Saturday, August 30, 2008
CCNP: Building Multilayer Switched Networks Chapter 4
Module 4 ‐ 1 ‐
1. What is a primary reason to use a trunk link to connect a switch to an external router
that is providing interVLAN routing?
· fewer router and switch ports are used (*)
· high bandwidth
· ease of MLS integration
· reduction of CPU overhead
· router cpu is well‐matched to the connected switch
2. Which command should be entered to turn a physical switch port/interface into a
Layer 3 port?
· Switch(config‐if)#routerport
· Switch(config‐if)#switchport layer3
· Switch(config‐if)#switchport off
· Switch(config‐if)#no switchport (*)
· Switch(config‐if)#routerport on
3. Which two statements are true about the Forwarding Information Base (FIB) table?
(Choose two.)
· The FIB table uses ACLs to determine matches.
· The FIB table is based on CDP packets received by the router.
· The FIB table is generated from the contents of the routing table. (*)
· The FIB table lookups are performed based on destination MAC address.
· The FIB table will update if an ARP entry for a destination next hop changes. (*)
4. What happens when the CEF TCAM table is full?
· The packet will be dropped.
· The longest match in the table will be used.
· The shortest match in the table will be used.
· A wildcard entry will force the packet to route via the route table. (*)
5. Which three statements regarding switched virtual interfaces (SVI) are true? (Choose
three.)
· A routed port is an alternative to an SVI that is created with the switchport mode
routed interface configuration command.
· An SVI is a virtual Layer 3 interface that can be configured for any VLAN that
exists on a Layer 3 switch. (*)
· An SVI can provide a default gateway for a VLAN so traffic can be routed
between VLANs. (*)
· For redundancy, a VLAN can have more than one SVI associated to it.
· SVIs are created by entering VLAN interface configuration mode and assigning
an IP address. (*)
· SVIs must be explicitly configured for all VLANs.
Module 4 Exam
Module 4 ‐ 2 ‐
6. In which two modes can Cisco Express Forwarding (CEF) operate? (Choose two.)
· central CEF mode (*)
· distributed CEF (dCEF) mode (*)
· enhanced CEF mode
· forwarding CEF (fCEF) mode
· process CEF mode
7. Which two statements referring to CEF tables are true? (Choose two.)
· CEF IP destination prefixes are stored in the TCAM table from the least specific to
the most specific entry.
· The adjacency table is derived from the ARP table, and it contains Layer 2
rewrite (MAC) information for the next hop. (*)
· The Forwarding Information Base (FIB) lookup is based on the Layer 2 destination
MAC addresses.
· The Forwarding Information Base (FIB) is derived from the IP routing table and
is arranged for maximum lookup throughput. (*)
· When the CEF TCAM table is full, a static entry redirects the frame to the Layer 2
engine.
8. CEF is enabled globally. However, for testing purposes, CEF was disabled on interface
GigabitEthernet 0/2. Which command would re‐enable CEF on the interface?
· Switch(config)# ip cef enable
· Switch(config)# ip route‐cache cef
· Switch(config)# ip route‐cef
· Switch(config)# interface gi 0/2
Switch(config‐if)# ip cef enable
· Switch(config)# interface gi 0/2
Switch(config‐if)# ip route‐cache cef (*)
· Switch(config)# interface gi 0/2
Switch(config‐if)# ip route‐cef
Module 4 Exam
Module 4 ‐ 3 ‐
9. Refer to the exhibit. A network administrator attempts to ping 172.16.10.1 from
RouterA. What will the router output be?
· Sending 5, 100‐byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
!!!!!
· Sending 5, 100‐byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
..... (*)
· Sending 5, 100‐byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
U.U.U
· %Unrecognized host or address, or protocol not running
· %Network or host unreachable, TTL exceeded
· %LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/13, changed
state to down
Module 4 Exam
Module 4 ‐ 4 ‐
10. Which statement is true regarding the CEF‐forwarding process?
· The FIB table contains the Layer 2 rewrite information.
· The adjacency table eliminates the need for the ARP protocol.
· After an IP prefix match is made, the process refers to the adjacency table to
determine a Layer 2 next hop address. (*)
· Adjacency table lookups are based upon the closest Layer 3 prefix match.
11. What statement is true regarding TCAM memory in CEF switching?
· TCAM includes only Layer 3 lookup information.
· A single lookup provides Layer 2, Layer 3, and ACL information. (*)
· TCAM lookup tables are only used for the Layer 3 forwarding operation.
· TCAM lookup tables are only used for the rapid processing of ACLs within CEF.
Module 4 Exam
Module 4 ‐ 5 ‐
12. Refer to the exhibit and the partial configuration taken on routers RTA and RTB. All
users can ping their gateways, but users on VLAN 5 and VLAN 10 cannot
communicate with the users on VLAN 20. What should be done to solve the
problem?
· A dynamic routing protocol or static routes should be configured on the routers.
(*)
· A trunk should be configured between routers RTA and RTB.
· RTA’s interface Fa0/1 and RTB’s Fa0/1 should be configured with three
subinterfaces with ISL encapsulation.
· RTA’s interface Fa0/1 and RTB’s Fa0/1 should be configured with three
subinterfaces with 802.1Q encapsulation.
Module 4 Exam
Module 4 ‐ 6 ‐
13. Refer to the exhibit. An administrator wants to ensure that CEF is functioning
properly between Host A and Host B. If the administrator wants to verify the CEF FIB
table entry for the route 10.10.5.0/24 on Sw_MLSA, what should the adjacency IP
address be?
· 10.10.10.2 (*)
· 10.10.10.1
· 10.10.5.1
· 10.10.5.2
14. Which two statements are true regarding routed ports on a multilayer switch?
(Choose two.)
· A routed port behaves like a regular router interface and supports VLAN
subinterfaces.
· A routed port is a physical switchport with Layer 2 capability.
· A routed port is not associated with a particular VLAN. (*)
· To create a routed port requires removal of Layer 2 port functionality with the
no switchport interface configuration command. (*)
· The interface vlan global configuration command is used to create a routed port.
Module 4 Exam
Module 4 ‐ 7 ‐
15. Refer to the exhibit. The router has been properly configured for the trunking
interface. Which statement is true regarding the routing table on the router?
· It will show a next hop address of the switch for both VLANs.
· It will show one trunking route to 10.0.0.0/8.
· It should contain routes to the 10.10.10.0/24 and the 10.10.11.0/24 networks.
(*)
· It will not show routes to either VLAN because the switch is not configured
properly to trunk VLAN 1 and VLAN 2.
· It will not show any routes because the switch port fa0/1 is in access mode.
Module 4 Exam
Module 4 ‐ 8 ‐
16. Refer to the exhibit. Which statement is true regarding the diagram and show ip
route command output?
· The router will not forward packets between workstations because no routing
protocol has been configured.
· The default gateway for hosts on VLAN 10 should be the Fa0/0 IP address of the
router.
· The default gateway for hosts on VLAN 10 should be the Fa0/0.1 IP address of
the router. (*)
· The default gateway for hosts on VLAN 10 should be the Fa0/0.2 IP address of the
router.
· Hosts on VLAN 10 do not need a default gateway since their packets are being
trunked.
17. Refer to the exhibit. Which statement is true about the configuration?
· VLAN subinterfaces can be created for interface VLAN 10.
· A virtual VLAN interface can be created for the default VLAN (VLAN 1) only.
· Interface VLAN 10 will not support routing or bridging function in the system.
· Interface VLAN 10 will support routing or bridging function in the system. (*)
Module 4 Exam
Module 4 ‐ 9 ‐
18. Refer to the exhibit. Switch SW1 is configured for CEF‐based MLS. When Host A
forwards traffic to Host B, which MAC address will be in the Forwarding Information
Base (FIB) table of switch SW1?
· 001c.1ade.aaae
· 000a.22ae.eeef
· 000a.222e.adef
· 000a.222e.adee
· 000a.22ae.adef (*)
19. What are three key requirements for Inter‐VLAN routing when using an external
router? (Choose three.)
· VLAN capable switch (*)
· trunk connection between router and switch (*)
· redundant routers
· virtual router interface
· router (*)
· serial connection between router and switch
Module 4 Exam
Module 4 ‐ 10 ‐
20. Which packets will not be processed by Cisco Express Forwarding (CEF) and must be
processed by the Layer 3 engine? (Choose three.)
· packets destined for a tunnel interface (*)
· packets that use UDP header options
· packets that exceed the maximum transmission unit (MTU) of the output
interface (*)
· packets that use TCP header options
· packets that use IP header options (*)
CCNP: Building Multilayer Switched Networks Chapter 3
Module 3 ‐ 1 ‐
1. Which protocol extends the IEEE 802.1w Rapid Spanning Tree (RST) algorithm to multiple
spanning‐trees?
· PVST+
· PVST
· IEEE 802.1q (CST)
· IEEE 802.1s (MST) (*)
2. Which two benefits are provided by MST as it is used with RSTP? (Choose two.)
· load balancing (*)
· multiple spanning trees with ISL trunking
· rapid router redundancy
· rapid ISL convergnece
· subsecond reconvergence (*)
3. In which port role do both IEEE 802.1D (STP) and IEEE 802.1w (RSTP) designate a bridge port
that is receiving a BPDU with the lowest BID, assuming that no other port receives a BPDU
with the same BID?
· backup port
· alternate port
· designated port
· root port (*)
4. What is an advantage of having multiple VLAN spanning‐tree instance assignments located in
different parts of the network?
· makes it easier to administer and utilize redundant paths (*)
· makes it more simple to implement STP design
· allows all instances to share the same designated bridge
· makes it easier to separate PVST and CST spanning‐trees
Module 3 Exam
Module 3 ‐ 2 ‐
5. Refer to the exhibit. Which two statements about the spanning‐tree operation are true?
(Choose two.)
· ACSW1 will become the root bridge.
· DISW1 will become the root bridge. (*)
· DISW2 will become the root bridge.
· ACSW1 will become the backup root bridge. (*)
· DISW1 will become the backup root bridge.
· DISW2 will become the backup root bridge.
6. Refer to the exhibit. Switch A is connected to hub B via port P1. A second link is added on
port P2 and configured for PortFast. Immediately after the new link came up, users could not
access network resources. What caused this problem?
· A Layer‐2 loop was created. (*)
· Port P1 and P2 both entered the STP blocking state.
· Hub B placed both uplink ports in the STP blocking state.
· PAgP failed to properly negotiate the EtherChannel.
Module 3 Exam
Module 3 ‐ 3 ‐
7. Refer to the exhibit. The four Cisco Catalyst switches must support several VLANs as
identified in the exhibit. Which mode of STP would efficiently support this network?
· RSTP
· PVST (*)
· STP+
· VSTP
· CSTP
8. Refer to the exhibit. Interface Fa0/1 and Fa0/2 on the SW1 switch have been configured to
support PAgP desirable mode. Which two modes can be configured on the interconnecting
SW2 interfaces to successfully establish an EtherChannel? (Choose two.)
· off
· auto (*)
· on
· desirable (*)
9. What happens when a switch receives a topology change message from the root bridge?
· The switch uses the forward delay timer to age out entries in the MAC address table.
(*)
· The switch uses the max_age timer to age out entries in the MAC address table.
· The switch uses the hello to age out entries in the MAC address table.
· The switch uses the forward delay and the max_age timer to age out entries in the MAC
address table.
Module 3 Exam
Module 3 ‐ 4 ‐
10. Which STP timer defines the length of time spent in the listening and learning states?
· hello time
· forward aging
· forward delay (*)
· max age
· max delay
11. Which three statements regarding RSTP edge ports are true? (Choose three.)
· Edge ports can have another switch connected to them as long as the link is operating in
full duplex.
· Edge ports function similarly to UplinkFast ports.
· Edge ports immediately transition to learning mode and then forwarding mode when
enabled.
· Edge ports never generate topology changes notifications (TCNs) when the port
transitions to a disabled or enabled status. (*)
· Edge ports should never connect to another switch. (*)
· If an edge port receives a BPDU, it becomes a normal spanning‐tree port. (*)
12. Refer to the exhibit. Given the output generated by the show spanning‐tree mst
configuration command, which two statements are true? (Choose two.)
· The switch has automatically incremented the MST revision number to 11.
· The MST region name was configured with the name CAMPUS1 global configuration
command.
· The switch requires the spanning‐tree mode mst global configuration command to
enable MST. (*)
· The switch was configured with the spanning‐tree mst 1 root primary MST configuration
command.
· VLANs 1 through 10 have been configured with the instance 1 vlan 1‐10 MST
configuration command. (*)
Module 3 Exam
Module 3 ‐ 5 ‐
13. Refer to the exhibit. Which two statements regarding EtherChannels are true? (Choose two.)
· The configurations could create a Link Aggregation Control Protocol (LACP) EtherChannel
in a mixed switch environment.
· The configurations could create a Port Aggregation Protocol (PAgP) EtherChannel
between two Cisco Catalyst 3560 switches. (*)
· The configuration on switch SW1 assigns Gigabit Ethernet interfaces 0/1 and 0/2 as
static‐access ports in VLAN 10 to channel 5 with the LACP mode set to desirable.
· The channel‐group interface configuration command automatically creates the portchannel
logical interface. (*)
· The configurations would not create an EtherChannel interface since the port‐channel
modes are not both set to auto.
14. Which two port states will immediately transition to the forwarding state when Rapid STP
(RSTP) converges in a switched network? (Choose two.)
· root port (*)
· designated port (*)
· alternate port
· backup port
· disabled port
· blocking port
Module 3 Exam
Module 3 ‐ 6 ‐
15. Refer to the exhibit. Switch Sw_F recently joined the network. What will happen once STP
has finished its convergence?
· Switch Sw_F will become the root bridge for its respective VLANs. (*)
· Switch Sw_C will remain the root bridge for its respective VLANs.
· Switch Sw_D will remain the root bridge for its respective VLANs.
· Switch Sw_F will become the backup root bridge for its respective VLANs.
· Switch Sw_B will remain the backup root bridge for its respective VLANs.
16. Which type of BPDU is sent out of the root port when a link failure in a switched environment
has occurred?
· Link Change Notification
· Link Detection Notification
· Topology Link Notification
· Topology Change Notification (*)
Module 3 Exam
Module 3 ‐ 7 ‐
17. Given the topology in the exhibit, which configuration will ensure the least amount of
convergence time in the event of a port failure followed by recovery of the port?
· On the Access1 switch, configure the Fa 0/1 interface with the spanning‐tree mode
portfast command.
· On the Access1 switch, configure the Fa 0/2 interface with the spanning‐tree portfast
command.
· On the Access2 switch, configure the Fa 0/1 interface with the spanning‐tree mode
portfast command.
· On the Access2 switch, configure the Fa 0/2 interface with the spanning‐tree portfast
command.
· On the Dist1 switch, configure the Fa 0/1 port with the spanning‐tree mode portfast
command.
· On the Dist1 switch, configure the Fa 0/2 port with the spanning‐tree portfast
command. (*)
18. Assuming all switches are at default priority, which of the following is true about applying
this configuration command on a Catalyst 3550 switch?
3550switch(config)# spanning‐tree vlan 23 root primary
· guarantees that this switch will be the primary root on all VLANs
· sets the switch priority for VLAN 23 to 24576 (*)
· guarantees that this switch will not be the primary root on VLAN 23
· sets the switch priority to 0
· sets the switch priority to 23
Thursday, August 28, 2008
CCNP: Building Multilayer Switched Networks Chapter 2
Module 2 ‐ 1 ‐
1. Refer to the exhibit. Hosts on VLAN 10 must be able to communicate with hosts on VLAN 20.
Given the topology in the exhibit, which statement is correct?
· Routing between VLANs should be configured at the access layer.
· Routing between VLANs should be configured at the distribution layer. (*)
· Routing between VLANs should be configured at the core layer.
· Routing between VLANs is not possible without a router; therefore, hosts will not be able
to communicate.
2. What are three benefits of local VLANs in the Enterprise Composite Network model? (Choose
three.)
· Users can be grouped on a common IP segment even though they are geographically
dispersed.
· Problem isolation and resolution are expedited within the switch block. (*)
· Layer‐2 failures are isolated to a small subset of users. (*)
· Deterministic traffic flow provides a predictable Layer 2 and 3 traffic path. (*)
· VLAN membership remains the same as the user moves throughout a campus.
· Traffic is switched rather than routed as it passes from the distribution layer into the
core.
3. Which three statements regarding the use of VTP within the Campus Infrastructure module
are true? (Choose three.)
· In high‐availability environments, it is best practice to set all switches to ignore VTP
updates. (*)
· In the default VTP mode, a switch can create, modify, and delete VLANs at the
command line interface (CLI). (*)
· There are three VTP versions that support different features, of which VTP version 3 is
the most prevalent.
· VTP‐enabled switches can exchange three types of advertisements: summary
advertisements, subnet advertisements, and advertisement requests from clients.
· VTP keeps VLAN information consistent between Building Core and Building Distribution
switches.
· VTP updates are exchanged across trunk links only. (*)
Module 2 Exam
Module 2 ‐ 2 ‐
4. Refer to the exhibit. A network administrator is unable to ping between two workstations,
PC1 and PC2, connected to switch3548. PC1 is connected to port Fa0/19, and PC2 is
connected to port Gi0/2. Given the output of the show vlan command, which statement is
true?
· Both workstations are on the same VLAN. (*)
· Both workstations are in the default VLAN.
· Inter‐VLAN routing is not properly configured.
· The VLAN interface is administratively shut down.
· PC2 is connected to a trunk port instead of an access port.
5. Refer to the exhibit. Which configuration will enable trunking on the SW2 switch?
· SW2(config‐if)# switchport mode trunk
Module 2 Exam
Module 2 ‐ 3 ‐
SW2(config‐if)# switchport trunk encapsulation dot1q (*)
· SW2(config‐if)# switchport mode trunk
· SW2(config‐if)# switchport trunk encapsulation isl
· SW2(config‐if)# switchport mode access
· SW2(config‐if)# switchport trunk encapsulation dot1q
· SW2(config‐if)# switchport mode access
· SW2(config‐if)# switchport trunk encapsulation isl
6. Refer to the exhibit. Which statement is true if the two switches were connected with their
default settings?
· DTP frames will be exchanged between SW1 and SW2. (*)
· STP is disabled.
· The connection between the two switches is an access link.
· The unused ports are placed into dynamic VLANs.
7. Which statement is true about a VLAN ID?
· VLAN IDs are placed on a frame when exiting an access or trunk port.
· VLAN IDs are used to determine which mode a trunk is in.
· VLAN IDs are added before a frame exits a port configured as a trunk. (*)
· VLAN IDs help the switch determine which ports will be pruned from particular VLANs.
8. What happens when an ISL‐enabled trunk receives an unencapsulated frame?
· The frame is dropped. (*)
· The frame is processed as part of the native VLAN frames.
· The switch will hold the untagged frame and send a BPDU to the originating switch.
· The switch will associate the frame with the VLAN that the receiving port is assigned to.
Module 2 Exam
Module 2 ‐ 4 ‐
9. Refer to the exhibit. Which two statements are true about the switch CAT2? (Choose two.)
· Eleven VLANs were manually configured on the switch.
· Six VLANs were manually configured on the switch. (*)
· Interfaces Fa0/13 and Fa0/14 are in VLAN 1.
· Interfaces Fa0/13 and Fa0/14 are in an unspecified VLAN.
· VLAN 100 is in dynamic desirable mode.
· VLAN 100 has no active ports. (*)
10. Which two statements are true regarding the 802.1Q trunking protocol? (Choose two.)
· The default setting on Catalyst switches is that all switch ports are assigned to the
802.1q native VLAN (VLAN 1). (*)
· It is a Cisco proprietary protocol that inserts a tag into the original Ethernet header.
· It supports multiple Layer 2 protocols (Ethernet, Token Ring, FDDI and ATM).
· It supports per‐VLAN Spanning Tree Protocol (STP).
· The encapsulation process leaves original frames unmodified and is less prone to error
and more secure.
· The native VLAN interface configurations must match at both ends of the link or the
trunk may not form. (*)
Module 2 Exam
Module 2 ‐ 5 ‐
11. What are three characteristics of a VLAN access port? (Choose three.)
· A switchport can become an access port through static or dynamic configuration. (*)
· An access port is associated with a single VLAN. (*)
· An access port is created with the switchport access command and then associated with
a VLAN with the switchport access vlan command.
· An access port is created with the switchport static mode command and then associated
with a VLAN with the switchport access vlan command.
· An access port is created with the switchport mode access command and then
associated with a VLAN with the switchport access vlan command. (*)
· The VLAN that the access port is assigned to will be automatically deleted if it does not
exist in the VLAN database of the switch.
12. Which two statements are true about VLAN design using the Enterprise Composite Model
model? (Choose two.)
· Local VLANs used with DHCP allow workstations to be moved from one network
segment to another with little administrative overhead. (*)
· Local VLANs that are limited to the local access and distribution layers allow Layer 2
and Layer 3 redundancy protocols to work together with greater ease. (*)
· End‐to‐end VLANs allow the simplest integration between Layer 2 and Layer 3
redundancy protocols.
· End‐to‐end VLANs allow for more optimal traffic patterns in a typical network with an
80/20 remote/local traffic pattern.
13. Which statement is true regarding best‐practice design of local VLANs using the Enterprise
Composite Network model?
· Local VLAN is a feature that has only local significance to the switch.
· A local VLAN does not extend beyond the Building Distribution submodule. (*)
· Local VLANs should be created based upon the job function of the end user.
· Local VLANs should be advertised to all switches in the network.
· End‐to‐end VLANs should be utilized wherever possible.
14. Which two VLAN Trunking Protocol (VTP) statements are true? (Choose two.)
· A switch may belong to several VTP domains.
· A VTP domain can consist of a single switch. (*)
· There are three VTP modes: root, client, and transparent.
· VTP advertisements are forwarded out all ports on a switch.
· VTP updates are exchanged only with other switches in the same VTP domain. (*)
· VTP updates include VLAN number, name, description, and assigned ports.
Module 2 Exam
Module 2 ‐ 6 ‐
15. Refer to the exhibit. What is the problem between the connection on Switch1 and Switch2?
· encapsulation mismatch
· switchport mode mismatch
· MTU mismatch
· VTP mismatch
· DTP mismatch
· native VLAN mismatch (*)
Module 2 Exam
Module 2 ‐ 7 ‐
16. Refer to the exhibit. What is the problem between the connection on Switch1 and Switch2?
· native VLAN mismatch
· encapsulation mismatch (*)
· switchport mode mismatch
· VTP mismatch
· DTP mismatch
· hardware failure
17. Which two items are benefits of implementing local VLANs within the Enterprise Composite
Model? (Choose two.)
· A single VLAN can extend further than its associated distribution‐layer switch.
· Failures at Layer 2 are isolated to a small subset of users. (*)
· High availability is made possible since local VLAN traffic on access switches can now be
passed directly to the core switches across an alternate Layer 3 path.
· Layer 3 routing between VLANs can now be applied at the access layer.
· Deterministic failover paths can be configured between the access and distribution
layer. (*)
Module 2 Exam
Module 2 ‐ 8 ‐
18. Refer to the exhibit. Switch2 is not receiving updated VLAN information from Switch1. What
is the problem?
· The VTP domains are different.
· The VTP modes are different.
· The VTP passwords are different.
· Switch2 is in server mode.
· Switch2 is in client mode.
· Switch2 is in transparent mode. (*)
Module 2 Exam
Module 2 ‐ 9 ‐
19. Refer to the exhibit. Both switches have maintained their default configurations. Given the
output of the show interface fastethernet 0/2 switchport command, which mode should be
displayed after the "Negotiation of Trunking: " field?
· On (*)
· off
· auto
· desirable
Monday, August 25, 2008
CCNA Final Exam Answer 201-300
QUESTION 201 Study the Exhibit below carefully: Telnet traffic from the Graphics Department is prohibited from reaching the HR server attached to the East field router, but will allow Telnet traffic to other destinations due to an access list that has been designed to do precisely this. Given the following access list: access-list 101 deny tcp any any eq 23 permit ip any any On which router, in what direction, and which interface, should the access list be placed to most efficiently implement the above list? (Select three options.)
A. Westfield
B. East field
C. out
D. in
E. s0
F. e0 Answer: B, C, F Explanation:
B: The question states that telnet traffic will only be blocked to the HR server. Therefore the correct router to apply this to would be the East field router and not the Westfield router. Not A: If you apply it to the Westfield router in the out direction, all telnet traffic will be blocked to all routers.
QUESTION 202 Study the Exhibit below carefully: London#show vtp status VTP Version: 2 Configuration Revision: 0 Maximum VLANs supported locally: 64 Number of existing VLANs: 5 VTP Operating Mode: Client VTP Domain Name: London VTP Pruning Mode: Disabled VTP V2 Mode: Disabled VTP Traps Generation: Disabled Above is an illustration of the output of the London switch. What is the function of this switch?
A. Learn and saved VTP configuration in the running configuration.
B. Create and change VLANs.
C. Passes information about VTP configuration.
D. VTP is disabled on this device.
E. VTP is not saved to NVRAM. Answer: C
QUESTION 203 Which of the following will allow a router to respond to an ARP request that is meant for a remote host?
A. Gateway DP
B. Reverse ARP
C. proxy ARP
D. Inverse ARP
E. indirect ARP Answer: C Reference: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094adb.shtml
QUESTION 204 Study the Exhibit below carefully: Central# show running-config Remote# show running-config
A. The Frame Relay PVC is down.
B. The IP addressing on the Central/Remote serial link is incorrect.
C. RIP routing information is not being forwarded.
D. Frame Relay inverse-ARP is not properly configured. Answer: C
QUESTION 205 Study the Exhibit below carefully: Consider the scenario as depicted in the exhibit. Assuming the following aims: 1) allow Telnet from the Internet to the HR server 2) allow HTTP access from the Internet to the web server 3) all other traffic from the Internet should be blocked Which of the following access list statements do you think are necessary to accomplish all three aims? (Select two options.)
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network. Answer: A, F Explanation: We have two broadcast domains with this router only on E0 and E1 so we have 2 broadcast domains. We have 5 computers and one port for E1 so we have 6 collision domains because we use SW in production department, and one collision domain for sales because we use hub.
QUESTION 207 Which of the following commands will display the CHAP authentication process as it occurs between the two routers in the network when you know that all WAN links inside the company's network use PPP with CHAP for authentication security?
A. show ppp authentication
B. debug PAP authentication
C. debug PPP authentication
D. show interface serial0
E. show CHAP authentication Answer: C
QUESTION 208 Which of the following commands are required to create an 802.1Q link on an IOS based switch when you want to establish a trunk link between two switches? (Select two options.)
A. Switch(vlan)# mode trunk
B. Switch(config)# switchport access mode trunk
C. Switch(config-if)# switchport mode trunk
D. Switch(config-if)# switchport trunk encapsulation dot1q
E. Switch(config)# switchport access mode 1
F. Switch(vlan)# trunk encapsulation dot1q Answer: C, D
QUESTION 209 Which of the following WAN technologies provides small offices and private homes using normal telephone lines with higher speed digital dial-up service?
A. X25
B. Frame Relay
C. ATM
D. ISDN
E. ATX Answer: D
QUESTION 210 How would you configure a router in a Frame Relay network to prevent issues such as split horizons hampering routing updates?
A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the subinterface.
B. Configure many sub-interfaces on the same subnet.
C. Configure each Frame Relay circuit as a point-to-point line.
D. Configure only one sub-interface to establish multiple PVC connections.
E. Configure a single sub-interface connect to multiple remote router interfaces. Answer: A
QUESTION 211 Study the Exhibit below carefully: hostname Barrymore ! enable password gatekeeper ! isdn switch-type basic-5ess ! ! username Central password cisco interface BRI0 ip address 192.168.0.1 255.255.255.0 encapsulation ppp dialer idle-timeout 180 dialer map ip 192.168.0.2 name Remote 6662000 dialer-group 1 no fair-queue ppp authentication chap ! router rip network 192.168.0.2 ! no ip classless ip route 192.168.10.0 255.255.0.0 192.168.0.2 ip route 192.168.20.0 255.255.0.0 192.168.0.2 ! dialer-list 1 protocol ip permit Above is the result of the output of show running-config command. What is causing the problem when the Barrymore router is unable to make calls to the remote site?
A. The authentication password is missing from the dialer map command.
B. The switch-type must be configured.
C. Routing updates are being blocked by the applied dialer-list.
D. The dialer list only permits one protocol.
E. The name in the dialer-map must match the name in the username command. Answer: E QUESTION 212 Assuming that all OSPF routers in a particular area are configured with identical priority values, which of the following values would a router use for OSPF router ID when it does not have a loopback interface?
A. The IP address of the first Fast Ethernet interface.
B. The IP address of the console management interface.
C. The highest IP address among its active interfaces.
D. The lowest IP address among its active interfaces.
E. The priority value until a loopback interface is configured. Answer: C Reference: http://www.cisco.com/en/US/tech/tk365/tk480/technologies_q_and_a_item09186a0080094704.shtml
QUESTION 213 Study the Exhibit below carefully:
Which of the following is the correct IP address configuration for HostA?
A. IP 192.168.100.31 255.255.255.240 default-gateway 192.168.100.18
B. IP 192.168.100.30 255.255.255.240 default-gateway 172.16.1.1
C. IP 192.168.100.20 255.255.255.240 default-gateway 192.168.100.17
D. IP 192.168.100.21 255.255.255.248 default-gateway 192.168.100.17
E. IP 192.168.100.19 255.255.255.248 default-gateway 172.16.1.1 Answer: C Explanation: Subnet Mask Subnet Size Host Range Broadcast 192.168.100.16 255.255.255.240 14 192.168.100.17 -30 192.168.100.31 Incorrect Answers:
A: The IP address 192.168.100.31 is the broadcast address. It cannot be used for the host.
B: The default gateway should be the fist exit point for the network that the host is on. In this case it should be the router interface address 192.168.100.17.
D: The network uses a 28 bit subnet mask (11111111.11111111.11111111.11110000). This equates to 255.255.255.240, not 255.255.255.248.
E: The network uses a 28 bit subnet mask (11111111.11111111.11111111.11110000). This equates to 255.255.255.240, not 255.255.255.248. Also, The default gateway should be the fist exit point for the network that the host is on. In this case it should be the router interface address 192.168.100.17.
QUESTION 214 Study the Exhibit below carefully: Cisco Highway1# show running-config Cisco Highway2# show running-config
A. Authentication needs to be changed to PAP for both routers.
B. Serial ip addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured. Answer: C Explanation: Look at the passwords configured on the router Cisco Highway1 and Cisco Highway2, it is "cisco". When configuring for CHAP authentication, you must enters the other router's user name and password. In this case on router Cisco Highway2 has entered incorrect router Cisco Highway1's password, witch is "cisco1" (it must be "cisco"). As a result CHAP authentication will be faille, therefore couldn't a connection established between the routers. Reference CCNA Self-Study CCNA ICND Exam Certification Guide Chapter 9 page 315 ISBN: 1-58720-083-x
QUESTION 215 The terms on the left can be associated with the descriptions on the right. Can you make the correct associations? (Please note: Not all options are used)
QUESTION 216 The terms on the left can be associated with different OSI layers illustrated on the right. Can you make the correct associations? (Please note: Not all options are used)
QUESTION 217 Which of the following types of packets will be allowed entry when a serial interface's inbound access list has been configured to prohibit entry for TCP and UDP ports 21, 23 and 25? (Select all that apply.)
A. SMTP
B. DNS
C. FTP
D. Telnet
E. HTTP
F. POP3 Answer: B, E, F Explanation: The correct answers are B, E and F. (DNS port 53, HTTP port 80, POP3 port 110). Incorrect Answers: A) SMTP uses port 25 which is prohibited according to the question, so this can't be correct.
C) FTP uses port 21 which is prohibited according to the question, so this can't be correct. D) Telnet uses port 23 which is prohibited according to the question, so this can't be correct.
QUESTION 218 One of the trainees assigned to you want to know which services use TCP. What can you tell him? (Select three options.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP Answer: B, D, E
QUESTION 219 Which of the following network masks would you use to reduce any wastage of IP addresses in point-topoint WAN links on a network that supports VLSM?
A. /38
B. /30
C. /27
D. /23
E. /18 Answer: B
QUESTION 220 How would you configure a router to avoid situations such as split horizon issues hampering routing updates on a Frame Relay network?
A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the subinterface.
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C. Configure one sub-interface to disperse into multiple PVC connections to multiple remote router interfaces.
D. Configure as many as possible sub-interfaces on the same subnet. Answer: A
QUESTION 221 You are the network administrator for Cisco Highway. The network consists of the single Windows 2000 Active Directory domain Cisco Highway.com. Windows 2000 is used on all servers and client computers in the network. All three routers, named Cisco Highway1, Cisco Highway2, and Cisco Highway3 used by Cisco Highway are Cisco routers. All have been configured with the Single Area OSPF routing protocol. The Cisco Highway network is shown in the following exhibit: You are required to correct the configuration on the Cisco Highway1 router. Cisco Highway1 has been installed and configured. However, connectivity is not complete since the routing tables are not updated properly. On the other hand Cisco Highway2 and Cisco Highway3 have been working correctly. Current configuration: Cisco Highway1 E0: 192.168.33.1/24 S0: 192.168.100.5/30 Secret password: Cisco Highway Cisco Highway2 E0: 192.168.34.1/24 S0: 192.168.100.10/30 S1: 192.168.100.6/30 Secret password: Cisco Highway Cisco Highway3 E0: 192.168.35.1/24 S1: 192.168.100.9/30 Secret password: Cisco Highway Answer:
QUESTION 222 With regard to ISDN, which of the following are true? (Choose all that apply.)
A. Legacy DDR can use port information to define interesting traffic.
B. Legacy DDR can configure multiple dialer configurations on the same interface.
C. Legacy DDR can use ACLs to define interesting traffic.
D. HDLC or PPP can be used to encapsulate ISDN D channel information.
E. The BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.
F. Dialer profiles cannot use ACLs to define interesting traffic. Answer: B, C
QUESTION 223 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what the characteristics of named access list are. What would your reply be? (Choose all that apply.)
A. You can delete individual statements in a named access list.
B. Named access lists require a numbered range from 1000 to 1099.
C. Named access lists must be specified as standard or extended.
D. You can use the ip access-list command to create named access lists.
E. You cannot delete individual statements in a named access list.
F. You can use the ip name-group command to apply named access lists. Answer: A, C, D
QUESTION 224 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what the maximum number of hops are that OSPF allows before marking a network as unreachable. What would your reply be?
A. 15
B. 16
C. 99
D. 255
E. Unlimited Answer: F Explanation: OSPF is a link state protocol. Link state protocols do not use hops to mark networks as unreachable. Instead OSPF implements a steady state operation to its adjacent neighbors by sending and receiving small Hello packets periodically. When an ospf router does not receive a Hello packet for a specified time period, it assumes that the neighbor is down. The router then runs the SPF algorithm to calculate new routes. Reference: Cisco Highway 640-801 Study Guide, Section 5.2 "Steady State Operation".
QUESTION 225 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know which services use UDP. What would your reply be? (Choose all that apply.)
A. TACACS
B. Telnet
C. SMTP
D. SNMP
E. HTTP
F. TFTP Answer: D, F
D: SNMP uses UDP port 161
F: TFTP uses UDP port 69
Incorrect Answers:
A: TACACS uses TCP port 49
B: Telnet uses TCP port 23
C: SMTP uses TCP port 25
E: HTTP uses TCP port 80
QUESTION 226 With regard to ISDN, which of the following are true? (Choose all that apply.)
A. Each ISDN B channel has transmission speeds of up to 64 kbps.
B. The ISDN B channel can carry video, voice or data.
C. The ISDN B channel transmission rate varies depending on the service used.
D. The ISDN D channel transmits control information.
E. The ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured. Answer: A, B, D Explanation: Each B channel has a maximum throughput of 64 kbps and can carry encoded pulse code modulation (computerM) digital voice, video, or data. They are used mainly for circuit-switched data communications such as High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP). However, they can also carry packet-switched data communications. The router uses the D channel to dial destination phone numbers. It has a bandwidth of 16 kbps for BRI or 64 kbps for PRI. Although the D channel is used mainly for signaling, it too can also carry packet-switched data.
QUESTION 227 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know which services use TCP. What would your reply be? (Choose all that apply.)
A. NTP
B. NNTP
C. SMTP
D. SNMP
E. HTTPS
F. TFTP Answer: B, C, E Explanation:
B: NNTP uses TCP port 119
C: SMTP uses TCP port 25
E: HTTPS uses TCP port 443 Incorrect Answers:
A: NTP uses UDP port 123
D: SNMP uses UDP port 161
F: TFTP uses UDP port 69
QUESTION 228 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what the purpose of Inverse ARP is. What will your reply be?
A. It is used to map a known IP address to a MAC address
B. It is used to map a known DLCI to a MAC address
C. It is used to map a known MAC address to an IP address
D. It is used to map a known DLCI to an IP address E. It is used to map a known MAC address to DLCI
F. It is used to map a known DLCI to a MAC address Answer: D
QUESTION 229 You are the network administrator at Cisco Highway. You verify the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack used in this operation?
A. application
B. presentation
C. session
D. transport
E. network
F. data link
G. physical Answer: A
QUESTION 230 You are a trainee technician at Cisco Highway. Your instructor tells you that the OSPF routing protocol maintains a topology database of information about other routers in the network. Your instructor wants to know what the characteristics of this database are. What would your reply be?
A. The Dijkstra SPF algorithm is used to create the topology database.
B. All entries listed in the topology database will be included in the routing tables on each router.
C. The topology database is a routing table for which no path decisions have been made.
D. Each router in the OSPF area will have a unique topology database.
E. The topology database is updated by link-state advertisements (LSAs). Answer: A, E Explanation: Topology database contains information from all of the LSA packets that have been received for an area. The router uses the information from the topology database as input into the Djikstra algorithm that computes the shortest path to every network.
QUESTION 231 You are the network administrator at Cisco Highway. The Cisco Highway network is shown in the following exhibit:You want to apply the following access control list to one of the Cisco Highway routers.
access-list 101 permit tcp 192.168.1.16 0.0.0.15 192.168.2 16 0.0.0.15 eq 23 With regard to this scenario, which of the following statements are true? (Choose all that apply.)
A. Telnet traffic from 192.168.1.16 0.0.0.15 to 168.2.16 0.0.0.15 is allowed.
B. SMTP traffic from 192.168.1.16 0.0.0.15 to 168.2.16 0.0.0.15 is allowed.
C. The ACL is configured to allow traffic from one specific host to another.
D. The ACL should be applied inbound to the e0 interface of Router Cisco Highway1.
E. The ACL should be applied outbound to the e0 interface of Router Cisco Highway1. Answer: A, D
QUESTION 232 You are a trainee technician at Cisco Highway. Your instructor shows you the following output: hostname Cisco Highway1 hostname Cisco Highway2 ! ! username Cisco Highway2 password king username Cisco Highway1 password king ! ! interface serial 0 interface serial 0 ip address 172.23.56.2 255.255.255.0 ip address 172.23.56.3 255.255.255.0 encapsulation ppp encapsulation ppp clockrate 56000 pp authentication chap She tells you that the output was taken from two directly connected routers. Your instructor wants to know which of the following lines will be displayed when you issue the Router# show interface serial0 command. What will your reply be? (Choose all that apply.)
A. Serial 0 is down, line protocol is down
B. Serial 0 is up, line protocol is up
C. Open: IPCP, CDPCP
D. LCP closed
E. LCP open Answer: B, E
QUESTION 233 You are a technician at Cisco Highway. You have encapsulated an ISDN link on the Cisco Highway network with PPP. Your newly appointed Cisco Highway trainee wants to know why you did not use HDLC to encapsulate the ISDN link. What will your reply be? (Choose all that apply.)
A. PPP is easier to configure and maintain than HDLC.
B. Different equipment vendors consistently implement PPP.
C. PPP can be routed across public facilities, while HDLC is not.
D. PPP uses authentication to prevent unauthorized access to the ISDN circuit.
E. On circuit-switched ISDN links PPP is faster and more efficient than HDLC. Answer: B, D
QUESTION 234 You are the network administrator at Cisco Highway. Cisco Highway has an OSPF network. You want to observe the DR/BDR election process in the Cisco Highway network. What command can you issue in privileged EXEC mode to accomplish this?
A. CK1# show ip ospf interface
B. CK1# show ip ospf priority
C. CK1# show ospf neighbor detail
D. CK1# show ospf processes
E. CK1# show ospf neighbor state Answer: A Explanation: Router1#show ip ospf interface ethernet 0 Ethernet0 is up, line protocol is up Internet Address 10.10.10.1/24, Area 0 Process ID 1, Router ID 192.168.45.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State BDR, Priority 1 Designated Router (ID) 172.16.10.1, Interface address 10.10.10.2 Backup Designated router (ID) 192.168.45.1, Interface address 10.10.10.1 Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:06 Index 1/1, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 2, maximum is 2 Last flood scan time is 0 msec, maximum is 4 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 172.16.10.1 (Designated Router) Suppress hello for 0 neighbor(s) http://www.cisco.com/en/US/tech/tk365/tk480/technologies_tech_note09186a0080094056.shtml
QUESTION 235 You are the network technician at Cisco Highway. Cisco Highway has a router that is connected to a Frame Relay WAN link using a serial DTE interface. Your newly appointed Cisco Highway trainee wants to know how the interface clock rate is determined on this router. What will your reply be?
A. It is determined by the CSU/DSU.
B. It is determined by the far end router.
C. It is specified in the clock rate command.
D. It is determined by the Layer 1 bit stream timing. Answer: A
QUESTION 236 You are the network technician at Cisco Highway. You tell your newly appointed Cisco Highway trainee that discontiguous networks in the IP addressing scheme can create problems when a routing protocol tries to identify the next hop. Your trainee now wants to know which routing protocols can be used to minimize the effects of these problems. What would your reply be? (Choose all that apply.)
A. IGRP
B. ICMP
C. OSPF
D. RIP v1
E. RIP v2
F. EIGRP Answer: C, E, F
QUESTION 237 You are the network engineer at Cisco Highway. Your Cisco Highway trainee Jack wants to know which parameter must be supplied when you initialize the IGRP routing process. What should you tell her?
A. The wild card mask
B. The IP address
C. The IP address mask
D. The metric weights
E. The Autonomous System number Answer: E Explanation: You configure IGRP just like RIP, except that the router igrp command has an additional parameter - the autonomous system (AS) number. The term autonomous system refers to a network that is within the control of a single company or organization. The term AS number refers to a number assigned to a single company or organization when it registers its connection to the Internet. However, for IGRP, you do not need a registered AS number. All that is needed for IGRP to work is for all the routers to use the same AS number.
QUESTION 238 You are the network technician at Cisco Highway. Cisco Highway has a switched network. You want to add a new VLAN to the network. Which steps would you take to configure this VLAN? (Choose all that apply.)
A. Create the VLAN.
B. Name the VLAN.
C. Configure an IP address for the VLAN.
D. Add the desired ports to the new VLAN.
E. Add the VLAN to the STP domain. Answer: A B D Explanation: VLAN Configuration for a single switch
- Enabling VTP transparent mode
- Creating the VLAN numbers and names
- Configuring each port's assigned VLAN
QUESTION 239 You are the network administrator at Cisco Highway. The Cisco Highway network has expanded considerably over the last year. It is now one large, cumbersome network. You want to segment the network. What devices can you use? (Choose all that apply.)
A. Hubs
B. Repeaters
C. Switches
D. Bridges
E. Routers Answer: C, D, E
QUESTION 240 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what is specific for a global command. What should you tell her?
A. A command that is available in every release of IOS.
B. A command that can be entered in any configuration mode.
C. A command that supports all protocols.
D. A command that is implemented in all IOS versions.
E. A command that is set once and affects the entire router. Answer: E Explanation: No set rules exist for what commands are global or subcommands. Generally, however, when multiple instances of a parameter can be set in a single router, the command used to set the parameter is likely a configuration subcommand. Items that are set once for the entire router are likely global commands.
QUESTION 241 You are a trainee technician at Cisco Highway. Your instructor wants you to convert the first octet in Class B address range to binary. What would your reply be?
A. 00000111-10001111
B. 00000011-10011111
C. 10000000-10111111
D. 11000000-11011111
E. 11100000-11101111 Answer: C Explanation: Class B First octet range is 128 - 191 Binary value = 10000000-10111111
QUESTION 242 You are a technician at Cisco Highway. You tell your newly appointed Cisco Highway trainee that Ethernet networks are broadcast domains and collision domains. Your trainee wants to know what happens when a collision occurs on the network. What would your reply be? (Choose all that apply.)
A. Each device stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm. Answer: B, D, E
QUESTION 243 You are a technician at Cisco Highway. Cisco Highway plans to implement a public network. The company's ISP suggested that Cisco Highway register a Class IP address. The Cisco Highway CEO wants to know how many usable IP addresses are provided in a Class C address. What would your reply be?
A. 128
B. 192
C. 254
D. 256
E. 510 Answer: C Explanation: Class C addresses range from 192.0.0.1 through 223.225.225.225 and default subnet mask of 255.255.255.0. In Class C addresses, the first 24 bits are used as for the network ID while only the last 8 bits is used for the host ID. Using the 2n-2 formula, we can calculate that Class C addresses can support a maximum of 16,777,214 (224-2) networks and 254 (28-2) hosts.
QUESTION 244 You are the network administrator at Cisco Highway. From your workstation you telnet to a router VTY line. You perform a number of configurations on the router. You now want to terminate the telnet connection. What command must you issue to terminate the Telnet connection?
A. close
B. disable
C. disconnect
D. suspend
E. exit Answer: C Explanation: Terminating a Telnet session Use the disconnect from the router you Telnetted from.
QUESTION 245 You work as a network administrator at Cisco Highway. You are required to configure two routers named Cisco Highway1 and Cisco Highway2. The topology for the Cisco Highway network is shown in the following exhibit:
The enable password is "Cisco Highway". You are required to configure the following passwords on the Cisco Highway2 router:
- Console password: Jack
- Vty lines 0-4 password: king To configure the router click on a host icon that is connected to a router by a serial cable. Answer: Click on Host 4: Router Cisco Highway2: Cisco Highway2>enable Password:Cisco Highway Cisco Highway2#config terminal Cisco Highway2(config)#line console 0 Cisco Highway2(config-line)#login Cisco Highway2(config-line)#password Jack Cisco Highway2(config-line)#exit
Cisco Highway2(config)#line vty 0 4 Cisco Highway2(config-line)#login Cisco Highway2(config-line)#password king Cisco Highway2(config-line)#no shutdown Cisco Highway2(config-line)#exit Cisco Highway2(config)#exit Cisco Highway2#copy running-config startup-config
QUESTION 246 You work as a network administrator at Cisco Highway. You are required to configure two routers named Cisco Highway1 and Cisco Highway2. The network topology is shown in the exhibit. The routers have the following configuration specifications:
- They are named Cisco Highway1 and Cisco Highway2
- The password on both routers is "Cisco Highway".
- They have the following IP addresses Cisco Highway1 E0: 10.0.239.155 Cisco Highway2 No IP address specifications. Your task is to configure the E0 interface on the Cisco Highway1 router. You should use the IP address 10.0.239.155 and the default subnet mask. To configure the router click on a host icon that is connected to a router. Answer: Router Cisco Highway1: Cisco Highway1>enable Password:Cisco Highway Cisco Highway1#config terminal Cisco Highway1(config)#int e 0 Cisco Highway1(config-if)#ip address 10.0.239.155 255.0.0.0 Cisco Highway1(config-if)#no shutdown Cisco Highway1(config-line)#exit Cisco Highway1(config)#exit Cisco Highway1#copy running-config startup-config
QUESTION 247 Which of the following statements describes a converged spanning-tree network?
A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are in the stand-by state.
C. All switch and bridge ports are assigned as either root or designated ports.
D. All switch and bridge ports are in either the forwarding or blocking state.
E. All switch and bridge are either blocking or looping. Answer: D Explanation:
In the above figure, after the network has converged, spanning tree protocol puts each port either in designated (Forwarding) or Non-designated (Blocking) state. So, Choice C is correct.
QUESTION 248 As what type of physical network is a default Frame Relay WAN classified?
A. point-to-point
B. broadcast multi-access
C. nonbroadcast multipoint
D. nonbroadcast multi-access
E. broadcast point-to-multipoint Answer: D Explanation: Frame Relay is a WAN protocol that operates at the physical and data link layers of the Open System Interconnection (OSI) reference model. This protocol is standardized by both the International Telecommunication Union Telecommunications Standardization Sector (ITU-T) and American National Standards Institute (ANSI). Frame Relay uses statistical multiplexing techniques to provide network access in a packet-switched network. It is strictly a Layer 2 protocol suite. Being a Layer 2 protocol enables Frame Relay to offer higher performance WAN applications (such as LAN interconnection) than the older protocols (such as X.25), which incorporated Layer 3 functions. Given these performance benefits, Frame Relay is a popular WAN medium. However, it has some limitations with regard to IP multicast. To illustrate, Frame Relay is a Layer 2 nonbroadcast multi-access (NBMA) network protocol. IP multicast networks are designed to utilize the capabilities of Layer 2 broadcast media such as on a LAN. Reference: http://www.cisco.com/en/US/tech/tk828/tk363/technologies_white_paper09186a00800d6b61.shtml
QUESTION 249 You are the network administrator at Cisco Highway. Cisco Highway has its headquarters in New York, and regional offices in Boston, Buffalo, Cleveland, Pittsburgh and Baltimore. You want to connect the regional offices to headquarters. You are evaluating WAN technologies that could accomplish this. You want each regional office to be connected to the corporate headquarters in a hub and spoke arrangement using a packet-switched technology. Which of the following WAN technologies should you use?
A. ISDN
B. Wireless
C. Frame Relay
D. T1 leased line
E. Point to point leased line Answer: C Explanation: To provide efficient IP multicast support in Frame Relay networks, the underlying Frame Relay network architecture should be designed in a "hub and spoke" topology (hierarchical topology). The hub and spoke topology is also named a "star" topology, because the central hub acts as the center of a star and the connections to the remote sites act as light radiating from the star. In the hub and spoke topology, each remote router may also act as a hub and each connection to another remote site may act as a spoke (in a hierarchical fashion). In a multiple hub topology, the load associated with sending broadcast and multicast data can be distributed across multiple central hub sites rather than concentrated at a single central site. Thus, even though data may require extra hops to get to a particular location, data delivery is more efficient in a hub and spoke network than in other network topologies. This design also provides a scalable, hierarchical network that greatly reduces the resource requirements of the central router, allowing the Frame Relay network to utilize the advantages of IP multicast applications. Reference: http://www.cisco.com/en/US/tech/tk828/tk363/technologies_white_paper09186a00800d6b61.shtml
QUESTION 250 You use the ip access-group 101 in command to apply the following access control list on the e0 interface of router CK1. access-list 101 deny tcp 5.1.1.10 0.0.0.0 5.1.3.0 0.0.0.255 eq telnet access-list 101 permit any any Which of the following will be blocked? (Choose two.)
A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10 Answer: C, D Explanation: CK1: Ethernet is up, line protocol is up Internet address 192.168.1.2/24, Area 0 Process ID 1, Router ID 192.168.31.33, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) 192.168.31.33, Interface address 192.168.1.2 No backup designated router on this network Time intervals configured, Hello 5, Dead 20, Wait 20, Retransmit 5 CK2: Ethernet0 is up, line protocol is up Internet address 192.168.1.1/24, Area 0 Process ID 2, Router ID 192.168.31.11, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) 192.168.31.11, Interface address 192.168.1.1 No backup designated router on this network Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
QUESTION 251 You are a network administrator at Cisco Highway. To routers on the Cisco Highway network, router CK1 and router CK2 are configured to run OSPF. However, the two routers cannot establish an adjacency relationship on their common Ethernet link. In troubleshooting this problem you issue the show ip ospf interface e0 command for routers CK1 and CK2. The output from the command is shown in the following exhibit: CK1: Ethernet is up, line protocol is up Internet address 192.168.1.2/24, Area 0 Process ID 1, Router ID 192.168.31.33, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) 192.168.31.33, Interface address 192.168.1.2 No backup designated router on this network Time intervals configured, Hello 5, Dead 20, Wait 20, Retransmit 5 CK2: Ethernet0 is up, line protocol is up Internet address 192.168.1.1/24, Area 0 Process ID 2, Router ID 192.168.31.11, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) 192.168.31.11, Interface address 192.168.1.1 No backup designated router on this network Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Based on the exhibit, what is the probable cause of this problem?
A. The OSPF area is misconfigured.
B. The priority on CK2 should be set lower.
C. The cost on CK2 should be set lower.
D. The hello and dead timers are misconfigured.
E. You need to add a backup designated router to the network.
F. The OSPF process ID numbers do not match. Answer: D Explanation: OSPF routers must have the same hello intervals and the same dead intervals to exchange information. By default, the dead interval is four times the value of the hello interval. This means that a router has four chances to send a hello packet before being declared dead. On broadcast OSPF networks, the default hello interval is 10 seconds and the default dead interval is 40 seconds. On nonbroadcast networks, the default hello interval is 30 seconds and the default dead interval is 120 seconds. These default values result in efficient OSPF operation and seldom need to be modified.
QUESTION 252 You are a network administrator at Cisco Highway. Your assistant has been attempting to establish a link between interface s0/0 on router CK1 and interface s0/0 on router CK2 but his attempts have failed. He asks for your assistance. You issue the show interface s0/0 command on router CK1 and router CK2. The output from the show interface s0/0 commands is shown in the following exhibit: CK1: Serial0/0 is up, line protocol is down Hardware is HD64570 Internet address is 210.93.105.1/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set Keepalive set (10 sec) CK2: Serial0/0 is up, line protocol is down Hardware is HD64570 Internet address is 210.93.105.2/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, loopback not set Keepalive set (10 sec) Based on the exhibit, what is the most likely cause of this problem?
A. The loopback is not set.
B. The serial cable is faulty.
C. The subnet mask is not configured properly.
D. The IP address is not configured properly.
E. The Layer 2 frame types are not compatible. Answer: E Explanation: Router#sh int s0/0 Serial0/0 is up, line protocol is down If you see that the line is up but the protocol is down, as just above, you are experiencing a clocking (keepalive) or framing problem. Check the keepalives on both ends to make sure that they match, that the clock rate is set if
needed, and that the encapsulation type is the same on both ends. This up/down status would be considered a Data Link Layer (Layer 2) problem.
QUESTION 253 You are the network administrator at Cisco Highway. The RIP routing protocol is being used on the Cisco Highway network. RIP is configured with default settings and equal cost load balancing. The Cisco Highway network has six paths with the same metric and administrative distance for a single destination. Which of the six paths will RIP use to reach the destination?
A. Only the first two paths that are learned.
B. Four of the paths.
C. All six routes in a routed robin fashion.
D. The oldest two paths in the routing table.
E. The first path learned to the destination network. Answer: E Explanation: To set the maximum number of routes that RIP can insert into the routing table., use the rip equal-cost command Enter a number from 1 to 15. The default is 1. For example: (config)# rip equal-cost 4 To reset the number of routes to the default value of 1, enter: (config)# no rip equal-cost
QUESTION 254 You are the network administrator at Cisco Highway. You want to configure a default route to any destination network not found in the routing table on router CK1. Which of the following commands can you issue?
A. CK1(config)# ip default-route 0.0.0.0 255.255.255.255 s0
B. CK1(config)# ip route 0.0.0.0 255.255.255.255 s0
C. CK1(config)# ip default-route 0.0.0.0 s0
D. CK1(config)# ip route 0.0.0.0 0.0.0.0 s0
E. CK1(config)# ip route any any e0 Answer: D Explanation: The ip default-network command and the ip route 0.0.0.0 0.0.0.0 commands accomplish the goal of having the router use a known route as the default for packets that are not matched in the routing table. The ip route 0.0.0.0
0.0.0.0 command uses the fact that network 0.0.0.0 is used by Cisco IOS software to represent the default network.
QUESTION 255 You are the network administrator at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know which protocol uses both tcp and udp ports. What will your reply be?
A. FTP
B. TFTP
C. SMTP
D. Telnet
E. DNS Answer: E Explanation:
A. RIP v1
B. RIP v2
C. IGRP
D. EIGRP
E. OSPF
F. VLSM Answer: C, D Explanation: In general, load balancing is the capability of a router to distribute traffic over all its network ports that are the same distance from the destination address. Load balancing increases the utilization of network segments, thus increasing effective network bandwidth. There are two types of load balancing: equal cost path and unequal cost path. Every routing protocol supports equal cost path load balancing. In addition to that, IGRP and EIGRP also support unequal cost path load balancing, which is known as variance. The variance command instructs the router to include routes with a metric less than n times the minimum metric route for that destination, where n is the number specified by the variance command. The variable n can take a value between 1 and 128, with the default being 1, which means equal cost load balancing (variance
QUESTION 258 You are the network administrator at Cisco Highway. Cisco Highway users report that they cannot access resources on the LAN attached to interface e0 of router CK1. You want to view the current IP addressing and the Layer 1 and Layer 2 status of this interface. Which of the following commands could you use? (Choose three.)
A. CK1# show version
B. CK1# show protocols
C. CK1# show interfaces
D. CK1# show controllers
E. CK1# show ip interface
F. CK1# show startup-config Answer: C, D, E Explanation: show interfaces is used to see the IP addresses and layer 2 information configured on the interfaces. show controllers is used to see the layer 1 statistics. It tells about the V.35 cables whether they are physically attached or not. show ip interfaces is used to see the IP addresses configured on the interfaces.
QUESTION 259 You are the network administrator at Cisco Highway. Your need to design an IP addressing scheme to support a nationwide network. Cisco Highway needs a minimum of 300 sub-networks, each of which must support a maximum of 50 host addresses. Cisco Highway has been assigned a Class B address by its ISP. Which of the following subnet masks will support the appropriate addressing scheme? (Choose two.)
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0
Answer: B, E Explanation: Requirement in the question is that the company needs 300 subnets and 50 hosts per subnet. Number of Bits in the Host or Subnet Field Maximum number of Hosts or Subnets (2x -2) 1 0 2 2 3 6 4 14 5 30 6 62 7 126 8 254 9 510 10 1022 11 2046 12 4094 13 8190 14 16,382 With 9-bits of subnetting, we get 510 subnets and 7-bits of hosts getting 128 hosts/subnet. Subnet mask will be 255.255.255.128 With 10-bits of subnetting, we get 1022 subnets and 6-bits of hosts getting 64 hosts/subnet. Subnet mask will be 255.255.255.192 which fulfils the requirement.
QUESTION 260 Which of the following routing protocols minimize the effects of the problems created by discontiguous networks? (Choose three.)
A. RIP v1
B. RIP v2
C. EIGRP
D. IGRP
E. OSPF
F. VLSM Answer: B, C, E Explanation: OSPF provides support for discontiguous networks, since every area has a collection of networks and OSPF attaches a mask to each advertisement. RIPv1 and IGRP are classful protocols. Whenever RIP advertises a network across a different major net boundary, RIP summarizes the advertised network at the major net boundary. http://www.cisco.com/en/US/tech/tk365/tk480/technologies_q_and_a_item09186a0080094704.shtml#q7
QUESTION 261 You are the network administrator at Cisco Highway. Your Cisco Highway trainee is working in a lab that has a Frame Relay network in which Inverse ARP is not operational. She wants to know which command would provide connectivity in this network. What will your reply be?
A. frame-relay arp
B. frame-relay map C. frame-relay interface-dlci
D. frame-relay lmi-type Answer: C Explanation: interface serial0 encapsulation frame-relay ! interface serial 0.3 point-to-point ip address 140.1.3.4 255.255.255.0 frame-relay interface-dlci 51 ! interface Ethernet 0 ip address 140.1.14.4 255.255.255.0 Again, defaults abound in this configuration, but some defaults are different than when you're configuring on the main interface, as in the preceding example. The LMI type is auto send, and Cisco encapsulation is used, which is just like the fully-meshed example. However, Inverse ARP is disabled on each point-to-point subinterface by default. As you will see, Inverse ARP is not needed with point-to-point subinterfaces. Two new commands create the configuration required with point-to-point subinterfaces. First, the interface serial 0.1 point-to-point command creates logical subinterface number 1 under physical interface Serial0. The frame-relay interface-dlci subinterface subcommand then tells the router which single DLCI is associated with that subinterface.
QUESTION 262 You are the network administrator at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what VLAN frame encapsulation types may be configured on a Catalyst switch. What will your reply be? (Choose two.)
A. VTP
B. ISL
C. CDP
D. 802.1Q
E. 802.1p
F. LLC Answer: B, D Explanation: Trunks are used to carry traffic belonging to multiple VLANs between devices over the same link. A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1q are two types of encapsulations used to carry data from multiple VLANs over trunk links. ISL is a Cisco proprietary protocol for interconnecting multiple switches and maintaining VLAN information as traffic goes between switches. ISL provides VLAN trunking capabilities while maintaining full wire speed performance on Ethernet links in full-duplex or half-duplex mode. ISL operates in a point-to-point environment and will support up to 1000 VLANs. In ISL, the original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receiving end, the header is removed and the frame is forwarded to the assigned VLAN. .ISL uses Per VLAN Spanning Tree(PVST) which runs one instance of Spanning Tree Protocol (STP) per VLAN. PVST allows to optimize root switch placement for each VLAN and supports load balancing of VLANs over multiple trunk links. 802.1Q is the IEEE standard for tagging frames on a trunk and supports upto 4096 VLANs. In 802.1Q, the trunking device inserts a four-byte tag into the original frame and recomputes the Frame Check Sequence (FCS) before sending the frame over the trunk link. At the receiving end, the tag is removed and the frame is forwarded to the assigned VLAN. 802.1Q does not tag frames on the native VLAN. It tags all other frames transmitted and received on the trunk. While configuring 802.1 trunk, you must make sure that the same native VLAN is configured on both sides of the trunk. IEEE 802.1Q defines a single instance of spanning tree running on the native VLAN for all the VLANs in the network which is called Mono Spanning Tree (MST). This lacks the flexibility and load balancing capability of PVST available with ISL. However, PVST+ offers the capability to retain multiple Spanning Tree topologies with 802.1Q trunking. Reference:
http://www.cisco.com/en/US/tech/tk389/tk390/technologies_tech_note09186a0080094665.shtml
QUESTION 263 You are the network administrator at Cisco Highway. You need to configure a default route on the Cisco Highway network. Which the following IOS commands could you use? (Choose two.)
A. CK1(config)# ip route 0.0.0.0 0.0.0.0 E0
B. CK1(config)# ip route 0.0.0.0 255.255.255.255 S0
C. CK1(config-router)# ip route 255.255.255.255 0.0.0.0 192.168.1.21
D. CK1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.21
E. CK1(config)# ip route 0.0.0.0 192.168.1.21 255.255.255.255
F. CK1# ip default-network 0.0.0.0 192.168.1.21 255.255.255.255 Answer: A, D Explanation: The ip default-network command and the ip route 0.0.0.0 0.0.0.0 commands accomplish the goal of having the router use a known route as the default for packets that are not matched in the routing table. The ip route 0.0.0.0
0.0.0.0 command uses the fact that network 0.0.0.0 is used by Cisco IOS software to represent the default network. Reference: CCNA ICND Exam Certification Guide By Wendell Odem Pg.524
QUESTION 264 You are the newly appointed Cisco Highway trainee. Your supervisor tells you that the IP address for your workstation is 172.16.209.10/22. He wants to know what the subnetwork number of your workstation is. What will your reply be?
A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0 Answer: C Explanation: 172.16.209.10/22 means 10101100.00010000.11010001.00001010 in binary form. Network portion is 22 bits that means 10101100.00010000.110100001.00001010 Converting the network portion to decimal results in the address 172.16.208.0/22
QUESTION 265 With regard to classless routing protocols, which of the following statements are true? (Choose two.)
A. Discontiguous subnets are not allowed.
B. Variable length subnet masks are allowed.
C. RIP v1 is a classless routing protocol.
D. IGRP supports classless routing within the same autonomous system.
E. RIP v2 supports classless routing. Answer: B, E Explanation: Classless and Classful Routing Protocols Some routing protocols must consider the Class A, B, or C network number that a subnet resides in when performing some of its tasks. Other routing protocols can ignore Class A, B, and C rules altogether. Routing protocols that must consider class rules are called classful routing protocols; those that do not need to consider class rules are called classless routing protocols. You can easily remember which routing protocols fall into each category because of one fact: Classful routing protocols do not transmit the mask information along with the subnet number, whereas classless routing protocols do transmit mask information. You might recall that routing protocols that support VLSM do so because they send mask information along with the routing information. Table 7-3 lists the routing protocols and whether they transmit mast information, support VLSM, and are classless or classful. Table 7-3 Interior IP Routing Protocol: Classless or Classful?CCNA ICND Exam Certification Guide by Wendell Odem Pg.233
QUESTION 266 You are the network administrator at Cisco Highway. You issue the show ip route command on a router during routine maintenance. The output from the show ip route command indicates a network that is advertised by both RIP and IGRP as an IGRP route. Your Cisco Highway assistant wants to know why the RIP route to the network is not used in the routing table. What will your reply be?
A. IGRP has a faster update timer.
B. IGRP has a lower administrative distance.
C. RIP has a higher metric value for that route.
D. The IGRP route has fewer hops.
E. The RIP path has a routing loop. Answer: B Explanation: To device which route to use, IOS uses a concept called administrative distance. Administrative distance is a number that denotes how to believable an entire routing protocol is on a single router. The lower the number, the better, or more believable, the routing protocol. For instance, RIP has a default administrative distance of 120, and IGRP defaults to 100, making IGRP more believable than RIP. So, when both routing protocols learn
routes to the same subnet, the router adds only the IGRP route to the routing table. Reference: CCNA ICND Exam Certification Guide by Wendell Odem Pg.177
QUESTION 267 You are the network administrator at Cisco Highway. Your assistant was unsuccessful in adding VLAN 50 to a switch. In troubleshooting the problem, you issue the show vtp status command. The output of the show vtp status command is displayed in the following exhibit. CK2# show vtp status VTP Version :2 Configuration Revision :7 Maximum VLANs supported local :68 Number of existing VLANs :8 VTP Operating Mode :Client VTP Domain Name :corp VTP Pruning Mode :Disabled VTP V2 Mode :Disabled VTP Traps Generation :Disabled MD5 digest :0x22 0xF3 0x1A Configuration last modified by 172.18.22.15 at 5-28-03 1t:53:20 What commands must be issued on this switch to add VLAN 50 to the database? (Choose two.)
A. CK2(config-if)# switchport access vlan 50
B. CK2(vlan)# vtp server
C. CK2(config)# config-revision 20
D. CK2(config)# vlan 50 name Tech
E. CK2(vlan)# vlan 50
F. CK2(vlan)# switchport trunk vlan 50 Answer: B, E Explanation: VTP operates in one of three modes:
- Server mode
- Client mode
- Transparent mode For VTP to exchange information, some switches act as servers, and some act as clients. VTP servers can create, modify, and delete VLANs and other configuration parameters for the entire VTP domain; this information, in turn, is propagated to the VTP clients and servers in that same domain. VTP servers save VLAN configurations in the Catalyst NVRAM, whereas in clients, the VLAN configuration is not stored at all. A VTP client cannot create, change or delete VLANs, nor can it save VLAN configurations in non-volatile memory. switchport mode {access | dynamic {auto | desirable} | trunk} Interface subcommand that configured the Interface for trunking.
QUESTION 268 You are the network administrator at Cisco Highway. The Cisco Highway network has the address of 192.1.1.0/24 and is using RIP as the routing protocol. A portion of the network is shown in the following exhibit: You want to configure router CK1 for LAN-to-LAN communication with router CK2. Which series of commands should you issue? (Choose three.)
A. CK1(config)# interface ethernet 0 CK1(config-if)# ip address 192.1.1.129 129.255.255.192 CK1(config-if)# no shutdown
B. CK1(config)# interface ethernet 0 CK1(config-if)# ip address 192.1.1.97 255.255.255.192 CK1(config-if)# no shutdown
C. CK1(config)# interface serial 0 CK1(config-if)# ip address 192.1.1.4 255.255.255.252 CK1(config-if)# clock rate 56000
D. CK1(config)# interface serial 0 CK1(config-if)# ip address 192.1.1.6 255.255.255.252 CK1(config-if)# no shutdown
E. CK1(config)# router rip CK1(config-router)# network 192.1.1.4 CK1(config-router)# network 192.1.1.128
F. CK1(config)# router rip CK1(config-router)# version 2 CK1(config-router)# network 192.1.1.0 Answer: A, D, F Explanation: Subnetting a Class C Address We start by using the first subnet mask available with a Class C address, which borrows 2 bits for subnetting. For this example, I'll be using 255.255.255.192. To review the binary translation of 192: 192 = 11000000 Here, the 1s represent the subnet bits, and the 0s represent the host bits available in each subnet. 192 provides 2 bits for subnetting and 6 bits for defining the hosts in each subnet. What are the subnets? Since the subnet bits can't be both off or on at the same time, the only two valid subnets are these: 01000000 = 64 (all host bits off) revealing host addresses from .65------.127 10000000 = 128 (all host bits off) revealing host addresses from .129------.190 The valid hosts would be defined as the numbers between the subnets, minus the all-host-bits-off and all-host-bits-on numbers. In Choice A valid host is configured on E0 interface of the router 192.1.1.129/26 so it is correct. Choice D is correct because each WAN link uses the /30 or 255.255.255.252 mask revealing 2 valid host addresses. Serial 0 is configured with the address 192.1.1.6/30 . This is from the subnet 192.1.1.4/30 . Valid hosts in this subnet are 192.1.1.5/30 and 192.1.1.6/30 Choice F is correct because we have done subnetting in the scenario and Ripv1 doesn't carry the subnet information so we'll have to use Ripv2 which supports subnetting and can carry subnet information.
QUESTION 269 You are the network administrator at Cisco Highway. A portion of the network is shown in the following exhibit: You configure a static route to the 10.5.6.0/24 network on router Cisco Highway. You want router Cisco Highway to treat this static route as the most reliable route. Which command should you use?
A. Cisco Highway(config)# ip route 10.5.6.0 0.0.0.255 fa0/0
B. Cisco Highway(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6
C. Cisco Highway(config)# ip route 10.5.6.0 255.255.255.0 fa0/0
D. Cisco Highway(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6
E. Cisco Highway(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0
F. Cisco Highway(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0 Answer: C, D Explanation: Here is the command you use to add a static route to a routing table: Ip route [destination_network] [mask] [next-hop_address or exit interface] [administrative_distance][permanent] This list describes each command in the string: ip route The command used to create the static route. destination network The network you're placing in the routing table. mask The subnet mask being used on the network. next-hop address The address of the next-hop router that will receive the packet and forward it to the remote network. This is a router interface that's on a directory connected network. You must be able to ping the router interface before you add the route. If you type in the wrong next-hop address, or the interface to that router is down, the static route shows up the router's configuration, but not in the routing table. administrative_distance By default, static routes have an administrative distance of 1. You can change the default value by adding an administrative weight at the end of the command. This is a subject I'll talk a lot more about later in the chapter when I get the section on dynamic routing.
QUESTION 270 You are the network administrator at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what router functions are. What will your reply be? (Choose three.)
A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internet work communication Answer: A, C, F Explanation: The first suggestion states that you should create the ACLs outside the router using an editor. That way, if you make mistakes when typing, you can fix them in the editor. Why the big deal for ACLs? Well, with numbered ACLs, to delete a single line, you have to delete the whole ACL and reenter all the commands-in order. Also, even if you create the ACL correctly, you might later want to add a line to it---in the middle of the list! If you do, with numbered ACLs, you have to delete the whole list and then reenter all the lines in order. Having the ACLs stored somewhere outside the routers makes your life easier. The second and third points deal with the concept of where to locate your ACLs. If you are going to filter a packet, filtering closer to the packets source means that the packet takes up less bandwidth in the network, which seems to be more efficient-and it is. Therefore, Cisco suggest locating extended ACLs as close to the source as possible.
QUESTION 271 With regard to the DHCP Discover message, which of the following are true? (Choose two.)
A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.
B. The DHCP Discover message uses UDP as the transport layer protocol.
C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.
D. The DHCP Discover message uses TCP as the transport layer protocol.
E. The DHCP Discover message does not use a Layer 2 destination address.
F. The DHCP Discover message does not require a transport layer protocol. Answer: A, B Explanation: DHCP uses UDP as its transport protocol. DHCP messages from a client to a server are sent to the 'DHCP server' port (67), and DHCP messages from a server to a client are sent to the 'DHCP client' port (68). DHCP messages broadcast by a client prior to that client obtaining its IP address must have the source address field in the IP header set to 0. The client broadcasts a DHCP DISCOVER message on its local physical subnet. The DHCP DISCOVER message may include options that suggest values for the network address and lease duration. BOOTP relay agents may pass the message on to DHCP servers not on the same physical subnet. Each server may respond with a DHCP OFFER message that includes an available network address in the 'yiaddr' field (and other configuration parameters in DHCP options). Servers need not reserve the offered network address, although the protocol will work more efficiently if the server avoids allocating the offered network address to another client. The server unicasts the DHCP OFFER message to the client (using the DHCP/BOOTP relay agent if necessary) if possible, or may broadcast the message to a broadcast address (preferably 255.255.255.255) on the client's subnet. http://www.faqs.org/rfcs/rfc1541.html
QUESTION 272 You are the network administrator at Cisco Highway. You want to configure the VLAN trunking protocol to communicate VLAN information between two switches. What must you do? (Choose two.)
A. Set each end of the trunk line to IEEE 802.1E encapsulation.
B. Set the same VTP management domain name on both switches.
C. Set all ports on the two switched as access ports.
D. Configure one of the two switches as a VTP server.
E. Connect the two switches using a rollover cable.
F. Use a router to forward VTP traffic between the VLANs. Answer: B, D Explanation: Here's a list of some of the benefits VTP has to offer:
- Consistent VLAN configuration across all switches in the network.
- VLAN trunking over mixed networks, like Ethernet to ATM LANE or even FDDI.
- Accurate tracking and monitoring of VLANs.
- Dynamic reporting of added VLANs to all switches.
- Plug-and-play VLAN adding Very cool-yes, but before you can get VTP to manage your VLANs across the network, you have to create a VTP server. All servers that need to share VLAN information must use the same domain name, and a switch can only be in one domain at a time. This means that a switch can only share VTP domain information with other switches if they're configured into the same VTP domain. You can use a VTP domain if you have more than one switch connected in a network, but if you've got all your switches in only one VLAN, you don't need to use VTP. VTP information is sent between switches via a trunk port. Switches advertise VTP management domain information, as well as a configuration revision number and all known VLANs with any specific parameters. There's also something called VTP transparent mode, in it, you can configure switches to forward VTP information through trunk ports, but not to accept information updates or update their VTP databases. If you find yourself having problems with users adding switches to your VTP domain, you can include passwords, but don't forget that every switch must be set up with the same password-this can get ugly.
QUESTION 273 A series of Switches are connected as shown in the following exhibit: Which portion contains both the potential networking problem and the protocol or setting that would be used to prevent this problem?
A. routing loops, hold down timers
B. switching loops, split horizon
C. routing loops, split horizon
D. switching loops, VTP
E. routing loops, STP
F. switching loops, STP Answer: F Explanation: Spanning-Tree Protocol (STP) prevents loops from being formed when switches or bridges are interconnected via multiple paths. Spanning-Tree Protocol implements the 802.1D IEEE algorithm by exchanging BPDU messages with other switches to detect loops, and then removes the loop by shutting down selected bridge interfaces. This algorithm guarantees that there is one and only one active path between two network devices. http://www.cisco.com/en/US/tech/tk389/tk621/tk5/tech_protocol_home.html
QUESTION 274 With regard to the OSPF Hello protocol, which of the following statements are true? (Choose two.)
A. The OSPF Hello protocol provides dynamic neighbor discovery.
B. The OSPF Hello protocol detects unreachable neighbors in 90 second intervals.
C. The OSPF Hello protocol maintains neighbor relationships.
D. The OSPF Hello protocol negotiates correctness parameters between neighboring interfaces.
E. The OSPF Hello protocol uses timers to elect the router with the fastest links at the designated router.
F. The OSPF Hello protocol broadcast hello packets throughout the internet work to discover all routers that are running OSPF. Answer: A, C Explanation: The Hello Packet OSPF contains a protocol (the Hello protocol) that is used to establish and maintain relationships between neighboring nodes. These relationships are called adjacencies. Adjacencies are the basis for the exchange of routing data in OSPF. It is through the use of this protocol, and packet type, that an OSPF node discovers the other OSPF nodes in its area. Its name is intentionally significant; the Hello protocol establishes communications between potential neighboring routers. The Hello protocol uses a special sub packet structure that is appended to the standard 24-octet OSPF header. Together, these structures form a hello packet. All routers in an OSPF network must adhere to certain conventions that must be uniform throughout the network. These conventions include the following:
- The network mask
- The interval at which hello packets will be broadcast (the hello interval)
- The amount of time that must elapse before a non responding router will be declared dead (that is, the router dead interval) by the other routers in the network
- All routers in an OSPF network must agree to use the same value for each of these parameters; otherwise, the network might not operate properly. These parameters are exchanged using hello packets. Together, they comprise the basis for neighborly communications. They ensure that neighbor relationships (known as adjacencies) are not formed between routers in different subnets and that all members of the network agree on how frequently to stay in contact with each other. The hello packet also includes a listing of other routers (using their unique router IDs) that the source router has recently been in contact with. This field, the Neighbor field, facilitates the neighbor discovery process. The hello packet also contains several other fields such as Designated Router and Backup Designated Router. These fields are useful in maintaining adjacencies and support the operation of the OSPF network in both periods of stability and convergence.
QUESTION 275 Which of the following layers are part of the TCP/IP model? (Choose three.)
A. application layer
B. session layer
C. transport layer
D. internet layer
E. network layer
F. data link layer
G. physical layer Answer: A, C, D Explanation: TCP/IP's architecture does not use the presentation and session layers. The application layer protocols use the transport layer services directly. The OSI transport layer provides connection-oriented service; in TCP/IP, this service is provided by TCP. TCP/IP also provides connectionless service in the transport layer with UDP. The Internet layer of TCP/IP corresponds to the network layer of the OSI model. Although OSI network-layer protocols provide connection-oriented (Connection-Model Network Service (CMNS), X.25) or Connectionless Network Service (CLNS), IP provides only connectionless network service. The routing protocols are network layer protocols with an IP protocol number. CCNA ICND Exam Certification Guide by Wendell Odem Reference: Pg.268
QUESTION 276 You are the network administrator at Cisco Highway. The Cisco Highway network is shown in the following exhibit:
With regard to the routing decision router A will make to reach router E, which of the following statements are true? (Choose three.)
A. Router A will determine that all paths have an equal cost if RIP is the routing protocol.
B. Router A will install only the ADE path in its routing table if RIP is the routing protocol.
C. Router A will determine that path ACE has the lowest cost if IGRP is the routing protocol.
D. Router A will determine that path ADE has the lowest cost if IGRP is the routing protocol.
E. Router A will use the route information learned by IGRP if both RIP and IGRP are configured on router A.
F. Router A will use the route information learned by RIP if both RIP and IGRP are configured on router A. Answer: A, D, E Explanation: Choice E is correct because:
IGRP's default administrative distance is 100; RIP's default administrative distance is 120. And the protocol with less administrative distance is always preferred. IGRP can load-balance up to six unequal links. RIP networks must have the same hop count to load-balance, whereas IGRP uses bandwidth to determine how to load-balance. To load-balance over unequal-cost links, you must use the variance command, which controls the load balancing between the best metric and the worst acceptable metric. Speed of T3 line is 45Mbps and IGRP uses BW as a metric for the shortest path selection so it will use the route via Routers ADE so, choice D is correct.
QUESTION 277 You are a network administrator at Cisco Highway. You want to deny network traffic from a specific host. Which access list statement should you use?
A. Router(config)# access-list 1 deny 172.31.212.74 any
B. Router(config)# access-list 1 deny 10.6.111.48 host
C. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0
D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0
E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255 Answer: C
QUESTION 278 Your newly appointed Cisco Highway trainee wants to know at what layers of the OSI reference model a WANs operates. What will your reply be? (Choose two.)
A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
E. Network layer
F. Data link layer
G. Physical layer Answer: E, F Explanation: Drag the characteristics on the left to the associated routing protocol on the right. (Not all characteristics will be used.)
Answer:
QUESTION 280 Which of the following are general recommendations for the placement of access control lists? (Choose two.)
A. You should place standard ACLS as close as possible to the source of traffic to be denied.
B. You should place extended ACLS as close as possible to the source of traffic to be denied.
C. You should place standard ACLS as close as possible to the destination of traffic to be denied.
D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied. Answer: B, C
QUESTION 281 You are the network administrator at Cisco Highway. The Cisco Highway network encapsulates an ISDN link with PPP instead of HDLC. You newly appointed Cisco Highway trainee wants to know what advantages this represents. What will your reply be? (Choose two.)
A. PPP is easier to configure and maintain than HDLC.
B. PPP is consistently implemented among different equipment vendors.
C. PPP will run faster and more efficiently than HDLC on circuit-switched ISDN links.
D. PPP authentication will prevent unauthorized callers from establishing an ISDN circuit.
E. PPP can be routed across public facilities, while HDLC is not routable in circuit-switched networks. Answer: B, D
QUESTION 282 You are the network administrator at Cisco Highway. You want to configure a switch port to use the IEEE standard method of inserting information about VLAN membership into Ethernet frames. Which command should you use?
A. Switch(config)# switchport trunk encapsulation isl
B. Switch(config)# switchport trunk encapsulation ietf
C. Switch(config)# switchport trunk encapsulation dot1q
D. Switch(config-if)# switchport trunk encapsulation isl
E. Switch(config-if)# switchport trunk encapsulation ietf
F. Switch(config-if)# switchport trunk encapsulation dot1q Answer: C
QUESTION 283 Your newly appointed Cisco Highway trainee wants to know which of the following are spanning tree switch port states. What will your reply be? (Choose three)
A. learning
B. spanning
C. listening
D. forwarding
E. initializing
F. filtering Answer: A, C, D Explanation:
QUESTION 284 Cisco Highway has been assigned the CIDR block of 115.64.4.0/22 for its public network. Which of the following IP addresses can Cisco Highway use on its public network?
A. 115.64.8.32
B. 115.64.7.64
C. 115.64.6.255
D. 115.64.3.255
E. 115.64.5.128
F. 115.64.12.128 Answer: B, C, E
QUESTION 285 You are the network technician at Cisco Highway. Two routers on the Cisco Highway network, Router CK1 and Router CK2 are configured with RIP only. Router CK1 receives a routing update with a higher cost path to a remote network that is already in its routing table. What will Router CK1 do?
A. It will ignore the update and take no further action.
B. It will add the update information to its routing table.
C. It will replace the existing routing table entry with the update information.
D. It will delete the existing routing table and will send out hello packets to rebuild the routing table. Answer: A
QUESTION 286 The Cisco Highway network has a conferencing system that uses Voice over IP. The system uses UDP datagrams to send the voice data between communicating hosts. Your newly appointed Cisco Highway trainee wants to know what will happen if the datagrams out of sequence arrive at their destination when the network becomes busy. What will your reply be?
A. UDP will send an ICMP Information Request to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
C. UDP will drop the datagrams.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
E. UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams. Answer: C
QUESTION 287 You are the network administrator at Cisco Highway. You are troubleshooting an EIGRP problem on Router CK1. You want to check the IP addresses as well as the retransmit interval and the queue counts for the devices which have established an adjacency with Router CK1. What command should you issue?
A. CK1#show ip eigrp adjacency
B. CK1#show ip eigrp topology
C. CK1#show ip eigrp interfaces
D. CK1#show ip eigrp neighbors Answer: D
QUESTION 288 You are the CEO at Cisco Highway. The network administrator has left the company unexpectedly. Cisco Highway is experiencing problems with its Internet connection. You retrieve the following interconnection diagram from the equipment room.
Based on the diagram, what type of Internet connection could Cisco Highway have? (Choose two)
A. DSL
B. Frame Relay
C. ISDN
D. Dedicated T1
E. Wireless
F. POTS Answer: B, C
QUESTION 289
You are the network administrator at Cisco Highway. You have attempted to Telnet from the console port on Cisco Highway1 to 192.1.2.65 but failed. You can ping 192.1.2.65 successfully. What is the probable cause of this problem? (Choose two)
A. PPP authentication configuration problem.
B. A misconfigured IP address or subnet mask
C. An access control list
D. A defective serial cable.
E. No clock rate on interface s0 on Cisco Highway2
F. A missing vty password. Answer: C, F
QUESTION 290 You are the network administrator at Cisco Highway. The routing table on a Cisco Highway router is shown in the following graphic:
The router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. What will the router do with this packet?
A. It will encapsulate the packet as Frame Relay and forward it out of interface Serial 0/0.117.
B. It will drop the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0.
C. It will forward the packet out of interface Serial 0/1 and send an ICMP Echo Reply message out of interface Serial 0/0.102.
D. It will encapsulate the packet to an APR frame and forward it out of FastEthernet 0/0. Answer: BWith regard to the graphic,
QUESTION 291 which of the following are valid configuration values for hosts? (Choose three)
A. host TESCK1 IP address: 192.1.1.65
B. host TESCK1 subnet mask: 255.255.255.224
C. host TESCK2 IP address: 192.1.1.25
D. host TESCK2 default gateway: 192.1.1.166
E. host TESCK3 IP address: 192.1.1.166
F. host TESCK3 IP subnet mask: 255.255.255.224 Answer: C, D, F
QUESTION 292 Your newly appointed Cisco Highway trainee wants to know what requirements must be met before you can configure the VLAN trunking protocol to communicate VLAN information between two switches. What will your reply be?
A. You must set each end of the trunk line to IEEE 802.1e encapsulation.
B. You must set the same VTP management domain name on both switches.
C. You must set all ports on the two switches as access ports.
D. You must configure one of the switches as a VTP server.
E. You must use a rollover cable to connect the two switches.
F. You must use a router to forward VTP traffic between VLANs. Answer: B, D
QUESTION 293 You are the network administrator at Cisco Highway.com. The Cisco Highway network uses RIP as its routing protocol. A portion of the Cisco Highway network is shown in the following exhibit: You want to create a gateway of last resort. What command should you issue?
A. Cisco Highway1(config)# ip route 172.16.4.2 0.0.0.0 0.0.0.0
B. Cisco Highway1(config)# ip route 0.0.0.0 0.0.0.0 S1
C. Cisco Highway1(config)# ip route 172.16.4.1 0.0.0.0 0.0.0.0
D. Cisco Highway1(config)# ip route S0 0.0.0.0 0.0.0.0
E. Cisco Highway1(config)# ip route 0.0.0.0 0.0.0.0 172.16.4.2 Answer: E
QUESTION 294 Your newly appointed Cisco Highway trainee wants to know which WAN encapsulations can be configured on an asynchronous serial connection. What will your reply be?
A. PPP and ATM
B. PPP and SDLC
C. ATM and HDLC
D. SDLC and HDLC Answer: A
QUESTION 295 Your Cisco Highway trainee wants to know which VLANs are allowed over a new trunk link that is configured on an IOS based switch. What will your reply be?
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command. Answer: C
QUESTION 296 You are the network administrator at Cisco Highway. You want to configure a default route to any destination not found in the routing table. What command should you use?
A. Router(config)# ip default-route 0.0.0.0 255.255.255.255 s0
B. Router(config)# ip route 0.0.0.0 255.255.255.255 s0
C. Router(config)# ip default-route 0.0.0.0 0.0.0.0 s0
D. Router(config)# ip route 0.0.0.0 0.0.0.0 s0
E. Router(config)# ip route any any e0 Answer: D
QUESTION 297 You are the network administrator at Cisco Highway. You are asked to provide an ISDN WAN link for the Cisco Highway network. A modular Cisco router with 2 serial connections and a BRI/U interface is the only available router. You want to adapt this router for the ISDN connection. What should you do?
A. Do nothing. The router is already suitable.
B. Purchase and install a BRI WAN interface in the router.
C. Purchase an external NT1 to terminate the local loop.
D. Purchase and install a TA/NT1 device on the router. Answer: A
QUESTION 298 You are a network administrator at Cisco Highway.com. You are required to Cisco router for a Frame-Relay connection to a non-cisco router. Which of the following commands should you use?
A. CertK Router(Config-if)# Encapsulation frame-relay q933a
B. CertK Router(Config-if)# Encapsulation frame-relay ansi
C. CertK Router(Config-if)# Encapsulation frame-relay ietf
D. CertK Router(Config-if)# Encapsulation frame-relay isl Answer: C Explanation: In general, the IETF Frame Relay encapsulation should be used when connecting a Cisco router to non-Cisco equipment across a Frame Relay network. The IETF Frame Relay encapsulation allows interoperability between equipment from multiple vendors. http://www.ciscopress.com/articles/article.php?p=170741&seqNum=2 [Both Cisco and IETF encapsulations for Frame Relay can be configured on a per-virtual-circuit (VC) basis.
This gives greater flexibility when configuring Frame Relay in a multivendor environment. A user can specify the Frame Relay encapsulation types to be used on different virtual circuits configured under the same physical interface. ]
QUESTION 299 Your Cisco Highway trainee Sandra asks you what is the decimal, base 10, value of the binary number 10110011. What should you tell her?
A. 91
B. 155
C. 179
D. 180
E. 201
F. 227 Answer: C
QUESTION 300 Your boss, Cisco Highway, is curious about EIGRP route information. She asks you which EIGRP route information are held in RAM and maintained through the use of hello and update packets. What should you tell Jack? (Select two.)
A. Neighbor Table
B. SRF Table
C. RTP Table
D. Topology Table
E. Quey Table
F. Dual Table Answer: A, D Reference: Sybex CCNA Study Guide edit 4 Page 271