You are on page 1of 13

Theory Review CCNA 2

1. Consider the RIP network shown in the diagram. Which RIP


entry(s) would be listed in the routing table of Router A?

R192.168.5.2[120/1] via 192.168.15.0, 00:00:09, Serial0


R 192.168.15.0[120/1] via 192.168.5.2, 00:00:13, Serial1
R 192.168.15.0[120/1] via 192.168.5.1, 00:00:13, Serial0
R 192.168.5.1 [120/1] via 192.168.5.2 00:00:29, Serial1
R 192.168.15.0 [120/1] via 192.168.5.2, 00:00:29, Serial1
R 192.168.5.1 [120/1] via 192.168.5.2 00:00:18, Serial0
R192.168.15.2 [120/1] via 192.168.5.2, 00:00:18, Serial0

2. If the passive interface command is enabled on the fa0/0


interface of Router E, which statements are true?

a. Router E will send all routing updates via interface fa0/0.


b. Router E will ignore all routing updates learned via interface
fa0/0.
c. Router E will use routing updates learned via interface fa0/0.
d. Router E will not send routing updates via interface fa0/0

CCNA R&SE KJ
3. According to the router output from the show ip route
command shown above, which of the following statements
are true?

a. The metric to network 192.168.8.0 is 24.


b. The next hop router address to reach network 192.168.1.0 is
192.168.3.1.
c. The devices on network 192.168.5.0 cannot be reached as
indicated by the 'C' label.
d. The hop count to a device on network 192.168.8.0 is 2.
e. The total path cost to network 192.168.4.0 is the default
value of 16.

CCNA R&SE KJ
4. Referring to the diagram, which commands will enable hosts
on the Idaho E0 network to reach hosts on the E0 network of
the Montana router?

a. Montana(config)# ip route 172.31.5.0 255.255.255.0


172.31.5.1
b. Montana(config)# ip route 172.31.3.0 255.255.255.0
172.31.4.1
c. Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.1
d. Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.2
e. Idaho(config)# ip route 172.31.5.1 255.255.255.0 172.31.4.1

5. Which of the following are valid static IP routes?

a. RouterB(config)# ip route 192.168.5.0 255.255.255.0


S1
b. RouterC(config)# ip route 192.168.1.0 255.255.255.0
S1
c. RouterA(config)# ip route 192.168.3.0 255.255.255.0
192.168.2.2
d. RouterB(config)# ip route 192.168.1.0 255.255.255.0
192.168.2.2
e. RouterC(config)# ip route 192.168.2.0 255.255.255.0
192.168.4.1
f. RouterA(config)# ip route 192.168.4.0 255.255.255.0
CCNA R&SE KJ
192.168.2.1

CCNA R&SE KJ
6. What can be concluded about the routing process on a
router if the commands router rip and network 192.5.5.0
have been issued?
a. A distance vector routing protocol was used.
b. A link-state routing protocol was used.
c. Routing updates will broadcast every 90 seconds.
d. Routing updates will broadcast every 30 seconds.
e. Bandwidth, load, delay, and reliability are the metrics
used for route selection.
f. Hop count is the metric used for route selection.

7. Why is fast convergence desirable in networks that use


dynamic routing protocols?
a. Routers will not allow packets to be forwarded until the
network has converged.
b. Hosts are unable to access their gateway until the
network has converged.
c. Routers may make incorrect forwarding decisions until the
network has converged.
d. Routers will not allow configuration changes to be made
until the network has converged.

8. Which two statements describe autonomous systems?


a. Interior gateway protocols are used between autonomous
systems.
b. Exterior gateway protocols are used between autonomous
systems.
c. An autonomous system may be under the control of
multiple organizations.
d. An autonomous system is identified by a 16 bit number
assigned by ARIN.
e. The autonomous system is identified in the network
portion of the IP address.

9. Select the statements that describe link-state routing


processes?

a. Each router develops its own map of the entire network.


b. Link-state routing protocols place a higher load on router
resources during the routing protocol initialization.

CCNA R&SE KJ
c. Routers send triggered updates when changes in the
network occur.
d. Networks using link-state routing protocols are slower to
reach convergence after changes have occurred than those
using distance vector protocols.
e. Link-state protocols are more prone to routing loops than
distance vector routing protocols

10. What are the default settings for a serial interface?


a. DCE
b. DTE
c. shutdown
d. no IP address
e. clock rate 128000
f. encapsulation ARPA

11. What is the CIDR notation for the subnet mask


255.224.0.0?____________

12. What subnet mask is represented by the /20 notation?

______________________________________

13. What will be the result of the OSPF election process if


all priorities are set to default? Which router will be elected
DR and which BDR?

CCNA R&SE KJ
14. Why is the command R#(config-router)# no auto-
summary needed on each router to allow packets to travel
between the two Ethernet networks?

15. Given the network address on the diagram below, use


VLSM to address the 3 networks

CCNA R&SE KJ
/16

Sales____________________________________

Marketing _______________________________

Administrative ____________________________

CCNA R&SE KJ
16. Standard access lists are identified by a number from
_________ to _________

17. Standard access lists are placed closest to the

______________________ and filter packets based on

_________________ only.

18. Standard access lists work at layer _________ of the OSI

model

19. Extended access lists are numbered from ___________ to

___________

20. Extended access lists are placed closest to the

___________________ and filter packets on __________________,

______________________,
__________________ and _________________________
21. Extended access lists work at layer
(s)_______________________

22. In an Access Control List, the wildcard mask of 0.0.0.0 can


be substituted using what word? ___________________________

23. Which of the following OSPF networks hold DR


elections?
CCNA R&SE KJ
CCNA R&SE KJ
24. A switch is configured with the commands shown in the
diagram.
Host1 is connected to port 0/4 with an IP address of192.168.1.22/28.
Host2 is connected to port 0/5 with an IP address of 192.168.1.33/28.
Host3 is connected to port 0/6 with an IP address of 192.168.1.30/28.

Determine which hosts can ping each other.


___________________________________________________

25. What command is used to delete the configuration stored in NVRAM?

a. erase startup-config

b. erase running-config

c. delete nvram

d. erase nvram

CCNA R&SE KJ
26. The LAN devices are configured as shown in the topology. Host1 and
Host2 are unable to communicate. Explain the reason why.

27. Create an Extended ACL to prevent host 210.93.105.50


from accessing an FTP server located at 192.5.5.148.
Indicate interface and direction of placement

28. In an Access Control List, the wildcard mask of 0.0.0.0


can be substituted using what word? ________________
CCNA R&SE KJ
29. If there are no matches to any statement defined in an
ACL, what happens?

30. What is the default last statement in an ACL that is


not visible?

____________________________________________________

31. Given these subnets ... what's the summary address &
mask?

192.168.10.0 /24
192.168.11.0 /24
192.168.12.0 /24
192.168.13.0 /24
192.168.14.0 /24
192.168.15.0 /24

CCNA R&SE KJ

You might also like