You are on page 1of 28

Which two statements correctly describe RSTP? (Choose two.) It is a Cisco proprietary protocol. It is a Cisco proprietary protocol.

It recalculates the spanning tree in less than 1 second. It requires the PortFast and UplinkFast features on switch ports. It supports four states: blocking, listening, learning, and forwarding. It requires a full-duplex, point-to-point connection between switches to achieve the highest recalculation speed. Which two statements correctly describe RIPv1 and RIPv2? (Choose two.) Both broadcast their entire routing table from all participating interfaces to 2 55.255.255.255.

Both advertise their routing updates out all active interfaces every 30 seconds. Both have the same administrative distance value of 120. Both can turn off automatic summarization. Both support VLSM and CIDR. Refer to the exhibit. What is the purpose of assigning the IP address 192.168.30 .1 to an access layer switch? to assign a default gateway to the hosts that are connected to the switch to allow hosts on the same LAN to connect to each other to allow remote management of the switch to allow inter-VLAN communication A sales representative is preparing to send sensitive information to corporate h eadquarters from a hotel room using the Internet. Prior the trip, the IT staff m ade the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative? VPN

Frame Relay PPP with CHAP authentication PPP with PAP authentication Refer to the exhibit. If router RTA fails, which statement is true? Hosts A and B can reach each other, but cannot reach hosts C and D or the server . No host can reach any other host. Hosts A, B, C, and D can reach each other, but cannot reach the server. All hosts can reach each other.

Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to acce ss the Internet. How can the administrator solve this problem? Configure a default route on R3 and propagate it via the use of RIPv2 to all rou ters. Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3. Configure a default route on the ISP, and it will be automatically propagated to all routers. Configure a default route on R1, and it will be automatically propagated to all routers. 7 What are two benefits of implementing VLANs in an enterprise network? (Choose two.) eliminates the need for a Layer 3 device provides segmentation of broadcast domains allows for the propagation of broadcasts from one local network to another allows for the logical grouping of devices despite physical location prevents issues such as broadcast storms by ensuring a loop free environment 8

Refer to the exhibit. R1 is using the default OSPF operation. Which IP address w ill be used as the router ID of R1? 192.168.201.1 172.16.1.1 10.10.10.1 10.1.1.1 9 In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members? client server pruning transparent 10 Refer to the exhibit. Which VTP function will this switch perform?

It It It It

will will will will

create, change, and delete VLANs. send VTP messages to other attached switches. ignore information that is contained in the VTP message. retain its original database when it receives updates from the server.

11 Which component of the Cisco Enterprise Architecture manages server farms? service provider edge enterprise campus enterprise edge edge device 12 It It It It 13 Refer to the exhibit. All switches are configured with default bridge priority. Which two ports will be STP root ports if all links are operating at the same bandwidth? (Choose two.) Why is UDP preferred for transmission of video traffic? is a reliable protocol. retransmits lost packets. is a three-way handshake protocol. has low overhead.

Fa0/1 Fa0/2 Fa0/1 Fa0/2 Fa0/1 Fa0/2

interface interface interface interface interface interface

of of of of of of

switch switch switch switch switch switch

A A B B C C

Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interf aces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem? no set loopback incorrect subnet mask on R2 incompatible bandwidth incorrect IP address on R1 incompatible encapsulation

Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed? D 192.168.0.0/24 is a summary, Null0 D 192.168.0.0/22 is a summary, Null0 D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0 D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0 Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries? 1=R, 2=O, 3=D, 4=C 1=R, 2=E, 3=O, 4=S 1=R, 2=D, 3=O, 4=S 1=O, 2=R, 3=D, 4=C 1=R, 2=O, 3=E, 4=C Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 in terface of R1 as displayed. How will this ACL affect traffic at R1?

All All All All

traffic that exits the Fa0/1 interface will be denied. FTP traffic from the 192.168.2.0 network will be denied. traffic except FTP will be allowed to exit the Fa0/1 interface. traffic except FTP will be allowed from the 192.168.1.0 network.

Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP network fails to converge? The network commands have been incorrectly issued on both routers. Both routers have been configured with the same autonomous number. The wildcard masks have been incorrectly configured on both routers. Autosummarization is enabled on both routers. 19 Which two STP states allow a switch to learn MAC addresses? (Choose two.) blocking listening learning disabled forwarding 20 While using the Class A addressing scheme, a network administrator decides to us e the 255.255.254.0 subnet mask in the network configuration. How many host addresses can be created for each subnetwork in thi s addressing scheme?

510 512 1022 1024 Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses? (Choose two.) 192.168.1.1 192.168.1.2 198.133.219.1 198.133.219.102 198.133.219.103 Refer to the exhibit. Using the command ip route 192.168.1.0 255.255.255.0 10.1. 1.2 150, the network administrator configures a ne route. Which statement describes how the router will use the new route?

The new route will be ignored and will never be added to the routing table. The new route will be added to the routing table and will be the primary route t o the 192.168.1.0/24 network. The previously existing dynamic route will be replaced with the new static route . The new route will be displayed in the routing table if the dynamic routing info rmation for this route is lost. 23 Which route will be excluded from the updates that are sent to the neighbor r outers? R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1 R 192.168.2.0/24 [120/15] via 192.168.101.1, 00:00:12, FastEthernet0/0 R 192.168.3.0/24 [120/2] via 192.168.101.1, 00:00:12, FastEthernet0/0 R 192.168.4.0/24 [120/7] via 192.168.101.1, 00:00:12, FastEthernet0/0 24 Refer to the exhibit. How many routers have established OSPF adjacencies with R1 ? 2 4 5

7 25 Which Frame Relay component provides connection status information about PVCs in the network? CIR LMI DLCI FECN 26 Refer to the exhibit. R3 is announcing all displayed internal networks as a summ ary address to R4. Which summary address will be most specific? 172.16.0.0/21 172.16.4.0/21 172.16.0.0/22 172.16.4.0/22 Refer to the exhibit. What is the result of configuring the newly installed R1 w ith the exhibited command? It will set the gateway of last resort for R1. It will configure the IP address 10.1.1.2 on one interface of R1. It configures the router to forward traffic that is destined for the 192.168.1.1 28/26 network through the interface with IP address 10.1.1.2.

It configures a static route for all packets with the source network address 192 .168.1.128/26. It configures a static route for all packets with the source netw ork address 192.168.1.128/26. 28 Which routing protocol is unable to support discontiguous networks? RIPv1 RIPv2 EIGRP OSPF 29 Which EIGRP packet type is sent when DUAL places a route in the active state? acknowledgment hello query reply update 30 What is the difference between the passive and active route status as display ed in an EIGRP topology table? Routes that are passive are never updated. Routes that are active are used to forward data. Routes that are active are being recalculated by DUAL. Routes that are passive are waiting for the neighbor adjacency process to comple te. 31 Which function does the access layer provide in a hierarchical internetworkin g model? It provides a high-speed backbone layer between geographically dispersed network s. It provides hierarchical design between the core layer and the distribution laye r. It provides an entry point for hosts into the network. It provides data security and traffic management for the core layer. 32

Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trun k link that has been tested and is working properly. is VTP unable to propagate VLANs from one switch to the other? The revision number is different on both switches. Both switches are in server mode. The VTP domain name is different on both switches. The VTP pruning mode is disabled. 33 What is a feature of PAP authentication? It uses a three-way handshake with encryption. It sends the username/password pair across the link in clear text. It provides protection against playback attack through a variable challenge valu e. It designates the called device to control the frequency and timing of the authe ntication. 34

Refer to the exhibit. What information can be determined from the exhibited comm and? The command specifies how traffic will be routed to the 10.1.1.2 host. It will set the default route in the routing table. This route has an administrative distance of 1.

If a dynamic routing protocol with default parameters is configured on this rout er, this route will not be installed in the routing table. 35 What are two characteristics of EIGRP? (Choose two.) It supports a maximum hop count of 15. It sends small hello packets to maintain knowledge of its neighbors. It forwards complete routing tables in its updates to neighboring routers. It supports equal and unequal cost load balancing. It supports only one network layer protocol. 36 What are two reasons for assigning switch ports to different VLANs? (Choose t wo.) They increase network security. They facilitate VTP implementation. They decrease the size of the collision domain. They make more physical connections to the network possible. They logically group hosts according to their function. 37

Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access a ny of the servers located on the 192.168.0.0/23 net Given the network topology and OSPF configuration, what two problems exist in th is network? (Choose two.) There is a routing loop occurring between all three routers. There is a network statement missing. Network 172.30.20.0 has an incorrect wildcard mask. The OSPF area configuration is incorrect. /23 is an invalid subnet mask for the 192.168.0.0 network.

Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choose two.) Set the router ID of R2 to 10.0.0.1. Set the Loopback0 IP address of R3 to 192.168.1.253. Set the FastEthernet0/0 IP address of R1 to 192.168.1.1. Set the router ID of R1 to the highest IP address in the network. Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface. Set the OSPF priority to 255 on the R1 FastEthernet0/0 interface.

Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR, the routers are booted at the same time? (Choose two.) R1 will be the DR. R4 will be the DR. R5 will be the DR. R2 will be the BDR. R3 will be the BDR. R4 will be the BDR. Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routing table? (Choose two.) 1

2 3 4 5 6 41 Which three statements relate to PPP encapsulation and CHAP authentication? ( Choose three.) CHAP sends passwords in clear text. CHAP uses repeated challenges for verification. PPP encapsulation is configured in interface mode. CHAP uses a 2-way handshake to establish a link. PPP encapsulation is the default for serial interfaces on Cisco routers. CHAP uses a challenge/response that is based on the MD5 hash algorithm. 42 Refer to the exhibit. A network support technician has been asked to set an IP a ddress on one of the FastEthernet interfaces on a ne router. What is causing the interface to reject the address? The IP address is already in use. The technician is using a network address. The technician is using the wrong subnet mask for /26. The technician must enable VLSM on the interface. 43 Which two wildcard masks are required in an extended access list statement that blocks the traffic from host 172.16.1.2 to network 192.168.1.0/25? (Choose two.) 255.255.255.255 0.0.0.255

0.0.0.128 0.0.0.127 0.0.0.0 44 What are two benefits of using ACLs? (Choose two.) They provide IP filtering. They reduce the processing load on the router. They simplify the configuration of inter-VLAN routing. They prevent routing loops and facilitate convergence. They identify traffic for multiple uses such as QoS and NAT. 45 Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet? 192.168.1.65/27 192.168.1.32/27 192.168.1.63/27 192.168.1.61/27 46 Which two statements are true about untagged frames on a switch? (Choose two. ) An untagged frame cannot pass through access ports. An untagged frame cannot pass through trunk ports.

All frames that pass through trunk ports are untagged frames. Untagged frames minimize the delays that are associated with inspection of the V LAN ID tag. Untagged frames that are received on an 802.1Q trunk port are members of the nat ive VLAN.

Refer to the exhibit. A network engineer at the BRANCH1 office wishes to use net work summarization to announce the fewest netwo possible to the MAIN office. If the summaries include only the networks that are shown and no others, how many networks will be announced? 1 2 3 4 48 What are two features of a standard IP ACL? (Choose two.) It permits or denies access based on the entire protocol. It It It It filters the packet based on the source IP address only. uses identification numbers between 100 and 199. can filter traffic based on port number. can only filter inbound traffic on an interface.

49 An organization is planning to expand by adding five new branches. After the exp ansion, it will require secured, full-time, and simultaneous connectivity for its new branch offices with the central office. Th ere is only one port available on the central office router Which WAN technology can be used in this situation? PPP ISDN Frame Relay analog dialup 50 Refer to the exhibit. None of the hosts in network A are able to access the Inte rnet. How can this problem be resolved? Configure dynamic NAT instead of PAT. Configure the access list for the correct network. Include the ip nat pool command in the configuration. Configure the ip nat inside command on the correct interface. 51 Which statement describes a PVC? A PVC provides a permanent logical connection to forward data between two points . A PVC is dynamically established when a router requests a transmission. A PVC prevents small messages from being held up behind larger messages. A PVC requires call set-up information to be sent before transmitting any data. 52 What are three correct host addresses in the 172.16.0.0/17 network? (Choose t hree.)

172.16.0.255 172.16.16.16 172.16.127.127 172.16.128.1 172.17.1.1 172.18.1.1 Refer to the exhibit. What is the correct description of the highlighted address ? It is the address of the destination network. It is the routerID of the neighboring router. It is the next hop address of the feasible successor. It is the IP address of the serial0/0/0 interface of RouterC.

Refer to the exhibit. A network administrator must manually summarize all IP add resses on the POP router for the ISP. Which one is correct summary address? 192.168.0.0/22 192.168.0.0/23 192.168.0.0/24 192.168.0.0/25

Refer to the exhibit. R1 is configured for inter-VLAN communication as displayed . PC1 is able to ping PC2 but unable to ping PC3. W is the cause of this problem? PC3 and the FastEthernet0/0 interface of R1 are not on the same subnet. Fa0/1 is configured for access mode. Fa0/4 must be configured as a trunk. PC1 and the switch are not on the same subnet.

Refer to the exhibit. splayed commands? the session from host the session from host the session from host the session from host

Which Telnet session will be blocked as a result of the di A B B E to host B to hosts C and D to hosts E and F and host F to host A and host B

Refer to the exhibit. R1 and R2 are connected to each other through their serial 0/0/0 interfaces, but are unable to establish OSPF adjacency. What are two reasons for this? (Choose two.) The router IDs of the two routers do not match. The process IDs of the two routers do not match. The Hello and Dead timers of the routers do not match. The OSPF backbone area is configured on both routers. The serial interfaces of the two routers are in different subnets. 58 What are two advantages of using dynamic routing protocols in a network? (Cho ose two.) They adapt to topological changes. They are more secure than static routes. They eliminate the need for default routes. They have lower administrative distances than static routes. They enable routers to share information about the reachability and status of re mote networks.

Refer to the exhibit. What are two consequences of issuing the displayed command s? (Choose two.) The routing update information is protected against being falsified. The routing table of R2 will be secured. The key is encrypted with the MD5 hashing algorithm. OSPF routes will get priority over EIGRP routes going into the routing table. The overhead of OSPF information exchange will reduce.

You might also like