Recently Updated

26
0% 50% 100% How2Pass CCNA Test # 12 How2Pass Test Score Report Print this Page Test Taker's Name : l1nk2support Questions Attempted : 57 Correct Answers : Your score: 0% Passing score: 85% Pass/Fail: Fail Your time is: 0 hr 4 min 6 sec Section Analysis Section Score Routing protocols: 0% (0/8) Access Control Lists: 0% (0/3) Network security threats and mitigation: 0% (0/2) Describe how a network works: 0% (0/8) WAN: 0% (0/8) Basic router operations: 0% (0/9) Basic switch operations: 0% (0/4) VLANs, VTP, RSTP, PVST, inter-vlan communication: 0% (0/9) NAT/PAT: 0% (0/1) IP addressing and IP Services: 0% (0/5) Correct Answers/Explanations are given below 1. (QID:NA723) Which statement about RIP routing is true? Your Answer: Correct Answer: If RIP version 2 is used, the subnet mask is sent to neighboring RIP routers. Explanation: RIP (default version 1) supports subnets but does not send subnet masks in the routing updates, allowing only classful routing updates. Therefore, it does not support variable length subnet masking (VLSM). RIP version 2 sends subnet mask in the routing updates. This allows using VLSM on the network. 2. (QID:NA643) An internetwork has been configured as shown in the exhibit, with both routers using EIGRP routing for AS 44. Users on the Branch router are unable to reach any of the subnets on the HQ router. Which of the following commands is necessary to fix this problem? Exhibit

Transcript of Recently Updated

Page 1: Recently Updated

0% 50% 100%

How2Pass CCNA Test # 12

How2Pass Test Score ReportPrint this Page

Test Taker's Name : l1nk2supportQuestions Attempted : 57Correct Answers :

Your score: 0%

Passing score: 85%

Pass/Fail: Fail

Your time is: 0 hr 4 min 6 sec

Section Analysis

Section Score

Routing protocols: 0% (0/8)

Access Control Lists: 0% (0/3)

Network security threats and mitigation: 0% (0/2)

Describe how a network works: 0% (0/8)

WAN: 0% (0/8)

Basic router operations: 0% (0/9)

Basic switch operations: 0% (0/4)

VLANs, VTP, RSTP, PVST, inter-vlan communication: 0% (0/9)

NAT/PAT: 0% (0/1)

IP addressing and IP Services: 0% (0/5)

Correct Answers/Explanations are given below

1. (QID:NA723) Which statement about RIP routing is true?

Your Answer:

Correct Answer: If RIP version 2 is used, the subnet mask is sent to neighboring RIP routers.

Explanation: RIP (default version 1) supports subnets but does not send subnet masks in the routingupdates, allowing only classful routing updates. Therefore, it does not support variable length subnetmasking (VLSM). RIP version 2 sends subnet mask in the routing updates. This allows using VLSM onthe network.

2. (QID:NA643) An internetwork has been configured as shown in the exhibit, with bothrouters using EIGRP routing for AS 44. Users on the Branch router are unable to reach any ofthe subnets on the HQ router. Which of the following commands is necessary to fix thisproblem?

Exhibit

Page 2: Recently Updated

Your Answer:

Correct Answer: Branch(config-router)# no auto-summary

Explanation:

EIGRP automatically summarizes network addresses across classful boundaries. Subnets of the sameclass C network are connected to the two routers. When they advertise their networks to each other,EIGRP summarizes and advertises as 192.168.10.0/24, but the receiving router does not enter thisroute in its routing table because it knows that this network is connected to its local interface.

3. (QID:NA722) Which access list statement will block all traffic with a destination TCP portnumber of 5190 while not affecting other traffic?

Your Answer:

Correct Answer: access-list 180 deny tcp any any eq 5190

Explanation:

access-list 180 deny tcp any any eq 5190 - Correct.access-list 180 deny tcp any eq 5190 any - Incorrect; It is filtering based on source port number; Itshould be destination port number.access-list 180 deny ip any eq 5190 any - Incorrect; You cannot filter ports on IP protocol.access-list 180 deny tcp any eq 5190 - Incorrect; It is filtering based on source port number and/ormissing destination address.access-list 180 deny telnet any any 5190 - Incorrect; You cannot filter on telnet like this.

4. (QID:NA719) Based on the topology table that is shown in the exhibit and assuming thatvariance is not configured for EIGRP, which route or routes should appear in the routingtable?

Exhibit:

Router#show ip eigrp topologyIP-EIGRP Topology Table for AS(100)/ID(192.168.8.21)

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia Status

P 192.168.2.0/24,1 successors, FD is 2707456 via 192.168.8.22 (2707456/2195456), Serial0/0 via 192.168.8.18 (3815424/281600), Serial0/2P 192.168.8.20/30,1 successors, FD is 2169856 via Connected, Serial0/0P 192.168.8.16/30,1 successors, FD is 3789824 via Connected, Serial0/2P 192.168.8.24/30,1 successors, FD is 2681856 via 192.168.8.22 (2681856/2169856), Serial0/0 via 192.168.8.18 (4301824/2169856), Serial0/2

Page 3: Recently Updated

Your Answer:

Correct Answer: D 192.168.8.24/30 [90/2681856] via 192.168.8.22, 00:27:50, Serial0/0

Explanation:

Let us understand the output of show ip eigrp topology command.

In order to answer this question, you must understand the following portion of each entry, in the outputof show ip eigrp topology command

via ... (2707456/2195456), ...

The first metric in the parenthesis is Feasible Distance (FD) and the second metric is AdvertisedDistance (AD), also called Reported Distance (RD). The topology table holds these two metrics forevery path.

Advertised Distance is the metric that is reported by the neighbor routers. Feasible Distance is themetric that is reported by neighbor routers, plus the cost associated with the route from the localinterface to the neighbor routers.

Now, a feasible successor for a destination network is the route having the lowest value of AdvertisedDistance (AD). As defined above, the Advertised Distance is the EIGRP metric for a route as calculatedby the neighboring router. Therefore, the feasible successor in this case is the route having the lowestvalue of AD (second parameter in the parenthesis).

For each network EIGRP selects successors based on lowest value of Feasible Distance (FD). Thesuccessors are then shown in the routing table but the feasible successors remain in the topology tableonly. Also notice that routing table shows metrics as (90/FD) for EIGRP routes. Where "90" representsthe Administrative Distance of EIGRP and "FD" is the lowest Feasible Distance for a destination, asshown in topology table.

Now let us examine each answer:

D 192.168.8.20 (2707456/2195456), Serial0/1 - Incorrect. The first value in parenthesis should be 90.

D 192.168.2.0/24 [90/2707456] via 192.168.8.22, 00:27:50, Serial0/0 [90/3815424] via 192.168.8.18, 00:27:50, Serial0/2 - Incorrect.

The output shows that this network has only one successor with the FD value of 2707456.

D 192.168.2.0/24 [90/3815424] via 192.168.8.18, 00:27:50, Serial0/2 - Incorrect.

The output shows the FD for this network is 2707456. This route is not even a feasible successor.

D 192.168.8.24/30 [90/2681856] via 192.168.8.22, 00:27:50, Serial0/0 - Correct.

This route has an FD of 2681856 via 192.168.822, via Serial0/0, that matches the network path shownin topology table.

P 192.168.8.24/30,1 successors, FD is 2681856 via 192.168.8.22 (2681856/2169856), Serial0/0 via 192.168.8.18 (4301824/2169856), Serial0/2

5. (QID:NA712) What can be done to secure the virtual terminal interfaces on a router?

Page 4: Recently Updated

(Select two)

Your Answer: N/A

Correct Answer: Configure a virtual terminal password and login process. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Explanation:

You can restrict access to the the virtual terminal lines with a login process that requires correctpassword to gain telnet access to the router. This will allow any one telnet access into the router whoknows the password.

Second option is often used, in addition to the password challenge, to allow telnet access from certainIP addresses only. We create an access list allowing telnet traffic from certain hosts only, and apply itto the virtual terminal interfaces using the access-class command.

6. (QID:NA681) Which item is correct about the relationship between the protocol and itsassociated function?

1. ICMP2. DHCP3. RARP4. UDP5. DNS6. ARP

I. A PC sends packets to the default gateway IP address the first since the PC turned on.II. The network administrator is checking basic IP connectivity from a workstation on a server.III. The TCP/IP protocol stack must find an IP address for packets destined for a URL.IV. A network device will automatically assign IP addresses to workstations.

Your Answer:

Correct Answer: I-6; II-1; III-5; IV-2

Explanation:

ARP: A PC sends packets to the default gateway IP address first since the PC turned on.

ICMP: The network administrator is checking basic IP connectivity from a workstation on a server.

DNS: The TCP/IP protocol stack must find an IP address for packets destined for a URL.

DHCP: A network device will automatically assign IP addresses to workstations.

7. (QID:NA665) Examine the following technologies, which one will you use when a routerconnected to a LAN has only one WAN interface, but multiple virtual circuits are needed?

Your Answer:

Page 5: Recently Updated

Correct Answer: Frame Relay

Explanation:

Using Frame Relay subinterfaces you can create multiple virtual circuits on a single physical interfaceof the router and have multiple WAN connections.

8. (QID:NA727) View the exhibit carefully. With the access list applied as shown, whichdevices will be allowed to go through the router and access the Internet?

Exhibit

Your Answer:

Correct Answer: none of the devices

Explanation:

Every Access Control List has an implicit deny at the end. A permit statement must be there to allowsome traffic, otherwise all traffic will be blocked, and the same is happening here.

The access list 7 explicitly denies traffic originating from PC2, destined for the Internet. This ACL hasno permit statement, hence dropping the traffic from all other devices on the LAN to go through therouter and access the Internet.

9. (QID:NA733) An administrator is in the process of changing the configuration of a router.What command will allow the administrator to check the changes that have been made priorto saving the new configuration?

Your Answer:

Correct Answer: Router# show running-config

Explanation:

The show running-config command displays the status of RAM and the current configuration of theCisco router/switch.

10. (QID:NA732) View the exhibit. An administrator replaced the NIC in a desktop PC with anew NIC. The NIC in the PC configuration is set to "100 Mb Half". Now the PC has intermittentconnectivity and loss of communication so the administrator began troubleshooting on theswitch. Using the switch output shown, what is the cause of the problem?

Exhibit

Your Answer:

Page 6: Recently Updated

Correct Answer: The switch is set to full-duplex.

Explanation:

The switch is configured as 100 Mb/s full-duplex but the PC NIC is configured as 100 Mb/s half-duplex.Both interfaces connected through a cable must have the same duplex settings. A duplex mismatchoccurs when one device is operating at full-duplex and the other connected device is operating at half-duplex or the other way around. Duplex mismatches can cause extremely slow performance,intermittent connectivity and loss of connection.

11. (QID:NA705) View the exhibit. Which of these statements correctly describes the stateof the switch once the boot process has been completed?

Exhibit

Your Answer:

Correct Answer: SwitchA does not have a VTP domain name configured.

Explanation:

The following two answers seem correct:

SwitchA does not have a VTP domain name configured.SwitchC needs to have the VTP domain name configured.

However, we need to select only one correct answer. More careful reading of the question statementreveals that we are concerned with state of the switch once the boot process is complete, and not withwhat is required to correct this situation. So, in the current state, "SwitchA does not have a VTPdomain name configured", is the answer we need to choose.

12. (QID:NA718) What is the purpose of the OSPF router ID in a DR/BDR election?

Your Answer:

Correct Answer: It is used with the OSPF priority values to determine which router will become the DRor BDR in a multi-access network.

Explanation:

OSPF Router ID and the Election of OSPF DR/BDR

OSPF elects DR and BDR on a multi-access network such as Ethernet LAN. Only the routers withOSPF priority greater than 0 can take part in this election. With default (1) or same OSPF priority on allOSPF neighbors, the router with the highest Router ID is elected as the DR for the segment.

OSPF Router ID

Each router in an OSPF network needs a unique ID. The ID is used to provide a unique identity to theOSPF router. This is included in any OSPF messages the router generates to announce itself to otherOSPF routers in the area. This ID must be unique.

Page 7: Recently Updated

The OSPF router ID is chosen according to the following criteria:

The highest router ID configured explicitly with router-id <ip address> command, in OSPF

router configuration mode.

The highest IP address on its loopback interfaces (Loopback interface is a logical interface on a

router) is chosen as Router ID.

If no loopback interface is configured then the highest IP address on one of its active physical

interfaces is chosen as Router ID.

If there is no active interface, the OSPF process will not start and therefore you will not have any

OSPF routes in your routing table.

Note: The ip ospf priority command can be used to administer which router becomes the DR on amulti-access network. This number ranges from 0-255 and defaults to 1.

13. (QID:NA647) With the use of different ports, some type of NAT maps multiple private IPaddresses to a single registered IP address. Which form is it?

Your Answer:

Correct Answer: overloading

Explanation:

Overloading is the feature used in NAT that allows us to map multiple private IP addresses to a few(sometimes single) globally unique IP address. The NAT configured router keeps the track of requestsby using different port numbers with each request from different private addresses.

14. (QID:NA675) View the exhibit. A network administrator is troubleshooting a connectivityproblem on the serial interfaces. The output from the show interfaces command on bothrouters shows that the serial interface is up, line protocol is down. Given the partial output forthe show running-config in the exhibit, what is the most likely cause of this problem?

Exhibit

Your Answer:

Correct Answer: The Layer 2 framing is misconfigured.

Explanation:

Serial interface is up - Layer 1 ok.Line protocol is down - Layer 2 problem.

On Rtr3 Serial0/0, the WAN data-link layer encapsulation (also called layer 2 framing) is configured asPPP.

On other end of the point-to-point serial link, i.e., on Rtr1 Serial1/1, no layer 2 encapsulation (framing) is

Page 8: Recently Updated

configured. Cisco routers use HDLC as default WAN layer 2 encapsulation on point-to-point serial links.This means, Rtr1 Serial1/1 will use HDLC as WAN layer 2 encapsulation.

Both ends of the point-to-point WAN serial link must use the same WAN layer 2 encapsulation, whichis not true here. Therefore, "the layer 2 framing is misconfigured" is the correct answer.

15. (QID:NA731) View the exhibit. Mary is sending an instant message to Robert. Themessage will be broken into a series of packets that will traverse all network devices. Whataddresses will populate these packets as they are forwarded from Router1 to Router2?

Exhibit

Your Answer:

Correct Answer:

Explanation:

When packets transfer from one host to another across a routed segment, the source IP addressalways remains the same source IP address, and the source physical (MAC) address will be theexiting router's interface address. Similarly, the destination IP address always remains the same (offinal destination) and the destination physical (MAC) address is the receiving router's/host's interfaceaddress.

In this case, when the frame is transmitted from Router1 towards Router2, the source IP address will be10.1.3.3 (Marry), the destination IP address will be 10.1.2.2 (Robert), the source MAC address will be0000.000c.0124 and the destination MAC address will be 0000.000c.0123.

16. (QID:NA744) View the exhibit. A technician enters the exhibited commands toconfigure a new router, but receives an error message when attempting to save theconfiguration. What can the technician do to correct the problem?

Exhibit

Your Answer:

Correct Answer: Enter the correct command.

Explanation:

The technician needs to save running-config to startup-config in NVRAM. The correct command for thispurpose is copy running-config startup-config. The copy startup-config running-config commandrestores the saved configuration in startup-config file in NVRAM to the running-config file in DRAM, so,the technician is using incorrect command. On a new router, there is no startup configuration.

The %% Non-volatile configuration memory invalid or not present error message shows if the startupconfiguration file is found empty by the router while backup of the configuration file is taken with the

Page 9: Recently Updated

configuration file is found empty by the router while backup of the configuration file is taken with thecopy start run command. Issue the copy run start command before you take the backup of theconfiguration file in order to avoid this error.

17. (QID:NA714) Which router command can be used to verify the type of cable connectedto interface serial 0/0?

Your Answer:

Correct Answer: show controllers serial 0/0

Explanation:

The show controllers command displays information about the physical interface itself. It will also giveyou the type of serial cable plugged into a serial port.

Router# show controllers serial 0/0

HD unit 0, idb = 0x1229E4, driver structure at 0x127E70buffer size 1524 HD unit 0, V.35 DCE cablecpb = 0xE2, eda = 0x4140, cda = 0x4000<output omitted>

18. (QID:NA734) View the exhibit. Which types of devices and connections are needed tocomplete the LAN for optimal performance and cost efficiency?

Exhibit

Your Answer:

Correct Answer: A: router B: switch C: switch D: UTP cable E: fiber connection F: T-1 connection

Explanation:

Keep in mind the requirement of optimal performance and cost efficiency. Use the process ofelimination to discard incorrect answers. Start from device A, that should be a router. This eliminatesone incorrect answer.

Now the cable between device A and B should be Cat5 cable since the distance is only 20 meters (forcost efficiency). This eliminates two more incorrect answers.

Now we have only two answers. The device B should NOT be a hub (for optimal performance). Thiseliminates the last incorrect answer and there we get the only correct answer:

A: routerB: switchC: switch

Page 10: Recently Updated

D: UTP cableE: fiber connectionF: T-1 connection

19. (QID:NA640) View the exhibit. How should the FastEthernet0/1 ports on the 2950 modelswitches that are shown in the exhibit be configured to allow connectivity between alldevices?

Exhibit

Your Answer:

Correct Answer: SwitchX(config)#interface fastethernet 0/1 SwitchX(config-if)#switchport mode trunk

Explanation:

SwitchX represents both Switch1 and Switch2.

20. (QID:NA707) Drag-n-drop. Drag the term on the left to the correct description on theright.

Your Answer: N/A

Correct Answer: 1:C,2:E,3:D,4:G

Explanation:

Term Description

DTE a router is this type of device

PVC the most common type of virtual circuit

LMI provides status messages between DTE and DCE devices

DLCI identifies the virtual connection between the DTE and the switch

21. (QID:NA488) Drag-n-drop. Drag the appropriate command on the left to theconfiguration task it accomplishes. (Not all options are used.)

Your Answer: N/A

Correct Answer: 1:C,2:D,3:E,4:F,5:B

Explanation:

Configuration Task Commands

Encrypt all clear text passwords service password-encryption

protect access to the user mode prompt line console 0

Page 11: Recently Updated

password friendS0nly

set privileged mode encrypted password enable secret noWay1n4u

set password to allow Telnet connections line vty0 4 password 2hard2Guess

set privileged mode clear text password enable password uwi11NeverNo

22. (QID:NA742) Drag-n-drop. Drag the description on the left to the correct term on theright. Not all description are used.

Your Answer: N/A

Correct Answer: 1:A,2:C,3:F,4:B,5:E

Explanation:

Term Description

E-mail a store and forward application that allows users to send messages and files in atimely manner.

Web browser allows access to the Internet through a common interface to look up information orretrieve data.

Telnet provides the capability to remotely access a command prompt on a remotesystem.

Collaboration allows two or more people to simultaneously create and/or modify a body work.

Database a structured collection of records in a central location.

Not used a cryptographic protocol that provides secure communications on the Internet

23. (QID:NA741) Drag-n-drop. Order the DHCP message types as they would occur betweena DHCP client and a DHCP server.

Your Answer: N/A

Correct Answer: 1:C,2:B,3:D,4:A

Explanation:

DHCP Process

1. Client sends DHCPDISCOVER broadcast to find a DHCP Server (it has no IP address at thispoint).

2. Server sends DHCPOFFER message to the client, which offers an IP Address.3. Client responds with a DHCPREQUEST message to accept the IP address it was given.4. DHCP Server sends DHCPACK message to confirm the IP address assignment.

24. (QID:NA706) Drag-n-drop. Drag the description on the left to the correct router mode onthe right.

Page 12: Recently Updated

Your Answer: N/A

Correct Answer: 1:E,2:B,3:D,4:C,5:A

Explanation:

Command Mode Description

User EXEC mode limited to basic monitoring commands

Privileged EXEC mode provides access to all other router commands

Global configuration mode commands that affect the entire system

Specific configuration modes commands that affect interfaces processes only

Setup mode interactive configuration dialog

25. (QID:NA716) View the exhibit. How does Spanning Tree Protocol prevent switchingloops?

Exhibit

Your Answer:

Correct Answer: STP places ports into the blocking state to disable the redundant paths.

Explanation:

Spanning-Tree Protocol (STP) prevents loops from being formed when switches or bridges areinterconnected via multiple paths. Spanning-Tree Protocol implements the 802.1d IEEE algorithm byexchanging BPDU messages with other switches to detect loops, and then removes the loop byshutting down selected bridge interfaces (by putting them into blocking state). This algorithmguarantees that there is one and only one active path between two network devices.

26. (QID:NA639) View the exhibit. A network technician is asked to design a small networkwith redundancy The exhibit represents this design, with all hosts configured in the sameVLAN. What conclusions can be made about this design?

Exhibit

Your Answer:

Correct Answer: The router will not accept the addressing scheme.

27. (QID:NA662) Which of the following is the subnet address of 172.16.159.159/22?

Your Answer:

Page 13: Recently Updated

Correct Answer: 172.16.156.0

Explanation:

/22 = 255.255.252.0, the increment in 3rd octet = 256 - 252 = 4. Hence, the subnet IDs will be inmultiples of 4 in third octet, that is:

172.16.4.0172.16.8.0...172.16.156.0 => subnetwork address for host 172.16.159.159/22172.16.160.0

Valid host range on this subnet: 172.16.156.1 to 172.16.159.254

28. (QID:NA709) Drag-n-drop. Drag each definition on the left to the matching term on theright.

Your Answer: N/A

Correct Answer: 1:F,2:D,3:B,4:A,5:E,6:C

Explanation:

Term Definition

Cost A configurable value based by default on the bandwidth of the interface

Load The amount of activity on a network resource

Bandwidth The data capacity of a link

Hop count The number of point-to-point links in a transmission path

Reliability Usually refers to the bit error rate of each network link

Delay The amount of time required to move a packet from source to destination

29. (QID:NA721) Which IP addressing scheme would be correct for the topology shown inthe graphic?

Exhibit

Your Answer:

Correct Answer: Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24

Explanation:

The key to answer this question is the fact that Host 1 and Host 3 reside on the same VLAN, hencethey need to be configured with IP addresses on the same subnet, and Host 2, being on differentVLAN, needs to have the IP address on different subnet than that of Host 1 and Host 3. The following IPaddressing scheme is the only correct answer:

Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24

Page 14: Recently Updated

Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24

30. (QID:NA711) View the exhibit. Why is flash memory erased prior to upgrading the IOSimage from the TFTP server?

Exhibit

Your Answer:

Correct Answer: Erasing current flash content is requested during the copy dialog.

Explanation:

When you issue the copy tftp flash command, you will be asked whether to erase the existing file(s) inthe flash or not. If you have enough free space on the flash, don't erase the old IOS image, you mightneed it.

Erase flash: before copying? [confirm]

If you type 'n', the router starts copying the new IOS file to the router. If you type 'y', the router startserasing the flash and then copying.

You can keep more than one IOS images in Flash. In that case, the boot system commands determinewhich IOS image the router should try to load.

Router(config)#boot system flash cXXXX-X-XX.XXX-XX.bin

31. (QID:NA708) Drag-n-drop. Drag the option on the left that best describes the uniqueadvantage and disadvantage of each WAN link type to the correct box on the right.

Your Answer: N/A

Correct Answer: 1:B,2:E,3:F,4:A,5:D,6:C

Explanation:

WAN Link Type Advantage Disadvantage

Point to Point Quality Limited flexibility

Circuit Switched Efficient Low speed

Packet Switched Cost More complex

32. (QID:NA725) View the exhibit. Host A can communicate with Host B but not with Host Cor Host D. What should the network administrator do to solve this problem?

Exhibit

Your Answer:

Page 15: Recently Updated

Correct Answer: Configure a router to route between VLAN2 and VLAN3.

Explanation:

Hosts in the same VLAN can communicate with each other, without a router, but you need a router toroute traffic between different VLANs. In this scenario, Host A and Host C/Host D reside in differentVLANs. The router with its FastEthernet interface connected to the switch can provide inter-VLANcommunication.

33. (QID:NA713) What are three valid reasons to assign ports to VLANs on a switch? (Selectthree)

Your Answer: N/A

Correct Answer: to isolate broadcast traffic. to logically group hosts according to function. to increase network security.

Explanation:

Reasons for using VLANs

There are many reasons for using VLANs, including the following:

To create more exible designs that group users by department, or by groups that worktogether, instead of by physical location.To segment devices into smaller LANs (broadcast domains) to reduce overhead caused to eachhost in the VLAN.To reduce the workload for STP by limiting a VLAN to a single access switch.To enforce better security by keeping hosts that work with sensitive data on a separate VLAN.To separate traffic sent by an IP phone from the traffic sent by PCs connected to the phones.

34. (QID:NA638) All WAN links inside the ABC University network use PPP with CHAP forauthentication security. Which command will display the CHAP authentication process as itoccurs between two routers in the network?

Your Answer:

Correct Answer: debug PPP authentication

Explanation:

To determine if the router is performing CHAP or PAP authentication, see the output of debug pppnegotiation and debug ppp authentication commands.

35. (QID:NA717) Which Frame Relay feature is responsible for transmitting keepalives toensure that the PVC does not shut down because of inactivity?

Your Answer:

Page 16: Recently Updated

Your Answer:

Correct Answer: LMI

Explanation:

Local Management Interface (LMI)

LMI is the protocol used between the router device (DTE) and the Frame Relay switch (DCE) to managethe connection. Signaling messages for SVCs, PVC status messages, and keepalives are all LMImessages. The most important LMI message is the status inquiry message.

Three LMI types can be configured on Cisco router but by default it is auto-sensed. These three typesof LMI are: ansi, cisco (default), and q933a.

The main functions of LMI process are:

To determine the operational status of the various PVCs that the router knows aboutTo transmit keepalive packets to ensure that the PVC stays up and does not shut down due toinactivity. About every 10 seconds, routers and switches send an LMI keep alive across the localloop.To tell the router what PVCs are available

36. (QID:NA728) View the exhibit. You enter the following line into the router:

R1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.255 any eq www

What is the effect of this configuration?

Exhibit

Your Answer:

Correct Answer: The change has no effect on the packets being filtered.

Explanation:

Any addition to an ACL is made at the end of the ACL. Hence addition of any deny statement afteralready configured permit ip any any statement has no effect on the packets being filtered, becausethe router processes ACL statements from top to bottom.

37. (QID:NA641) View the exhibit. After SwitchB was added to the network, VLANconnectivity problems started to occur. What caused this problem?

Exhibit

Your Answer:

Correct Answer: The revision number of SwitchB was higher than the revision number of SwitchA.

Explanation:

Page 17: Recently Updated

SwitchB with higher Configuration Revision number was added to the network in VTP Server mode. Dueto higher Configuration Revision number, the VLAN configuration of SwitchB was overwritten on theVLAN configuration of SwitchA, that caused VLAN connectivity problems.

38. (QID:NA690) The following exhibit displays every device attached to the network. Howmany collision domains are shown in this network?

Exhibit

Your Answer:

Correct Answer: 15

Explanation:

Each switch port link and each router port link is a separate collision domain. In this exhibit, thenumber of cables shown equals collision domains.

9 switch port links to end hosts + 3 inter-switch links + 2 router links connecting to two switches + 1(one) link between the two routers = 15 collision domains.

39. (QID:NA743) Drag-n-drop. Drag the definition on the left to the correct term on the right.Not all definitions on the left will be used.

Your Answer: N/A

Correct Answer: 1:E,2:F,3:D,4:A,5:B

Explanation:

SNMP: a protocol used to monitor and manage network devices.

FTP: a reliable, connection-oriented service that uses TCP to transfer files between systems.

TFTP: a connectionless service that uses UDP to transfer files between systems.

DNS: a protocol that converts human-readable names into machine-readable addresses.

DHCP: used to assign IP addresses automatically and set parameters such as subnet mask anddefault gateway.

40. (QID:NA730) Which of the following describe Class A host addresses? (Choose three)

Your Answer: N/A

Correct Answer: The decimal value of the first octet can range from 1 to 126. The first octet represents the entire network portion of the address. The value of the first binary place in the first octet must be 0.

Page 18: Recently Updated

The value of the first binary place in the first octet must be 0.

Explanation:

An IP address consists of 32 bits, that is, 32 binary digits (a binary digit can be a 0 or 1). These 32 bitshave been divided into 4 groups of 8 bit each, called octet. The left most octet is called first octet andleft most bit in the first octet will be called 8th bit of first octet.

The class of an IP address can be determined by looking at the first octet, for example 130.13.15.5 is aclass 'B' IP address. Here is the detail:

Class A: 1-126 small number of very large networks.127.x.x.x used for Loopback testing (127.0.0.1 is the default IP address of every NIC)Class B: 128-191 medium number of medium networks.Class C: 192-223 large number of small networks.Class D: 224-239 used for multicasting.Class E: 240-254 used for experimental purposes.

Now remember following facts for such questions:

Class A addresses have 8th bit (left most) as zero, that is, 0xxxxxxxClass B addresses have 8th bit as 1 and 7th bit as 0, that is, 10xxxxxxClass C addresses have 8th & 7th bit as 1, that is, 11xxxxxx

"The value of the first binary place in the first octet must be 0" is Correct assuming the writer of thisquestion starts counting from left. Usually bit counting starts from right. If we mark this choiceincorrect, there is no other third correct answer.

The default subnet mask for a Class A network is 255.0.0.0, therefore, the first octet of a Class Aaddress represents the entire network portion of the address.

41. (QID:NA720) A network administrator is trying to add a new router into an establishedOSPF network. The networks attached to the new router do not appear in the routing tables ofthe other OSPF routers. Given the information in the partial configuration shown in exhibit,what configuration error is causing this problem?

Exhibit:

Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

Your Answer:

Correct Answer: The network wildcard mask is configured improperly.

Explanation:

The network command for OSPF routing process uses the network number and wildcard mask toassociate router interfaces with configured area. The exhibit is showing the subnet mask form of thiscommand, that is not used for OSPF. Here is the correct command:

Router(config-router)# network 10.0.0.0 0.0.0.255 area 0

The combination of network number and wildcard mask identifies the interfaces that OSPF will operate

Page 19: Recently Updated

The combination of network number and wildcard mask identifies the interfaces that OSPF will operateon, and will also be included in its OSPF LSA advertisements. OSPF will use this command to find anyinterface on the router configured in the 10.0.0.0 network, and it will place any interface it finds into area0.

42. (QID:NA729) View the exhibit. If host A sends an IP packet to host B, what will thesource physical address be in the frame when it reaches host B?

Exhibit

Your Answer:

Correct Answer: C3:C3:C3:C3:C3:C3

Explanation:

When packets transfer from one host to another across a routed segment, the source IP addressalways remains the same source IP address, and the source physical (MAC) address will be theexiting router's interface address. Similarly, the destination IP address always remains the same andthe destination physical (MAC) address is the receiving router's/host's interface address.

In this case, when the frame reaches host B, the source IP address will be 10.168.10.99 (host A) andthe source physical (MAC) address will be C3:C3:C3:C3:C3:C3.

43. (QID:NA726) Which protocol adds overhead in a switched network by allowing theconfiguration of a new VLAN to be distributed to all the switches in a domain?

Your Answer:

Correct Answer: VTP

Explanation:

The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across aswitched internetwork and to maintain consistency throughout that network. VTP allows anadministrator to add, delete, and rename VLANs information that is then propagated to all otherswitches in the VTP domain.

44. (QID:NA642) Drag-n-drop. Drag the function on the left to the matching securityappliance or application on the right. (Not all functions are used.)

Your Answer: N/A

Correct Answer: 1:B,2:C,3:E,4:D

Explanation:

Security Appliance/Application Function

Antispyware detects software designed to capture sensitive information andremoves it from the computer

Page 20: Recently Updated

removes it from the computer

Antivirus prevents known malicious programs from being installed onworkstations

IDS identifies malicious network traffic and alerts network personnel

Firewall filters traffic based on source and destination IP address or traffic

45. (QID:NA710) View the exhibit. The network administrator has discovered that the VLANconfiguration of SwitchC is not synchronized with the rest of the switched network. Why isSwitchC not receiving VTP updates?

Exhibit

Your Answer:

Correct Answer: SwitchC has a revision number higher than that being advertised.

Explanation:

VTP Configuration Revision Number

One of the most critical components of VTP advertisements is the configuration revision number. Eachtime a VTP server modifies its VLAN information, it increments the configuration revision number byone. It then sends out a VTP advertisement with the new configuration revision number. If theconfiguration revision number being advertised is higher than the number stored locally on the otherswitches in the VTP domain, they will overwrite their VLAN configurations with the new informationbeing advertised, otherwise will ignore the VTP advertisements.

Although SwitchA is in VTP Server mode, SwitchC is in VTP Client mode, and both are in the sameVTP domain, yet SwitchC does not accept VTP updates from SwitchA. Notice that SwitchC has ahigher VTP configuration revision number than SwitchA. When it receives the VTP advertisement fromSwitchA, it simply ignores this update, considering it as outdated information, because its local VTPinformation has a higher configuration revision number.

46. (QID:NA715) A network administrator wants the text "Unauthorized access prohibited!"to be displayed before the login prompt, when someone tries to initiate a Telnet session to arouter. The output is shown in the exhibit. Which command can be used to configure thismessage?

Exhibit:

Router# telnet 192.1.1.1Trying 192.168.2.1 ... Open

Unauthorized access prohibited!

User Access VerificationPassword:

Your Answer:

Page 21: Recently Updated

Your Answer:

Correct Answer: banner motd x Unauthorized access prohibited! x

Explanation:

Setting Up a Login Message/Banner

The banner motd (motd stands for "message of the day") command causes a text banner to displaywhen someone accesses the router from the console, Telnet, or an auxiliary port. The banner can spanmany lines. To know when you stop typing the banner text, the command uses a delimiter character,for example:

Router(config)#banner motd x Unauthorized access prohibited! x

Here

banner motd Message of the day command.x The delimiter character indicating the start and end of the message. Unauthorized access prohibited! The message.

47. (QID:NA682) Which item gives the correct relationship between WAN connectiontechnology and the associated communication link type?

1. PSTN2. ATM3. Leased Line4. Frame Relay

I. Point to PointII. Circuit SwitchedIII. Packet SwitchedIV. Cell Switched

Your Answer:

Correct Answer: I-3;II-1;III-4;IV-2

Explanation:

I. Point to Point => Leased LineII. Circuit Switched => PSTN III. Packet Switched => Frame Relay IV. Cell Switched => ATM

48. (QID:NA637) A network administrator is troubleshooting an EIGRP problem on a routerand needs to confirm the IP addresses of the devices with which the router has establishedadjacency. The retransmit interval and the queue counts for the adjacent routers also need tobe checked. What command will display the required information?

Your Answer:

Page 22: Recently Updated

Correct Answer: Router# show ip eigrp neighbors

49. (QID:NA740) How does a switch differ from a hub?

Your Answer:

Correct Answer: A switch tracks MAC addresses of directly-connected devices.

Explanation:

Switches are layer-2 devices and perform these three basic network functions:

Learning: They learn the source (MAC) address of each device connected to a port.Forwarding: They intelligently switch frames to the port or ports where the destination islocated.Removing layer-2 loops: They remove loops with the Spanning Tree Protocol (STP), so thatframes don't continually circle around the network.

50. (QID:NA644) For the following IP addresses, which one is a private address?

Your Answer:

Correct Answer: 172.20.14.36

Explanation:

To conserver public IP addresses, the following ranges of IP addresses are considered as PrivateNetworks by RFC 1918. These will not be routed on the Internet, because the Internet routers areconfigured to discard private addresses.

10.0.0.0 – 10.255.255.255172.16.0.0 – 172.31.255.255192.168.0.0 – 192.168.255.255

Any organization can use these addresses on internal hosts, this helps conserve the public IPaddresses.

51. (QID:NA691) View the exhibit carefully. Host A is forwarding a packet to Host B for thefirst time. Which destination MAC address will be used by Host A in the ARP request?

Exhibit

Your Answer:

Correct Answer: ff-ff-ff-ff-ff-ff

Explanation:

Page 23: Recently Updated

Explanation:

Remember that in Ethernet the transmission from one device to the next device takes place using MACaddresses. A frame's source address field contains MAC address of the transmitting device anddestination address field contains the MAC address of receiving device (next device). The layer 3destination address is however unchanged, representing the final destination device.

When a host wants to send packets to another host (IP address), it must know the destination MACaddress. Hosts can use Address Resolution Protocol (ARP) to broadcast IP address of the destinationand request MAC address of the destination hosts.

Hosts may or may not need to use ARP to find the destination host's MAC address based on the two-step routing logic used by a host:

1. If the destination host is on the same subnet, the sending host sends an ARP looking for thedestination host's MAC address. The destination host replies with its MAC address, which isthen stored in the sending host's ARP cache for subsequent transmission.

2. However, if the sending host is on a different subnet than the destination host, the sending hostforwards the packet to its default gateway. In that case, the sending host uses ARP to find thedefault gateway's MAC address instead of destination host's MAC address (if the defaultgateway's MAC address is not already in its ARP cache).

The FFFF.FFFF.FFFF (hexadecimal notation) is a broadcast address. The broadcast address impliesthat all devices on the LAN should process the frame. Therefore, all devices except the sending device(host A) will process this frame, tear down layer 2 information and check layer 3 destination address tofind the intended destination device.

52. (QID:NA724) View the exhibit. Based on the exhibited routing table, how will packetsfrom a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?

Exhibit

Your Answer:

Correct Answer: The router will forward packets from RT3 to RT2 to RT1 AND from RT3 to RT1.

Explanation:

We see the following route entry in the routing table of RT3

D 192.168.10.64/26 [90/2195456] via 192.168.10.9, 00:03:31, Serial0/0 [90/2681856] via 192.168.10.5, 00:03:31, Serial0/1

It shows that network 192.168.10.0/30 has two equal cost EIGRP paths:

Path 1: via exit interface Serial0/0, IP address 192.168.10.9, i.e., RT3 to RT1.

Path 2: via exit interface Serial0/1, IP address 192.168.10.5, i.e., RT3 to RT2 to RT1.

EIGRP by default can load balance the traffic over four equal-cost paths. Therefore, RT3 will forwardpackets from RT3 to RT2 to RT1 AND from RT3 to RT1.

53. (QID:NA739) View the exhibit. The network administrator made the entries that are

Page 24: Recently Updated

53. (QID:NA739) View the exhibit. The network administrator made the entries that are

shown and then saved the configuration. From a console connection, what password orpassword sequence is required for the administrator to access privileged mode on Router1?

Exhibit:

Router# configure terminalRouter(config)# hostname Router1Router(config)# enable secret sanfranRouter(config)# enable password ciscoRouter(config)# line vty 0 4Router(config-line)# password sanjose

Your Answer:

Correct Answer: sanfran

Explanation:

The Privilege mode password can be an enable password or enable secret. If both enablepassword and enable secret are set, the later is used.

The enable password command was introduced first in Cisco IOS, but even with encryption, breakingthe password was easy to do. The enable secret command uses a hash algorithm to store thepassword value in the configuration, which makes breaking the password very difficult, and moresecure.

The vty line password (telnet password) is needed to access remote device.

54. (QID:NA735) An elementary school has a computer in every classroom. One entire wingof the school connects to a centrally located hub. The teachers have reported a slowdown inthe past few weeks to the network administrator. The network administrator has analyzed thenetwork and documented a steep increase in utilization as the teachers use a new network-based classroom management application. Which solution will improve the performance themost?

Your Answer:

Correct Answer: Replace the hub with a switch.

Explanation:

Ethernet devices use CSMA/CD media access mechanism, on shared medium like Hub in this case,that causes a lot of collisions and bandwidth wastage due to half-duplex transmission. If we replace thehub with a switch, all devices can transmit simultaneously (called full duplex transmission), becauseeach switchport is a separate collision domain. There is no chance of collision if each switchport isattached to only one host. This will improve the performance of network-based applications the most.

55. (QID:NA736) View the exhibit. Router1 and Router3 are already configured with RIPv2.What are the minimum network commands that are required on Router2 for all networks to

Page 25: Recently Updated

What are the minimum network commands that are required on Router2 for all networks to

converge?

Exhibit

Your Answer:

Correct Answer: (config-router)# network 192.168.0.0 (config-router)# network 192.168.1.0 (config-router)# network 192.168.3.0

Explanation:

RIP needs to advertise all directly connected networks for the network to converge fully. Therefore thefollowing minimum configuration command in router configuration mode will do the job:

Router2(config-router)# network 192.168.0.0Router2(config-router)# network 192.168.1.0Router2(config-router)# network 192.168.3.0

56. (QID:NA738) View the exhibit. What will the router do when it next starts up?

Exhibit

Your Answer:

Correct Answer: Start in ROM monitor mode.

Explanation:

These are common configuration register settings and their effects:

0x2102: The default value. Router looks for a startup configuration file in NVRAM and for a valid IOSimage in Flash.

0x2142: NVRAM contents are bypassed, startup configuration is ignored.

0x2100: Router boots into ROM Monitor mode.

57. (QID:NA737) Which statements accurately describe CDP? (Choose three)

Your Answer: N/A

Correct Answer: CDP is a Cisco proprietary protocol. CDP is a datalink layer protocol. CDP can discover directly connected neighboring Cisco devices.

Explanation:

Cisco Discovery Protocol (CDP)

Page 26: Recently Updated

The Cisco Discovery Protocol (CDP) discovers basic information about neighboring routers and

switches, without needing to know the passwords for the neighboring devices. CDP supports any LAN,HDLC, Frame Relay, and ATM interface; in fact, it supports any interface that supports the use ofSNAP headers.

CDP is a Layer 2 media and protocol independent protocol. This protocol uses broadcasts to a MAClayer multicast to show directly connected neighbors. The router or switch, running CDP, can discoverLayer 2 and Layer 3 addressing details of neighboring routers without even configuring that Layer 3protocol. This is because CDP is not dependent on any particular Layer 3 protocol.

To display the information about neighboring devices discovered using Cisco Discovery Protocol (CDP),use the show cdp neighbors privileged EXEC command. Another form of this command, show cdpneighbors detail displays detailed information about all neighbors including network address, enabledprotocols, hold time, and software version.

CDP is Cisco's proprietary protocol, therefore, only Cisco devices support this protocol. CDP is enabledin the configuration by default.

Repeat this test with (57) incorrectly answered question(s)

Close this window