Monday, March 16, 2009

CCNA4 FINAL 100/100

1. Refer to the exhibit. A network administrator is trying to configure a router to use SDM. After this configuration shown in the exhibit is applied, the SDM interface of the router is still not accessible. What is the cause of the problem?
*The username and password are not configured correctly.
The authentication method is not configured correctly.
The HTTP timeout policy is not configured correctly.
The vtys are not configured correctly.


2. Refer to the exhibit. Branch A has a non-Cisco router that is using IETF encapsulation and Branch B has a Cisco router. After the commands that are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 LMI is ANSI. The LMI is successfully established at both locations. Why is the PVC failing?
The PVC to R1 must be point-to-point.
LMI types must match on each end of a PVC.
The frame relay PVCs cannot be established between Cisco and non-Cisco routers.
*The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 command.

3. Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the exhibit?

The new ACL overwrites the existing ACL.
The network administrator will receive an error message.
*The existing ACL is modified to include the new command.
A second Managers ACL is created that contains only the new command.

4. Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?

Use correct source file name in the command.
Verify that the TFTP server software is running.
Make sure that there is enough room on the TFTP server for the backup.
*Check that R1 has a route to the network where the TFTP server resides.

5. What can a network administrator do to recover from a lost router password?
use the copy tftp: flash: command
boot the router to bootROM mode and enter the b command to load the IOS manually
telnet from another router and issue the show running-config command to view the password
*boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes

6. Which combination of authentication and Layer 2 protocol should be used to establish a link between a Cisco and a non-Cisco router without sending authentication information in plain text?
CHAP and HDLC
*CHAP and PPP
PAP and HDLC
PAP and PPP

7. Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?

The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by the access-list 101 permit ip any any command.
*The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 192.168.1.0 0.0.0.255 command and allows the packet into the router.
It matches the incoming packet to the statement that was created by the access-list 201 permit ip any any command and allows the packet into the router.

8. Which three statements accurately describe attributes of a security policy? (Choose three.)
*It creates a basis for legal action if necessary.
It should not be altered once it is implemented.
*It defines a process for managing security violations.
It focuses primarily on threats from outside of the organization.
*It defines acceptable and unacceptable use of network resources.
It provides step-by-step procedures to harden routers and other network devices.

9. Refer to the exhibit. The network administrator creates a standard access control list on Router1 to prohibit traffic from the 172.16.1.0/24 network from reaching the 172.16.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?

interface Fa0/0, inbound
interface Fa0/0, outbound
interface Fa0/1, inbound
*interface Fa0/1, outbound

10. Refer to the exhibit. Why are the routers unable to establish a PPP session?

*The usernames are misconfigured.
The IP addresses are on different subnets.
The clock rate is configured on the wrong end of the link.
The CHAP passwords must be different on the two routers.
Interface serial 0/0/0 on Router1 must connect to interface serial 0/0/1 on Router2.

11. What are two main components of data confidentiality? (Choose two.)
checksum
digital certificates
**encapsulation
**encryption
hashing

12. A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
Company 1 only uses microfilters at branch locations.
Company 1 has a lower volume of POTS traffic than company 2 has.
**Company 2 is located farther from the service provider than company 1 is.
Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.

13. What is the result when the command permit tcp 192.168.4.0 0.0.3.255 any eq 23 is entered in a named access control list and applied on the inbound interface of a router?
All traffic from 192.168.4.0/24 larger than 23 bytes is permitted.
FTP traffic from the 192.168.4.0/24 network is permitted.
TCP traffic destined to 192.168.4.0/24 network is permitted.
**Telnet traffic originating from 192.168.4.0/22 is permitted out.

14. What are two major characteristics of a worm? (Choose two.)
**exploits known vulnerabilities
attaches itself to another program
executed by a predefined time or event
masquerades as an accepted program
**copies itself to the host and selects new targets

15. While configuring a Frame Relay connection, when should a static Frame Relay map be used?
the remote router is a non-Cisco router
the local router is configured with subinterfaces
**broadcast traffic and multicast traffic over the PVC must be controlled
globally significant rather than locally significant DLCIs are being used

16. A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?
Configure static NAT.
Configure dynamic NAT.
Configure static NAT with overload.
**Configure dynamic NAT with overload.

17. Refer to the exhibit. Which DHCP requests will R1 answer?

all DHCP requests that R1 receives
requests that are broadcast to 10.0.1.255
DNS requests with a destination of 10.0.1.3
**requests that are received on the FastEthernet 0/0 interface
requests that come from any networks that are not listed as excluded

18. What are the symptoms when the s0/0/0 interface on a router is attached to an operational CSU/DSU that is generating a clock signal, but the far end router on the point-to-point link has not been activated?
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.
**show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.

19. A technician has been asked to run Cisco SDM one-step lockdown on the router of a customer. What will be the result of this process?
Traffic is only forwarded from SDM-trusted Cisco routers.
Security testing is performed and the results are saved as a text file stored in NVRAM.
**The router is tested for potential security problems and any necessary changes are made.
All traffic entering the router is quarantined and checked for viruses before being forwarded.

20. Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?

The serial interfaces are in different subnets.
**The RIPng process is not enabled on interfaces.
The RIPng processes do not match between Router1 and Router2.
The RIPng network command is missing from the IPv6 RIP configuration.

21. Refer to the exhibit. Which statement is true about the Frame Relay connection?

The Frame Relay connection is in the process of negotiation.
**A congestion control mechanism is enabled on the Frame Relay connection.
The “ACTIVE” status of the Frame Relay connection indicates that the network is experiencing congestion.
Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.

22. When configuring a Frame Relay connection, what is the purpose of Inverse ARP?
to assign a DLCI to a remote peer
to disable peer requests from determining local Layer 3 addresses
to negotiate LMI encapsulations between local and remote Frame Relay peers
**to create a mapping of DLCI to Layer 3 addresses that belong to remote peers

23. When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?
**access control list
routing protocol
inbound interface
ARP cache

24. An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
**IPv4 is incompatible with RIPng.

25. Refer to the exhibit. Router1 is not able to communicate with its peer that is connected to this interface. Based on the output as shown, what is the most likely cause?

interface reset
**unplugged cable
improper LMI type
PPP negotiation failure

26. Which two functions are provided by the Local Management Interface (LMI) that is used in Frame Relay networks? (Choose two.)
**simple flow control
error notification
congestion notification
mapping of DLCIs to network addresses
**exchange of information about the status of virtual circuits

27. Refer to the exhibit. A technician issues the show interface s0/0/0 command on R1 while troubleshooting a network problem. What two conclusions can be determined by from the output shown? (Choose two.)

**The bandwidth has been set to the value of a T1 line.
This interface should be configured for PPP encapsulation.
**There is no failure indicated in an OSI Layer 1 or Layer 2.
The physical connection between the two routers has failed.
The IP address of S0/0/0 is invalid, given the subnet mask being used.

28. Refer to the exhibit. Which statement is true about the CSU/DSU device?
It connects asynchronous devices to a LAN or WAN through network and terminal emulation software.
It uses a multiport internetworking device to switch traffic such as Frame Relay, ATM, or X.25 over the WAN.
**It provides termination for the digital signal and ensures connection integrity through error correction and line monitoring.
It converts the digital signals produced by a computer into voice frequencies that can be transmitted over the analog lines of the public telephone network.

29. Where does a service provider assume responsibility from a customer for a WAN connection?
local loop
DTE cable on router
**demarcation point
demilitarized zone



30. What are two LCP options that can be configured for PPP? (Choose two.)
EAP
**CHAP
IPCP
CDPCP
**stacker

31. Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the DC router to the Orlando router?

DLCI 123
**DLCI 321
10.10.10.25
10.10.10.26
MAC address of the Orlando router

32. Which two statements are true about creating and applying access lists? (Choose two.)
**There is an implicit deny at the end of all access lists.
**One access list per port, per protocol, per direction is permitted.
Access list entries should filter in the order from general to specific.
The term "inbound" refers to traffic that enters the network from the router interface where the ACL is applied.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.

33. Which statement is true about wildcard masks?
Inverting the subnet mask will always create the wildcard mask.
The wildcard mask performs the same function as a subnet mask.
A network or subnet bit is identified by a "1" in the wildcard mask.
**IP address bits that must be checked are identified by a "0" in the wildcard mask.

34. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from this DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 192.168.1.1". What is the problem?

The 192.168.1.1 address has not been excluded from the DHCP pool.
**The pool of addresses for the 192Network pool is incorrect.
The default router for the 192Network pool is incorrect.
The 192.168.1.1 address is already configured on Fa0/0.

35.Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?

frame-relay interface-dlci 103 on Serial 0/0/0.1
frame-relay interface-dlci 203 on Serial 0/0/0.2
**frame-relay interface-dlci 301 on Serial 0/0/0.1
frame-relay interface-dlci 302 on Serial 0/0/0.2
frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2
frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2

36. What are two effective measures for securing routers? (Choose two.)
Protect all active router interfaces by configuring them as passive interfaces.
Configure remote administration through VTY lines for Telnet access.
**Use quotes or phrases to create pass phrases.
**Disable the HTTP server service.
Enable SNMP traps.

37. A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion should the administrator provide?
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied closest to the core layer.
ACLs applied to outbound interfaces are the most efficient.
**Extended ACLs should be applied closest to the source that is specified by the ACL.

38. Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 do not receive RIP routing updates. On the basis of the provided configuration, what should be enabled on router R2 to remedy the problem?

proxy ARP
CDP updates
SNMP services
**RIP authentication

39. Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?

Apply the ACL in the inbound direction.
Apply the ACL on the FastEthernet 0/0 interface.
**Reverse the order of the TCP protocol statements in the ACL.
Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet .

40. What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
**The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.

41. Refer to the exhibit. What can be concluded from the exhibited output of the debug ip nat command?

The 10.10.10.75 host is exchanging packets with the 192.168.0.10 host.
The native 10.1.200.254 address is being translated to 192.168.0.10.
**The 192.168.0.0/24 network is the inside network.
Port address translation is in effect.

42. Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?

a new WAN service supporting only IPv6
NAT overload to map inside IPv6 addresses to outside IPv4 address
**a manually configured IPv6 tunnel between the edge routers R1 and R2
static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for the rest of the inside IPv6 addresses

43. A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
**Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

44. Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?

application
transport
**network
data link
physical

45. While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
application layer
**network layer
data link layer
physical layer

46. Which variable is permitted or denied by a standard access control list?
protocol type
**source IP address
source MAC address
destination IP address
destination MAC address

47. A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command access-list 115 permit tcp any 172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to the router?
All traffic that comes from 172.16.0.0/16 will be allowed.
All TCP traffic that is destined for 172.16.0.0/16 is permitted.
Any SYN packets that are sent to 172.16.0.0/16 will be permitted.
**Responses to traffic that originates from the 172.16.0.0/16 network are allowed.

48. Because of a remote-procedure call failure, a user is unable to access an NFS server. At what layer of the TCP/IP model does this problem occur?
network layer
data link layer
physical layer
**application layer

49. Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?

interface reset
unplugged cable
improper LMI type
**PPP negotiation failure

50. Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router?
PPP
SLIP
**HDLC
Frame Relay

Wednesday, March 11, 2009

CCNA Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0)

1. What are three examples of TCP/IP application layer protocols? (Choose three.)

a terminal emulation protocol that supports remote console connections with various network devices

a protocol created by IBM that makes it easier for mainframes to connect to remote offices

a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet

a protocol that controls the rate at which data is sent to another computer

a protocol that exchanges network management information between a network device and a management console

a protocol that conducts a test of the path through which a packet travels from source to destination

2. Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)

PDU #1 is a frame.

PDU #2 is an application layer PDU

PDU #3 is a segment.

PDU #4 is a transport layer PDU.

The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.

The order in which these PDUs are created during the encapsulation process is 2, 1, 4, 3.




3. What are two characteristics of TCP? (Choose two.)

data transport reliability

best path determination

establishing, maintaining, and terminating virtual circuits

encapsulation of packets in a data frame with source and destination MAC addresses

best-effort datagram delivery



4. Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router:

RtrA(config)# interface serial0/0/0

RtrA(config-if)# ip address 128.107.0.2 255.255.255.252

RtrA(config-if)# no shutdown



Ethernet

Frame Relay

HDLC

PPP

5. Which three factors contribute to congestion on an Ethernet LAN? (Choose three.)

improper placement of enterprise level servers

addition of hosts to a physical segment

replacement of hubs with workgroup switches

increasing use of bandwidth intensive network applications

creation of new collision domains without first adding network hosts

migration to full-duplex Ethernet within the LAN

6. A Catalyst switch must be in which VTP mode in order to delete or add VLANs to a management domain?

client

server

domain

transparent

designated

7. What creates a loop-free path through a switch network?

hold-down timers

poison reverse

Spanning Tree Protocol

Time to Live

Split Horizon Protocol

Routing Information Protocol

8. Refer to the exhibit. All ports on switch fl-1 are in the Production VLAN and all ports on switch fl-2 are in the Development VLAN. How many broadcast domains and how many collision domains are in the network? (Choose two.)



one broadcast domain

three broadcast domains

three collision domains

five broadcast domains

nine collision domains

ten collision domains

9. Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and SW_2 and switch ports have been assigned to the appropriate VLAN. Workstations in VLAN 10 can ping workstations in VLAN 10 that connect to either switch, but workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite switch. Based on the output, what is most likely the problem?



FA 0/1 on SW_1 needs to be assigned to VLAN 20.

FA 0/1 on SW_2 needs to be assigned to VLAN 20.

VTP is not working properly between SW_1 and SW_2.

Interfaces FA0/1 on SW_1 and SW_2 need to be configured as trunk ports.

Interfaces FA0/3 on both switches need to be configured as access ports.

10. Refer to the exhibit. What can be concluded from the output that is shown?



The management VLAN is VLAN 99.

The only VLAN that can be applied to switch ports is VLAN 99.

The only VLANs that can be applied to switch ports are VLANs 1 and 99.

The switch will only be able to forward frames for hosts on the 10.99.0.0 network.

11. Refer to the exhibit and the following error message from the SwA switch.

00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk FastEthernet0/1 VLAN1.

00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001. Inconsistent port type.

Considering that the link between the two switches is good and the correct type, what could cause this error message?



The Spanning Tree Protocol has been disabled on one switch.

The Spanning Tree Protocol has been disabled on both switches.

The IEEE 802.1Q trunking port has a speed mismatch on one of the switches.

The SwA port is configured as a trunk port and the SwB port is configured as an access port.

The SwA port has IEEE 802.1Q trunking enabled and the SwB port has ISL trunking enabled.

12. Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing?



because there is a cabling problem on VLAN 99

because VLAN 99 is not a valid management VLAN

because VLAN 1 is up and there can only be one management VLAN on the switch

because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface

because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command

13. Refer to the exhibit. Which command needs to be used on router interface Fa 0/1 to complete the VLAN configuration?



RT_1(config)# trunk encapsulation dot1q

RT_1(config-subif)# encapsulation dot1q 10

RT_1(config-subif)# encapsulation negotiate

RT_1(config-subif)# encapsulation 802.1q

RT_1(config)# vlan encapsulation dot1q

14. Refer to the exhibit. Computer A is configured with an IP address of 192.168.20.5 and cannot ping RT_1. What is most likely the problem?



SW_1 FastEthernet interface 0/24 is not a trunk port.

The RT_1 FastEthernet 0/1.10 is not configured for VLANs.

The FastEthernet port 0/1 on SW_1 is configured for VLAN 20.

The management VLAN does not have an IP address assigned to the same VLAN.

The IP address of computer A is incorrect.

15. Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)



host B

host C

host D

host E

host F

host G

16. Refer to the exhibit. Two VLANs have been configured on the switch and hosts have been assigned. Hosts in the Sales VLAN can ping all hosts in their own VLAN, but cannot ping the hosts in the HR VLAN. What are two explanations for this problem? (Choose two.)



All hosts are in one collision domain.

All hosts are in one broadcast domain.

A router is required for communication between VLANs.

The hosts are in separate broadcast domains.

The management VLAN has not been assigned an IP address.

17. Which industry-wide specification was developed to decrease the time that is needed to move to the forwarding state by switch ports that are operating in a redundantly switched topology?

VLSM

PVST

802.1Q

RSTP

VTP

18. Refer to the exhibit. Which switch will be elected the root bridge and which switch will place a port in blocking mode? (Choose two.)



SW1 will become the root bridge.

SW2 will become the root bridge.

SW2 will get a port blocked.

SW4 will get a port blocked.

SW3 will become the root bridge.

SW4 will become the root bridge.

19. What is the purpose of the Spanning Tree Protocol (STP)?

prevents Layer 2 loops

prevents routing loops on a router

creates smaller collision domains

creates smaller broadcast domains

allows Cisco devices to exchange routing table updates

20. Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol?

Ports are manually configured to be in the forwarding state.

Ports listen and learn before going into the forwarding state.

Ports must be blocked before they can be placed in the disabled state.

It takes 15 seconds for a port to go from blocking to forwarding.

21. Four bits have been borrowed to create subnets. Which three addresses are subnet addresses? (Choose three.)

192.168.14.8

192.168.14.16

192.168.14.24

192.168.14.32

192.168.14.148

192.168.14.208

22. Refer to the exhibit. What type of header is shown?



IPv4

IPv6

TCP

UDP

23.



24. Assuming a subnet mask of 255.255.224.0, which three addresses would be valid host addresses? (Choose three.)

10.78.103.0

10.67.32.0

10.78.160.0

10.78.48.0

172.55.96.0

172.211.100.0

25. What type of IP address is 172.16.134.48/27?

a useable host address

a broadcast address

a network address

a multicast address

a public address

26. Which address is a valid IPv6 global unicast address?

FE90::1::FFFF

FD80::1::1234

FE80::1:4545:6578:ABC1

FEA0::100::7788:998F

FC90::::5678:4251:FFFF

27. A network administrator needs to configure three local networks. The networks have these requirements:

Network 1 - 500 hosts

Network 2 - 100 hosts

Network 3 - 1000 hosts

Which three subnet masks will be needed to fulfill these requirements? (Choose three.)

255.255.0.0

255.255.255.0

255.255.254.0

255.255.252.0

255.255.248.0

255.255.255.128

255.255.255.192

28.

29. A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.)

RouterA(config)# router ospf 0

RouterA(config)# router ospf 1

RouterA(config-router)# network 192.168.2.0 0.0.0.255 0

RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0

RouterA(config-router)# network 192.168.2.0 255.255.255.0 0

30. Refer to the exhibit. Two switches have been connected with ports that are configured as trunks. After the connection was made, SW2 displayed the status message as shown in the exhibit. What will solve this problem?



SW1(config)# interface fastethernet 0/1

SW1(config-if)# duplex full

SW1(config)# interface fastethernet 0/1

SW1(config-if)# full-duplex

SW2(config)# interface fastethernet 0/1

SW2(config-if)# duplex full

SW2(config)# interface fastethernet 0/1

SW2(config-if)# full-duplex

31. A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?

the IP address of the interface that is configured with priority 0

the OSPF area ID that is configured on the interface with the highest IP address

the loopback interface IP address

the highest IP address on the LAN interfaces

the highest IP address that is configured on the WAN interfaces

32. What table does the EIGRP DUAL algorithm use to calculate the best route to each destination router?

routing table

topology table

DUAL table

CAM table

ARP table

33. What two measures are used to prevent routing loops in networks that use distance vector routing protocols? (Choose two.)

link-state advertisements (LSA)

Spanning Tree Protocol

shortest path first tree

split horizon

hold-down timers

34. Refer to the exhibit. When the show ip ospf neighbor command is given from the R1# prompt, no output is shown. However, when the show ip interface brief command is given, all interfaces are showing up and up. What is the most likely problem?



R2 has not brought the S0/0/1 interface up yet.

R1 or R2 does not have a loopback interface that is configured yet.

The ISP has not configured a static route for the ABC Company yet.

R1 or R2 does not have a network statement for the 172.16.100.0 network.

R1 has not sent a default route down to R2 by using the default-information originate command.

35. Refer to the exhibit. The XYZ Company hosts web pages for small companies. Based on the exhibited information, what would be an appropriate route for the ISP to configure for the XYZ network?



ISP# ip route 0.0.0.0 0.0.0.0 s0/0/1

ISP# ip route 0.0.0.0 0.0.0.0 s/0/0/0

ISP# ip route 192.135.250.0 255.255.255.0 s0/0/1

ISP# ip route 192.135.250.0 255.255.255.0 s0/0/0

ISP# ip route 192.135.250.0 255.255.255.240 s0/0/1

ISP# ip route 192.135.250.0 255.255.255.248 s0/0/1

36. Refer to the exhibit. A network administrator has configured routers RTA and RTB, but cannot ping from serial interface to serial interface. Which layer of the OSI model is the most likely cause of the problem?



application

transport

network

data link

physical

37. What best describes the operation of distance vector routing protocols?

They use hop count as their only metric.

They only send out updates when a new network is added.

They send their routing tables to directly connected neighbors.

They flood the entire network with routing updates.

38. Refer to the exhibit. Which sequence of commands will configure router A for OSPF?



router ospf 0

network 192.168.10.0

network 192.168.10.192

router ospf 0

network 192.168.10.0

router ospf 1

network 192.168.10.64 0.0.0.63 area 0

network 192.168.10.192 0.0.0.3 area 0

router ospf 1

network 192.168.10.64 255.255.255.192

network 192.168.10.192 255.255.255.252

router ospf 1

network 192.168.10.0 area 0

39. Refer to the exhibit. Router B should not send routing updates to router A. Which command can be used on router B to prevent RIP from sending these updates?



passive-interface fastethernet 0/0

passive-interface serial 0/0/0

access-class 12 out

access-class 12 in

40. A router has learned about network 192.168.168.0 through static and dynamic routing processes. Which route will appear in the routing table for this network if the router has learned multiple routes?

D 192.168.168.0/24 [90/2195456] via 192.168.200.1, 00:00:09, FastEthernet0/0

O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, FastEthernet0/0

R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, FastEthernet0/0

S 192.168.168.0/24 [1/0] via 192.168.200.1

41. Refer to the exhibit. An administrator who is connected to the console of the Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router but unable to ping its Ethernet1 interface. What are two possible causes for this problem? (Choose two.)



The serial interface of the Popcorn router is shutdown.

The Ethernet1 interface of the Popcorn router is shutdown.

The Popcorn router did not include network 192.168.12.0 in its routing configuration.

The Popcorn router is not forwarding RIP updates.

The clock rate is missing from the configuration of one of the routers.

42. When is a WLAN a better solution than a LAN?

when security is an issue

when user mobility is needed

when more than one laptop is used in a cubicle

when electrical interference from surrounding machinery is an issue

43. Which wireless standard works only in the 2.4 GHz range and provides speeds up to 54 Mb/s?

802.11a

802.11b

802.11g

802.11i

802.11n

44. Refer to the exhibit. An initial configuration is being performed on a new router. The network administrator encounters the error message that is shown in the exhibit. What is the problem?



The enable secret command has not been issued yet.

The enable password command has not been issued yet.

The password command has not been set for the console port.

The service password-encryption command has not been issued yet.

45.



46. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?

Multiple private IP addresses are mapped to one public IP address.

The number of usable addresses that is assigned to a company is divided into smaller manageable groups.

A pool of IP addresses are mapped to one or more MAC addresses.

The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured.

47. Which two pieces of information are required when creating a standard access control list? (Choose two.)

destination address and wildcard mask

source address and wildcard mask

subnet mask and wildcard mask

access list number between 100 and 199

access list number between 1 and 99

48. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

most

host

all

any

some

gt

49. What guideline is generally followed about the placement of extended access control lists?

They should be placed as close as possible to the source of the traffic to be denied.

They should be placed as close as possible to the destination of the traffic to be denied.

They should be placed on the fastest interface available.

They should be placed on the destination WAN link.

50. Refer to the exhibit. A named access list called chemistry_block has been written to prevent users on the Chemistry Network and public Internet from access to the Records Server. All other users within the school should have access to this server. The list contains the following statements:

deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0

permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0


Which command sequence will place this list to meet these requirements?



Hera(config)# interface fa0/0

Hera(config-if)# ip access-group chemistry_block in

Hera(config)# interface s0/0/0

Hera(config-if)# ip access-group chemistry_block out

Apollo(config)# interface s0/0/0

Apollo(config-if)# ip access-group chemistry_block out

Apollo(config)# interface s0/0/1

Apollo(config-if)# ip access-group chemistry_block in

Athena(config)# interface s0/0/1

Athena(config-if)# ip access-group chemistry_block in

Athena(config)# interface fa0/0

Athena(config-if)# ip access-group chemistry_block out

51.

52. Refer to the exhibit. R3 has the following configuration:

R3# show running-config

--some output text omitted--

interface serial0

bandwidth 128

ip address 192.168.11.2 255.255.255.0

encapsulation frame-relay

frame-relay map ip 192.168.11.2 30 broadcast

After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what is the problem?



No clock rate has been configured on interface s0.

There is an incorrect DLCI number in the map statement.

An incorrect IP address exists in the map statement.

The encapsulation frame-relay command is missing the broadcast keyword.

53. What are three Frame Relay congestion management mechanisms? (Choose three.)

BECN

DLCI

DE

FECN

LMI

Inverse ARP

54. Which network device is commonly used to allow multiple VPN connections into a corporate network?

ACL

IDS

firewall

concentrator

55. What is the default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router?

PPP

HDLC

Frame Relay

CHAP

IEEE 802.1Q

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Lady Gaga, Salman Khan