Sunday, November 23, 2008

CCNA Final Exam Answer Part 1

QUESTION 1 You are a technician at Cisco Highway. You tell your newly appointed Cisco Highway trainee that Ethernet networks are broadcast domains and collision domains. Your trainee wants to know what happens when a collision occurs on the network. What would your reply be? (Choose all that apply.)
A. Each device stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm. Answer: A, B, E
A. Each ( all ) devices stop transmitting for a short time.
B. A jamning signal is sent out to all devices that a collision has occurred.
E. The collision invokes a back-off algorithm
QUESTION 2 You are a technician at Cisco Highway. Cisco Highway plans to implement a public network. The company's ISP suggested that Cisco Highway register a Class IP address. The Cisco Highway CEO wants to know how many usable IP addresses are provided in a Class C address. What would your reply be?
A. 128
B. 192
C. 254
D. 256
E. 510 Answer: C Class C addresses range from 192.0.0.1 through 223.225.225.225 and default subnet mask of 255.255.255.0. In Class C addresses, the first 24 bits are used as for the network ID while only the last 8 bits is used for the host ID. Using the 2n-2 formula, we can calculate that Class C addresses can support a maximum of 16,777,214 (224- 2) networks and 254 (28-2) hosts. Reference: Cisco Highway 640-821 Study Guide version 1.1, Section 2.1.3 "IP Address Classes"; Cisco Highway 640-821 Study Guide version 1.1, Section 2.1.4 "CIDR Notation".
QUESTION 3 You are the network administrator at Cisco Highway. From your workstation you telnet to a router VTY line. You perform a number of configurations on the router. You now want to terminate the telnet connection. What command must you issue to terminate the Telnet connection?
A. close
B. disable
C. disconnect
D. suspend
E. exit Answer: C Explanation: Terminating a Telnet session Use the disconnect from the router you Telnetted from.
Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 398
QUESTION 4 You work as a network administrator at Cisco Highway. You are required to configure two routers named Cisco Highway1 and Cisco Highway2. The topology for the Cisco Highway network is shown in the following exhibit:
The enable password is "Cisco Highway". You are required to configure the following passwords on the Cisco Highway2 router:
Console password: Jack
Vty lines 0-4 password: king To configure the router click on a host icon that is connected to a router by a serial cable. Answer: Click on Host 4: Router Cisco Highway2: Cisco Highway2>enable Password:Cisco Highway Cisco Highway2#config terminal Cisco Highway2(config)#line console 0 Cisco Highway2(config-line)#login Cisco Highway2(config-line)#password Jack Cisco Highway2(config-line)#exit Cisco Highway2(config)#line vty 0 4 Cisco Highway2(config-line)#login Cisco Highway2(config-line)#password king Cisco Highway2(config-line)#exit Cisco Highway2(config)#exit Cisco Highway2#copy running-config startup-config Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 177
QUESTION 5 You work as a network administrator at Cisco Highway. You are required to configure two routers named Cisco Highway1 and Cisco Highway2. The network topology is shown in the exhibit. The routers have the following configuration specifications:
They are named Cisco Highway1 and Cisco Highway2
The password on both routers is "Cisco Highway".
They have the following IP addresses Cisco Highway1 E0: 10.0.239.155 Cisco Highway2 No IP address specifications. Your task is to configure the E0 interface on the Cisco Highway1 router. You should use the IP address 10.0.239.155 and the default subnet mask. To configure the router click on a host icon that is connected to a router. Answer: Router Cisco Highway1: Cisco Highway1>enable Password:Cisco Highway Cisco Highway1#config terminal Cisco Highway1(config)#int e 0 Cisco Highway1(config-if)#ip address 10.0.239.155 255.0.0.0 Cisco Highway1(config-if)#no shutdown Cisco Highway1(config-line)#exit Cisco Highway1(config)#exit Cisco Highway1#copy running-config startup-config Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 177
QUESTION 6 You are the network administrator at Cisco Highway.com. The internal Cisco Highway network is shown in the following exhibit:
With regard to the IP addressing information in the exhibit, which interface will Router B use to forward an IP datagram to a host with an IP address of 10.10.10.10?
A. S0
B. E0
C. E1
D. E2 Answer: B Explanation: IP address 10.10.10.10 is on the 10.10.10.0 network. This network is attached to the E0 interface on RouterB. This would thus be the path to an address on the 10.10.10.0 network.
QUESTION 7 Match the Layer 4 network service with the corresponding TCP port number by dragging the options on the left to the correct target on the right.
Answer:
Reference: Cisco Highway 640-821 Study Guide version 1.1, Appendix B, "Common TCP and UDP Ports Assignments".
QUESTION 8 With regard to Positive Acknowledgment and Retransmission (PAR), which of the following are true? (Choose all that apply.)
A. The source device will only retransmit lost packets on the request of the destination device.
B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.
C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.
D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.
E. If the destination device does not receive a segment, all segments are retransmitted.
F. The source device keeps a record of all segments sent and expects and acknowledgment of each. Answer: B, D, F Explanation: Answer B
The sender sets a re-transmission timer, awaiting acknowledgement, just in case the acknowledgement is lost, or in call all the transmitted segments are lost. Answer D
The client will reply with an acknowledgement that requests for the next sequence number. Answer F
The only way to know that it has sent the certain sequence number by keeping a record of it. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) page 156
QUESTION 9 Which of the following standards defines Wi-Fi?
A. IEEE 802.11a
B. IEEE 802.11b
C. IEEE 802.11g
D. IEEE 802.11i
E. IEEE 802.11 Answer: E Explanation: IEEE 802.11 was the original standard for wireless networks. However, the standard had a few ambiguities allowed for potential problems with compatibility between devices. To ensure compatibility, a group of companies formed the Wireless Ethernet Compatibility Alliance (WECA), which has come to be known as the IEEE 802.11 wireless network products that have passed the Wi-Fi Alliance certification tests. Reference: Cisco Highway 640-821 Study Guide version 1.1, Section 1.4.8 "Wireless Networks".
QUESTION 10 Which of the following statements are true? (Choose all that apply.)
A. The extended ping command is supported from user EXEC mode.
B. The extended ping command is supported from privileged EXEC mode.
C. With the extended ping command you can specify the port to be pinged.
D. With the extended ping command you can specify the timeout.
E. With the extended ping command you can specify the datagram size. Answer: B D E Explanation: The extended ping command works only at the privileged EXEC command line. Datagram size [100]: Size of the ping packet (in bytes). Default: 100 bytes. Timeout in seconds [2]: Timeout interval. Default: 2 (seconds). The ping is declared successful only if the ECHO

QUESTION 11 Study the Exhibit below carefully: What is the function of the Frame Relay DLCI with regard to Cisco HighwayA?
A. Defines the signaling standard between Cisco HighwayA and Cisco HighwayB,
B. Identifies the type of encapsulation in operation between Cisco HighwayA and Cisco HighwayB.
C. Identifies the circuit between Cisco HighwayB and the frame switch.
D. Defines the signaling standard between Cisco HighwayA and the frame switch. Answer: C Explanation: Cisco HighwayA sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and forwards the frame through the Frame Relay network until it reaches the switch connected to Cisco HighwayB. The Cisco HighwayB's local switch forwards the frame out of the access link to Cisco HighwayB. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 386
QUESTION 12 What could be the rationale behind using passive-interface command when configuring a router?
A. Allows interfaces to share common IP addresses.
B. Allows an interface to remain up without the aid of keepalives.
C. Allows a router to send routing and not receive updates via that interface.
D. Allows a routing protocol to forward updates that is missing its IP address.
E. Allows a router to receive routing updates on an interface but not send updates via that interface. Answer: E Explanation: The passive-interface command is used to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while allowing updates to be exchanged normally over other interfaces. With most routing protocols, the passive-interface command restricts outgoing advertisements only. However, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, resulting in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while allowing incoming routing updates to be learnt normally from the neighbor. Reference: http://www.cisco.com/en/US/tech/tk365/tk207/technologies_tech_note09186a0080093f0a.shtml
QUESTION 13 You are a network administrator at Cisco Highway. The Cisco Highway network is illustrated in the following exhibit. Study it carefully:
Cisco Highway is acquiring a new Class C IP network. Which of the following subnet masks will provide one useful subnet for each department while still making allowance for enough usable host addresses per department as specified in the graphic?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
F. 255.255.255.252 Answer: C Explanation: The network currently consists of 5 subnets. We need to subnet the Class C network into at least 5 subnets. This requires that we use 3 bits for the network address. Using the formula 2n-2 we get 6. This also leaves us with 5 bits for hosts, which gives us 30 hosts. Incorrect Answers:
A: Only 1 bit is required to give us 128 but 1 bit gives us 0 subnets.
B: 2 bits are required to give us 192 but 2 bits gives us only 2 subnets. This is too few.
D: 4 bits are required to give us 240. This gives us 14 subnets. However we are left with 4 bits for hosts leaving us with 14 host addresses. Two of the networks require more than 14 hosts so this will not do.
E: 5 bits are required to give us 248. This gives us 30 subnets. However we are left with 3 bits for hosts leaving us with 6 host addresses. All the networks require more than 6 hosts so this will not do.
F: 6 bits are required to give us 252. This gives us 62 subnets. However we are left with 2 bits for hosts leaving us with 2 host addresses. This is too few.
QUESTION 14 You are a network administrator at Cisco Highway. You need to troubleshoot the Cisco Highway network shown in the exhibit. Study the Exhibit carefully:
The host, CK1, is connected to the Cisco Highway1 LAN, but it cannot get access to resources on any of the other networks. The host's configuration is as follows: host address: .....192.168.166.45 subnet mask: ......255.255.255.240 default gateway: ..192.168.166.32 Then which of the following is the cause of the problem?
A. The default gateway is a network address.
B. The default gateway is on a different subnet address as the host.
C. The IP address of the host is on a different subnet.
D. The host subnet mask is incompatible to the subnet mask of the attached router interface. Answer: A Explanation: The range of the subnet used in this question is 192.168.166.32 to 192.168.166.47.192.168.166.32 is the network address and 192.168.166.47 is the broadcast address leaving a usable host address range of 192.168.166.33 to 192.168.166.46. The default gateway for the host should be 192.168.166.33. Incorrect Answers:
B: The default gateway is on the same network but it is a network address.
C: The host address is correct.
D: The subnet mask 255.255.255.240 uses 28 bits and is therefore correct.
QUESTION 15 What are the benefits of using a router to segment the network at a main office? (Select two options.)
A. Broadcasts are not forwarded across the router.
B. Broadcasts are eradicated.
C. Adding a router to the network decreases latency.
D. Filtering can occur based on Layer 3 information.
E. Routers are more efficient than switches. Answer: A, D Explanation Routers do not forward broadcast messages and therefore breaks up a broadcast domain. In addition, routers can be used to filter network information.
QUESTION 16 You are a network technician at Cisco Highway. Cisco Highway has a larger 172.12.0.0 network that you want to divide into subnets. You want each subnet to support 459 hosts. You also want to provide the maximum number of subnets. Which network mask should you use?
A. 255.255.0.0.
B. 255.255.128.0.
C. 255.255.224.0.
D. 255.255.254.0. Answer: D Explanation: To obtain 459 hosts the number of host bits will be 9. This can support a maximum of 510 hosts. To keep 9 bits for hosts means the last bit in the 3rd octet will be 0. This gives 255.255.254.0 as the subnet mask.
QUESTION 17 Your new junior Cisco Highway trainee, Rutger, has a problem with basic binary math. He must convert the binary number 10011101 into its decimal and hexadecimal equivalent. Which two numbers must Rutger provide? (Select two options)
A. 158
B. 0x9D
C. 156
D. 157
E. 0x19 F. 0x9F Answer: B D Explanation: 10011101 = 157 0x9D is ASCII Hexadecimal = 157 Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_command_reference_chapter09186a00800 7fc95.html
QUESTION 18 You are a network technician at Cisco Highway. The Cisco Highway network is illustrated in the following exhibit. Study it carefully: Note: SPIDs are not required for this switch. Which of the following command will you use to bring up the ISDN link? (Select three options.)
A. Router(config-if)# encapsulation ppp
B. Router(config)# dialer-list 1 protocol ip allow
C. Router(config)# isdn switch-type type
D. Router(config)# dialer map ip address name connection number
E. Router(config-if)# dialer-group 1
F. Router(config-if)# ip address subnet mask Answer: A E F Explanation:
Proper encapsulation to be defined on both routers.
IP address to be assigned for interface with subnet mask
Dialer group number enables dialer-list on this interface. Dialer-list to be defined on global configuration command. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 310+337
QUESTION 19 You are a network technician at Cisco Highway. You are troubleshooting a LAN connectivity problem. Which of the following router IOS commands could you use? (Select three options.)
A. show ip route
B. winipcfg
C. tracert
D. show interfaces
E. traceroute
F. ping Answer: A D F Explanation
A: The show ip route command displays the IP route table.
D: The show interfaces EXEC command to display statistics for all interfaces configured on the router or access server.
F: The ping command tests connectivity to a remote node.
QUESTION 20 Place the parameters in the correct sequence to configure dial-on-demand routing (DDR) on an ISDN BRI interface.
Answer: Place 1st - next hop address Place 2nd - Dialer-list Place 3rd - protocol Place 4th - Dialer-String Place 5th - group Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 342

QUESTION 21 Which of the following commands will you use to display the configuration register setting on a router?
A. show boot
B. show flash
C. show register
D. show version
E. show config Answer: D Explanation: show version To display the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images, use the show version command in EXEC mode. Examples The following is sample output from the show version command: Router1> show version Cisco Internet work Operating System Software IOS (tm) 7200 Software (C7200-J-M), Experimental Version 11.3(19970915:164752) [ hampton-nitro-baseline 249] Copyright (c) 1986-1997 by cisco Systems, Inc. Compiled Wed 08-Oct-97 06:39 by hampton Image text-base: 0x60008900, data-base: 0x60B98000
ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE BOOTFLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fc1) Router1 uptime is 23 hours, 33 minutes System restarted by abort at PC 0x6022322C at 10:50:55 PDT Tue Oct 21 1997 System image file is "tftp://171.69.1.129/hampton/nitro/c7200-j-mz" cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory. R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache) Last reset from power-on Bridging software.
X.25 software, Version 3.0.0. SuperLAT software copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 8 Ethernet/IEEE 802.3 interface(s) 2 FastEthernet/IEEE 802.3 interface(s) 4 Token Ring/IEEE 802.5 interface(s) 4 Serial network interface(s) 1 FDDI network interface(s) 125K bytes of non-volatile configuration memory. 1024K bytes of packet SRAM memory. 20480K bytes of Flash PCMCIA card at slot 0 (Sector size 128K). 20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K). 4096K bytes of Flash internal SIMM (Sector size 256K). Configuration register is 0x0 Reference: http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/fun_r/cfr_1g10.htm#1033030
QUESTION 22 You are a network administrator at Cisco Highway. You must configure a new subnetwork at the Cisco Highway branch office in Berlin. You have been provided with the subnet mask of 255.255.255.224. You want to assign IP addresses to hosts on the subnet. Which of the following IP addresses would you use? (Choose all that apply.)
A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192 Answer: C, D, E Explanation:
C: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)
D: Valid Host in subnetwork 1 (134.178.18.32 to 134.178.18.63)
E: Valid Host in subnetwork 2 (192.168.16.64 to 192.168.16.95)
QUESTION 23 You are a network technician at Cisco Highway. You need to configure Frame Relay on a Cisco router. What is the default LMI (Local Management Interface) frame type transmitted by the Cisco router on a Frame Relay circuit?
A. IETF
B. B8ZS
C. ANSI
D. Cisco
E. Q933a Answer: D Explanation: Name Document IOS LMI-Type Parameter
Cisco Proprietary cisco
ANSI T1.617 Annex D ansi
ITU Q.933. Annex A q.933a Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 382
QUESTION 24 You are a network technician at Cisco Highway. You have subnetted the 210.106.14.0 network with a /24 mask. Your supervisor asks you how many usable subnetworks and usable host addresses per subnet this would make provision for. What would your response be?
A. 1 network with 254 hosts
B. 4 networks with 128 hosts
C. 2 networks with 24 hosts
D. 6 networks with 64 hosts
E. 8 networks with 36 hosts Answer: A Explanation: A subnet with 24 bits on would be 255.255.255.0. This subnet has only 1 network and 254 hosts.
QUESTION 25 You are a network technician at Cisco Highway. Due to rapid expansion, Cisco Highway is leaning towards scalable WAN technology. Immediate plans for the company include an additional 7 regional offices with all sites requiring continuous connectivity, but the current head office has no free ports available. Which of the following WAN technologies will meet the requirements?
A. Frame Relay
B. Broadband cable
C. ISDN-BRI
D. ADSL
E. Dedicated PPP/HDLC links
F. ISDN Answer: A
QUESTION 26 You are a network technician at Cisco Highway. You apply the access list illustrated below to interface E0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any What are the consequences of this specific access list?
A. All traffic will be allowed to exit E0 except FTP traffic.
B. FTP traffic from 192.168.166.19 to any host will be denied.
C. FTP traffic from 192.168.166.22 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.168.166.18/29 from any host will be denied. Answer: D Explanation: By default access list is having implicit deny statement at the end. In this example there is no permit statement, so it will deny all traffic exiting E0 Interface. Incorrect answers
A: It will deny FTP and Telnet Traffic B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit statement at the end.
QUESTION 27 What are the characteristic of link state routing protocols? (Choose all that apply.)
A. The exchange of advertisement is triggered by a change in the network.
B. All routers exchange routing tables with each other in a multipoint network.
C. Packets are routed based upon the shortest path to the destination.
D. Paths are chosen depending on the cost efficiency factor.
E. Every router in an OSPF area is capable of representing the entire network topology.
F. Only the designated router in an OSPF area can represent the entire network topology. Answer: A C E Explanation: Open Shortest Path First
Each router discovers its neighbors on each interface. The list of neighbors is kept in a neighbor table.
Each router uses a reliable protocol to exchange topology information with its neighbors.
Each router places the learned topology information into its topology database.
Each router runs the SPF algorithm against its own topology database.
Each router runs the SPF algorithm against its own topology database to calculate the best routes to each subnet in the database.
Each router places the best roué to each subnet into the IP routing table. The following list points out some of the key features of OSPF:
Converges very quickly - from the point of recognizing a failure, it often can converge in less than 10 seconds.
Supports VLSM.
Uses short Hello messages on a short regular interval, with the absence of hello messages indicating that a neighbor is no longer reachable.
Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding, however, does not happened all at once, so the overhead s minimal.
Uses cost for the metric. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 417
QUESTION 28 You use multiple access lists when configuring it on an interface of a Cisco router. Which of the following statements are valid?
A. Application of up to three access lists per protocol to a single interface.
B. No more than two access lists per interface.
C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.
D. The maximum number allowed varies due to RAM availability in the router.
E. An infinite number of access lists that can be applied to an interface, from most specific to most general.
F. Cisco IOS allows only one access list to an interface. Answer: C
QUESTION 29 Which of the following are typical Layer 2 encapsulations for a WAN link? (Choose all that apply.)
A. Ethernet
B. PPP
C. Token Ring
D. HDLC
E. Frame Relay
F. POTS Answer: B, D E Explanation: WAN data-link protocols used on point-to-point serial links provide the basic function of data delivery across that one link. The two most popular WAN data-link protocols are High-Level Data Link Control (HDLC) and PPP. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page
QUESTION 30 You are a network technician at Cisco Highway. Cisco Highway has its head office in Mumbai and a branch office in Delhi. You want to establish connectivity between head office and the branch office. You intend using two data link layer encapsulation, one for data and one for signaling. What type of WAN service allows two data layer encapsulations of this nature?
A. ISDN
B. ATM
C. FDDI
D. ATX
E. Frame Relay Answer: A Explanation: ISDN Q.931 messages are used for signaling. ISDN B channels are used to transport data. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 327
QUESTION 31 You are a network technician at Cisco Highway. You use a Cisco router to divide the Cisco Highway network into two separate segments, Cisco Highway1 and Cisco Highway2. The Cisco Highway CEO is concerned about the cost, and wants to know what the purpose of your action is. What should you tell him?
A. It decreases the number of broadcast domains.
B. It makes broadcasting domains more efficient between segments.
C. It increases the number of collisions.
D. It prevents segment 1's broadcasts from getting to segment 2.
E. It connects segment 1's broadcasts to segment 2. Answer: D Explanation A router does not forward broadcast traffic. It therefore breaks up a broadcast domain, reducing unnecessary network traffic.
QUESTION 32 You are a network technician at Cisco Highway. A newly appointed trainee wants to know what the basics of distance vector and link state routing protocols are. What would your reply be? (Choose all that apply.)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Distance vector protocols are responsible for sending updates to all networks listed in the routing table.
C. Link state protocols are responsible for sending the entire routing table to the whole network.
D. Link state protocols send updates regarding their own links status to all other routers on the network. Answer: A D Explanation: Distance Vector Protocols: Distance Vector Protocols advertise routing information by sending messages, called routing updates, out the interfaces on a router. These updates contain a series of entries, with each entry representing a subnet and a metric. Link-State Protocols: Sends partial updates when link status changes and floods full updates every 30 minutes. The flooding, however, does not happen all at once, so the overhead is minimal. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 413 + 419
QUESTION 33 Which of the following statements is true regarding the split horizon rule?
A. Distance vector protocols need fall back routes that are responsible for momentary loops.
B. Networks can only remain fully operational provided all information is sent out all active interfaces.
C. Each AS must keep routing tables converged to avoid dead routes from being advertised.
D. Information about a route should not be sent back in the direction from which the original update came.
E. Only routers can split boundaries (horizons) between concentric networks. Answer: D Explanation: Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated. Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1826/products_configuration_guide_chapter09186a00800 877c6.php
QUESTION 34 You are a network technician at Cisco Highway. A newly appointed trainee wants to know what the differences and similarities between bridges and switches are. What would your reply be? (Choose all that apply.)
A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain. Answer: B C Explanation: Bridges build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 239 http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a00801 86a3e.php
QUESTION 35 You are a network technician at Cisco Highway. You are working with a 2500 series Cisco router. You are performing the password recovery procedure. You have just typed the following command: o/r 0x2142 Your newly appointed trainee is curious about why this command is used. What should you tell him?
A. It is used to restart the router.
B. It is used to bypass the configuration in NVRAM.
C. It is used to enter ROM Monitor mode.
D. It is used to view the lost password.
E. It is used to save the changes to the configuration. Answer: B Explanation: The o/r 0x2142 command changes the value of config-register to 2142, so that the Router ignores the NVRAM contents when it boots. Reference: http://www.cisco.com/en/US/products/hw/routers/ps233/products_password_recovery09186a0080094795.shtml
QUESTION 36 You are a network technician at Cisco Highway. You have told a newly appointed trainee that the OSI model has 7 layers and that the Application layer is the highest layer. The trainee is curious as to which protocols operate at the application layer. What should you tell him? (Choose all that apply.)
A. TCP
B. Telnet
C. FTP
D. ARP
E. IP Answer: B C Explanation: Layer Name Examples
Application (layer 7) Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 34
QUESTION 37 You are a network technician at Cisco Highway. Cisco Highway has its head office in Berlin and a branch office in Bonn. You are troubleshooting the WAN link between head office and the branch office. You replace a Cisco router that was providing Frame Relay connectivity at the Bonn site with a frame relay router from a different vendor. However, connectivity broke down between the two offices. What is the most likely cause of the problem?
A. Mismatched LMI types.
B. Incompatible encapsulation types.
C. Mismatching IP addresses.
D. Incorrect DLCI. Answer: A Explanation: Three LMI protocol options are available in Cisco IOS software: Cisco, ITU, and ANSI. Each LMI option is slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each end of an access link use the same LMI standard, LMI works fine. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 381
QUESTION 38 You are a network administrator at Cisco Highway. You need to configure five new routes urgently for testing purposes. While connected to a router by console, you copy and past a configuration from a text file into the HyperTerminal window. Part of the text file is shown in the following exhibit: As a result of this procedure, host 192.168.10.10/29 would not be able to ping the Ethernet interface of the router. Why?
A. The new configuration must be saved to the NVRAM before the changes can be effected.
B. The subnet mask on the router results is miscommunication.
C. The Ethernet network does not feature in the routing table due to incomplete RIP configuration.
D. The copied configuration did not overwrite the shutdown command on the Ethernet interface.
E. The router needs to be rebooted before the changes are effected. Answer: D Explanation: Default configuration of any interface is always shutdown and always needs the command "no shutdown" in the interface command mode in order to enable the interface. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 379
QUESTION 39 You are a network administrator at Cisco Highway. The Cisco Highway network has three remote networks are accessed through serial 0/0 interface on the Cisco Highway1 router. The remote networks are: 172.16.10.0, 172.16.20.0, and 172.16.30.0. However, users cannot access 172.16.20.0. You are troubleshooting the problem. You issue the debug ip rip and show ip route commands. The output form the command is shown in the following exhibit: Cisco Highway1# debug ip rip ld00h: RIP:received vl update from 172.16.100.2 on Serial0/0 ld00h: 172.16.10.0 in 1 hops ld00h: 172.16.20.0 in 1 hops ld00h: 172.16.30.0 in 1 hops Cisco Highway1# show ip route Gateway of last resort is not set 172.16.0.0/24 is subnetted, 8 subnets C 172.16.150.0 is directly connected, FastEthernet0/0 C 172.16.220.0 is directly connected, Loopback2 C 172.16.210.0 is directly connected, Loopback1 C 172.16.200.0 is directly connected, Loopback0 R 172.16.30.0 [120/1] via 172.16.100.2, 00:00:07, Serial0/0 S 172.16.20.0 [1/0] via 172.16.150.15 R 172.16.10.0 [120/1] via 172.16.100.2, 00:00:07, Serial0/0 C 172.16.100.0 is directly connected, Serial0/0 What is the most likely cause of the problem?
A. 172.16.20.0 is not located in Cisco Highway1's routing table.
B. There is no gateway of last resort on Cisco Highway1.
C. The static route for 172.16.20.0 is incorrect.
D. The Cisco Highway1 router is not receiving 172.16.20.0 updates. Answer: C Explanation The static route of 172.16.20.0 is incorrect. The show ip route shows that the network is connected via 172.16.150.15 instead of 172.16.100.2.
QUESTION 40 You have subnetted the 213.105.72.0 network with a /28 mask. How many usable subnetworks and usable host addresses per subnet will be provided?
A. 2 networks with 62 hosts
B. 6 networks with 30 hosts
C. 16 networks and 16 hosts
D. 62 networks and 2 hosts
E. 14 networks and 14 hosts Answer: E Explanation A subnet with a 28 bit mask requires 4 bits for the network address, leaving 4 bits for host addresses. Using the 2^n - 2 formula (2^4 - 2 in this case) we have 14 host addresses and 14 network addresses.

QUESTION 41 You are a network technician at Cisco Highway, Inc. You are currently troubleshooting a Cisco router. You issue the show ip route command. The output from the command is displayed in the following exhibit: Cisco Highway1#show ip route Codes: C - connected, S - static, I - IGRP, R- RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inner areaE1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - Candidate defaultU - per-user static route
Gateway of last resort is not set R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 C 192.168.9.0/24 is directly connected, Serial1 R 192.168.10.0/24 [120/7] via 192.168.9.1, 00:00:02, Serial1 R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1 C 192.168.1.0/24 is directly connected, Ethernet0 C 192.168.2.0/24 is directly connected, Serial0 R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 R 192.168.4.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.6.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.7.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 Which route will not be entered into the routing table of a neighboring router?
A. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
B. C 192.168.1.0/24 is directly connected, Ethernet0
C. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 Answer: D Explanation: RIP has the maximum hop count of 15. This route already has a hop count of 15 and adding one would make it unreachable (see below). This route will be discarded. R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0
QUESTION 42 You are a network technician at Cisco Highway, Inc. You have subnetted the 201.105.13.0 network with a /26 mask. How many usable subnetworks and usable host addresses per subnet will be provided?
A. 4 networks with 64 hosts
B. 64 networks and 4 hosts
C. 2 networks and 62 hosts
D. 62 networks and 2 hosts
E. 6 network and 30 hosts Answer: C Explanation A subnet with a 26 bit mask requires 2 bits for the network address, leaving 6 bits for host addresses. Using the 2^n - 2 formula (2^2 - 2 for the network and 2^6 - 2 for hosts) we have 2 network addresses and 62 host addresses.
QUESTION 43 You are a network technician at Cisco Highway, Inc. Your Cisco Highway trainee is studying the spanning tree algorithm and wants to know what the default mechanism for determining the spanning-tree path cost is. What would your reply be?
A. Statically determined by the administrator.
B. Sum of the costs based on bandwidth.
C. Total hop count.
D. Sum of the cost based on latency. Answer: B Explanation The metrics of STP is determined by bandwidth.
QUESTION 44 You are a trainee technician at Cisco Highway, Inc. You need to display your knowledge of the Spanning-Tree algorithm. Connect the Spanning-Tree Protocol states with the correct functions. (Not all options are used.)
Answer:
Explanation:
Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward traffic or learn MAC addresses on the interface.
Learning -learns MAC addresses and builds a filter table but does not forward frames.
Forwarding - Sends and receives all data on the bridged port.
Blocking - are used to prevent network loops. Reference: CCNA Study guide Second Edition (Sybex, Todd Lammle) page 82
QUESTION 45 You are a network technician at Cisco Highway, Inc. You are required to establish a Telnet session with a cisco router. Which of the following commands should you use?
A. Cisco Highway1(config)# line console 0 Cisco Highway1(config-if)# enable password Cisco Highway
B. Cisco Highway1(config)# line vty 0 Cisco Highway1(config-line)# enable password Cisco Highway
C. Cisco Highway1(config)# line vty 0 Cisco Highway1(config-line)# enable secret Cisco Highway Cisco Highway1(config-line)# login
D. Cisco Highway1(config)# line console 0 Cisco Highway1(config-line)# enable secret Cisco Highway Cisco Highway1(config-line)# login
E. Cisco Highway1(config)# line console 0 Cisco Highway1(config-line)# password Cisco Highway Cisco Highway1(config-line)# login
F. Cisco Highway1(config)# line vty 0 Cisco Highway1(config-line)# password Cisco Highway Cisco Highway1(config-line)# login Answer: F Explanation: Access from Password Type Configuration Telnet vty password line vty 0 4 login password cisco Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 177
QUESTION 46 You are a network technician at Cisco Highway, Inc. Cisco Highway has recently opened a third office in a foreign country and bought a router to connect this office to the other two already on the network. The names of the routers are Cisco Highway1, Cisco Highway2, and Cisco Highway3. Configure the Cisco Highway3's router's IP addresses on the E0 and S1 interfaces so that the E0 interface receives the first usable subnet while the S1 interface receives the second usable subnet from the network 192.168.101.0/28. Both interfaces should receive the first available IP of the subnet. The zero subnet should not be used. The routers have been configured with the following specifications. The routers are named Cisco Highway1, Cisco Highway2, and Cisco Highway3. RIP is the routing protocol. Clocking is provided on the serial 0 interfaces The secret password on the Cisco Highway3 router is "Cisco Highway" The subnet mask of all networks other than 192.168.101.0 is the default mask. The IP addresses are listed in the chart below. Cisco Highway1 E0 192.168.93.1 S0 192.168.95.1 Cisco Highway2 E0: 192.168.97.1 S0: 192.168.101.42 S1: 192.168.95.2 Cisco Highway3 E0 to be determined S1 to be determined Secret password: Cisco Highway Click on the host icon that is connect to a router by a serial console cable to configure the router. Answer: Cisco Highway3> enable Password: Cisco Highway Cisco Highway3 # config terminal Cisco Highway3 (config) # interface ethernet 0 (Shorthand: int e 0) Cisco Highway3 (config-if) # ip address 192.168.101.17 255.255.255.240 Cisco Highway3 (config-if) # no shutdown Cisco Highway3 (config-if) # exit Cisco Highway3 (config-) # interface serial 1 (Shorthand: int s 1) Cisco Highway3 (config-if) # ip address 192.168.101.33 255.255.255.240 Cisco Highway3 (config-if) # no shutdown Cisco Highway3 (config-if) # CTRL+Z Cisco Highway3 # copy running-config startup-config Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 165 CCNA Self-Study CCNA INTRO exam certification Guide (Cisco press, ISBN 1-58720-094-5) Page 486
QUESTION 47 You are a network technician at Cisco Highway, Inc. You are planning a network installation for the company. The design requires 100 separate subnetworks, resulting in the acquisition of a Class B network address. Which of the following subnet masks will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?
A. 255.255.0.0
B. 255.255.224.0
C. 255.255.254.0
D. 255.255.255.0
E. 255.255.255.224
F. 255.255.255.254 Answer: C Explanation: We need a 9-bit subnet mask to provide 500 usable host addresses.
QUESTION 48 What is the function of access control lists (ACLs)? (Choose all that apply.)
A. Monitor the number of bytes and packets.
B. Assume role off virus detector.
C. Identify interesting traffic for DDR.
D. IP route filtering.
E. Provide high network availability.
F. Classify and organizing network traffic. Answer: C, D, E Explanation: IP access control lists (ACLs) cause a router to discard some packets based on criteria defined by the network engineer. The goal of these filters is to prevent unwanted traffic in the network - whether to prevent hackers from penetrating the network or just to prevent employees from using systems they should not be using. IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service features. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 427
QUESTION 49 What could you use to prevent rooting loops in the network when configuring the network using a distance vector routing protocol? (Choose all that apply.)
A. Spanning Tree Protocol
B. Shortest path first tree
C. Link-state advertisements (LSA)
D. Hold-down timers
E. Split horizon
F. VRP Answer: D E Explanation:
Split horizon - the routing protocol advertises routes out an interface only if they were not learned from updates entering that interface.
Hold-down timer - After finding out that a router to a subnet has failed, a router waits a certain period of time before believing any other routing information about that subnet. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Cisco press, ISBN 1-58720-083-X) Page 154 QUESTION 50 All routers are running RIP. Which of the following statements describe how the routers exchange their routing tables? (Choose all that apply.)
A. Cisco Highway4 exchanges with Cisco Highway3.
B. Cisco Highway4 exchanges with Cisco Highway2.
C. Cisco Highway4 exchanges with Cisco Highway1.
D. Cisco Highway1 exchanges with Cisco Highway3.
E. Cisco Highway1 exchanges with Cisco Highway2.
F. Cisco Highway1 exchanges with Cisco Highway4. Answer: A, D Explanation RIP exchanges routing tables with their adjacent neighbors

Saturday, October 25, 2008

Final-BCMSN_v5

CCNP: Building Multilayer Switched Networks Final



1

Principio del formulario





Refer to the exhibit. Based on the outputs displayed, what will happen when Switch2 joins the VTP domain?

Switch2 will negotiate to become the VTP server.

Switch1 will learn all VLAN information from Switch2 because Switch2 is the VTP client.

Switch2 will learn all VLAN information from Switch1 because Switch1 is the VTP server.

Switch1 will overwrite the Switch2 VLAN database.

Switch2 will overwrite the Switch1 VLAN database.

Final del formulario

2

Principio del formulario

Which two requirements should be considered when implementing VLANs in the large campus environment?(Choose two.)

STP implementation

Layer 3 device placement

flat network topology design

single broadcast domain design

Final del formulario

3

Principio del formulario





Refer to the exhibit. Which statement is true, given the output generated by the show interfaces fastethernet 0/1 switchport command?

Interface Fa0/1 is configured for ISL trunking.

Interface Fa0/1 is configured as an access port.

Interface Fa0/1 is configured as an SVI.

Interface Fa0/1 is configured for 802.1Q trunking.

Final del formulario

4

Principio del formulario

A switch is configured as a VTP client and then connected to the rest of the network. The instant the trunk link is brought up to the rest of the network, the whole network goes down. What could have happened?

The switch was inserted into the network using an incorrect VTP domain name.

The switch should have been placed into VTP Transparent Mode prior to being inserted into the network.

The switch should have been placed into VTP Server Mode in order to correctly propagate the new VLAN information.

The configuration revision number of the inserted switch was higher than the configuration revision of the VTP domain.

The configuration revision number of the inserted switch was lower than the configuration revision of the VTP domain.

Final del formulario

5

Principio del formulario

What are two responsibilities of the standby router in an HSRP group? (Choose two.)

to quickly assume packet-forwarding responsibility if the active router becomes inoperable.

to respond to traffic for the virtual router.

to reply with the virtual router MAC address in the event an SRP request is received.

to monitor the operational status of the HSRP group.

Final del formulario

6

Principio del formulario

Which of the following agencies tests and certifies the interoperability of wireless equipment with the IEEE 802.11a, 802.11b, and 802.11g standards?

FCC

ANSI

WiFi

IEEE

ETSI

ISO

Final del formulario

7

Principio del formulario





Refer to the exhibit. A network administrator is reviewing a customer trouble ticket containing the output displayed in the exhibit.
What command would generate this output?

show arp | include port security

show mac-address-table | include port security

show privilege | include port security

show dot1x interface

show port-security interface

show class-map | include security

Final del formulario

8

Principio del formulario





Refer to the exhibit and the partial configuration taken on router RTA. Users on VLAN 5 cannot communicate with the users on VLAN 10.
What should be done to fix the problem?

Dynamic routing protocol should be configured on the router.

Two static routes should be configured on the router pointing to each subnet.

The subinterfaces of both routers should be configured with ISL encapsulation.

The subinterfaces of both routers should be configured with 802.1Q encapsulation.

Fa0/0 interface should be configured with a primary IP address of 10.10.5.1/24 and a secondary IP address of 10.10.10.1/24.

Final del formulario

9

Principio del formulario

Which two statements are true regarding the operation of RSTP? (Choose two.)

An alternate port assumes a forwarding state in a stable, active topology.

An alternate port is a switch port that offers another path toward the root bridge.

An edge port only connects to another RSTP switch.

A switch port participating in the RSTP topology can be defined as a root port, designated port, alternate port, backup port, or disabled port.

A switch port participating in the RSTP topology can be in the blocking, listening, learning, or forwarding state.

Final del formulario

10

Principio del formulario

Which statement is true about UDLD?

It is automatically enabled.

It allows devices to transmit traffic one way.

It allows a switch to detect a unidirectional link and shut down the affected interface.

It will disable an EtherChannel bundle if one link has failed.

Final del formulario

11

Principio del formulario

What is used to separate WLANs logically and is also used as a name for a wireless cell?

BSS

IBSS

SSID

VLAN

VLAN ID

WVLAN ID

Final del formulario

12

Principio del formulario

Which protocol should an administrator recommend to manage bridged links when the customer requires a fully redundant network that can utilize load balancing technologies and reconverge on link failures in less than a second?

IEEE 802.1Q (CST)

IEEE 802.1s (MST)

Cisco PVST+

IEEE 802.1D(STP)

Final del formulario

13

Principio del formulario

Which protocol defines a single instance of spanning tree for all VLANs and transmits BPDUs over VLAN 1?

IEEE 802.1w (RSTP)

IEEE 802.1Q (CST)

Cisco PVST+

IEEE 802.1D (STP)

Final del formulario

14

Principio del formulario





Refer to the exhibit. Switch2 is not receiving updated VLAN information from Switch1.
What is the problem?

The VTP domains are different.

The VTP modes are different.

The VTP passwords are different.

Switch2 is in server mode.

Switch2 is in client mode.

Switch2 is in transparent mode.

Final del formulario

15

Principio del formulario

Which protocol is a Cisco-proprietary STP mode that allows CST and PVST to exist on the same network?

IEEE 802.1w (RSTP)

IEEE 802.1Q (CST)

Cisco PVST+

IEEE 802.1D (STP)

Final del formulario

Principio del formulario

Which two statements describe Cisco best practices for VLAN design? (Choose two.)

Local VLANs should extend no further than the local core router.

Local VLANs should extend no further than the local distribution-layer switch.

Local VLANs eliminate the need for redundant access to distribution-layer links.

Local VLANs provide a simpler design that is easier to troubleshoot.

Final del formulario

17

Principio del formulario

Which three statements regarding RSTP are true? (Choose three.)

An RSTP BPDU carries information about port roles and is sent to neighbor switches only.

RSTP elects a root bridge in exactly the same way as 802.1D.

RSTP is capable of reverting back to 802.1D while still maintaining the benefits of 802.1w.

RSTP is recognized as the IEEE 802.1w standard.

There are only three RSTP port states: discarding, listening, and forwarding.

UplinkFast and BackboneFast are compatible with RSTP.

Final del formulario

18

Principio del formulario

Which statement is true about the configuration of voice VLANs?

Static secure MAC addresses can be configured in conjunction with voice VLANs.

PortFast is automatically enabled when voice VLANs are configured.

PortFast must be manually configured when voice VLANs are configured.

Voice VLANs are typically configured on uplink ports.

Final del formulario

19

Principio del formulario

Which two STP features will protect the network against forwarding loops? (Choose two.)

PortFast

UplinkFast

BackboneFast

Loop Guard

Unidirectional Link Detection (UDLD)

Final del formulario

20

Principio del formulario

What three fields are included in a BPDU? (Choose three.)

bridge ID

STP ID

port ID

VLAN ID

cost of path

Final del formulario

21

Principio del formulario

Which two items are recommended when mapping VLANs in an Enterprise Composite Model? (Choose two.)

Associate a VLAN to each building.

Associate a VLAN to each department.

Associate a VLAN to each subnet.

Configure routing between VLANs at the access layer.

Configure routing between VLANs at the distribution layer.

Configure routing between VLANs at the core layer.

Final del formulario

22

Principio del formulario





In the figure above, users connected to Switch D have reported symptoms of high latency and poor throughput when connecting to Server A. The network administrator's Layer 2 mapping tool reveals that traffic from Switch D to Server A uses a suboptimal path through Switch C. What may be causing this suboptimal path to be chosen?

Switch B is configured as the STP root.

Switch C is configured as the STP root.

Switch D is configured as the STP root.

UDLD on Switch D has detected a unidirectional link to Switch A.

UDLD on Switch D has detected a unidirectional link to Switch C.

Final del formulario

23

Principio del formulario

On a switch that has STP enabled, which command can be used to detect a unidirectional link before a forwarding loop is created?

spanning-tree portfast on both sides of the link

spanning-tree rootguard on both sides of the link

udld enable on both sides of the link

port protected on both sides of the link

Final del formulario

24

Principio del formulario

Which two statements are true about the RSTP negotiations between switches? (Choose two.)

UplinkFast must be configured on all designated switches.

BackboneFast must be configured on all root switches.

Switches must be connected by a point-to-point link.

All ports that are directly connected to end stations must be enabled as designated ports.

All ports connected to end stations must be configured as edge ports.

Final del formulario

25

Principio del formulario





Refer to the exhibit. What statement is true concerning the output of the show standby command?

The current priority of this router is 120.

The router is currently forwarding packets.

This router is tracking two properly operating interfaces.

This router is in the HSRP down state because its tracked interfaces are down.

Final del formulario

26

Principio del formulario

An EtherChannel is configured between SW_A and SW_B. The network administrator received a console message reporting that the ports on SW_B are rapidly learning MAC addresses. What could be the problem?

There is underlying network problems such as STP loop and route flapping.

There is unusually high backplane utilization because of the large number of forwarded frames.

The EtherChannel on SW_A should be configured in a separate VLAN to stop the broadcast traffic.

The ports on the EtherChannel on SW_A are not bundled together.

The EtherChannel on SW_A has encountered a duplex mismatch problem.

Final del formulario

27

Principio del formulario

What are three benefits of end-to-end VLANs? (Choose three.)

Traffic from a given VLAN can be assigned a higher or lower priority throughout a Campus.

Layer-2 failures are isolated to a small subset of users.

VLAN membership remains the same as the user moves throughout a Campus.

Problem isolation and resolution are expedited within the switch block.

Traffic can traverse multiple switches without being routed.

High availability results from a deterministic traffic flow and a finite failure domain.

Final del formulario

28

Principio del formulario





Refer to the exhibit. Switch A is the root switch. The port on Switch A that connects to Switch B is half duplex. The port on Switch B that connects to Switch A is full duplex. What are three problems that this scenario could create? (Choose three.)

Switch A is performing carrier sense and collision detection, while Switch B is not.

Autonegotiation results in both Switch A and Switch B failing to perform carrier sense.

Switch B will become the root switch.

BPDUs may not successfully negotiate the link between Switch A and Switch B.

Switch B may unblock its port to Switch C, thereby creating a loop.

Spanning-tree will keep re-calculating, consuming all the CPU normally used for traffic.

Final del formulario

29

Principio del formulario

Which two statements about designing an STP topology are true? (Choose two.)

The physical topology can be misleading. Therefore, the traceroute command should be used to reveal the Layer 2 topology.

Assuming that all switches have the same default priority value, the STP root will be the switch with the highest MAC address.

Assuming that all switches have the same default priority value, the STP root will be the switch with the lowest MAC address.

Switches that provide access ports for server farms or the Internet gateway should be configured with the lowest bridge priority numerical value.

Switches that provide access ports for server farms or the Internet gateway should be configured with the highest bridge priority numerical value.

Switches that provide access ports for server farms or the Internet gateway should be configured with a bridge priority numerical value of 32768.

Final del formulario

30

Principio del formulario





Refer to the exhibit. Which command can be used to identify the nine adjacencies referred to in the exhibit?

show ip cef *

show adjacency detail

show mls entry cef ip

show arp

Final del formulario

31

Principio del formulario





Refer to the exhibit. The network administrator noticed this console message coming from switch SW_C:



UDLD-3-DISABLE: Unidirectional link detected on port 3/8.
Port disabled



What could cause this message?

The UDLD protocol placed port 3/8 on SW_C in a listening state.

The UDLD protocol shut down port 3/8 on SW_C to prevent a forwarding loop.

STP placed port 3/8 on SW_C in a blocking state.

STP shut down port 3/8 on SW_C to prevent a forwarding loop.

Final del formulario

32

Principio del formulario





Refer to the exhibit. Switch SW_A is the root switch. Switch SW_B is the designated switch for the SW_B to SW_C link. Because of unidirectional link failure on the link between SW_B and SW_C, SW_C is not receiving BPDUs from SW_B. What symptoms would be associated with the failure of the link?

The connectivity will be reestablished through the redundant link.

A console message will report MAC address learning activity on the blocking port.

The STP blocking port on SW_C will be automatically placed into an ErrDisable state.

The STP blocking port on SW_C will transition to the forwarding state.

The STP blocking port on SW_C will remain in blocking state.

Final del formulario

33

Principio del formulario

Which IP address, username, and password must be used when initially configuring a Cisco 4400 Series WLAN controller using a Web browser?

192.168.1.1/24, Username: admin, Password: (none)

192.168.1.1/24, Username: admin, Password: admin (esta es la respuesta correcta)

192.168.1.1/24, Username: Cisco, Password: cisco (esta es la respuesta que aparece en cisco como correcta.)

192.168.2.1/24, Username: admin, Password: (none)

192.168.2.1/24, Username: admin, Password: admin

192.168.2.1/24, Username: Cisco, Password: cisco

Final del formulario

34

Principio del formulario





Refer to the exhibit. Switch DSw1 is the Active Virtual Gateway (AVG) and DSw2 is an Active Virtual Forwarder (AVF). Based on this information, which two GLBP statements are true?
(Choose two.)

GLBP is a Cisco proprietary protocol and is supported on all Cisco Catalyst and Cisco router platforms.

None of the switches have had their priority configured.

Switch DSw1 assigns the virtual IP addresses to switch DSw2.

Switch DSw2 has been configured with the glbp 1 priority 95 command.

Two more multilayer switches could join this group.

When Host A sends an ARP message for the gateway IP address, switch DSw1 returns the physical MAC address of switch DSw2.

Final del formulario

35

Principio del formulario

In a bridged environment, which protocol provides subsecond reconvergence of blocked bridging loops after the failure of one of the uplinks?

IEEE 802.1Q (CST)

IEEE 802.1w (RSTP)

Cisco PVST+

IEEE 802.1D (STP)

Final del formulario

36

Principio del formulario

Which two statements are true about flooding in a switch? (Choose two.)

The show mac-address-table can be used to display the flooding statistics.

Flooding indicates that the content addressable memory (CAM) of the switch is corrupt.

Flooding may cause STP Topology Change Notification (TCN).

Flooding may be caused by asymmetric routing.

Final del formulario

37

Principio del formulario

What is a best practice when implementing failover strategies at the access and distribution layers?

Align failover timers between STP and HSRP.

Enable ICMP redirects with the ip redirects command on interfaces that are involved with HSRP.

Disable RSTP on all access and distribution switches.

Span VLANs across all switches or switch stacks for fault redundancy.

Final del formulario

38

Principio del formulario

Which three statements regarding a routed switch interface are true? (Choose three.)

A routed switchport is a physical device that is associated with several VLANs.

A routed switchport is created by configuring a Layer 2 port with the no switchport interface configuration command and assigning an IP address.

A routed switchport is created by entering VLAN interface configuration mode and assigning an IP address.

A routed switchport is a virtual Layer 3 interface that can be configured for any VLAN that exists on a Layer 3 switch.

A routed switchport provides an interface that serves as the default gateway to a router.

A routed switchport serves as a default gateway for devices out that switch port.

Final del formulario

39

Principio del formulario





Refer to the exhibit. What action does the command standby 1 track Serial0 on router R1 perform?

It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.31.1 on interface Serial 0.

It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.42.2 on interface Serial 0.

It links the HSRP process to multi-homed BGP on R1 and R2.

It tracks the state of the Serial 0 interface and brings down the priority of standby group 1 if the interface goes down.

In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2, appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-A to R1 path.

In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2, appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-B to R2 path.

Final del formulario

40

Principio del formulario

What are two benefits of implementing VLANs on a switched network? (Choose two.)

VLANs enable all users on the network to communicate with each other without restriction.

VLANs create a single broadcast domain for all the users of a switched network.

VLANs break up broadcast domains within an organization.

Communication between VLANs requires use of Layer 2 devices.

VLANs do not require additional management to control the traffic over the network.

VLANs separate the systems with sensitive data from the rest of the network to provide security.

Final del formulario

41

Principio del formulario

Which statement is true about the Spanning-Tree Protocol (STP)?

Each switch determines a designated port that provides the best path to the root switch.

The designated port will be on the switch with the best path to the root switch.

With each network change, the STP algorithm is run on all switches that have a root port.

A topology change will cause the switch where the change occurred to send messages throughout the tree regarding the topology change.

Final del formulario

42

Principio del formulario





Refer to the exhibit. Router RTA has been configured as the active HSRP router. Router RTB is to be the standby HSRP router. However, once the indicated configuration was applied to router RTB, the console began to display the message %HSRP-4-DIFFVIP1.
What is the cause of the message?

The command standby preempt should only be configured on the active router.

The subnet mask is missing from the standby 50 ip 10.1.1.10 command.

The group number is not the same as the active router.

The virtual IP address is not the same as the active router.

The ports on the switch must be configured with the spanning-tree PortFast feature.

Final del formulario

43

Principio del formulario

A network administrator is tasked with protecting a server farm by implementing Private VLANs. A server is only allowed to communicate with its default gateway and other related servers. Which type of PVLAN should be configured on the switch ports connecting the servers?

isolated

promiscuous

ISL

community

802.1Q

Final del formulario

44

Principio del formulario

Which three statements are benefits of local VLANs in the Enterprise Composite Model? (Choose three.)

deterministic traffic flow expediting problem isolation and resolution within the switch block

ease of management since local VLANs are typically confined to the Building Access submodule

high availability since redundant paths exist at all infrastructure levels

broad expansion domain since the number of devices on each VLAN can easily be added to

IP address conservation since address blocks can be allocated to VLANs

wide coverage since a VLAN can be geographically dispersed throughout the network

Final del formulario

45

Principio del formulario

Which two statements are true regarding switched virtual interfaces (SVI) on a multilayer switch? (Choose two.)

An SVI behaves like a regular router interface but does not support VLAN subinterfaces.

An SVI is a physical switchport with Layer 3 capability.

By default, an SVI is created for the default VLAN (VLAN1) to permit remote switch administration.

Only one SVI can be associated with a VLAN.

To create an SVI requires removal of Layer 2 port functionality with the no switchport interface configuration command.

Final del formulario

46

Principio del formulario

Which wireless data technology is used for WLANs?

spread spectrum

narrowband

personal communication system (PCS)

3G

microwave

cellular

Final del formulario

47

Principio del formulario

Which of the following is true regarding the 3550 switch command shown below?



CAT3550(config-if)# ip route-cache cef

globally enables CEF switching

enables CEF to be enabled by default on the switch

disables process switching on the interface

required if CEF has been previously disabled on an interface

Final del formulario

48

Principio del formulario





Refer to the exhibit. A network administrator attempts to ping the IP address 172.16.20.1 from RouterA.
What will the router output be?

Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

!!!!!

Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

.....

Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

U.U.U

%network or host unreachable, TTL exceeded

%Unrecognized host or address, or protocol not running

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed state to down

Final del formulario

49

Principio del formulario





Refer to the exhibit. The indicated configuration was established on the HSRP standby router RTB. However, the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router. Given the output of the show standby brief command on RTA, what is the cause of the problem?

The command standby preempt should only be configured on the active router.

The subnet mask is missing from the standby ip 10.1.1.1 command.

The group number 50 is missing in the Router RTB configuration commands.

The priority number 150 is missing in the Router RTB configuration commands.

The virtual IP address should be the same as the active router.

The ports on the switch must be configured with the spanning-tree PortFast feature.

Final del formulario

50

Principio del formulario





Refer to the exhibit. Switch Sw_F recently joined the network.
What will happen once STP has finished its convergence?

Switch Sw_F will take over the root bridge role from switch Sw_C.

Switch Sw_F will take over the root bridge role from switch Sw_D.

Switch Sw_C will remain the root bridge.

Switch Sw_D will remain the root bridge.

Switch Sw_F will become the backup root bridge.

Switch Sw_C will become the backup root bridge.

Final del formulario

51

Principio del formulario





Refer to the exhibit. Traffic sourced from a device on Switch1 leaves on VLAN 10, and the return traffic arrives on VLAN 20.
What is this an example of?

an external router using a single trunk for interVLAN routing

an external router using multiple trunks for interVLAN routing

an external router using multiple physical interfaces for interVLAN routing

an external router using multiple physical interfaces for interVLAN switching

a multilayer switch using multiple trunks for interVLAN routing

a multilayer switch using multiple trunks for interVLAN switching

Final del formulario

52

Principio del formulario

A network administrator wants to prevent users from adding additional devices to the switchport they are currently connected to. Which Cisco Catalyst feature will accomplish this?

MAC filtering

port security

MAC access lists

port-based authentication

port-based access lists

Final del formulario

53

Principio del formulario

Which statement is true about Multiple Spanning Tree (MST) implementations?

MST provides one instance of spanning tree per VLAN.

MST provides one instance of spanning tree for all VLANs.

MST provides a single instance of spanning tree per multiple VLANs.

MST provides a single MST region for switches with different MST configurations.

Final del formulario