You are on page 1of 26

How2Pass CCNA Test # 12

Print this Page

How2Pass Test Score Report


Test Taker's Name : l1nk2support Questions Attempted : 57 Correct Answers : Your score: Passing score: Pass/Fail: Fail Your time is: 0 hr 4 min 6 sec

0% 85%

Section Analysis
Section
Routing protocols: Access Control Lists: Network security threats and mitigation: Describe how a network works: WAN: Basic router operations: Basic switch operations: VLANs, VTP, RSTP, PVST, inter-vlan communication: NAT/PAT: IP addressing and IP Services: 0% 50% 100%

Score
0% 0% 0% 0% 0% 0% 0% 0% 0% 0% (0/8) (0/3) (0/2) (0/8) (0/8) (0/9) (0/4) (0/9) (0/1) (0/5)

Correct Answers/Explanations are given below

1. (QID:NA723) Which statement about RIP routing is true? Your Answer: Correct Answer: If RIP version 2 is used, the subnet mask is sent to neighboring RIP routers. Explanation: RIP (default version 1) supports subnets but does not send subnet masks in the routing updates, allowing only classful routing updates. Therefore, it does not support variable length subnet masking (VLSM). RIP version 2 sends subnet mask in the routing updates. This allows using VLSM on the network.

2. (QID:NA643) An internetwork has been configured as shown in the exhibit, with both routers using EIGRP routing for AS 44. Users on the Branch router are unable to reach any of the subnets on the HQ router. Which of the following commands is necessary to fix this problem? Exhibit

Your Answer: Correct Answer: Branch(config-router)# no auto-summary Explanation: EIGRP automatically summarizes network addresses across classful boundaries. Subnets of the same class C network are connected to the two routers. When they advertise their networks to each other, EIGRP summarizes and advertises as 192.168.10.0/24, but the receiving router does not enter this route in its routing table because it knows that this network is connected to its local interface.

3. (QID:NA722) Which access list statement will block all traffic with a destination TCP port number of 5190 while not affecting other traffic? Your Answer: Correct Answer: access-list 180 deny tcp any any eq 5190 Explanation: access-list 180 deny tcp any any eq 5190 - Correct. access-list 180 deny tcp any eq 5190 any - Incorrect; It is filtering based on source port number; It should be destination port number. access-list 180 deny ip any eq 5190 any - Incorrect; You cannot filter ports on IP protocol. access-list 180 deny tcp any eq 5190 - Incorrect; It is filtering based on source port number and/or missing destination address. access-list 180 deny telnet any any 5190 - Incorrect; You cannot filter on telnet like this.

4. (QID:NA719) Based on the topology table that is shown in the exhibit and assuming that variance is not configured for EIGRP, which route or routes should appear in the routing table? Exhibit: Router#show ip eigrp topology IP-EIGRP Topology Table for AS(100)/ID(192.168.8.21) Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia Status P 192.168.2.0/24,1 successors, FD is 2707456 via 192.168.8.22 (2707456/2195456), Serial0/0 via 192.168.8.18 (3815424/281600), Serial0/2 P 192.168.8.20/30,1 successors, FD is 2169856 via Connected, Serial0/0 P 192.168.8.16/30,1 successors, FD is 3789824 via Connected, Serial0/2 P 192.168.8.24/30,1 successors, FD is 2681856 via 192.168.8.22 (2681856/2169856), Serial0/0 via 192.168.8.18 (4301824/2169856), Serial0/2

Your Answer: Correct Answer: D 192.168.8.24/30 [90/2681856] via 192.168.8.22, 00:27:50, Serial0/0 Explanation: Let us understand the output of show ip eigrp topology command. In order to answer this question, you must understand the following portion of each entry, in the output of show ip eigrp topology command via ... (2707456/2195456), ... The first metric in the parenthesis is Feasible Distance (FD) and the second metric is Advertised Distance (AD), also called Reported Distance (RD). The topology table holds these two metrics for every path. Advertised Distance is the metric that is reported by the neighbor routers. Feasible Distance is the metric that is reported by neighbor routers, plus the cost associated with the route from the local interface to the neighbor routers. Now, a feasible successor for a destination network is the route having the lowest value of Advertised Distance (AD). As defined above, the Advertised Distance is the EIGRP metric for a route as calculated by the neighboring router. Therefore, the feasible successor in this case is the route having the lowest value of AD (second parameter in the parenthesis). For each network EIGRP selects successors based on lowest value of Feasible Distance (FD). The successors are then shown in the routing table but the feasible successors remain in the topology table only. Also notice that routing table shows metrics as (90/FD) for EIGRP routes. Where "90" represents the Administrative Distance of EIGRP and "FD" is the lowest Feasible Distance for a destination, as shown in topology table. Now let us examine each answer: D 192.168.8.20 (2707456/2195456), Serial0/1 - Incorrect. The first value in parenthesis should be 90. - Incorrect.

D 192.168.2.0/24 [90/2707456] via 192.168.8.22, 00:27:50, Serial0/0 [90/3815424] via 192.168.8.18, 00:27:50, Serial0/2

The output shows that this network has only one successor with the FD value of 2707456. D 192.168.2.0/24 [90/3815424] via 192.168.8.18, 00:27:50, Serial0/2 - Incorrect.

The output shows the FD for this network is 2707456. This route is not even a feasible successor. D 192.168.8.24/30 [90/2681856] via 192.168.8.22, 00:27:50, Serial0/0 - Correct.

This route has an FD of 2681856 via 192.168.822, via Serial0/0, that matches the network path shown in topology table. P 192.168.8.24/30,1 successors, FD is 2681856 via 192.168.8.22 (2681856/2169856), Serial0/0 via 192.168.8.18 (4301824/2169856), Serial0/2

5. (QID:NA712) What can be done to secure the virtual terminal interfaces on a router?

(Select two) Your Answer: N/A

Correct Answer: Configure a virtual terminal password and login process. Enter an access list and apply it to the virtual terminal interfaces using the accessclass command. Explanation: You can restrict access to the the virtual terminal lines with a login process that requires correct password to gain telnet access to the router. This will allow any one telnet access into the router who knows the password. Second option is often used, in addition to the password challenge, to allow telnet access from certain IP addresses only. We create an access list allowing telnet traffic from certain hosts only, and apply it to the virtual terminal interfaces using the access-class command.

6. (QID:NA681) Which item is correct about the relationship between the protocol and its associated function? 1. 2. 3. 4. 5. 6. ICMP DHCP RARP UDP DNS ARP

I. A PC sends packets to the default gateway IP address the first since the PC turned on. II. The network administrator is checking basic IP connectivity from a workstation on a server. III. The TCP/IP protocol stack must find an IP address for packets destined for a URL. IV. A network device will automatically assign IP addresses to workstations. Your Answer: Correct Answer: I-6; II-1; III-5; IV-2 Explanation: ARP: A PC sends packets to the default gateway IP address first since the PC turned on. ICMP: The network administrator is checking basic IP connectivity from a workstation on a server. DNS: The TCP/IP protocol stack must find an IP address for packets destined for a URL. DHCP: A network device will automatically assign IP addresses to workstations.

7. (QID:NA665) Examine the following technologies, which one will you use when a router connected to a LAN has only one WAN interface, but multiple virtual circuits are needed? Your Answer:

Correct Answer: Frame Relay Explanation: Using Frame Relay subinterfaces you can create multiple virtual circuits on a single physical interface of the router and have multiple WAN connections.

8. (QID:NA727) View the exhibit carefully. With the access list applied as shown, which devices will be allowed to go through the router and access the Internet? Exhibit Your Answer: Correct Answer: none of the devices Explanation: Every Access Control List has an implicit deny at the end. A permit statement must be there to allow some traffic, otherwise all traffic will be blocked, and the same is happening here. The access list 7 explicitly denies traffic originating from PC2, destined for the Internet. This ACL has no permit statement, hence dropping the traffic from all other devices on the LAN to go through the router and access the Internet.

9. (QID:NA733) An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration? Your Answer: Correct Answer: Router# show running-config Explanation: The show running-config command displays the status of RAM and the current configuration of the Cisco router/switch.

10. (QID:NA732) View the exhibit. An administrator replaced the NIC in a desktop PC with a new NIC. The NIC in the PC configuration is set to "100 Mb Half". Now the PC has intermittent connectivity and loss of communication so the administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? Exhibit Your Answer:

Correct Answer: The switch is set to full-duplex. Explanation: The switch is configured as 100 Mb/s full-duplex but the PC NIC is configured as 100 Mb/s half-duplex. Both interfaces connected through a cable must have the same duplex settings. A duplex mismatch occurs when one device is operating at full-duplex and the other connected device is operating at halfduplex or the other way around. Duplex mismatches can cause extremely slow performance, intermittent connectivity and loss of connection.

11. (QID:NA705) View the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed? Exhibit Your Answer: Correct Answer: SwitchA does not have a VTP domain name configured. Explanation: The following two answers seem correct: SwitchA does not have a VTP domain name configured. SwitchC needs to have the VTP domain name configured. However, we need to select only one correct answer. More careful reading of the question statement reveals that we are concerned with state of the switch once the boot process is complete, and not with what is required to correct this situation. So, in the current state, "SwitchA does not have a VTP domain name configured", is the answer we need to choose.

12. (QID:NA718) What is the purpose of the OSPF router ID in a DR/BDR election? Your Answer: Correct Answer: It is used with the OSPF priority values to determine which router will become the DR or BDR in a multi-access network. Explanation: OSPF Router ID and the Election of OSPF DR/BDR OSPF elects DR and BDR on a multi-access network such as Ethernet LAN. Only the routers with OSPF priority greater than 0 can take part in this election. With default (1) or same OSPF priority on all OSPF neighbors, the router with the highest Router ID is elected as the DR for the segment. OSPF Router ID Each router in an OSPF network needs a unique ID. The ID is used to provide a unique identity to the OSPF router. This is included in any OSPF messages the router generates to announce itself to other OSPF routers in the area. This ID must be unique.

The OSPF router ID is chosen according to the following criteria: The highest router ID configured explicitly with router-id <ip address> command, in OSPF router configuration mode. The highest IP address on its loopback interfaces (Loopback interface is a logical interface on a router) is chosen as Router ID. If no loopback interface is configured then the highest IP address on one of its active physical interfaces is chosen as Router ID. If there is no active interface, the OSPF process will not start and therefore you will not have any OSPF routes in your routing table. Note: The ip ospf priority command can be used to administer which router becomes the DR on a multi-access network. This number ranges from 0-255 and defaults to 1.

13. (QID:NA647) With the use of different ports, some type of NAT maps multiple private IP addresses to a single registered IP address. Which form is it? Your Answer: Correct Answer: overloading Explanation: Overloading is the feature used in NAT that allows us to map multiple private IP addresses to a few (sometimes single) globally unique IP address. The NAT configured router keeps the track of requests by using different port numbers with each request from different private addresses.

14. (QID:NA675) View the exhibit. A network administrator is troubleshooting a connectivity problem on the serial interfaces. The output from the show interfaces command on both routers shows that the serial interface is up, line protocol is down. Given the partial output for the show running-config in the exhibit, what is the most likely cause of this problem? Exhibit Your Answer: Correct Answer: The Layer 2 framing is misconfigured. Explanation: Serial interface is up - Layer 1 ok. Line protocol is down - Layer 2 problem. On Rtr3 Serial0/0, the WAN data-link layer encapsulation (also called layer 2 framing) is configured as PPP. On other end of the point-to-point serial link, i.e., on Rtr1 Serial1/1, no layer 2 encapsulation (framing) is

configured. Cisco routers use HDLC as default WAN layer 2 encapsulation on point-to-point serial links. This means, Rtr1 Serial1/1 will use HDLC as WAN layer 2 encapsulation. Both ends of the point-to-point WAN serial link must use the same WAN layer 2 encapsulation, which is not true here. Therefore, "the layer 2 framing is misconfigured" is the correct answer.

15. (QID:NA731) View the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? Exhibit Your Answer: Correct Answer:

Explanation: When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the exiting router's interface address. Similarly, the destination IP address always remains the same (of final destination) and the destination physical (MAC) address is the receiving router's/host's interface address. In this case, when the frame is transmitted from Router1 towards Router2, the source IP address will be 10.1.3.3 (Marry), the destination IP address will be 10.1.2.2 (Robert), the source MAC address will be 0000.000c.0124 and the destination MAC address will be 0000.000c.0123.

16. (QID:NA744) View the exhibit. A technician enters the exhibited commands to configure a new router, but receives an error message when attempting to save the configuration. What can the technician do to correct the problem? Exhibit Your Answer: Correct Answer: Enter the correct command. Explanation: The technician needs to save running-config to startup-config in NVRAM. The correct command for this purpose is copy running-config startup-config. The copy startup-config running-config command restores the saved configuration in startup-config file in NVRAM to the running-config file in DRAM, so, the technician is using incorrect command. On a new router, there is no startup configuration. The %% Non-volatile configuration memory invalid or not present error message shows if the startup configuration file is found empty by the router while backup of the configuration file is taken with the

configuration file is found empty by the router while backup of the configuration file is taken with the copy start run command. Issue the copy run start command before you take the backup of the configuration file in order to avoid this error.

17. (QID:NA714) Which router command can be used to verify the type of cable connected to interface serial 0/0? Your Answer: Correct Answer: show controllers serial 0/0 Explanation: The show controllers command displays information about the physical interface itself. It will also give you the type of serial cable plugged into a serial port. Router# show controllers serial 0/0 HD unit 0, idb = 0x1229E4, driver structure at 0x127E70 buffer size 1524 HD unit 0, V.35 DCE cable cpb = 0xE2, eda = 0x4140, cda = 0x4000 <output omitted>

18. (QID:NA734) View the exhibit. Which types of devices and connections are needed to complete the LAN for optimal performance and cost efficiency? Exhibit Your Answer: Correct Answer: A: router B: switch C: switch D: UTP cable E: fiber connection F: T-1 connection Explanation: Keep in mind the requirement of optimal performance and cost efficiency. Use the process of elimination to discard incorrect answers. Start from device A, that should be a router. This eliminates one incorrect answer. Now the cable between device A and B should be Cat5 cable since the distance is only 20 meters (for cost efficiency). This eliminates two more incorrect answers. Now we have only two answers. The device B should NOT be a hub (for optimal performance). This eliminates the last incorrect answer and there we get the only correct answer: A: router B: switch C: switch

D: UTP cable E: fiber connection F: T-1 connection

19. (QID:NA640) View the exhibit. How should the FastEthernet0/1 ports on the 2950 model switches that are shown in the exhibit be configured to allow connectivity between all devices? Exhibit Your Answer: Correct Answer: SwitchX(config)#interface fastethernet 0/1 SwitchX(config-if)#switchport mode trunk Explanation: SwitchX represents both Switch1 and Switch2.

20. (QID:NA707) Drag-n-drop. Drag the term on the left to the correct description on the right. Your Answer: N/A

Correct Answer: 1:C,2:E,3:D,4:G Explanation: Term DTE PVC LMI DLCI Description a router is this type of device the most common type of virtual circuit provides status messages between DTE and DCE devices identifies the virtual connection between the DTE and the switch

21. (QID:NA488) Drag-n-drop. Drag the appropriate command on the left to the configuration task it accomplishes. (Not all options are used.) Your Answer: N/A

Correct Answer: 1:C,2:D,3:E,4:F,5:B Explanation: Configuration Task Encrypt all clear text passwords protect access to the user mode prompt Commands service password-encryption line console 0

password friendS0nly set privileged mode encrypted password set password to allow Telnet connections set privileged mode clear text password enable secret noWay1n4u line vty0 4 password 2hard2Guess enable password uwi11NeverNo

22. (QID:NA742) Drag-n-drop. Drag the description on the left to the correct term on the right. Not all description are used. Your Answer: N/A

Correct Answer: 1:A,2:C,3:F,4:B,5:E Explanation: Term E-mail Web browser Telnet Collaboration Database Not used Description a store and forward application that allows users to send messages and files in a timely manner. allows access to the Internet through a common interface to look up information or retrieve data. provides the capability to remotely access a command prompt on a remote system. allows two or more people to simultaneously create and/or modify a body work. a structured collection of records in a central location. a cryptographic protocol that provides secure communications on the Internet

23. (QID:NA741) Drag-n-drop. Order the DHCP message types as they would occur between a DHCP client and a DHCP server. Your Answer: N/A

Correct Answer: 1:C,2:B,3:D,4:A Explanation: DHCP Process 1. Client sends DHCPDISCOVER broadcast to find a DHCP Server (it has no IP address at this point). 2. Server sends DHCPOFFER message to the client, which offers an IP Address. 3. Client responds with a DHCPREQUEST message to accept the IP address it was given. 4. DHCP Server sends DHCPACK message to confirm the IP address assignment.

24. (QID:NA706) Drag-n-drop. Drag the description on the left to the correct router mode on the right.

Your Answer:

N/A

Correct Answer: 1:E,2:B,3:D,4:C,5:A Explanation: Command Mode User EXEC mode Privileged EXEC mode Global configuration mode Specific configuration modes Setup mode Description limited to basic monitoring commands provides access to all other router commands commands that affect the entire system commands that affect interfaces processes only interactive configuration dialog

25. (QID:NA716) View the exhibit. How does Spanning Tree Protocol prevent switching loops? Exhibit Your Answer: Correct Answer: STP places ports into the blocking state to disable the redundant paths. Explanation: Spanning-Tree Protocol (STP) prevents loops from being formed when switches or bridges are interconnected via multiple paths. Spanning-Tree Protocol implements the 802.1d IEEE algorithm by exchanging BPDU messages with other switches to detect loops, and then removes the loop by shutting down selected bridge interfaces (by putting them into blocking state). This algorithm guarantees that there is one and only one active path between two network devices.

26. (QID:NA639) View the exhibit. A network technician is asked to design a small network with redundancy The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? Exhibit Your Answer: Correct Answer: The router will not accept the addressing scheme.

27. (QID:NA662) Which of the following is the subnet address of 172.16.159.159/22? Your Answer:

Correct Answer: 172.16.156.0 Explanation: /22 = 255.255.252.0, the increment in 3rd octet = 256 - 252 = 4. Hence, the subnet IDs will be in multiples of 4 in third octet, that is: 172.16.4.0 172.16.8.0 ... 172.16.156.0 172.16.160.0

=> subnetwork address for host 172.16.159.159/22

Valid host range on this subnet: 172.16.156.1 to 172.16.159.254

28. (QID:NA709) Drag-n-drop. Drag each definition on the left to the matching term on the right. Your Answer: N/A

Correct Answer: 1:F,2:D,3:B,4:A,5:E,6:C Explanation: Term Cost Load Bandwidth Hop count Reliability Delay Definition A configurable value based by default on the bandwidth of the interface The amount of activity on a network resource The data capacity of a link The number of point-to-point links in a transmission path Usually refers to the bit error rate of each network link The amount of time required to move a packet from source to destination

29. (QID:NA721) Which IP addressing scheme would be correct for the topology shown in the graphic? Exhibit Your Answer: Correct Answer: Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24 Explanation: The key to answer this question is the fact that Host 1 and Host 3 reside on the same VLAN, hence they need to be configured with IP addresses on the same subnet, and Host 2, being on different VLAN, needs to have the IP address on different subnet than that of Host 1 and Host 3. The following IP addressing scheme is the only correct answer: Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24

Host 1 = 192.168.10.22/24; Host 2 = 192.168.11.23/24; Host 3 = 192.168.10.23/24

30. (QID:NA711) View the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Exhibit Your Answer: Correct Answer: Erasing current flash content is requested during the copy dialog. Explanation: When you issue the copy tftp flash command, you will be asked whether to erase the existing file(s) in the flash or not. If you have enough free space on the flash, don't erase the old IOS image, you might need it. Erase flash: before copying? [confirm] If you type 'n', the router starts copying the new IOS file to the router. If you type 'y', the router starts erasing the flash and then copying. You can keep more than one IOS images in Flash. In that case, the boot system commands determine which IOS image the router should try to load. Router(config)#boot system flash cXXXX-X-XX.XXX-XX.bin

31. (QID:NA708) Drag-n-drop. Drag the option on the left that best describes the unique advantage and disadvantage of each WAN link type to the correct box on the right. Your Answer: N/A

Correct Answer: 1:B,2:E,3:F,4:A,5:D,6:C Explanation: WAN Link Type Point to Point Circuit Switched Packet Switched Advantage Quality Efficient Cost Disadvantage Limited flexibility Low speed More complex

32. (QID:NA725) View the exhibit. Host A can communicate with Host B but not with Host C or Host D. What should the network administrator do to solve this problem? Exhibit Your Answer:

Correct Answer: Configure a router to route between VLAN2 and VLAN3. Explanation: Hosts in the same VLAN can communicate with each other, without a router, but you need a router to route traffic between different VLANs. In this scenario, Host A and Host C/Host D reside in different VLANs. The router with its FastEthernet interface connected to the switch can provide inter-VLAN communication.

33. (QID:NA713) What are three valid reasons to assign ports to VLANs on a switch? (Select three) Your Answer: N/A

Correct Answer: to isolate broadcast traffic. to logically group hosts according to function. to increase network security. Explanation: Reasons for using VLANs There are many reasons for using VLANs, including the following: To create more exible designs that group users by department, or by groups that work together, instead of by physical location. To segment devices into smaller LANs (broadcast domains) to reduce overhead caused to each host in the VLAN. To reduce the workload for STP by limiting a VLAN to a single access switch. To enforce better security by keeping hosts that work with sensitive data on a separate VLAN. To separate traffic sent by an IP phone from the traffic sent by PCs connected to the phones.

34. (QID:NA638) All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network? Your Answer: Correct Answer: debug PPP authentication Explanation: To determine if the router is performing CHAP or PAP authentication, see the output of debug ppp negotiation and debug ppp authentication commands.

35. (QID:NA717) Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity? Your Answer:

Your Answer: Correct Answer: LMI Explanation: Local Management Interface (LMI) LMI is the protocol used between the router device (DTE) and the Frame Relay switch (DCE) to manage the connection. Signaling messages for SVCs, PVC status messages, and keepalives are all LMI messages. The most important LMI message is the status inquiry message. Three LMI types can be configured on Cisco router but by default it is auto-sensed. These three types of LMI are: ansi, cisco (default), and q933a. The main functions of LMI process are: To determine the operational status of the various PVCs that the router knows about To transmit keepalive packets to ensure that the PVC stays up and does not shut down due to inactivity. About every 10 seconds, routers and switches send an LMI keep alive across the local loop. To tell the router what PVCs are available

36. (QID:NA728) View the exhibit. You enter the following line into the router: R1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.255 any eq www What is the effect of this configuration? Exhibit Your Answer: Correct Answer: The change has no effect on the packets being filtered. Explanation: Any addition to an ACL is made at the end of the ACL. Hence addition of any deny statement after already configured permit ip any any statement has no effect on the packets being filtered, because the router processes ACL statements from top to bottom.

37. (QID:NA641) View the exhibit. After SwitchB was added to the network, VLAN connectivity problems started to occur. What caused this problem? Exhibit Your Answer: Correct Answer: The revision number of SwitchB was higher than the revision number of SwitchA. Explanation:

SwitchB with higher Configuration Revision number was added to the network in VTP Server mode. Due to higher Configuration Revision number, the VLAN configuration of SwitchB was overwritten on the VLAN configuration of SwitchA, that caused VLAN connectivity problems.

38. (QID:NA690) The following exhibit displays every device attached to the network. How many collision domains are shown in this network? Exhibit Your Answer: Correct Answer: 15 Explanation: Each switch port link and each router port link is a separate collision domain. In this exhibit, the number of cables shown equals collision domains. 9 switch port links to end hosts + 3 inter-switch links + 2 router links connecting to two switches + 1 (one) link between the two routers = 15 collision domains.

39. (QID:NA743) Drag-n-drop. Drag the definition on the left to the correct term on the right. Not all definitions on the left will be used. Your Answer: N/A

Correct Answer: 1:E,2:F,3:D,4:A,5:B Explanation: SNMP: a protocol used to monitor and manage network devices. FTP: a reliable, connection-oriented service that uses TCP to transfer files between systems. TFTP: a connectionless service that uses UDP to transfer files between systems. DNS: a protocol that converts human-readable names into machine-readable addresses. DHCP: used to assign IP addresses automatically and set parameters such as subnet mask and default gateway.

40. (QID:NA730) Which of the following describe Class A host addresses? (Choose three) Your Answer: N/A

Correct Answer: The decimal value of the first octet can range from 1 to 126. The first octet represents the entire network portion of the address. The value of the first binary place in the first octet must be 0.

The value of the first binary place in the first octet must be 0. Explanation: An IP address consists of 32 bits, that is, 32 binary digits (a binary digit can be a 0 or 1). These 32 bits have been divided into 4 groups of 8 bit each, called octet. The left most octet is called first octet and left most bit in the first octet will be called 8th bit of first octet. The class of an IP address can be determined by looking at the first octet, for example 130.13.15.5 is a class 'B' IP address. Here is the detail: Class A: 1-126 127.x.x.x Class B: 128-191 Class C: 192-223 Class D: 224-239 Class E: 240-254 small number of very large networks. used for Loopback testing (127.0.0.1 is the default IP address of every NIC) medium number of medium networks. large number of small networks. used for multicasting. used for experimental purposes.

Now remember following facts for such questions: Class A addresses have 8th bit (left most) as zero, that is, 0xxxxxxx Class B addresses have 8th bit as 1 and 7th bit as 0, that is, 10xxxxxx Class C addresses have 8th & 7th bit as 1, that is, 11xxxxxx "The value of the first binary place in the first octet must be 0" is Correct assuming the writer of this question starts counting from left. Usually bit counting starts from right. If we mark this choice incorrect, there is no other third correct answer. The default subnet mask for a Class A network is 255.0.0.0, therefore, the first octet of a Class A address represents the entire network portion of the address.

41. (QID:NA720) A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown in exhibit, what configuration error is causing this problem? Exhibit: Router(config)#router ospf 1 Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

Your Answer: Correct Answer: The network wildcard mask is configured improperly. Explanation: The network command for OSPF routing process uses the network number and wildcard mask to associate router interfaces with configured area. The exhibit is showing the subnet mask form of this command, that is not used for OSPF. Here is the correct command: Router(config-router)# network 10.0.0.0 0.0.0.255 area 0 The combination of network number and wildcard mask identifies the interfaces that OSPF will operate

The combination of network number and wildcard mask identifies the interfaces that OSPF will operate on, and will also be included in its OSPF LSA advertisements. OSPF will use this command to find any interface on the router configured in the 10.0.0.0 network, and it will place any interface it finds into area 0.

42. (QID:NA729) View the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B? Exhibit Your Answer: Correct Answer: C3:C3:C3:C3:C3:C3 Explanation: When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the exiting router's interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the receiving router's/host's interface address. In this case, when the frame reaches host B, the source IP address will be 10.168.10.99 (host A) and the source physical (MAC) address will be C3:C3:C3:C3:C3:C3.

43. (QID:NA726) Which protocol adds overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? Your Answer: Correct Answer: VTP Explanation: The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs information that is then propagated to all other switches in the VTP domain.

44. (QID:NA642) Drag-n-drop. Drag the function on the left to the matching security appliance or application on the right. (Not all functions are used.) Your Answer: N/A

Correct Answer: 1:B,2:C,3:E,4:D Explanation: Security Appliance/Application Antispyware Function detects software designed to capture sensitive information and removes it from the computer

removes it from the computer Antivirus IDS Firewall prevents known malicious programs from being installed on workstations identifies malicious network traffic and alerts network personnel filters traffic based on source and destination IP address or traffic

45. (QID:NA710) View the exhibit. The network administrator has discovered that the VLAN configuration of SwitchC is not synchronized with the rest of the switched network. Why is SwitchC not receiving VTP updates? Exhibit Your Answer: Correct Answer: SwitchC has a revision number higher than that being advertised. Explanation: VTP Configuration Revision Number One of the most critical components of VTP advertisements is the configuration revision number. Each time a VTP server modifies its VLAN information, it increments the configuration revision number by one. It then sends out a VTP advertisement with the new configuration revision number. If the configuration revision number being advertised is higher than the number stored locally on the other switches in the VTP domain, they will overwrite their VLAN configurations with the new information being advertised, otherwise will ignore the VTP advertisements. Although SwitchA is in VTP Server mode, SwitchC is in VTP Client mode, and both are in the same VTP domain, yet SwitchC does not accept VTP updates from SwitchA. Notice that SwitchC has a higher VTP configuration revision number than SwitchA. When it receives the VTP advertisement from SwitchA, it simply ignores this update, considering it as outdated information, because its local VTP information has a higher configuration revision number.

46. (QID:NA715) A network administrator wants the text "Unauthorized access prohibited!" to be displayed before the login prompt, when someone tries to initiate a Telnet session to a router. The output is shown in the exhibit. Which command can be used to configure this message? Exhibit: Router# telnet 192.1.1.1 Trying 192.168.2.1 ... Open Unauthorized access prohibited! User Access Verification Password:

Your Answer:

Your Answer: Correct Answer: banner motd x Unauthorized access prohibited! x Explanation: Setting Up a Login Message/Banner The banner motd (motd stands for "message of the day") command causes a text banner to display when someone accesses the router from the console, Telnet, or an auxiliary port. The banner can span many lines. To know when you stop typing the banner text, the command uses a delimiter character, for example: Router(config)#banner motd x Unauthorized access prohibited! x Here banner motd x Unauthorized access prohibited! Message of the day command. The delimiter character indicating the start and end of the message. The message.

47. (QID:NA682) Which item gives the correct relationship between WAN connection technology and the associated communication link type? 1. 2. 3. 4. PSTN ATM Leased Line Frame Relay

I. Point to Point II. Circuit Switched III. Packet Switched IV. Cell Switched Your Answer: Correct Answer: I-3;II-1;III-4;IV-2 Explanation: I. Point to Point II. Circuit Switched III. Packet Switched IV. Cell Switched => Leased Line => PSTN => Frame Relay => ATM

48. (QID:NA637) A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information? Your Answer:

Correct Answer: Router# show ip eigrp neighbors

49. (QID:NA740) How does a switch differ from a hub? Your Answer: Correct Answer: A switch tracks MAC addresses of directly-connected devices. Explanation: Switches are layer-2 devices and perform these three basic network functions: Learning: They learn the source (MAC) address of each device connected to a port. Forwarding: They intelligently switch frames to the port or ports where the destination is located. Removing layer-2 loops: They remove loops with the Spanning Tree Protocol (STP), so that frames don't continually circle around the network.

50. (QID:NA644) For the following IP addresses, which one is a private address? Your Answer: Correct Answer: 172.20.14.36 Explanation: To conserver public IP addresses, the following ranges of IP addresses are considered as Private Networks by RFC 1918. These will not be routed on the Internet, because the Internet routers are configured to discard private addresses. 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 Any organization can use these addresses on internal hosts, this helps conserve the public IP addresses.

51. (QID:NA691) View the exhibit carefully. Host A is forwarding a packet to Host B for the first time. Which destination MAC address will be used by Host A in the ARP request? Exhibit Your Answer: Correct Answer: ff-ff-ff-ff-ff-ff Explanation:

Explanation: Remember that in Ethernet the transmission from one device to the next device takes place using MAC addresses. A frame's source address field contains MAC address of the transmitting device and destination address field contains the MAC address of receiving device (next device). The layer 3 destination address is however unchanged, representing the final destination device. When a host wants to send packets to another host (IP address), it must know the destination MAC address. Hosts can use Address Resolution Protocol (ARP) to broadcast IP address of the destination and request MAC address of the destination hosts. Hosts may or may not need to use ARP to find the destination host's MAC address based on the twostep routing logic used by a host: 1. If the destination host is on the same subnet, the sending host sends an ARP looking for the destination host's MAC address. The destination host replies with its MAC address, which is then stored in the sending host's ARP cache for subsequent transmission. 2. However, if the sending host is on a different subnet than the destination host, the sending host forwards the packet to its default gateway. In that case, the sending host uses ARP to find the default gateway's MAC address instead of destination host's MAC address (if the default gateway's MAC address is not already in its ARP cache). The FFFF.FFFF.FFFF (hexadecimal notation) is a broadcast address. The broadcast address implies that all devices on the LAN should process the frame. Therefore, all devices except the sending device (host A) will process this frame, tear down layer 2 information and check layer 3 destination address to find the intended destination device.

52. (QID:NA724) View the exhibit. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1? Exhibit Your Answer: Correct Answer: The router will forward packets from RT3 to RT2 to RT1 AND from RT3 to RT1. Explanation: We see the following route entry in the routing table of RT3 D 192.168.10.64/26 [90/2195456] via 192.168.10.9, 00:03:31, Serial0/0 [90/2681856] via 192.168.10.5, 00:03:31, Serial0/1 It shows that network 192.168.10.0/30 has two equal cost EIGRP paths: Path 1: via exit interface Serial0/0, IP address 192.168.10.9, i.e., RT3 to RT1. Path 2: via exit interface Serial0/1, IP address 192.168.10.5, i.e., RT3 to RT2 to RT1. EIGRP by default can load balance the traffic over four equal-cost paths. Therefore, RT3 will forward packets from RT3 to RT2 to RT1 AND from RT3 to RT1.

53. (QID:NA739) View the exhibit. The network administrator made the entries that are

53. (QID:NA739) View the exhibit. The network administrator made the entries that are shown and then saved the configuration. From a console connection, what password or password sequence is required for the administrator to access privileged mode on Router1? Exhibit: Router# configure terminal Router(config)# hostname Router1 Router(config)# enable secret sanfran Router(config)# enable password cisco Router(config)# line vty 0 4 Router(config-line)# password sanjose

Your Answer: Correct Answer: sanfran Explanation: The Privilege mode password can be an enable password or enable secret. If both enable password and enable secret are set, the later is used. The enable password command was introduced first in Cisco IOS, but even with encryption, breaking the password was easy to do. The enable secret command uses a hash algorithm to store the password value in the configuration, which makes breaking the password very difficult, and more secure. The vty line password (telnet password) is needed to access remote device.

54. (QID:NA735) An elementary school has a computer in every classroom. One entire wing of the school connects to a centrally located hub. The teachers have reported a slowdown in the past few weeks to the network administrator. The network administrator has analyzed the network and documented a steep increase in utilization as the teachers use a new networkbased classroom management application. Which solution will improve the performance the most? Your Answer: Correct Answer: Replace the hub with a switch. Explanation: Ethernet devices use CSMA/CD media access mechanism, on shared medium like Hub in this case, that causes a lot of collisions and bandwidth wastage due to half-duplex transmission. If we replace the hub with a switch, all devices can transmit simultaneously (called full duplex transmission), because each switchport is a separate collision domain. There is no chance of collision if each switchport is attached to only one host. This will improve the performance of network-based applications the most.

55. (QID:NA736) View the exhibit. Router1 and Router3 are already configured with RIPv2. What are the minimum network commands that are required on Router2 for all networks to

What are the minimum network commands that are required on Router2 for all networks to converge? Exhibit Your Answer: Correct Answer: (config-router)# network 192.168.0.0 (config-router)# network 192.168.1.0 (config-router)# network 192.168.3.0 Explanation: RIP needs to advertise all directly connected networks for the network to converge fully. Therefore the following minimum configuration command in router configuration mode will do the job: Router2(config-router)# network 192.168.0.0 Router2(config-router)# network 192.168.1.0 Router2(config-router)# network 192.168.3.0

56. (QID:NA738) View the exhibit. What will the router do when it next starts up? Exhibit Your Answer: Correct Answer: Start in ROM monitor mode. Explanation: These are common configuration register settings and their effects: 0x2102: The default value. Router looks for a startup configuration file in NVRAM and for a valid IOS image in Flash. 0x2142: NVRAM contents are bypassed, startup configuration is ignored. 0x2100: Router boots into ROM Monitor mode.

57. (QID:NA737) Which statements accurately describe CDP? (Choose three) Your Answer: N/A

Correct Answer: CDP is a Cisco proprietary protocol. CDP is a datalink layer protocol. CDP can discover directly connected neighboring Cisco devices. Explanation: Cisco Discovery Protocol (CDP)

The Cisco Discovery Protocol (CDP) discovers basic information about neighboring routers and switches, without needing to know the passwords for the neighboring devices. CDP supports any LAN, HDLC, Frame Relay, and ATM interface; in fact, it supports any interface that supports the use of SNAP headers. CDP is a Layer 2 media and protocol independent protocol. This protocol uses broadcasts to a MAC layer multicast to show directly connected neighbors. The router or switch, running CDP, can discover Layer 2 and Layer 3 addressing details of neighboring routers without even configuring that Layer 3 protocol. This is because CDP is not dependent on any particular Layer 3 protocol. To display the information about neighboring devices discovered using Cisco Discovery Protocol (CDP), use the show cdp neighbors privileged EXEC command. Another form of this command, show cdp neighbors detail displays detailed information about all neighbors including network address, enabled protocols, hold time, and software version. CDP is Cisco's proprietary protocol, therefore, only Cisco devices support this protocol. CDP is enabled in the configuration by default.

Repeat this test with (57) incorrectly answered question(s) Close this window

You might also like