You are on page 1of 30

Senin, 20 Juni 2011 CCNA Discovery 3 FINAL Exam Answers Version 4 di Isi Oleh Cah M41 08 pada 15:29:00

Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network? R1 R2 R3 ISP What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.) 0.0.0.0 255.255.240.0 255.255.255.255 0.0.31.255 255.255.255.240 0.0.0.31 Which address is used to access a switch from a remote location in order to make configuration changes? the default gateway that is configured on the switch the IP address of the management VLAN interface on the switch the default gateway that is configured on the management workstation the IP address configured on the VTY line that is used to establish an incoming connection to the switch Refer to the exhibit. An access list contains the four statements that are shown. Which single access list statement will have exactly the same effect? access-list 10 permit 192.168.10.0 0.0.0.15 access-list 10 permit 192.168.10.0 0.0.0.127 access-list 10 permit 192.168.10.0 0.0.0.191 access-list 10 permit 192.168.10.0 0.0.0.255 Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed? D 192.168.0.0/24 is a summary, Null0 D 192.168.0.0/22 is a summary, Null0 D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0 D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0 Refer to the exhibit. Identify the path the frames will take from PC1 to PC2 in an OSPF network. R1, R5 R1, R3, R5 R1, R4, R5 R1, R2, R3, R5 Which Frame Relay component provides connection status information about PVCs in the network? CIR LMI DLCI FECN

What is the difference between the passive and active route status as displayed in an EIGRP topology table? Routes that are passive are never updated. Routes that are active are used to forward data. Routes that are active are being recalculated by DUAL. Routes that are passive are waiting for the neighbor adjacency process to complete. What is the purpose of assigning an IP address to a Layer 2 switch? to allow in-band management to provide inter-VLAN connectivity to facilitate election of a root bridge to configure a default gateway for the network Refer to the exhibit. What is the correct description of the highlighted address? It is the address of the destination network. It is the routerID of the neighboring router. It is the next hop address of the feasible successor. It is the IP address of the serial0/0/0 interface of RouterC. What are two WAN protocols that define parameters for data encapsulation? (Choose two.) PPP V.35 X.21 HDLC EIA/TIA-232 Refer to the exhibit. A packet with a destination IP address of 192.168.1.22 has entered router R1. How will this packet be routed? It will be dropped. It will be routed out interface Serial0/0/1. It will be routed out interface Serial0/0/0. It will be routed out interface FastEthernet0/0. Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.) There is a routing loop occurring between all three routers. There is a network statement missing. Network 172.30.20.0 has an incorrect wildcard mask. The OSPF area configuration is incorrect. /23 is an invalid subnet mask for the 192.168.0.0 network. Refer to the exhibit. Which rows of numbers represent the correct subnet masks necessary to accommodate the hosts on the network? 1, 2, 4, 5 1, 2, 5, 8 1, 5, 6, 7 2, 3, 4, 8 2, 4, 5, 6 Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements? R2: Fa0/0 inbound R1: S0/1/0 outbound R1: S0/0/1 inbound

R2: S0/0/1 outbound R2: Fa0/0 outbound Which feature of RSTP differentiates it from STP? PortFast UplinkFast active topology five port states Which two statements correctly describe RIPv1 and RIPv2? (Choose two.) Both broadcast their entire routing table from all participating interfaces to 255.255.255.255. Both advertise their routing updates out all active interfaces every 30 seconds. Both have the same administrative distance value of 120. Both can turn off automatic summarization. Both support VLSM and CIDR. What are two features of an extended IP ACL? (Choose two.) It uses numbers 1 through 99 for identification. It can permit or deny traffic based on source or destination address. It detects malicious attacks against the network and logs them on a server. It can filter traffic based on the protocol and port numbers. It encrypts traffic between hosts. Refer to the exhibit. EIGRP has been configured on all routers in the network. Based on the outputs from the show ip route commands on R1 and R2, how will the routers process traffic from Host2 to the hosts on the 172.16.11.0/24 and 172.16.12.0/24 networks? The traffic will reach the destination networks. Traffic will be dropped by R2 because the gateway of last resort is not set. The traffic will reach the Null interface on router R1 where it will be dropped. Because EIGRP does not support discontiguous networks, the traffic from R1 will not reach R2. Refer to the exhibit. Host H1 sends a packet destined for network 192.168.10.0/24. If all routers in the network are running RIPv1, how many hops will it take for the packet to be delivered? 1 2 3 4 5 Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR? C, B, A, D D, C, B, A A, B, C, D A, C, B, D B, C, A, D Which type of distance vector routing mechanism helps prevent the formation of loops by preventing routing information from exiting a router interface through the same interface on which it was received? split horizon hold-down timer poisoned reverse setting maximum hop count

Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet. How can the administrator solve this problem? Enable the Serial0/0/0 interface of R2. Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using RIPv2. Configure a default route on the ISP via Serial0/0/0. Configure the correct subnet mask on the Serial0/0/0 interface of R2. Which software is typically used on a remote PC to access the enterprise through the Internet via a secure tunnel? Telnet client VPN client FTP client web browser Refer to the exhibit. All routers are configured to use the OSPF protocol with default settings. Which router will act as the BDR if all routers start at the same time? R1 R2 R3 R4 In order for a VLAN to be created on a switch, what configuration parameter is required? VTP domain name VLAN number VLAN IP address VLAN database name Refer to the exhibit. Routers R1 and R2 have formed an adjacency, but R3 has no OSPF adjacencies. Based on the R3 configuration, what is the cause of the problem? The wildcard mask is incorrect for the OSPF network. The IP addressing scheme on R3 is configured incorrectly. The OSPF routing configuration on router R3 is missing a network statement. There is no problem in the configuration. All routers need to converge to solve the issue. Which device or component is located at the customer premises and provides the clocking signal for the customer router on a WAN circuit? DTE serial interface CSU/DSU central office switch internal clock on the router patch panel at the point of demarcation Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP network fails to converge? The network commands have been incorrectly issued on both routers. Both routers have been configured with the same autonomous number. The wildcard masks have been incorrectly configured on both routers. Autosummarization is enabled on both routers. What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.) 172.16.0.255

172.16.16.16 172.16.127.127 172.16.128.1 172.17.1.1 172.18.1.1 Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch? VTP version mismatch VTP domain name mismatch VTP revision number mismatch time synchronization problems A network administrator is creating an addressing scheme and has determined that the company network 192.168.1.0/24 will require 8 subnets with at least 25 hosts on each subnet. Which subnet mask will meet these requirements? /25 /26 /27 /28 /29 Which statement is true about ACLs that are applied to VTY lines on Cisco routers? ACLs can be used to encrypt VTY transmissions. ACLs are applied using the access-class command. When ACLs are applied to VTY lines, the VTY password should be removed. The ACL provides the flexibility for a specific user to login remotely from different locations with any IP address. What do companies gain from the services performed at the enterprise edge? faster communication with server farms stronger security against malicious attacks faster communication with Internet destinations enhanced performance and reliability through VLANs and redundant trunk links Which configurable variable is used to determine the election of a spanning tree root bridge? lowest bridge priority lowest native VLAN ID highest VTP revision number highest management VLAN IP address How does CHAP secure connectivity on a PPP link? It uses a two-way handshake to send the username and password. It encrypts user data that is sent across the link. It designates the remote node to control the frequency and timing of the login attempts. It authenticates the username and password during initial link establishment and repeatedly during the time the link is active. Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be most specific? 172.16.0.0/21 172.16.4.0/21 172.16.0.0/22 172.16.4.0/22

An administrator wants to configure a new Cisco Catalyst 2960 switch in order to manage the switch remotely. After configuring the vty lines to allow login, which set of commands should the administrator enter? Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login Switch(config-line)# exit Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.5 255.255.255.0 Switch(config-if)#exit Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login Switch(config-line)# exit Switch(config)# ip default-gateway 192.168.1.1 Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.5 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# exit Switch(config)# ip default-gateway 192.168.1.1 What are two characteristics of EIGRP? (Choose two.) It supports a maximum hop count of 15. It sends small hello packets to maintain knowledge of its neighbors. It forwards complete routing tables in its updates to neighboring routers. It supports equal and unequal cost load balancing. It supports only one network layer protocol. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address? The IP address is already in use. The technician is using a network address. The technician is using the wrong subnet mask for /26. The technician must enable VLSM on the interface. Refer to the exhibit. What will be the effect of entering the commands that are shown? Users on the Internal LAN will be able to access the Internet using any tcp application. Users on the Internal LAN will be able to access the web server via http.

Users on the Internal LAN will be able to ping the web server.. External users on the Internet will be able to ping a host on the Internal LAN. Refer to the exhibit. Which two statements are correct about the VTP configuration on S2? (Choose two.) The default mode is used. The default domain name is used. A new client mode switch in the CISCO domain would receive updates from S2. S2 would not update a new client mode switch whose VTP revision number is 3. S2 will share VLAN database updates with a switch that is configured with VTP version 1. Refer to the exhibit. The network administrator has just configured a default route on the HQ router. What two statements describe what must happen so that all routers in the OSPF network have a route to the Internet? (Choose two.) The gateway of last resort must be set on each OSPF router. HQ will automatically propagate the default route to every other OSPF router. HQ will send the default route information to the DR and BDR for distribution to the other routers. Each router must be configured with a static route to the 64.104.22.16/28 network. HQ must be configured with the default-information originate command. Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in the OSPF configuration. Refer to the exhibit. Router1 and Router2 are both running RIPv2 with autosummarization disabled. Which subnet mask will Router1 associate with network 192.168.4.16/28? 255.255.0.0 255.255.240.0 255.255.255.0 255.255.255.240 255.255.255.248 Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.) to set the duplex mode of a redundant link to activate looped paths throughout the network to determine the root bridge to prevent loops by sharing routing tables between connected switches to determine which ports are placed in forwarding mode Refer to the exhibit. A network administrator is configuring an ACL. Which statement is true about the effect of the ACL? A host with the IP address 192.168.10.22 is allowed to access the FTP server that has the IP address 172.17.2.240. A host with the IP address 192.168.10.42 is allowed to access the FTP server that has the IP address 172.17.2.241. A host with the IP address 192.168.10.12 is allowed to access the web server that has the IP address 172.17.2.242. A host with the IP address 192.168.10.52 is allowed to have SSH access to the server that has the IP address 172.17.2.240. Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses? (Choose two.) 192.168.1.1 192.168.1.2 198.133.219.1 198.133.219.102

198.133.219.103 Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output? Router B has EIGRP adjacencies with both router A and C. Router B has a fully converged topology table. Router B has not formed an adjacency with router A. Router B has not formed an adjacency with router C. Refer to the exhibit. Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A to access host B? 192.168.1.32/26 192.168.1.64/26 192.168.1.126/26 192.168.1.129/26 Which network statement would include the 172.20.64.0 /19 network in the OSPF routing process? Router(config-router)# network 172.20.64.0 0.0.0.31 area 0 Router(config-router)# network 172.20.64.0 0.0.0.63 area 0 Router(config-router)# network 172.20.64.0 0.0.15.255 area 0 Router(config-router)# network 172.20.64.0 0.0.31.255 area 0 If a modem is being used to connect to an ISP, which WAN connection type is being used? leased line cell switched circuit switched packet switched Which characteristic is associated with a floating static route? always appears in the routing table has an administrative distance of 0 is considered the primary route because of its low administrative distance usually has an administrative distance greater than routes learned from a dynamic routing protocol http://cahtimalem08.blogspot.com

CCNA 1 Discovery 4.0 Final Exam 2011 Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 1 of 4 Next> Page: GO <Prev 1 Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send? broadcast multicast simulcast unicast 2Which wireless protocol is used for encryption? EAP Open PSK WEP 3

Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem? PC1 is not plugged in to RTR1. Port 80 is already in use on PC1. No DNS server is configured on PC1. PC1 is configured with an incorrect IP address and default gateway. 4Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router 5TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed.B. Bits are decoded and the destination MAC address is recognized.C. The IP header is removed and the contents are passed to the next layer.D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D 6As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.) 0 1 2 A F 7How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving. 8Under what circumstance would it be appropriate to use private IP addresses? for communication between two ISPs for a network that is directly connected to the Internet for addresses that are used exclusively within an organization. for a host with more than one direct connection to the Internet 9Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) MAC address IP address kernel shell subnet mask 10A technician is trying to troubleshoot a connectivity problem between a host computer and the directly connected FastEthernet0/0 port of a router. The technician believes it is a Layer 1 problem and notices that the cable that is used to connect the two devices is terminated at one end with the 568A standard and with the 568B standard at the other end. What should the technician do? Replace the cable with a rollover cable. Replace the cable with one that is terminated with 568B at both ends. Replace the cable with one that is terminated with 568A at both ends. Replace the cable with another one with the same termination configuration. 11Which adapter card would be required for a PC to exchange information with other PCs on a LAN? NIC video card sound card internal modem 12 Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server? 13 Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN.

14 Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? authentication DHCP encryption firewall NAT WEP 15What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig Showing 1 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 2 of 4 Next> Page: GO <Prev 16What measurement is commonly used to describe communication speed when transferring data? bps cps Hz MB 17Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? brute force denial of service data manipulation social engineering 18Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination? ping netstat tracert nslookup ipconfig 19What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN 20Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. They interconnect local network segments. They interconnect the company network to the ISP. 21What is a function of the application layer of the OSI model? to support the applications and processes that use the network to route application data packets between logical networks to control application access to the physical network media to provide application data with end-toend reliable delivery 22What is specified by the host bits in an IP address? broadcast identity of the network identity of the computer on the network network that is being addressed network to which the host belongs 23Which two causes of networking problems are related to the physical layer? (Choose two.) disconnected cables improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask 24Which two automatic addressing assignments are supported by DHCP? (Choose two.) local server address subnet mask default gateway address physical address of the recipient physical address of the sender

25Which wireless technology allows only one-to-one connections and is typically used for shortrange, line-of-sight communication? GSM Wi-Fi Infrared Bluetooth 26 Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network 192.168.1.0/24 for its LAN and WLAN clients. What could cause the problem? The IP address is incorrect. The subnet mask is incorrect. The default gateway is incorrect. All addresses are correct, so the SSID must be incorrect. 27Which network design layer provides hosts with initial connectivity to the network? access core distribution network 28What component of a personal computer is responsible for the processing of all data? RAM CPU firewall system bus operating system 29 Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses? 127.0.0.1 and 127.0.0.2 172.16.4.2 and 172.16.4.3 172.16.5.1 and 192.168.3.2 198.133.219.25 and 198.133.219.26 30Which term is associated with logical addressing? IP addresses port addresses physical addresses Media Access Control addresses Showing 2 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 3 of 4 Next> Page: GO <Prev 31What advantage does a peer-to-peer network have over a client-server network? It increases security. It increases scalability. It produces a higher performance for hosts. It eliminates the need for centralized administration. 32What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one. 33A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of failed attempts by a single user who is trying multiple password combinations, what type of attack is in progress? brute force phishing SYN flood virus vishing 34What are two advantages of purchasing a custom-built computer? (Choose two.) usually a lower cost no waiting period for assembly user can specify higher performance components supports higher-end graphics and gaming applications fewer components to replace 35Which wireless component allows wireless clients to gain access to a wired network? PDA STA access point wireless bridge 36 Refer to the graphic. Based on the information that is shown, what statement is true? This

configuration would be commonly found in an ad hoc wireless network. Any wireless client that is attached to this access point would have the same IP address and SSID. All wireless devices that are connected to this access point must have an assigned SSID of Academy. In addition to accepting wireless client requests, this access point must connect to the wired network. 37Which picture shows a USB port on a PC? 38Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0? .10 .10.11 128.107 .107.10.11 128.107.10 39When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service 40What does it mean when a problem is being escalated by a helpdesk? The helpdesk is following up on a resolved problem. The helpdesk has made the problem a lower priority. The helpdesk has solved the problem and is closing the ticket. The helpdesk is moving the problem to a higher level support staff. 41 Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP application layer and the internetwork layer? (Choose two.) DHCP FTP IP TCP UDP 42Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization 43Which portion of the packet does a router use to forward the packet to the destination? source IP address user data destination IP address control information destination MAC address 44After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router firewall appliance standalone wireless access point 45Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC Showing 3 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 4 of 4 Next> Page: GO <Prev 46What is the purpose of spam filter software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It examines incoming e-mail messages to identify the unsolicited ones. 47What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network.

48Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network. 49What is the function of the DNS server? It assigns IP addresses to clients. It accepts HTTP requests from clients. It maps a hostname to a corresponding IP address. It manages the domain that clients are assigned to. 50What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices 51A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in. 52 Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this? acceptable use network maintenance password remote access //www.ccnadiscovery.net 1 Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem? VTP V2 mode is disabled. SW3 is configured as transparent mode. The number of existing VLANs does not match. The configuration revision number does not match.

2 Refer to the exhibit. Which route will appear in the routing table? R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1 R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0 R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0

R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0 R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/0

3 What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.) 0.0.0.0 255.255.240.0 255.255.255.255 0.0.31.255 255.255.255.240 0.0.0.31

4 Which bandwidth allocation technique minimizes bandwidth waste by reallocating unused time slices to communicating users? VPN NCP TDM STP STDM

5 Which two statements are true about RIPv1 and RIPv2? (Choose two.) Both versions broadcast updates on port 520. Both versions send the subnet mask as part of the update. By default, both versions will receive RIPv1 and RIPv2 updates. Both versions support the features of split horizon and poison reverse. By default, both versions automatically summarize routes. RIPv1 has a higher AD than RIPv2 has.

6 Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address? 192.168.0.0/22 192.168.0.0/23 192.168.0.0/24 192.168.0.0/25

7 After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.) define an ACL at the distribution layer to isolate packets add an ACL at the router in the enterprise edge to block the traffic deploy a Layer 3 switch to contain broadcasts connect remote locations directly to the intranet configure all hosts with the same default gateway to eliminate unnecessary broadcasts deploy one core ISP router to reduce the delay in path determination

8 What do companies gain from the services performed at the enterprise edge? faster communication with server farms stronger security against malicious attacks faster communication with Internet destinations enhanced performance and reliability through VLANs and redundant trunk links

9 Refer to the exhibit. What two pieces of information can be gathered from the output of this command? (Choose two.) 172.16.16.0/20 is a manually summarized route.

All subnets are being advertised because default summarization was disabled. The output verifies that EIGRP is advertising only the networks in the same AS. The 172.16.1.0/24 network is directly attached to the router that produced this output. The Null0 interface indicates that this is not an actual path, but a summary for advertising purposes.

10 Refer to the exhibit. Assuming that the RIPv1 routing protocol is enabled and that all networks are being advertised, which statement is true? All packets from H1 that are destined to H2 will arrive at H2. None of the packets from H1 that are destined to H2 will arrive at H2. Approximately half the traffic from H1 that is destined to H2 will reach R3. Some of the packets from H1 that are destined to H2 will be sent to the switch that is connected to network 192.168.3.64/26.

11 Which statement is accurate about the CIR in Frame Relay? It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise. The CIR can be no lower than the port speed of the local loop. The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit. It is possible to burst over the CIR if bandwidth is available.

12 What are two characteristics of an extended ACL? (Choose two.) IP is used to specify TCP traffic only. IP is used to specify TCP and UDP traffic only. IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols. Traffic can be filtered on source address only. Traffic can be filtered on source and destination address only. Traffic can be filtered on source and destination address, protocol, and specific port number.

13 Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR? C, B, A, D D, C, B, A A, B, C, D A, C, B, D B, C, A, D

14 Refer to the exhibit. What three facts represent the result of DR and BDR elections in this OSPF network? (Choose three.) RTC will be the DR of 10.5.0.0/30. RTD will be the BDR of 10.5.0.0/30. RTD will be the DR of 10.4.0.0/28. RTB will be the BDR of 10.7.0.0/28. RTB will be the DR of 10.7.0.0/28. RTA will be the BDR of 10.4.0.0/28.

15 Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.) to set the duplex mode of a redundant link to activate looped paths throughout the network to determine the root bridge to prevent loops by sharing routing tables between connected switches to determine which ports are placed in forwarding mode 16

If a modem is being used to connect to an ISP, which WAN connection type is being used? leased line cell switched circuit switched packet switched

17 Refer to the exhibit. A network administrator enters the command ip route 10.10.4.16 255.255.255.248 s0/0/1 into the router. What will be the result of this configuration? A static route pointing to 10.10.4.16/29 is placed into the routing table. A static route to 10.10.4.16/29 is placed into the routing table if interface FastEthernet0/1 goes down. A static route pointing to 10.10.4.16/29 is only placed into the routing table if the route to 10.10.4.0 is removed. A static route is not placed into the routing table because a RIP route that includes the destination network already exists.

18 Refer to the exhibit. What is represented by the Null0 route for the 128.107.0.0 network? a child route that is defined a parent route that is defined and sourced from a physical interface a summary route for advertising purposes, not an actual path the result of the no auto-summary command on a router

19 What are two ways VLAN memberships can be created in an enterprise network? (Choose two.) manually configuring the switch ports to be part of a VLAN allowing the user to choose a specific VLAN through a GUI menu configuring the switch to allow VLAN membership based on NetBIOS association implementing an access list that specifies which devices are placed into specific VLANs. associating MAC addresses to specific VLANs in a VLAN management policy server database

manually configuring the host devices to be part of a VLAN

20 If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated? prior to link establishment during the link establishment phase before the network layer protocol configuration begins after the network layer protocol configuration has ended

21 Refer to the exhibit. R1 is connected to the Internet through its serial 0/0/0 interface. Hosts on the 192.168.100.0/24 LAN on R1 cannot communicate with hosts on the Internet. What two NAT configuration issues might explain this failure? (Choose two.) The ip nat pool command has not been applied correctly. The inside interface has not been defined on R1. The access list does not include the group of IP addresses that are supported by the inside network. The ip address that is assigned to the serial 0/0/0 interface is incorrect. The outside interface has not been defined on R1.

22 A network administrator wants to deny responses to ping requests. Which ACL statement denies ping responses while not affecting other traffic? access-list 123 deny tcp any any eq 80 access-list 123 deny tcp any any eq 20 access-list 123 deny tcp any any eq 21 access-list 123 deny icmp any any echo-reply access-list 101 deny tcp any any established

23

Refer to the exhibit. Which IP addressing scheme would be correct for the network? H1-172.18.0.10/16 H2-172.18.0.11/16 H3-172.18.0.12/16 H1-172.18.0.10/16 H2-172.19.0.10/16 H3-172.18.0.11/16 H1-172.18.0.10/16 H2-172.18.0.11/16 H3-172.19.0.11/16 H1-172.18.0.10/16 H2-172.19.0.11/16 H3-172.19.0.11/16 24 Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes: BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200 BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1 However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing? The first configuration command overwrites the second command. The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0 network. This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table. The first default route cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.

25 Which command should a network administrator issue to disable default summarization in an EIGRP network? Router(config-router)# null 0 route Router(config-if)# no ip summary-address Router(config-router)# no ip summary-address

Router(config-if)# no auto-summary Router(config-router)# no auto-summary

26 The headquarters of a corporation uses static routes to connect to three branch offices. What are two advantages of using static routes for the WAN connections? (Choose two.) Static routes are more secure. Static routes converge faster. Static routes have higher administrative distances than dynamic routing protocols. The metrics of a static route need adjusting only if the bandwidth of the WAN connection changes. They are more stable and less susceptible to network changes in the interior gateway protocol.

27 What two statements are true regarding EIGRP tables? (Choose two.) A feasible successor route can be found in the topology table. A successor route can only be found in the routing table. The topology table shows whether a route is in the passive or active state. The routing table shows the amount of time elapsed since a router adjacency was formed. The neighbor table shows all adjacent Cisco devices. Administrative distance is shown as a column in the neighbor table.

28 Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch? VTP version mismatch VTP domain name mismatch VTP revision number mismatch time synchronization problems

29 Refer to the exhibit. An administrator is adding a new router to the network. The IP address 192.168.13.6/30 has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router? 192.168.13.4/30 192.168.13.5/30 192.168.13.7/30 192.168.13.58/30 192.168.13.61/27 192.168.13.63/27

30 Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address? The IP address is already in use. The technician is using a network address. The technician is using the wrong subnet mask for /26. The technician must enable VLSM on the interface. 31 Why would a network administrator want to limit the size of failure domains when designing a network? to eliminate the effects of Ethernet collisions to reduce the impact of a key device or service failure to reduce the impact of Internet congestion on critical traffic to eliminate the need to block broadcast packets at the edge of the local network

32 Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network? R1

R2 R3 ISP

33 Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific? 192.168.1.0/22 192.168.4.0/21 192.168.6.0/23 192.168.8.0/21 192.168.4.0/22

34 When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.) The key passes between routers in plain text. The key is used to help generate an encrypted number for authentication. The key passes between routers in encrypted form. The key is never transmitted. The key can be captured by using a packet sniffer.

35 What are two benefits of implementing VLANs in an enterprise network? (Choose two.) eliminates the need for a Layer 3 device provides segmentation of broadcast domains allows for the propagation of broadcasts from one local network to another allows for the logical grouping of devices despite physical location prevents issues such as broadcast storms by ensuring a loop free environment

36 Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.) Traffic intended for destinations across unstable serial links will be forwarded by ASBR even when the links are down. A summary route of 192.168.0.0/22 will be advertised to the ISP router. Serial links in range 192.168.0.0 255.255.252.0 will be forced into a passive state. Networks connected to the unstable serial links will be placed in an unreachable state. Negative effects of route flapping will be reduced.

37 Refer to the exhibit. OSPF is enabled and the network has completely converged. Which two routers will be designated as DROTHER routers? (Choose two.) R1 R2 R3 R4

38 Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.) There is a routing loop occurring between all three routers. There is a network statement missing. Network 172.30.20.0 has an incorrect wildcard mask. The OSPF Area configuration is incorrect. /23 is an invalid subnet mask for the 192.168.0.0 network.

39 Which two statements are true about the native VLAN on a switch? (Choose two.)

It requires a special VLAN ID tag. It is unable to be changed to a different VLAN. Untagged traffic slows the switching process down. The native VLAN defaults to VLAN 1 on Cisco Catalyst switches. Untagged frames that are received on a trunk become members of this VLAN.

40 In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members? client server pruning transparent

41 Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is already operational in a network? All packets with a destination address between 172.16.64.1 and 172.16.80.254 will be forwarded out serial0/0. All packets with a destination address between 172.16.64.1 and 172.16.255.254 will be forwarded out serial0/0. All packets with a destination address between 172.16.64.1 and 172.16.79.254 will be forwarded out serial0/0. All packets with a destination address between 172.16.0.1 and 172.16.64.254 will be forwarded out serial0/0.

42 What is the term for the value 2172416 that is highlighted in the output of the show ip eigrp topology command? feasible distance of the successor reported distance of the successor feasible distance of the feasible successor reported distance of the feasible successor

43 Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem? no set loopback incorrect subnet mask on R2 incompatible bandwidth incorrect IP address on R1 incompatible encapsulation

44 Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.) LCP tests the quality of the link. LCP manages compression on the link. Only a single NCP is allowed between the two routers. NCP terminates the link when data exchange is complete. With CHAP authentication, the routers exchange plain text passwords.

45 Refer to the exhibit. All routes in the exhibit are available to a router. Which two routes will be placed into the routing table? (Choose two.) A B C D E F

46 Which two criteria are used by STP to select a root bridge? (Choose two.) memory size bridge priority number of ports switch location switching speed base MAC address

47 Refer to the exhibit. What two conclusions can be drawn from the displayed output? (Choose two.) A packet with a destination IP address of 172.20.1.14 will exit the router via the Serial 0/1/0 interface. The default administrative distance for EIGRP has been changed. Network 172.20.1.4 can be reached through two possible routes of equal cost. The addresses on this network were created using VLSM. The router connected to Serial 0/1/1 is advertising four separate routes through EIGRP to this router.

48 Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true? RB has the lowest priority value. RC and RD have the lowest router IDs on the network. RA has established adjacencies with all neighbor routers. RA and RB can not form an adjacency because they are stuck in the 2-way state.

49 Refer to the exhibit. If router RTA fails, which statement is true?

Hosts A and B can reach each other, but cannot reach hosts C and D or the server. No host can reach any other host. Hosts A, B, C, and D can reach each other, but cannot reach the server. All hosts can reach each other.

50 Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output? Router B has EIGRP adjacencies with both router A and C. Router B has a fully converged topology table. Router B has not formed an adjacency with router A. Router B has not formed an adjacency with router C.

51 A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative? VPN Frame Relay PPP with CHAP authentication PPP with PAP authentication

52 Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements? R2: Fa0/0 inbound R1: S0/1/0 outbound R1: S0/0/1 inbound R2: S0/0/1 outbound R2: Fa0/0 outbound

53 Which three statements are true about RSTP? (Choose three.) RSTP can fall back to STP to provide support for legacy equipment. RSTP and STP have the same number of port states. Like PortFast and UplinkFast, RSTP is a proprietary protocol. RSTP takes up to 50 seconds to converge. RSTP requires a point-to-point, full-duplex connection. RSTP views all ports that are not discarding as part of an active topology.

54 A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration? 255.255.0.0 255.255.240.0 255.255.254.0 255.255.255.0 255.255.255.128 255.255.255.192

55 A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets? TCP UDP PPP HDLC

56 Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?

It identifies traffic on all inside interfaces to be translated and given access to the ISP router. It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router. It allows traffic from the ISP to reach all of the inside interfaces. It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router. It allows traffic from the ISP router to the fa0/1 interface.

57 Refer to the exhibit. Server7 has been added to the server farm network. The hosts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7 cannot ping the other servers connected to the switch. What is the cause of this problem? The Fa0/1 port on the switch should be in access mode. The switch IP address is not on the same subnet as Server7. The switch port used for Server7 is not in the same VLAN as Server2 and Server3. The Fa0/0 interface of the router has not been configured for subinterfaces to support inter-VLAN routing.

58 Which three IP addresses are valid host addresses in the 10.200.0.0/20 network? (Choose three.) 10.200.11.69 10.200.16.1 10.200.0.255 10.201.0.55 10.200.15.240 10.200.30.29 //ccna-discovery-4.blogspot.com

You might also like