Professional Documents
Culture Documents
1
After comparing a previous baseline to current network statistics, the network engineer has
discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify
administration and control the unwanted traffic? (Choose two.)
add an ACL at the router in the enterprise edge to block the traffic
configure all hosts with the same default gateway to eliminate unnecessary broadcasts
deploy one core ISP router to reduce the delay in path determination
2 Top of Form
What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)
172.16.0.255
172.16.16.16
172.16.127.127
172.16.128.1
172.17.1.1
172.18.1.1
Bottom of Form
3 Top of Form
A RIPv2 enabled router has been configured with the redistribute static command. What function does
this command serve?
creates a default route
establishes a backup static route which can be used if the dynamic routing protocol fails
Answer point; in chapter 5 part 5.2.3.1
RIPv2 propagates a default route to its neighbor routers as part of its routing updates. To accomplish this, create the default route and then add
redistribute static to the RIPv2 configuration.
RIPv1 requires enhanced router processors and extra RAM to function effectively.
RIPv1 consumes excessive bandwidth by multicasting routing updates using a Class D address.
Bottom of Form
5 Top of Form
What is the purpose of assigning an IP address to a Layer 2 switch?
to allow in-band management
6 Top of Form
What are two advantages of using dynamic routing protocols in a network? (Choose two.)
They adapt to topological changes.
They enable routers to share information about the reachability and status of remote networks.
Bottom of Form
7 Top of Form
Which two statements correctly describe RSTP? (Choose two.)
It is a Cisco proprietary protocol.
8 Top of Form
Which action is taken by a switch on untagged frames that are received on a 802.1q trunk interface?
They are dropped.
They are forwarded out all interfaces except the receiving interface.
Bottom of Form
9 Top of Form
What do companies gain from the services performed at the enterprise edge?
faster communication with server farms
enhanced performance and reliability through VLANs and redundant trunk links
Bottom of Form
10 Top of Form
What is the function of mutilink PPP?
It allows VLAN ID information to be forwarded between multiple routers on the WAN.
HUB1, D, E
SW4, HUB1, C, D, E
12 Top of Form
Which subprotocol does PPP use to establish, maintain, test, and terminate a point-to-point link?
LCP
NCP
IPCP
IPXCP
Answer key: Chapter 7 part 7.2.2.3
PPP uses the Link Control Protocol (LCP) to establish, maintain, test, and terminate the point-to-point link.
13
Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided
by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator
configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1.
However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The
administrator configures two default routes:
However, when the administrator issued the show ip route command to verify the configuration,
only the second default route is in the routing table. Why is the first default route not showing?
The first configuration command overwrites the second command.
The first default route will be installed into the routing table if there is traffic with an IP address that is
destined for the 192.168.100.0 network.
This is expected because the link to ISP1 is active. If the link to ISP1 goes down,
then the first default route will be installed into the routing table.
The first default route cannot be installed into the routing table unless the administrator manually
disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.
Bottom of Form
14 Top of Form
What will allow a LAN switched network to maintain VLAN configuration consistency across the network?
Enable CDP on all switch access ports.
Refer to the exhibit. Which route will appear in the routing table?
R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1
16 Top of Form
A Frame Relay service provider is reviewing a contract with a potential customer. Which term would be
used when referencing the minimum guaranteed bandwidth that is provided on each virtual circuit?
EIR
CIR
Tc
Bc
DE
Bottom of Form
17 Top of Form
Refer to the exhibit. Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A
to access host B?
192.168.1.32/26
192.168.1.64/26
192.168.1.126/26
192.168.1.129/26
Bottom of Form
18 Top of Form
Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts,
while allowing these hosts to reach all other devices on the company networks. Where should the ACL
shown in the exhibit be placed to meet these requirements?
R2: Fa0/0 inbound
R1: S0/1/0 outbound
19 Top of Form
What is a feature of UDP that makes it the preferred transport protocol for VoIP communications?
minimizes delay and latency
20 Top of Form
Refer to the exhibit. A network administrator configures a Cisco router for inter-VLAN routing.
The router is connected to port Fa0/24 on the switch using a straight-through cable and all switchports are
configured as access ports. What will be the result of the configuration?
Inter-VLAN traffic will not be routed.
The switch will add VLAN tags and forward them to the router.
The router subinterfaces will add the appropriate VLAN tags and route between VLANs.
The switch port will auto-negotiate to a trunk port and will allow for inter-VLAN routing.
Bottom of Form
21 Top of Form
What are two characteristics of a static route? (Choose two.)
A static route can be used by border routers to provide secure and stable paths to the ISP.
22 Top of Form
Which statement is true about the difference between CHAP and PAP in PPP authentication?
PAP and CHAP provide equivalent protection against replay attacks.
PAP sends the password encrypted and CHAP does not send the password at all.
PAP uses a two-way handshake method and CHAP uses a three-way handshake method.
PAP sends the password once and CHAP sends the password repeatedly until acknowledgement of
authentication is received.
Bottom of Form
23 Top of Form
What is the difference between the passive and active route status as displayed in an EIGRP topology table?
Routes that are passive are never updated.
Routes that are passive are waiting for the neighbor adjacency process to complete.
Bottom of Form
24 Top of Form
Refer to the exhibit. EIGRP has been configured on all routers in the network. What is the reason for the rou
the last line of the routing table to be marked as D EX?
The route is configured as a static route on router R1.
The route is learned from another routing protocol or from outside the EIGRP network.
The route is in the “Active” state and will be removed from the routing table in 4 minutes and 23 second
Bottom of Form
25 Top of Form
Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located
on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems
exist in this network? (Choose two.)
There is a routing loop occurring between all three routers.
There is a network statement missing.
26 Top of Form
Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues
the show ip ospf neighbor command to check the status of operation. Which statement is true?
RB has the lowest priority value.
RA and RB can not form an adjacency because they are stuck in the 2-way state.
Bottom of Form
27 Top of Form
Refer to the exhibit. What is the result of the address translation configuration for traffic that exits interface
s0/0/0?
All hosts on the inside network will have their addresses translated to 172.31.232.182.
All hosts that connect to interface s0/0/0 will have their addresses translated to 172.31.232.0/24 addresse
All hosts on the 172.31.232.0/24 network will have their addresses translated to 209.165.202.1.
All hosts on the inside network will have their addresses translated to any one of the addresses from
the 209.165.202.0/24 subnet.
Bottom of Form
28 Top of Form
Which element of the hierarchical design model provides a connection point for end-user devices to the
network?
core layer
edge device
access layer
enterprise edge
distribution layer
Bottom of Form
29 Top of Form
What are two features of an extended IP ACL? (Choose two.)
It uses numbers 1 through 99 for identification.
It detects malicious attacks against the network and logs them on a server.
It can filter traffic based on the protocol and port numbers.
30 Top of Form
Refer to the exhibit. An administrator sees this error message after entering commands to configure a router
interface. Which command could the administrator enter that would avoid the error?
Router(config-if)# ip address 192.168.4.0/24
32 Top of Form
Refer to the exhibit. Routers R1 and R2 cannot communicate. What could be the cause of the problem?
Usernames on both routers R1 and R2 are misconfigured.
33 Top of Form
What is the maximum size of an IEEE 802.1q frame?
4 bytes
64 bytes
1280 bytes
1500 bytes
1522 bytes
65,535 bytes
Answer key: Chapter 3 part 3.3.3.2
Ethernet frames have a minimum size of 64 bytes and a maximum size of 1518 bytes, however a tagged Ethernet frame can be up to 1522 bytes
In size..
34 Top of Form
Refer to the exhibit. What is represented by the Null0 route for the 128.107.0.0 network?
a child route that is defined
35 Top of Form
Which two statements describe how the information contained in a BPDU is used by a switch?
(Choose two.)
to set the duplex mode of a redundant link
36
Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses
are valid inside global addresses? (Choose two.)
192.168.1.1
192.168.1.2
198.133.219.1
198.133.219.102
198.133.219.103
Bottom of Form
37 Top of Form
Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?
the session from host A to host B
38 Top of Form
Refer to the exhibit. OSPF has been configured as a routing protocol on all routers in OSPF area 0.
Based on the cost value of the links, which path will be selected by the SPF algorithm to forward traffic
from router R4 to network A?
R4-R2-R1
R4-R3-R1
R4-R2-R3-R1
R4-R3-R2-R1 (because it has 25 cost, it use for select the shortest path to each destination and the total c
of each path Answer key chapter 6 part 6.1.2.2 )
39 Top of Form
In order for a VLAN to be created on a switch, what configuration parameter is required?
VTP domain name
VLAN number
VLAN IP address
40 Top of Form
Refer to the exhibit. OSPF has been configured on all routers. What is the DR/BDR status immediately
after all routers have converged?
R1 is the DR. R3 is the BDR.
Delete the ACL and add it back, noting changes in traffic flow.
Remove the ACL from any configured interface and note traffic changes.
Verify the counters on the router interface and see if they are incrementing.
Bottom of Form
42 Top of Form
Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all
internal networks but do not have Internet access. On which router should the commands,
shown in the exhibit, be added to provide Internet access for all hosts in the network?
R1
R2 (because R2 is connected to internet (border router) we use default route or static route on the router
connect to ISP)
R3
ISP
Bottom of Form
43 Top of Form
How does CHAP secure connectivity on a PPP link?
It uses a two-way handshake to send the username and password.
It designates the remote node to control the frequency and timing of the login attempts.
It authenticates the username and password during initial link establishment and repeatedly during
the time the link is active.
Answer Key chapter 7 part 7.2.4.2:
CHAP is a more secure authentication process than PAP. CHAP does not send the password across the link.
Authentication occurs both during initial link establishment and repeatedly during the time the link is active. The called device is in control
frequency and timing of the authentication, making a hijack attack extremely unlikely.
44 Top of Form
A network administrator is creating an addressing scheme and has determined that the company network
192.168.1.0/24 will require 8 subnets with at least 25 hosts on each subnet. Which subnet mask will meet
these requirements?
/25
/26
/27
/28
/29
Bottom of Form
45 Top of Form
Which routing protocol uses RTP for reliable route update delivery?
RIPv1
RIPv2
OSPF
EIGRP
Answer Key chapter 5 of ccna 3 part 5.3.44
46 Top of Form
Refer to the exhibit. An enterprise web server has a private IP address. To allow access to the web server
from external users, a static NAT statement is configured on the Border router. In an attempt to manage
traffic that is bound for the server, the network administrator creates an inbound ACL on the outside NAT
interface of the router. What address will be used in the ACL as the destination IP address?
the inside interface address of the router
47 Top of Form
Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed
when selecting the DR?
C, B, A, D
D, C, B, A
A, B, C, D
A, C, B, D
B, C, A, D
Bottom of Form
48 Top of Form
Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running
the commands displayed?
D 192.168.0.0/24 is a summary, Null0
49 Top of Form
Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will b
installed in the routing table? (Choose two.)
1
6
Answer Key please find the lowest value of AD of each router protocol like AD=110 is RIP and AD=90 is EIGRP. Routing table will install
the lowest AD of routing protocol.
50 Top of Form
Which routing protocol is unable to support discontiguous networks?
RIPv1
RIPv2
EIGRP
OSPF
Answer Key chapter 5 part 5.2.2.1 :
Due to this limitation, the subnets of the networks that RIPv1 advertises should not be discontiguous if correct routing is to occur.
51 Top of Form
What should be considered when designing an addressing scheme that uses private IP address space?
Private IP addresses are globally routable.
52 Top of Form
A network administrator at headquarters is configuring an ACL for a remote router in the branch office.
The administrator issues the command reload in 20 before the ACL is placed for testing.
What is the purpose of this command?
If remote access to the router is blocked, the router will reload in 20 seconds.
The router will automatically reload in 20 minutes even if remote connectivity is lost.
If a remote connection to the router lasts for 20 minutes, the router will save the configuration to
NVRAM and reload.
If a packet from a denied source attempts to enter an interface where the ACL is applied, the router will
reload in 20 seconds.
Answer Key chapter 8 part 8.5.3.1 of ccna3