to verify that trunking is enable between the Catalyst 2950XL switch and the Cisco 2600 router. Which command must you enter?
Show interface fa0/1 trunk
You are consulting with a client about a WAN implementation. Because the clients facility is located in a remote location, a VSAT link would provide the fastest WAN link. Which of the following are disadvantages associated with using satellite-based WAN links? select two
Signal latency Weather interference
You want to implement an Ethernet network using the 100BaseFX standard using the minimum hardware specifications possible. You need to support a distance of up to 1,000 meters. Which of the following should you include in your plan? select two
Single-mode fiber optic cable SC connectors
Your company has just merged with a partner company. During the merger, you need to provide users in Dalles with access to the company network in Houston. You want to minimize the configuration on individual client workstations. You want to provide them with a secure solution for accessing company resources. Which should you include in your configuration?
Site-to-site VPN IPsec
You have a Cisco router with a single WIC that has two serial ports. You will connect the router to an eternal CSU/DSU. Which of the following cables and connectors will you most likely use to connect the router to the CSU/DSU?
Smart Serail DTE cable
Enterprise networks are simplifying network management by moving away from the distributed architecture model for managing network communications. What is the name of the network management model that replaces the distributed architecture model?
Software-defined networking (SDN)
You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet to workstation3. When the packet reaches workstation3, which source addresses are in the frame and packet? select two
Source MAC address=000b5f2a2223 Source IP address=192.168.10.11
One method of preventing routing lops is to not send information about a route back to the router from which the information came. What is this technique called?
Split horizon
Which of the following methods of preventing the cost-to-infinity problem with distance vector routers will send a hop count of 16 back up the path from which the information was obtained?
Split horizon with poison reverse
You are the network administrator for a small company tat implements NAT to access the internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP address to support these new servers but you dont want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers.
Static
You have a business network connected to the internet as shown in the exhibit. You have configured NAT on RouterC. Which of the following addressing schemes could you use on each subnet on the private network?
Subnet1= 192.168.1.0/24 Subnet2= 10.3.0.0/16 Subnet3= 172.16.1.0/16
You have a network with two routers as shown in the exhibit. You need to assign subnet addresses and masks to subnets 1,2, and 3. Which subnet value should you use?
Subnet1=172.16.0.16/29 Subnet2=172.16.0.0/28 Subnet3=172.16.0.28/30
You have a small network with three subnets as shown in the exhibit. IP addresses for each router interface are also indicated. How many IP addresses on each subnet remain that can be assigned to hosts?
SubnetA=125, SubnetB=0, SubnetC=13
You have a single router with three subnets as shown in the Exhibit. Each subnet has the number of host specified. You need to select a subnet mask for each subnet that provides sufficient host addresses without wasting addresses. Which mask value should you use?
SubnetA=255.255.255.192 SubnetB=255.255.255.224 SubnetC=255.255.255.128
A VPN (Virtual Private Network) is used primarily for what purpose?
Support secured communications over an untrusted network
Which of the following is a characteristic of SDSL?
Supports data traffic only (no voice)
You want to prevent collisions on your network by creating separate collision domains and define virtual LANs. Which of the following devices should you choose?
Switch
You are configuring a Catalyst 3550 switch for interVLAN routing. You are adding VLAN 11 to the switch The VLAN 1 and 2 interfaces already have a configuration on the switch, and now you need to configure the VLAN 11 interface. Which commands would you use?
Switch(config)#int vlan 11 Switch(config-if)#ip address 172.16.11.1 255.255.255.0 Switch(config-if)#no shutdown
Which command(s) would you use to configure a default-gateway on a Catalyst 2950XL switch?
Switch(config)#ip default-gateway 192.168.10.1
You are configuring two Catalyst 2960 switches with redundant connections. To reduce spanning tree convergence times, you should configure the switches to actively negotiate an ether channel using LACP channel group4. Which command would you use for each redundant link?
Switch(config-if)#channel-group 4 mode active
You are configuring two Catalyst 3550 switches with redundant connections. To increase the available traffic bandwidth between the switches, You should configure the switches to actively negotiate an eatherchannel using PAgP channel group 5. Which command would you use for each redundant link?
Switch(config-if)#channel-group 5 mode desirable
You need to configure spanning tree on A Cisco 2960 switch. You'd like to use a spanning tree protocol that uses the 802.1w standards. You'd like to take advantage of fast convergence when the trunk link goes down and fast transition to forwarding state for edge links. Which commands will be part of your configuration? select two
Switch(config-if)#spanning-tree protfast Switch(config)#spanning-tree mode rapid-pvst
You have tow IP phone daisy chains as shown in the exhibit. Which of the following commands correctly configures port security on both fastethernet 0/5-6? select two
Switch(config-if)#swithport port-security Switch(config-if)#swithport port-security maximum 3
Which of the following statements accurately describes a VLAN ID?
Switches append a VLAN ID to the header of each frame to identify the virtual network to witch it belongs
Which of the following accurately describe how switches and hubs work? select two
Switches use the hardware address in the frame to send it only to the port where the device is located A hub repeats frames to all ports, regardless of the destination address.
You are implementing internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their internet connection must provide a data are of at least 20-30 M bps. Which type of service should you implement.
T3
How does TCP handle data sequencing?
TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for acknowledgement before sending the next segment.
You have issued the following commands at the server console router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any router(config)#int eth router(config-if)#ip access-group 122 out Which of the following statements is true?
TCP packets received from host 10.6.12.45 on the serial 1 interface can be forwarded out the eth 0 interface
Your documenting the configuration of your router. When you run the show interfaces S0 command, you receive the output shown below. Given this output, which of the following statements is true?
TCP/IP and CDP are being encapsulated
You have typed the following commands at the router prompt. Router(config)#boot system tftp TFTPIOS2 192.124.16.201 Router(config)#boot system flass fallbackIOS Router(config)#boot system tftp TFTPIOS1 192.124.16.201 Router(config)#exit Router# copy run start Which of the follows correctly shows the order in which the router looks for the IOS image?
TFTP server (TFTPIOS2), flash (TFTPIOS2), TFTP server (TFTPIOS1)
You are the administrator of the network in the exhibit. You want to configure the stub network located in Tampa to forward packets to Chicago, but you do not want the overhead associated with a routing protocol. Which of the following will accomplish your goal?
Tampa(config)#ip route 0.0.0.0 0.0.0.0 182.1.48.3 Chicago(config)#ip route 182.1.48.0 255.255.240.0 182.1.48.4 Chicago(config)#ip route 192.168.112.128 255.255.255.248 182.1.48.4
You are physically seated at a host connected to the console on the seattle router as shown in the exhibit. You need to know what IP address has been configured on the E0 interface on the New York router. What are your options? select two
Telnet to New York. From privileged mode type show interface E0 Telnet to Toronto. From privileged mode top show cdp neighbors detail
Which of the following is a list of layer 2 devices?
bridges, network interface card, switch
You have a special server at work with a custom application installed. Connections to the server that use custom applications must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connections. Your laptop supports both IPv4 and IPv6. The rest of your company networks runs only IPv4. You need a cost-effective solution to allow your laptop to connect to the server. Your solution must also support communications through NAT servers. Which method should you use?
Teredo
You've just configured router_london as shown in the exhibit. The router is part of EIGRP autonomous system 200. Both directly connected networks 172.17.0.0 and 172.18.0.0 are to be advertised to neighbor routers within AS200. When testing your router, you discover the neighboring routers have no entries in their routing table for our subnets. What is the problem?
The AS has been incorrectly configured
A router serving as the AVG in a GLBP group has which of the following responsibilities? select two
The AVG is responsible for answering Address Resolution Protocol (ARP) request for the virtual IP address The AVG assigns a virtual MAC address to each router of the GLBP group
What happens after the HSRP holdtime expires on the hello message? select two
The HSRP standby router becomes the active router Additional HSRP member routers transition from the listen state
You have a small network connected to the Internet as shown in the exhibit. You need to configure the default gateway address on Wr1 so that it can communicate with hosts on the internet. Which address would you use for the default gateway address?
The IP address assigned to FA0/0 on Router 1.
You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?
The IP address assigned to Serial0/0 on LondonA is not on the same subnet as the IP address assigned to Serial0/1 on LondonB
RouterA and RouterB are connected with a serial link. A portion of the router configuration files is shown below. RouterA cannot communicate with RouterB. What is the problem
The IP address for RouterA is not on the same subnet as the IP address for RouterB
You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. Why isn't this switch the root bridge?
The VLAN number has been added to the configured bridge priority
What happens when the host sends an ARP request to the HSRP group 3s virtual IP address?
The active router will return 0000.0c07.ac03 as the mac address for the default gateway
When switches use MAC address and associated port information to determine where to forward frames, which network communication plane is being used?
The control plane
Quality of Service (QoS) is particularly important when implementing Voice over IP )VoIP), Video over IP, online gamin, or unified communications, in which delay or data loss make the overall experience unacceptable. QoS uses certain metrics to determine communication quality. Match the names of the metrics on the left with the appropriate description on the right. (Each metric name can only be used once)
The amount of time that passes from when a packet is sent to when it arrives Delay The percentage of packets that do not arrive at their destination Loss The variation in delay when sending multiple packets from the same device Jitter The capacity of a connection between two or more devices Bandwidth
Which of the following are true of OSPF configuration to enable two routers to become adjacent? select two
The are assigned to each network must match Hello and dead timer intervals must match on all routers
You have implemented a network switch. Each switch port is connected to a workstation or server host. Which of the following is NOT true regarding this implementation?
The broadcast domain is reduced to only one device
Which of the following are characteristics of a switch? select two
The collision domain on a switch is all devices connected to a single switch port A switch reads the MAC address in a frame and makes forwarding decisions bases on that address.
Packet switching, packet routing, and packet interpretation are examples of network communications, On which plane do these network communications occur?
The data plane
Software-defined networking (SDN) works by using software to configure and control the network, rather than relying on device-specific static configurations. The SDN model creates a centralized architecture that replaces distributed architecture model. How does this shift to a centralized architecture affect the three planes of network communication?
The data plane and control plan have to be separate
You have a small network as shown in the Exhibit. You are unable to pink Wrk2 from Wrk1. What is causing the problem?
The default gateway setting on Wrk2 is not on the same subnet as its IP address
You have a workstation connected to a small network with one subnet. The subnet is connected to the Internet through a local ISP. You are having trouble connecting to one of your favorite web sites. You issue a tract command and see that output shown below. C:\tracert 166.77.11.1 Tracing rout to 166.77.11.1 over maximum of 30 hops 12 ms 1ms 1ms a.abc.net [209.63.168.50] Which of the following is the most likely cause of the problem? select two
The destination network can be reached, but the hose does not respond. A router in the path does not have a route to the destination network.
Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with swtch2. To check the status of the interface, you run the following commands What is the issue with this network?
The device connected to the Fa0/1 interface has auto negotiation disabled
How are distance vector routing protocols similar to link-state routing protocols? select two
The distance vector routing protocol RIP and the link-state routing protocol OSPF are both interior gateway protocols The trustworthiness of both types of routing protocol is rated by an administrative distance
You have configured an ether channel between two switches. To verify the ehterchannel, you use the show ether channel summary command and receive the output as shown in the exhibit. Which of the following is true? select two
The ether channel is using 802.3ad standard Gigabitethernet 0/1 and 0/2 are part of channel group 1
The Houston router is connected to the Dallas router with a serial link. You have configured both routers with OSPF. You use the debug ip ompf events command and see the following output. What is the problem
The hello timer configured on the Dallas router is incorrect
You are implementing interVLAN routing using a multi-layer switch as shown in the exhibit. Which of the following is true
The host in VLAN 1 will use 192.168.1.1 as the default gateway IP address The switch can route between VLAN interfaces 1 and 2 as if the interfaces where physical links
You are implementing interVLAN routing using a router-on-a-stick configuration as shown in the exhibit. Which of the following is true? select two
The host in VLAN 2 will have 192.168.2.1 as the default gateway IP address The router will not use 802.1Q to encapsulate VLAN 1 traffic
You have configured an OSPFv3 router interface as a passive interface. Which of the following is true?
The interface advertises all subnets connected to interface
You have a workstation connected to a small network with one subnet. The subnet is connected to the Internet through a local ISP. You are having trouble connecting to one of your favorite web sites. You issue a tract command and see that output shown below. C:\tracert 166.77.11.1 Tracing rout to 166.77.11.1 over maximum of 30 hops 1*** Requested timed out Which of the following is the most likely cause of the problem? select two
The local workstation is configured with an incorrect default gateway address Your local router is down
When network administrators connect to and configure network devices, which network communications plane is being used?
The management plane
Which of the following are true regarding using multiple VLANs on a single switch? select two
The number of broadcast domains increases The number of collisions domains remains that same
You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-shutdown violation mode; shutdown What is true of this configuration?
The port has been disabled because too many MAC address have been detected
You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-up violation mode; protect What is true of this configuration? select two
The port has learned one MAC address and saved that address in the running config file The port allows up to two connected devices
You are checking the status of port Gi0/1 on your Cisco switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. the results are shown below. Stat=Flashing green Duplex=Solid green Speed= Flashing green Which of the following are true. select two
The port is operating in full duplex mode The port speed is 1000 Mbps
You are checking the status of port fa0/12 on your Cisco 2960 switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which of the following is true?
The port is shut down or the cable is bad.
You have a small network, as shown in the image. The user on workstation A reports that she cannot communicate with remote workstation D. You begin to troubleshoot the problem by sending a ping from workstation A to the remote workstation D, but it doesn't not reply. Next you try sending a ping from workstation A to the remote workstation C, and it replies successfully. Which of the following can you assume based on these results.
The problem is with the configuration or connectivity of remote workstation D.
You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What can you tell from this command output? select two
The root port on switch A is Gi0/2 The MAC address for switch A is 000e.8411.68c0
You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, which of the following is true for the router to network 172.16.81.0/24?
The route through enternet1 is the successor route.
You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, What will happen when both successor routes to network 172.16.90.0/24 are lost?
The route through serial0 will automatically be used
How does a router use frames to route data through a network.
The router checks the MAC address in the frame, replaces the MAC address of the source with its own MAC address, and sends it to the proper host.
You are the senior network administrator for a large company. A junior administrator from on of your field offices sent you a router that he thinks is faulty. He says the router always uses default settings and boots to setup mode even through he has verified that startup-config contains the correct values. What is the most likely source of the problem?
The router configuration register is set to bypass startup configuration
You have configured an 1841 Cisco router for inter-vlan communications. You enter the show run command and receive the output as shown in the exhibit. Which of the following is true? select three
The router is configured to use 802.1Q encapsulation for inter-vlan routing The switch connected to the routers fastethernet 0/0 interface is not encapsulating vlan 2 traffic The router is using two fa0/0 sub interfaces for VLANS 2-3
You have a small network connected to the internet as shown in the exhibit. Which of the following statements is true? select two
The router must be configured for NAT for Srv1 to communicate to the internet Internet hosts can reach Srv2 with the need for NAT being configured
Which of the following best describes how a router operates to transmit messages to different LAN segments
The router reads the LAN segment address contained in the message and consults the appropriate routing table for the protocol, then forwards the message to the appropriate LAN segment.
You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, What will happen when both successor routes to network 172.16.90.0/24 are lost?
The router will recalculate the route to network 172.16.90.0/24
How does the HSRP group priority value affect the routers role within the group? select two
The router with the second highest priority becomes the standby router The router with the highest priority becomes the active router
Which of the following is contained in a OSPF hello packet? select two
The routers RID A list of the routers neighbors
You are reviewing the configuration of a router that uses EIGRP for its routing protocol . Shown below is the output from the show ip protocols command. Based on the output, what is true of this configuration? select two
The routing process has 2 neighbors EIGRP is sharing information about 3 neighbors
Last night, a administrator connected a new router to his network and enabled the RIP routing protocol. This morning when the administrator returned, he discovered the router wasnt forwarding packets to networks connected to the serial1 interface. He examines the routing table using the command show ip route. The results desplayed are seen in the exhibit. What could be the cause of the problem?
The serial1 interface is administratively shut down
You have used the following commands to configure your router: Router(config)#banner exec *have a nice day!* Router(config)#banner login *The grass grows green* Router(config)#banner motd *The sky is blue* When you connect to the router using a Telnet session, how will these banners display
The sky is blue The grass grows green Have a nice day!
RouterA, RouterB, and RouterC have been configured with IP addresses set as shown in the exhibit. All networks are using the default subnet mask. Users in the network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. From network 10.1..1.0, you can successfully ping interface 172.16.32.2, but you cannot ping 172.16.32.1. Another administrator on 192.168.2.0 claims she can ping 192.168.2.1. but not 172.16.32.1. What is the most likely problem?
The so1/1 interface on RouterC is administratively down
Which of the following accurately describe cut-through switching?
The switch copies only the destination address of the frame into its buffer. The switch reduces latency by forwarding the frame almost immediately.
You are the only administrator for your company. You are planning for an upcoming vacation and need to ensure that you can administer your switches remotely while you are gone. What must you configure to allow remote administration? select two
The switch must be configured with a valid IP address and default gateway The remote workstation must have access to the management VLAN of the switch
Device B sends a frame to Device A on the network shown in the Exhibit. The switch has an entry in its CAM table for Device A in its database, but not for Device B. Which of the following best describes what the switch does with the message?
The switch records the address and port from Device B in its database. It sends the frame out port Fa0/1.
You have just started a Cisco 2960 switch. You notice that the system light is a solid amber color. What does this indicate?
The system has power but is not functioning properly
RouterA and RouterB are connected with a serial link. RouterA is the DCE device. A portion of the show interface command on each router interface is shown below. RouterA cannot communicate with RouterB what is the problem?
There is an encapsulation mismatch between the routers
Which of the follwing are true of port security sticky addresses? select two
They can be learned automatically or manually configured they are placed in the running-config-file, and can be saved to the startup-config file
You want two routers to share routing information with each other using the OSPF routing protocol. Which of the following must happen for these two routers to become neighbors over their serial interfaces? select two
They must have a shared data link They must be configured with matching areas
Which two of the following statements about routers are true?
They use logical network and device addresses to route data between networks. They examine the destination device address contained in packets to make routing decisions.
You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 switch port command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two
Traffic from VLAN 5 will not be forwarded from switch A Both switches in the trunk configuration negotiated 802.1Q as the encapsulation method
You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 trunk command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two
Traffic from VLAN 5 will not be forwarded from switch A Traffic on the native VLAN will not be transmitted correctly
You have a Catalyst 2950 swath with three defined VLANs 1,3, and 5. You connect the with to another with using the fa0/1 interface, and use the swtihport mode trunk command for fa0/1. Assuming that the other swath has the default configuration, what will now pass through fa0/1 on the switch?
Traffic from all VLANs defined on the switch
You are configuring inter-VLAN routing on a Catalyst 3550 switch. You enter the show run command and receive the output as shown in the exhibit. Which of the following is true? select two
Traffic sent from VLAN 2 to VLAN 3 will not reach VLAN 3 Interface VLAN 2 is enabled with the no shutdown interface configuration command
Which method is used when an SNMP agent detects that the system it is monitoring has exceeded a configured threshold and sends an event to the SNMP manager?
Trap
Drag the information on the left to the appropriate layer of the TCP/IP model that it is associated with on the right
Trasport layer/segments link layer/frames application layer/data internet layer/packets
Which of the following describe the channels and data transfer rates used for ISDN BRI? select two
Two B channels operating at 64 Kbps each One D channel operating at 16Kbps
You have two Cisco 2960 switches, each with 24 FastEthernet ports and two SFP Gigabit uplink ports. You want to connect the two switches together at a distance of 300 meters. How should you connect the two switches? select two
Use fiber optic cables with LC connectors Use ports Gi0/1 or Gi0/2
Which of the following statements are true regarding OSPFv3 LSAs? select three
Type 9 is an intra-area prefix to describe the network Type 8 is a link LSA from link-locals Type 3 is an intra-area prefix LSA from ABRs
Which two of the following list accurately describes TCP and UDP?
UDP: connectionless, unreliable, unsequesnced, low overhead TCP: connection-oriented, reliable, sequences, high overhead
Which of the following are characteristics of VDSL? select two
Unequal download and upload speeds Supports both data and voice at the same time
You have a network with two routers as shown in the exhibit. RouterA currently has a single static route to network 10.0.155.80/28. You need to add another subnet to routerB. This subnet should also use 28-bit mask. You would like to replace the existing static route to network 10.0.155.80/28 with a single summarized static route that includes the old network and the new network. You want to minimize wasted addresses. What should you do? select tow
Use 10.0.155.64/28 for the new subnet Configure the static route to use a network of 10.0.155.64 and a mask of 255.255.255.224
You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that is sent to the host with address 192.168.1.155. However, you find that traffic sent to this host through that interface is still being allowed. What should you do?
Use an extended ACL instead of a standard ACL
Match each component of the software-defined network (SDN) model, shown on the left, with an appropriate description on the right
Used by applications on the controller in order to obtain information about the network Northbound controller interface Performs the function of monitoring network traffic Controller Used to communicated with all of the physical network devices on the network Southbound controller interface Used by software applications on the controller to obtain information about the network API Performs the function of learning about the network topology Controller Designates the accepted method of communication between the controller, network devices, and installed applications API
Match the TCP/IP protocols with their function by dragging the protocol name on the left and dropping it next to the description on the right.
Used to send e-mail messages between mail servers SMTP Used to send messages to groups of users IGMP Used to assign IP addresses to host DHCP Used to get the MAC address of a host from its IP address ARP
Cloud services can also offer virtual network infrastructures, which include a variety of virtual components. Match each virtual component on the left with the appropriate description on the right.
Uses Ethernet standards to transmit and receive frames on the network Virtual network interface Implemented within the hypervisors to monitor and filter traffic on the virtual network as it flows between virtual machines Virtual firewall Can be defined within the virtual switch and associated with specific hosts Virtual VLAN Can support multiple networks on each of its interfaces, unlike the physical version Virtual router Builds a table that identifies which MAC addresses are connected to each of its ports Virtual switch
Match the IPv6 address assignment method on the left with its corresponding description on the right.
Uses NDP to learn the subnet prefix Stateless address auto configuration Assigns the entire 128-bit IPv6 address to the host Static full assignment Assigns the prefix. The remainder is derived from host MAC Static partial assignment Can be used in conjunction with SLAAC Stateless SHCPv6 Provides all IP configurations information except for the default gateway address Stateful DHCPv6 Relies on stateless DHCPv6 to provide host with the IP address of the DNS server Stateless address auto configuration
You have configured inter-VLAN routing on a Catalyst 3550 switch. You enter the show ip route command and receive the output shown in the exhibit. Which of the following is true? select two
VLAN 11 has a virtual IP address in the 10.1.11.0 network Traffic sent within VLANs 2,3 and 11 will be routed on the 3550 switch
You are configuring inter-VLAN routing on a Catalyst 3550 switch. Hosts belonging to VLAN 2 cannot contact servers belonging to VLAN 3. To troubleshoot the issue, ou enter the show ip route command and receive the output as shown in the exhibit. Which of the following my be true? select two
VLAN 2 does not have an interface IP address The VLAN 2 interface is not enabled with the no shutdown command
You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 trunk command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two
VLAN 3 has not been configured on the switch fa0/1 is configured to trunk unconditionally
You need to implement a WAN solution for a small business located in a remote mountain location. Currently, the local telecom only offers basic phone service at the locations. Leased lines are not available. Which option would be the most appropriate choice?
VSAT satellite link
You are troubleshooting a basic serial connection on your router. The show interface serial0/1/0 command shows the following information. What should be your first step in troubleshooting the problem?
Verify that the encapsulation is correctly configured
Real-time voice and video communications require a minimum level of quality in order to provide adequate services. The tables shown below contain the minimum metric specifications fro real-time voice and video. From the drop-down lists below each table, select the communication type that the table pertains to.
Video VoIP
What are the default swtichport configurations parameters on a 2960 switch? select two
Violation actions is set to shutdown A maximum of 1 MAC per port is allowed
Which of the following statements are true regarding NTP when implemented on Cisco devices? select two
When NTP is enabled, NTP packets are received on all interfaces NTP runs over UDP port 123 on an IP network
When is Multilink PPP used?
When multiple serial links exist between two router locations
You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?
Wildcard mask values for the network statements are incorrect
You are troubleshooting a router remotely using Telnet. You issue the following command at the CLI. pix#debug ip rip You watch for a few minutes, but no debug output is displayed. What is the problem?
You must use the terminal monitor command to view debug output from a Telnet session
You have a small business network with a single subnet connected to the internet. You ISP has assigned your router an IP address of 199.211.77.5 for its serial interface. You have chosen to use a network address of 172.15.1.0/24 on your private network. You use the SDM interface to configure basic NAT on the router with a single default route to the ISP. What is the most likely result of this configurations?
You network has internet connectivity, but some websites might be unreachable
In which of the following situations would you use port security?
You wanted to restrict the devices that could connect through a switch port
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which privilege EXEC commands begin with the letters ac? select all that apply
access-enable access-template
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. which of the following parameters are valid second level parameters for the ip command in fastethernet interface configuration mode? select all that apply
access-group dhcp igmp
You are configuring ACLs for a router. You need to create a standard IP access list that permits all traffic except traffic from the 192.168.1.0/24 network. Which two commands are needed to view the information you need to see? select two
access-list 1 deny 192.168.1.0 0.0.0.255 log access-list permit any log
You want to configure NAT so that packets from all hosts on network 192.168.2.0 will share the registered IP address 24.1.2.8 as shown in the exhibit. You have already identified the inside and outside NAT interface on the router. Which of the following command options will translate all inside host addresses to the single registered IP address?
access-list 1 permit 192.168.2.0 0.0.0.255 ip nat inside source list 1 interface serial 0 overload
You are the administrator for the 172.16.0.0 network shown in the exhibit. You need to block telnet traffic from entering your network while allowing other traffic to pass through. You decide to apply an access list to the incoming side of the serial 0 interface. Which statements should be included in your access list? select two
access-list 101 deny tcp any any eq 23 access-list 101 permit ip any any
You want to create an access list that permits and restricts traffic to meet the following specifications Allow all TCP/Ip traffic coming from any host on network 10.0.0.0, while denying all TCP/IP traffic from other sources Deny all TCP traffic coming from network 10.0.0.0 Allow TCP traffic comping from any source directed to host 10.1.1.2 Deny all TCP/IP traffic coming from host 10.1.1.1 Which access list statement should come last in the access list
access-list 101 permit ip 10.0.0.0 0.255.255.255 any
Which of the following ACL statements allow all TCP/IP traffic?
access-list 101 permit ip any any
You are configuring ACLs for a router. You need to create an extended IP access list that rejects any packet sent from a host with an IP address of 10.1.1.1 to a host with an IP address of 15.1.1.1. All other traffic should be allowed. To verify that the ACL is configured correctly and Functioning as intended, you want to view extended information about matches for each line in the ACL as packets are processed by the router. Which two commands are needed to view the information. Select two
access-list 101 permit ip any any log access-list 101 deny ip 10.1.1.1 15.1.1.1 0.0.0. log
You want to create an access list that denies all traffic coming from network 12.0.0.0, however, you want to allow all OSPF traffic from host 12.1.1.1. Al otters traffic should be allowed. Which access list statement should come first in the access list?
access-list 101 permit ospf host 12.1.1.1 any
Which command would you sue to create an access list that denies all TCP traffic originating from any host on network 192.168.1.0 that is destined for any host on network 199.66.220.0?
access-list 122 deny tcp 192.168.1.0 0.0.0.255 199.66.220.0 0.0.0.255
You want to control Telnet access to your router and allow only access from within the corporate network. You have subsetted your network so that all IP addresses use subnets of the 172.18.0.0/16 network. You want to apply the ACL to the VTY lines. Which of the following would be part of your design? select two
access-list 7 permit 172.18.0.0 0.0.255.255 ip access-class 7 in
You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that has a source address that appears to be coming from the two internal networks. However, you find that no traffic is being accepted on the s0/1/0 interface. What should you do?
add a permit statement to the bottom of the ACL
In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following partial commands are unique, first level commands in global configuration mode? select all that apply
al q rm
Which of the following commands lists a workstations ARP cache?
arp-a
Which SNMPv3 security level requires MD5 or SHA authentication and implements DES encryption?
authPriv
To properly configure link-state routing, which of the following areas is mandatory within an AS?
backbone
Which of the following mechanisms are used on ethernet networks to control access to the transmission medium? select two
backoff collision detection
When you start up the router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password The sky is blue Router> For security purposes, you would like to change the message the sky is blue to read All activity is monitored. Which command should you use?
banner exec *All Activity is monitored*
When you start up the router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password The sky is blue Router> For security purposes, you would like to change the message the grass grows green to read Only administrator access is allowed. Which command should you use?
banner login *Only administrator access is allowed*
IN traditions network models, the data plane, control plane, and management plane are al contained within the firmware of networking devices. This is know as what kind of architecture?
distributed
Which of the following commands configures a password to switch EXEC mode, and saves the password using MDS hashing?
enable secret
You have two switches connected as shown in the exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use the pordtfast feature?
fa0/1 and fa0/2
You have three swathes configured as shown in the exhibit. Which of the following ports listed below are designated ports following STP convergence? select two
fa0/2 on switch A fa0/1 on switch A
Which interface is the member of VLAN 65?
fa0/22
You have a small network as shown in the exhibit. You are troubleshooting connectivity issues at Wrk1. From Wrk1 you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office, but cannot ping any host in the main office. What is the most likely cause of the problem? select two
fa0/24 on the switch is bad Bad cable between the switch and the SFO router
Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that has been configured incorrectly
fd01:0001:0002:0001::20/64
Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a right-to-use evaluation license
feature: securityk9
You have configured port security for the fa0/3 interface. To test the security settings, you connect two workstations to the same port. Both are allowed to connect. You check the running-config file and fine the fowling for the interface. interface fastethernet0/3 swithport mode access swithport port-security mac-address sticky
for the interface, use the switchport port-security command
You have a network address of 166.35.0.0 and have selected 255.255.192.0 as the subnet mask value. How many possible subnets are there?
four
While configuring a new router, you use the following commands Router(config)#enable password cisco Router(config)#enable secret highway Router(config)#username admin password television Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login Which password would you use to open a Telnet session to the router?
garage
While configuring a new router, you use the following commands: Router(config)#enable password cisco Router(config)# enable secret highway Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login You establish a Telnet session to the router. Which password would you use to enter privileged EXEC mode?
highway
Which of the following methods of preventing routing loops prevents routing table changes from taking place too quickly and prevents downed links from being added back into the routing table
hold-downs
You have a small network as shown in the exhibit. Router2 is connected to the internet rhtpugh a fiber optic fastehternet connection and is to be configured with NAY to provide internet connectivity to your private network. What type of address would you assign to host Wrk1 on your private network?
inside local
You must configure an IP address on a Catalyst 2950XL switch using the default management switch port. From global configuration mode, which commands would you enter to configure the correct management port?
int vlan 1 ip address 192.168.10.2 255.255.255.0
You have used the following commands at the router console to create an IP access list and switch to interface configuration mode: Router(config)#access-list 122 permit tcp 10.6.0.0 0.0.255.255 any Router(config)# int eth 0 Which of the following commands do you use to add the access list to this interface and filter incoming packets?
ip access-group 122 in
RouterA and RouterB are connected with a serial link. RouterA is the DTE device. A portion of the show interface command output for routerB is shown below. You need to configure RouterA to connect to routerB. Which commands would you use to configure the s0/1/1 interface for routerA?
ip address 192.168.105.95 255.255.255.252 encap ppp no shut
You have a small network as shown in the Exhibit. You have configured RIP on both RouterA and RouterB. The show ip route command on RouterA shows the following information. You want to configure a default route so that all packets for unknown networks are sent to RouterB. Which command should you use?
ip default-netowrk 10.0.0.0
After enabling the DHCP snooping feature, you want to apply it to your network globally. Which command will apply DHCP snooping globally?
ip dhcp snooping
You are configuring netflow on a router You want to monitor both incoming and outgoing traffic on an interface. You've used the interface command to allow you to configure the interface. What commands should you use next? select two
ip flow egress ip flow ingress
You are configuring netflow on a router. Rather than storing records locally, you want to configure the router to redirect net flow records to a net flow collector system in your network with an IP address of 172.17.8.25 listening on UDP port 2055. Which command should you use?
ip flow-export destination 172.17.8.25 2055
You are configuring netflow on a router. Rather than storing records locally, you want to configure the router to redirect net flow records to a net flow collector system in your network with an IP address of 172.17.8.25 listening on UDP port 2055. by default, net flow uses the ip address of the interface that packets are sent from as the source ip address from records. However, for security reasons, you want to obscure the source address of the net flow router by specifying hat all net flow records originate from the loopback interface of the router. Which command should you use?
ip flow-export source loopback 0
You are configuring net flow on a router. You want the records gathered to be formatted with fields specified by net flow version9. Which command should you use?
ip flow-export version 9
You are the network administrator for a company that has a small clock of registered IP addresses ranging from 24.1.2.32 to 24.1.2.47. You want to assign these addresses to a dynamic pool in NAT. Which command should you use?
ip nat pool net-1 24.1.2.32 24.1.2.47
You have a network with two routers as shown in the exhibit. You would like to configure a single static route on RouterA that summarizes the routes accessible through RouterB. Which static route would you configure?
ip route 192.168.100.64 255.255.255.192 192.168.100.34
You need to configure a static route on your Cisco router. The destination network is 192.65.178.0 with a subnet mask of 255.255.255.0. The default gateway is 192.65.179.1, and the IP address of the destination host for the message is 192.65.178.15. Which of the following commands configures this router?
ip route 192.65.178.0 255.255.255.0 192.65.179.1
You need to add multiprotocol label switching (MPLS) support to a router using the Data feature set. Which feature set must be enabled before the data feature set canoe enabled?
ipbasek9
Which command is used to apply an IPv6 ACL to an interface>
ipv6 traffic-filter
Which of the following best describe how a switch functions? select two
it filters the network traffic based on hardware address it connects multiple network segments and forwards packets to the appropriate segment
Which two of the following statements accurately describe half-duplex ethernet?
it uses collision detection and recovery it sends both signals along the same wire
You have entered the following command to enable dynamic trunking configuration. switch(config-if)#switchport mode dynamic desirable If the switch interface is not connected to another switch, how will it function?
it will communicate as a normal port
Which of the following is the most important thing to do to prevent console access to the router?
keep the router in a looked room
You are reviewing the output of the show interfaces command for gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 6th byte of the frame was transmitted?
late collisions
Which fields in the header of IP packets are examined by net flow to determine whether or not a given packet is par of a flow? select two
layer 3 protocol type destination port
You use a Cisco 2900 router in your network. You are considering purchasing and implementing the unified communications feature set on this router. However, you would like to evaluate this feature set for a period of time prior to purchasing it. Which command activates the evaluation right-to-use license for this feature set?
license boot module c2900 technology-package uck9
You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 172.17.8.5. You want to only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. You just entered the logging on command. What other commands must be used to accomplish this? select two
logging host 172.17.8.5 loggin trap 4
You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 192.168.1.2. You want to only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. Which commands are used to accomplish this? select three
logging host 192.168.1.2 logging on logging trap 2
Consider the output from the show ip cache flow command in the exhibit. Which statements are true regarding the flow represented in the statistics? select two
most of the packets monitored where 1536 bytes in size 255 packets were monitored
Listed below are three banner types that can be configured on a router. exec, motd, login. If all three banners were configured in which order would they display when a telnet session is used to connect to the router?
motd, login, exec
What kind of relationship is established between connected BGP routers on the same autonomous system?
neighbor
To configure EIGRP on a router, what are the minimum commands you must use? select two
network 1.0.0.0 router eigrp 12
You want to configure OSPF to run only on the interface with an IP address of 10.1.1.112/26 and you want o associate the interface with area 3. Which of the following commands will accomplish your goal?
network 10.1.1.64 0.0.0.63 area 3
You are configuring OSPF for a single router with two interfaces as shown in the exhibit. What network statement would you use to configure both interfaces for OSPF for area 0.
network 192.168.1.64 0.0.0.31 area 0 network 192.168.1.128 0.0.0.15 area 0
You have a test lab that you use to test different configurations before deploying them in your live network. You have been testing several commands from configuration mode, then going back to enable mode to view the running-configuration. Every time you exit configuration mode, the following output is displayed: %SYS-5-CONFIG_I: Configuration from console by console What command can stop this message from appearing on your screen?
no logging console
Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. The user complains that she can't access the network server. You verify that a cable is connected to the fa0/16 port on the switch. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which command would most likely correct the problem?
no shutdown
Which SNMPv3 security level requires authentication with a username, but does not implement encryption?
noAuthnoPriv
Currently, all of the routers in your network are configured to use NTP to synchronize time with a public Stratum 2 time provider on the internet. To reduce redundant network traffic, you decide to configure one internal router as an authoritative NTP time provider with a stratum value of 5 and then configure all other routers to synchronize time with it. This router has an ip address of 172.17.8.254 assigned. Which commands should you use? select two
ntp master 5 on NTP time prover router ntp server 172.17.8.254 on all routers except the time provider
You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 provider on the internet with a hostname of 0.pool.ntp.org. Which command should you use?
ntp server 0.pool.ntp.org
You check the time on a router and find that it is out of sync with the time on the other routers and switches in your network. TO fix this issue, you decide to configure NTP on the router to get time from an internal authoritative (master0 NTP server with an ip address of 172.17.8.254. Which command should you use?
ntp server 172.17.8.254
You've just enabled trunking on the fa0/1 port of Catalyst 2960 switch. By default, what traffic can now be sent across this interface?
only 802.1Q traffic
You have a workstation configured with DNS server addresses as follows. Primary-192.168.1.1 Alt- 192.168.1.115 While browsing the internet, you go to www.cisco.com. A few minutes later, you type ping www.cisco.com into a command prompt. How will the workstation get the ipad dress for www.cisco.com?
out of its local DNS cache
Your company has two subnets, 172.16.1.0 and 172.16.2.0 as shown in the exhibit. Recently policy changes forbid FTP traffic from leaving your company; however, all other traffic is allowed. You've created the following access list to meet the new company requirements. Where should you apply the filter?
outbound side of S0
You have a small network as shown in the exhibit. Router2 connected to the internet through a fiber optic fast ethernet connection and is to be configured with NAT to provide internet connectivity to your private network. What type of address would you adding to the fa0/1 interface on router2?
outside global
One of the interfaces in a router with OSPF enabled is connected to a network link where no other routers reside. You want to prevent this interface from sending OSPF hello messages as there are not other routers on that network to respond. Which command should you use?
passive-interface <type>
You want to prevent all interfaces on a router from sending or responding to OSPF hello messages. Which command should you use?
passive-interface default
You've just enabled port security on an interface of a Catalyst 2950 switch. You want to generate an SNMP trap whenever a violation occurs. Which feature should you enable?
restrict
You want to configure routerB to run EIGRP. The networks attached to both interfaces S0 and S1 on routerB are to be advertised within autonomous system 100. Which set of commands should you enter?
router eigrp 100 network 172.16.0.0 network 172.17.0.0
You want to configure routerB to run OSPF with a local process ID of 100. Both interfaces s0 and s1 on routerB belong to area 300. Which set of commands should you enter?
router ompf 100 network 172.16.16.1 0.0.0.0 area 300 network 172.16.32.2 0.0.0.0 area 300
You want to configure a single area OSPF network for area 0. What are the minimum commands you must use? select two
router ompf 12 network 1.1.1.0 0.0.0.255 area 0
You are configuring an 1841 Cisco router for interVLAN communications. You would like to use one physical interface to handle the incoming VLANs 2 and 10. The VLANs are encapsulated with 802.1Q tags.
router(config-subif)#encapsulation dot1q 2 router(config-if)#int fa0/1.2 router(config-subit)#ip address 172.16.2.1 255.255.255.0
You are configuring an 1841 Cisco router for interVLAN communications. You would like to use one physical interface to handle the incoming traffic from VLANs 2 and 10. The switch connected to the router is sending 802.1Q encapsulated traffic from VLAN 2 but is not encapsulating VLAN 10. Which command would you use to ensure that the router correctly handles traffic coming from the switch?
router(config-subif)#encapsulations dot1q 10 native
Consider the output from the show ip cache flow command shown in the exhibit. Which type of service was accessed on the destination host?
secure http web server
You have configured PPP with CHAP authentication on the BRI0 interface of your router. You now want to hide the CHAP password from view in the configuration file. What command should you use?
service password-encryption
Which of the following commands will show details about all ACLs configured on the router?
sh access-list
Which of the following commands can you use to see which ACL is applied to the first ethernet interface?
sh ip int
You are troubleshooting problems with a serial interface on a router that is connected to a leased line WAN interface. You need to view the type of serial cable that has been used on the s0/0/1 interface and which end of the cable is connected to the DCE or DTE. Which command should you use to do this?
show controllers s0/0/1
While working at a console of a Cisco device, you need to view a list of the commands that are currently stored in the history buffer of the system. Which command should you use?
show history
You would like to see what host names have been cached on your router. Which command displays the cashed list of host names?
show host
You are troubleshooting Physical Layer issues with the gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?
show interface gi0/1
You want to get a list of all ports on your switch that are currently trunking. Which command should you use?
show interface trunk
You are troubleshooting physical layer issues with the gi0/1 interface in a router. You suspect a duplex mismatch error has occurred and need to determine the duplex settings configured on the interface. Which commands could you use> choose two
show interfaces gi0/1 status show interfaces gi0/1
You need to determine whether net flow is configured to redirect records to a net flow collector and, if so, the ip address of the collector. Which command should you use to do this?
show ip flow export
Your router is currently configured to redirect records to a net flow collector. You know that, by default, net flow uses the ip address of the interface that packets are sent from as the source ip address for records. However, you're not sure how this router is configured. You need to determine which interface and ip address on this router is configured as the source for net flow records being sent to the collector. Which command should you use to do this?
show ip flow export
You need to determine whether net flow is monitoring inbound and/or outbound traffic on all interfaces in a router. Which command should you use to do this?
show ip flow interface
You need to view the configuration settings of an interface on your router to see if it can send or respond to OSPF hello messages. Which command should you use?
show ip ospf interface <interface>
Your routers have been configured to used EIGRPv6. While troubleshooting a routing issue, you decide that you need to view a list of neighbors on each router. Which command should you use to do this?
show ipv6 eigrp neighbors
Your routers have been configured to use EIGRPv6. Which troubleshooting a rouging issue, you decide that you need to view successor information on each router. Which command should you use to do this?
show ipv6 eigrp topology
Your routers have been configured to use EIGRPv6. Which troubleshooting a rouging issue, you decide that you need to view successor information on each router. Which the current start of the IPv6 routing protocol process on each router. Which command should you use to do this?
show ipv6 protocols
You want to view the feature sets that have been enabled on a router and what type of license they use. Which commands can you use to do this? select two
show license show version
You are troubleshooting a router at the console. You issued the following command at the CLI: pix#debug arp You see debug output, but the output scrolls past faster than you can read. What two commands allow you to view debug output one page at a time? select two
show log logging buffered
You need to verify that time is synchronized on a router. Which commands could you use to do this? select two
show ntp association show ntp status
You want to verify that interface fa0/2 is a member of VLAN0002. Which command displays the output shown here?
show vlan brief
You want to verify that interface fastethernet 0/2 is a member of VLAN0002. Which command displays the output shown here?
show vlan brief
You check the time on router and find that it is off by several minutes. To fix this issue, you configure NTP on the router to get time from Stratum 2 time provider on the internet. However, the time difference is large and it is taking some time for NTP to synchronize the time on the leave router. To speed synchronization, you use NTP commands to immediately synchronize the time on the router with the time on the time provider. Which NTp term best describes this process?
slam
You check the time on a router and find that it is off by about 10 minutes. To fix the issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. It is taking some time for NTP to synchronize the time on the local router. After about 15 minutes, the time finally synchronizes. Which NTP term best describes this process?
slew
You want to make interface fa0/2 a member of VLAN2 on a Catalyst 2950XL switch. Which commands must you enter? select two
switch port access vlan2 int fastethernet 0/2
LLDP is disabled on Cisco devices by default. Which of the following commands enables LLDP on a Cisco device?
switch(config)# lldp run
Which command disables the trunking configuration on a switch interface?
switch(config-if)#switchport mode access
Switch B is a Catalyst 2924 switch you're configuring to support VLAN trunking. Switch B is both ISL and 802.1Q callable. With a is encapsulating 802.1Q. You want switch B's port to be in trunk mode regardless of the mode configured on switch A. Which commands should you use to configure the trunk port on Switch B? choose two
switchport trunk encapsulation dot1q switch port mode trunk
You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17. If any unauthorized devices attempt to attach, you want to disable the port until you manually re-enable it. On fa0/17, you use the swtichport port-security mac-address command to identify the MAC address on the server. What else should you include in your commands? select two.
swithcport port-security maximum 1 switch port port-security violation shutdown
Which of the following utilities gives you the most information about the operational status of a router
telnet
Match each OSPF component on the left with the corresponding description on the right. Each component may be used once, more then once, or not at all.
the OSPF area to which all the other areas connect Backbone area A router in the backbone area Backbone router A router in a single, non-backbone area Internal router Know as area 0 Backbone area A set of routers and links that share the same link-state database information Area AN OSPF router that connects two areas Area border router Has interfaces connected to the backbone area and to at least one another area Area border router
You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?
the areas defined in network statements do not match
What is the first thing that happens when a collision occurs on an ethernet network?
the device that detected the collision transmits a jam signal
Which of the following best explains what is meant by the term "single-homed connection;?
the enterprise is connected to a single ISP by a single connection
Which of the following are true about the distance vector method of sharing routing table information? select two
the entire routing table is sent to other routers Routers send routing information only to their neighbors routers
Which effect does the standby 2 priority 110 interface configuration command have?
the group priority is increased above the default
Hold downs use triggered updates to help prevent routing loops by letting routers know of changes in the network. Which of the following events can reset the hold-down timer? select two
the hold-down timer receives notification of a change in network status The hold-down timer runs out
You sue the shop ip route command on a Cisco router and see the following information. Which of the following are true? select two
the router has learned about routes through three routing protocols For the route to 172.17.0.0, the number 68 indicates the route cost
Which fields in the header of IP packets are examined by net flow to determine whether or not a given packet is part of a flow? select two
type of service source address
You need to add VoIP and IP telephony support to a router. Which feature set must be enabled to do this?
uck9
You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. When you check the routing table on routerA you see a single route reported learned through EIGRP to network 192.168.1.0/24. You want routerA to have routes to the individual networks connected to routerA. How should you modify the configuration of routerA?
use the no auto-summary command
You are troubleshooting the connection on a switch. Which would you do to correct the status shown for fa0/12? Note: you will not be able to use the show run or show start commands in this lab.
use the no shutdown command
You would like to use the crypto key command to generate a key pair for use with SSH. Which parameters must be set prior to running this command? select two
username ip domain-name
Which of the following are true about Gigibit Ethernet? select two
uses CSMA/CD Can us both copper and fiber optic