You are on page 1of 18

1 Which device or component is located at the customer premises and provides the clocking signal for the custo

router on a WAN circuit?


DTE serial interface
CSU/DSU
central office switch
internal clock on the router
patch panel at the point of demarcation

2 What are two characteristics of EIGRP? (Choose two.)


It supports a maximum hop count of 15.
It sends small hello packets to maintain knowledge of its neighbors.
It forwards complete routing tables in its updates to neighboring routers.
It supports equal and unequal cost load balancing.
It supports only one network layer protocol.

3 In an enterprise network, which components are specific to the network operations center?
printers
wireless access points
network attached storage devices
Layer 2 workstation switches

Refer to the exhibit. A network support technician has been asked to set an IP address on one of the
FastEthernet interfaces on a new router. What is causing the interface to reject the address?
The IP address is already in use.
The technician is using a network address.
The technician is using the wrong subnet mask for /26.
The technician must enable VLSM on the interface.

5
Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?
1=R, 2=O, 3=D, 4=C
1=R, 2=E, 3=O, 4=S
1=R, 2=D, 3=O, 4=S
1=O, 2=R, 3=D, 4=C
1=R, 2=O, 3=E, 4=C
6

Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all interna
networks but do not have Internet access. On which router should the commands, shown in the exhibit, be add
to provide Internet access for all hosts in the network?
R1
R2
R3
ISP

7
Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by tw
ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures Bord
as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to I
fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default
routes:

BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200


BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1

However, when the administrator issued the show ip route command to verify the configuration, only the secon
default route is in the routing table. Why is the first default route not showing?
The first configuration command overwrites the second command.
The first default route will be installed into the routing table if there is traffic with an IP address that is dest
for the 192.168.100.0 network.
This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route
will be installed into the routing table.
The first default route cannot be installed into the routing table unless the administrator manually disables t
second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.

8 How can a network administrator determine if network traffic has matched an ACL if there is no syslog server
configured on the network?
Issue the show access-lists command.
Delete the ACL and add it back, noting changes in traffic flow.
Remove the ACL from any configured interface and note traffic changes.
Verify the counters on the router interface and see if they are incrementing.

9 Which two statements correctly describe RIPv1 and RIPv2? (Choose two.)
Both broadcast their entire routing table from all participating interfaces to 255.255.255.255.
Both advertise their routing updates out all active interfaces every 30 seconds.
Both have the same administrative distance value of 120.
Both can turn off automatic summarization.
Both support VLSM and CIDR.

10 Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)
to set the duplex mode of a redundant link
to activate looped paths throughout the network
to determine the root bridge
to prevent loops by sharing routing tables between connected switches
to determine which ports are placed in forwarding mode

11 What is the purpose of assigning an IP address to a Layer 2 switch?


to allow in-band management
to provide inter-VLAN connectivity
to facilitate election of a root bridge
to configure a default gateway for the network

12

Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16
0.0.0.255?
It identifies traffic on all inside interfaces to be translated and given access to the ISP router.
It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.
It allows traffic from the ISP to reach all of the inside interfaces.
It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router.
It allows traffic from the ISP router to the fa0/1 interface.

13

Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the command
displayed?
D 192.168.0.0/24 is a summary, Null0
D 192.168.0.0/22 is a summary, Null0
D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0
D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0

14 Which function does the access layer provide in a hierarchical internetworking model?
It provides a high-speed backbone layer between geographically dispersed networks.
It provides hierarchical design between the core layer and the distribution layer.
It provides an entry point for hosts into the network.
It provides data security and traffic management for the core layer.

15

Refer to the exhibit. Which route will appear in the routing table?
R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1
R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0
R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0
R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0
R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/0
16 A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to
transport the voice packets?
TCP
UDP
PPP
HDLC

17

Refer to the exhibit. Both switches have been configured with static VLANs. Host A and host C belong to on
VLAN and host B and D belong to another VLAN. However, the hosts within the same VLAN are unable to
communicate with each other.

Which troubleshooting approach should be followed to resolve this problem?


Explore the possibility of adding a router to the network.
Ensure that both switches are configured for the same native VLAN.
Ensure that the ports connecting the two switches are configured as trunk ports.
Ensure that both switches are configured with an IP address in the same subnet.

18 An administrator is configuring a new router to permit out-of-band management access. Which set of comma
will allow the required login using a password of cisco?
Router(config)# line vty 0 4
Router(config-line)# password manage
Router(config-line)# exit
Router(config)# enable password cisco
Router(config)# line vty 0 4
Router(config-line)# password cisco
Router(config-line)# login
Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# login
Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# exit
Router(config)# service password-encryption

19

Refer to the exhibit. OSPF has been configured as a routing protocol on all routers in OSPF area 0. Based on
cost value of the links, which path will be selected by the SPF algorithm to forward traffic from router R4 to
network A?
R4-R2-R1
R4-R3-R1
R4-R2-R3-R1
R4-R3-R2-R1

20 What is the correct wildcard mask to define the supernet 192.168.0.0/22 in an ACL?
0.0.0.31
0.0.0.255
0.0.3.255
0.0.7.255
0.0.255.255

21 What is the purpose of the RIP passive-interface command?


It prevents an interface from sending RIP updates.
It prevents an interface from receiving RIP updates.
It prevents an interface from sending and receiving RIP updates.
It prevents any RIP updates of the network to which the IP address of the interface belongs.

22

Refer to the exhibit. A network administrator configures a Cisco router for inter-VLAN routing. The router is
connected to port Fa0/24 on the switch using a straight-through cable and all switchports are configured as
access ports. What will be the result of the configuration?
Inter-VLAN traffic will not be routed.
The switch will add VLAN tags and forward them to the router.
The router subinterfaces will add the appropriate VLAN tags and route between VLANs.
The switch port will auto-negotiate to a trunk port and will allow for inter-VLAN routing.

23 Which two statements are true about untagged frames on a switch? (Choose two.)
An untagged frame cannot pass through access ports.
An untagged frame cannot pass through trunk ports.
All frames that pass through trunk ports are untagged frames.
Untagged frames minimize the delays that are associated with inspection of the VLAN ID tag.
Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.

24 What information is displayed in the output of the show version command on a router?
interface addresses
routing table entries
amount of flash memory
configured routing protocols

25

Refer to the exhibit. If RIPv1 was used as the routing protocol for the network, what would repres
the vector that router R1 would use to forward traffic toward the Internet?
the Internet
IP address 172.16.10.13
network 192.168.20.0/24
interface S0/0/0 on the ISP router

26

Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?
the session from host A to host B
the session from host B to hosts C and D
the session from host B to hosts E and F
the session from host E and host F to host A and host B

27 Which two interface values does EIGRP use by default to calculate the metric? (Choose two.)
bandwidth
delay
load
hop count
reliability

28 Which two implementations would teleworkers use to allow secure remote configuration and maintenance of
firewalls and to support access to company file servers? (Choose two.)
SSH
VPN
Telnet
Extranet
FTP
QoS

29 What are two characteristics of an extended ACL? (Choose two.)


IP is used to specify TCP traffic only.
IP is used to specify TCP and UDP traffic only.
IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols.
Traffic can be filtered on source address only.
Traffic can be filtered on source and destination address only.
Traffic can be filtered on source and destination address, protocol, and specific port number.

30
Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the
show ip ospf neighbor command to check the status of operation. Which statement is true?
RB has the lowest priority value.
RC and RD have the lowest router IDs on the network.
RA has established adjacencies with all neighbor routers.
RA and RB can not form an adjacency because they are stuck in the 2-way state.
31

Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed wh
selecting the DR?
C, B, A, D
D, C, B, A
A, B, C, D
A, C, B, D
B, C, A, D

32

Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several
minutes, the network administrator notices that the new VLAN information is not being propagated to the ne
switch. Given the show vtp status command output, what is the possible problem that prevents the informati
from being received by the new switch?
VTP version mismatch
VTP domain name mismatch
VTP revision number mismatch
time synchronization problems

33 Which routing protocol is unable to support discontiguous networks?


RIPv1
RIPv2
EIGRP
OSPF

34
Refer to the exhibit. A technician wishes to return a switch to its default state. What additional action should
taken before reloading the switch?
The vlan.dat file should be deleted.
The native VLAN should be changed.
The MAC address table should be cleared.
The running configuration should be deleted.

35 A network manager is creating an access list to give hosts in the 172.16.15.0/27 network access to the Interne
Which wildcard mask will allow only those hosts?
172.16.15.0 0.0.0.15
172.16.15.0 0.0.0.31
172.16.15.0 0.0.0.255
172.16.15.0 0.0.15.255

36

Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which
summary address will be most specific?
172.16.0.0/21
172.16.4.0/21
172.16.0.0/22
172.16.4.0/22

37

Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?
It will set the gateway of last resort for R1.
It will configure the IP address 10.1.1.2 on one interface of R1.
It configures the router to forward traffic that is destined for the 192.168.1.128/26 network through the
interface with IP address 10.1.1.2.
It configures a static route for all packets with the source network address 192.168.1.128/26.

38 Which feature of RSTP differentiates it from STP?


PortFast
UplinkFast
active topology
five port states

39 Which two statements correctly describe the features of IEEE STP? (Choose two.)
It immediately transitions all ports that are not discarding to the forwarding state.
It provides a mechanism for disabling redundant links in a switched network.
It has three port states: discarding, learning, and forwarding.
It ensures that there are no loops in the switched network.
It converges the switched network in less than 1 second.

40 A company is trying to decide whether to use a PVC or an SVC for the company WAN connection. Which
statement best describes a benefit of using a PVC?
A PVC is dynamically established between two points when a router requests a transmission.
A PVC eliminates the need for call setup and clearing for each transmission session.
A PVC is best suited for small companies with sporadic data flows.
A PVC does not require preconfiguration by a service provider.

41 What is a limitation of RIPv1?


RIPv1 cannot run on networks that are using RIPv2.
RIPv1 does not send subnet mask information in its updates.
RIPv1 is not widely supported by networking hardware vendors.
RIPv1 requires enhanced router processors and extra RAM to function effectively.
RIPv1 consumes excessive bandwidth by multicasting routing updates using a Class D address.

42
Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and shar
information, what information can be gathered from the show command output?
Router B has EIGRP adjacencies with both router A and C.
Router B has a fully converged topology table.
Router B has not formed an adjacency with router A.
Router B has not formed an adjacency with router C.

43 Which statement is accurate about the CIR in Frame Relay?


It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.
The CIR can be no lower than the port speed of the local loop.
The CIR defines the contracted maximum rate available from the service provider on the Frame Relay
circuit.
It is possible to burst over the CIR if bandwidth is available.

44 Which subprotocol does PPP use to establish, maintain, test, and terminate a point-to-point link?
LCP
NCP
IPCP
IPXCP

45 Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)
CHAP sends passwords in clear text.
CHAP uses repeated challenges for verification.
PPP encapsulation is configured in interface mode.
CHAP uses a 2-way handshake to establish a link.
PPP encapsulation is the default for serial interfaces on Cisco routers.
CHAP uses a challenge/response that is based on the MD5 hash algorithm.
46

Refer to the exhibit. What is the result of the address translation configuration for traffic that exits interface
s0/0/0?
All hosts on the inside network will have their addresses translated to 172.31.232.182.
All hosts that connect to interface s0/0/0 will have their addresses translated to 172.31.232.0/24 addresse
All hosts on the 172.31.232.0/24 network will have their addresses translated to 209.165.202.1.
All hosts on the inside network will have their addresses translated to any one of the addresses from the
209.165.202.0/24 subnet.

47

Refer to the exhibit. EIGRP has been configured on all routers in the network. What is the reason for the rout
the last line of the routing table to be marked as D EX?
The route is configured as a static route on router R1.
The route is a feasible successor to the destination 192.168.2.0/24 network.
The route is learned from another routing protocol or from outside the EIGRP network.
The route is in the “Active” state and will be removed from the routing table in 4 minutes and 23 second

48 What are two ways VLAN memberships can be created in an enterprise network? (Choose two.)
manually configuring the switch ports to be part of a VLAN
allowing the user to choose a specific VLAN through a GUI menu
configuring the switch to allow VLAN membership based on NetBIOS association
implementing an access list that specifies which devices are placed into specific VLANs.
associating MAC addresses to specific VLANs in a VLAN management policy server database
manually configuring the host devices to be part of a VLAN

49

Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allow
these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit
placed to meet these requirements?
R2: Fa0/0 inbound
R1: S0/1/0 outbound
R1: S0/0/1 inbound
R2: S0/0/1 outbound
R2: Fa0/0 outbound

50 All OSPF routers in a network have been configured to use MD5 authentication. Which two statements descr
the reasons for using this technology? (Choose two.)
All data passing between OSPF routers will be encrypted.
MD5 authentication ensures the integrity of the network information.
MD5 authentication optimizes bandwidth use on point-to-point links.
MD5 authentication will ensure that only routers with matching keys share routing updates.
The MD5 key will be sent to adjacent neighbors in plain text, after which OSPF updates will be encrypte

51

Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed.
How will this ACL affect the traffic at R1?
All traffic that exits the Fa0/1 interface will be denied.
All FTP traffic from the 192.168.2.0 network will be denied.
All traffic except FTP will be allowed to exit the Fa0/1 interface.
All traffic except FTP will be allowed from the 192.168.1.0 network.

52 Which statement is true about the difference between CHAP and PAP in PPP authentication?
PAP and CHAP provide equivalent protection against replay attacks.
PAP sends the password encrypted and CHAP does not send the password at all.
PAP uses a two-way handshake method and CHAP uses a three-way handshake method.
PAP sends the password once and CHAP sends the password repeatedly until acknowledgement of
authentication is received.

You might also like