CISCO ICND1 CCENT (100-105) BEST STUDY GUIDE 2019
In which Internet Protocol version 6 address method is a packet delivered to the closest interface that has that address? A Anycast. B Broadcast. C Multicast. D Unicast.
A
The exhibit represents an Ethernet frame. Put the fields of the ethernet frame in the correct Box by dragging the field name to the appropriate box in the frame each field is used only once. 1) Preamble 2) Destination address 3) Source address 4) Type 5) Data 6 FCS Is this the correct order? A True B False
A
There is a rogue switch connected to CORE1. You know that the switch runs on a vendor-neutral link layer discovery protocol. To which port is the rogue switch connected? A Fa2/0/1 B Fa1/0/1 C Fa2/0/2 D Fa1/0/2 EXPLANATION: The Rogue switch is connected to Port Fa2/0/1. The switch is run on a vendor-neutral discovery protocol link layer Discovery you should use the SHOW LLDP NEIGHBORS command to view all directly-connected devices. When you examine the table you will find out that the switch HP2520G is not visible in the topology and it is connected to Fa2/0/1 you would use LLDP RUN command to enable LLDP on a Cisco device it is disabled by default on many platforms LLDP is similar to CDP but it is vendor-neutral.
A
Users on the sales VLAN are reporting that they cannot communicate with other systems on the sales belaying. Users on the HR VLAN are reporting similar issues when attempting to connect to other systems with on there be land. However, connectivity between systems on the marketing VLAN seems to be working fine. On which device to the configuration problems exist? A SW_C B SW_A C Rtr_A D Host_1 E SW_B EXPLANATION: The configuration problems exist on switch see the determination is based on a combination of information from implementing plan, the network topology, and the show VLAN command on Switch C. They reported problems appearing to be occurring between hosts on a common VLAN. Router A would only be needed if problems exist between VLANs because there would then be a need for inter-VLAN routing which is not required in this scenario. Switch a is properly configure with the appropriate VLANs interface VLAN memberships / the implementation plan and trunk configurations between the switches switch B is properly configured with the appropriate VLANs interface VLAN memberships for the implementation plan and the trunk configuration between the switches host one and hoes 5 are both intended to be members of the sales VLAN members of the same VLAN must be members of the same IP subnet. Based on the outfit from the ipconfig commands on host one and he was five both hosts are configured on a common IP subnet
A
Users on the sales VLAN are reporting that they cannot communicate with other systems on the sales belaying. Users on the HR VLAN are reporting similar issues when attempting to connect to other systems with on there be land. However, connectivity between systems on the marketing VLAN seems to be working fine. What aspects of VLAN configuration are causing the problems users are experiencing? (choose two) 1) Proper VLAN identification 2) Proper VLAN creation 3) Proper interface VLAN affiliation 4) Proper interface trunk configuration 5) Proper VLAN 1 interface address configuration A 1 & 3 B 2 & 4 EXPLANATION: The problems that users are experiencing are related to VLAN identification and interface VLAN affiliation. Her the implementation plan information, VLAN 2 is the sales VLAN and VLAN 3 is the HR VLAN. Based on the output of the SHOW VLAN command on Switch C, VLANs who was identified as the HR VLAN and VLAN 3 is identified as a sales VLAN, meaning that someone made a VLAN identification configuration mistake. As a result, the interfaces connecting to Host_5 and Host_6 were inadvertently assigned to the wrong VLANs. Because of the interfaces are assigned to the wrong VLANs, the host connected to switch she cannot communicate with other hoes configured for the proper VLANs. The proper VLANs exist on switch see so the problems users are experiencing are not related to that aspect of the VLAN configuration. Interface VLAN 1 is not currently configured with an IP address and is an administrative lie down based on the output of the show IP interface brief command. However, this interface configuration is completely unrelated to the connectivity problems that users are experiencing. Based on the information from the network topology in the show interface trunk command output on switch C interfaces Fa0/23 and Fa0/24 properly configured his trunk ports.
A
Users on the sales VLAN are reporting that they cannot communicate with other systems on the sales belaying. Users on the HR VLAN are reporting similar issues when attempting to connect to other systems with on there be land. However, connectivity between systems on the marketing VLAN seems to be working fine. You need to restore proper network connectivity for the sales users first. What are the minimum commands required to ensure that sales users have proper network connectivity? (choose two) 1) SW_C(config)#vlan 2 2) SW_C(config-if)#switchport access vlan 2 3) SW_C(config-if)#switchport mode access 4) SW_C(config)#interface Fa0/2 5) SW_C(config-vlan)#name Sales 6) SW_C(config) #interface Fa0/1 A 2 & 6 B 1 & 5 EXPLANATION: The minimum commands required on SW_C to ensure that sales users have proper network connectivity are: INTERFACE FA0/1 & SWITCHPORT ACCESS VLAN 2 The sales users are connected to switch see on the fa01 interface, so proper VLAN membership must be configured in the fa01 interface context. All members of the sales department should be assigned to VLAN 2. So the SWITCHPORT ACCESS VLAN 2 command is required to associate interface fa01 with VLAN 2.
A
What 3 configuration steps are required to make Core Router A compliant with the network security policies? (choose 3) 1) Configure an enable password 2) Password protect the console port 3) Configure an enable secret password 4) Issue the service password-encryption command 5) Issue the service password encryption command 6) Password protect the vty lines 7) Password protect the auxiliary port A 3,4,7 B 1,2,3 EXPLANATION: You would use the SHOW RUNNING-CONFIG command to view the current security on the device.
A
What are the components of a UDP header? (Choose two) 1) Urgent pointer and checksum. 2) 16-bit data length and checksum. 3) Source port number and destination port number. 4) Sequence number and acknowledgment number. A 2 & 3 B 2 & 4
A
What are three ways to mitigate a password attack? (choose 3) 1) Maintain spares for critical components. 2) Used strong passwords. 3) Disable account after a specific number of unsuccessful login attempts. 4) Disconnect the network from the outside world. 5) Use plain text passwords. 6) Do not use the same password on more than one system. A 2,3,6 B 1,3,5
A
What is the FCS section of an Ethernet frame provide? A It provides a mechanism for the NIC to determine whether the frame had any transmission errors. B It receives frames and corrects the error, sending it back to the source. C It is a method of correcting sequences that start with a preamble. D It contains an error data, which is useful for the switch to find similar frames and discard them completely.
A
Which command should you run to verify the active iOS software Integrity on R1? A verify /md5 flash:c860vae-ipbasek9-mz.152-4.m5.bin B verify /md5 nvram:c860vae-ipbasek9-mz.152-4.m5.bin C verify /md5 nvram:c860vae-ipbasek9-mz.152-4.m8.bin D verify /md5 flash:cpconfig-8xx.cfg EXPLANATION: You should use the VERIFY /MD5 command to check the Internetwork Operating System (IOS) Integrity. First, you should check the active iOS running on R1 using the SHOW FLASH command. On most Cisco platforms the iOS has the bin extension as shown below: R1# show flash: 65536kb system flash allocated directory of flash:/ 2 - rwx 2261520 December 18 2013 328 14 c860vae-ipbasek9-mz.152-4.m5.bin /output omitted/ You should therefore use the following command to verify the Integrity of the iOS on R1: verify /md5 flash:c860vae-ipbasek9-mz.152-4.m5.bin
A
Which command should you use to enable IPv6 globally on a Cisco router? A IPv6 unicast-routing. B IPv6 address. C IPv6 route. D IPv6 enable.
A
Which device creates one broadcast domain and multiple Collision domains? A Bridge B NIC C Router D Hub
A
Which statements about UDP and data connection Integrity or true? (Choose two) 1) UDP does basic error checking and correction at a network interface level. 2) UDP is compatible with packet broadcast and multicasting. 3) UDP is unreliable because datagrams might arrive out of order or go missing without notice. 4) UDP packets can be retransmitted using the TCP/IP protocol. 5) UDP uses a simple transmission model of basic handshaking dialogues for a reliable and guaranteed connection. A 2 & 3 B 4 & 5
A
Which three statements are true about enabling Port security? (choose 3) 1) The port security feature cannot be used if a port is configured as a trunk. 2) The default violation mode is shutdown. 3) The protocol violation mode sends log and SNMP messages. 4) You should use the show port-security interface command to verify that a violation has occurred. 5) The switch Port security command is used to enable port security under an interface A 2,4,5 B 1,4,5
A
Which two commands creating static routes on Router0 could you use to replace the RIP route for traffic destined to network 10.1.4.0? (choose two) 1) ip route 10.1.4.0 255.255.255.0 Fa0/1. 2) ip route 10.1.4.0 255.255.255.0 10.1.3.2 3) ip route 10.1.4.0 255.255.255.0 Fa0/0. 4) ip route 10.1.4.0 255.255.255.0 10.1.1.2 A 1 & 2 B 3 & 4 EXPLANATION: You can use the following commands to replace the current RIPv2 route for traffic destined to 10.1.4.0: ip route 10.1.4.0 255.255.255.0 10.1.3.2 ip route 10.1.4.0 255.255.255.0 Fa0/1
A
Which two statements about default Port security configurations on a Cisco Catalyst 2960 switch running Cisco iOS are true? (Choose two) 1) Port security is enabled. 2) Only one Secure Media Access Control address is allowed per port. 3) Sticky learning is enabled. 4) Static MAC configuration is required. 5) The switchport will be disabled if there is a violation of Port security. A 2 & 5 B 1 & 5
A
Which two statements describe the benefits of a core layer? (Choose two) 1) Fault tolerance with a reliable transport. 2) Broadcast domain control feature. 3) High-speed switching and faster scaling. 4) Access Control this and filtering used with policy-based security. 5) Lan and Wan aggregation. A 1 & 3 B 4 & 5
A
Which which two network utilities are often used to access and configure a remote Cisco device that is configured with an IP address? (choose two) 1) SSH 2) Telnet 3) FTP 4) ping 5) traceroute A 1 & 2 B 3 & 4
A
You are assigned to configure router one in a Lan Management environment. Router 1 has an interface named GigabitEthernet0/1. The MAC address of GigabitEthernet0/1 has been set to 6066.77778888. You configure the interface with the IPv6 address 2010:1:1:1::/64 eui-64 subcommand. What will the unicast address of the interface GigabitEthernet0/1 be? A 2010:1:1:1:6266:77FF:FE77:8888. B 2010:1:1:1:600:FF:FE22:02000: C 2010:1:1:1:62FF:FE66:7777:8888 D 2010:1:1:1:6266::88FF:FE88
A
You are configuring a new router for your network and want to make access to the router secure. What are three recommended practices for securing router access? (choose 3) 1) Encrypt all passwords in the running configuration file by using the service password-encryption command. 2) Use a login Banner to display a warning message before the login prompts. 3) Configure both and enable password and enable secret command to ensure that if you forget the password configured with the enable secret command, you can use the password can figure with the enable password command. 4) Use mixed case passwords. 5) Use secure shell (SSH) rather than telnet to establish a connection on the console line. 6) Use the same password on the console on and on all virtual terminal lines. A 1,2,4 B 3,4,5
A
You are designing a variable length subnet masking Internet Protocol addressing scheme for your network. You are going to use the address space 10.1.64.0/18 on one of your local area networks. Which four addresses are valid host addresses on this LAN? (choose four) 1) 10.1.0.0 2) 10.1.75.255 3) 10.1.128.0 4) 10.1.64.1 5) 10.1.150.7 6) 10.1.127.0 7) 10.1.125.13 A 2,4,6,7 B 3,5,6,7
A
You are experiencing some problems with your network, which is shown in the exhibit. You issue a ping command from Router A and get the following output: Router_A#ping 192.168.7.1 Type escape sequence to abort Sending 5 packets.... Success rate is 80% 4/5 trip What is a likely cause of the problem that is illustrated by the output of the Ping command? A Router A had to issue an address resolution protocol (ARP) request to Router B B There is no device with the address 192.168. 7.1 C Router B had to issue an address resolution protocol (ARP) request to Router A D Router C did not receive the Ping request
A
You are the network administrator for a company. You have configured a router in the network and divided the network into two subnets the computers in a two subnets are unable to communicate with each other. The exhibit shows the network diagram. What is wrong with the configuration? (Choose two) 1) The IP address of Host A is incorrect. 2) The IP address of Host D is incorrect. 3) The IP address of Host C is incorrect. 4) The IP address of Host B is incorrect. A 1 & 4 B 2 & 3
A
You are the network administrator for your company. You need to assign IP addresses to hosts on the network having a subnet 192.168.32.16/28. Which two IP addresses can be assigned to The Host? (Choose two) 1) 192.168.32.32 2) 192.168.32.17 3) 192.168.32.30 4) 192.168.32.31 5) 192.168.32.16 A 2 & 3 B 4 & 5
A
You are the network administrator for your company. You have enabled Port Security on a Cisco 2960 switch on the network. You manually added some secured media Access Control address is on the secured port. You want to remove one of the secured Mac addresses from the address table. Which Cisco IOS command would you use to remove the MAC address? A No switchport port-security Mac address. B Clear Mac address table Dynamic. C No switchport port-security. D No switchport port-security mac-address sticky. E Clear airport security Dynamic interface
A
You are troubleshooting a network communication issue with a router on the network. The router in question should be directly connected to another router and to two new switches on the network. You want to ensure that the communication issue is not related to physical cabling between the devices. What are the different types of cables required? A Two straight through cables and one crossover cable. B Two crossover cables and one rollover cable. C Two straight through cables and one rollover cable. D Two rollover cables and one crossover cable. E Two crossover cables and one straight through cable.
A
You have a computer name PC one. You connect to a web server by entering the address www.web server.com in the web browser of pc-1. You are unable to load the webpage www.webserverer.com. You can ping the public IP address of this webpage. You call the help desk and they assign a network engineer to solve the issue. The network engineer finds that is a layer three problem. Which Step should the network engineer take to isolate the problem? A Verify DNS settings on PC one. B Verify that PC one is connected to the internet. C Check speed and duplex settings on pc 1. D Use the traceroute command to isolate the issue.
A
You have made changes to the running configuration of the Cisco switch. You need to save the current configuration to the NVRAM and verify that the changes made to the current configuration have been actually saved in the NVRAM. Which two commands will help you complete this task? (choose two) 1) show running-config 2) show startup-config 3) show version 4) copy running-config startup-config A 2 & 4 B 1 & 3
A
You manage a network with multiple Cisco routers and switches. You receive new license files for the routers. You need to install the licenses on each router. What should you do? (choose two) 1) On each router, copy the license file using the copy flash0: tftp command 2) On each router, copy the license file using the copy tftp flash0: command 3) On each router run the license install command 4) On each router, run the license call-home command A 2 & 3 B 3 & 4
A
A web server name and web server one is sending a web page to a web browser on a computer name web 1 using three separate messages. Each message has a TCP header and HTTP information in addition to the actual data. Each message has a sequence number. As shown in the exhibit, the web server sends three messages with their respective sequence numbers to web one. Two messages with sequence number one and three reach their destination, but the message would sequence number to fails to reach the destination. Which action occurs so that web one reaches message number to? A Web1 discards the message completely and resend the message. B Web1 sends a TCP acknowledgement to the web server for the missing segments. C Web1 modifies the TCP segment and sends the TCP error recovery notice to the web server. D Web1 will modify the TCP segment and send an error detailed log to the web server requesting further action.
B
Based on the output from the show IP interface brief command on Core Router A shown in the exhibit what does the down value in the protocol field indicate? (choose two) 1) The interface is shutdown 2) The local cable is unplugged 3) The interface is operational 4) The physical layer is not functioning properly 5) Remote keepalive messages are not being received 6) The data link layer is not functioning properly A 3 & 4 B 5 & 6 EXPLANATION: Based on the output from the show IP interface brief command on core router a, the down value in the protocol field indicates that the data link layer is not functioning properly and remote keep live messages are not being received. There are two aspects involved in the operational status of an interface: interface status and line protocol. interface status is concerned with the local hardware status. Line protocol is concerned with remote connectivity from the other end of the circuit. The interface is showing down in the protocol field are showing an interface status of administratively down. This indicates that the interface is disabled via a shutdown command. This affects the physical connectivity of the interface at the hardware layer. When you see down in the protocol field, it indicates that there is no logical connectivity at the data link layer with the Remote device. Therefore the data link layer is not functioning properly in the router is not receiving keepalive messages from a Remote device interface is showing down in the protocol field or not operational interfaces showing down in the Protocol field could show this is a result of being shut down but the shutdown status is identified in the status field, not the protocol field it is unknown whether the physical layer is function properly or if a local cable is unplugged. Because the interface status is administratively down, you would need to use enable the interface to determine whether these two statements are true.
B
CORE2 has been configured to send its configuration file to the TFTP server every 5 mins. What is the IP address of the TFTP server? A 10.10.10.202 B 10.10.10.199 C 10.10.10.200 D 10.10.10.201 EXPLANATION: The IP address of the TFTP server is 10. 10. 10. 199. You should use the show archive command to learn about the destination IP address and backups. Core 2 has been configured using the archive command, which allows automation of the process of backup. In this case, the full configuration file is sent to the TFTP server every 5 minutes. You would use the following commands to configure the archive feature on CORE2: archive path tftp://10. 10. 10. 199 time-period 5 write-memory exit
B
How does a NAT router keep track of the port address translation conversations in private IP for addressing? A By mapping TCP and UDP Header information. B By mapping TCP and UDP port numbers. C By mapping TCP IP address numbers. D By mapping UDP datagram headers.
B
How many Collision domains are in the network shown in the exhibit? A 3. B 7. C 5. D 8.
B
In which network topology is every host device affectively directly connected to every other host device through a common cable? A mesh. B bus. C star. D hybrid.
B
The exhibit shows on network diagram with a firewall and security zones. Which zone should you label is inside, which is outside, and which as DMZ? A 1 - Zone DMZ, 2 - Zone outside, 3 - Zone inside B 1 - Zone inside, 2 - Zone outside, 3 - Zone DMZ C 1 - Zone DMZ, 2 - Zone inside, 3 - Zone outside D 1 - Zone outside, 2 - Zone inside, 3 - Zone DMZ
B
The switch receives a frame on one of its ports. The switch does not have an entry for this Mac address in the MAC address table. How is the frame treated by the switch? A The frame will be dropped. B The frame will be flooded out all ports except the port that received it. C The frame will be forwarded out of the port that received it. D The frame will be stored for a random time until the switch learns the path. E The frame will be flooded out all ports.
B
What are two characteristics of IPv6 unique local addresses? (choose two) 1) They should not be used inside of a limited area, such as a site. 2) They may be routed between the limited set of sites only if IPv6 Nat is enabled. 3) They are globally unique and are intended for local Communications. 4) They are expected to be routable on the global internet. 5) They have the same functionality is IPv4 private addresses. A 1 & 2 B 3 & 5
B
What is an access layer do in a three-tier architecture? A An access layer enter connects the distribution block to the win and internet Edge. B An access layer incorporates layer 2 switches and access points granting connectivity between servers and workstations. C And access layer provides Upstream services for various distribution layer switches. D An access layer Aggregates large amounts of traffic from all core layer devices.
B
What is the route source code associated with the network used in Office 2? A 120 B R C 2 D 192.168.1.2 EXPLANATION: The routing protocol code associated with the Office 2 network is R. You should check the routing table of R1 and find the 172.16.2.0 network entry: R 172.16.2.0 [120/2] via 192.168.1.1, 00:00:15 Fa0/0 The First Column represents the route source code, in this case, it is the letter R which tells you that this route has been learned via RIP. You should use the SHOW IP ROUTE command to view the routing table on a Cisco router
B
What is the severity level for buffer logging on R1? A Severity=2 B Severity=3 C Severity=1 D Severity=7 E Severity=5 F Severity=6 G Severity=4 EXPLANATION: The severity level for buffer logging on our one has been configured as level 3 - ERRORS. You use the SHOW LOGGING command to verify this information.
B
What is the uptime of the switch? A 27 hours B 2 hours C 33 hours D 12 hours EXPLANATION: You would use the SHOW VERSION command to get this information.
B
Which command uses a series of packets with low Time-to-Live values (TTL) to determine a path in the network? A ip route B traceroute C ping D icmp
B
Which exit interface will R1 use to send the packet destined to 192.168.2.1? A FastEthernet1/0 B FastEthernet0/0 C FastEthernet0/1 D FastEthernet1/1 EXPLANATION: You would use the SHOW IP ROUTE command to find this information on R1.
B
Which field in an Ethernet frame is 7 bytes long and is responsible for synchronization? A Source Mac address. B Preamble. C FCS. D Destination Mac address.
B
Which set of commands has been used on Router0 to enable RIPv2? A router rip version 2 network 10.0.0.0 network 192.168.2.0 no auto-summary B router rip version 2 network 10.0.0.0 network 192.168.1.0 no auto-summary C router rip version 2 network 10.0.0.0 network 192.168.1.0 auto-summary D router rip version 2 network 10.0.0.0 network 192.168.3.0 no auto-summary EXPLANATION: You would use SHOW IP PROTOCOLS to find this information on Router0.
B
Which statements are true regarding TCP and UDP? (choose two) 1) With TCP/IP data is read as a stream without marking the beginning or end of the packet. There are multiple packets in one read call. 2) UDP sends packets individually, guaranteeing a whole packet with a beginning and an end if it arrives safely at the destination. UDP has one packet per read call. 3) With TCP/IP, data is read as a stream with a distinguished beginning and an end of a packet. There is only one packet per read call. 4) UDP misses the packets in a stream and keeps sending the data packets until the datastream goes smooth. There might be losses but UDP manages to send 4-5 copies of the same packet at once. A 3 & 4 B 1 & 2
B
Which two configuration items are not provided by stateless address auto-configuration (SLAAC) and should be specified in the IPv6 DHCP pool for end device? (choose two) 1) IPv6 address. 2) Subnet mask. 3) Domain name. 4) Domain name system. 5) SSH keys. A 1 & 4 B 3 & 4
B
Which two statements about the traceroute command are true? (choose two) 1) it is used to make modifications to the console terminal settings 2) it is used to establish a remote connection over the Internet or local area network 3) it is used to display the route table information for a remote Network 4) it is used to determine the network points where packets are getting dropped 5) it finds the path that a packet takes while it is transmitted to a remote destination A 1 & 2 B 4 & 5
B
Which two statements are true regarding RIP running on Router0? (choose two) 1) The default RIP sending timer has been modified. 2) Router0 uses Fa0/1 to reach the 10.1.2.0 network. 3) There are two equal paths to reach the 192.168.3.0 network. 4) The no Auto summary command has been applied A 1 & 4 B 3 & 4 EXPLANATION: The no auto-summary command has been applied on Router0, and there are two equal paths to reach the 192.168.3.0 network. You should use the SHOW IP PROTOCOLS and SHOW IP ROUTE command to verify it is using RIP on Router0. The relevant parts of the output are shown below: Router0#show IP route /output omitted/ R 192.168.3.0/24 [120/2] via 10.1.1.2, 00:00:14 Fa0/1. Router0#show IP protocols Routing protocol is "rip" /output omitted/ Automatic network summarization is not in effect Maximum path for router zero uses Fa0/0 to reach Network 10.1.2.0. You should use the SHOW IP ROUTE command to verify this information the rip timers have not been modified the following lines from the show IP protocols output provide the information you are looking for sending updates every 30 seconds next do in 19 seconds invalid after 180 seconds hold down 180 flush after 240
B
Which two statements describe IPv6 link local address is? (choose two) 1) A link local address is tied to a particular physical interface. 2) Nodes with link local address is required a globally unique address to communicate. 3) They're used for addressing on a single link but cannot be used with neighbor Discovery protocol. 4) Routers will only forward data grams using link local addresses. 5) All IPv6 enabled interfaces have a link local address. A 1 & 3 B 1 & 5
B
Which two statements regarding secure shell SSH access to network devices are true? (choose two) 1) All information from the network devices sent in cleartext. 2) All keystrokes to the network device are sent in clear text. 3) All information from the network devices encrypted. 4) SSH version 1 is recommended. 5) All keystrokes to the network device are encrypted A 1 & 2 B 3 & 5
B
You are a network engineer your network consists of 15 routers. A user reports issue sending a file from one server to another. You want to connect one of the edge routers and verify the route of the package to the destination. Which Step should you take to follow the Cisco organized troubleshooting process? A Use the Ping command to isolate the problem. B Use the traceroute command to isolate the problem. C Monitor the situation and document all results. D Escalate the problem to a senior engineer.
B
You are configuring Cisco router to use a third-party logging server. The logging server has an IP address of 192.168.1.100. All system events with a severity level of 6 or lower must be sent to the logging server with the current time. Which block of command should you run? A configure terminal logging 192.168.1.100 service timestamps log uptime logging trap 6 B configure terminal logging 192.168.1.100 service timestamps log datetime logging trap 6 C configure terminal logging 192.168.1.100 service timestamps log datetime logging monitor 6 D configure terminal logging 192.168.1.100 service timestamps log uptime logging monitor 6
B
You are the network administrator for a company. You have divided the network into two separate subnets and connected these subnets using a router. The exhibit shows the partial view of the network. Which two statements are true in the given scenario? (Choose two) 1) Host B will be able to communicate with all the other hosts. 2) Host B will not be able to communicate with any of the hosts. 3) Host A will only be able to communicate with Host C. 4) Host A will be able to communicate with all the other hosts. 5) Hose B will only be able to communicate with Host C. 6) Host A will not be able to communicate with any of the other hosts. A 1 & 2 B 5 & 6
B
You are the network administrator for your company. You want to know the administrator status of the interfaces on a 2960 switch. Which two commands can you use? (Choose two) 1) show interfaces. 2) show version. 3) show startup-config. 4) show IP interface brief. 5) show interface s0/0. A 1 & 3 B 1 & 4
B
You are the network administrator of your company. You have set up a new Cisco router on the network. You want to display a message stating, "Access limited to authorized Administrators only" to anyone who connects to the router. Which Cisco iOS commands should you use to display this message? A Router#banner login % B Router(config)#banner motd # C Router(config)#banner login # D Router(config-line)#banner login $ E Router(config-line)#banner motd $ F Router#banner motd %
B
You have a Cisco router. After installing and switching on the router, you want to connect to the router using your PC. You have hyperterminal install on your PC. Which cable type should you use to connect your PC to the console Port connector on the router? A RJ-11 to DB-20 console adapter cable B RJ-45 to DB-9 console adapter cable C RJ-45 to DB-25 black console adapter cable D RJ-11 to DB-9 console adapter cable
B
You issue the show logging command on your router, and you see the output shown in the exhibit. Where will messages with the severity of informational be logged? (choose two) 1) Buffer 2) Console 3) Syslog server 4) Monitor connections A 2 & 4 B 1 & 3
B
You manage the network shown in the exhibit. Computer 1 is accessing a webpage on Server 1. When the packet is flowing from Computer 1 to Server 1, what will the source Mac address and destination address be when the packet enters port Fa0/0 on Router 2? (Choose one Mac address and one destination IP address) 1) MAC address of interface Fa0/1 on Router 1. 2) IP address of interface Fa0/0 on Router 2. 3) MAC address of Computer 1. 4) IP address of Server 1. A 2 & 3 B 1 & 4
B
You recently started to manage a network with Cisco routers and switches. You do not know the password to one of the routers. You need to ensure that you can reset the password on a device. What should you do? A Boot the router to rommon and change the configuration register setting to 0x2102. B Boot the router to rommon and change the configuration register setting to 0x2142. C Boot the router to rommon and manually reboot the device from flash memory. D Boot the router to rommon and manually reboot the device from a TFTP server.
B
You upgrade the iOS on your router. You decide to save a backup copy of the iOS file to your tftp server on the local network. Which IOS command should you use? A Router#copy tftp nvram B Router#copy flash tftp C Router#copy tftp flash D Router#copy system tftp E Router#copy NVRAM tftp F Router#copy tftp system
B
Your task is to secure the console port on a Cisco router. You have the following requirements: *Anyone with a valid username and password is allowed to connect. *The session should time out after 10 minutes. Which set of commands should you use? A R1(config)#line vty 0 4 R1(config-line)#login R1(config-line)#exec-timeout 10 B R1(config)#line console 0 R1(config-line)#login local R1(config-line)#exec-timeout 10 C R1(config)#line vty 0 4 R1(config-line)#login local R1(config-line)#exec-timeout 10 D R1(config)#line console 0 R1(config-line)#login R1(config-line)#exec-timeout 10 EXPLANATION: The line console zero gives you access to the console configuration mode. The login local command tells your router to use the local database (username and password). The exec-timeout 10 command ensures that all the sessions time out after 10 minutes.
B
Has SCP been enabled on R1, and how can you make a backup of the iOS? A SCP has not been enabled on R1. SCP is not supported on Cisco routers. You should copy the iOS to a USB drive. B SCP has been enabled on R1. A network engineer should use TFTP client on the admin server to make a backup. C SCP has been enabled on R1. A network engineer should use an SCP client on the admin server to make a backup. D SCP has been enabled on R1. A network engineer should use an SCP server on the admin server to make a backup. EXPLANATION: You should use the SHOW RUNNING-CONFIG command to locate this line: ip scp server enable This answers that question.
C
The port security feature is not working as expected on a switch. You run the show port-security command to troubleshoot and get the following output: Switch#show port-security interface f0/22 Port security disabled Port status secure down Violation mode shutdown aging time 0 minutes aging type absolute SecureStatic address aging disabled maximum Mac addresses one total Mac addresses 0 configured Mac addresses zero sticky Mac addresses one last Source address VLAN 0 0 0 0 0 0 0 0 0 0 0 0 0 security violation count zero Based on the above output, which command is missing under f0/22? A Switchport port-security maximum 1 B switchport port-security violation protect C switchport port-security D no shutdown
C
What command reveals the information shown in the exhibit and what word is missing in the blank reference in the output? A Show interface fast ethernet 2/24 authentication to view the routing protocol authentication status of Port 2/24. The missing word is ospf. B Show interface fast ethernet 2/24 trunk to view the trunking status of Port 2/24. The missing word is trunk. C Show Port security interface fast ethernet 2/24 to view the current security status of Court 2/24. The missing word is security. D Show IP interface brief | i fastethernet 2/24 to view the summary status report 2/24. The missing word is status. E Show IP ARP fast ethernet 2/24 to view the ARP entries associated with Port 2/24. The missing word is ARP.
C
What is the broadcast address on the subnet with a device with an IP address 192.168.10.52 and a subnet mask of 255 255 255 248? A 192.168.10.51 B 192.16.10.56 C 192.168.10.55 D 192.168.10.53 E 192.168.10.54
C
What will our one do with a packet destined for the 172.16.3.0 network? A Send it to R3 B Send it to R2 C Drop the message D Send it to its Gateway of Last Resort EXPLANATION: R1 will drop a packet destined for the 172.16.3.0 network. You should use the SHOW IP ROUTE command to view the routing table on R1. You learn that there is no route to 172.16.3.0. There is no Gateway of Last Resort either, which means if the router will drop this packet.
C
Which IPv6 addressing method represents communication between a single host and multiple receivers? A Broadcast. B Anycast. C Multicast. D Unicast.
C
Which configuration step is required to make Core Router A compliant with the network security policies? A Configure the vty lines to only allow ssh connections B Configure ssh version 2 C Configure a user account D Configure a domain name E Configure the vty lines to require local authentication EXPLANATION: You would use SHOW RUNNING-CONFIG to view these. SSH requires a local user account to comply with the login information on the vty lines.
C
Which configuration steps are required to properly configure switch port security on Core Switch A? A Configure the proper Port is access ports. B Allow the proper number of hosts to use access ports. C Configure the proper client Mac addresses on access ports. D Enable Port Security on the proper ask access ports. E Configure the proper violation action on access ports. EXPLANATION: You should configure the proper client MAC addresses on access ports to properly configure switch Port security on Core Switch A. The output of the SHOW RUNNING-CONFIG command on Core Switch a shows that poor security MAC addresses are statically configured on interfaces Fa0/1 and Fa0/2, however the MAC address is configured on an interface Fa0/2 is not identical to the MAC address and figured on Host2 to as seen in the IPCONFIG /ALL issued on that device as soon as Host2 to sends any traffic through interface Fa0/2 the source MAC address from Host2 will not match the configured MAC address in the switchport port-security mac address command configured on Fast ethernet 02. Once this occurs Fa0/2 will enter an error disabled state due to the misconfigured Mac address.
C
Which protocol is in use between a wireless LAN controller and access points? A IPSEC B LLDP C CAPWAP D HTTPS EXPLANATION: The control and provisioning of wireless access points CAPWAP protocol is used to exchange information between a wireless LAN and LWAP. CAPWAP is based on lightweight access point protocol LWAPP.
C
You are a network administrator for your company. The network has been assigned IP address of 64.123.50.0/24. You want to divide the network into various subjects. It is required that one of the subnet should have 120 host and all the other subnet should have 60 host each. What is the total number of subnets that can be created? A 6. B 2. C 3. D 4. E 5.
C
You have been asked to connect to network in the engineering department with the network in the research Department. The required bandwidth is 100 megabits per second, and the distance between the Departments is 400 ft 122 m. Also the area the media must be routed through is known to have high Emi. Which media type should you use? A Wireless (IEEE 802.11g) B Twisted pair (CAT e5) C Multimode fiber 1000base-SX D Single-mode fiber 1000base-LX
C
You have connected to computers using a router. When information is sent from one computer to another? Which OSI layer determines the path of the used? A Physical layer. B Transport layer. C Network layer. D Application layer. E Data link layer.
C
You recently completed an initial configuration of a router. A new network administrator executes a series of commands on the router that results in changes to that configuration, which he then saves to Startup config. You saved a backup copy of your configuration file on your TFTP server you want to restore your configuration file from the TFTP server to a non-volatile random access memory (NVRAM) on the router. Which IOS command should you use to restore the configuration file? A Router#copy tftp flash B Router#copy startup-config tftp C Router#copy tftp startup-config D Router#copy running-config tftp E Router#copy flash tftp F Router#copy tftp running-config
C
You want to make sure that only secure shell connections are allowed on the vty lines of your router. Anyone attempting to telnet into the router should not be successful Which command ensures that only SSH sessions are allowed? A Router(config)#ip ssh version 2 B Router(config-line)#transport input ssh telnet C Router(config-line)#transport input ssh D Router(config)#transport input ssh telnet E Router(config)#transport input ssh
C
You want to secure the unused ports on your Cisco 2960 switch. Which command should you use? A Switch(config)#switchport port-security. B Switch(config)#shut down. C Switch(config-if)#shutdown. D Switch(config-if)#switchport mode access. E Switch(config-if)#switchport port-security. F Switch(config)#switchport mode access.
C
An IPv6 address contains the following characteristics *it can exist more than once in the network. *A message is delivered to the closest interface identified by the address. *nodes to which this type of addresses assigned must be explicitly configured to recognize the address type. What type of IPv6 address is it? A Link-local. B Global unicast. C loopback. D Anycast. E Multicast
D
There is no route to network 192.168.2.0 on Router0. What is causing this problem? A The IP address for 192.168.2.0 is missing on Router0. B The network command for 192.168.2.0 is missing on router zero. C The IP address for 192.168.2.0 is missing on Router1. D The network command for 192.168.2.0 is missing on Router1. EXPLANATION: The network command for 192.168.2.0 is missing on Router1. You should use the SHOW IP PROTOCOLS command to verify networks included in the Routing Information Protocol Version 2 (RIPv2) on Router1. You would fix this issue by using the network command as shown below: router rip network 192.168.2.0
D
What is the Unique Device Identifier of R1? A FCZ1121C119 B c880data-universtalk9-mz.152-3.T.bin C CISCO887VA-K9 D CISCO887VA-K9:FCZ1121C119 EXPLANATION: Unique device identifier of R1 is CISCO887VA-K9:FCZ1121C119 the UDI is a unique string that combines the product ID the serial number and the hardware version you should use the SHOW LICENSE UDI command to find it UDI is needed for license activation and to support contracts you would use the UDI product authorization key to generate a license using a dedicated Portal from Cisco finally you would use the license install Catman to apply the new license.
D
What is the configuration register value on R1 and the available space for a new system image? A The configuration register is 0x2102, and the available space is 234496 bytes B The configuration register is 0x2142, and the available space is 234496 bytes C The configuration register is 0x2142, and the available space is 39362560 bytes D The configuration register is 0x2102, and the available space is 39362560 bytes EXPLANATION: You would first run SHOW VERSION on R1, and then run SHOW FLASH to get this information.
D
What will the switch do when it receives a frame with a destination Mac address that does not exist in the in the cam table content addressable memory? A The switch will wait for the destination Mac address to arrive. B The switch will drop the frame. C The switch will send the frame back to the sender. D This which will flood the frame.
D
Which address type can be used to send a message from one device to a group of devices that subscribe to the information? A IP address. B Unicast address. C Broadcast address. D Multicast address.
D
Which configuration step is required to make or switch a complying with the network security policies? A Configure an able password B Password protect the console Port C Properly configure SSH for remote Administration D Shut down unused network connections E Configure an enable secret password EXPLANATION: You should shut down unused network connections to make CORE Switch A compliant with the network security policies. Based on the output of the SHOW IP INTERFACE BRIEF command CORE Switch A interface GigabitEthernet1/2 shows a status of down down which indicates a non-operational status. There is no indication in the network diagram that this interface is in use for any network connections so a NO SHUT DOWN command should be issued in config-if mode for this interface. Based on the output of the SHOW RUNNING-CONFIG command CORE Switch A, this device is properly configured to use SSH remote Administration both enable and enable secret passwords are configured and the console Port is also password protected.
D
Which multicast address is used to send routing updates in this network? A 224.0.0.5 B 224.0.0.6 C 224.0.0.10 D 224.0.0.9 EXPLANATION: The 224.0.0.9 multicast address is used to exchange network updates in this network. You should use the SHOW IP PROTOCOLS command to verify a routing protocol. From the output, you can learn that this network uses RIPv2. 224.0.0.9 is the multicast address associated with RIPv2.
D
You are the network administrator for your company. You are concerned about authorized access to network data. You want all the passwords on the main Cisco router to be encrypted so that the attackers cannot read the passwords in the config files and gain access to the company's Network. Which single Cisco IOS command should you use to accomplish this task? A Router#enable secret B Router#enable password C Router#service password-encryption D Route(config)#service password-encryption E Route(config)#enable Secret
D
You have made some configuration changes to a router running in the network. You want to ensure that these changes are stored in memory so that these changes are available the next time the router is rebooted. Which Cisco iOS commands should you use? A router(config)#copy running-config startup-config B router>copy running-config startup-config C router(config)#copy startup-config running config D router#copy running-config startup-config E router>copy startup-config running-config F router#copy startup-config running-config
D
You manage a network with multiple Cisco routers and switches. You receive a new product activation key (PAK) for the routers. You need to install the licenses on each router. What should you do? A On each router, copy the PAK using the copy tftp flash0: command B On each router, copy the PAK using the copy flash0: tftp command C On each router, run the license install command D On each router, run the license call-home command
D
You receive reports from clients and all the lands that they cannot reach clients on any VLAN other than their own VLAN and their local subnet. You need to correct these connectivity issues as quickly as possible. Which action should you take to allow proper connectivity between clients on different VLANs? A Change the encapsulation type on the sub interfaces on Rtr_A. B Change the switchport mode on Sw_A interface gi1/1 to access. C Change the default gateway address is on all hosts systems. D Change the IP addresses on the subinterfaces on Rtr_A. E Change the switchport mode on Sw_A interface to gi1/1 to trunk EXPLANATION: To allow connectivity between clients on different VLANs requires inter VLAN routing based on the information in the SHOW INTERFACE TRUNK command on Sw_A, you should change the switchport mode on Sw_A interface gi1/1 to trunk. The only trunk links currently configured on SW_A are interfaces Fa0/23 and Fa0/24. Trunk links carry traffic for all VLANs by default. Interface gi1/1 connects SW_A to Rtr_A and must be configured as a trunk to allow traffic from each of the VLANs to reach Rtr_A and be routed between different VLANs based on the information in the SHOW IP INTERFACE BRIEF output on Rtr_A and the ipconfig command output on each of the hosts they are configured with the proper default gateway addresses and these subinterfaces on Rtr_A are configured with the proper IP addresses. The subinterfaces on router a are configured with proper encapsulation type, dot1q, based on the output of the SHOW RUNNING-CONFIG command on Rtr_A you should not change the switchport mode on SW_A interface gi1/1 to access. This is the current configuration on this interface and is the cause of the connectivity problems that users on different VLANs are experiencing.
D
Your network has five routers and 20 switches. You need to configure each device to synchronize the logs during telnet sessions. Which command should you execute on each device? A configure terminal line console 0 logging synchronous 5 B configure terminal line console 0 logging trap 5 C configure terminal line vty 0 15 logging trap 5 D configure terminal line vty 0 15 logging synchronous 5
D
The exhibit displays a sample Network diagram. In this network, Host A is able to communicate with Host C, but is not able to communicate with Host B. You are using the Open System Interconnected (OSI) layer model approach for troubleshooting the problem. You replace the cable connecting switch a to host B with a non-working cable. Which OSI layer should you troubleshoot next to solve the problem? A Layer 7. B Layer 1. C Layer 4. D Layer 3. E Layer 2.
E
What is the advantage of using spanning tree protocol on a local area network? A It stops the unnecessary flow of traffic towards trunk links. B It provides load-balancing across multiple paths. C It provides virtual local area network management. D It is used to avoid layer three loops on a network. E It is used to avoid layer 2 loops on the network.
E
When looking at the log file for your core router, you frequently noticed that more than one log message has the same timestamp. You would like to disassemble the information without having to sort through duplicate of stamps. Which command would you use to resolve this problem? A logging synchronous B service logging timestamp sequence C logging timestamp mss D logging buffered E service sequence-numbers
E
Which protocol in the TCP/IP model is used for defining the internet addressing scheme? A Address Resolution Protocol (ARP) B User Datagram Protocol (UDP) C Transmission Control Protocol (TCP) D Routing Information Protocol (RIP) E Internet Protocol (IP)
E
You are designing the IP addressing plan for one of the offices and on your network. The office has been allocated the address space 172.16.64.0/21. The office has 25 LANs, each with a maximum of 40 users, and 10 point-to-point WAN links. You want to conserve as many addresses as possible. What prefix should you use on the LANs and on the WANs? A /30 on both the LAN segments and the WAN links B /27 on the LAN segments and /30 on the WAN links C /21 on the LAN segments and /21 on the WAN links D /26 on both the land segments and the WAN links E /26 on the land segments and /30 on the WAN links
E
You are the network administrator for your company. One of the host cannot communicate with the host on a different network. Which Cisco Internetwork Operating System (IOS) command should you issued on the router to find the network path taken by the packets that are getting dropped? A tracert B telnet C extended ping D ping E traceroute
E
You are the network administrator for your company. You configure your network using the subnet 172.16.10.0/24. You were unable to access the remote host with the IP address 62.168.10.20. You check the conductivity using the Ping command to the network router. The exhibit shows the output of the Ping command. What conclusion can be drawn from the output? A A routing Loop has occurred B An access control list (ACL) blocked the ping request C The destination router was receiving a lot of traffic D The firewall has blocked the Ping request E A router in the path did not have a route available to the destination.
E
Which Cisco IOS command will generate the following output? -#---length------date/time-------path . .. ... 61521920 available (6823116852 used) A Router(config)#show running-config B Router(config)#show flash C Router#show version D Router(config)#show version E Router#show running-config F Router#show flash
F