CCNA 200-125 Exam Part 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %lineproto-updown:line protocol on interface fastethernet0/0, change state to down What facility generated this message?

%lineproto

On a Windows computer, what commands do you use to release an IP address obtained from DHCP and request a new address?

* To release the IP address: ipconfig /release * To request a new address: ipconfig /renew

Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %lineproto-updown:line protocol on interface fastethernet0/0, change state to down What is the severity level of this message?

-5-

A network host has an IP address of 137.65.1.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address?

/16

A network host IP address of 10.10.0.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address?

/8

Match each route type o the left with its default administrative distance on the right

0-Connnected 1-Static 20-BGP 90-EIGRP 110-OSPF 120-RIP

You want to create an ACL statement that allows traffic from any network. Which network address and wildcard mask value should you use?

0.0.0.0 255.255.255.255

You are configuring OSPF for area 0. SubnetA uses an address of 172.16.20.48/28. which wildcard mask value would you use for the network statement?

0.0.0.15

You want to create an ACL that prevents all traffic sent from network 178.68.48.0/20. Which wildcard mask value would you use?

0.0.15.255

You are configuring ACLs on a router and want to deny traffic being sent to the 10.10.16.0/21 network. Which wildcard mask should you use with the access-list statement?

0.0.7.255

You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a photograph to workstation3. Which destination MAC address does workstation1 use?

000b5f2a2222

You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a text document to workstation2. Which destination address does workstation1 put in the ethernet frame header?

080046987654

Which of the following configurations register values tells the router to use configuration information from NVRAM>

0x2102

You have a group of routers switches a hub and workstations connected as shown in the graphic. No VLANS have been configured. How many broadcast domains are there?

1

How many vlans can a server mode switch use

1-1005 but technically 2-1001. Vlan 1 is default and vlans 1002-1005 are reserved.

How many vlans can a transparent mode switch use?

1-4094

What is the standard access list range?

1-99 1300-1999

What are the standard ACL ranges?

1-99 and 1300-1999

Match the address on the left with the routing protocol that uses the address on the right : 1. RIP v1 updates 2. RIP v2 updates 3. EIGRP hello packets 4. EIGRP updates 5. OSPF hello packets 6. OSPF updates to the DR

1. 255.255.255.255 2. 224.0.0.9 3. 224.0.0.10 4. unicast 5. 224.0.0.5 6. 224.0.0.6

Match the default administrative distance with the route type 1. EIGRP internal routes 2. EIGRP external routes 3. OSPF 4. RIP 5. Static Routes

1. 90 2. 170 3. 110 4. 120 5. 1

How is the designated port chosen?

1. Lowest cost 2. Lowest bridge id 3. Lowest port

What order does spanning tree use to find the best path to the root bridge?

1. Lowest cost 2. Lowest bridge id 3. Lowest port number

Match the routing characteristic on the left with the routing protocol on the right 1. EIGRP Characteristics 2.OSPF Characteristics

1. Supports autosummarization Unequal-cost load balancing DUAL 2. Open Standard DR and BDR Dijkstra SPF

What is the max age in STP?

10 times whatever the hello is. Normally 20sec

What is the correct decimal form of the following binary IP address? 00001010.00000000.01100100.00011101

10.0.100.29

Which of the following are private IP addresses? select two

10.244.12.16 192.168.250.11

You have issued the following commands at the server console router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any router(config)#int eth router(config-if)#ip access-group 122 out from which three of the following address will TCP traffic be forwarded out the eth 0 interface?

10.6.0.12 10.6.0.224 10.6.0.11

What is the cost of a 10mbps link in spanning tree?

100

What is the extended access list range

100-199 2000-2699

What are the extended acl ranges?

100-199 and 2000-2699

An Ethernet network meets the specification for ethernet 1000BaseT. A single server is connected to a port on the switch. the switch port is configured for auto-detect. What is the available bandwidth on the server cable segment

1000 Mbps if the server NIC is half duplex; 2000 Mbps if the server NIC is set to full duplex

What is the default administrative distance for OSPF ?

110

What is the default administrative distance for OSPF?

110

What is the correct binary form of the decimal IP address 192.168.1.1?

11000000.10101000.00000001.00000001

What is special about IP address 127.0.0.1?

127.0.0.1 is the loopback address. The loopback address is used to test the proper installation of the IP stack.

What is the maximum data rate of an ISDN Bri line?

128Kbps

You have a network address of 129.111.0.0 and a subnet mask of 255.255.224.0. Which two of the following are valid subnet addresses

129.111.160.0 129.111.96.0

You have a network address of 129.111.0.0 and a subnet mask of 255.255.224.0. Which three of the following are valid host addresses for subnet 129.111.64.0?

129.111.89.0 129.111.65.11 129.111.93.166

You have a network address of 129.111.0.0 and a subnet mask of 255.255.224.0. Which two of the following are valid subnet address?

129.111.96.0 129.111.160.0

You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which three of the following are valid host addresses for subnet 132.66.160.0?

132.66.188.88 132.66.161.0 132.66.175.252

You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which three of the following are valid host addresses for the subnet 132.66.160.0?

132.66.188.88 132.66.161.0 132.66.175.252

You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which four of the following are valid subnet addresses?

132.66.192.0 132.66.224.0 132.66.96.0 132.66.0.0

You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which four of the following are valid subnet addresses?

132.66.96.0 132.66.192.0 132.66.0.0 132.66.224.0

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.224. Which three of the following are valid subnet addresses?

133.233.11.240 133.233.11.176 133.233.11.48

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many possible host addresses are one each subnet, excluding subnet address and broadcast address?

14

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many possible host addresses on each subnet excluding subnet address and broadcast address?

14

Which of the following IP addresses is a valid IP address for a host on a public network?

142.15.6.1

How long is the forward delay in STP?

15 sec

You have a network address of 199.112.199.0 and have selected 255.255.255.240 as the subnet mask value. How many possible subnets are there?

16

You have been assigned the IP network address of 135.65.0.0 and have selected 255.255.240.0 as the subnet mask. How many valid subnet addresses are available?

16

You have a network address of 160.88.0.0 with a subnet mask of 255.255.248.0. Which of the following is the broadcast address for subnet 160.88.64.0?

160.88.71.255

A configured threshold has been exceeded by an network host that is being monitored by an SNMP agent. The agent sends a trap to its SNMP manager with a notification that the threshold has been exceeded. Which IP port is used by the agent to send the trap?

162

Which of the following is not one of the ranges of private P addresses that are commonly used behind a NAT router?

169.254.0.1 - 169.254.255.254

You have a network with three routers as shown in the exhibit. All routers are configured to share information for all know routes using the same routing protocol. Automatic summarization is enabled. Router B shares its known network with router C. Which of the following routes will be routers Cs routing table?

172.16.0.0/16

You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. What routes will routerB have in its routing table that it has learned from routerA?

172.16.0.0/16

You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set 172.16.0.0/28 is subsetted, 5 subnets C 172.16.0.0 is directly connected, fastethernet0/0 C 172.16.0.32 is directly connected, fastethernet0/1 R 172.16.0.96[120/1] via 172.16.0.12, 00:00:25, fi0/0 R 172.16.0.128 [120/2] via 172.16.0.12, 00:00:25, fi0/0 R 172.16.0.144 [120/1] via 172.16.0.33, 00:00:25, fi0/1 Match the router interface on the left with the address used to reach the destination network

172.16.0.19 Dropped Packet 172.16.0.109 fastethernet0/0 172.16.0.158 fastethernet0/1 172.16.0.178 Dropped Packet

You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. What routes will routerB have in its routing table that it has learned from routerA?

172.16.1.64/27 and 172.16.1.96/28

You have configured OSPF routing on RouterA. A partial configuration is shown below. RouterA is connected to RouterB thorough the serial link. What routes will ROuterB have in its routing table that it has learned from RouterA

172.16.1.64/27 and 172.16.1.96/28

You have a network with three routers as shown in the exhibit. All routers are configured to share information for all known routes using the same routing protocol. Automatic summarization is enabled. RouterB shares its know networks with routerA. Which of the following routes will be in router As routing table?

172.16.2.0/27, 172.16.2.32/28, abd 172.16.2.48/28

What is the cost of a 100mbps link in spanning tree?

19

A workstation has been assigned the following IP addressing information: IP address 192.168.1.26 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.254 DNS server: 192.168.1.1 Given this information, what is the IP address of the network this host resides?

192.168.1.0

You use the show ip route command on your router and see the information shown below. Gateway of last resort is 192.168.2.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 C 192.168.11.0/24 is directly connected, fastehternet1/0 R 192.168.15.0/24 [120/1] via 192.168.1.15, 00:00:25, fi0/0 R 192.168.20.0/24 [120/1] via 192.168.1.15, 00:00:25, fi0/0 R 192.168.25.0/24 [120/1] via 192.168.1.15, 00:00:12, fi1/0 S* 0.0.0.0/0 [1/0] via 192.168.2.12 Match the router interface on the left with the address used to reach the destination network

192.168.1.45 fastethernet0/0 192.168.11.166 fastehternet1/0 192.168.3.45 fastethernet0/1 192.168.15.192 fastethernet0/0 192.168.25.211 fastehternet1/0 192.168.111.30 fastethernet0/1

You have several hosts, a switch and a router as shown in the exhibit. Workstation2 sends an IP packet to workstation3. Which default gateway address is used by workstation2?

192.168.10.1

You have a network with two routers as shown in the exhibit. RouterA and RouterB are configured to use RIP version 2 with auto-sumerization enabled. Which summarized network entry will RouterA have in its routing for the subnets connected to routerB?

192.168.12.0/24

You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. Which of the following addresses could Srv2 receive when it boots?

192.168.12.166

You need to connect a router to a subnet. The subnet uses 192.168.12.0 subnet address with a 26-bit subnet mask. You are instructed to assign the last IP address on the subnet to the router. Which IP address will you use?

192.168.12.62

You have configured routerA, routerB, and routerC as shown in the exhibit. No loopbacks interfaces have been configured. hostname C router ospf 600 network 172.16.32.1 0.0.0.0 area 100 network 192.168.2.1 0.0.0.0 area 100 What is the default router id of router C?

192.168.2.1

A host on has an IP address of 197.65.251.125 with a subnet mask of 255.255.255.240. What is the subnet address of this host?

197.65.251.112

A host on the network has an IP address of 197.65.251.125 with a subnet mask of 255.255.255.240. What is the subnet address of this host?

197.65.251.112

What is the cost of a 10gbps link in spanning tree?

2

You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?

2

What are the port numbers for FTP?

20 and 21 FTP uses port 20 for data transfer and port 21 is the command port.

What is the broadcast address for subnet 200.195.55.64/29

200.195.55.71

Which of the following numbering ranges are used by extended ACLs? select two

2000-2699 100-199

Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that has been configured incorrectly

2001:0BAD:0003::2/64

Based on the address prefix, for each IPv6 address on the right, identify the address type from the list on the left. Addresses used might not represent actual addresses used in production)

2001:6789:9078:ABCE:AFFF:FE98:0001 Global Unicast FD00::8907:FF:FE76:ABC Unique Local FEA0::AB89:9FF:FE77:1234 Link-Local FF00:98BD:6532::1 Multicast FF02::1:2 Multicast

You have a network address of 207.79.187.0 and a subnet mask of 255.255.255.192. Which three of the following are valid subnet addresses?

201.79.187.128 201.79.187.64 201.79.187.192

You have a network address of 201.79.187.0 and a subnet mask of 255.255.255.192. Which three of the following are valid host addresses for subnet 201.79.187.128?

201.79.187.166 201.79.187.132 201.79.187.189

A host on has an IP address of 201.79.187.236 with a subnet mask of 255.255.255.192. What is the subnet address of this host?

201.79.187.192

What is the last host IP address on a subnet 202.177.48.64 if the mask value is 255.255.255.240?

202.177.48.78

What is the last host IP address on subnet 202.177.48.64 if the mask value is 255.255.255.240?

202.177.48.78

You have a network address of 202.200.55.0 with a subnet mask of 255.255.255.224. Which of the following is the broadcast address for subnet 202.200.55.96?

202.200.55.127

What is the port number for SSH?

22

Given that an IPv4 address is a 32-bit binary number in four octets (four 8-bit values), which of the following are valid IP addresses? select three

224.0.0.1 137.65.1.1 172.12.1.3

What is the port number for Telnet?

23

You have a network address of 233.233.11.0 and a subnet mask of 255.255.255.240. Which three of the following are valid host addresses for subnet 233.233.11.32?

233.233.11.44 233.233.11.33 233.233.11.39

A host on has an IP address of 223.233.11.101 with a subnet mask of 255.255.255.240. What is the subnet address of this host?

233.233.11.96

What is the port number for SMTP?

25

Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network? select two

254 host addresses are available 172.17.2.0 is a valid subnet

How many hosts are available for use in a default Class C network?

254 hosts are available. A default Class C network uses 8 bits for host addresses. Thus 28 - 2 = 254.

How many usable IP addresses are provided in a default Class C network address?

254 usable IP addresses are provided. The default subnet mask for a Class C address is 255.255.255.0, or /24. This means that 24 bits are used for the network number and 8 bits are reserved for hosts. 28 = 256. However, because two addresses are reserved for the network address and broadcast address, the amount of usable IP addresses is 254. The formula to calculate usable IP addresses is 2n-2, where n is the number of host bits.

Drag each binary subnet mask on the left to the appropriate decimal equivalent on the right.

255.0.0.0 11111111.00000000.00000000.00000000 255.255.255.128 11111111.11111111.11111111.10000000 255.254.0.0 11111111.11100000.00000000.00000000 255.255.0.0 11111111.11111111.00000000.00000000 255.255.255.252 11111111.11111111.11111111.11111100

Drag each binary subnet mask on the left to the appropriate decimal equivalent on the right.

255.254.0.0 11111111.11111110.00000000.00000000 255.255.255.224 11111111.11111111.11111111.11100000 255.248.0.0 11111111.11111000.00000000.00000000 255.255.255.0 11111111.11111111.11111111.00000000 255.255.255.248 11111111.11111111.11111111.11111000

You have been assigned an IP address of 131.66.0.0 for your network. You have determined that you need 16 subnets to allow for growth. What subnet mask value would you use?

255.255.240.0

You have been assigned the IP address of 140.225.0.0 for your network. You have determined that you need 39 subnets to allow for growth. What subnet mask value would you use?

255.255.252.0

You have been assigned the iP address of 140.225.0.0 for your network. You have determined that you need 39 subnets to allow for growth. What subnet mask value would you use?

255.255.252.0

Your client has a Class B network address and needs to support 60 subnets. Which subnet mask would you recommend?

255.255.252.0

Your client has a Class B network address and needs to support 500 hosts on as many subnets as possible. Which subnet mask would you recommend?

255.255.254.0

Your network has been assigned 168.11.0.0 as the network address. You have determined that you need 70 subnets. Which subnet mask value should you select to provide 70 subnets?

255.255.254.0

Your network has ben assigned 200.55.6.0 as the network address. You have determined that you need four subnets. Which of the following should you use as your subnet mask to provide four subnets?

255.255.255.192

You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 host per subnet. Which subnet mask should you use?

255.255.255.224

You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 hosts per subnet. Which subnet mask should you use?

255.255.255.224

You have been assigned the IP address 197.177.25.0 for your network. You have determined that you need 5 subnets to allow for growth. What subnet mask value would you use?

255.255.255.224

You have been assigned the IP address of 195.11.13.0 for your network. You have determined that you need 8 subnets to allow for growth. What subnet mask value would you use?

255.255.255.224

Your network has been assigned 200.55.6.0 as the network address. You have determined that you need six subnets. Which of the following should you use as your subnet mask to provide six subnets?

255.255.255.224

You are configuring a network and have been assigned the network address of 211.109.55.0. You want to subnet the network to allow for 10 subnets with 7 hosts per subnet. Which subnet mask should you use?

255.255.255.240

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. how many commands in global configuration mode begin with the letters de?

3

What is the default priority number for a switch?

32769

What is the cost of a 1gbps link in spanning tree?

4

You have a group of routers switches a hub and workstations connected as shown in the graphic. No VLANS have been configured. How many broadcast domains are shown in the graphic?

4

You have a group of routers switches a hub and workstations connected as shown in the graphic. No VLANS have been configured. How many collision domains exist on the network shown?

4

You have a group of routers switches a hub and workstations connected as shown in the graphic. No VLANS have been configured. How many collision domains exist?

4

You have a network consisting of routers, switches, a hub, and workstations connected as shown in the graphic. No VLANs have been configured. How many collision domains exist in this network?

4

You have a network address of 132.66.0.0 and a subnet mask of 255.255.254.0. How many possible host addresses are one each subnet, excluding subnet address and broadcast address?

510

You have a network address of 132.66.0.0 and a subnet mask of 255.255.254.0. How many possible host addresses on each subnet excluding subnet addresses of all 1's and 0's?

510

What is the port number for DNS?

53

What is a protocol that uses TCP and udp?

53 DNS

How many hosts are available for use in a default Class B network?

65,534 addresses are available. A default Class B network uses 16 bits for host addresses; thus 216 - 2 = 65,534.

Your network uses a network address of 137.65.0.0 with a subnet mask of 255.255.0.0. How many address are available for assignment to network hosts on this network?

65534

What is the port number for TFTP?

69

You have a group of routers switches a hub and workstations connected as shown in the graphic. No VLANS have been configured. How many collision domains exist?

7

What is the protocol for regular spanning tree?

802.1d

What is the protocol for rapid spanning tree?

802.1w

Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?

::1

Which of the following are correctly-formatted IPv6 addresses? select three

::DAFC:8904 2001::78:ABC:891F FE80::AB01:7894

While working at the console of a Cisco device, you need to view a list of the commands that are available in the current mode. Which command should you use?

?

RouterA is connected to RouterB through serial1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which set of commands would you use on RouterA to complete the configuration?

A

Which of the two following statements about Dynamic Host Configuration Protocol (DHCP) are true?

A DCHP server assigns addresses to requesting hosts It can deliver configuration information in addition to IP addresses

Which of the following statements about the dynamic host configurations protocol (DHCP) are true? select two

A DHCP server assigns addresses to requested hosts It can deliver other configuration information in addition to IP addresses

You have three switches configured as shown in the exhibit. For each port, identify the port role and statues after spanning tree convergence by matching the port states on the left with the ports on the graphic.

A GI0/1 Altn BLK A GI0/2 Root FWD B GI0/1 Desg FWD B GI0/2 Desg FWD C GI0/1 Desg FWD C GI0/2 Root FWD

You have three switches configured as shown in the exhibit. For each port, identify the port role and statues after spanning tree convergence by matching the port states on the left with the ports on the graphic.

A GI0/1 Root FWD A GI0/2 Desg FWD B GI0/1 Root FWD B GI0/2 Altn BLK C GI0/1 Desg FWD C GI0/2 Desg FWD

What is a TCP window?

A TCP window determines the number of segments that can be sent before an acknowledgment is required. Note: TCP uses a "sliding window" technique to specify the number of segments that the recipient can accept. Sliding means that the window size is negotiated dynamically during the TCP session.

What is a TCP/IP socket?

A TCP/IP socket is an IP address combined with a TCP or UDP port number. When a host wants to talk to another host, it sends its IP address along with the application (port number) it wants to communicate with. For example, if host 192.168.0.3 wants to talk to host 192.168.0.2 by email, host 192.168.0.3 sends its IP address and destination port number (192.168.0.3:1023) to host 192.168.0.2 with the port number it wants to communicate with (192.168.0.2:25).

Which of the following is required before you can create an SVI?

A VLAN must be created in the VLAN database

What is the effect of using the channel-group 3 mode desirable interface configuration command? select two

A channel is formed with another port group interface in either the auto or desirable mode The command configures the interface to actively negotiate the ether channel for PAgP channel group 3

What is the effect of using the channel-group 2 mode passive interface configuration command? select two

A channel is formed with another port group interface only if it is in active mode The command configures the interface in a passive negotiating state and forms an ether channel if the port receives LACP packets

Revue te iytoyr fri tge sgiw ubterfaces fa0/1 command on the switch2 with in the exhibit. What is wrong with the fat/1 interface in this example?

A duplex mismatch exist with the device on teh oterh end of the connection

IP traffic from a device configured with the address 10.10.34.4/24 is congesting the network. The network administrator issues a trace route command from the local router and receives the output show below. What is the cause of the problem?

A loop exists between two of the routers

Which of the following best describes the various VRRP group roles? select two

A master router forwards traffic destined to the virtual IP address A backup router will become the master router should the existing master router fail

Which of the following best describes a switch virtual interface (SVI) on a multi-layer switch? select two

A multi-layer switch treats SVI as a physical link through witch it can route traffic. A SVI is most commonly implemented to interconnect the VLANs between distributed and access switches in a multi-switch network

You have issues the following command on your router. Router9config)#ip route 202.22.12.0 255.255.255.0 192.168.1.1 Which of the following are configured by the parameters in this command? select two

A route to network 202.22.12.0 is added The next hop router address is 192.168.1.1

What is the difference between a routed and a routing protocol?

A routed protocol is a protocol that provides the information in its network layer to allow a packet to direct traffic and defines the use of fields within a packet. Examples of routed protocols are IPv4 and IPv6. A routing protocol finds routes in an internetwork and maintains route awareness. Routing protocols aid in building and maintaining routing tables that routers will use to determine how routed protocols are routed. Routing Information Protocol v2 (RIPv2), Enhanced IGRP (EIGRP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP) are examples of routing protocols.

How does a router determine the path a packet should take to reach its destination?

A router determines a path a packet should take to reach a destination by picking the best path to the destination. The best path a packet should take is determined by one of the following methods: * Static routing * Dynamic routing * Default routing

Which of the following devices is most likely to be assigned a public IP address?

A router that connects your home network to the internet.

Multiple VLANs have been created on a switched internetwork. How will these VLANs affect the functions of the spanning tree protocol?

A separate Spanning Tree exists for each VLAN

Which of the following correctly describes the T1 carrier system? select two

A single T1 channel can transfer data at 64 Kbps T1 lines use two pairs of copper wire

Which of the following best describes the various HSRP group roles? select two

A standby router will become the active router should the existing active router fail An active router forwards traffic destined to the virtual IP address

What is true regarding the following partial output in the running configuration file? select two Router#show run !interface fa 0/0 ip address 10.2.30.2 255.255.255.224 ! <output omitted> ! logging on logging host 10.2.30.253 logging trap 4 logging source-interface fa 0/0 !

A syslog server will receive error messages sent from 10.2.30.2 A syslog server will receive warning messages sent from 10.2.30.2

After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission? A. Exhibit A B. Exhibit B C. Exhibit C D. Exhibit D E. Exhibit E F. Exhibit F

A. 192.168.4.7 000f.2480.8916 dynamic

36. Which switch would STP choose to become the root bridge in the selection process? A. 32768: 11-22-33-44-55-66 B. 32768: 22-33-44-55-66-77 C. 32769: 11-22-33-44-55-65 D. 32769: 22-33-44-55-66-78

A. 32768: 11-22-33-44-55-66

72. Which three of these statements regarding 8O2.1Q trunking are correct? (Choose three.) A. 8O2.1Q native VLAN frames are untagged by default. B. 8O2.1Q trunking ports can also be secure ports. C. 8O2.1Q trunks can use 1O Mb/s Ethernet interfaces. D. 8O2.1Q trunks require full-duplex, point-to-point connectivity. E. 8O2.1Q trunks should have native VLANs that are the same at both ends.

A. 8O2.1Q native VLAN frames are untagged by default. C. 8O2.1Q trunks can use 1O Mb/s Ethernet interfaces E. 8O2.1Q trunks should have native VLANs that are the same at both ends.

35. Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.) A. 8O2.1d B. VTP C. 8O2.1q D. STP E. SAP

A. 8O2.1d D. STP

4. Which of the following describes the roles of devices in a WAN? (Choose three.) A. A CSU/DSU terminates a digital local loop. B. A modem terminates a digital local loop. C. A CSU/DSU terminates an analog local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device. F. A router is commonly considered a DCE device.

A. A CSU/DSU terminates a digital local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device.

Which of the following describes the roles of devices in a WAN? (Choose three.) A. A CSU/DSU terminates a digital local loop. B. A modem terminates a digital local loop. C. A CSU/DSU terminates an analog local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device. F. A router is commonly considered a DCE device.

A. A CSU/DSU terminates a digital local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device.

38. What are three benefits of implementing VLANs? (Choose three.) A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic. B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure. C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size. E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size. F. VLANs make it easier for lT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain. G. Port-based VLANs increase switch-port use efficiency, thanks to 8O2.1Q trunks.

A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic. C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.

What are three benefits of implementing VLANs? (Choose three.) A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic. B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure. C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size. E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size. F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain. G. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.

A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic. C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.

The output that is shown is generated at a switch. Which three statements are true? (Choose three.) A. All ports will be in a state of discarding, learning, or forwarding. B. Thirty VLANs have been configured on this switch. C. The bridge priority is lower than the default value for spanning tree. D. All interfaces that are shown are on shared media. E. All designated ports are in a forwarding state. F. This switch must be the root bridge for all VLANs on this switch.

A. All ports will be in a state of discarding, learning, or forwarding. C. The bridge priority is lower than the default value for spanning tree. E. All designated ports are in a forwarding state.

92. Which parameter or parameters are used to calculate OSPF cost in Cisco routers? A. Bandwidth B. Bandwidth and Delay C. Bandwidth, Delay, and MTU D. Bandwidth, MTU, Reliability, Delay, and Load

A. Bandwidth

After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission? A. Exhibit A B. Exhibit B C. Exhibit C D. Exhibit D E. Exhibit E F. Exhibit F

A. Exhibit A

56. Which three statements about RSTP are true? (Choose three.) A. RSTP significantly reduces topology reconverging time after a link failure. B. RSTP expands the STP port roles by adding the alternate and backup roles. C. RSTP port states are blocking, discarding, learning, or forwarding. D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does. E. RSTP also uses the STP proposal-agreement sequence. F. RSTP uses the same timer-based process as STP on point-to-point links.

A. RSTP significantly reduces topology reconverging time after a link failure. B. RSTP expands the STP port roles by adding the alternate and backup roles. D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

Which three statements about RSTP are true? (Choose three.) A. RSTP significantly reduces topology reconverging time after a link failure. B. RSTP expands the STP port roles by adding the alternate and backup roles. C. RSTP port states are blocking, discarding, learning, or forwarding. D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does. E. RSTP also uses the STP proposal-agreement sequence. F. RSTP uses the same timer-based process as STP on point-to-point links.

A. RSTP significantly reduces topology reconverging time after a link failure. B. RSTP expands the STP port roles by adding the alternate and backup roles. D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down.Which of the following are true? (Choose two.) A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached. B. Router C will use ICMP to inform Router B that Host 2 cannot be reached. C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached. D. Router C will send a Destination Unreachable message type. E. Router C will send a Router Selection message type. F. Router C will send a Source Quench message type.

A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached. D. Router C will send a Destination Unreachable message type.

21. Host 1 is trying to communicate with Host 2. The eO interface on Router C is down. Which of the following are true? (Choose two.) A. Router C will use lCMP to inform Host 1 that Host 2 cannot be reached. B. Router C will use lCMP to inform Router B that Host 2 cannot be reached. C. Router C will use lCMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached. D. Router C will send a Destination Unreachable message type. E. Router C will send a Router Selection message type. F. Router C will send a Source Quench message type.

A. Router C will use lCMP to inform Host 1 that Host 2 cannot be reached. D. Router C will send a Destination Unreachable message type.

What will Router1 do when it receives the data frame shown? (Choose three.) A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. E. Router1 will forward the data packet out interface FastEthernet0/1. F. Router1 will forward the data packet out interface FastEthernet0/2.

A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. F. Router1 will forward the data packet out interface FastEthernet0/2.

What will Router1 do when it receives the data frame shown? (Choose three.) A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. E. Router1 will forward the data packet out interface FastEthernet0/1. F. Router1 will forward the data packet out interface FastEthernet0/2.

A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. C. Router1 will strip off the destination MAC address and replace it with the MAC address F. Router1 will forward the data packet out interface FastEthernet0/2.

What will Router1 do when it receives the data frame shown? (Choose three.) A. Router1 will strip off the source MAC address and replace it with the MAC address OOOO.Oc36.6965. B. Router1 will strip off the source lP address and replace it with the lP address 192.168.4O.1. C. Router1 will strip off the destination MAC address and replace it with the MAC address OOOO.OcO7.432O. D. Router1 will strip off the destination lP address and replace it with the lP address of 192.168.4O.1. E. Router1 will forward the data packet out interface FastEthernetO/1. F. Router1 will forward the data packet out interface FastEthernetO/2.

A. Router1 will strip off the source MAC address and replace it with the MAC address OOOO.Oc36.6965. C. Router1 will strip off the destination MAC address and replace it with the MAC address OOOO.OcO7.432O. F. Router1 will forward the data packet out interface FastEthernetO/2.

Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.) A. SwitchA, Fa0/2, designated B. SwitchA, Fa0/1, root C. SwitchB, Gi0/2, root D. SwitchB, Gi0/1, designated E. SwitchC, Fa0/2, root F. SwitchD, Gi0/2, root

A. SwitchA, Fa0/2, designated B. SwitchA, Fa0/1, root F. SwitchD, Gi0/2, root

Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.) A. SwitchA, FaO/2, designated B. SwitchA, FaO/1, root C. SwitchB, GiO/2, root D. SwitchB, GiO/1, designated E. SwitchC, FaO/2, root F. SwitchD, GiO/2, root

A. SwitchA, FaO/2, designated B. SwitchA, FaO/1, root F. SwitchD, GiO/2, root

10. Which of the following correctly describe steps in the OSl data encapsulation process? (Choose two.) A. The transport layer divides a data stream into segments and may add reliability and flow control information. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.

A. The transport layer divides a data stream into segments and may add reliability and flow control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.) A. The transport layer divides a data stream into segments and may add reliability and flow control information. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.

A. The transport layer divides a data stream into segments and may add reliability and flow control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.) A. The transport layer divides a data stream into segments and may add reliability and flow control information.. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.

A. The transport layer divides a data stream into segments and may add reliability and flow control information.. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

18. Which of the following statements describe the network shown in the graphic? (Choose two.) A. There are two broadcast domains in the network. B. There are four broadcast domains in the network. C. There are six broadcast domains in the network. D. There are four collision domains in the network. E. There are five collision domains in the network. F. There are seven collision domains in the network.

A. There are two broadcast domains in the network. F. There are seven collision domains in the network.

Which of the following statements describe the network shown in the graphic? (Choose two.) A. There are two broadcast domains in the network. B. There are four broadcast domains in the network. C. There are six broadcast domains in the network. D. There are four collision domains in the network. E. There are five collision domains in the network. F. There are seven collision domains in the network.

A. There are two broadcast domains in the network. F. There are seven collision domains in the network.

80. What are three advantages of VLANs? (Choose three.) A. VLANs establish broadcast domains in switched networks. B. VLANs utilize packet filtering to enhance network security. C. VLANs provide a method of conserving lP addresses in large networks. D. VLANs provide a low-latency internetworking alternative to routed networks. E. VLANs allow access to network services based on department, not physical location. F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

A. VLANs establish broadcast domains in switched networks. E. VLANs allow access to network services based on department, not physical location. F. VLANs can greatly simplify adding, moving, or changing hosts on the network

60. Which two benefits are provided by creating VLANs? (Choose two.) A. added security B. dedicated bandwidth C. provides segmentation D. allows switches to route traffic between subinterfaces E. contains collisions

A. added security C. provides segmentation

Which two benefits are provided by creating VLANs? (Choose two.) A. added security B. dedicated bandwidth C. provides segmentation D. allows switches to route traffic between subinterfaces E. contains collisions

A. added security C. provides segmentation

6. A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation? A. application B. presentation C. session D. transport E. internet F. data link

A. application

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation? A. application B. presentation C. session D. transport E. internet F. data link

A. application

75. Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state? A. converged B. redundant C. provisioned D. spanned

A. converged

42. Which two states are the port states when RSTP has converged? (Choose two.) A. discarding B. listening C. learning D. forwarding E. disabled

A. discarding D. forwarding

How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the switches? A. one B. two C. six D. twelve

A. one

31. What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning- tree topology? A. path cost B. lowest port MAC address C. VTP revision number D. highest port priority number E. port priority number and MAC address

A. path cost

61. Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN? A. ping address B. tracert address C. traceroute address D. arp address

A. ping address

43. Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.) A. show interface trunk B. show interface interface C. show ip interface brief D. show interface vlan E. show interface switchport

A. show interface trunk E. show interface switchport

Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server? A. the MAC address of router interface e0 B. the MAC address of router interface e1 C. the MAC address of the server network interface D. the MAC address of host A

A. the MAC address of router interface e0

Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server? A. the MAC address of router interface eO B. the MAC address of router interface e1 C. the MAC address of the server network interface D. the MAC address of host A

A. the MAC address of router interface eO

88. A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the lP address configured? A. the port-channel 1 interface B. the highest number member interface C. all member interfaces D. the lowest number member interface

A. the port-channel 1 interface

16. For what two purposes does the Ethernet protocol use physical addresses? (Choose two.) A. to uniquely identify devices at Layer 2 B. to allow communication with devices on a different network C. to differentiate a Layer 2 frame from a Layer 3 packet D. to establish a priority system to determine which device gets to transmit first E. to allow communication between different devices on the same network F. to allow detection of a remote device when its physical address is unknown

A. to uniquely identify devices at Layer 2 E. to allow communication between different devices on the same network

For what two purposes does the Ethernet protocol use physical addresses? (Choose two.) A. to uniquely identify devices at Layer 2 B. to allow communication with devices on a different network C. to differentiate a Layer 2 frame from a Layer 3 packet D. to establish a priority system to determine which device gets to transmit first E. to allow communication between different devices on the same network F. to allow detection of a remote device when its physical address is unknown

A. to uniquely identify devices at Layer 2 E. to allow communication between different devices on the same network

A host wants to send a message to another host with the IP address 115.99.80.157. The host does not know the hardware address of the destination device. which protocol can be used to discover the MAC address?`

ARP

Shown below is the partial configuration for a router as shown by the show run command. ! line con 0 exec-timeout 0 0 password cisco login line aux 0 line vty 0 4 exec-timeout 0 0 password study no login ! What will be the result of the configuration? select two

Access to the router through Telnet sessions is allowed without using a password. Access to the console require the use of cisco for the password

Your company has an email server with the IP address 172.16.2.13 as shown in the exhibit. You want to deny all traffic destined to this email server except email traffic. Which of the following set of statements will accomplish your goal?

Access-list 101 permit tcp any 172.16.2.13 0.0.0.0 eq smtp interface ethernet 1 ip access-group 101 out

You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. When it boots, it does not receive and IP address from the DHCP service. What should you do?

Add a DHCP pool for network 192.168.12.0/24

You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. When it boots, it is assigned the IP address of 192.168.11.166. However, it can only communicate with hosts on the same subnet. What should you do to correct the problem?

Add a default-router statement to dhcp pool 2

You have configured OSPF routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. When you check routerA, it has bot learned of any routes connected to routerB. What should you do to correct the problem?

Add a network statement that uses a network of 172.16.1.32 and a wildcard mask of 0.0.0.31

Use the exhibit to answer this question. To creat a separate broadcast domains, you enable four VLANs on your Catalyst 2950 switch. You then places a single host computer in each VLAN. Now the computer in VLAN1 can no longer communicate with the computers in the other VLANs. What must you do to enable communications between VLANs?

Add a router-on-a-stick

You have decided to use ACLs on your router to restrict NTP traffic between networks. Specifically, you want to allow only the server with an IP address of 172.17.8.1 to synchronize time with an NTP time provider with an IP address of 10.0.0.1 on a different network. The NTP protocol runs on UDP port 123. To accomplish this, you create the following ACL on the router connecting the two networks. After applying the ACL to inbound traffic on the interface connected to the 172.17.8.0/24 network, you find that now only 172.17.8.1 can synchronize rime with 10.0.0.1 using the NTP protocol, as intended. No otters NTp time clients on the 172.17.8.0/24 network can synchronize time with 10.0.0.1. However, you also quickly notice that no other host on the 172.17.8.0/24 network can communicate with hosts on any other network using any IP protocol. What can you do to fix this issue?

Add an additional ACL line of access-list 100 permit IP any any

What happens when an HSRP act router fails? select two

Additional HSRP member routers transition from the listen starts after the hold time expires on the hello message The HSRP stands router becomes the active router after the hold time expires on the hello message

Which Cisco express forwarding mechanism maintains layer 2 information linked to a particular entry in the routing table, reducing the need to send ARP requests before forwarding packets?

Adjacency tables

If you have multiple IPv6 address prefixes on a single OSPF interface, which of the following statements are true? select two

All address prefixes on an interface are included by default Users cannot select some address prefixes to be imported into OSPF for IPv6; either all address prefixes on an interface are imported, or not address prefixes on an interface are imported

Which three statements about creating VLANs with Cisco switches are true?

All devices connected to the same switch port are on the same VLAN Each VLAN runs an independent copy of the Spanning Tree algorithm By default, all Cisco switches run the Spanning Tree Protocol

Match each OSPF communication state on the let with the corresponding attributes on the right. Each state may be used once, more then once, or not at all.

All of the information in the hello packet matches the routers settings Init The routers negotiate how the data transfer will take place Exstart The routers trade database descriptions Exchange Both routers have matching databases Full The router receives a hello packet and checks the information it contains Attempt The routers exchange LSUs that contain LSAs Loading A router receives a help packet that includes its own RID in a list of neighbors 2-way

Use the exhibit to answer this question. Your network has four VLANs with multiple computers in each VLAN. You want to enable interVLAN routing. How must you assign the IP addresses for each VLAN.

All the computers within the same VLAN must belong to the same IP subnet

Which of the following describes how ACLs can be used to improve network security?

An ACL filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.

When attempting to make a Telnet connection to a remote router, the connection fails. You check the interface statues on your local router and find the following. Which of the following are likely causes of the problem? select two

An ACL is preventing Telnet traffic The wrong IP address has been configured on the local or remote router

An IP address is a hierarchical address that consists of what two parts?

An IP address is a hierarchical address that consists of the following two parts: * Network ID: Describes the network to which the IP address or device belongs * Host ID: The ID that identifies a specific host Note: IP addresses include the use of a subnet mask that is responsible for deciphering which part of the IP address is the network and which part is the host.

What is an IP address used for?

An IP address uniquely identifies a device on an IP network.

Which of the following statement about Switch Virtual Interface (SVI) characteristics are true? select three

An SVI is configured with an IP address and is associated wit a single VLAN The IP address associated with the SVI is the default gateway of the workstation A layer 3 switch treats each interface as a physical link through which it can route traffic

A network administrator is located on a subnet connected to Switch P1 as shown in the exhibit. The administrator is unable to ping Switch A1 connected to the Atlanta router. What is the cause of the problem?

An incorrect default gateway address is configured on switch A1

The users of a network are complaining that they can connect to resources within the company, but cannot use the internet. The network administrator begins troubleshooting the problem by entering privileged exec mode on the company router and typing show ip route command. The results are shown in the exhibit. What is the most probable cause of the problem?

An incorrect next-hop route has been statically configured on the local router

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application

Answer: E

When configuring an HSRP group, which router(s) should be configured with the virtual IP address?

Any one of the routers in the HSRP group

What are the four layers of the original tcp ip model?

Application, transport, internet, link

What are the layers of the new TCP ip model?

Application, transport, network, data link, physical

To reduce your networks exposure to denial-of-service attacks, you have decided to use ACLs on your router to restrict ICMP traffic between networks. What can you do to fix the issue?

Apply the ACL to inbound traffic on the router interface connected to the 192.168.1.0/24 network

You have decided to use ACLs on your router to restrict TFTP between networks. What can you do to fix the issue?

Apply the ACL to outbound traffic on the router interface connected to the 10.0.0.0/8 network

What are the common elements of a network hierarchy used by link-state routing protocols? select two

Area Autonomous system

Which of the following are true of EIGRP configuration to enable two routers to become adjacent? select two

Authentication parameters must match The AS number used to configure EIGRP must match

You are planning to implement IPv6 in your organization network. As a result, you must migrate your routing protocol from EIGRPv4 to EIGRPv6. Which of the following are issues you must keep in mind during the migration process? select two

Auto-summarization is not needed in EIGRPv6 EIGRPv6 advertises IPv6 prefixes instead of IPv4 subnets

What are the common elements of a network hierarchy used by link-state routing protocols?

Autonomous System Area

What are the common elements of a network hierarchy used by link-state routing protocols? (Select two.)

Autonomous System Area

Which of the following concepts does an EBGP outer use to identify routers that belong to the same grouping of eBGP routers?

Autonomous system numbers (ASN)

Cisco router us the IOS image in flash memory. You can have the router boot from alternate locations if the IOS image in flash is corrupt. Which of the following commands will load the IOS image in the following orders?

B

YOu have just connected four switches as shown in the exhibit. Assuming the default swath configuration which switch will become the root bridge?

B

Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch? A. 1 through 1001 B. 2 through 1001 C. 1 through 1002 D. 2 through 1005

B. 2 through 1001

51. Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch? A. 1 through 1OO1 B. 2 through 1OO1 C. 1 through 1OO2 D. 2 through 1OO5

B. 2 through 1OO1

Host A pings interface S0/0 on router 3. What is the TTL value for that ping? A. 252 B. 253 C. 254 D. 255

B. 253

Host A pings interface SO/O on router 3. What is the TTL value for that ping? A. 252 B. 253 C. 254 D. 255

B. 253

50. Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.) A. VTP B. 8O2.1q C. lGP D. lSL E. 8O2.3u

B. 8O2.1q D. lSL

Which two statements are true of the interfaces on Switch1? (Choose two.) A. Multiple devices are connected directly to FastEthernetO/1. B. A hub is connected directly to FastEthernetO/5. C. FastEthernetO/1 is connected to a host with multiple network interface cards. D. FastEthernetO/5 has statically assigned MAC addresses. E. FastEthernetO/1 is configured as a trunk link. F. lnterface FastEthernetO/2 has been disabled.

B. A hub is connected directly to FastEthernetO/5. E. FastEthernetO/1 is configured as a trunk link.

86. What parameter can be different on ports within an EtherChannel? A. speed B. DTP negotiation settings C. trunk encapsulation D. duplex

B. DTP negotiation settings

What parameter can be different on ports within an EtherChannel? A. speed B. DTP negotiation settings C. trunk encapsulation D. duplex

B. DTP negotiation settings

Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.) A. Spanning Tree Protocol allows switches to automatically share VLAN information. B. Establishing VLANs increases the number of broadcast domains. C. Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information. D. Microsegmentation decreases the number of collisions on the network. E. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port. F. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

B. Establishing VLANs increases the number of broadcast domains. D. Microsegmentation decreases the number of collisions on the network. E. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.

13. Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.) A. Spanning Tree Protocol allows switches to automatically share VLAN information. B. Establishing VLANs increases the number of broadcast domains. C. Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information. D. Microsegmentation decreases the number of collisions on the network. E. ln a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port. F. lf a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

B. Establishing VLANs increases the number of broadcast domains. D. Microsegmentation decreases the number of collisions on the network. E. ln a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.

77. Which two of these statements regarding RSTP are correct? (Choose two.) A. RSTP cannot operate with PVST+. B. RSTP defines new port roles. C. RSTP defines no new port states. D. RSTP is a proprietary implementation of lEEE 8O2.1D STP. E. RSTP is compatible with the original lEEE 8O2.1D STP.

B. RSTP defines new port roles. E. RSTP is compatible with the original lEEE 8O2.1D STP.

95. Which two are advantages of static routing when compared to dynamic routing? (Choose two.) A. Configuration complexity decreases as network size increases. B. Security increases because only the network administrator may change the routing table. C. Route summarization is computed automatically by the router. D. Routing tables adapt automatically to topology changes. E. An efficient algorithm is used to build routing tables, using automatic updates. F. Routing updates are automatically sent to neighbors. G. Routing traffic load is reduced when used in stub network links.

B. Security increases because only the network administrator may change the routing table. G. Routing traffic load is reduced when used in stub network links.

Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.) A. Switch A - Fa0/0 B. Switch A - Fa0/1 C. Switch B - Fa0/0 D. Switch B - Fa0/1 E. Switch C - Fa0/0 F. Switch C - Fa0/1

B. Switch A - Fa0/1 C. Switch B - Fa0/0 D. Switch B - Fa0/1

Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.) A. Switch A - FaO/O B. Switch A - FaO/1 C. Switch B - FaO/O D. Switch B - FaO/1 E. Switch C - FaO/O F. Switch C - FaO/1

B. Switch A - FaO/1 C. Switch B - FaO/O D. Switch B - FaO/1

Switch-1 needs to send data to a host with a MAC address of OObO.dO56.efa4. What will Switch-1 do with this data? A. Switch-1 will drop the data because it does not have an entry for that MAC address. B. Switch-1 will flood the data out all of its ports except the port from which the data originated. C. Switch-1 will send an ARP request out all its ports except the port from which the data originated. D. Switch-1 will forward the data to its default gateway.

B. Switch-1 will flood the data out all of its ports except the port from which the data originated.

How should the FastEthernetO/1 ports on the switches that are shown in the exhibit be configured to allow connectivity between all devices? A. The ports only need to be connected by a crossover cable. B. SwitchX(config)# interface fastethernet O/1 SwitchX(config-if)# switchport mode trunk C. SwitchX(config)# interface fastethernet O/1 SwitchX(config-if)# switchport mode access SwitchX(config-if)# switchport access vlan 1 D. SwitchX(config)# interface fastethernet O/1 SwitchX(config-if)# switchport mode trunk SwitchX(config-if)# switchport trunk vlan 1 SwitchX(config-if)# switchport trunk vlan 1O SwitchX(config-if)# switchport trunk vlan 2O

B. SwitchX(config)# interface fastethernet O/1 SwitchX(config-if)# switchport mode trunk

A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 1O and 15 on Sw11 are unable to communicate with hosts in the same VLANs on Sw12. Hosts in the Admin VLAN are able to communicate. The port-to-VLAN assignments are identical on the two switches. What could be the problem? A. The FaO/1 port is not operational on one of the switches. B. The link connecting the switches has not been configured as a trunk. C. At least one port needs to be configured in VLAN 1 for VLANs 1O and 15 to be able to communicate. D. Port FastEthernet O/1 needs to be configured as an access link on both switches. E. A router is required for hosts on SW11 in VLANs 1O and 15 to communicate with hosts in the same vlan on sw12

B. The link connecting the switches has not been configured as a trunk.

When running OSPF, what would cause router A not to form an adjacency with router B? A. The loopback addresses are on different subnets. B. The values of the dead timers on the routers are different. C. Route summarization is enabled on both routers. D. The process identifier on router A is different than the process identifier on router B.

B. The values of the dead timers on the routers are different.

40. Which of the following are benefits of VLANs? (Choose three.) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of broadcast domains while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration.

B. They allow logical grouping of users by function. C. They can enhance network security. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

Which of the following are benefits of VLANs? (Choose three.) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of broadcast domains while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration.

B. They allow logical grouping of users by function. C. They can enhance network security. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

52. Which statement about VLAN operation on Cisco Catalyst switches is true? A. When a packet is received from an 8O2.1Q trunk, the VLAN lD can be determined from the source MAC address and the MAC address table. B. Unknown unicast frames are retransmitted only to the ports that belong to the same VLAN. C. Broadcast and multicast frames are retransmitted to ports that are configured on different VLAN. D. Ports between switches should be configured in access mode so that VLANs can span across the ports.

B. Unknown unicast frames are retransmitted only to the ports that belong to the same VLAN.

Which three statements correctly describe Network Device A? (Choose three.) A. With a network wide mask of 255.255.255.128, each interface does not require an IP address. B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet. C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other. D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other. E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.

B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet. D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other. E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.

Which three statements correctly describe Network Device A? (Choose three.) A. With a network wide mask of 255.255.255.128, each interface does not require an lP address. B. With a network wide mask of 255.255.255.128, each interface does require an lP address on a unique lP subnet. C. With a network wide mask of 255.255.255.O, must be a Layer 2 device for the PCs to communicate with each other. D. With a network wide mask of 255.255.255.O, must be a Layer 3 device for the PCs to communicate with each other. E. With a network wide mask of 255.255.254.O, each interface does not require an lP address.

B. With a network wide mask of 255.255.255.128, each interface does require an lP address on a unique lP subnet. D. With a network wide mask of 255.255.255.O, must be a Layer 3 device for the PCs to communicate with each other. E. With a network wide mask of 255.255.254.O, each interface does not require an lP address.

32. ln a switched environment, what does the lEEE 8O2.1Q standard describe? A. the operation of VTP B. a method of VLAN trunking C. an approach to wireless LAN communication D. the process for root bridge selection E. VLAN pruning

B. a method of VLAN trunking

In a switched environment, what does the IEEE 802.1Q standard describe? A. the operation of VTP B. a method of VLAN trunking C. an approach to wireless LAN communication D. the process for root bridge selection E. VLAN pruning

B. a method of VLAN trunking

70. Which three are valid modes for a switch port used as a VLAN trunk? (Choose three.) A. transparent B. auto C. on D. desirable E. blocking F. forwarding

B. auto C. on D. desirable

76. What are the possible trunking modes for a switch port? (Choose three.) A. transparent B. auto C. on D. desirable E. client F. forwarding

B. auto C. on D. desirable

57. At which layer of the OSl model is RSTP used to prevent loops? A. physical B. data link C. network D. transport

B. data link

What set of commands was configured on interface FaO/3 to produce the given output? A. interface FastEthernet O/3 channel-group 1 mode desirable switchport trunk encapsulation dot1q switchport mode trunk B. interface FastEthernet O/3 channel-group 2 mode passive switchport trunk encapsulation dot1q switchport mode trunk C. interface FastEthernet O/3 channel-group 2 mode active switchport trunk encapsulation dot1q switchport mode trunk D. interface FastEthernet O/3 channel-group 2 mode on switchport trunk encapsulation dot1q switchport mode trunk

B. interface FastEthernet O/3 channel-group 2 mode passive switchport trunk encapsulation dot1q switchport mode trunk

14. Where does routing occur within the DoD TCP/lP reference model? A. application B. internet C. network D. transport

B. internet

Where does routing occur within the DoD TCP/IP reference model? A. application B. internet C. network D. transport

B. internet

34. What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch? A. lt creates a VLAN 999 interface. B. lt designates VLAN 999 for untagged traffic. C. lt blocks VLAN 999 traffic from passing on the trunk. D. lt designates VLAN 999 as the default for all unknown tagged traffic.

B. lt designates VLAN 999 for untagged traffic.

64. Which two of these are characteristics of the 8O2.1Q protocol? (Choose two.) A. lt is used exclusively for tagging VLAN frames and does not address network reconvergence following switched network topology changes. B. lt modifies the 8O2.3 frame header, and thus requires that the FCS be recomputed. C. lt is a Layer 2 messaging protocol which maintains VLAN configurations across networks. D. lt includes an 8-bit field which specifies the priority of a frame. E. lt is a trunking protocol capable of carrying untagged frames.

B. lt modifies the 8O2.3 frame header, and thus requires that the FCS be recomputed. E. lt is a trunking protocol capable of carrying untagged frames.

44. Which command enables RSTP on a switch? A. spanning-tree uplinkfast B. spanning-tree mode rapid-pvst C. spanning-tree backbonefast D. spanning-tree mode mst

B. spanning-tree mode rapid-pvst

79. Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1? A. the switch with the highest MAC address B. the switch with the lowest MAC address C. the switch with the highest lP address D. the switch with the lowest lP address

B. the switch with the lowest MAC address

Why do large OSPF networks use a hierarchical design? (Choose three.) A. to decrease latency by increasing bandwidth B. to reduce routing overhead C. to speed up convergence D. to confine network instability to single areas of the network E. to reduce the complexity of router configuration F. to lower costs by replacing routers with distribution layer switches

B. to reduce routing overhead C. to speed up convergence D. to confine network instability to single areas of the network

When BGP routers establish a neighbor (peer) relationship with a connected router, they exchange information. What kind of information do they exchange?

BGP routers advertise information about know networks (called prefixes) to neighbor routers

For each operation on the right, match the appropriate command from the list on the left.

Back up an IOS image in NVRAM to a network server copy flash tftp Copy an IOS image saved on a network server to the router copy tftp flash During startup, use an IOS image stored on a server boot system tftp

You have a small network as shown in the exhibit. You are troubleshooting connectivity issues at Wrk1. From Wrk2, you can ping any host in the branch office but cannot ping any host in the main office. What is the most likely cause of the problem?

Bad cable between the switch and the SFO router Fa0/24 on the switch is bad

How does configuring banners add to the security of your router?

Banners provide a notice of intent, informing users that access is controlled or that activity my be logged.

You need to connect a PC to the router console port to establish a console connection. For each of the parameters listed below, select the appropriate parameter to establish the connections.

Baud rate=9600 Data=8 Bit Parity=None Stop=1 Bit Flow control=None

Many queue schedulers are able to identify whats know as a low-latency queue. What dow queue schedulers do when processing low-latency queues?

Before the scheduler moves on to the otters queues, the low-latency queue must first be cleared

Which VSAT component provides data transmission capabilities over a satellite link?

Block Upconverter (BUC

A switch running STA is a backup bridge. What stat is it in?

Blocking

When the router boots, it looks for the IOS image in the following locations: ROM, Flash, Locations specified by the boot system statement in startup-config, Default TFTP server. In what order are these locations checked?

Boot system statements, Flash, TFTP server, ROM

After using the show run command on a 2960 Cisco switch, you receive the following output. Which of the following is true?

Both fastethernet 0/9 and 0/10 are configured as unconditional access ports.

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following commands are complete commands? select all that apply

Branch1#show version Branch1# conf t Branch1(config-if)#duplex half

Which of the following statements are true about bridges? select two

Bridges broadcast messages from one network segment to another bridges connect two network segment to the same address

Which of the following is an advantage of using a bridge?

Bridges can be used to increase the maximum physical distance of a LAN

Which of the following advantages of using bridges to segment LAN traffic?

Bridges can create separate collision domains Bridges can link network segments that use different physical media (as long as they have the same architecture)

Which of the following are sources of network congestion?

Broadcast storms Heavy network usage Faulty network signaling devices

Which of the flowing statement describe how VLANs affect broadcast traffic within an internetwork? select two

Broadcast traffic is transmitted only within a VLAN Devices on the same VLAN have the same subnet address

48. Why will a switch never learn a broadcast address? A. Broadcasts only use network layer addressing. B. A broadcast frame is never forwarded by a switch. C. A broadcast address will never be the source address of a frame. D. Broadcast addresses use an incorrect format for the switching table. E. Broadcast frames are never sent to switches.

C. A broadcast address will never be the source address of a frame.

81. Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FAO/13. An 8O2.1Q trunk is configured between the two switches. On CAT1, VLAN 1O is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario? A. 8O2.1Q giants frames could saturate the link. B. VLAN 1O on CAT1 and VLAN 1 on CAT2 will send untagged frames. C. A native VLAN mismatch error message will appear. D. VLAN 1O on CAT1 and VLAN 1 on CAT2 will send tagged frames.

C. A native VLAN mismatch error message will appear.

Given this output for SwitchC, what should the network administrator's next action be? A. Check the trunk encapsulation mode for SwitchC's faO/1 port. B. Check the duplex mode for SwitchC's faO/1 port. C. Check the duplex mode for SwitchA's faO/2 port. D. Check the trunk encapsulation mode for SwitchA's faO/2 port.

C. Check the duplex mode for SwitchA's faO/2 port.

Which WAN protocol is being used? A. ATM B. HDLC C. Frame Relay D. PPP

C. Frame Relay

69. What is one benefit of PVST+? A. PVST+ supports Layer 3 load balancing without loops. B. PVST+ reduces the CPU cycles for all the switches in the network. C. PVST+ allows the root switch location to be optimized per VLAN. D. PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.

C. PVST+ allows the root switch location to be optimized per VLAN.

94. Which command encrypts all plaintext passwords? A. Router# service password-encryption B. Router(config)# password-encryption C. Router(config)# service password-encryption D. Router# password-encryption

C. Router(config)# service password-encryption

Which switch provides the spanning-tree designated port role for the network segment that services the printers? A. Switch1 B. Switch2 C. Switch3 D. Switch4

C. Switch3

At the end of an RSTP election process, which access layer switch port will assume the discarding role? A. Switch3, port fa0/1 B. Switch3, port fa0/12 C. Switch4, port fa0/11 D. Switch4, port fa0/2 E. Switch3, port Gi0/1 F. Switch3, port Gi0/2

C. Switch4, port fa0/11

At the end of an RSTP election process, which access layer switch port will assume the discarding role? A. Switch3, port faO/1 B. Switch3, port faO/12 C. Switch4, port faO/11 D. Switch4, port faO/2 E. Switch3, port GiO/1 F. Switch3, port GiO/2

C. Switch4, port faO/11

A technician has installed SwitchB and needs to configure it for remote access from the management workstation connected to Switch A. Which set of commands is required to accomplish this task? A. SwitchB(config)# interface FastEthernet O/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# no shutdown B. SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# ip default-gateway 192.168.8.254 255.255.255.O SwitchB(config-if)# no shutdown C. SwitchB(config)# ip default-gateway 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# no shutdown D. SwitchB(config)# ip default-network 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# no shutdown E. SwitchB(config)# ip route 192.168.8.254 255.255.255.O SwitchB(config)# interface FastEthernet O/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# no shutdown

C. SwitchB(config)# ip default-gateway 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.O SwitchB(config-if)# no shutdown

30. VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode? A. The command is rejected. B. The port turns amber. C. The command is accepted and the respective VLAN is added to vlan.dat. D. The command is accepted and you must configure the VLAN manually.

C. The command is accepted and the respective VLAN is added to vlan.dat.

All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem? A. The access link needs to be configured in multiple VLANs. B. The link between the switches is configured in the wrong VLAN. C. The link between the switches needs to be configured as a trunk. D. VTP is not configured to carry VLAN information between the switches. E. Switch lP addresses must be configured in order for traffic to be forwarded between the switches.

C. The link between the switches needs to be configured as a trunk.

What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two.) A. The number of collision domains would remain the same. B. The number of collision domains would decrease. C. The number of collision domains would increase. D. The number of broadcast domains would remain the same. E. The number of broadcast domains would decrease. F. The number of broadcast domains would increase.

C. The number of collision domains would increase. D. The number of broadcast domains would remain the same.

Switch port FastEthernet O/24 on ALSwitch1 will be used to create an lEEE 8O2.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached? A. VLANs have not been created yet. B. An lP address must be configured for the port. C. The port is currently configured for access mode. D. The correct encapsulation type has not been configured. E. The "no shutdown" command has not been entered for the port.

C. The port is currently configured for access mode.

A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? A. This design will function as intended. B. Spanning-tree will need to be used C. The router will not accept the addressing scheme. D. The connection between switches should be a trunk. E. The router interfaces must be encapsulated with the 8O2.1Q protocol..

C. The router will not accept the addressing scheme.

8. A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This isa 1O Mb/s switch port. B. This is a 1OO Mb/s switch port. C. This is an Ethernet port operating at half duplex. D. This is an Ethernet port operating at full duplex. E. This is a port on a network interface card in a PC.

C. This is an Ethernet port operating at half duplex.

A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This is a 10 Mb/s switch port. B. This is a 100 Mb/s switch port. C. This is an Ethernet port operating at half duplex. D. This is an Ethernet port operating at full duplex. E. This is a port on a network interface card in a PC.

C. This is an Ethernet port operating at half duplex.

Given the output shown from this Cisco Catalyst 295O, what is the reason that interface FastEthernet O/1O is not the root port for VLAN 2? A. This switch has more than one interface connected to the root network segment in VLAN 2. B. This switch is running RSTP while the elected designated switch is running 8O2.1d Spanning Tree. C. This switch interface has a higher path cost to the root bridge than another in the topology. D. This switch has a lower bridge lD for VLAN 2 than the elected designated switch.

C. This switch interface has a higher path cost to the root bridge than another in the topology.

The network administrator requires easy configuration options and minimal routing protocol traffic. What two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator? (Choose two.) A. a dynamic routing protocol on lnternetRouter to advertise all routes to CentralRouter. B. a dynamic routing protocol on lnternetRouter to advertise summarized routes to CentralRouter. C. a static route on lnternetRouter to direct traffic that is destined for 172.16.O.O/16 to CentralRouter. D. a dynamic routing protocol on CentralRouter to advertise all routes to lnternetRouter. E. a dynamic routing protocol on CentralRouter to advertise summarized routes to lnternetRouter. F. a static, default route on CentralRouter that directs traffic to lnternetRouter.

C. a static route on lnternetRouter to direct traffic that is destined for 172.16.O.O/16 to CentralRouter. F. a static, default route on CentralRouter that directs traffic to lnternetRouter.

Which is the correct command to add the description "Link to West LA" to an interface on a Cisco router? A. name Link to West LA B. interface description Link to West LA C. description Link to West LA D. interface name Link to West LA

C. description Link to West LA The command to add a description to an interface is the description interface-description interface configuration command. Note: Adding a description to an interface on a Cisco router does not have any performance effects. It just adds a description to help identify the interface.

29. Which port state is introduced by Rapid-PVST? A. learning B. listening C. discarding D. forwarding

C. discarding

A network administrator is configuring an EtherChannel between SW1 and SW2. The SW1 configuration is shown. What is the correct configuration for SW2? A. interface FastEthernet O/1 channel-group 1 mode active switchport trunk encapsulation dot1q switchport mode trunk interface FastEthernet O/2 channel-group 1 mode active switchport trunk encapsulation dot1q switchport mode trunk B. interface FastEthernet O/1 channel-group 2 mode auto switchport trunk encapsulation dot1q switchport mode trunk interface FastEthernet O/2 channel-group 2 mode auto switchport trunk encapsulation dot1q switchport mode trunk C. interface FastEthernet O/1 channel-group 1 mode desirable switchport trunk encapsulation dot1q switchport mode trunk interface FastEthernet O/2 channel-group 1 mode desirable switchport trunk encapsulation dot1q switchport mode trunk D. interface FastEthernet O/1 channel-group 1 mode passive switchport trunk encapsulation dot1q switchport mode trunk interface FastEthernet O/2 channel-group 1 mode passive switchport trunk encapsulation dot1q switchport mode trunk

C. interface FastEthernet O/1 channel-group 1 mode desirable switchport trunk encapsulation dot1q switchport mode trunk interface FastEthernet O/2 channel-group 1 mode desirable switchport trunk encapsulation dot1q switchport mode trunk

A frame on VLAN 1 on switch S1 is sent to switch S2 where the frame is received on VLAN 2. What causes this behavior? A. trunk mode mismatches B. allowing only VLAN 2 on the destination C. native VLAN mismatches D. VLANs that do not correspond to a unique lP subnet

C. native VLAN mismatches

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task? A. service password-encryption access-list 1 permit 192.168.1.O O.O.O.255 line vty O 4 login password cisco access-class 1 B. enable password secret line vty O login password cisco C. service password-encryption line vty 1 login password cisco D. service password-encryption line vty O 4 login password cisco

C. service password-encryption line vty 1 login password cisco

Which two destination addresses will be used by Host A to send data to Host C? (Choose two.) A. the IP address of Switch 1 B. the MAC address of Switch 1 C. the IP address of Host C D. the MAC address of Host C E. the IP address of the router's E0 interface F. the MAC address of the router's E0 interface

C. the IP address of Host C F. the MAC address of the router's E0 interface

Which two destination addresses will be used by Host A to send data to Host C? (Choose two.) A. the lP address of Switch 1 B. the MAC address of Switch 1 C. the lP address of Host C D. the MAC address of Host C E. the lP address of the router's EO interface F. the MAC address of the router's EO interface

C. the lP address of Host C F. the MAC address of the router's EO interface

19. ln an Ethernet network, under what two scenarios can devices transmit? (Choose two.) A. when they receive a special token B. when there is a carrier C. when they detect no other devices are sending D. when the medium is idle E. when the server grants access

C. when they detect no other devices are sending D. when the medium is idle

In an Ethernet network, under what two scenarios can devices transmit? (Choose two.) A. when they receive a special token B. when there is a carrier C. when they detect no other devices are sending D. when the medium is idle E. when the server grants access

C. when they detect no other devices are sending D. when the medium is idle

What is the Cisco Discovery Protocol (CDP)?

CDP is a Cisco-proprietary protocol that runs on all Cisco IOS-enabled devices by default. It gathers information about directly connected Cisco devices. CDP operates at Layer 2 of the OSI model and is media independent. With CDP, you can tell the hardware platform and device capability, device identifier, Layer 3 addresses of the connected interface, software version, and interface of the remote device that your Cisco device is attached to. CDP is enabled by default on all Cisco equipment. CDP is a Layer 2 frame that is not routable. Note: Frame Relay interface by default will disable CDP.

Which of the following is true of Multiprotocol Label Switching? select two

CEF is required for all MPLS-enabled Cisco routers MPLS can carry ATM, SONET, and ethernet traffic

What primary advantages does the 802.1Q Trunking Protocol offer compared to ISL. choose two

Can be used with a mix of Cisco and non-disco devices IEEE standard

You have a small network as shown in the Exhibit. You are unable to pink Wrk2 from Wrk1. What should you do to fix the problem

Change the IP address assigned to Wrk2

You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. When Srv2 boots, it is configured with an IP address of 169.254.0.55/16. IT needs to be assigned the address of 192.168.12.166. What should you do to correct the problem?

Change the IP address assigned to fa0/1

S0/0/0 in configured and is connected to another Cisco router with default settings. Which of the following are possible actions you can take to correct the problem indicated for s0/0/0? Note: you will not be able to use the show run or show start commands in this lab.

Change the encapsulation type

The user of Host P1 is complaining he can't communicate with any other device in the company's network. What can the network administrator do to correct the problem?

Change the subnet mask on Host P1 to 255.255.255.224

You have a small network as shown in the exhibit. You are unable to ping Wrk2 from Wrk1. What is causing the problem?

Change the subnet mask on Wrk1

Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. a cable has been plugged in to the port and is connected to a device. You press the mode button to select Stat, and the port light alternately flashes amber and green. What should you do to correct the problem?

Check the NIC in Wrk1 for frame errors or excessive collisions

You are troubleshooting a basic serial connection on your router. The show interface serial0/1/0 command shows the following information. What should be your first step in troubleshooting the problem?

Check the cable connector on the router

Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communications is complete?

Circuit-switched

Define Cisco Express Forwarding.

Cisco Express Forwarding (CEF) is the preferred Cisco IOS packet-forwarding mechanism. CEF consists of two key components: the Forwarding Information Base (FIB) and adjacencies. The FIB is similar to the routing table created by the router but maintains only the next-hop address for a particular route. The adjacency table maintains Layer 2 information linked to a particular FIB entry, avoiding the need to do an ARP request for each table lookup.

Which internal routing logic organizes routing data using a tree structure for very fast searches, requiring less time to route packets?

Cisco express forwarding

Which routing logic organizes routing data in the forwarding information base (FIB)?

Cisco express forwarding

What is CIDR?

Classless interdomain routing (CIDR) is an addressing scheme for the Internet that allows more efficient use of IP addresses than the old Class A, B, and C scheme. It is more flexible and offers route aggregation (supernetting). A CIDR address is a network address that does not use original Class A, B, and C rules. For example, a CIDR address can look like this: 192.168.2.0/29.

Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the gi0/1 interface. what does the statistic indicate?

Collisions are occurring

Two common AAA server solutions are RADIUS and TACACS+. Match the AAA server solution on the left with the appropriate description on the right

Combines authentication, authorization, and accounting RADIUS Uses TCP port 49 TACACS+ Does not transmit passwords in clear text between the client and the server RADIUS Provides three protocols, one each for authentication authorization, and accounting TACACS+ Encrypts the entire packet contents, not just authentication packets TACACS+ Uses UDP ports 1812 and 1813 and can be vulnerable to buffer overflow attacks RADIUS

You want to make a console connection to a router using the serial port on a PC. Select the necessary components to make the console connection. Select only the necessary components

Components Rollover cable, Console port, Terminal emulation program

Match the common threat mitigation techniques that are used to protect against attacks, list on the left with the appropriate description on the right

Composed of supplicant, authenticator, and authentication server 802.1x A port-based protocol that provides an authentication method for devices attempting to establish a wired or wireless network connection 802.1x Protects against rogue servers being connected to the network and performing man-in=the=middle attacks DHCP snooping Uses EAP to exchange authentication messages 802.1x Protects against network issues caused by an employee connecting a consumer-grade router to a network port DHCP snooping

Computer A and B are on the same VLAN and are separated by two switches, as show in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the Frame. The second switch removes the VLAN ID before forwarding it to computer B.

What are the commands for etherchannel?

Conf t# Define the range of ports to use Int range fa,gig 0/X Under that set mode to access or trunk Switchport mode trunk Finally add channel group command Channel-group (1-6) mode (on, active/passive, auto/desirable)

What command turns off spanning tree?

Conf t# Int fa 0/1 Spanning tree Portfast

What command can you enter to choose the root bridge?

Conf t# Spanning-tree vlan (X) priority 0

For each operation on the right match the appropriate command from the list on the left.

Configure DNS server addresses for the router to use for resolving host names ip name-server Create static entries for hosts, associating a host name with an IP address ip host Prevent the router from using DNS to resolve host names no ip domain-lookup Set the DNS name used by the router hostname

Which of the following measures can you take to increase the security of remote connections to your router?

Configure SSH

You have a small network connected to the Internet as shown in the exhibit. Router1 will provide NAT services to all hosts on the private network, and DHCP services to hosts connected to SubnetA. Srv1 is located on SubnetA. You want to make sure that this server is assigned the same IP address every time it boots, but you still want to mentally manage the address that is uses. What should you do?

Configure a DHCP binding for Srv1

The administrator of a corporate network is receiving complaints from internal users that they cannot access the internet. The administrator displays the routing table of the local router using the show ip route command. The results of the routing table are show in the exhibit. What should the administrator do on the local router to provide internal users access to the internet?

Configure a default route using ip route 0.0.0.0 0.0.0.0 131.108.2.2

You are configuring a Cisco router as a DSL PPPoE client as shown int eh image. You have already configured interface e0/0 for the local network but have not configured anything else. Which of the following is NOT required in configuring the Cisco router as a PPPoE client?

Configure a router map

You have a small network connected to the internet as shown in the exhibit. Both Srv1 and Srv2 need to be contacted by internet hosts. Which of the following task are required part so this solution? select two

Configure a static NAT mapping for Srv1 Define fa0/0 as an inside NAT interface

Use the exhibit to answer this question. A Catalyst 1900 switch with multiple VLANs is connected to a single physical interface on a Cisco 2600 router. The switch is using ISL trunking. You want to permit interVLAN routing between each of the VLANs. What should you do? choose two

Configure a subinterface for each VLAN and assign a unique IP network address for each VLAN Encapsulate ISL on each router sub interface for the VLAN it supports

Use the exhibit to answer this question. A Catalyst 2950 switch supporting only VLAN2 is connected to router interface fa0/1. A second catalyst 2950 switch supporting VLAN3 disconnected to the same router on fa0/2. Each switch is using 802.1Q trunking. You want to permit interVLAN routing between VLAN2 and VLAN3. what should you do? choose two

Configure a unique IP network address for each VLAN on each router interface ON the router, encapsulate 802.1Q for VLAN2 on fa0/1 and VLAN3 on fa0/2

You are working at the console of a new router. You want to check the configuration of the neighboring router called Sales5. You type telnet Sales5 at the router prompt and receive the following message Translating "sales5....domain server (255.255.255.255)% unknown command or computer name, or unable to find computer address. What should you do?

Configure an address of a DNS server for the router connected

You have three switches configured as shown in the exhibit. How could you guarantee that FA0/1 on switch B is in the blocking state following STP convergence?

Configure fa0/1 on switch B with a higher cost value

Using the exhibit to answer the following questions. You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a Catalyst 2960 switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch.

You have just connected four switches as shown in the exhibit. Assuming the default switch configuration, how can you force switch c to become the root bridge?

Configure priority number of 4096 for switch c

You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17, but that it an send and receive frames from the five workstations on the network. What should you do?

Configure swtichport security on fa0/17 to allow only the MAC address of SrvFS

You have a small network as shown in the Exhibit. You configure DHCP on Router1 to provide IP addresses to all hosts connected to SwitchA. Following the configuration, you verify that Wrk1 has received an IP address from the DHCP service. Wrk1 can ping every host on the subnet, but cannot communicate with any hosts connected to Switch B or on the internet. What should you do.

Configure the DHCP server to deliver the default gateway address along with the IP address

You are workin on a console of a new router. You want to check the configuration of a neighboring router called Sales5. You type telnet Sales5 at the router prompt and receive the following message: Translating Sales5...domain server (255.255.255.255) %unknown command or computer name, or unable to find computer address What should you do?

Configure the address of the DNS server for the router to contact

Which of the following are true when configuring a serial connection between two routers? select two

Configure the clock rate on the DCE device Use PPP encapsulation when connecting a Cisco router to a non-Cisco router

You have a layer 3 switch that is capable of interVLAN routing. What process must you complete to allow interVLAN routing on a layer 3 switch interface?

Configure the interface as a switch virtual interface

Which of the following is not required when configuring a Cisco router as a PPPoE DSL client?

Configuring PPP authentication

You have a small network with two switches, A and B. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: You need to connect switch and switchB so that workstations connected to A and B can communicate to eachother

Connect SwitchA and B using a crossover cable.

You have a small network with two switches, SwitchA and SwitchB. Each switch has three client computers connected. WrKA_1,2,3 are cibbected ti SwitchA using their won subnet, while WrKB_4,5,6 are connected to SwitchB using a different subnet. You need to connect switchA and switchB so that workstations connect to A can communicate with workstations on B. Which should you do?

Connect SwitchA and SwitchB to a router using a straight-through cabling on each side.

Listed on the right are various connections between networking devices. For each connection, drag a cable type from the left to match it with the connection type.

Connect a workstation to a switch Ethernet straight-through cable Connect a workstation to the console port on a Cisco devic Rollover cable Connect a hub to a switch Ethernet crossover cable Connect a router to a switch Ethernet straight-through cable Connect a switch to a switch Ethernet crossover cable Connect a workstation to a router Ethernet crossover cable

You manage a small LAN for a branch office. The branch office has six file servers, You want to use full-duplex ethernet and offer guaranteed bandwidth to each server. How should you design the network?

Connect all network devices to a switch, connect each server to its own switch port.

You have two switches as shown in the following diagram. Each switch has host from two separate VLANs. How would you connect the switches so that the hosts in VLAN1 on one switch can communicate with hosts in the same VLAN on the other switch?

Connect both switches with a crossover cable

You have two separate switches as shown in the following diagram. Each switch has hosts from two separate VLANS. how would you connect the switches so that host in VLAN1 can communicate with hosts on VLAN2?

Connect both switches with a router using straight-through cables

You are a field technician for a large company. You have been sent to a remote site to troubleshoot a downed router. When you arrive at the remote site, how will you connect your laptop to the router? select two

Connect the laptop's Ethernet port to the router's Ethernet port using a crossover cable. Connect the Laptops COM port to the router's console port using a rollover cable.

Each connection in the Exhibit is labeled A-G. Drag the cable type from the left that you would use to make each connection type.

ConnectionA Ethernet straight-through cable ConnectionB Ethernet crossover cable ConnectionC Ethernet straight-through cable ConnectionD Rollover cable ConnectionE Ethernet crossover cable ConnectionF Ethernet straight-through cable ConnectionG Ethernet crossover cable

Drag each leased line component on the left with its corresponding description on the right. Each component may be used once, more then once, or not at all.

Connects the WIC in the router to the telecom equipment Serial Cable Controls the speed and timing of the routers serial interfaces CSU/DSU Provides the clocking function of the link CSU/DSU The equipment at the customer site CPE Provides a Layer 1 interface between the router and the telecom providers equipment CSU/DSU

Match the OSPF database on the left with its corresponding description on the right. Each database may be used once, more then once, or not at all.

Contains LSAs and list all possible routes Topology Lists all neighbors that the router has learned about from the hello packets Adjacency Built from the information gathered in the adjacency database Topology Built from information in the topology database Routing table Lists the best possible route calculated from the SPF algorithm Routing table Also know as the neighbor relationship table Adjacency

Convert the binary number 01100100 to decimal.

Converting a binary number to decimal is just the reverse of converting a decimal number to binary. When converting from binary, look at the numbers that are considered ON and then find their place value. In the binary number 01100100, the place values 64, 32, and 4 are ON. If you add these place values together, you get the decimal number of 100.

Convert the binary number 0101011011000010 to hexadecimal.

Converting binary to hex is easier than it looks. No matter how large the binary number, always apply the following conversion: Break the binary number into groups of four, starting from the right and moving left. If the binary number is not divisible by four, add 0s to the left end or until you have four digits in every group. Using this equation, 0101011011000010 is broken into the following groups: 0101 0110 1100 0010. After you have created the groups, you can convert the digits to hex. 0101 is 5 in hex, 0110 is 6, 1100 is C, and 0010 is 2, so this binary number looks like the following in hex: 0x56C2.

In STP what is a path cost?

Cost assigned to an individual port, i.e. Fa has a cost of 19

You want to configure DHCP on your Cisco router to provide automatic IP address assignment to a single subnet. You will use 192.168.12.0/27 for the subnet address. The router interface has been configured with an IP address of 192.168.12.1. Additionally, you want to make sure that a specific server, called SrvFS, always gets the last IP address on the subnet as its IP address. How should you configure DHCP on the router? select two

Create a DHCP finding for address 192.168.12.30 Create and address pool with start address of 192.168.12.2 and end address of 192.168.12.30

Your router currently has two ACLs one list denies SAP broadcast and allows all other traffic, This list is applied to outbound traffic on Serial0 The second list denies Telnet traffic and allows all other traffic. This list is applied to inborn traffic on Serial1. You want to also restrict all outbound traffic sent through Serial0 from network 192.168.2.0/24. How should you configure ACLs on the router to meet all current and new requirements with an little effort as possible?

Create a new ACL that denies traffic from network 192.168.2.0/24 and permits all other traffic. Apply ACL on the Serial0 interface for outbound traffic.

Your router has the following access lists: list 91 denies all traffic from network 12.1.6.0/24 and allows all other traffic List 101 denies all telnet traffic and allows all other traffic Access list 91 is apples to the Serial0 interface for outbound traffic. Access list 101 is applies to Serial0 interface for inbound traffic You now want to modify the access list configuration to deny outbound ICMP traffic while keeping all other restrictions in place as closely as possible. How should you modify the access lists to accomplish your goal with the least amount of effort?

Create an access list 102 that denies ICMP traffic and traffic from network 12.1.6.0/24. Apply the list to Serial for outbound traffic

You have configured NAT on your router to connect your small company network to the internet. Shown below is a partial configuration for the router. Following the configuration, you find that no hosts on fa0/0 or fa0/1 can connect to the internet. What should you do so that hosts can connect to the internet?

Create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24

You want to configure DHCP on your Cisco router to provide automatic IP address assignment to a single subnet. You will use 192.168.12.0/27 for the subnet address. The router interface has been configured with an IP address of 192.168.12.1. Additionally you want to make sure that a specific server called SrvF5 always gets the last IP address on the subnet as its IP address. How should you configure DHCP on the router?

Create an address pool with a start address of 192.168.12.2 and end address of 192.168.12.30 Create a DHCP binding address for address 192.168.12.30

Map each OSPFv3 LSA type on the left with its corresponding description on the right. Each LSA type may be used once, more than once, or not at all.

Created for each ABR in the area Type 1 Provides summary information for each area Type 3 Created for each router in the area Type 1 Lists the routers that are joined together by the segment Type 2 Created for each segment on which a DR/BDR has been elected Type 2

You have four switches configured as shown in the exhibit. Which switch becomes the root bridge?

D

Listed below are several places that a workstation checks to resolve DNS host names. A. Primary DNS server B. Secondary DNS servers C. HOSTS file D. Local DNS file In a browser you type in the name of a website. In which order will these locations be checked during the name resolution process?

D,C,A,B

Listed below are several places that a workstation checks to resolve DNS host names. A-Primary DNS server B-Secondary DNS servers C-Host files D-Local DNS cache

D,C,A,B

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over Fast Ethernet? A. 802.3ad B. 802.1w C. 802.1D D. 802.1Q

D. 802.1Q

39. Which lEEE standard protocol is initiated as a result of successful DTP completion in a switch over FastEthernet? A. 8O2.3ad B. 8O2.1w C. 8O2.1D D. 8O2.1Q

D. 8O2.1Q

What is the difference between a CSU/DSU and a modem? A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from a router to a leased line. B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a router to a leased line. C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a router to a phone line. D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

22. What is the difference between a CSU/DSU and a modem? A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from a router to a leased line. B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a router to a leased line. C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a router to a phone line. D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

37. A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? A. More collision domains will be created. B. lP address utilization will be more efficient. C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created.

D. An additional broadcast domain will be created.

A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance? A. Use a hub to connect the four VLANS with a Fast Ethernet interface on the router. B. Add a second router to handle the VLAN traffic. C. Add two more Fast Ethernet interfaces. D. Implement a router-on-a-stick configuration.

D. Implement a router-on-a-stick configuration.

Which statement is true? A. The FaO/11 role confirms that SwitchA is the root bridge for VLAN 2O. B. VLAN 2O is running the Per VLAN Spanning Tree Protocol. C. The MAC address of the root bridge is OO17.596d.158O. D. SwitchA is not the root bridge, because not all of the interface roles are designated.

D. SwitchA is not the root bridge, because not all of the interface roles are designated.

Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.) A. Host E and host F use the same lP gateway address. B. Router1 and Switch2 should be connected via a crossover cable. C. Router1 will not play a role in communications between host A and host D. D. The FastEthernet O/O interface on Router1 must be configured with subinterfaces. E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. F. The FastEthernet O/O interface on Router1 and the FastEthernet O/1 interface on Switch2 trunk ports must be configured using the same encapsulation type.

D. The FastEthernet O/O interface on Router1 must be configured with subinterfaces. F. The FastEthernet O/O interface on Router1 and the FastEthernet O/1 interface on Switch2 trunk ports must be configured using the same encapsulation type.

What is the reason that the interface status is "administratively down, line protocol down"? A. There is no encapsulation type configured. B. There isa mismatch in encapsulation types. C. The interface is not receiving any keepalives. D. The interface has been configured with the shutdown command. E. The interface needs to be configured as a DTE device. F. The wrong type of cable is connected to the interface.

D. The interface has been configured with the shutdown command.

The network administrator normally establishes a Telnet session with the switch from host A. However, host A is unavailable. The administrator's attempt to telnet to the switch from host B fails, but pings to the other two hosts are successful. What is the issue? A. Host B and the switch need to be in the same subnet. B. The switch interface connected to the router is down. C. Host B needs to be assigned an lP address in VLAN 1. D. The switch needs an appropriate default gateway assigned. E. The switch interfaces need the appropriate lP addresses assigned.

D. The switch needs an appropriate default gateway assigned.

9. A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSl layer did this happen? A. session B. transport C. network D. data link E. physical

D. data link

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? A. session B. transport C. network D. data link E. physical

D. data link

20. A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance? A. Use a hub to connect the four VLANS with a Fast Ethernet interface on the router. B. Add a second router to handle the VLAN traffic. C. Add two more Fast Ethernet interfaces. D. lmplement a router-on-a-stick configuration.

D. lmplement a router-on-a-stick configuration.

What is the effect of the configuration that is shown? A. lt configures SSH globally for all logins. B. lt tells the router or switch to try to establish an SSh connection first and if that fails to use Telnet. C. lt configures the virtual terminal lines with the password O3O75218O5OO. D. lt configures a Cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports. E. lt allows seven failed login attempts before the VTY lines are temporarily shutdown.

D. lt configures a Cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.

Why has this switch not been elected the root bridge for VLAN1? A. lt has more than one interface that is connected to the root network segment. B. lt is running RSTP while the elected root bridge is running 8O2.1d spanning tree. C. lt has a higher MAC address than the elected root bridge. D. lt has a higher bridge lD than the elected root bridge.

D. lt has a higher bridge lD than the elected root bridge.

Shown here is a diagram of the back of a sample router. IF Port E is a serial port, what type of cable and connector would you use to connect the router to an another router if this router provides the clocking signal?

DB-60 serial DCE cable

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

You are setting up a new branch office for your company. You would like to implement solutions to provide the following services: * Hosts should be able to contact other hosts using names such as server1.westsim.com *IP address assignment should be centrally managed Which services should you implement on your network to meet requirements?

DHCP DNS

You have a DHCP server on your network. Which of the following is the correct order of DHCP messages exchanged between a client and server when the client obtains an IP address?

DHCPDISCOVER, DHCPOFFER, DCHPREQUEST, DHCPACK

You have a DHCP server on your network. Which of the following is the correct order of DHCP messages exchanged between a client and server when the client obtains an IP address?

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK

You are setting ups a new branch office for you r company. You will like to implement solutions to provide the following services. Hosts should be able to contact other hosts using names such as server1.westsim.com. IP address assignment should be centrally managed Which services should you implement on your network to meet the requirements? select two

DNS DHCP

What protocol(s) and port numbers does DNS use?

DNS uses both TCP and UDP using port number 53. DNS uses UDP to carry simple queries and responses and TCP to guarantee the correct and orderly delivery of large amounts of bulk data between DNS servers for synchronization of databases.

Which of the following internet connection technologies requires that the location be within a limited distance of telephone company central office?

DSL

Which WAN connection types use digital communications over POTS? select two

DSL ISDN

You have entered the following command to enable automatic trunking discovery and configuration. switch(config-if)#switchport mode dynamic auto What is the name of the protocol the switch will use to configure trunking?

DTP

Which of the following statements about the functionality of LCP are true? select three

Data can be compressed at eh source and decompressed at the destination Usernames and passwords may be required during the handshake LCP provides multilink support

At which layer of the OSI model do network switches operate?

Data link

The following terms describe the functions performed at various OSI model layers. 1.Logical topology 2. logical device ID 3. Flow control 4. Convert data to 0s and 1s Which of the following correctly identifies the layers that perform each of the functions listed here?

Data link, Network, Transport, Physical

You have used a set of bridges and routers to segment your LAN into smaller networks. What results will you get?

Decreased congestion on each segment Increased number of collision domains

What effect does the standby 3 track serial 0/0 interface configuration command have? select two

Decrements the HSRP group priority by 10 if the interface goes down The switch monitors the routers interface that is used by HSRP to forward traffic from the hosts

You have a small network as shown in the exhibit. You have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the internet to connect to sites like www,cisco.com. What other parameters are required on the workstation? select two

Default gateway DNS server address

Match each LSA type on the left with the appropriate description on the right

Describes a network that has a DR and BDR Type 2 Describes a subnet in other area Type 3 Describes routers Type 1

What are the ports called that forward frames from the root bridge and from non root switches?

Designated port

Cloud resources are implemented in several ways. Match the cloud implementation listed on the left with the appropriate description on the right.

Designed to be shared by several organizations Community cloud Gmail and Google Docs, for example Public cloud Provides resources to a single organization Private cloud Can be accessed by anyone Public cloud Can be accessed only by users within the single organization Private cloud

You have several hosts, a switch and a router as shown in the exhibit. Workstation 3sends an IP packet to workstation1. The packet is received baby the Cisco 2600 router as shown in the diagram. When the packet leaves the router, which source and destination IP addresses will be contained in the IP packet? select two

Destination IP address=192.168.10.11 Source IP addresses= 192.168.11.11

What is the purpose of the CRC in network communications?

Detect data errors

Drag each network plane on the left wot the appropriate troubleshooting task on the right. Each plane may be used once, more than once, or not at all.

Determine how traffic moves from one place to another Control Plane Determine whether the VLANs have been configured on each switch Data Plane Examine the forwarding logic on each device Data Plane Use SNMP to monitor network switches Management Plane Isolate Filtering and port security problems Data Plane

Which of the following statements describe how VLANs affect broadcast traffic within and internetwork? select two

Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted only within a VLAN

You have partially configured a router as a PPPoE client. The show running-config command produces the following output. Which of the following commands must be added to complete the dialer configuration?

Dialer pool 1

Which of the following are true about distance vector routing method?

Distance vector routers have less hardware and software requirements than link state routers Distance vector routing is susceptible to routing loops Distance vector routers share the entire contents of their routing table with their neighbors

How are distance vector routing protocols different from link-state routing protocols?select three

Distance vector routing algorithms do not calculate the exact topology of a network Distance vector routing protocols are easier to implement than link-state routing protocols Link-state routing protocols are faster to converge that distance vector routing protocols

You have a small network as shown in the exhibit. You have configured RIP on both RouterA and RouterB. the show ip route command on RouterA shows the following information. RouterA receives a packet addresses to 172.16.0.1. What will routerA do with he packet.

Drop the packet.

You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?

Drop the packet.

Which of the following are characteristics of ISATAP for IPv6 tunneling? select two

Dual stack routers Dual stack host

Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. A cable has been plugged into the port and is conencted to a device. The port should be using full-duplex communications at 100 Mbps. You press the MODE button to select Stat, Duplex, and Speed. the results are shown below. -Stat= Solid Green -Duplex=off -SPeed= Solid green Which command(s) should you use for the interface to configure the appropriate settings?

Duplex full

A 5-port hub is attached to interface fa0/1 on your switch. Users of the workstation attached to the hub are complaining that their pings are erratic. When you run the show interface fa0/1 command you receive the following output. fastethernet0/1 is up, line protocol is up (connected) hardware is fast ethernet, address is 0019.e744.7401 (bia 0019.e774.7401) what is the problem?

Duplex mismatch

You are the network administrator for a medium-sized company the owns a Class C IP address block. You do not have enough registered IP address for the 1000 hosts in your network; however, you've determined that no more then 20% of your hosts use the internet. And the bandwidth you've budgeted cannot support more then this number anyway. So you decide to implement NAT and allocate 200 of your registered IP address to support external translations. Which method of NAT translations should you implement?

Dynamic

You have just enabled port security on a switch port. What are the default settings? select three

Dynamically-learned allows addresses Maximum of 1 device Shutdown violation mode

Shown here is a diagram of the back of a sample router. Which port would you use if you wanted to connect the router to a CSU/DSU using a serial connections?

E

The network administrator must establish a route by which London workstations can forward traffic to the Manchester workstations. What is the simplest way to accomplish this? A. Configure a dynamic routing protocol on London to advertise all routes to Manchester. B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester. C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router. D. Configure a static default route on London with a next hop of 1O.1.1.1. E. Configure a static route on London to direct all traffic destined for 172.16.O.O/22 to 1O.1.1.2. F. Configure Manchester to advertise a static default route to London.

E. Configure a static route on London to direct all traffic destined for 172.16.O.O/22 to 1O.1.1.2.

Based on the information given, which switch will be elected root bridge and why? A. Switch A, because it has the lowest MAC address B. Switch A, because it is the most centrally located switch C. Switch B, because it has the highest MAC address D. Switch C, because it is the most centrally located switch E. Switch C, because it has the lowest priority F. Switch D, because it has the highest priority

E. Switch C, because it has the lowest priority

3. Which layer in the OSl reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application

E. application

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application

E. application

The speed of all serial links is E1 and the speed of all Ethernet links is 1OO Mb/s. A static route will be established on the Manchester router to direct traffic toward the lnternet over the most direct path available. What configuration on the Manchester router will establish a route toward the lnternet for traffic that originates from workstations on the Manchester LAN? A. ip route O.O.O.O 255.255.255.O 172.16.1OO.2 B. ip route O.O.O.O O.O.O.O 128.1O7.1.1 C. ip route O.O.O.O 255.255.255.252 128.1O7.1.1 D. ip route O.O.O.O O.O.O.O 172.16.1OO.1 E. ip route O.O.O.O O.O.O.O 172.16.1OO.2 F. ip route O.O.O.O 255.255.255.255 172.16.1OO.2

E. ip route O.O.O.O O.O.O.O 172.16.1OO.2

100. What is the effect of using the service password-encryption command? A. Only the enable password will be encrypted. B. Only the enable secret password will be encrypted. C. Only passwords configured after the command has been entered will be encrypted. D. lt will encrypt the secret password and remove the enable secret password from the configuration. E. lt will encrypt all current and future passwords.

E. lt will encrypt all current and future passwords.

Match the routing protocol characteristic on the left with the routing protocol on the right

EIGRP Characteristics Supports autosummarization Unequal-cost load balancing DUAL OSPF Characteristics Open standard DR and BDR Dijkstra SPF

Match the default administrative distance with the route type. Each routing method may be used once, more then once, or not at all.

EIGRP internal routes 90 EIGRP external routes 170 OSPF 110 RIP 120 Static routes 1

You are reviewing the configuration of a router that uses IGRP for its routing protocol. Shown below is the output from the show ip protocols command. Based on the output, what is true of this configuration?

EIGRP will load balance on up to 5 unequal-cost routes

You are reviewing the output of the show interfaces command for the gi0/1 interface on a switch. You notice a significant number of CRC error displayed. What are the most likely causes? Select two

EMI, or cross-talk, on the UT cabling is damaging frames in transit to this interface Collisions are causing frame contents to arrive at this interface in a corrupted state

IPsec is implemented through two separate protocols. What are these protocols called? select two

ESP AH

Ho do link-state routing protocols determine the topology of the network?

Each router initially exchanges LSP messages which are used to build a topological database

How to link-state protocols determine the topology of a network?

Each router initially exchanges LSP messages which are used to build a topological database

How do link-state routing protocols determine the topology of the network?

Each router initially exchanges LSP messages which are used to build a topological database.

Router_1 is connected to three networks, 192.168.0.0, 172.16.16.0, and 172.16.32.0. AN administrator enables the RIP routing protocol on Router_1. However, the router isn't forwarding packets to network 172.16.16.0. The administrator examine the configurations on Router_1 using the sh run command. The results are displayed are seen in the exhibit. What should the administrator do to correct the problem?

Enable serial0 interface.

Match each OSPFv3 command on the left with its corresponding description on the right. Each command may be used once, more then once, or not at all

Enables OSPF for IPv6 router configuration ipv6 router ospf [process id] Generates a default external route into an OSPF routing domain default-information originate Displays the current contents of the IPv6 routing table show ipv6 route Enables OSPFv3 for IPv6 on an interface ipv6 ospf [process id] area [number] Displays OSPFv3 adjacency events debug ipv6 ompf adj

IN addition to AH, IPsec is composed of which other service?

Encapsulating Security Payload (ESP)

Which IPsec subprotocol provides data encryption?

Encapsulating Security Payload (ESP)

A Cisco router boots but cannot locate a valid IOS image in flash memory or on the TFTP server. Assuming the default configuration, what will the router do next?

Enter ROM monitor mode

YOu are configuring a router that has a previous configuration. You need to turn CDP on for the entire router, but turn it off for the serial 0/0/1 interface. Match the correct commands on the left with the configuration task on the right.

Enter global configuration mode router#config t Turn CDP on for the router router(config)#cdp run Enter interface configuration mode router(config)#int s0/0/1 Turn CDP off for the interface router(config-if)# no cdp enable

You have a PC that you connect to the ethernet network, and that you use to create a console connection to the router through a Telnet sessional You want to require a password before the Telnet session is allowed. Match the commands on the left with the requirement steps on the right.

Enter global configuration mode. router#config t Enter configuration mode for Telnet sessions router(config)#line vty 0 4 Set the password router(config-line)#password cisco Require the password for login router(config-line)#login

The fastethernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= ing fa0/0 Enable the interface= no shutdown Verify the interface is disabled= show interface status

You need to disable the fastehternet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= ing fa0/0 Disable the interface= shutdown Verify the interface is disabled= show ip interface brief

You need to configure the fastethernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= ing fa0/1 Set speed of the interface= speed auto Set duplex setting for the interface= duplex auto

A Cisco router boots but cannot locate the startup-config file. Assuming the default configuration, what will the router do next?

Enter setup mode

You want to establish a console session to a new router using a Telnet session. Which of the following components will you need? select two

Ethernet Port IP adress Ethernet cable

How often are hello bpdu's sent?

Every 2 seconds

How often are VTP updates sent?

Every five minutes.

Which of the following describe the attributes that extended ACLs can use to filter network traffic?

Extended ACLs can filter network traffic based on destination hostname or host IP address Extended ACLs can filter network traffic based on source protocol (I, TCP UDP, ect)

Which of the following is a good general rule regarding the placement of extended ACLs?

Extended ACLs hold be placed as close as possible to the source router

58. What does a Layer 2 switch use to decide where to forward a received frame? A. source MAC address B. source lP address C. source switch port D. destination lP address E. destination port address F. destination MAC address

F. destination MAC address

Which option contains both the potential networking problem and the protocol or setting that should be used to prevent the problem? A. routing loops, hold down timers B. switching loops, split horizon C. routing loops, split horizon D. switching loops, VTP E. routing loops, STP F. switching loops, STP

F. switching loops, STP

Consider the following IPv6 address FE80:55:0000:0000:A:AB00 Which of the following valid shortened forms of this address? select two

FE80:55:0000:0000:A:AB00 FE80:0000:0000:0055::000A:AB00

You are on a workstation with the following mac address: 10-01-64-AB-78-96 Which of the following will be the link-local address using the modified EUI-64 format?

FE80::1201:64FF:FEAB:7896

Which of the following IPv6 addresses is used by a host to contact a DHCP server?

FF02::1:2

you have a small network with four switches as shown in the diagram. which of the following are true. select two

Fa0/3 on switch B is an access port Fa0/2 on switch B is a trunk port

You are designing a routing solution for your organization. You want to improve routing efficiency by ensuring that routers save frequently used data link headers to encapsulate packets. Which type of routing logic could you implement? select two

Fast switching Cisco express forwarding

What is fast switching?

Fast switching is a process that uses the cache to speed routing. When a packet is received for a destination, the first packet is process switched and an entry is created in the router's cache. Subsequent packets are switched in the interrupt code using the cache to improve performance.

Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a product authorization key (PAK).

Feature: ipbasek9 Feature: securityk9

Which of the following are the results of using a router to segment a network?

Fewer devices per broadcast domain Increased number of collision domains

You manage a small network with two buildings, 1,000 meters apart. You want to connect the two buildings together with a switch, You are concerned about electromagnetic interference on the cable connecting the two buildings. What should you include in your plan? select two

Fiber optic cables with LC connectors 1000BaseLX ethernet

You can configure two types of IPv6 access control list (ACLs) Router ACL, Port ACL Match the IPv6 ACL types on the left with the appropriate descriptions of their usage on the right.

Filters inbound and outbound traffic Router ACL Applies only to packets that are routed Router ACL Filters traffic on layer 2 interfaces Port ACL Apples to all packets Port ACL Filters traffic on layer 3 interfaces Router ACL Filters inbox traffic Port ACL

What is the purpose of flow control?

Flow control provides a mechanism for the receiver to control the transmission speed. TCP implements flow control by using the SYN and ACK fields in the TCP header, along with the Window field. The Window field is a number that implies the maximum number of unacknowledged bytes allowed to be outstanding at any time.

You have two Cisco 2960switches with 12 fastethernet ports and 2 gigabitehternet prots on each switch. You connect fa0/1 on switchA to fa0/1 on switchB with a crossover cable. A partial configuration for both switches is shown below. You notice that VLAN traffic for VLAN 2 is not being carried from switchA to switchB. what should you do?

For fa0/1 on switchA, set swithport mode to dynamic desirable

You have a medium-sized business network with twelve subnets (192.168.1.0/24-192.168.12.0/24). You use OSPF for your routing protocol. One ethernet subnet has five routers, all in the same OSPF area as shown in the exhibit. You want to ensure that routerC becomes the designated router on the subnet. Assuming that no additional configuration parameters have been configured other than what is shown, how could you accomplish this? select three

For fa0/1, set the OSPF priority to 2 For the OSPF process, set the router-id to 200.1.1.1 Change the IP address assigned to fa0/1 to 192.168.12.254

You want to prevent users from accessing a router through a Telnet session. What should you do?

For the VTY lines, add the login parameter and remove any passwords.

You have a switch connected to a small network as shown in the Exhibit. A hub connects Wrk1 and Wrk5 to the switch. The switch has the following information in its CAM table: Wrk 1 sends a frame addressed to Wrk5. What will the switch do with the frame? select two

Forward the frame out all ports except Fa0/1. It will not record the location of any device.

You use the show ip route command on your router and see the information shown below. Gateway of last resort is not set 172.16.0.0/28 is subsetted, 4 subnets C 172.16.0.0 is directly connected, fastethernet0/0 C 172.16.0.32 is directly connected, fastethernet0/1 R 172.16.0.96[120/1] via 172.16.0.1, 00:00:25, fi0/0 R 172.16.0.128 [120/1] via 172.16.0.33, 00:00:25, fi0/1 The router receives a packet addressed to 172.16.0.19 and one addressed 172.16.0.109. What will the router do with each packet? select two

Forward the packet addressed to 172.16.0.109 to router 172.16.0.1 Drop the packet addressed to 172.16.0.19

You use the show ip route command on your router and see the information shown below. Gateway of last resort is 172.16.11.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R 10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 S* 0.0.0.0/0 [1/0] via 172.16.11.12 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?

Forward the packet out Serial0/1/0

You use the show ip route command on your router and see the information shown below. Gateway of last resort is 172.16.11.12 to network 0.0.0.0 C 192.168.1.0/24 is directly connected, fastethernet0/0 C 192.168.2.0/24 is directly connected, fastethernet0/1 172.16.0.0/24 is subsetted, 1 subnets C 172.16.11.0 is directly connected, serial0/1/0 R* 10.0.0.0/8 [120/1] via 172.16.11.12, 00:00:04, serial0/1/0 The router receives a packet on the fastethernet0/1 interface addressed to 192.168.3.155. What will the router do with the packet?

Forward the packet out Serial0/1/0

Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds up to 1.544 Mbps or greater?

Frame relay

Which of the following are true of store-and-forward switches? select three

Frames are checked for errors before being forwarded Frames with errors are dropped Latency is greater than with cut-through switches

You are configuring a new 2960 switch. You issue the following commands. Switch(config)#interface fast 0/15 switch(config-if)#swtichport modes access switch(config-if)#switchport port-security switch(config-if)#switchport port-security maximum 1 switch(config-if)#switchport port-securitymac-address sticky switch(config-if)#switchport port-security violation protect you connect a hub with two workstation to port fa0/15. You power on first device1 and then device2. what will be the result?

Frames from device1 will be allowed; frats from device2 will be dropped

For security reasons, you want to prevent the Toronto router from sharing any information about itself with neighboring devices. What should you do?

From global configuration mode on Toronto, type no cdp run

Which can be stored in NVRAM on a Cisco device? select two

Full IOS image startup-config file

Consider the following IPv6 address FD01:0001:0001:005::7/64 Drag the component part of this address on the left to the corresponding description on the right. Not all descriptions on the right have corresponding components on the left.

Global Routing Prefix Blank Subnet ID FD01:0001:0001:005 Interface ID ::7 Prefix length /64 Global ID 01:0001:0001 Unique Local Unicast Prefix FD

You need to design an IPv6 addressing scheme for your network. The following are key requirements for your design. *infrastructure hosts, such as routers and servers, will be assigned static interface IDs while workstations, netbooks, tablets, and phones will be assigned interface IDs dynamically. *Internet access must be available to all hosts through an ISP *Site-to-Site WAN connections will be created using leased lines. Which type of IPv6 addressing is most appropriate for hosts in this network?

Global Unicast Addressing

Consider the following IPv6 address 2001:0BEF:0BAD:0006::32/64 Drag the component part of this address on the left to the corresponding description on the right. Not all descriptions on the right have corresponding components on the left.

Global routing Prefix 2001:0BEF:0BAD Subnet ID 2001:0BEF:0BAD:0006 Interface ID ::32 Prefix Length /64 Global ID Blank

Match the TCP/IP protocols with their functions by dragging the protocol name on the left and dropping it next to the description on the right

Group 1 Used to get IP address of the host from a know MAC address. RARP/BOOTP Group 2 Used to transfer files. FTP/TFTP Group 3 Used to identify routes through an internetwork. RIP/OSPF

Which of the default layer 2 encapsulation method for serial interfaces on a Cisco router?

HDLC

You are currently using EIGRP on your network. Which of the following would you gain by switching to OSPF ?

Hierarchical network design Open standard

Which of the following problems typically associated with the link state routing method?

High traffic to build routing tables Increased use of router hardware resources

Which of the following methods of preventing routing loops prevents routing table changes from taking place too quickly and prevents downed links from being added back into the routing table?

Hold-Downs

Which are the following are ways you can prevent routing loops with a distance vector routing protocol ?

Hold-Downs Split Horizon Route Poisoning Static Routes

Which of the following methods of preventing routing loops prevents routing table changes from taking place too quickly and prevents downed links from being added back into the routing table?

Hold-downs

Drag each layer of the TCP/IP model on the left to the networking component associated with it on the right. Each layer of the TCP/IP model my be used once, more then once, or not at all

Host IP addresses/internet layer Sequencing information/transport layer MAC addresses/Link layer Acknowledgements/ transport layer Network addresses/ internet layer

You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What is the true concerning the role and state of interface fa0/5 for VLAN 1? select two

IF Gi0/2 stops receiving configuration BPDUs, Fa0/5 will transition to the STP root port start The interface is in the Rapid PVST+ blocking state

You have a small network with a single subnet connected to the internet as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstations should use RouterA as the default gateway, and DNS1 as the DNS server address. From the down-down list, select the appropriate parameters to configure the workstations TCP/IP settings.

IP Address 192.168.12.46 Subnet Mask 255.255.255.240 Default Gateway 192.168.12.34 DNS Server 198.162.1.22

You have a small business network with a single subnet connected to the internet rhtpugh a Cisco router (RouterA). IP addresses have been assigned as shown in the exhibit. A browser session on the workstation tries to connect to the www.westsim.com web server using 16.177.85.116 and port 80. What IP address and port number will the Web server use as the destination address when responding to the workstation request?

IP address 199.67.111.89 and a dynamic port assigned by RouterA

What is the Internet Protocol (IP)?

IP is a connectionless protocol that provides best-effort delivery and routing of packets. IP has the following characteristics: * Operates at Layer 3 (network) of the Open Systems Interconnection (OSI) reference model and the Internet layer of the TCP/IP (Internet) model. * Is connectionless, providing best-effort delivery of packets. * Uses hierarchical addressing. * Has no built-in data recovery. * Each packet is treated independently; thus each packet can travel a different way to its destination. * Operates independently of the medium that is carrying the data.

How many bits are in an IPv4 address? In an IPv6 address?

IPv4: 32 bits IPv6: 128 bits

Which of the following statements are true about IPv6 ACLs? select two

IPv6 ACLs are similar to IPv4 extended named ACLs in functionality IPv6 ACLs do not use wildcard masks

Your organization has been assigned a registered global routing prefix of 2001:FEED:BEEF::/48 by an ISP. Using your organizations IPv6 addressing scheme, you've used the next 16 bits beyond the global routing prefix to define the following subnets: *2001:FEED:BEEF:0001::/64 *2001:FEED:BEEF:0002::/64 *2001:FEED:BEEF:0003::/64 *2001:FEED:BEEF:0004::/64 Which interface configuration command would you use to do this?

IPv6 address 2001:FEED:BEEF:0003::1/64

Your organization has decided to implement unique local unicast IPv6 addressing. A global ID of FD01:A001:0001::/48 been selected for the organizations IPv6 addressing scheme. The next 16 bits beyond the global ID have been used to define the following subnets: FD01:A001:0001:0001::/64 FD01:A001:0001:0002::/64 FD01:A001:0001:0003::/64 FD01:A001:0001:0004::/64 Which interface configuration command would you use to do this?

IPv6 address FD01:A001:0001:0003::/64 eui-64

Your company wants to begin the transition from IPv4 to IPv6. You want to stage the implementation on a host-by-host basis. You will enable IPv6 on existing hosts as time and budget allows. During the transition, all hosts in your site need to communicate with all other hosts. IPv6 should be used between hosts when both hosts support IPv. NAT support is not required. Which method should you use?

ISATAP

Which WAN connection type use digital communications over public telephone lines? select two

ISDN DSL

Which of the following WAN technologies is a dial-up only service?

ISDN BRI

You have a small network as shown in the exhibit. With the portion configuration shown below, which of the following stamens are true? select two

If HostA and HostB are the only hosts on the subnet to receive their IP address, HostC will receive 172.18.2.102 as an IP address if requested. HostD will have 172.18.1.132 as a DNS server configured through DHCP

Upon first boot, a new router does not have a configuration file to load. In the event that a router has no configuration file, what happens?

If a router does not find a configuration file, the router runs setup mode, a question-driven configuration process that allows you to configure basic router parameters. Note: The system configuration dialog is run if the router does not find a configuration file in NVRAM or if the setup privileged mode command is entered at the router's command prompt.

You are configuring an interface on a router and the interface says "Interface is up, line protocol is down." What does this tell you regarding the interface?

If an interface says "Interface is up, line protocol is down," the interface is experiencing Layer 2 problems. This could be caused by not receiving keepalives, no clocking received, or encapsulation mismatch. Note: If the interface says, "Interface is down, line protocol is down" and it is not administratively disabled, the interface is having Layer 1 problems.

Which of the following is true of CSMA/CD? select two

If collisions are detected, an interrupt jam signal is broadcasted to stop all transmissions. A device with data to send first listens to the transmission medium to determine if it is free

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two

If router A fails and then recovers, it will serve as the standby router Router A will serve as active router, and Router B will serve as standby router

Which of the following is true when tracking an interface configured within a HSRP group? select two

If the interface goes down, the priority of the HSRP group is reduced to allow the HSRP standby router to become the active router The HSRP group priority of the active router is decreased by 10 by default

A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The ethernet interface in the workstation has been manually configured to use a 100Mbps link speed and full duplexing. Which of the following are true in this scenario? select three

If the link speed is 1000 Mbps or faster, full-duplex is used If the link speed is 10 Mbps, half-duplex is used The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected.

Which of the following is true concerning the native VLAN and VLAN trunking? select three

If the native VLAN on one end of the trunk is different that the native VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk Frames are placed on the native VLAN when they enter an 802.1Q trunking interface but do not have an 802.1Q header With 802.1Q trunking, frames from the native VLAN are not tagged

What role does ARP play in the routing process?

If the router does not know a destination devices MAC address, it sends an ARP broadcast containing the IP address and requesting the MAC address

Your router generates a log message with a severity level of 1. What does this indicate?

Immediate action needed

Which of the following is not a benefit of NAT

Improving the throughput rate of traffic

You want to enter a password before being able to access the router through a Telnet session. You use the following commands. router#config t router(config)#line vty 0 4 router(config-line)#password cisco router(config-line)#exit router(config)#exit You ope a Telnet session with the router and discover that the session starting without being promoted for a password. What should you do.

In line configuration mode, add the login parameter.

Which statements accurately describe port states of both bridges and switches? select two

In the learning stat, the MAC address table can be populated but frames are not forwarded Ports in the blocked state still receive BPDUs

Which of the following statements about ACLs are true? select two

Inbound ACLs are applied before the routing process An ACL without a permit traffic will not allow any traffic.

You have a small network as shown in the exhibit. You are troubleshooting connectivity issues at Wrk1. From Wrk1 you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office or the main office. What is the most likely cause of the problem?

Incorrect default gateway configuration at a workstation

You have used a set of bridges and routers to segment your LAN into smaller networks. What result will you get? select two

Increased number of collision domains Decreased congestion on each segment

Which of the following are results of using a router to segment a network? select two

Increased number of collision domains Fewer devices per broadcast domain

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs?

Increased security Increased number of broadcast domains

Which of the following are problems typically associated with the link-state routing method? (Select two.)

Increased use of router hardware resources High traffic to build routing tables

Which of the following are problems typically associated with the link-state routing method? select two

Increased use of router hardware resources High traffic to build routing tables

Quality of Service (QoS) prioritizes traffic from different data streams by using two classification systems. Match the name of the QoS classification system on the left with the appropriate description on the right. (each classification system may be used once, more then once, or not at all)

Individual frames are marked and classified at layer 2 Class of Service (COS) Classification occurs at layer 3 Differential Service Code Point (DSCP) Precedence values are interested in the DiffServ field of an IP packet Differential Service Code Point (DSCP) A priority value between 0 and 7 is assigned to a 3-bit field Class of Service (COS) Up to 64 different classifications are possible Differential Service Code Point (DSCP)

Review the image to answer the following questions. You would like to manually configure the trunk status on each port for switchA so that the appropriate type is selected and so that a trunking protocol is not used. Match the command on theft with the correct port on switch A. (commands on the left can be used once, more then once, or not at all)

Interface fa0/1 switch port mode access Interface fa0/2 switch port mode access Interface fa0/3 switch port mode trunk Interface fa0/4 switch port mode access

Which of the following symptoms indicate a layer 1 problem with serial0/1/1 interface?

Interface status shows serial0/1/1 is down, line protocol is down

Which of the following systems indicate a layer 2 problem with the serial0/1/1 interface?

Interface status shows serial0/1/1 is up, line protocol down

What are the main types of cloud services? select two

Internet cloud services External cloud services

You have a Cisco router connected to a local ISP. The ISP dictates that the router use DHCP to receive its IP address and other configuration information. Which command should you use?

Ip address dhcp

You have a network with two routers as shown in the exhibit. You would like to configure a single static route on RouterA that summarizes the routes accessible through RouterB. Which static route would you configure?

Ip route 172.17.1.64 255.255.255.192 serial 0/1/0

A switch running STA is in the listening state. A message arrives at the switch destined for a different network segment. Which of the following best describes what the switch will do?

It does not record address or segment information. It does not forward the message

Which of the following is true of the system ROM on a Cisco device?

It holds a limited version of the IOS software to be used if the full IOS image can't be found.

When referring to cloud computing, what does the term cloud mean?

It is a metaphor for the internet, based on the basic cloud drawing used to represent the telephone network

What is the back off on the ethernet network?

It is the random amount of time a device waits before retransmitting after a collision

Which of the following describes the purpose of the exterior Border Gateway Protocol (eBGP) ?

It is used when organizations need to share routing information across organizations and to advertises their block of public IP addresses to the world through their ISP

Which of the following are characteristics of ISDN? select three

It lets you transmit voice, video, and data over the same line It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It is a dial-up service that uses existing copper wire for the local loop

Which processes are used by Cisco express forwarding (CEF) to optimize packet processing through a router? select two

It organizes routing data in the forwarding information bas (FIB) It maintains adjacency tables

A switch is running the STA is sin the learning starts. A message arrives at the switch destined for a different network segment. Which of the following best describes what the switch will do?

It places the source address and segment in its database, but does not forward the message

What protocol does the Spanning Tree protocol prevent?

It prevents message loops from developing when a switch or bridge is connected to the same location more then once

You are deploying a new 10GB Ethernet network using Cat6 cabling. which of the following are true connecting this media? select two

It supports 10 Mpbs Ethernet connections It includes a solid plastic core

Which two of the following statements accurately describe full-duplex ethernet?

It uses direct point to point connections between the sender and receiver It is collision free

You have configured DHCP on your router. A partial configuration is shown below. Srv2 is a host connected to the fa0/1 interface of routerA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request IP address. Which of the following addresses will most likely be assigned to Srv2 when it boots?

It will not be assigned an IP address

You have configured DHCP on your tour. A partial configurations is shown below: Srv2 is a host connected to the fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422. Srv2 is configured to use DHCP to request an IP address. Which of the following addresses could Srv2 receive when it boots?

It will not be assigned an IP address

You have a switch connected to a small network as shown in the Exhibit. A hub connects Wrk1 and Wrk5 to the switch. The switch has the following information in its CAM table: Wrk 1 sends a frame addressed to Wrk5. What will the switch do with the frame? select two

It will not record the location of any device. Drop the frame

Which of the following measures can you implement to help secure access to a router through the con 0 line? select two

Keep the router in a locked room Set a password and use the login command

Which is the non Cisco version of etherchannel?

LACP

Review the IPv6 addressing scheme used in the network shown in the figure below. The goals of this network design include the following.... click on the LAN subnets and/or WAN subnets in this design that have not been addressed corectly

LAN FD01:0001:0001:001::/64 LAN FD01:0001:0001:005::/64

What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?

LCP. authentication, NCP

Which of the following protocols enables Cisco devices to discover non-Cisco devices?

LLDP

Which of the following are components of a link-state routing protocol? (Select three.)

LSA packets Topological database SPF algorithm

Queue schedulers are used for congestion management and define how a device will work through its queue. Match the names of the most commonly used queue schedules on the left with the appropriate description on the right. each name can only be used once

Labels one queue as priority. Rotates the queue and sends out multiple packets from the priority queue. Weighted Round Robin Rotates through each queue and processes and sends the next available packet Round Robin Assigned each queue a minimum bandwidth percentage Class-Based Weighted Fair Queuing

Workstation3 has started communications with workstation2. it sends a frame to the default gateway. Identify the layer 2 and layer 3 addresses used by the Cisco 2600 router to forward the data to workstation2 by dragging the corresponding address from the list on the left to its location on the right

Layer 2 source address 000b5f2a2222 Layer 3 source address 192.168.11.11 Layer 2 destination address 080046987654 Layer 3 destination address 192.168.10.12

Workstation 2 needs to send data to workstation3. Identify the layer 2 and layer 3 address used by workstation2 to send the data by dragging the corresponding address from the list on the left to its location on the right

Layer 2 source address 080046987654 Layer 3 source address 192.168.10.12 Layer 2 destination address 000b5f2a2222 Layer 3 destination address 192.168.11.11

When attempting to make a Telnet connection to a remote router, the connection fall. You check the interface status on your local router and find the following. You ping the remote router but that fails as well. At which layer of the OSI model does the problem originate?

Layer 3

A host computer has been correctly configured with a static IP address, but the default gateway is incorrect. Which layer of the OSI model is first affected by this misconfiguration?

Layer 3 is affected first. The default gateway sends IP packets to a remote network and functions at Layer 3 of the OSI model.

Which of the following are functions of the MAC sublayer in the OSI model? select two

Letting devices on the network have access to the lan Defining a unique hardware address for each device on the network

Which of the following are true about link state routing method?

Link state routers send updates immediately network traffic due to sharing routing information is less than the distance vector method Convergence is faster than the distance vector method

how are distance vector routing protocols different from link-state routing protocols ?

Link state routing protocols are faster to converge than distance vector routing protocols Distance vector routing protocols are easier to implement than link-state routing protocols Distance vector routing algorithms do not calculate the exact topology of a network

Which of the following are true about the link-state routing method? select three

Link state routing send updates immediately Network traffic due to sharing routing information is less than with the distance vector method Convergente is faster than with the distance vector method

What layer of the original tcp model was broken up into two layers?

Link was broken into data link and physical

Match the IPv6 prefix on the left with its description on the right.

Link-Local FE80::/10 Multicast FF00::/8 Unique Local FC00::/7

Which IPv6 address type is only valid within a subnet?

Link-local

How are distance vector routing protocols different from link-state routing protocols? (Select three.)

Link-state routing protocols are faster to converge than distance vector routing protocols. Distance vector routing protocols are easier to implement than link-state routing protocols. Distance vector routing algorithms do not calculate the exact topology of a network.

Which of the following describes the role of Distribution switches and how they are implemented in the design of a local area network on a university or corporate campus? select three

Linked to each other via high-speed connections Constitute the second tier in a two-tier network design Connected to high-speed core switches

Switches running the STA are in the process of exchanging BPDUs and defining heir roles. In what state are the switches in?

Listening

Which of following is true concerning GLBP? select two

Load balancing is achieved by the AVG replying to the hosts ARP requests with different virtual MAC addresses A GLBP group can have up to four member routers acting as IP default gateways

Which four of the following are the responsibility of the WAN service provider?

Local loop CO DCE PSE

Which items are held in a routers ram?

Log file entries Routing table entries The current router configuration file

You are configuring a router to redirect and consolidate log messages to a syslog server. The router has multiple interfaces. However, you want all log messages being sent to the syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router fro. Which command is used to accomplish this?

Logging source-interface <interface>

Which of the following are benefits of EIGRP?

Low use of network resources Supports multiple protocols

Which of the following are benefits of EIGRP? select two

Low use of network resources Supports multiple protocols

Which VSAT component provides data reception capabilities over a satellite link?

Low-noise Block Downconverter (LNB)

Which of the following is true of Mutliprotocol Label Switching? select two

MPLS-enabled routers switch packets based on the label information, not on the packet contents MPLS is designed to work with many different protocols

Match each characteristic on the left with the appropriate fiber optic connector on the right

MT-RJ Uses metal guided pins to ensure proper alignment LC Uses a connector that is half the size of the otters fiber optic connectors ST Uses a bayonet-type connector SC Uses a separate push-on, pull-off connector with a locking tab for each wire

What are the three problems caused by not using STP?

Mac table instability, broadcast storms, multiple frame transmission

You have implemented VLAN trunking on your network. You have two switches that are both configured to use dynamic auto mode. You discover that they are not trunking. Which of the following trunking configuration options can be used to make these two switches trunk successfully? select two

Manually configure trunking on at least one of the switches. Configure at least one of the switches to use dynamic desirable mode

You have decided to use ACLs on your router to restrict TFTP traffic between networks. Which of the following options can be used to fix this issue? select two

Modify the first line to access-list 100 permit udp host 172.17.8.1 host 10.0.0.1 eq 69 Modify the first ACL line to access-list 100 permit udp 172.17.8.1 0.0.0.0 host 10.0.0.1 eq 69

Which of the following are benefits of LCP? select three

Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links Negotiates the use (or lack) of authentication before starting the session

Match each routing method on the left with its associated characteristics on the right. Each routing method may be used once, more then once, or not at all.

Most appropriate on small networks Static routing Propagates changes in the network topology Dynamic routing Provides complete control over routes Static routing Most appropriate on networks that don't change frequently Static routing Keeps routing tale on each router up to date Dynamic routing

You are currently using OSPF on you r network. Which of the following would you gain by switching to EIGRP? select three

Multiprotocol support Faster recovery from primary link failure Autosummarization

You are currently using OSPF on your network. Which of the following would you gain by switching to EIGRP?

Multiprotocol support Faster recovery from primary link failure Autosummarization

Which of the following benefits are offered to an organization using network addresses translation (NAT)?

NAT provides a measure of network security

Your company has just started contracting with the government. As part of the contract, you have to configure a special server for funning custom application. Contract terms dictate that this server use only IPv6. You have several hosts that need to communicate with this server. Host run only IPv4 and cannot be configured. Which solution would you use to allow the IPv4 clients to communicate with the IPv6 server?

NAT-PT

Which of the following protocols is used by PPP to enable support for multiple network-layer protocols?

NCP

Which of the following must you modify to recover a lost password on a Cisco router? select two

NVRAM Configuration register

You have entered the following command to enable dynamic trunking configuration: switch(config-if)#switchport mode dynamic desirable If the switch interface is connected to another switch, what will it attempt to do?

Negotiate a link using the desired trunking protocol

PPP support authentication, compression, and multiple network-layer protocols. Which of the following correctly sequences these functions as performed when a PPP link is established?

Negotiate compression settings, perform authentication, negotiate network-layer protocols

Match the terms on the left with the appropriate OSl layer on the right. (Not all options are used.)

Network Later --packets --ip addresses --routing Transport Layer --udp --segments --windowing

Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right

Network layer/Packets Data link layer/Frames Physical layer/Bits Transport layer/Segments Application layer/Data

Which of the following are true about the link-state routing method? (Select three.)

Network traffic due to sharing routing information is less than with the distance vector method. Convergence is faster than with the distance vector method. Link state routers send updates immediately

The following names are given to data at various stages in the encapsulation process. 1. Packet 2.Bits 3. Segments 4.Frames To which layer of the OSI model do the names correspond?

Network, Physical, transport, datalink

You have issued the following command and have received the response as shown. Touter#sh start %%Non-volatile configuration memory has not been set up or has bad checksum Which of the following is a reason for this response?

No configuration file has been saved to NVRAM

You have a workstation configured with DNS server addresses as follows: *Primary DNS server = 192.168.1.1 *Alternate DNS server= 192.168.1.5, 192.168.1.222 In your browser you type www.widgetsinc.com. The workstation queries the primary DNS server for the corresponding IP address and the server responds with an Unknown Host message. What will the workstation do next?

Nothing

Which of the following best describes OSPF?

OSPF is a classless link-state routing protocol.

Which of the following statements are true regarding authentication for IPv6 OSPF routing? select two

OSPFv3 uses IPv6 IPsec authentication support and protection OSPFv3 header authentication fields have been removed from IPv6

What are the three modes of LACP?

On Active Passive

What are the three modes of PAgP?

On Auto Desirable

Two routers with the hostnames SLC and PROVO have been configured to connect using PPP and CHAP authentication through their BRI) interfaces. Attempts to establish a session between the two routers falls. You check the running configuration on both routers and find the output shown below.. What should you do to correct the problem?

On SLC, change the username password to chocolate

YOU have been using PVST+ on your Cisco switches. You'd like to start using rapid spacing tree instead. Which of the following would you do? select two

One each switch, configure the mode with the spanning-tree rapid-pvst command On each switch, use no spanning-tree portfast

Workstation2 needs to send data to workstation3. It sends out an ARP request for the address of the default gateway. Which of the following are true of this request? select two

Only the router will respond with an address of 000b5f2a2222 the switch sends the ARP request to workstation1 and the router

You are currently using EIGRP on your network, Which of the following would you gain by switching to OSPF? select two

Open standard Hierarchical netowrk design

You have a workstation configured with DNS server addresses as follows: *Primary DNS server = 192.168.1.1 *Alternate DNS server= 192.168.1.5 While browsing the internet you go to www.cisco.com. A few minutes later you type ping www.cisco.com into a command prompt. How will the workstation get the IP address for www.cisco.com?

Out of its local DNS cache

You want to create an ACL that prevents traffic from network A that is sent to host 1. You want the ACL applied after the routing decision is made. Which of the following would be part of your design? select two

Outbound filter Extended ACL

In STP what is root path cost?

Overall cost for a path to reach the root from a given port. The path cost goes up as bpdus are received and not when it's sent.

You are designing a new network that will support 6000 computers You only have 8 registered IP addresses that can be allocated to the employees for external network communications so you decide to implement NAT and share the addresses. You want all of these computers to be able to access the internet at the same time if necessary. Which method of NAT translation should you implement?

Overloading

Which is a Cisco version of etherchannel?

PAgP?

Your client has acquired several small companies and would like to connect them into one network. Not all the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?

PPP

Which type of network divides data to be transmitted into small units and then routes these units from originating system to the destination system, allowing multiple, concurrent communications on the network medium?

Packet-switching

When implementing a Multiprotocol Label Switching (MPLS) WAN, what data unit is managed by the routers at different sites?

Packets

What is the main security weakness in using the service password-encryption command?

Passwords can be easily broken

Authentication, authorization , and accounting (AAA) are the three security components used to protect network access and communications. Which of the following describes the authorization security component?

Permits or denies access to the network resources a suer needs to perform tasks

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not wastes IP addresses. How should you implement your plan?

Place all hosts on the same subnet. Use a mask of 255.255.254.0

You want to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain and want to make sure you do not waste IP addresses. How should you implement your plan?

Place all hosts on the same subnet. Use a mask of 255.255.254.0

Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored device?

Poll

An Internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and the HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?

Port and Socket number

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following does the privileged exec show isco command profile information about?

Port channel information

While working at the console of a Cisco device, you need to use the same command repeatedly. Given that the command is quite long, what can you do to avoid having to retype it over and over?

Press the up arrow key

Define processing switching.

Processing switching is the oldest forwarding mechanism supported on Cisco routers. Every packet processed by the router requires a full lookup in the routing table.

Which of the following describes the role of Core switches and how they are implemented in the design of a local area network on a university or corporate campus? select three

Provide high speed connections between distribution switches Not used in two-tier (collapsed core) network design Reduce the number of uplinks required to connect each building to the campus network.

Cloud resources serve models include infrastructure as a Service (IaaS), platform as a service (Paps), and software as a service (SaaS). Match the service models listed on the left with the appropriate description on the right.

Provider delivers everything a developer needs to build an application PaaS Providers deliver processing, storage, networks and virtualized environment services IaaS Clients deploy and run software without purchasing servers, data center space, or network equipment IaaS Provider delivers applications to the client either over the internet or on a local area network SaaS Client avoids the cost and complexity of buying and managing the underlying hardware and software layers PaaS

You have a workstation configured with DNS server addresses as follows: *Primary DNS server = 192.168.1.1 *Alternate DNS server=192.168.1.155 In your browser you type www.widgetsinc.com. The workstation queries the primary DNS server for the corresponding IP address and the server responds with an Unknown Host message. What will the workstation do next?

Query Server 192.1.1.155

Which of the following is NOT a VPN tunnel protocol?

RADIUS

In comparing RADIUS vs. TACACS+, which of the following statements are true? select three

RADIUS is more interoperable because TACACS+ is Cisco proprietary TACACS+ is considered more reliable than RADIUS because of TCP TACACS+ is more secure than RADIUS encrypts only the password

What does RFC 1918 define?

RFC 1918 defines reserved (private) networks and addresses that are not routed on the Internet. These addresses are as follows: * 10.0.0.0 to 10.255.255.255 * 172.16.0.0 to 172.31.255.255 * 192.168.0.0 to 192.168.255.255 They are used as internal private addresses within a corporation or home network. Private addresses are widely used today, and they employ mechanisms such as Network Address Translation (NAT) and Port Address Translation (PAT) to assist with "stretching" the current IPv4 address space. This stretching is done by translating private IP addresses to public routable IP addresses on the Internet, thus ensuring that private hosts can communicate externally without having a public IP address directly configured.

Which of the following statements about RIP are true?

RIP uses hop counts as the cost metric RIP is susceptible to the count-to-infinity problem

You currently manage two networks in two locations. Both networks are connected with a WAN link. The branch office connects to the main office through a non-Cisco router. You would like to use a routing protocol that supports VLSM and autosummarization. Which routing protocol should you use?

RIP v2

You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your Plan? select two

RJ-45 connectors Cat5e twisted pair cable

Shown here is a diagram of the back of a sample router. If Port C is the console port, what type of cable and connector would you use to connect to the console port?

RJ-45 rollover cable

You have a Cisco router with an integrated CSU/DSU. Which of the following connector types will you most likely y use to connect the router to the WAN service?

RJ-48

You issue the show version command at the CLI of the router. From where does the router boot?

ROM

RTR1, RTR2, and RTR3 have been configured to use the OSPF protocol. RTR1 and RTR2 are neighbors; RTR3 and RTR2 are also neighbors. RTR2 fails to receive a hello packet from RTR3 within the dead interval. what happens next?

RTR2 declares RTR3 to be down

An ompf router named RTR5 has been selected as the designated router (DR). which of the following are true for RTR5? select two

RTR5 has the highest OSPF priority All non-designated routers in the internetwork exchange link-state data with RTR5, but not with each other

You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What is the spanning tree mode for VLAN 1?

Rapid PVST+

Which of the following are benefits of EIGRP? select two

Rapid convergence Supports manual route summarization

Which of the following are benefits of EIGRP?

Rapid convergence supports manual route summarization

You have a new switch that you have just connected to the network as shown in the exhibit. After connecting the switch to the network: Host A sends a frame addressed to Host D. Host A sends a frame addressed to Host A. Host B sends a frame addressed to Host C. The switch receives a frame on Fa0/3 addressed to the MAC address of Host D. What will the switch do?

Record the MAC address of Host C, then forward the frame out all ports except Fa0/3

What are DRs and BDRs used for when using the OSPF routing protocol ?

Reduce routing table updates in a broadcast type network

What are Drs and BDRs used for when using the OSPF routing protocol?

Reduce routing table updates in a broadcast type network

What is reliable versus best-effort delivery?

Reliable delivery is connection oriented, and best-effort is connectionless.

You have several traveling sales representatives that need to connect to your company network while traveling. They will connect to the Internet at hotels and kiosks using a variety of computers, many of which will be managed by other organizations. You want to provide them with a secure solution for accessing company resources. Which should you include in your configuration? select two

Remote access VPN SSL VPN in clientless mode

You are troubleshooting the connection on a switch. The device connected to the switch on fa0/8 is powered on. Which would you do to coeected the status of fa0/8. Note: you will not be able to use the show run or show start commands in this lab.

Replace the cable

You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that has a source address that appears to be coming from the two internal networks. However, you find that no traffic is being accepted on the s0/1/0 interface. What should you do?

Rewrite the ACL statement to use the format: access-list 107 deny ip 192.168.1.0 0.0.0.255 any

What are the ports called that forward frames directly to the root bridge?

Root port

What does route aggregation mean when referring to VLSM?

Route aggregation means combining routes to multiple networks into one larger IP network or aggregated IP subnets within the class rules.

Which of the fowling are ways you can prevent routing loops with loops with a distance vector routing protocol? select four

Route poisoning Split horizon Static routes Hold-downs

You are asked to design a LAN segmentation solution for a Company AHG. They have three workgroups, Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the needs while providing the most economical and simplest administration?

Router

You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx ethernet network with an older token ring network. Most traffic will be localized with each network, with only a little traffic crossing between networks. Bothe networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation.

Router

A home wireless access point is usually three devices in one. Which of the following devices are usually found in a home wireless access point? select three

Router Switch Wireless access point

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two

Router A will serve as acrtive router, and Router B will serve as standby router If the permeated router fails and then recovers, it will send a coup message to return as the active router.

You have five routers running OSPF on a single subnet. Router B has been elected as the DR. You remove RouterB from the network for a hardware upgrade. The next day you add the router back onto the network. What will happen when you add RouterB back onto the network?

Router B will become the DR only if a new election occurs

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two

Router B will serve as the AVG for GLBP group 5 GLBP load balancing for group 2 will be host-dependent

You would like to clear the OSPF database have it repopulated and then perform the shortest path first (SPF) algorithm for IPV6 routing. Which command(s) would you use?

Router#clear ipv6 ospf process

You would like to clear the OSPF database, have it repopulated, and then perform the shortest path first (SPF) algorithm for IPv6 routing. Which commands would you use?

Router#clear ipv6 ospf process

You want to configure static NAT so that packets from host 192.168.2.100 will always be assigned the registered IP address 24.1.2.11 as shown in the exhibit. Match the missing lines with the required commands.

Router(config)# ip nat inside source static 192.168.2.100 24.1.2.11 Router(config)# interface ethernet 0 Router(config-if)# ip nat inside Router(config-if) interface serial 0 Router)config-if)# Ip nat outside

Which of the following commands demonstrates the first step in configuring a new multilink interface>

Router(config)#interface multilink [number]

Which commands uses the correct syntax and argument to create an IPv6 ACL?

Router(config)#ipv6 access-list DENY_FTP

Which of the following commands defines a BGP process and ASN?

Router(config)#router bgp [number]

You would like to enable an OSPFv3 routing process on a single interface and begin to use route IPv6 traffic. Which command(s) would you use?

Router(config-if)#ipv6 ospf <process id> area

You would like to enable an OSPFv3 routing process on a single interface and begin to use route IPv6 traffic. Which commands would you use?

Router(config-if)#ipv6 ospf <process id> area

Complete this network diagram by dragging the correct device name or description to the correct location. Not all the names or descriptions will be used.

Router, dte, dce, csu/dsu, digital line, wan service provider

You have configured routerA, B, and C as shown in the exhibit. Users in network 10.0.0.0 report that they have no trouble accessing resources within their worn network, but claim they cannot access a database located on subnet 192.168.0.0. Users all the other networks claim they are basing no problems accessing the database. what is the problem?

RouterA has been configured with an incorrect network address

You are running OSPF as your touring protocol. One ethernet subnet has five OSPF routers on the subnet. A partial configuration for two of the routers is shown below. Both routers are connected to the subnet through the fa0/1 interface. All interfaces are up. Assuming that either routerA or routerB will become the DR, which one will be elected the DR for the subnet?

RouterA will be the DR because of the loopback interface IP address

You are running OSPF as your routing protocol. One ethernet subnet has five OSPF routers not eh subnet. A partial configuration for two of the routers is shown below. Both routers are connected to the subnet through the fa0/1 interface. All interfaces are up. Given the configuration, which of the following statements are there for both routers on SubnetA? select three

RouterA will never become the DR or the BDR The router ID for routerB is 12.0.0.1 The router ID for RouterA is 15.1.1.1

You have established an SSH connection to your router. You use the following command and receive the error message below. Router>enable % Error in authentication Which command would correct the problem

RouterA(config)#enable secret cisco

You have a small network with IP addresses assigned to router interfaces as shown in the exhibit. You need to configure a static route on RouterA for SubnetC. Which command would you use?

RouterA(config)#ip route 10.155.64.96 255.255.255.240 fa0/1

To secure remote console sessions, you have just configured your router to require SSH with the following command: Routera(config-line)#transport input ssh When you go to connect, the system prompts you for a username and password. You recall that you did not configure this information. Which command(s) would complete the SSH configuration?

RouterA(config)#username admin password canyon

You have five routers running OSPF on a single subnet. RouterB has been elected as the DR. You remove routerB from the network for a hardware upgrade. The next day, you add the router back onto the network. What will happen when you add RouterB back onto the network?

RouterB will become the DR only if a new election occurs?

You have three hosts on a network 192.168.10.0/24 as shown in the exhibit. If interface fa0/0 on RouterB has the ip helper-address 172.12.10.20 configuration command in its running configuration, which of the following statements are true? select two

RouterB will forward broadcast packets sent to the following ports: Time, DNS, BOOTP, and TFTP The host may receive their IP address information through DHCP

You have a small network with IP addresses assigned to router interfaces as shown in the exhibit. You need to configure a static route on RouterB for SubnetA. Which command would you use? select two

RouterB(config)# ip route 192.168.111.128 255.255.255.128 172.18.12.197 RouterB(config)#ip route 192.168.111.128 255.255.255.128 fa0/0

You have an office connected to the internet as shown in the exhibit. The network has three subnets, all with client computers. The Web1 server on subnet1 host as small website used for traveling employees. Employees must be able to contact the web server from the internet. All other hosts on the private networked to have full internet connectivity for browsing the web and sending email. On which routers should you configure NAT?

RouterC

You have configured routerA, B, and C as shown in the exhibit. Users in network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. What is the problem

RouterC has been configured with the incorrect AS number

Which of the following are general advantages of using routers on your network? Select three

Routers provide multiple links between devices to support load balancing Routers provide more features, such as flow control, error detection, and congestion control, then switches or bridges Routers support multiple routing protocols for better flexibility

Which three of the following are general advantages of using routers on your network?

Routers provide multiple links between devices to support load balancing Routers support multiple routing protocols for better flexibility Routers provide more features such as flow control, error detection, and congestion control then switches or bridges

Which of the following are true about the distance vector method of sharing routing table information?

Routers send routing information only to their neighbor routers The entire routing table is sent to other routers

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Routers use ARP to resolve known IP addresses into MAC addresses by broadcasting request to the network.

Which two of the following functions are performed by IP?

Routing datagrams to host Identifying hosts with the IP address

Routing flashcards introduction

Routing is the process of finding a path to a destination and moving data across this path from source to destination. Routers are used to connect different IP networks and are essential devices that help make communication on the Internet. Routers are a major component of the routing process. Without routing, we would not be able to send emails, view our favorite websites, listen to music streams, or watch videos on the Internet. In general, routing is considered a hop-by-hop paradigm. Some exceptions to this exist, such as multicast routing, but the ICND exams do not cover multicasting. Data is moved from router to router until it reaches the destination. A router's main function is path determination and packet forwarding. This section covers the most basic terminology of routing and introduces you to the basics of static routing and configuring a Cisco router with basic IP information. Additionally, CDP is discussed. CDP is a Cisco-proprietary protocol that provides discovery of directly connected Cisco devices.

Provide a brief description of routing.

Routing is the process of finding a path to a destination and moving information across an internetwork from the source to the destination.

How do routing protocols maintain their routing tables with each other?

Routing protocols maintain their routing tables through the transmission of messages. These messages are exchanged between routers at periodic intervals or when a change in the network topology occurs. The information contained in the messages varies from routing protocol to routing protocol.

Which of the following are components of link-state routing protocol?

Routing table of paths and ports Hello packets SPF tree

You are in the process of configuring a new router. You have configured a hostname and ip domain name for the router. you continue with the following commands. RouterA(config)#enable secret highway RouterA(config)#username admin password television RouterA(config)#crypto key generate rsa RouterA(config)#aaa new-model RouterA(config-line)#login RouterA(config-line)#line vty 0 4 RouterA(config-line)#password garage RouterA(config-line)#transport input ssh RouterA(config)# line con 0 RouterA(config-line)#passwork airplane What owl you do to establish a remote console session with the router? select two

Run SSH Use admin for a username and television for the password

Which of the following internet services provides equal upload and download bandwidth

SDSL

Which SNMP component monitors individual network devices?

SNMP agent

Which component is responsible for collecting and consolidating data from network devices that are being monitored with SNMP?

SNMP manager

Which of the following are true recurring SNMP? select two

SNMPv3 employs the encryption of packets to prevent snooping by an unauthorized source SNMPv1 and SNMPv2c can be compromised because the community string for authentication is sent in clear text

You implemented SNMPv2 as a part of your overall network management plan. You configured an SNMP manager to gather traps from SNMP agents that run on monitored network devices. To secure communications between the SNMP manager and the agent, you configure a trap community name of abc123. After funning the system for some time, you notice that traps contained questionable events are being sent to SNMP manager. Upon investigation, you discover that a malicious insider has been spoofing these events, attempting to cover her tracks as she tried to compromise several network hosts. What could have been done to prevent this from happening?

SNMPv3 should have been implemented instead of SNMPv2

Which of the following are components of a link-state routing protocol? select three

SPC algorithm Topological database LSA packets

You have several remote clients that need to connect to your company network while traveling. They will connect to the internet at hotels and airports using company-issued laptops. You would like to allow access without the use of a browser. You want to provide them with a secure solution for accessing company resources. Which should d you include in your configuration? select two

SSL VPN in full tunnel mode Remote access VPN

Which VPN solution provides access through Java plug-ins, port forwarding, and shared folder content?

SSL VPN in thin-client mode

Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges?

STP prevents message loops from forming STP lets you provide redundancy by using more then one connection between devices, which makes your network more stable. STP identifies the most efficient path through a bridged network

For each operation listed on the right, drag and drop the corresponding command from the list on the left.

Save the current configuration to NVRAM copy run start Load the current configuration saved in NVRAM into memory copy start run Save the current configuration to a network server copy run tftp copy a configuration file from a network server into NVRAM copy tftp start

You have been assigned a network address of 131.189.0.0. You have submitted the network using 255.255.224.0 as the subnet mask. Which of the host address assignments in the graphic will to cause problems.

Scenario 2

You have been assigned a network address of 131.189.0.0. You have subnetted the network using 255.255.224.0 as the subnet mask. Which of the host address assignments in the graphic will not cause problems?

Scenario 2

You have been assigned a network address of 211.155.189.0 You have subnetted the network using 255.255.255.224. as the subnet mask. Which of the host address assignments in the graphic will not cause problems?

Scenario 4

You have been assigned a network address of 211.155.189.0. You have submitted the network using 255.255.255.240 as the subnet mask. Which of the host address assignments in the graphic will to cause problems.

Scenario 4

Which of the following methods helps to detect lost packets? select two

Sequencing Acknowledgement

Shown below is a digram of the back of a sample router. Match the connector type with the router port.

Serial0 Smart Serial FE 0/0 RJ-45 Console RJ-45 T1 DSU/CSU RJ-48

You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, which of the following are true? select two

Serial0 is a feasible successor route Ethernet0 and ethernet1 are successor routes

A client computer starts to download some files from an FTP server named FTPSrv1. While the first download is in progress, the user opens the second instance of the FTP program and initiates a second download. What does the server and the client use to keep each download separate?

Session ID

What is session multiplexing?

Session multiplexing is a process that allows a host with a single IP address to support multiple sessions simultaneously. A session is created when a source host needs to send data to a destination host.

YOu want to verify that trunking is enable between the Catalyst 2950XL switch and the Cisco 2600 router. Which command must you enter?

Show interface fa0/1 trunk

What command displays access lists on the device?

Show ip access-list

You are consulting with a client about a WAN implementation. Because the clients facility is located in a remote location, a VSAT link would provide the fastest WAN link. Which of the following are disadvantages associated with using satellite-based WAN links? select two

Signal latency Weather interference

You want to implement an Ethernet network using the 100BaseFX standard using the minimum hardware specifications possible. You need to support a distance of up to 1,000 meters. Which of the following should you include in your plan? select two

Single-mode fiber optic cable SC connectors

Your company has just merged with a partner company. During the merger, you need to provide users in Dalles with access to the company network in Houston. You want to minimize the configuration on individual client workstations. You want to provide them with a secure solution for accessing company resources. Which should you include in your configuration?

Site-to-site VPN IPsec

You have a Cisco router with a single WIC that has two serial ports. You will connect the router to an eternal CSU/DSU. Which of the following cables and connectors will you most likely use to connect the router to the CSU/DSU?

Smart Serail DTE cable

Enterprise networks are simplifying network management by moving away from the distributed architecture model for managing network communications. What is the name of the network management model that replaces the distributed architecture model?

Software-defined networking (SDN)

You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet to workstation3. When the packet reaches workstation3, which source addresses are in the frame and packet? select two

Source MAC address=000b5f2a2223 Source IP address=192.168.10.11

One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?

Split horizon

One method of preventing routing lops is to not send information about a route back to the router from which the information came. What is this technique called?

Split horizon

Which of the following methods of preventing the cost-to-infinity problem with distance vector routers will send a hop count of 16 back up the path from which the information was obtained?

Split horizon with poison reverse

Which of the following methods of preventing the count-to-infinity problem with distance vector routers will send a hop count of 16 back up the path from which the information was obtained?

Split horizon with poison reverse

You are the network administrator for a small company tat implements NAT to access the internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP address to support these new servers but you dont want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers.

Static

Which of the following are ways you can prevent routing loops with a distance vector routing protocol? (Select four.)

Static routes Split horizon Hold-downs Route poisoning

Drag the cable type on the left to the purpose for which it is best suited on the right. (Not all options are used.)

Straight Through crossover rollover

You have a business network connected to the internet as shown in the exhibit. You have configured NAT on RouterC. Which of the following addressing schemes could you use on each subnet on the private network?

Subnet1= 192.168.1.0/24 Subnet2= 10.3.0.0/16 Subnet3= 172.16.1.0/16

You have a network with two routers as shown in the exhibit. You need to assign subnet addresses and masks to subnets 1,2, and 3. Which subnet value should you use?

Subnet1=172.16.0.16/29 Subnet2=172.16.0.0/28 Subnet3=172.16.0.28/30

You have a small network with three subnets as shown in the exhibit. IP addresses for each router interface are also indicated. How many IP addresses on each subnet remain that can be assigned to hosts?

SubnetA=125, SubnetB=0, SubnetC=13

You have a single router with three subnets as shown in the Exhibit. Each subnet has the number of host specified. You need to select a subnet mask for each subnet that provides sufficient host addresses without wasting addresses. Which mask value should you use?

SubnetA=255.255.255.192 SubnetB=255.255.255.224 SubnetC=255.255.255.128

A VPN (Virtual Private Network) is used primarily for what purpose?

Support secured communications over an untrusted network

Which of the following is a characteristic of SDSL?

Supports data traffic only (no voice)

You want to prevent collisions on your network by creating separate collision domains and define virtual LANs. Which of the following devices should you choose?

Switch

You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from forwarding packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?

Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk allowed vlan remove 3

You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from tagging packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?

Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk native vlan3

You are configuring a Catalyst 3550 switch for interVLAN routing. You are adding VLAN 11 to the switch The VLAN 1 and 2 interfaces already have a configuration on the switch, and now you need to configure the VLAN 11 interface. Which commands would you use?

Switch(config)#int vlan 11 Switch(config-if)#ip address 172.16.11.1 255.255.255.0 Switch(config-if)#no shutdown

Which command(s) would you use to configure a default-gateway on a Catalyst 2950XL switch?

Switch(config)#ip default-gateway 192.168.10.1

You are configuring two Catalyst 2960 switches with redundant connections. To reduce spanning tree convergence times, you should configure the switches to actively negotiate an ether channel using LACP channel group4. Which command would you use for each redundant link?

Switch(config-if)#channel-group 4 mode active

You are configuring two Catalyst 3550 switches with redundant connections. To increase the available traffic bandwidth between the switches, You should configure the switches to actively negotiate an eatherchannel using PAgP channel group 5. Which command would you use for each redundant link?

Switch(config-if)#channel-group 5 mode desirable

You need to configure spanning tree on A Cisco 2960 switch. You'd like to use a spanning tree protocol that uses the 802.1w standards. You'd like to take advantage of fast convergence when the trunk link goes down and fast transition to forwarding state for edge links. Which commands will be part of your configuration? select two

Switch(config-if)#spanning-tree protfast Switch(config)#spanning-tree mode rapid-pvst

You have tow IP phone daisy chains as shown in the exhibit. Which of the following commands correctly configures port security on both fastethernet 0/5-6? select two

Switch(config-if)#swithport port-security Switch(config-if)#swithport port-security maximum 3

Which of the following statements accurately describes a VLAN ID?

Switches append a VLAN ID to the header of each frame to identify the virtual network to witch it belongs

Which of the following accurately describe how switches and hubs work? select two

Switches use the hardware address in the frame to send it only to the port where the device is located A hub repeats frames to all ports, regardless of the destination address.

You are implementing internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their internet connection must provide a data are of at least 20-30 M bps. Which type of service should you implement.

T3

How does TCP handle data sequencing?

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for acknowledgement before sending the next segment.

Which has more overhead: UDP or TCP?

TCP has more overhead. Because UDP segments are not acknowledged, they do not carry the overhead that TCP does, thus allowing faster transmissions.

You have issued the following commands at the server console router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any router(config)#int eth router(config-if)#ip access-group 122 out Which of the following statements is true?

TCP packets received from host 10.6.12.45 on the serial 1 interface can be forwarded out the eth 0 interface

How do TCP and UDP perform segmentation?

TCP performs segmentation by taking data chunks from applications and breaking them into smaller segments that will fit in the maximum transmission unit (MTU) of the underlying network layers. UDP does not perform segmentation; instead it expects the application process to send data in correct sizes.

Your documenting the configuration of your router. When you run the show interfaces S0 command, you receive the output shown below. Given this output, which of the following statements is true?

TCP/IP and CDP are being encapsulated

How do TCP/IP protocols identify applications?

TCP/IP protocols identify applications through port numbers.

Understanding TCP-IP flash cards introduction

TCP/IP was created by the Defense Advanced Research Projects Agency (DARPA) to run as the protocol for the ARPANET in 1974. TCP/IP is the most widely used protocol suite in the world today. It is the protocol suite used on the Internet, and most network operating systems (NOS) require TCP/IP to run to communicate with other nodes. TCP/IP is the protocol suite you will encounter the most as a network engineer. You must thoroughly understand TCP/IP and know how it works. As you can tell by its name, TCP/IP is a suite of protocols, with its major protocols being TCP and IP. TCP provides reliable delivery, and IP provides network addressing and routing. Currently, two versions of IP exist: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 is the most widely used implementation of IP. IPv4 has a 32-bit network address, and IPv6 has a 128-bit network address. Currently, IPv4 addresses are exhausted. As a result, IPv6 is being implementing in the Internet. This section focuses on IPv4 addresses unless otherwise noted. Variable-length subnet masking (VLSM) is a way to divide larger subnets into smaller subnets. VLSM was introduced as a way to save IP addresses from being wasted and can combine networks to summarize routes. Route summarization reduces the size of routing tables and improves convergence time by advertising the entire summary route instead of each individual route. For example, a large company is using the IP range 192.168.1.0 to 192.168.255.255, instead of advertising all 255 networks, the company could summarize one route to all its networks: 192.168.0.0 255.255.0.0 to other routers.

What is the IP protocol number for TCP and UDP?

TCP: 6 UDP: 17 Note: IP protocol numbers are the link in the IP header that points to upper-layer protocols such as TCP and UDP.

You have typed the following commands at the router prompt. Router(config)#boot system tftp TFTPIOS2 192.124.16.201 Router(config)#boot system flass fallbackIOS Router(config)#boot system tftp TFTPIOS1 192.124.16.201 Router(config)#exit Router# copy run start Which of the follows correctly shows the order in which the router looks for the IOS image?

TFTP server (TFTPIOS2), flash (TFTPIOS2), TFTP server (TFTPIOS1)

You are the administrator of the network in the exhibit. You want to configure the stub network located in Tampa to forward packets to Chicago, but you do not want the overhead associated with a routing protocol. Which of the following will accomplish your goal?

Tampa(config)#ip route 0.0.0.0 0.0.0.0 182.1.48.3 Chicago(config)#ip route 182.1.48.0 255.255.240.0 182.1.48.4 Chicago(config)#ip route 192.168.112.128 255.255.255.248 182.1.48.4

You are physically seated at a host connected to the console on the seattle router as shown in the exhibit. You need to know what IP address has been configured on the E0 interface on the New York router. What are your options? select two

Telnet to New York. From privileged mode type show interface E0 Telnet to Toronto. From privileged mode top show cdp neighbors detail

You have a special server at work with a custom application installed. Connections to the server that use custom applications must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connections. Your laptop supports both IPv4 and IPv6. The rest of your company networks runs only IPv4. You need a cost-effective solution to allow your laptop to connect to the server. Your solution must also support communications through NAT servers. Which method should you use?

Teredo

What does the 'show cdp neighbors detail' command display?

The 'show cdp neighbors detail' and 'show cdp entry *' (without qoutes) commands show the same output. They both display the following: * Device ID -host name of the remote neighbor * Layer 3 addresses of the remote device interface that is connected to the local device * Device platform and capabilities * Local interface and outgoing port ID * Local holdtime that is associated to the remote device * IOS type and version

What does the 'show cdp traffic' (without qoutes) command display?

The 'show cdp traffic' command, as follows, displays information about interface traffic. This includes the number of CDP packets sent and received and CDP errors: RouterB# show cdp traffic CDP counters : Total packets output: 550, Input: 682 Hdr syntax: 0, Chksum error: 0, Encaps failed: 0 No memory: 0, Invalid packet: 0, Fragmented: 0 CDP version 1 advertisements output: 0, Input: 0 CDP version 2 advertisements output: 550, Input: 682

You've just configured router_london as shown in the exhibit. The router is part of EIGRP autonomous system 200. Both directly connected networks 172.17.0.0 and 172.18.0.0 are to be advertised to neighbor routers within AS200. When testing your router, you discover the neighboring routers have no entries in their routing table for our subnets. What is the problem?

The AS has been incorrectly configured

Which of the following are true of EIGRP configuration to enable two routers to become adjacent?

The AS number used to configure EIGRP must match Authentication parameters must match

A router serving as the AVG in a GLBP group has which of the following responsibilities? select two

The AVG is responsible for answering Address Resolution Protocol (ARP) request for the virtual IP address The AVG assigns a virtual MAC address to each router of the GLBP group

What is DNS?

The Domain Name System (DNS) converts domain names or host names into IP addresses. Instead of having to remember a host's IP address, DNS allows you to use a friendly name to access the host. For example, it is easier to remember http://www.cisco.com than 198.133.219.25.

What happens after the HSRP holdtime expires on the hello message? select two

The HSRP standby router becomes the active router Additional HSRP member routers transition from the listen state

What effect does the standby 2 track serial 0/0 25 interface configuration command have? select two

The HSRP standby router will become the active router if both routers have default configurations Decrements the HSRP group priority by 25 if the interface goes down

How do you display the status of interface F0 only?

The IOS commands to display the status of interface F0 only are as follows: * show interface f0 * show ip interface f0 * show protocols f0

You have a small network connected to the Internet as shown in the exhibit. You need to configure the default gateway address on Wr1 so that it can communicate with hosts on the internet. Which address would you use for the default gateway address?

The IP address assigned to FA0/0 on Router 1.

You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?

The IP address assigned to Serial0/0 on LondonA is not on the same subnet as the IP address assigned to Serial0/1 on LondonB

RouterA and RouterB are connected with a serial link. A portion of the router configuration files is shown below. RouterA cannot communicate with RouterB. What is the problem

The IP address for RouterA is not on the same subnet as the IP address for RouterB

What makes up the bridge Id?

The MAC address and priority number?

How are routing tables created by link-state routing protocols?

The SPF algorithm is applied to the topological database to create a routing table

How are routing tables created by link-state routing protocols?

The SPF algorithm is applied to the topological database to create a routing table.

You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. Why isn't this switch the root bridge?

The VLAN number has been added to the configured bridge priority

What happens when the host sends an ARP request to the HSRP group 3s virtual IP address?

The active router will return 0000.0c07.ac03 as the mac address for the default gateway

Quality of Service (QoS) is particularly important when implementing Voice over IP )VoIP), Video over IP, online gamin, or unified communications, in which delay or data loss make the overall experience unacceptable. QoS uses certain metrics to determine communication quality. Match the names of the metrics on the left with the appropriate description on the right. (Each metric name can only be used once)

The amount of time that passes from when a packet is sent to when it arrives Delay The percentage of packets that do not arrive at their destination Loss The variation in delay when sending multiple packets from the same device Jitter The capacity of a connection between two or more devices Bandwidth

Which of the following are true of OSPF configuration to enable two routers to become adjacent? select two

The are assigned to each network must match Hello and dead timer intervals must match on all routers

Which of the following is not an advantage of connecting only one device to each switch port?

The broadcast domain is reduced to only one device

You have implemented a network switch. Each switch port is connected to a workstation or server host. Which of the following is NOT true regarding this implementation?

The broadcast domain is reduced to only one device

Which of the following are characteristics of a switch? select two

The collision domain on a switch is all devices connected to a single switch port A switch reads the MAC address in a frame and makes forwarding decisions bases on that address.

When switches use MAC address and associated port information to determine where to forward frames, which network communication plane is being used?

The control plane

What is the correct network address for host 192.168.10.72/26?

The correct network address is 192.168.10.64. A 26-bit subnet mask is 255.255.255.192. A quick way to find the network of a given subnet mask is to subtract the last portion of the subnet mask from 256. In this case, 256 - 192 = 64. Assuming that the ip subnet zero command is enabled on the router, the usable networks for a 26-bit subnet mask are as follows: * 192.168.10.0 * 192.168.10.64 * 192.168.10.128 * 192.168.10.192 Host 192.168.10.72 falls in the 192.168.10.64 network.

Packet switching, packet routing, and packet interpretation are examples of network communications, On which plane do these network communications occur?

The data plane

Software-defined networking (SDN) works by using software to configure and control the network, rather than relying on device-specific static configurations. The SDN model creates a centralized architecture that replaces distributed architecture model. How does this shift to a centralized architecture affect the three planes of network communication?

The data plane and control plan have to be separate

What is the purpose of the default gateway?

The default gateway allows hosts to communicate with hosts that are on a different network segment. All data that is not destined for the same network of the sending device is sent to the default gateway for delivery.

You have a small network as shown in the Exhibit. You are unable to pink Wrk2 from Wrk1. What is causing the problem?

The default gateway setting on Wrk2 is not on the same subnet as its IP address

You have a small network as shown in the exhibit. You are unable to ping Wrk2 from Wrk1. What is causing the problem?

The default gateway setting on Wrk2 is not the same subnet as it's IP address

If an IP addressed device wants to communicate with all devices on the local network, what is the destination IP address of its broadcast?

The destination IP address is 255.255.255.255. This address is also called the local broadcast address.

You have a workstation connected to a small network with one subnet. The subnet is connected to the Internet through a local ISP. You are having trouble connecting to one of your favorite web sites. You issue a tract command and see that output shown below. C:\tracert 166.77.11.1 Tracing rout to 166.77.11.1 over maximum of 30 hops 12 ms 1ms 1ms a.abc.net [209.63.168.50] Which of the following is the most likely cause of the problem? select two

The destination network can be reached, but the hose does not respond. A router in the path does not have a route to the destination network.

Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with swtch2. To check the status of the interface, you run the following commands What is the issue with this network?

The device connected to the Fa0/1 interface has auto negotiation disabled

What are the different classes of IP addressing and the address ranges of each class?

The different classes of IP addressing and their ranges are as follows: * Class A: 1.0.0.0 to 126.255.255.255 * Class B: 128.0.0.0 to 191.255.255.255 * Class C: 192.0.0.0 to 223.255.255.255 * Class D: 224.0.0.0 to 239.255.255.255 (Multicasting) * Class E: 240.0.0.0 to 255.255.255.254 (Reserved) Note: 127.0.0.0 is also a Class A network, but it is reserved for the loopback, or "localhost," IP—the IP address of the TCP/IP software itself.

How are distance vector routing protocols similar to link-state routing protocols? (Select two.)

The distance vector routing protocol RIP and the link-state routing protocol OSPF and both are interior gateway protocols. The trustworthiness of both types of routing protocols is rated by an administrative distance.

How are distance vector routing protocols similar to link-state routing protocols? select two

The distance vector routing protocol RIP and the link-state routing protocol OSPF are both interior gateway protocols The trustworthiness of both types of routing protocol is rated by an administrative distance

Which of the following are true about the distance vector method of sharing routing table information? (Select two.)

The entire routing table is sent to other routers. Routers send routing information only to their neighbor routers.

You have configured an ether channel between two switches. To verify the ehterchannel, you use the show ether channel summary command and receive the output as shown in the exhibit. Which of the following is true? select two

The ether channel is using 802.3ad standard Gigabitethernet 0/1 and 0/2 are part of channel group 1

What is the range of binary values for the first octet in Class B addresses?

The first octet for a Class B IP address is 128-191 in decimal, which is 10000000-10111111 in binary. If you see similar questions on the ICND 1 exam, remember the following: * Class A addresses always have the high-order bit as 0. For example, 0xxxxxxx. * Class B addresses always have the high-order bit as 1 and the second bit as 0. For example, 10xxxxxx. * Class C addresses always have the high-order bit and second bit as 1. The third bit is 0. For example,110xxxxx.

What are the five types of reserved IPv4 addresses?

The five reserved IPv4 addresses are: * Network address: The address of the network is an IP address that has binary 0s in all the host bit positions. * Direct broadcast address: An address for each network that allows communication to all hosts on a network. The direct broadcast address has all 1s in the host bit positions. * Local broadcast address: Used to allow hosts to communicate with all hosts on a local network. The address used is 255.255.255.255. * Local loopback address: Used to let the system send a message to itself for testing. This address is 127.0.0.1. * All zeros address: Used to indicate hosts in "this" network and used only as a source address.

What are six types of information stored in routing tables?

The following are six types of information stored in routing tables: * Destination network address * Next-hop address * Exiting interface * Metric * Administrative distance * Routing source

What are the four types of routes found in a routing table?

The four types of routes found in a routing table are as follows: * Directly connected networks: Route entries that a router is directly connected to. * Static routes: Routes entered manually by an administrator. * Dynamic routes: Routes learned and populated by a routing protocol. * Default route: Used to route packets when the router does not have a specific destination for packets in its routing table. The default route is entered manually or dynamically.

The Houston router is connected to the Dallas router with a serial link. You have configured both routers with OSPF. You use the debug ip ompf events command and see the following output. What is the problem

The hello timer configured on the Dallas router is incorrect

Hold downs use triggered updates to help prevent routing loops by letting routers know of changes in the network. Which of the following events can reset the hold down timer?

The hold-down timer receives notification of a change in network status The hold-down timer runs out

Hold downs use triggered updates to help prevent routing loops by letting routers know of changes in the network. Which of the following events can reset the hold-down timer? (Select two.)

The hold-down timer runs out. The hold-down timer recieves notification of a change in network status.

You are implementing interVLAN routing using a multi-layer switch as shown in the exhibit. Which of the following is true

The host in VLAN 1 will use 192.168.1.1 as the default gateway IP address The switch can route between VLAN interfaces 1 and 2 as if the interfaces where physical links

You are implementing interVLAN routing using a router-on-a-stick configuration as shown in the exhibit. Which of the following is true? select two

The host in VLAN 2 will have 192.168.2.1 as the default gateway IP address The router will not use 802.1Q to encapsulate VLAN 1 traffic

How do you give a Cisco router a name?

The hostname name global configuration command configures a name on a Cisco router. For example, the following command changes the router's host name to RouterA: Router(config)# hostname RouterA RouterA(config)#

You have configured an OSPFv3 router interface as a passive interface. Which of the following is true?

The interface advertises all subnets connected to interface

You have configured an OSPFv3 router interface as a passive interface. Which of the following is true?

The interface advertises all subnets connected to the interface

You have a workstation connected to a small network with one subnet. The subnet is connected to the Internet through a local ISP. You are having trouble connecting to one of your favorite web sites. You issue a tract command and see that output shown below. C:\tracert 166.77.11.1 Tracing rout to 166.77.11.1 over maximum of 30 hops 1*** Requested timed out Which of the following is the most likely cause of the problem? select two

The local workstation is configured with an incorrect default gateway address Your local router is down

When network administrators connect to and configure network devices, which network communications plane is being used?

The management plane

What are the most common fields that are included in the TCP header?

The most common used fields included in the TCP header are as follows: * Acknowledgment Number * Sequence Number * Source/Destination Port * Window Size * TCP Checksum

Which of the following are true regarding using multiple VLANs on a single switch? select two

The number of broadcast domains increases The number of collisions domains remains that same

You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-shutdown violation mode; shutdown What is true of this configuration?

The port has been disabled because too many MAC address have been detected

You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-up violation mode; protect What is true of this configuration? select two

The port has learned one MAC address and saved that address in the running config file The port allows up to two connected devices

You are checking the status of port Gi0/1 on your Cisco switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. the results are shown below. Stat=Flashing green Duplex=Solid green Speed= Flashing green Which of the following are true. select two

The port is operating in full duplex mode The port speed is 1000 Mbps

You are checking the status of port fa0/12 on your Cisco 2960 switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which of the following is true?

The port is shut down or the cable is bad.

You have a small network, as shown in the image. The user on workstation A reports that she cannot communicate with remote workstation D. You begin to troubleshoot the problem by sending a ping from workstation A to the remote workstation D, but it doesn't not reply. Next you try sending a ping from workstation A to the remote workstation C, and it replies successfully. Which of the following can you assume based on these results.

The problem is with the configuration or connectivity of remote workstation D.

What is the purpose of TCP sequencing?

The purpose of sequencing is to provide reliability by requiring the recipient to acknowledge receipt of a group of segments before a timer expires. Sequencing is also used to provide proper ordering or segments.

In STP which switch sends updates to the other switches?

The root bridge

You are verifying the configuration of spanning tree on a switch. You run the show spanning-tree command on switch A and see the following output. What can you tell from this command output? select two

The root port on switch A is Gi0/2 The MAC address for switch A is 000e.8411.68c0

You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, which of the following is true for the router to network 172.16.81.0/24?

The route through enternet1 is the successor route.

You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, What will happen when both successor routes to network 172.16.90.0/24 are lost?

The route through serial0 will automatically be used

How does a router use frames to route data through a network.

The router checks the MAC address in the frame, replaces the MAC address of the source with its own MAC address, and sends it to the proper host.

You are the senior network administrator for a large company. A junior administrator from on of your field offices sent you a router that he thinks is faulty. He says the router always uses default settings and boots to setup mode even through he has verified that startup-config contains the correct values. What is the most likely source of the problem?

The router configuration register is set to bypass startup configuration

You have configured an 1841 Cisco router for inter-vlan communications. You enter the show run command and receive the output as shown in the exhibit. Which of the following is true? select three

The router is configured to use 802.1Q encapsulation for inter-vlan routing The switch connected to the routers fastethernet 0/0 interface is not encapsulating vlan 2 traffic The router is using two fa0/0 sub interfaces for VLANS 2-3

You have a small network connected to the internet as shown in the exhibit. Which of the following statements is true? select two

The router must be configured for NAT for Srv1 to communicate to the internet Internet hosts can reach Srv2 with the need for NAT being configured

When a router is powered on, what three tasks does the router perform?

The router performs the following tasks when powered on: 1. Runs a power-on self-test (POST) to test the hardware 2. Finds and loads the IOS 3. Finds and applies the router configuration file, if one exists

Which of the following best describes how a router operates to transmit messages to different LAN segments

The router reads the LAN segment address contained in the message and consults the appropriate routing table for the protocol, then forwards the message to the appropriate LAN segment.

You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip eigrp topology all-links command. Based on the output, What will happen when both successor routes to network 172.16.90.0/24 are lost?

The router will recalculate the route to network 172.16.90.0/24

How does the HSRP group priority value affect the routers role within the group? select two

The router with the second highest priority becomes the standby router The router with the highest priority becomes the active router

Which of the following is contained in a OSPF hello packet? select two

The routers RID A list of the routers neighbors

You are reviewing the configuration of a router that uses EIGRP for its routing protocol . Shown below is the output from the show ip protocols command. Based on the output, what is true of this configuration? select two

The routing process has 2 neighbors EIGRP is sharing information about 3 neighbors

Last night, a administrator connected a new router to his network and enabled the RIP routing protocol. This morning when the administrator returned, he discovered the router wasnt forwarding packets to networks connected to the serial1 interface. He examines the routing table using the command show ip route. The results desplayed are seen in the exhibit. What could be the cause of the problem?

The serial1 interface is administratively shut down

What does the 'show cdp' command display?

The show cdp command displays global CDP information about the device. It tells you how often the device will send CDP packets and the CDP holdtime: RouterB# show cdp Global CDP information: Sending CDP packets every 60 seconds Sending a holdtime value of 180 seconds Sending CDPv2 advertisements is enabled Note: For the exam, remember that the default time interval a device sends out CDP information is 60 seconds, and the default holdtime is 180 seconds.

What are some of the things that the show interface interface-type number command displays?

The show interface command displays the following: * Whether the interface is administratively down * Whether the line protocol is up or down * An Internet address (if one is configured) * Maximum transmission unit (MTU) and bandwidth * Traffic statistics on the interface * Interface encapsulation type

You have used the following commands to configure your router: Router(config)#banner exec *have a nice day!* Router(config)#banner login *The grass grows green* Router(config)#banner motd *The sky is blue* When you connect to the router using a Telnet session, how will these banners display

The sky is blue The grass grows green Have a nice day!

RouterA, RouterB, and RouterC have been configured with IP addresses set as shown in the exhibit. All networks are using the default subnet mask. Users in the network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. From network 10.1..1.0, you can successfully ping interface 172.16.32.2, but you cannot ping 172.16.32.1. Another administrator on 192.168.2.0 claims she can ping 192.168.2.1. but not 172.16.32.1. What is the most likely problem?

The so1/1 interface on RouterC is administratively down

What are the steps for the TCP three-way handshake?

The steps of the TCP three-way handshake are as follows: 1. The source host sends a SYN to the destination host. 2. The destination host replies to the source with an ACK. At the same time, it sends a SYN to the source host. 3. The source host replies with an ACK. Note: For the exam, remember: Step 1: SYN, Step 2: SYN/ACK, Step 3: ACK.

What is the role of the subnet mask in an IP network?

The subnet mask identifies the network and host portion of an IP address. It is used by hosts to identify the destination IP address as either local or remote and is also used by routers to determine the path to route packets.

As a network administrator, you have a Class B address. Assuming that the ip subnet zero command is enabled on the router, what subnet mask allows you to have 100 subnetworks with at least 500 usable hosts?

The subnet mask is 255.255.254.0. 255.255.254.0 in binary is as follows: 11111111.11111111.11111110.00000000 All you care about are the last two octets. So you have 7 bits for the network and 9 bits for host addresses. Seven bits of subnetting provide 128 subnets, and 9 bits of host subnetting provide 510 hosts per subnet.

Your Internet provider has given you the IP network address of 172.16.0.0/16. You have 18 networks, each with 1200 hosts. You want to assign one IP range per subnet, leaving room for future growth. Assuming that the ip subnet zero command is enabled on all routers, what subnet mask would best achieve your goals?

The subnet mask of 255.255.248.0 would best achieve your goals. If you look at this subnet mask in binary, you can see that you have 5 subnet bits for the network address: 11111111.11111111.11111000.00000000 If you use the subnet equation 25 = 32, 32 available networks will be provided with the subnet mask, which fulfills the requirement for 18 networks and allows adequate growth. This leaves you with 11 bits to be assigned to hosts. This gives you 2046 (211 - 2) addresses, giving you more than enough IP addresses to be assigned to hosts. If you use a subnet mask of 255.255.240.0, you will meet the requirement of 1200 hosts (212 - 2 = 4094 available hosts) but not have enough networks (24 = 16 available networks).

Which of the following accurately describe cut-through switching?

The switch copies only the destination address of the frame into its buffer. The switch reduces latency by forwarding the frame almost immediately.

You are the only administrator for your company. You are planning for an upcoming vacation and need to ensure that you can administer your switches remotely while you are gone. What must you configure to allow remote administration? select two

The switch must be configured with a valid IP address and default gateway The remote workstation must have access to the management VLAN of the switch

Which statement best describes the fragment-free switching method?

The switch reads the first 64 bytes of the frame, verifies that a collision has not occurred, and switches the frame to the correct port.

Device B sends a frame to Device A on the network shown in the Exhibit. The switch has an entry in its CAM table for Device A in its database, but not for Device B. Which of the following best describes what the switch does with the message?

The switch records the address and port from Device B in its database. It sends the frame out port Fa0/1.

Workstation2 needs to send data to workstation3. It sends out an ARP request for the address of the default gateway. Which of the following are true of this request?

The switch sends the ARP request to Workstation1 and the router Only the router will respond with an address of 00b5fa2222

You have just started a Cisco 2960 switch. You notice that the system light is a solid amber color. What does this indicate?

The system has power but is not functioning properly

What are the three mechanisms TCP uses to accomplish a connection-oriented connection?

The three mechanisms TCP uses to accomplish a connection-oriented connection are as follows: * Packet sequencing * Acknowledgments, checksums, and timers * Windowing

What are the three packet-forwarding mechanisms supported by Cisco routers?

The three packet-forwarding mechanisms supported by Cisco routers are * Process switching * Fast switching * Cisco Express Forwarding

What is the purpose of the TCP three-way handshake?

The three-way handshake creates a connection-oriented virtual circuit between two devices, and establishes an initial sequence number and window size.

What functions does the transport layer perform?

The transport layer performs the following functions: * Session multiplexing * Identification of different applications * Segmentation * Flow control * Connection-oriented * Reliability

How are distance vector routing protocols similar to link-state routing protocols?

The trustworthiness of both types of routing protocols is rated by an administrative distance The distance vector routing protocol RIP and the link-state routing protocol OSPF are both interior gateway protocols

What are the two key functions that a router performs?

The two key functions that a router performs are path determination (routing) and packet forwarding (switching). Routing protocols used by the routing process are responsible for learning and maintaining awareness of the network topology. The switching function is the process of moving packets from an inbound interface to an outbound interface.

List at least five types of information obtained from CDP.

The types of information obtained from CDP are as follows: * Neighbor device ID (host name of remote device) * Layer 3 address list of remote devices * Device platform * Device capabilities (router, switch, and so on) * Local interface type and outgoing remote port ID * Hold time value * IOS version of remote device

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. Which of the following is true? select two

The virtual IP address is 172.16.0.1 Router B will serve as active router, and Router A will serve as standby router

What stops a switch in VTP transparent mode from forwarding VTP updates?

The wrong VTP version number. Has to be VTP version 1,2 or 3 across all switches to forward VTP updates. Can't mix.

You have just connected a Windows workstation to the network. The workstation can communicate with all devices on the same subnet, but can't communication with other devices on other subnets. You use the ipconfig command on the workstation and see the following. No other devices seem to have a problem. What is the most likely cause of the problem?

The wrong default gateway address has been configured

The Serial 0/1/0 interface on RouterA is connected to the Serial0/0/1 interface on routerB. The link between the routers uses subnet address 10.198.166.184 with a mask of 255.255.255.248. RouterA is unable to communicate with RouterB. You view the interface status on RouterA and see the following information. What is the problem?

The wrong subnet mask is used.

RouterA and RouterB are connected with a serial link. A portion of the router configuration files is shown below. RouterA cannot communicate with RouterB. What is the problem

There is an encapsulation mismatch between the routers

RouterA and RouterB are connected with a serial link. RouterA is the DCE device. A portion of the show interface command on each router interface is shown below. RouterA cannot communicate with RouterB what is the problem?

There is an encapsulation mismatch between the routers

Which of the follwing are true of port security sticky addresses? select two

They can be learned automatically or manually configured they are placed in the running-config-file, and can be saved to the startup-config file

You want two routers to share routing information with each other using the OSPF routing protocol. Which of the following must happen for these two routers to become neighbors over their serial interfaces? select two

They must have a shared data link They must be configured with matching areas

Which two of the following statements about routers are true?

They use logical network and device addresses to route data between networks. They examine the destination device address contained in packets to make routing decisions.

Your router generates a log message with a severity level of 6. What does this indicate?

This message is only information in nature

In a default Class A network, how many octets are used for host addresses?

Three octets are used for host addresses. One octet consists of 8 bits; thus a default Class A network uses 24 bits for host addresses. The maximum number of hosts a Class A network can have is 16,777,214 (224 - 2).

How would you configure a Fast Ethernet interface 0 with an IP address of 192.168.0.1/24 on a Cisco router?

To configure a Fast Ethernet interface 0 with an IP address of 192.168.0.1/24 on a Cisco router, issue the following commands from global configuration mode: Router(config)# interface f0 Router(config-if)# ip address 192.168.0.1 255.255.255.0 Router(config-if)# no shutdown Note: By default, every interface on a router is administratively disabled and needs to be enabled using the no shutdown command. If you receive any simulators on the exam, you will get the question wrong if you do not manually enable the interface.

What is the purpose of TCP and UDP port numbers?

To pass information (such as email) to upper layers, TCP and UDP use port numbers. These port numbers are predefined and keep track of different conversations among different hosts at the same time. Originating source port numbers are dynamically assigned by the source host using a number in the range of 49,152 to 65,535.

How do you store the active configuration of a Cisco router to NVRAM?

To save the running config to the startup config, use the copy running-config startup-config privileged mode command.

You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 switch port command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two

Traffic from VLAN 5 will not be forwarded from switch A Both switches in the trunk configuration negotiated 802.1Q as the encapsulation method

You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 trunk command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two

Traffic from VLAN 5 will not be forwarded from switch A Traffic on the native VLAN will not be transmitted correctly

You have a Catalyst 2950 swath with three defined VLANs 1,3, and 5. You connect the with to another with using the fa0/1 interface, and use the swtihport mode trunk command for fa0/1. Assuming that the other swath has the default configuration, what will now pass through fa0/1 on the switch?

Traffic from all VLANs defined on the switch

You are configuring inter-VLAN routing on a Catalyst 3550 switch. You enter the show run command and receive the output as shown in the exhibit. Which of the following is true? select two

Traffic sent from VLAN 2 to VLAN 3 will not reach VLAN 3 Interface VLAN 2 is enabled with the no shutdown interface configuration command

Which method is used when an SNMP agent detects that the system it is monitoring has exceeded a configured threshold and sends an event to the SNMP manager?

Trap

Drag the information on the left to the appropriate layer of the TCP/IP model that it is associated with on the right

Trasport layer/segments link layer/frames application layer/data internet layer/packets

Which feature implemented with a distance vector routing protocol procedure reduces the convergence time?

Triggered updates

Which of the following describe the channels and data transfer rates used for ISDN BRI? select two

Two B channels operating at 64 Kbps each One D channel operating at 16Kbps

How do you disable CDP on Cisco routers?

Two commands disable CDP on a Cisco router. To disable CDP on the entire device, use the 'no cdp run' global command, as follows: RouterB(config)# no cdp run To disable CDP on an interface only, use the no cdp enable interface command, as follows: RouterB(config)# int f0 RouterB(config-if)# no cdp enable This disables CDP on Fast Ethernet interface 0.

What two common protocols function at the transport layer of the TCP/IP model?

Two protocols that function at the transport layer of the TCP/IP model are as follows: * TCP (Transmission Control Protocol): A connection-oriented, reliable protocol * UDP (User Datagram Protocol): A connectionless and unacknowledged protocol Note: TCP deals with the three-way handshake. Reliability deals with acknowledgments (ACK) and NAKs. TCP uses ACKs and NAKs that are used by other protocols if there is a problem. UDP is characterized as connectionless and does not include a mechanism to guarantee data delivery. UDP uses a best-effort delivery and, on most networks today, can send a packet with minimal to no packet loss without the overhead of TCP.

List two reasons to disable CDP.

Two reasons to disable CDP are as follows: * To save network resources by not exchanging CDP frames. * Security. CDP multicasts information about the device every 60 seconds. Sniffers and other devices can view these multicasts to discover information about your network.

Which of the following statements are true regarding OSPFv3 LSA's?

Type 8 is a link LSA from link-locals Type 9 is an intra-area prefix to describe the network

Which of the following statements are true regarding OSPFv3 LSAs? select three

Type 9 is an intra-area prefix to describe the network Type 8 is a link LSA from link-locals Type 3 is an intra-area prefix LSA from ABRs

What transport layer protocols are best suited for the transport of VoIP data?

UDP and RTP are best suited. VoIP uses a combination of UDP and RTP for transport of data. VoIP is time sensitive and uses UDP because UDP uses less overhead than TCP.

Which two of the following list accurately describes TCP and UDP?

UDP: connectionless, unreliable, unsequesnced, low overhead TCP: connection-oriented, reliable, sequences, high overhead

Which of the following are characteristics of VDSL? select two

Unequal download and upload speeds Supports both data and voice at the same time

You have a network with two routers as shown in the exhibit. RouterA currently has a single static route to network 10.0.155.80/28. You need to add another subnet to routerB. This subnet should also use 28-bit mask. You would like to replace the existing static route to network 10.0.155.80/28 with a single summarized static route that includes the old network and the new network. You want to minimize wasted addresses. What should you do? select tow

Use 10.0.155.64/28 for the new subnet Configure the static route to use a network of 10.0.155.64 and a mask of 255.255.255.224

You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that is sent to the host with address 192.168.1.155. However, you find that traffic sent to this host through that interface is still being allowed. What should you do?

Use an extended ACL instead of a standard ACL

You have two Cisco 2960 switches, each with 24 FastEthernet ports and two SFP Gigabit uplink ports. You want to connect the two switches together at a distance of 300 meters. How should you connect the two switches? select two

Use fiber optic cables with LC connectors Use ports Gi0/1 or Gi0/2

Match each component of the software-defined network (SDN) model, shown on the left, with an appropriate description on the right

Used by applications on the controller in order to obtain information about the network Northbound controller interface Performs the function of monitoring network traffic Controller Used to communicated with all of the physical network devices on the network Southbound controller interface Used by software applications on the controller to obtain information about the network API Performs the function of learning about the network topology Controller Designates the accepted method of communication between the controller, network devices, and installed applications API

Match the TCP/IP protocols with their function by dragging the protocol name on the left and dropping it next to the description on the right.

Used to send e-mail messages between mail servers SMTP Used to send messages to groups of users IGMP Used to assign IP addresses to host DHCP Used to get the MAC address of a host from its IP address ARP

Cloud services can also offer virtual network infrastructures, which include a variety of virtual components. Match each virtual component on the left with the appropriate description on the right.

Uses Ethernet standards to transmit and receive frames on the network Virtual network interface Implemented within the hypervisors to monitor and filter traffic on the virtual network as it flows between virtual machines Virtual firewall Can be defined within the virtual switch and associated with specific hosts Virtual VLAN Can support multiple networks on each of its interfaces, unlike the physical version Virtual router Builds a table that identifies which MAC addresses are connected to each of its ports Virtual switch

Match the IPv6 address assignment method on the left with its corresponding description on the right.

Uses NDP to learn the subnet prefix Stateless address auto configuration Assigns the entire 128-bit IPv6 address to the host Static full assignment Assigns the prefix. The remainder is derived from host MAC Static partial assignment Can be used in conjunction with SLAAC Stateless SHCPv6 Provides all IP configurations information except for the default gateway address Stateful DHCPv6 Relies on stateless DHCPv6 to provide host with the IP address of the DNS server Stateless address auto configuration

You have configured inter-VLAN routing on a Catalyst 3550 switch. You enter the show ip route command and receive the output shown in the exhibit. Which of the following is true? select two

VLAN 11 has a virtual IP address in the 10.1.11.0 network Traffic sent within VLANs 2,3 and 11 will be routed on the 3550 switch

You are configuring inter-VLAN routing on a Catalyst 3550 switch. Hosts belonging to VLAN 2 cannot contact servers belonging to VLAN 3. To troubleshoot the issue, ou enter the show ip route command and receive the output as shown in the exhibit. Which of the following my be true? select two

VLAN 2 does not have an interface IP address The VLAN 2 interface is not enabled with the no shutdown command

You implemented a trunking configuration between two switches. On switch A, you have used the show interface fa0/1 trunk command and receive the output as shown in the exhibit. If the otters switch has default configurations, which of the follows is true? select two

VLAN 3 has not been configured on the switch fa0/1 is configured to trunk unconditionally

What are the benefits of variable-length subnet masking (VLSM)?

VLSM gives a network administrator the option of including more than one subnet mask within a network and of subnetting an already subnetted network address. VLSM benefits include * More efficient use of IP addresses: Without VLSM, companies must implement a single subnet mask within an entire Class A, B, or C network number. * Better-defined network hierarchical levels: VLSM allows more hierarchical levels within an addressing plan and allows aggregation of network addresses.

You need to implement a WAN solution for a small business located in a remote mountain location. Currently, the local telecom only offers basic phone service at the locations. Leased lines are not available. Which option would be the most appropriate choice?

VSAT satellite link

You are troubleshooting a basic serial connection on your router. The show interface serial0/1/0 command shows the following information. What should be your first step in troubleshooting the problem?

Verify that the encapsulation is correctly configured

Real-time voice and video communications require a minimum level of quality in order to provide adequate services. The tables shown below contain the minimum metric specifications fro real-time voice and video. From the drop-down lists below each table, select the communication type that the table pertains to.

Video VoIP

What are the default swtichport configurations parameters on a 2960 switch? select two

Violation actions is set to shutdown A maximum of 1 MAC per port is allowed

What are well-known port numbers?

Well-known port numbers are used for fundamental applications such as email and DNS. They have a range from 0 to 1023. Port Number Description 1 TCP Port Service Multiplexer (TCPMUX) 5 Remote Job Entry (RJE) 7 ECHO 18 Message Send Protocol (MSP) 20 FTP -- Data 21 FTP -- Control 22 SSH Remote Login Protocol 23 Telnet 25 Simple Mail Transfer Protocol (SMTP) 29 MSG ICP 37 Time 42 Host Name Server (Nameserv) 43 WhoIs 49 Login Host Protocol (Login) 53 Domain Name System (DNS) 69 Trivial File Transfer Protocol (TFTP) 70 Gopher Services 79 Finger 80 HTTP 103 X.400 Standard 108 SNA Gateway Access Server 109 POP2 110 POP3 115 Simple File Transfer Protocol (SFTP) 118 SQL Services 119 Newsgroup (NNTP) 137 NetBIOS Name Service 139 NetBIOS Datagram Service 143 Interim Mail Access Protocol (IMAP) 150 NetBIOS Session Service 156 SQL Server 161 SNMP 179 Border Gateway Protocol (BGP) 190 Gateway Access Control Protocol (GACP) 194 Internet Relay Chat (IRC) 197 Directory Location Service (DLS) 389 Lightweight Directory Access Protocol (LDAP) 396 Novell Netware over IP 443 HTTPS 444 Simple Network Paging Protocol (SNPP) 445 Microsoft-DS 458 Apple QuickTime 546 DHCP Client 547 DHCP Server 563 SNEWS 569 MSN 1080 Socks

Which of the following statements are true regarding NTP when implemented on Cisco devices? select two

When NTP is enabled, NTP packets are received on all interfaces NTP runs over UDP port 123 on an IP network

Packets are not being forwarding from one segment to another on your Cisco router. You enter the show interface g0 command and notice that the interface is administratively down. What does this mean, and how do you fix it?

When an interface is administratively down, it has been shut down manually or was never enabled. To remedy this, enter the interface command 'no shutdown'.

When is Multilink PPP used?

When multiple serial links exist between two router locations

You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?

Wildcard mask values for the network statements are incorrect

Which of the following are characteristics of Teredo tunneling? select three

Works through NAT Dual stack host Tunnel endpoints configured on hosts

Which of the following are characteristics of 6-to-4 tunneling? select three

Works through NAT Tunnel endpoints configured on routers Dual stack routers

You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDI/MDIX is not enabled on these devices, drag the appropriated type of cabling on the left to each connection type on the right

Workstation to switch Straight-through ethernet cable Router to switch Straight-through ethernet cable Switch to switch Crossover ethernet cable Workstation to router Crossover ethernet cable Router to router Crossover ethernet cable

You have a small network as shown in the exhibit. Wrk1 is unable to communicate with Wrk2. Wrk1 can ping the router and all internet hosts. Wrk2 can ping Wrk3. What is the most likely cause of the problem?

Wrk1 and Wrk2 are on separate VLANs

When configuring a router interface for the first time, is the interface administratively disabled?

Yes. By default, router interfaces on Cisco routers are administratively disabled. They must be enabled using the no shutdown interface command.

How do you administratively disable an interface on a Cisco router?

You administratively disable an interface on a Cisco router by issuing the 'shutdown' interface configuration command. In this example, the serial interface is issued the shutdown command: RouterA(config)# interface g0 RouterA(config-if)# shutdown Note: To administratively enable an interface, use the no shutdown interface configuration command.

What does point to point edge mean in show spanning tree output?

You are running port fast on that switchport

What does protocol ieee in the show spanning tree command mean?

You are running pvst- 802.1d

What does protocol rspt in the show spanning tree command mean?

You are running rpvst- 802.1w

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?

You can create multiple broadcast domains

Which of the following statements apply only to extended access lists (ACLs), not to standard ACLs? select two

You can filter traffic for a specific TCP/IP protocol You can filter traffic based on destination IP addresses

On a Linux and Mac computer, what command can you use at the command prompt to view the IP information assigned to the Computer

You can use the ifconfig command.

On a Windows computer, what command can you use at the command prompt to view the IP information assigned to the Computer?

You can use the ipconfig command.

On a Cisco router, how do you display the configuration running in RAM?

You display the configuration running in RAM using the show running-config privileged mode command.

How many usable subnets and usable hosts do you have if you subnet the network address 192.168.1.0 with the subnet mask 255.255.255.240?

You have 16 subnets with 14 hosts in each network. If you subnet 192.168.1.0 with a 28-bit mask (255.255.255.240), you have 16 networks with 14 hosts in each network. If you look at the network address and subnet mask in binary, you can see that in the last octet, you have 4 bits for networks and 4 bits for hosts, as follows: 11000000.10101000.00000000.00000000 11111111.11111111.11111111.11110000 You can apply these bits to the following formula, where x is the amount of borrowed bits: Amount of subnets = 2x Amount of hosts = 2x - 2 Therefore, 24 - 2 = 14 subnets. You can then apply the same equation to determine that the number of hosts is also 14.

You are troubleshooting a router remotely using Telnet. You issue the following command at the CLI. pix#debug ip rip You watch for a few minutes, but no debug output is displayed. What is the problem?

You must use the terminal monitor command to view debug output from a Telnet session

You have a small business network with a single subnet connected to the internet. You ISP has assigned your router an IP address of 199.211.77.5 for its serial interface. You have chosen to use a network address of 172.15.1.0/24 on your private network. You use the SDM interface to configure basic NAT on the router with a single default route to the ISP. What is the most likely result of this configurations?

You network has internet connectivity, but some websites might be unreachable

On a Cisco router, how do you view the configuration stored in nonvolatile RAM (NVRAM)?

You view the configuration stored in NVRAM using the show startup-config privileged mode command.

In which of the following situations would you use port security?

You wanted to restrict the devices that could connect through a switch port

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which privilege EXEC commands begin with the letters ac? select all that apply

access-enable access-template

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. which of the following parameters are valid second level parameters for the ip command in fastethernet interface configuration mode? select all that apply

access-group dhcp igmp

You are configuring ACLs for a router. You need to create a standard IP access list that permits all traffic except traffic from the 192.168.1.0/24 network. Which two commands are needed to view the information you need to see? select two

access-list 1 deny 192.168.1.0 0.0.0.255 log access-list permit any log

You want to configure NAT so that packets from all hosts on network 192.168.2.0 will share the registered IP address 24.1.2.8 as shown in the exhibit. You have already identified the inside and outside NAT interface on the router. Which of the following command options will translate all inside host addresses to the single registered IP address?

access-list 1 permit 192.168.2.0 0.0.0.255 ip nat inside source list 1 interface serial 0 overload

You are the administrator for the 172.16.0.0 network shown in the exhibit. You need to block telnet traffic from entering your network while allowing other traffic to pass through. You decide to apply an access list to the incoming side of the serial 0 interface. Which statements should be included in your access list? select two

access-list 101 deny tcp any any eq 23 access-list 101 permit ip any any

You want to create an access list that permits and restricts traffic to meet the following specifications Allow all TCP/Ip traffic coming from any host on network 10.0.0.0, while denying all TCP/IP traffic from other sources Deny all TCP traffic coming from network 10.0.0.0 Allow TCP traffic comping from any source directed to host 10.1.1.2 Deny all TCP/IP traffic coming from host 10.1.1.1 Which access list statement should come last in the access list

access-list 101 permit ip 10.0.0.0 0.255.255.255 any

Which of the following ACL statements allow all TCP/IP traffic?

access-list 101 permit ip any any

You are configuring ACLs for a router. You need to create an extended IP access list that rejects any packet sent from a host with an IP address of 10.1.1.1 to a host with an IP address of 15.1.1.1. All other traffic should be allowed. To verify that the ACL is configured correctly and Functioning as intended, you want to view extended information about matches for each line in the ACL as packets are processed by the router. Which two commands are needed to view the information. Select two

access-list 101 permit ip any any log access-list 101 deny ip 10.1.1.1 15.1.1.1 0.0.0. log

You want to create an access list that denies all traffic coming from network 12.0.0.0, however, you want to allow all OSPF traffic from host 12.1.1.1. Al otters traffic should be allowed. Which access list statement should come first in the access list?

access-list 101 permit ompf host 12.1.1.1 any

Which command would you sue to create an access list that denies all TCP traffic originating from any host on network 192.168.1.0 that is destined for any host on network 199.66.220.0?

access-list 122 deny tcp 192.168.1.0 0.0.0.255 199.66.220.0 0.0.0.255

You want to control Telnet access to your router and allow only access from within the corporate network. You have subsetted your network so that all IP addresses use subnets of the 172.18.0.0/16 network. You want to apply the ACL to the VTY lines. Which of the following would be part of your design? select two

access-list 7 permit 172.18.0.0 0.0.255.255 ip access-class 7 in

You have configured ACLs on your router. A partial configuration for the router is shown below. You want to block any traffic received on s0/1/0 that has a source address that appears to be coming from the two internal networks. However, you find that no traffic is being accepted on the s0/1/0 interface. What should you do?

add a permit statement to the bottom of the ACL

In the lab, click the switch icon to open the switch console. Then use the command line interface to find the information necessary to answer the following questions. Which of the following partial commands are unique, first level commands in global configuration mode? select all that apply

al q rm

Which of the following commands lists a workstation's ARP cache?

arp -a

Which of the following commands lists a workstations ARP cache?

arp-a

Which SNMPv3 security level requires MD5 or SHA authentication and implements DES encryption?

authPriv

To properly configure link-state routing, which of the following areas is mandatory within an AS?

backbone

Which of the following mechanisms are used on ethernet networks to control access to the transmission medium? select two

backoff collision detection

When you start up the router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password The sky is blue Router> For security purposes, you would like to change the message the sky is blue to read All activity is monitored. Which command should you use?

banner exec *All Activity is monitored*

When you start up the router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password The sky is blue Router> For security purposes, you would like to change the message the grass grows green to read Only administrator access is allowed. Which command should you use?

banner login *Only administrator access is allowed*

Which of the following is a list of layer 2 devices?

bridges, network interface card, switch

Which of the follwong commands would you use to modify the CDP packet enhance interval to send CDP packets every 30 seconds?

cdp timer 30

You are configuring a serial connection and need to configure the DCE to provide a clocking signal. Given that you have been leased a 128 Kbps line from the WAN service provider. Which command should you use to accomplish this?

clock rate 128000

What type of resources offer the following advantages? Flexibility of access, ease of use, self-service provisioning of resources, API availability, Metering of services, Ability to try out software application

cloud

You want to enable full duplex on your ethernet network. Which of the following should you do?

configure NICs and switch interfaces to use full Duplex

You have three switches configured as shown in the exhibit. How could you guarantee that switch C becomes the root bridge?

configure switch C with a lower priority value

You need to backup the current IOS image on your router to the TFTP server. The TFTP servers IP address is 192.56.145.23. Which of the following commands do you use?

copy flash tftp

You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use?

copy start tftp

Which command do you use to copy a file named ATL-1.cfg on the TFTP server to the running-config on the router?

copy tftp run

Which two of the following commands can you use to copy files from a TFTP server with address 10.0.0.5 to a router?

copy tftp run copy tftp start

IN traditions network models, the data plane, control plane, and management plane are al contained within the firmware of networking devices. This is know as what kind of architecture?

distributed

You have a network address of 220.16.22.0 and have selected 255.255.255.224 as the subnet mask value. How many possible subnets are there?

eight

Which of the following commands configures a password to switch EXEC mode, and saves the password using MDS hashing?

enable secret

You have two switches connected as shown in the exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use the pordtfast feature?

fa0/1 and fa0/2

You have three swathes configured as shown in the exhibit. Which of the following ports listed below are designated ports following STP convergence? select two

fa0/2 on switch A fa0/1 on switch A

Which interface is the member of VLAN 65?

fa0/22

You have a small network as shown in the exhibit. You are troubleshooting connectivity issues at Wrk1. From Wrk1 you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office, but cannot ping any host in the main office. What is the most likely cause of the problem? select two

fa0/24 on the switch is bad Bad cable between the switch and the SFO router

Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that has been configured incorrectly

fd01:0001:0002:0001::20/64

Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a right-to-use evaluation license

feature: securityk9

You have configured port security for the fa0/3 interface. To test the security settings, you connect two workstations to the same port. Both are allowed to connect. You check the running-config file and fine the fowling for the interface. interface fastethernet0/3 swithport mode access swithport port-security mac-address sticky

for the interface, use the swithport port-security command

You have a network address of 166.35.0.0 and have selected 255.255.192.0 as the subnet mask value. How many possible subnets are there?

four

While configuring a new router, you use the following commands Router(config)#enable password cisco Router(config)#enable secret highway Router(config)#username admin password television Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login Which password would you use to open a Telnet session to the router?

garage

While configuring a new router, you use the following commands: Router(config)#enable password cisco Router(config)# enable secret highway Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login You establish a Telnet session to the router. Which password would you use to enter privileged EXEC mode?

highway

Which of the following methods of preventing routing loops prevents routing table changes from taking place too quickly and prevents downed links from being added back into the routing table

hold-downs

You would like to use the crypto key command to generate a key pair for use with SSH. Which parameters must be set prior to running this command? select two

hostname ip domain-name

You have a small network as shown in the exhibit. Router2 is connected to the internet rhtpugh a fiber optic fastehternet connection and is to be configured with NAY to provide internet connectivity to your private network. What type of address would you assign to host Wrk1 on your private network?

inside local

You must configure an IP address on a Catalyst 2950XL switch using the default management switch port. From global configuration mode, which commands would you enter to configure the correct management port?

int vlan 1 ip address 192.168.10.2 255.255.255.0

You have used the following commands at the router console to create an IP access list and switch to interface configuration mode: Router(config)#access-list 122 permit tcp 10.6.0.0 0.0.255.255 any Router(config)# int eth 0 Which of the following commands do you use to add the access list to this interface and filter incoming packets?

ip access-group 122 in

RouterA and RouterB are connected with a serial link. RouterA is the DTE device. A portion of the show interface command output for routerB is shown below. You need to configure RouterA to connect to routerB. Which commands would you use to configure the s0/1/1 interface for routerA?

ip address 192.168.105.95 255.255.255.252 encap ppp no shut

You have a small network as shown in the Exhibit. You have configured RIP on both RouterA and RouterB. The show ip route command on RouterA shows the following information. You want to configure a default route so that all packets for unknown networks are sent to RouterB. Which command should you use?

ip default-netowrk 10.0.0.0

After enabling the DHCP snooping feature, you want to apply it to your network globally. Which command will apply DHCP snooping globally?

ip dhcp snooping

You are configuring netflow on a router You want to monitor both incoming and outgoing traffic on an interface. You've used the interface command to allow you to configure the interface. What commands should you use next? select two

ip flow egress ip flow ingress

You are configuring netflow on a router. Rather than storing records locally, you want to configure the router to redirect net flow records to a net flow collector system in your network with an IP address of 172.17.8.25 listening on UDP port 2055. Which command should you use?

ip flow-export destination 172.17.8.25 2055

You are configuring netflow on a router. Rather than storing records locally, you want to configure the router to redirect net flow records to a net flow collector system in your network with an IP address of 172.17.8.25 listening on UDP port 2055. by default, net flow uses the ip address of the interface that packets are sent from as the source ip address from records. However, for security reasons, you want to obscure the source address of the net flow router by specifying hat all net flow records originate from the loopback interface of the router. Which command should you use?

ip flow-export source loopback 0

You are configuring net flow on a router. You want the records gathered to be formatted with fields specified by net flow version9. Which command should you use?

ip flow-export version 9

You are the network administrator for a company that has a small clock of registered IP addresses ranging from 24.1.2.32 to 24.1.2.47. You want to assign these addresses to a dynamic pool in NAT. Which command should you use?

ip nat pool net-1 24.1.2.32 24.1.2.47

You have a small network as shown in the exhibit. You want to configure a route so that packets sent to any non-directly connected network get sent to RouterB. Which command would you use?

ip route 0.0.0.0 0.0.0.0 192.168.4.14

You have a network with two routers as shown in the exhibit. You would like to configure a single static route on RouterA that summarizes the routes accessible through RouterB. Which static route would you configure?

ip route 192.168.100.64 255.255.255.192 192.168.100.34

You need to configure a static route on your Cisco router. The destination network is 192.65.178.0 with a subnet mask of 255.255.255.0. The default gateway is 192.65.179.1, and the IP address of the destination host for the message is 192.65.178.15. Which of the following commands configures this router?

ip route 192.65.178.0 255.255.255.0 192.65.179.1

You need to add multiprotocol label switching (MPLS) support to a router using the Data feature set. Which feature set must be enabled before the data feature set canoe enabled?

ipbasek9

You have connected five Windows workstation and one server to a switch. You want to verify each workstation has received its IP address from the DHCP server. Which command should you use?

ipconfig

Which command is used to apply an IPv6 ACL to an interface>

ipv6 traffic-filter

Which of the following best describe how a switch functions? select two

it filters the network traffic based on hardware address it connects multiple network segments and forwards packets to the appropriate segment

Which two of the following statements accurately describe half-duplex ethernet?

it uses collision detection and recovery it sends both signals along the same wire

You have entered the following command to enable dynamic trunking configuration. switch(config-if)#switchport mode dynamic desirable If the switch interface is not connected to another switch, how will it function?

it will communicate as a normal port

Which of the following is the most important thing to do to prevent console access to the router?

keep the router in a looked room

You are reviewing the output of the show interfaces command for gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 6th byte of the frame was transmitted?

late collisions

Which fields in the header of IP packets are examined by net flow to determine whether or not a given packet is par of a flow? select two

layer 3 protocol type destination port

You use a Cisco 2900 router in your network. You are considering purchasing and implementing the unified communications feature set on this router. However, you would like to evaluate this feature set for a period of time prior to purchasing it. Which command activates the evaluation right-to-use license for this feature set?

license boot module c2900 technology-package uck9

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 172.17.8.5. You want to only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. You just entered the logging on command. What other commands must be used to accomplish this? select two

logging host 172.17.8.5 loggin trap 4

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 192.168.1.2. You want to only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. Which commands are used to accomplish this? select three

logging host 192.168.1.2 logging on logging trap 2

Consider the output from the show ip cache flow command in the exhibit. Which statements are true regarding the flow represented in the statistics? select two

most of the packets monitored where 1536 bytes in size 255 packets were monitored

Listed below are three banner types that can be configured on a router. exec, motd, login. If all three banners were configured in which order would they display when a telnet session is used to connect to the router?

motd, login, exec

When the network is using RIPv2 for the routing protocol which address is used to send router updates?

multicast address

What kind of relationship is established between connected BGP routers on the same autonomous system?

neighbor

To configure EIGRP on a router, what are the minimum commands you must use? select two

network 1.0.0.0 router eigrp 12

You want to configure OSPF to run only on the interface with an IP address of 10.1.1.112/26 and you want o associate the interface with area 3. Which of the following commands will accomplish your goal?

network 10.1.1.64 0.0.0.63 area 3

You want to configure OSPF to run only on the interface with an IP address of 10.1.1.112/26 and you want to associate the interface with Area 3. Which of the following commands will accomplish your goal?

network 10.1.1.64 0.0.0.63 area 3

You are configuring OSPF for a single router with two interfaces as shown in the exhibit. What network statement would you use to configure both interfaces for OSPF for area 0.

network 192.168.1.64 0.0.0.31 area 0 network 192.168.1.128 0.0.0.15 area 0

You have a test lab that you use to test different configurations before deploying them in your live network. You have been testing several commands from configuration mode, then going back to enable mode to view the running-configuration. Every time you exit configuration mode, the following output is displayed: %SYS-5-CONFIG_I: Configuration from console by console What command can stop this message from appearing on your screen?

no logging console

Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. The user complains that she can't access the network server. You verify that a cable is connected to the fa0/16 port on the switch. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which command would most likely correct the problem?

no shutdown

Which SNMPv3 security level requires authentication with a username, but does not implement encryption?

noAuthnoPriv

Currently, all of the routers in your network are configured to use NTP to synchronize time with a public Stratum 2 time provider on the internet. To reduce redundant network traffic, you decide to configure one internal router as an authoritative NTP time provider with a stratum value of 5 and then configure all other routers to synchronize time with it. This router has an ip address of 172.17.8.254 assigned. Which commands should you use? select two

ntp master 5 on NTP time prover router ntp server 172.17.8.254 on all routers except the time provider

You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 provider on the internet with a hostname of 0.pool.ntp.org. Which command should you use?

ntp server 0.pool.ntp.org

You check the time on a router and find that it is out of sync with the time on the other routers and switches in your network. TO fix this issue, you decide to configure NTP on the router to get time from an internal authoritative (master0 NTP server with an ip address of 172.17.8.254. Which command should you use?

ntp server 172.17.8.254

You've just enabled trunking on the fa0/1 port of Catalyst 2960 switch. By default, what traffic can now be sent across this interface?

only 802.1Q traffic

You have a workstation configured with DNS server addresses as follows. Primary-192.168.1.1 Alt- 192.168.1.115 While browsing the internet, you go to www.cisco.com. A few minutes later, you type ping www.cisco.com into a command prompt. How will the workstation get the ipad dress for www.cisco.com?

out of its local DNS cache

Your company has two subnets, 172.16.1.0 and 172.16.2.0 as shown in the exhibit. Recently policy changes forbid FTP traffic from leaving your company; however, all other traffic is allowed. You've created the following access list to meet the new company requirements. Where should you apply the filter?

outbound side of 50

You have a small network as shown in the exhibit. Router2 connected to the internet through a fiber optic fast ethernet connection and is to be configured with NAT to provide internet connectivity to your private network. What type of address would you adding to the fa0/1 interface on router2?

outside global

One of the interfaces in a router with OSPF enabled is connected to a network link where no other routers reside. You want to prevent this interface from sending OSPF Hello messages as there are no other routers on that network to respond. Which command should you use?

passive-interface <type>

One of the interfaces in a router with OSPF enabled is connected to a network link where no other routers reside. You want to prevent this interface from sending OSPF hello messages as there are not other routers on that network to respond. Which command should you use?

passive-interface <type>

You want to prevent all interfaces on a router from sending or responding to OSPF Hello messages. Which command should you use?

passive-interface default

You want to prevent all interfaces on a router from sending or responding to OSPF hello messages. Which command should you use?

passive-interface default

You are configuring the PDX router to maximize available bandwidth. You realize that because the network connected to the Ethernet interface does not contain any RIP-enabled devices, RIP updated do not need to be sent out to this interface. Which command can you use to prevent RIP updates from being sent out the E0 Interface?

pdx(config-router)#passive-interface e0

What is the application layer?

protocols that access the network to provide the service the application program wants to perform. Want to use Firefox...http, want to use outlook... SMTP, etc.

You need to enable the security feature set on a router. You visited the Cisco website to purchase the feature set and created a product authorization key (PAK). Cisco emailed you the license file (FTX1788948P_201304123432565291.lic), which you copied to a USB drive. You connect the USB drive to the device and now need to install the license. Which commands should you use to accomplish this? select two

reload license install usbflash1:FTX1788948P_201304123432565291.lic

Carl administers a network that uses bridges to connect to network segments. The network is currently suffering from serious broadcast storms. What can Carl do to solve the problem?

replace bridges with routers

You've just enabled port security on an interface of a Catalyst 2950 switch. You want to generate an SNMP trap whenever a violation occurs. Which feature should you enable?

restrict

You are asked to design a LAN segmentation solution for company AGH. They have three workgroups Accounting, Sales and Service. Most network traffic is localized within the individualized workgroups but some traffic crosses between each group. Company AGH is especially concerned about security of information within the Accounting dept. Which segmentation device meets the needs while providing the most economical and simplest administration?

router

You want to configure routerB to run EIGRP. The networks attached to both interfaces S0 and S1 on routerB are to be advertised within autonomous system 100. Which set of commands should you enter?

router eigrp 100 network 172.16.0.0 network 172.17.0.0

To configure EIGRP on a router, what are the minimum commands you must use?

router eigrp 12 network 1.0.0.0

You want to configure routerB to run OSPF with a local process ID of 100. Both interfaces s0 and s1 on routerB belong to area 300. Which set of commands should you enter?

router ompf 100 network 172.16.16.1 0.0.0.0 area 300 network 172.16.32.2 0.0.0.0 area 300

You want to configure a single area OSPF network for area 0. What are the minimum commands you must use? select two

router ompf 12 network 1.1.1.0 0.0.0.255 area 0

You are configuring an 1841 Cisco router for interVLAN communications. You would like to use one physical interface to handle the incoming VLANs 2 and 10. The VLANs are encapsulated with 802.1Q tags.

router(config-subif)#encapsulation dot1q 2 router(config-if)#int fa0/1.2 router(config-subit)#ip address 172.16.2.1 255.255.255.0

You are configuring an 1841 Cisco router for interVLAN communications. You would like to use one physical interface to handle the incoming traffic from VLANs 2 and 10. The switch connected to the router is sending 802.1Q encapsulated traffic from VLAN 2 but is not encapsulating VLAN 10. Which command would you use to ensure that the router correctly handles traffic coming from the switch?

router(config-subif)#encapsulations dot1q 10 native

You want to configure a single area OSPF network for area 0. What are the minimum commands you must use?

routes ospf 12 network 1.1.1.0 0.0.0.255 area 0

Consider the output from the show ip cache flow command shown in the exhibit. Which type of service was accessed on the destination host?

secure http web server

You have configured PPP with CHAP authentication on the BRI0 interface of your router. You now want to hide the CHAP password from view in the configuration file. What command should you use?

service password-encryption

Which of the following commands will show details about all ACLs configured on the router?

sh access-list

Which of the following commands can you use to see which ACL is applied to the first ethernet interface?

sh ip int

You have finished configuring ACL 101 and are ready to apply it to an interface. Before you do, however, you would like to view the ACL to ensure there are no mistakes. Which command displays access list 101?

show access-list 101

You are troubleshooting problems with a serial interface on a router that is connected to a leased line WAN interface. You need to view the type of serial cable that has been used on the s0/0/1 interface and which end of the cable is connected to the DCE or DTE. Which command should you use to do this?

show controllers s0/0/1

While working at a console of a Cisco device, you need to view a list of the commands that are currently stored in the history buffer of the system. Which command should you use?

show history

You would like to see what host names have been cached on your router. Which command displays the cashed list of host names?

show host

You would like to see what hostnames have been cached on your router. Which command displays the cached list of host names?

show hosts

You are troubleshooting Physical Layer issues with the gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?

show interface gi0/1

You want to get a list of all ports on your switch that are currently trunking. Which command should you use?

show interface trunk

You are troubleshooting physical layer issues with the gi0/1 interface in a router. You suspect a duplex mismatch error has occurred and need to determine the duplex settings configured on the interface. Which commands could you use> choose two

show interfaces gi0/1 status show interfaces gi0/1

You need to determine whether net flow is configured to redirect records to a net flow collector and, if so, the ip address of the collector. Which command should you use to do this?

show ip flow export

Your router is currently configured to redirect records to a net flow collector. You know that, by default, net flow uses the ip address of the interface that packets are sent from as the source ip address for records. However, you're not sure how this router is configured. You need to determine which interface and ip address on this router is configured as the source for net flow records being sent to the collector. Which command should you use to do this?

show ip flow export

You need to determine whether net flow is monitoring inbound and/or outbound traffic on all interfaces in a router. Which command should you use to do this?

show ip flow interface

You need to view the configuration settings of an interface on your router to see if it can send or respond to OSPF Hello messages. Which command should you use?

show ip ospf interface <interface>

You need to view the configuration settings of an interface on your router to see if it can send or respond to OSPF hello messages. Which command should you use?

show ip ospf interface <interface>

Your routers have been configured to used EIGRPv6. While troubleshooting a routing issue, you decide that you need to view a list of neighbors on each router. Which command should you use to do this?

show ipv6 eigrp neighbors

Your routers have been configured to use EIGRPv6. Which troubleshooting a rouging issue, you decide that you need to view successor information on each router. Which command should you use to do this?

show ipv6 eigrp topology

Your routers have been configured to use EIGRPv6. Which troubleshooting a rouging issue, you decide that you need to view successor information on each router. Which the current start of the IPv6 routing protocol process on each router. Which command should you use to do this?

show ipv6 protocols

You want to view the feature sets that have been enabled on a router and what type of license they use. Which commands can you use to do this? select two

show license show version

You are troubleshooting a router at the console. You issued the following command at the CLI: pix#debug arp You see debug output, but the output scrolls past faster than you can read. What two commands allow you to view debug output one page at a time? select two

show log logging buffered

You need to verify that time is synchronized on a router. Which commands could you use to do this? select two

show ntp association show ntp status

You need to add the security feature set to a router. Prior to accessing Ciscos website to purchase the appropriate license, you need to record the UDI of the router. Which commands can you use to do this? select two

show version show license udi

You want to verify that interface fa0/2 is a member of VLAN0002. Which command displays the output shown here?

show vlan brief

You want to verify that interface fastethernet 0/2 is a member of VLAN0002. Which command displays the output shown here?

show vlan brief

You check the time on router and find that it is off by several minutes. To fix this issue, you configure NTP on the router to get time from Stratum 2 time provider on the internet. However, the time difference is large and it is taking some time for NTP to synchronize the time on the leave router. To speed synchronization, you use NTP commands to immediately synchronize the time on the router with the time on the time provider. Which NTp term best describes this process?

slam

You check the time on a router and find that it is off by about 10 minutes. To fix the issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. It is taking some time for NTP to synchronize the time on the local router. After about 15 minutes, the time finally synchronizes. Which NTP term best describes this process?

slew

Which of the following methods of preventing the count-to-infinity problem with distance vector routers will send a hop count of 16 back up the path from which information was obtained?

split horizon with poison reverse

Angela is a network admin for a rapidly growing company with a 100baseT network. Users have complained about slow file transfers. In a check of network traffic Angela discovers a high number of collisions. which connectivity device would best reduce the number of collisions and provide for future growth?

switch

You want to make interface fa0/2 a member of VLAN2 on a Catalyst 2950XL switch. Which commands must you enter? select two

switch port access vlan2 int fastethernet 0/2

LLDP is disabled on Cisco devices by default. Which of the following commands enables LLDP on a Cisco device?

switch(config)# Feature lldp

Which command disables the trunking configuration on a switch interface?

switch(config-if)#switchport mode access

Switch B is a Catalyst 2924 switch you're configuring to support VLAN trunking. Switch B is both ISL and 802.1Q callable. With a is encapsulating 802.1Q. You want switch B's port to be in trunk mode regardless of the mode configured on switch A. Which commands should you use to configure the trunk port on Switch B? choose two

switchport trunk encapsulation dot1q switch port mode trunk

You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17. If any unauthorized devices attempt to attach, you want to disable the port until you manually re-enable it. On fa0/17, you use the swtichport port-security mac-address command to identify the MAC address on the server. What else should you include in your commands? select two.

swithcport port-security maximum 1 switch port port-security violation shutdown

Which of the following Cisco router commands can you use to test IP-Application layer processes as well as Networking-layer connectivity?

telnet

Which of the following utilities gives you the most information about the operational status of a router

telnet

Which of the following utilities gives you the most information about the operational status of a router?

telnet

Match each OSPF component on the left with the corresponding description on the right. Each component may be used once, more then once, or not at all.

the OSPF area to which all the other areas connect Backbone area A router in the backbone area Backbone router A router in a single, non-backbone area Internal router Know as area 0 Backbone area A set of routers and links that share the same link-state database information Area AN OSPF router that connects two areas Area border router Has interfaces connected to the backbone area and to at least one another area Area border router

You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?

the areas defined in network statements do not match

What is the first thing that happens when a collision occurs on an ethernet network?

the device that detected the collision transmits a jam signal

Which of the following best explains what is meant by the term "single-homed connection;?

the enterprise is connected to a single ISP by a single connection

Which of the following are true about the distance vector method of sharing routing table information? select two

the entire routing table is sent to other routers Routers send routing information only to their neighbors routers

Which effect does the standby 2 priority 110 interface configuration command have?

the group priority is increased above the default

Hold downs use triggered updates to help prevent routing loops by letting routers know of changes in the network. Which of the following events can reset the hold-down timer? select two

the hold-down timer receives notification of a change in network status The hold-down timer runs out

You sue the shop ip route command on a Cisco router and see the following information. Which of the following are true? select two

the router has learned about routes through three routing protocols For the route to 172.17.0.0, the number 68 indicates the route cost

Which fields in the header of IP packets are examined by net flow to determine whether or not a given packet is part of a flow? select two

type of service source address

You need to add VoIP and IP telephony support to a router. Which feature set must be enabled to do this?

uck9

You have configured EIGRP routing on routerA. A partial configuration is shown below. RouterA is connected to routerB through the serial link. When you check the routing table on routerA you see a single route reported learned through EIGRP to network 192.168.1.0/24. You want routerA to have routes to the individual networks connected to routerA. How should you modify the configuration of routerA?

use the no auto-summary command

You are troubleshooting the connection on a switch. Which would you do to correct the status shown for fa0/12? Note: you will not be able to use the show run or show start commands in this lab.

use the no shutdown command

Which of the following are true about Gigibit Ethernet? select two

uses CSMA/CD Can us both copper and fiber optic


संबंधित स्टडी सेट्स

LSU Math 1022 Section 10.4 Vectors

View Set

Audit Chapter 7 - Auditing Internal Control over Financial Reporting

View Set

Concept 27 - Care for patients with Noninfectious Lower Respiratory Problems

View Set

MS prep u 53: Patients with Male Reproductive Disorders

View Set

OSHA 30 Module 6: Personal Protective Equipment Module Quiz

View Set

Macroeconomics chapters 21-23 Test

View Set