INCD 1 Practice Exam 1 (3/30/19)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Section: Chapter 15 - Analyzing Subnet Masks An engineer first confirms that a router's interface Fa0/0 is up and working. He then configures that interface with the ip address 10.101.101.101 255.255.255.128 command. The engineer leaves configuration mode, and issues the show ip route command. Which of the following masks will be listed in the output that describes the connected route that exists as a result of this new ip address command?

/25 Answer The ip address command is syntactically correct, and the mask 255.255.255.128 is a valid mask, so the router will accept the command. The router will add a connected route for the subnet in which 10.101.101.101 255.255.255.128 resides, because the interface is up, and the show ip route command will list the mask in prefix notation. Of the answers, /25 is equal to 255.255.255.128, because 255.255.255.128 represents a total of 25 binary 1s. The other incorrect masks represent different DDN masks: /22: 255.255.252.0 /23: 255.255.254.0 /26: 255.255.255.192

Section: IP addressing (IPv4/IPv6) What is the range, in the first octets, for class B networks?

128-191 Answer Class B networks have a first octet value between 128 and 191. [Page 335, Chapter 12]

Section: Chapter 16 - Analyzing Existing Subnets Which of the following is the subnet broadcast address for the subnet in which IP address 172.31.77.201/27 resides?

172.31.77.223 Answer The resident subnet ID in this case is 172.31.77.192. You can find the subnet broadcast address based on the subnet ID and mask using several methods. Following the decimal process in the book, the mask converts to 255.255.255.224, making the interesting octet be octet 4, with magic number 256 − 224 = 32. For the three octets where the mask = 255, copy the subnet ID (172.31.77). For the interesting octet, take the subnet ID value (192), add magic (32), and subtract 1, for 223. That makes the subnet broadcast address 172.31.77.223.

Section: Chapter 28 - Fundamentals of IP Version 6 Which of the following is the prefix for address 2000:0000:0000:0005:6000:0700:0080:0009, assuming a mask of /64?

2000:0:0:5::/64 Answer The /64 prefix length means that the last 64 bits, or last 16 digits, of the address should be changed to all 0s. That process leaves the unabbreviated prefix as 2000:0000:0000:0005:0000:0000:0000:0000. The last four quartets are all 0s, making that string of all 0s be the longest and best string of 0s to replace with ::. After removing the leading 0s in other quartets, the answer is 2000:0:0:5::/64.

Section: Chapter 24 - Troubleshooting IPv4 Routing Refer to the exhibit. What is the prefix length of the OSPF route? R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP a - application route + - replicated route, % - next hop override, p - overrides from PfR Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks C 10.10.10.0/24 is directly connected, GigabitEthernet0/1 L 10.10.10.1/32 is directly connected, GigabitEthernet0/1 O 10.100.73.0/24 [110/46] via 10.10.10.2, 00:00:01, GigabitEthernet0/1 R1#

24 Answer The OSPF entry states "10.100.73.0/24 [110/46] via 10.10.10.2, 00:00:01, GigabitEthernet0/1." The destination network referenced is 10.100.73.0 with a prefix length of /24, which can also be written in dotted-decimal notation as 255.255.255.0

Section: IP Version 6 Refer to the diagram; assuming a standard prefix length of /64, what ipv6 connected route would exist when the show ipv6 route command is entered?

2500:3d5b:1000:573b::/64 Answer An IPv6 address is 128 bits in length, which, when converted to hex, equals 32 hex characters. To find the correct route that would exist in the routing table, you must split the 2500:3d5b:1000:573b:3492:a4b1:0078:03a0 address in half, leaving 64 bits, or 16 hex characters. This gives the subnet of 2500:3d5b:1000:573b::/64.

Section: Chapter 15 - Analyzing Subnet Masks Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /30?

255.255.255.252 Answer /30 is the equivalent of the mask that in binary has 30 binary 1s. To convert that to DDN format, write down all the binary 1s (30 in this case), followed by binary 0s for the remainder of the 32-bit mask. Then take 8 bits at a time, and convert from binary to decimal (or memorize the nine possible DDN mask octet values and their binary equivalents). Using the /30 mask in this question, the binary mask is 11111111 11111111 11111111 11111100. Each of the first three octets is all binary 1s, so each converts to 255. The last octet, 11111100, converts to 252, for a DDN mask of 255.255.255.252. See Appendix A for a decimal/binary conversion table.

Section: IP Routing Technologies How would you set a password for the VTY line?

Answer You need to be in VTY line mode and use the command Password [password].

Section: Troubleshooting Which counter observes a duplex mismatch?

Answer Late Collisions: The subset of all collisions that happen after the 64th byte of the frame has been transmitted. (In a properly working Ethernet LAN, collisions should occur within the first 64 bytes; late collisions today often point to a duplex mismatch.)

Section: Troubleshooting Which command, when specifying the interface type or interface number, will display a one line summary of information regarding the specified neighboring device?

Answer While the command "show cdp interface" relates directly to a specific interface and provides information regarding if the specified interface has CDP enabled or not, the command "show cdp neighbors" deals with displaying information about the neighboring devices. When the optional parameter "type" or "number" is specified for "show cdp neighbors", the console will log a very short, one line description for the matched interface on a neighboring device. [Page 273 & 276, Chapter 10] show cdp neighbors [type number]

Section: IP Routing Technologies How would you set a console password?

Answer You need to be in Console line mode and use the command Password [password].

Section: IP addressing (IPv4/IPv6) How many network bits does a Class A network have?

Answer: 8. Answer The default or un-subnetted number of network bits in a class A network is 8. A class B default is 16, and class C is 24. If you have an IP address that has more than the default value for a subnet mask, it is considered subnetted.v

Section: Troubleshooting Which of the following is true about the classful IP address 191.230.45.188?

Broadcast ID is 191.230.255.255 The network ID is 191.230.0.0 There are 16 host bits in this network ID Answer This is a class B network so 191.230.0.0 is the network ID and 191.230.255.255 is the broadcast ID. Every class B network has 16 host bits.

Section: IP addressing (IPv4/IPv6) Steve finds out that 125.158.3.14 is his IP address. What Class is this IP address?

Class A Answer Class A addresses fall in the 1.0.0.0 to 126.0.0.0 range Class B in the 128.0.0.0 to 191.255.0.0 range Class C in the 192.0.0.0 to 223.255.255.0 range

Section: Chapter 27 - Network Address Translation Your company has configured all the internal IP addressing using private IP addresses. You then realize that some users will also want Internet access. What is the practical approach to solving this problem

Configure translation to make the Internet believe the users have public addresses Answer Using NAT at a perimeter router, and converting the private source addresses to global addresses before sending those packets into the public networks, would allow the internal users to access Internet resources. Using NAT to make the entire Internet appear as an inside local private address space is not reasonable. Assigning permanent static public IPs to individual hosts or dual homing those hosts just for Internet access is also not practical.

Section: LAN Switching Technologies Problem The purpose of a bridge is to:

Create collision domains. Forward frames between two interfaces. Answer Bridges separate devices into segments called collision domains. Collision domains were a way to retain performance among all the NICs within the network and reduce the number of collisions in the network. Another important role task that bridges are capable of is the ability to buffer and queue frames which allows the frame to be sent to the destination when it is no longer busy.

Section: Operation of IP Data Networks This type of switch does not connect to user devices. It allows switches a way to forward traffic to each other.

Distribution. Answer There are three types of switches that play different roles within a campus LAN: Access These switches are meant to connect straight to user devices. Core These switches typically can forward large amounts of traffic quickly and are meant to forward traffic between distribution switches. Distribution These switches do not connect to the end user but simply provide a means for the access switches to forward traffic to each other.

Section: IP addressing (IPv4/IPv6) Which of the following IPv6 address is most likely to be a unique local unicast address?

FD11::3 Answer FD11::3 Unique local unicast addresses act as private IPv6 addresses. These addresses have many similarities with global unicast addresses. But the difference in a unique local address is they begin with hex FD. The unique local unicast addresses are not registered with anybody, and can be used in multiple organizations. Global Unicast = 2 or 3 (originally) Unique Local = FD Multicast = FF Link-Local = FE80 IANA actually reserves prefix FC00::/7, and not FD00::/8, for these addresses. FC00::/7 includes all addresses that begin with hex FC and FD.

Section: IP addressing (IPv4/IPv6) What IPv6 address is considered a unique local unicast address?

FD11::3 Answer Unique local unicast addresses act as IPv6 addresses and share many similarities with global unicast addresses except unique local addresses begin with "FD". Unique local unicast addresses are not registered and are used in multiple organizations. Unique Local = FD Multicast = FF Link-Local = FE80

Section: IP Routing Technologies RIP uses which of the following metrics to determine the best route?

Hop-count Answer The hop count is determined by how many times a given packet must pass through a router before reaching its destination. RIP prevents routing loops by implementing limit on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and the route is considered unreachable.

Section: Troubleshooting The interface on Serial 1/0 is in an UP/UP state when you look at the results of show ip interface brief command. However, you are unable to ping the other end of the point-to-point interface. What may be the problem?

IP address mismatch Answer Both A and B may result in an UP/UP state when performing the show ip interface brief command. However, a layer 3 ping may not be successful. If the wire is disconnected this will result in a DOWN/DOWN state.

Section: IP Routing Technologies Routing protocol performs all of the following functions except:

If two routes exist for the same destination subnet, the router will remove the first entry. Answer If two or more routes exist for the same destination subnet, then the router will decide on which route to use based on a metric.

Section: Chapter 7 - Analyzing Ethernet LAN Switching Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?

It forwards the frame out all interfaces in the same VLAN except for the incoming interface. Answer A switch floods broadcast frames, multicast frames (if no multicast optimizations are enabled), and unknown unicast destination frames (frames whose destination MAC address is not in the MAC address table).

Section: LAN Switching Technologies What is the benefit of using the show command on a Cisco route

It shows the status of almost every feature. Answer The show command has a large variety of options, and with those options, you can find the status of almost every feature of Cisco IOS

Section: Troubleshooting Which error codes is unexpected on LAN switch physical interface?

Line status: up Protocol Status: down Interface Status: not connected Answer The Shutdown command is configured on the interface: Line status: administratively down Protocol Status: down Interface Status: disabled No cable, bad cable, wrong cable pinouts, speed mismatch, the neighbor device is (powered off - shutdown - error disabled): Line status: down Protocol Status: down Interface Status: not connected Not expected on LAN switch physical interface: Line status: up Protocol Status: down Interface Status: not connected Port security has disabled the interface: Line status: down Protocol Status: down (err-disabled) Interface Status: err-disabled The interface is working: Line status: up Protocol Status: up Interface Status: connected Table 12-2 LAN Switch Interface Status Codes

Section: LAN Switching Technologies 100BASE-T, at a minimum requires CAT __ cabling

None of the above. Answer 100BASE-T calls for CAT5 cabling and supports a cable length of 100m.

Section: Network Device Management The team lead of a team of six network engineers sees a need to keep more regular backups of router configuration. To that end, the engineer wants the backups to use the IOS configuration restore feature, to allow the restoration of a backed-up config without requiring a reload of the router. The engineer wants to back up each router's configuration every three hours and any time an engineer saves the configuration to the startup-config file. The exhibit shows several candidate configurations to use on each device. Which would achieve the goals of the senior network engineer? ! Option 1 ConfigRestore path ftp://user:[email protected]/ time-period 3 hours startup-config enable ! Option 2 archive path ftp://user:[email protected]/ time-period 180 startup-config enable ! Option 3 archive path ftp://user:[email protected]/ time-period 3 hours write-memory ! Option 4 ConfigRestore path ftp://user:[email protected]/ time-period 180 write-memory ! Option 5 archive path ftp://user:[email protected]/ time-period 180 write-memory ! Option 6 ConfigRestore path ftp://user:[email protected]/ time-period 180 startup-config enable

Option 5 Answer To back up configurations that later allow the easy use of the config replace EXEC command, configure the router to use the configuration archive feature. Option 5 in the exhibit shows the correct configuration based on the requirements listed in the question, including the following: archive—Moves the CLI user into the correct submode to configure the configuration archive feature. (The ConfigRestore command in the exhibit is not a valid IOS command.) path—Defines the location to store the copies of the configuration file, often some external server, like the FTP server referenced in the configuration samples. All options in the exhibit used the same command and syntax. time-period 180—Defines the operation to make a copy of the configuration every 180 minutes. Some of the options in the configuration used the incorrect syntax of referencing the number of hours. write-memory—Enables the operation to make an archive of the configuration when anyone saves the running-config to the startup-config file. (Some of the options listed an invalid command, startup-config enable.)

Section: Chapter 19 - Learning IPv4 Routes with RIPv2 Refer to the exhibit. Based on the information shown, will any of the device's routes be affected by the configuration? R1 R1#show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "application" Sending updates every 0 seconds Invalid after 0 seconds, hold down 0, flushed after 0 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Maximum path: 32 Routing for Networks: Routing Information Sources: Gateway Distance Last Update Distance: (default is 4) Routing Protocol is "rip" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Sending updates every 30 seconds, next due in 20 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Triggered RIP Key-chain GigabitEthernet0/1 2 2 GigabitEthernet0/2 2 2 Interface Send Recv Triggered RIP Key-chain Loopback0 2 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 125.0.0.0 192.168.1.0 192.168.2.0 Routing Information Sources: Gateway Distance Last Update 192.168.2.2 120 00:00:13 Distance: (default is 120) R2#show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "application" Sending updates every 0 seconds Invalid after 0 seconds, hold down 0, flushed after 0 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Maximum path: 32 Routing for Networks: Routing Information Sources: Gateway Distance Last Update Distance: (default is 4) Routing Protocol is "rip" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Sending updates every 30 seconds, next due in 11 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Triggered RIP Key-chain GigabitEthernet0/2 2 2 Automatic network summarization is in effect Interface Send Recv Triggered RIP Key-chain Maximum path: 4 Routing for Networks: 192.168.3.0 Routing Information Sources: Gateway Distance Last Update 192.168.3.2 120 00:00:16 Distance: (default is 120) R3#show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "application" Sending updates every 0 seconds Invalid after 0 seconds, hold down 0, flushed after 0 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Maximum path: 32 Routing for Networks: Routing Information Sources: Gateway Distance Last Update Distance: (default is 4) Routing Protocol is "rip" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Sending updates every 30 seconds, next due in 22 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Triggered RIP Key-chain GigabitEthernet0/1 2 2 GigabitEthernet0/2 2 2 Interface Send Recv Triggered RIP Key-chain Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 192.168.2.0 192.168.4.0 Routing Information Sources: Gateway Distance Last Update 192.168.2.1 120 00:00:17 192.168.4.2 120 00:00:03 Distance: (default is 120) R4#show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "application" Sending updates every 0 seconds Invalid after 0 seconds, hold down 0, flushed after 0 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Maximum path: 32 Routing for Networks: Routing Information Sources: Gateway Distance Last Update Distance: (default is 4) Routing Protocol is "rip" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Sending updates every 30 seconds, next due in 15 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Triggered RIP Key-chain GigabitEthernet0/1 2 2 GigabitEthernet0/2 2 2 Interface Send Recv Triggered RIP Key-chain Loopback0 2 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 150.150.0.0 192.168.3.0 192.168.4.0 Routing Information Sources: Gateway Distance Last Update 192.168.4.1 120 00:00:12 Distance: (default is 120)

R1's, R2's, and R4's routes would be affected by the configuration. Answer The only abnormal part of the configuration was that R2 is missing a network statement. This disables RIP on R2's Gi0/1 interface. Because of this missing statement, the routes of R1, R2, and R4 would be directly affected; the routes of R3 would not change unless there was a failure.

Section: Chapter 17 - Operating Cisco Routers Refer to the diagram. Which cable type is used in the referenced location?

Serial cable Answer Although modern routers often have CSU/DSUs that are built into the card installed, external CSU/DSUs are still installed; in these circumstances, a serial cable is used to connect a router to the CSU/DSU.

Section: Chapter 32 - Implementing IPv6 Routing What happens when a configuration file is copied from either a local or remote storage location into the running-configuration?

The copied file merges with the contents of the running-configuration unless there are single values (such as an IP address on a specific interface) that conflict, and then the contents of the file being copied are used. Answer Copying configuration files to running-configuration will implement those new configurations immediately. In the case of nonconflicting parameters, the content of the file and the existing configuration are merged. Copies of configuration files to running-configuration will not replace the entire contents of the running-configuration. Stored configuration files can be copied to running-configuration, and changes take effect immediately.

Section: Chapter 9 - Configuring Switch Interfaces Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface? Switch# show interfaces status Port Name Status Vlan Duplex Speed Type Gi0/1 notconnect 1 auto auto 10/100/1000BaseTX Gi0/2 connect 1 a-half a-100 10/100/1000BaseTX Gi0/3 notconnect 1 auto auto 10/100/1000BaseTX Gi0/4 connect 1 half 100 10/100/1000BaseTX Gi0/5 notconnect 1 auto auto 10/100/1000BaseTX Gi0/6 connect 1 a-full 1000 10/100/1000BaseTX

The interface duplex has been autonegotiated. Answer Most Ethernet interfaces support both automatic configuration via autonegotiation (802.3u) and the manual configuration of both interface speed and duplex. The Gi0/6 interface shown displays "a-full" and "1000." This means that the interface duplex has been automatically negotiated and interface speed has been manually configured with the speed 1000 command.

Section: Chapter 35 - Managing IOS Files Which value in the configuration register controls how the router boots?

The last hexadecimal character Answer The last hexadecimal character in the configuration register is called the boot field. It controls how the router boots. For example, this character can be set on the router to force the device to boot into ROMMON mode.

Section: Chapter 19 - Learning IPv4 Routes with RIPv2v Which of the following best describes the concept of the RIP hop count metric?

The number of routers between a router and a subnet, not counting that router. Answer The RIP hop-count metric refers to routers as hops. (That fact rules out three of the answers.) From the perspective of a router that has a RIP route, the hop count includes 1 for each router between the local router and the destination subnet, but does not include 1 for the router itself. For instance, imagine a route on R1 for some subnet, and that route has a metric 2. That could occur if the end-to-end path from R1 to that subnet ran from R1, through R2, then through R3, and then on to the link where the subnet resides.

Section: Chapter 35 - Managing IOS Files What is the first step a typical Cisco router takes during the boot process when attempting to locate an operating system to load?

The router checks its configuration register boot field. Answer The first step in the process of locating a Cisco IOS image is to check the boot field of the configuration register. This value instructs the router whether to load ROMMON or IOS, and if IOS, specifically the steps to take to find the IOS to load. This first step (the boot field) usually instructs the router to use the image file in flash.

Section: Chapter 35 - Managing IOS Files R1#show version Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(24)T4, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2010 by Cisco Systems, Inc. Compiled Fri 03-Sep-10 05:39 by prod_rel_team ROM: System Bootstrap, Version 12.4(1r) [hqluong 1r], RELEASE SOFTWARE (fc1) R1 uptime is 1 day, 5 hours, 23 minutes System returned to ROM by reload at 16:26:26 UTC Wed Aug 31 2011 System image file is "flash:c2800nm-advipservicesk9-mz.124-24.T4.bin" This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to [email protected]. Cisco 2811 (revision 53.50) with 223232K/38912K bytes of memory. Processor board ID FTX1032A0QT 2 FastEthernet interfaces 4 Serial(sync/async) interfaces 1 Virtual Private Network (VPN) Module DRAM configuration is 64 bits wide with parity enabled. 239K bytes of non-volatile configuration memory. 62720K bytes of ATA CompactFlash (Read/Write) Configuration register is 0x2102 (will be 0x2100 at next reload) As an administrator, you issue the following commands: R1(config)#boot system flash c2800nm-advipservicesk9-mz.124-24.T4.bin R1(config)#end R1#copy running-config startup-config R1#reload

The router will load the embedded OS from firmware. Answer The command config-register 0x2100 sets the value for the configuration register to hexadecimal 2100, which causes the router to load the ROMMON OS instead of IOS. Based on the last line of the show command provided, this command had been issued. No full or partial IOS image will be loaded from flash or from a TFTP server, and ROMMON does not use the startup config file in NVRAM.

Section: Chapter 25 - Basic IPv4 Access Control Lists R1#show ip interface fa0/1 FastEthernet0/1 is up, line protocol is up Internet address is 10.3.0.1/30 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is 1 Inbound access list is not set This output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line listing details about the fields inside the respective header. You will need to remember some parts of the various headers, and compare those concepts to this output, to answer this question. access-list 1 deny 10.3.0.0 0.0.0.3 access-list 1 permit any Consider all the output provided. Assume that R1's routing logic would attempt to forward the packet out interface Fa0/1. What happens with regard to the packet shown in the packet analyzer, with access list 1 applied outbound to interface Fa0/1?

The single packet leaving Fa0/1 is permitted. Answer Outbound ACLs do not apply to traffic sourced by the router itself. From the information provided, you can see that this packet came from an IP address of the router itself and would not be filtered by its own outbound ACL. Transit packets going through the router, out Fa0/1, are denied by the ACL if the source address matches the address range in the deny statement of the ACL.

Section: Chapter 17 - Operating Cisco Routers The # sign suffixed after the device hostname denotes which of the following?

The user is in enable mode. Answer If the command prompt lists the hostname followed by a >, the user is in user mode; if it is the hostname followed by the #, the user is in enable mode.

Section: Chapter 30 - Implementing IPv6 Addressing on Routers What statement is true about the command ipv6 unicast-routing?

This command is required for the operation of IPv6 routing on the device. Answer This important command has not been deprecated and is used to configure the router to actually route IPv6 packets. The command is not required for the configuration of static or dynamic IPv6 addresses.

Section: IP Routing Technologies Which of the following require too many interfaces and links to connect a router to each subnet on a LAN?

Use a router connected to each switch for each VLAN. Answer The use of a router connected to each switch for each VLAN would require too many interfaces and links and is not recommended or used, but can be done. Three options exist for connecting a router to each subnet on a VLAN. However, the first option requires too many interfaces and links, and is only mentioned to make the list complete: Use a router, with one router LAN interface and cable connected to the switch for each and every VLAN (typically not used). Use a router, with a VLAN trunk connecting to a LAN switch. Use a Layer 3 switch.

Section: Chapter 26 - Advanced IPv4 Access Control Lists Which of the following commands matches all IP packets that are sourced from subnet 172.16.64.0/22, destined to subnet 172.16.128.0/23?

access-list 101 permit ip 172.16.64.0 0.0.3.255 172.16.128.0 0.0.1.255 Answer To find the right wildcard mask to match all hosts in a subnet, subtract the subnet mask from 255.255.255.255. In this case, the source subnet uses a prefix mask of /22, so the Dotted Decimal Notation (DDN) equivalent is 255.255.252.0. Subtract that from 255.255.255.255, per octet, and you get 0.0.3.255. Use the subnet ID (172.16.64.0) with this wildcard to match the source addresses in that subnet. Similarly, for the destination address, convert the prefix mask of /23 to its DDN equivalent of 255.255.254.0. Then subtract it from 255.255.255.255, per octet, to find the wildcard mask of 0.0.1.255. Use the subnet ID (172.16.128.0) with this wildcard to match the destination addresses in that subnet.

Section: LAN Switching Technologies What command would you enter to overwrite the startup config file with the currently running configuration file?

copy running-config startup-config Answer If you wanted to keep the new configuration commands that you added in configuration mode, you would enter the command copy running-config startup-config. This command overwrites the current startup config file with what is currently in the running configuration file.

Section: Chapter 6 - Using the Command-Line Interface What command copies the configuration from RAM into NVRAM?

copy running-config startup-config Answer The startup-config file is in NVRAM, and the running-config file is in RAM.

Section: Chapter 26 - Advanced IPv4 Access Control Lists Refer to the diagram. Which cable type is used in the referenced location? access-list 10 permit 10.100.64.0 0.0.63.255 access-list 10 permit 172.16.1.0 0.0.0.255 access-list 10 permit 192.1.150.32 0.0.0.31

ip access-list standard ciscopress permit 10.100.64.0 0.0.63.255 permit 172.16.1.0 0.0.0.255 permit 192.1.150.32 0.0.0.31 Answer Named ACL syntax is similar to number ACLs—with a few differences. Yo configure named ACLs by first entering into a named ACL configuration mode. You enter this mode by using the ip access-list {standard | extended} acl-name command. You enter the individual statements using the permit and deny statements. The comparable named ACL for the displayed number ACL would be (config)#ip access-list standard ciscopress (config-std-nacl)#permit 10.100.64.0 0.0.63.255 (config-std-nacl)#permit 172.16.1.0 0.0.0.255 (config-std-nacl)#permit 192.1.150.32 0.0.0.31

Section: Chapter 32 - Implementing IPv6 Routing Refer to the diagram. An engineer is tasked with configuring a floating static route on R1. The faster path toward the 3000::/64 network should be prioritized over the other using an administrative distance of 10 versus an administrative distance of 20 for the slower path. Which command would correctly configure the higher priority route using an IPv6 next-hop address?

ipv6 route 3000::/64 2000::2 10 Answer A floating static route uses the same format as all IPv6 static routes but explicitly adds an administrative distance. In this case, the command to configure would be ipv6 route 3000::/64 2000::2 10. The second command would be ipv6 route 3000::/64 2001::2 20. Note, however, that the interface being used for the primary route must go down for the second route to be inserted into the routing table.

Section: Chapter 32 - Implementing IPv6 Routing Which Cisco IOS command would correctly route traffic destined for the 8163:bc23::4632:ac23:1:2/64 network using the fe80::1234:7484:26b4:2362 out the GigabitEthernet0/1 interface?

ipv6 route 8163:bc23::4632:ac23:1:2/64 Gi0/1 fe80::1234:7484:26b4:2362 Question 45 5.22 Question Difficulty incorrect Your Attempt 0:57 Your Time Section: Chapter 32 - Implementing IPv6 Routing Problem Mark Which Cisco IOS command would correctly route traffic destined for the 8163:bc23::4632:ac23:1:2/64 network using the fe80::1234:7484:26b4:2362 out the GigabitEthernet0/1 interface? ipv6 route 8163:bc23::4632:ac23:1:2/64 fe80::1234:7484:26b4:2362 ipv6 route 8163:bc23::4632:ac23:1:2/64 Gi0/1 link-local fe80::1234:7484:26b4:2362 ip route v6 8163:bc23::4632:ac23:1:2/64 Gi0/1 fe80::1234:7484:26b4:2362 ipv6 route 8163:bc23::4632:ac23:1:2/64 Gi0/1 fe80::1234:7484:26b4:2362 Answer The correct syntax for an IPv6 static route to an interface is ipv6 route prefix/prefix-length interface link-local-next-hop. In this case, the correct command would be ipv6 route 8163:bc23::4632:ac23:1:2/64 Gi0/1 fe80::1234:7484:26b4:2362.

Section: Chapter 36 - IOS License Management Which of the following answers lists a CLI command on a router that is useful when installing a right-to-use license onto a 2901 router that uses Cisco IOS licensing and an IOS universal image?

license boot module c2900 technology-package technology-package Answer To enable a right-to-use license, the customer does not need to receive a PAK. Instead, the customer references the specific license by name with the license boot command. Of the two answers that use this command, only one of them happens to use the correct syntax. Once the configuration is added and saved, the router starts using the license after the next reload.

Section: Chapter 8 - Configuring Basic Switch Management Which of the following line subcommands tells a switch to wait until a show command's output has completed before displaying log messages on the screen?

logging synchronous Answer The logging synchronous line subcommand synchronizes log message display with other command output so the log message does not interrupt a show command's output. The no ip domain-lookup command is not a line subcommand. The other two incorrect answers are line subcommands, but do not configure the function listed in the question.

Section: Chapter 19 - Learning IPv4 Routes with RIPv2 Refer to the diagram. Using the fewest commands, which commands would be used to enable all interfaces on R1 to be included in the RIP routing process?

network 10.0.0.0 network 20.0.0.0 network 30.0.0.0 Answer When specific interfaces to be included in the RIP process are configured, the network network RIP configuration mode command is used. The network in this case is a network number. Using classful rules, all interfaces that fall under this network will be included within the RIP process. For this scenario, three different interfaces need to be included, all of which are in different classful networks; because of this, three commands are required: network 10.0.0.0, network 20.0.0.0, and network 30.0.0.0.

Section: Chapter 33 - Device Management Protocols Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface?

ntp master 2 Answer A few different commands are typically used to configure basic NTP; they include the ntp server, ntp peer, and the ntp master commands. The ntp server command indicates that a device intends to get its time from the configured server but is unwilling to give it to that server (it can, however, give time to other devices, as long as its primary source is active). The ntp peer command indicates that a device intends to get its time from the configured peer and is willing to give its time to that peer should that peer lose its primary clock source (this is usually configured as a backup configuration). The ntp master command configures a device as an authoritative clock source. This command is usually used along with the ntp server command on core devices to ensure that if the core device loses its primary clock source (as configured with the ntp server command), it can still offer an authoritative clock source to other devices that use it as their primary clock source. In this scenario, R1 would need to be configured with the ntp master 2 command to allow other devices to use it as their time source.

Section: Chapter 19 - Learning IPv4 Routes with RIPv2 Which Cisco IOS command can be used to disable all RIPv2 updates from being sent out any interface by default?

router(config-router)#passive-interface default Answer The command to control RIPv2 routing advertisements going out any interface by default are controlled by the passive-interface default command, which is configured within RIP router configuration mode.

Section: IP Routing Technologies Problem Which of the following commands enables a Cisco switch to support IP routing?

sdm prefer lanbase-routing Answer when a switch is capable of routing IP packets, among the other steps involved, the engineer will start by configuring the switch allow IP routing via the IOS command "sdm prefer lanbase-routing".

Section: Troubleshooting What command specifies if an ACL exists for an interface?

show ip interface Answer The "show ip interface" command will specify if an ACL exists for an interface.

Section: LAN Switching Technologies What command is used to determine the uptime of a router or switch?

show version Answer show version in privilege exec mode. The "show version" command list many facts including uptime and reason for last load of the IOS. It also shows IOS version, list ports and displays model number and many other interesting facts.

Section: IP Routing Technologies Which of the following commands displays information such as what VLAN an interface is in and packet statistics for each trunking interface on a router?

show vlan The Cisco command 'show vlan' lists information such as which trunk interfaces on a router correspond to which VLANs, which VLAN is the native VLAN, and some packet statistics.

Section: Troubleshooting What command will list both access and trunk ports in a VLAN?

show vlan id num Answer The "show vlan id [num]" command will list both access and trunk ports in a VLAN. Table 12-3 Commands That Can Find Access Ports and VLANs - Chapter 12


Kaugnay na mga set ng pag-aaral

International Business Chapter 18

View Set

Les Phrases d'ASP - Antériorité, Simultanéité, et Postériorité

View Set

LC18: LearningCurve - Ch. 18: Game Theory and Strategic Choices

View Set

Potter-Perry Chapter 48 Skin Integrity and Wound Care, funds exam 3, Potter and Perry Chapter 39

View Set

ap world college board questions unit 1-4 & midterm review

View Set