You are on page 1of 16

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DRSEnt Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise
(Version 4.0)

Time Remaining:

1 Which two statements are true about RSTP? (Choose two.)


RSTP can fall back to STP to provide support for legacy equipment.
RSTP and STP have the same number of port states.
Like PortFast and UplinkFast, RSTP is a proprietary protocol.
RSTP takes up to 50 seconds to converge.
RSTP ports, that are not discarding, immediately transition to the forwarding state.

Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP
network fails to converge?
The network commands have been incorrectly issued on both routers.
Both routers have been configured with the same autonomous number.
The wildcard masks have been incorrectly configured on both routers.
Autosummarization is enabled on both routers.

3 Which network statement would include the 172.20.64.0 /19 network in the OSPF routing process?
Router(config-router)# network 172.20.64.0 0.0.0.31 area 0
Router(config-router)# network 172.20.64.0 0.0.0.63 area 0
Router(config-router)# network 172.20.64.0 0.0.15.255 area 0
Router(config-router)# network 172.20.64.0 0.0.31.255 area 0

4 Which component of the Cisco Enterprise Architecture is responsible for extending enterprise services to remote sites?
campus core
enterprise edge
building access
enterprise campus

5
Refer to the exhibit. Which route will appear in the routing table?
R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1
R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0
R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0
R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0
R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/0

6 What are two ways VLAN memberships can be created in an enterprise network? (Choose two.)
manually configuring the switch ports to be part of a VLAN
allowing the user to choose a specific VLAN through a GUI menu
configuring the switch to allow VLAN membership based on NetBIOS association
implementing an access list that specifies which devices are placed into specific VLANs.
associating MAC addresses to specific VLANs in a VLAN management policy server database
manually configuring the host devices to be part of a VLAN

7 What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the
172.16.240.0/27 network? (Choose two.)
0.0.0.0
255.255.240.0
255.255.255.255
0.0.31.255
255.255.255.240
0.0.0.31

Refer to the exhibit. Which rows of numbers represent the correct subnet masks necessary to accommodate the hosts on the network?
1, 2, 4, 5
1, 2, 5, 8
1, 5, 6, 7
2, 3, 4, 8
2, 4, 5, 6

9
Refer to the exhibit. What is the significance of the value 120 in the line R 192.168.4.0/24 [120/1] via 192.168.2.2, 00:00:26,
Serial0/0/0?
It represents the amount of time before the entry will expire.
It represents the amount of time that the entry has been in the table.
It is the value that is used to compare routes from different routing protocols.
It is the number of hops the packet must take to reach the destination.

10 A service provider is troubleshooting a failure between two sites in a Frame Relay virtual circuit. Where would the administrator locate
the fault if it was determined to be a problem with the CPE?
at the CO
within the local loop
within the Frame Relay switch
at the device with the DTE interface

11

Refer to the exhibit. Routers R1 and R2 have formed an adjacency, but R3 has no OSPF adjacencies. Based on the R3 configuration,
what is the cause of the problem?
The wildcard mask is incorrect for the OSPF network.
The IP addressing scheme on R3 is configured incorrectly.
The OSPF routing configuration on router R3 is missing a network statement.
There is no problem in the configuration. All routers need to converge to solve the issue.

12
Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The
hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem?


Enable the Serial0/0/0 interface of R2.
Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using RIPv2.
Configure a default route on the ISP via Serial0/0/0.
Configure the correct subnet mask on the Serial0/0/0 interface of R2.

13

Refer to the exhibit. EIGRP has been configured on all routers in the network. Based on the provided output, which value represents the
feasible distance of the feasible successor to the 172.30.1.0/24 network?
1
2
3
4
5

14
Refer to the exhibit. What range of IP addresses would match this ACL statement?
10.100.0.0 - 10.100.0.15
10.100.0.0 - 10.100.0.207
10.100.0.192 - 10.100.0.207
10.100.0.192 - 10.100.0.215
10.100.0.192 - 10.100.0.240

15

Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor
command to check the status of operation. Which statement is true?
RB has the lowest priority value.
RC and RD have the lowest router IDs on the network.
RA has established adjacencies with all neighbor routers.
RA and RB can not form an adjacency because they are stuck in the 2-way state.

Showing 1 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DRSEnt Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise
(Version 4.0)

Time Remaining:

16 What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)
172.16.0.255
172.16.16.16
172.16.127.127
172.16.128.1
172.17.1.1
172.18.1.1

17 A network administrator wishes to log ACL messages on a remote server. Which two procedures should be completed for the remote
logging to be successful? (Choose two.)
Configure logging to a syslog server IP address.
Configure logging to the router loopback IP address.
Ensure that logging to the console is configured.
Apply the terminal monitor command on the router.
Restrict remote access by applying an ACL to all VTY lines.
Verify that the clock is set to the correct date, time, and time zone.

18 Which software is typically used on a remote PC to access the enterprise through the Internet via a secure tunnel?
Telnet client
VPN client
FTP client
web browser

19

Refer to the exhibit. What is the correct description of the highlighted address?
It is the address of the destination network.
It is the routerID of the neighboring router.
It is the next hop address of the feasible successor.
It is the IP address of the serial0/0/0 interface of RouterC.

20 How can a network administrator determine if network traffic has matched an ACL if there is no syslog server configured on the network?
Issue the show access-lists command.
Delete the ACL and add it back, noting changes in traffic flow.
Remove the ACL from any configured interface and note traffic changes.
Verify the counters on the router interface and see if they are incrementing.

21 Which two statements correctly describe RIPv1 and RIPv2? (Choose two.)
Both broadcast their entire routing table from all participating interfaces to 255.255.255.255.
Both advertise their routing updates out all active interfaces every 30 seconds.
Both have the same administrative distance value of 120.
Both can turn off automatic summarization.
Both support VLSM and CIDR.

22

Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet?
192.168.1.65/27
192.168.1.32/27
192.168.1.63/27
192.168.1.61/27

23 If a modem is being used to connect to an ISP, which WAN connection type is being used?
leased line
cell switched
circuit switched
packet switched

24

Refer to the exhibit. An administrator sees this error message after entering commands to configure a router interface. Which command
could the administrator enter that would avoid the error?
Router(config-if)# ip address 192.168.4.0/24
Router(config-if)# ip address 192.168.4.1 255.255.255.0
Router(config-if)# ip address 192.168.4.0 255.255.255.240
Router(config-if)# ip address 192.168.4.255 255.255.255.0

25 Why is UDP preferred for transmission of video traffic?


It is a reliable protocol.
It retransmits lost packets.
It is a three-way handshake protocol.
It has low overhead.

26

Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?
C, B, A, D
D, C, B, A
A, B, C, D
A, C, B, D
B, C, A, D

27 Which routing protocol is unable to support discontiguous networks?


RIPv1
RIPv2
EIGRP
OSPF

28 Which WAN connection method uses a PVC?


leased line
ISDN
DSL
Frame Relay

29

Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be most
specific?
172.16.0.0/21
172.16.4.0/21
172.16.0.0/22
172.16.4.0/22

30 What are two advantages of using CHAP instead of PAP? (Choose two.)
less router overhead
more secure authentication
immunity from replay attacks
automatically configured usernames
support for both IP and non-IP based protocols

Showing 2 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DRSEnt Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise
(Version 4.0)

Time Remaining:

31 What is the function of VTP in a LAN switching environment?


controls broadcasts
standardizes VLAN tags
simplifies VLAN management
creates subinterfaces for inter-VLAN routing

32

Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them.
The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of
this connectivity problem?
no set loopback
incorrect subnet mask on R2
incompatible bandwidth
incorrect IP address on R1
incompatible encapsulation

33
Refer to the exhibit. R1 is configured for inter-VLAN communication as displayed. PC1 is able to ping PC2 but unable to ping PC3. What
is the cause of this problem?
PC3 and the FastEthernet0/0 interface of R1 are not on the same subnet.
Fa0/1 is configured for access mode.
Fa0/4 must be configured as a trunk.
PC1 and the switch are not on the same subnet.

34

Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what
information can be gathered from the show command output?
Router B has EIGRP adjacencies with both router A and C.
Router B has a fully converged topology table.
Router B has not formed an adjacency with router A.
Router B has not formed an adjacency with router C.

35 Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)
CHAP sends passwords in clear text.
CHAP uses repeated challenges for verification.
PPP encapsulation is configured in interface mode.
CHAP uses a 2-way handshake to establish a link.
PPP encapsulation is the default for serial interfaces on Cisco routers.
CHAP uses a challenge/response that is based on the MD5 hash algorithm.
36

Refer to the exhibit. The network is running EIGRP with the default summarization enabled. Users who are connected to both R1 and R3
are complaining of intermittent connectivity. What should be done to solve this problem?
Use RIPv1 instead of EIGRP.
Set a gateway of last resort.
Disable automatic summarization.
Change the LAN address for R3 to 192.168.3.64/26.

37 Why would a network administrator want to limit the size of failure domains when designing a network?
to eliminate the effects of Ethernet collisions
to reduce the impact of a key device or service failure
to reduce the impact of Internet congestion on critical traffic
to eliminate the need to block broadcast packets at the edge of the local network

38

Refer to the exhibit. Router1 and Router2 are both running RIPv2 with autosummarization disabled. Which subnet mask will Router1
associate with network 192.168.4.16/28?
255.255.0.0
255.255.240.0
255.255.255.0
255.255.255.240
255.255.255.248

39 What should be considered when designing an addressing scheme that uses private IP address space?
Private IP addresses are globally routable.
Address summarization is not recommended.
Hierarchical design principles should be utilized.
Discontiguous networks are no longer problematic.
40

Refer to the exhibit. Router2 is unable to receive EIGRP routes from Router1. Based on the command output, what is most likely the
cause of the failure?
Automatic summarization is in effect.
The values for DUAL calculation have been changed.
The autonomous system number that is configured on each router does not match.
The interfaces that connect the two routers have not been configured correctly.

41 What are two characteristics of EIGRP? (Choose two.)


It supports a maximum hop count of 15.
It sends small hello packets to maintain knowledge of its neighbors.
It forwards complete routing tables in its updates to neighboring routers.
It supports equal and unequal cost load balancing.
It supports only one network layer protocol.

42

Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?
It identifies traffic on all inside interfaces to be translated and given access to the ISP router.
It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.
It allows traffic from the ISP to reach all of the inside interfaces.
It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router.
It allows traffic from the ISP router to the fa0/1 interface.

43

Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?
the session from host A to host B
the session from host B to hosts C and D
the session from host B to hosts E and F
the session from host E and host F to host A and host B

44 A network administrator is configuring an edge router to support external access to several internal web servers that have private IP
addresses. Which type of address resolution would be appropriate for this scenario?
PAT
static PAT
static NAT
dynamic NAT

45
Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network
administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command
output, what is the possible problem that prevents the information from being received by the new switch?
VTP version mismatch
VTP domain name mismatch
VTP revision number mismatch
time synchronization problems

Showing 3 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DRSEnt Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise
(Version 4.0)

Time Remaining:

46

Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?
It will set the gateway of last resort for R1.
It will configure the IP address 10.1.1.2 on one interface of R1.
It configures the router to forward traffic that is destined for the 192.168.1.128/26 network through the interface with IP address
10.1.1.2.
It configures a static route for all packets with the source network address 192.168.1.128/26.

47 A Frame Relay service provider is reviewing a contract with a potential customer. Which term would be used when referencing the
minimum guaranteed bandwidth that is provided on each virtual circuit?
EIR
CIR
Tc
Bc
DE

48

Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the
primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal
operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic
to ISP2. The administrator configures two default routes:

BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200


BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1

However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the
routing table. Why is the first default route not showing?
The first configuration command overwrites the second command.
The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0
network.
This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the
routing table.
The first default route cannot be installed into the routing table unless the administrator manually disables the second default route
with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.

49

Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have
Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the
network?
R1
R2
R3
ISP

50 Which statement is true about ACLs that are applied to VTY lines on Cisco routers?
ACLs can be used to encrypt VTY transmissions.
ACLs are applied using the access-class command.
When ACLs are applied to VTY lines, the VTY password should be removed.
The ACL provides the flexibility for a specific user to login remotely from different locations with any IP address.

51
52 While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the network
configuration. How many host addresses can be created for each subnetwork in this addressing scheme?
510
512
1022
1024

Showing 4 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR, if all
the routers are booted at the same time? (Choose two.)
R1 will be the DR.
R4 will be the DR.
R5 will be the DR.
R2 will be the BDR.
R3 will be the BDR.
R4 will be the BDR.

You might also like