You are on page 1of 110

CCNA

Number: 200-125
Passing Score: 800
Time Limit: 120 min
File Version: 1.0

A
QUESTION 1
A network administrator needs to configure port security on a switch. Which two statements are true?
(Choose two.)
A. The network administrator can apply port security to dynamic access ports.
B. The network administrator can apply port security to EtherChannels.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running
configuration.
D. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses,
up to the maximum defined.
E. The network administrator can configure static secure or sticky secure MAC addresses in the voice
VLAN.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which interface counter can you use to diagnose a duplex mismatch problem?
A.
B.
C.
D.
E.
F.

no carrier
late collisions
giants
CRC errors
deferred
runts

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which switching method duplicates the first six bytes of a frame before making a switching decision?
A.
B.
C.
D.

fragment-free switching
store-and-forward switching
cut-through switching
ASIC switching

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which logging command can enable administrators to correlate syslog messages with millisecond
precision?
A. no logging console

B.
C.
D.
E.

logging buffered 4
no logging monitor
service timestamps log datetime mscec
logging host 10.2.0.21

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Which two spanning-tree port states does RSTP combine to allow faster convergence? (Choose two.)
A.
B.
C.
D.
E.

blocking
learning
forwarding
discarding
listening

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which feature can you implement to reserve bandwidth for VoIP calls across the call path?
A.
B.
C.
D.

PQ
CBWFQ
round robin
RSVP

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which three statements about link-state routing are true? (Choose three.)
A.
B.
C.
D.
E.
F.

OSPF is a link-state protocol.


Updates are sent to a broadcast address.
It uses split horizon.
Routes are updated when a change in topology occurs.
RIP is a link-state protocol.
Updates are sent to a multicast address by default.

Correct Answer: ADF


Section: (none)
Explanation
Explanation/Reference:

QUESTION 8
Which command can you enter to determine whether a switch is operating in trunking mode?
A.
B.
C.
D.

show ip interface brief


show vlan
show interfaces
show interface switchport

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
What are three benefits of implementing VLANs? (Choose three.)
A. A higher level of network security can be reached by separating sensitive data traffic from other
network traffic.
B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same
network infrastructure.
C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same
network infrastructure.
D. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing
their size.
E. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.
F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the
same broadcast domain.
G. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their
size.
Correct Answer: ACG
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their
size.
A.
B.
C.
D.

Switch#show ip interface vlan 20


Switch#show vlan id 20
Switch#show ip interface brief
Switch#show interface vlan 20

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written?
(Choose two.)

A.
B.
C.
D.
E.

fd15:0db8:0000:0000:700:3:400F:527B
fd15::db8::700:3:400F:527B
fd15:db8:0::700:3:4F:527B
fd15:0db8::7:3:4F:527B
fd15:db8::700:3:400F:572B

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
When an interface is configured with PortFast BPDU guard, how does the interface respond when it
receives a BPDU?
A.
B.
C.
D.

It continues operating normally.


It goes into a down/down state.
It becomes the root bridge for the configured VLAN.
It goes into an errdisable state.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
What are three characteristics of the TCP protocol? (Choose three.)
A.
B.
C.
D.
E.
F.

It uses a single SYN-ACK message to establish a connection.


The connection is established before data is transmitted.
It ensures that all data is transmitted and received by the remote device.
It supports significantly higher transmission speeds than UDP.
It requires applications to determine when data packets must be retransmitted.
It uses separate SYN and ACK messages to establish a connection.

Correct Answer: BCF


Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
An OSPF neighbor adjacency is not formed between R3 in the main office and R4 in the Branch1 office.
What is causing the problem?
(Case Study):
Refer to the topology.
Your company has decided to connect the main office with three other remote branch offices using point-topoint serial links. You are required to troubleshoot and resolve OSPF neighbor adjacency issues between
the main office and the routers located in the remote branch offices. Use appropriate show commands to
troubleshoot the issues and answer all four questions.

Exhibit:

A.
B.
C.
D.

There is an area ID mismatch.


There is a Layer 2 issue; an encapsulation mismatch on serial links.
There is an OSPF hello and dead interval mismatch.
The R3 router ID is configured on R4.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Here are the relevant parts of the router configs:
R1interface Loopback0description ***Loopback***ip address 192.168.1.1 255.255.255.255ip ospf 1 area
0!interface Ethernet0/0description **Connected
to R1-LAN**ip address 10.10.110.1 255.255.255.0ip ospf 1 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.1
255.255.255.0ip ospf hello-interval 25ip ospf 1 area 0!router ospf 1log-adjacency-changes
R2!interface Loopback0description **Loopback**ip address 192.168.2.2 255.255.255.255ip ospf 2 area
0!interface Ethernet0/0description **Connected
to R2-LAN**ip address 10.10.120.1 255.255.255.0ip ospf 2 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.2
255.255.255.0ip ospf 2 area 0!router ospf 2log-adjacency-changes
R3username R6 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.3.3
255.255.255.255ip ospf 3 area 0!interface
Ethernet0/0description **Connected to L2SW**ip address 10.10.230.3 255.255.255.0ip ospf 3 area
0!interface Serial1/0description **Connected to R4Branch1 office**ip address 10.10.240.1 255.255.255.252encapsulation pppip ospf 3 area 0!interface
Serial1/1description **Connected to R5-Branch2
office**ip address 10.10.240.5 255.255.255.252encapsulation pppip ospf hello-interval 50ip ospf 3 area
0!interface Serial1/2description **Connected to
R6-Branch3 office**ip address 10.10.240.9 255.255.255.252encapsulation pppip ospf 3 area 0ppp
authentication chap!router ospf 3router-id
192.168.3.3!
R4!interface Loopback0description **Loopback**ip address 192.168.4.4 255.255.255.255ip ospf 4 area
2!interface Ethernet0/0ip address 172.16.113.1
255.255.255.0ip ospf 4 area 2!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.2
255.255.255.252encapsulation pppip ospf 4 area 2!router ospf 4log-adjacency-changes
R5!interface Loopback0description **Loopback**ip address 192.168.5.5 255.255.255.255ip ospf 5 area
0!interface Ethernet0/0ip address 172.16.114.1
255.255.255.0ip ospf 5 area 0!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.6
255.255.255.252encapsulation pppip ospf 5 area 0!router ospf 5log-adjacency-changes
R6username R3 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.6.6
255.255.255.255ip ospf 6 area 0!interface
Ethernet0/0ip address 172.16.115.1 255.255.255.0ip ospf 6 area 0!interface Serial1/0description
**Connected to R3-Main Branch office**ip address
10.10.240.10 255.255.255.252encapsulation pppip ospf 6 area 0ppp authentication chap!router ospf
6router-id 192.168.3.3!
On both R3 and R4 use show running-config command to check their S1/0 interfaces
R3#show running-config<<output omitted>>!interface Serial1/0description **Connected to R4-Branch1
office**ip address 10.10.240.1
255.255.255.252encapsulation pppip ospf 3 area 0!<<output omitted>>
R4#show running-config<<output omitted>>!interface Serial1/0description **Connected to R3-Main Branch
office**ip address 10.10.240.2
255.255.255.252encapsulation pppip ospf 4 area 2!<<output omitted>>
In the output above we see their Area IDs are mismatched; interface S1/0 of R3 is in area 0 (R3: ip ospf 3
area 0) while interface s1/0 of R4 is in area 2
(R4: ip ospf 4 area 2).
QUESTION 15
An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office.
What is causing the problem?
(Case Study):
Refer to the topology. Your company has decided to connect the main office with three other remote branch
offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and
the routers located in the remote branch
offices. Use appropriate show commands to troubleshoot the issues and answer all four questions.

A.
B.
C.
D.

There is an area ID mismatch.


There is a PPP authentication issue; a password mismatch.
There is an OSPF hello and dead interval mismatch.
There is a missing network command in the OSPF process on R5.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Here are the relevant parts of the router configs:
R1interface Loopback0description ***Loopback***ip address 192.168.1.1 255.255.255.255ip ospf 1 area
0!interface Ethernet0/0description **Connected
to R1-LAN**ip address 10.10.110.1 255.255.255.0ip ospf 1 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.1
255.255.255.0ip ospf hello-interval 25ip ospf 1 area 0!router ospf 1log-adjacency-changes
R2!interface Loopback0description **Loopback**ip address 192.168.2.2 255.255.255.255ip ospf 2 area
0!interface Ethernet0/0description **Connected
to R2-LAN**ip address 10.10.120.1 255.255.255.0ip ospf 2 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.2
255.255.255.0ip ospf 2 area 0!router ospf 2log-adjacency-changes
R3username R6 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.3.3
255.255.255.255ip ospf 3 area 0!interface
Ethernet0/0description **Connected to L2SW**ip address 10.10.230.3 255.255.255.0ip ospf 3 area
0!interface Serial1/0description **Connected to R4Branch1 office**ip address 10.10.240.1 255.255.255.252encapsulation pppip ospf 3 area 0!interface
Serial1/1description **Connected to R5-Branch2
office**ip address 10.10.240.5 255.255.255.252encapsulation pppip ospf hello-interval 50ip ospf 3 area
0!interface Serial1/2description **Connected to
R6-Branch3 office**ip address 10.10.240.9 255.255.255.252encapsulation pppip ospf 3 area 0ppp
authentication chap!router ospf 3router-id
192.168.3.3!
R4!interface Loopback0description **Loopback**ip address 192.168.4.4 255.255.255.255ip ospf 4 area
2!interface Ethernet0/0ip address 172.16.113.1
255.255.255.0ip ospf 4 area 2!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.2
255.255.255.252encapsulation pppip ospf 4 area 2!router ospf 4log-adjacency-changes
R5!interface Loopback0description **Loopback**ip address 192.168.5.5 255.255.255.255ip ospf 5 area
0!interface Ethernet0/0ip address 172.16.114.1
255.255.255.0ip ospf 5 area 0!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.6
255.255.255.252encapsulation pppip ospf 5 area 0!router ospf 5log-adjacency-changes
R6username R3 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.6.6
255.255.255.255ip ospf 6 area 0!interface
Ethernet0/0ip address 172.16.115.1 255.255.255.0ip ospf 6 area 0!interface Serial1/0description
**Connected to R3-Main Branch office**ip address
10.10.240.10 255.255.255.252encapsulation pppip ospf 6 area 0ppp authentication chap!router ospf
6router-id 192.168.3.3!
Continue checking their connected interfaces with the show running-config command:
R3#show running-config<<output omitted>>!interface Serial1/1description **Connected to R5-Branch2
office**ip address 10.10.240.5
255.255.255.252encapsulation pppip ospf hello-interval 50ip ospf 3 area 0!<<output omitted>>
R5#show running-config<<output omitted>>!interface Serial1/0description **Connected to R3-Main Branch
office**ip address 10.10.240.6
255.255.255.252encapsulation pppip ospf 5 area 0!<<output omitted>>
The only difference we can see here is the line ip ospf hello-interval 50 on R3. This command sets the
number of seconds R3 waits before sending the
next hello packet out this interface. In this case after configuring this command, R3 will send hello packets
to R5 every 50 seconds. But the default value
of hello-interval is 10 seconds and R5 is using it. Therefore we can think of a hello interval mismatch
problem here. You can verify with the show ip ospf
interface <interface> command on each router.
R3#sh ip ospf int s1/1Serial1/1 is up, line protocol is upInternet Address 10.10.240.5/30, Area 0Process ID
3, Router ID 192.168.3.3, Network Type
POINT_TO_POINT, Cost: 64Enabled by interface config, including secondary ip addressesTransmit Delay
is 1 sec, State POINT_TO_POINT,Timer
intervals configured, Hello 50, Dead 200, Wait 200, Retransmit 5oob-resync timeout 200Hello due in
00:00:28Supports Link-local Signaling (LLS)Index
2/2, flood queue length 0Next 0~0(0)/0~0(0)Last flood scan length is 0, maximum is 0Last flood scan
time is 0 msec, maximum is 0 msecNeighbor
Count is 0, Adjacent neighbor count is 0Suppress hello for 0 neighbor(s)
R5#sh ip ospf int s1/0Serial1/0 is up, line protocol is upInternet Address 10.10.240.6/30, Area 0Process ID
5, Router ID 10.10.240.6, Network Type

POINT_TO_POINT, Cost: 64Enabled by interface config, including secondary ip addressesTransmit Delay


is 1 sec, State POINT_TO_POINT,Timer
intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5oob-resync timeout 40Hello due in
00:00:04Supports Link-local Signaling (LLS)Index 1/1,
flood queue length 0Next 0~0(0)/0~0(0)Last flood scan length is 0, maximum is 0Last flood scan time is
0 msec, maximum is 0 msecNeighbor Count is
0, Adjacent neighbor count is 0Suppress hello for 0 neighbor(s)
So we can see both hello and dead interval are mismatched because the dead interval always four times
the value of hello interval, unless you manually
configure the dead interval (with the ip ospf dead-interval <seconds> command).
QUESTION 16
There is a missing network command in the OSPF process on R5.
(Case Study):
Scenario
Refer to the topology. Your company has decided to connect the main office with three other remote branch
offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and
the routers located in the remote branch
offices. Use appropriate show commands to troubleshoot the issues and answer all four questions.
Instructions

A. R1 ethernet0/1 is shutdown. Configure no shutdown command.


B. R1 ethernet0/1 configured with a non-default OSPF hello interval of 25; configure no ip ospf hellointerval 25
C. R2 ethernet0/1 and R3 ethernet0/0 are configured with a non-default OSPF hello interval of 25;
configure no ip ospf hello-interval 25
D. R2 ethernet0/1 and R3 ethernet0/0 are configured with a non-default OSPF hello interval of 25;
configure no ip ospf hello-interval 25

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Here are the relevant parts of the router configs:
R1interface Loopback0description ***Loopback***ip address 192.168.1.1 255.255.255.255ip ospf 1 area
0!interface Ethernet0/0description **Connected
to R1-LAN**ip address 10.10.110.1 255.255.255.0ip ospf 1 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.1
255.255.255.0ip ospf hello-interval 25ip ospf 1 area 0!router ospf 1log-adjacency-changes
R2!interface Loopback0description **Loopback**ip address 192.168.2.2 255.255.255.255ip ospf 2 area
0!interface Ethernet0/0description **Connected
to R2-LAN**ip address 10.10.120.1 255.255.255.0ip ospf 2 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.2
255.255.255.0ip ospf 2 area 0!router ospf 2log-adjacency-changes
R3username R6 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.3.3
255.255.255.255ip ospf 3 area 0!interface
Ethernet0/0description **Connected to L2SW**ip address 10.10.230.3 255.255.255.0ip ospf 3 area
0!interface Serial1/0description **Connected to R4Branch1 office**ip address 10.10.240.1 255.255.255.252encapsulation pppip ospf 3 area 0!interface
Serial1/1description **Connected to R5-Branch2
office**ip address 10.10.240.5 255.255.255.252encapsulation pppip ospf hello-interval 50ip ospf 3 area
0!interface Serial1/2description **Connected to
R6-Branch3 office**ip address 10.10.240.9 255.255.255.252encapsulation pppip ospf 3 area 0ppp
authentication chap!router ospf 3router-id
192.168.3.3!
R4!interface Loopback0description **Loopback**ip address 192.168.4.4 255.255.255.255ip ospf 4 area
2!interface Ethernet0/0ip address 172.16.113.1
255.255.255.0ip ospf 4 area 2!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.2
255.255.255.252encapsulation pppip ospf 4 area 2!router ospf 4log-adjacency-changes
R5!interface Loopback0description **Loopback**ip address 192.168.5.5 255.255.255.255ip ospf 5 area
0!interface Ethernet0/0ip address 172.16.114.1
255.255.255.0ip ospf 5 area 0!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.6
255.255.255.252encapsulation pppip ospf 5 area 0!router ospf 5log-adjacency-changes
R6username R3 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.6.6
255.255.255.255ip ospf 6 area 0!interface
Ethernet0/0ip address 172.16.115.1 255.255.255.0ip ospf 6 area 0!interface Serial1/0description
**Connected to R3-Main Branch office**ip address
10.10.240.10 255.255.255.252encapsulation pppip ospf 6 area 0ppp authentication chap!router ospf
6router-id 192.168.3.3!
Continue checking their connected interfaces with the show running-config command:
R1#show running-config<<output omitted>>!interface Ethernet0/1description **Connected to L2SW**ip
address 10.10.230.1 255.255.255.0ip ospf hellointerval
25ip ospf 1 area 0!<<output omitted>>
R2#show running-config<<output omitted>>!interface Ethernet0/1description **Connected to L2SW**ip
address 10.10.230.2 255.255.255.0ip ospf 2
area 0!<<output omitted>>
We see the hello interval on R1 is not the same as R2 (and you can verify with the show ip ospf interface
<interface> command) -> There is a hello
and dead interval mismatch problem. We should configure no ip ospf hello-interval 25 on R1.
Note: Maybe there are some versions of this question in the exam. For example there are some reports
saying that Ethernet0/1 on R1 is shutdown (and
this is the correct choice in the exam). So please be careful checking the config on the routers before
choosing the correct answers.
QUESTION 17
An OSPF neighbor adjacency is not formed between R3 in the main office and R6 in the Branch3 office.
What is causing the problem?
(Case Study):
Scenario

Refer to the topology. Your company has decided to connect the main office with three other remote branch
offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and
the routers located in the remote branch office. Use appropriate show commands to troubleshoot the
issues and answer all four questions.

A. There is an area ID mismatch.


B. There is a PPP authentication issue; the username is not configured on R3 and R6.
C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R6.


Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Here are the relevant parts of the router configs:
R1interface Loopback0description ***Loopback***ip address 192.168.1.1 255.255.255.255ip ospf 1 area
0!interface Ethernet0/0description **Connected
to R1-LAN**ip address 10.10.110.1 255.255.255.0ip ospf 1 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.1
255.255.255.0ip ospf hello-interval 25ip ospf 1 area 0!router ospf 1log-adjacency-changes
R2!interface Loopback0description **Loopback**ip address 192.168.2.2 255.255.255.255ip ospf 2 area
0!interface Ethernet0/0description **Connected
to R2-LAN**ip address 10.10.120.1 255.255.255.0ip ospf 2 area 0!interface Ethernet0/1description
**Connected to L2SW**ip address 10.10.230.2
255.255.255.0ip ospf 2 area 0!router ospf 2log-adjacency-changes
R3username R6 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.3.3
255.255.255.255ip ospf 3 area 0!interface
Ethernet0/0description **Connected to L2SW**ip address 10.10.230.3 255.255.255.0ip ospf 3 area
0!interface Serial1/0description **Connected to R4Branch1 office**ip address 10.10.240.1 255.255.255.252encapsulation pppip ospf 3 area 0!interface
Serial1/1description **Connected to R5-Branch2
office**ip address 10.10.240.5 255.255.255.252encapsulation pppip ospf hello-interval 50ip ospf 3 area
0!interface Serial1/2description **Connected to
R6-Branch3 office**ip address 10.10.240.9 255.255.255.252encapsulation pppip ospf 3 area 0ppp
authentication chap!router ospf 3router-id
192.168.3.3!
R4!interface Loopback0description **Loopback**ip address 192.168.4.4 255.255.255.255ip ospf 4 area
2!interface Ethernet0/0ip address 172.16.113.1
255.255.255.0ip ospf 4 area 2!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.2
255.255.255.252encapsulation pppip ospf 4 area 2!router ospf 4log-adjacency-changes
R5!interface Loopback0description **Loopback**ip address 192.168.5.5 255.255.255.255ip ospf 5 area
0!interface Ethernet0/0ip address 172.16.114.1
255.255.255.0ip ospf 5 area 0!interface Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.6
255.255.255.252encapsulation pppip ospf 5 area 0!router ospf 5log-adjacency-changes
R6username R3 password CISCO36!interface Loopback0description **Loopback**ip address 192.168.6.6
255.255.255.255ip ospf 6 area 0!interface
Ethernet0/0ip address 172.16.115.1 255.255.255.0ip ospf 6 area 0!interface Serial1/0description
**Connected to R3-Main Branch office**ip address
10.10.240.10 255.255.255.252encapsulation pppip ospf 6 area 0ppp authentication chap!router ospf
6router-id 192.168.3.3!
R3#show running-config<<output omitted>>username R6 password CISCO36!interface
Serial1/2description **Connected to R6-Branch3 office**ip
address 10.10.240.9 255.255.255.252encapsulation pppip ospf 3 area 0ppp authentication chap!<<output
omitted>>!router ospf 3router-id
192.168.3.3!<<output omitted>>
R6#show running-config<<output omitted>>username R3 password CISCO36!interface
Serial1/0description **Connected to R3-Main Branch office**ip
address 10.10.240.10 255.255.255.252encapsulation pppip ospf 6 area 0ppp authentication chap!<<output
omitted>>!router ospf 6router-id
192.168.3.3!<<output omitted>>
We are not sure about the configuration of ppp authentication in this case. Some reports said that only one
router has the ppp authentication chap
command but it is just a trick and is not the problem here. The real problem here is R6 uses the same
router-id of R3 (192.168.3.3) so OSPF
neighborship cannot be established. In real life, such configuration error will be shown in the command line
interface (CLI). So please check carefully for
this question.
QUESTION 18

What are three advantages of VLANs? (Choose three.)


A.
B.
C.
D.
E.
F.

They establish broadcast domains in switched networks.


They provide a low-latency internetworking alternative to routed networks.
They utilize packet filtering to enhance network security.
They can simplify adding, moving, or changing hosts on the network.
They allow access to network services based on department, not physical location.
They provide a method of conserving IP addresses in large networks.

Correct Answer: ADE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which command can you enter to determine whether serial interface 0/2/0 has been configured using
HDLC encapsulation?
A.
B.
C.
D.

router#show platform
router#show interfaces Serial 0/2/0
router#show ip interface s0/2/0
router#show ip interface brief

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is
caused by excessive end-to-end time?
A.
B.
C.
D.

packet loss
jitter
successive packet loss
round-trip time latency

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Refer to the exhibit.

Which of these statements correctly describes the state of the switch once the boot process has been
completed?
A.
B.
C.
D.

The switch will need a different IOS code in order to support VLANs and ST.
Remote access management of this switch will not be possible without configuration change.
As FastEthernet0/12 will be the last to come up, it will be blocked by STP.
More VLANs will need to be created for this switch.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Refer to the exhibit.

The network administrator normally establishes a Telnet session with the switch from host A. However,
host A is unavailable. The administrator's
attempt to telnet to the switch from host fails, but pings to the other two hosts are successful. What is the
issue?
A.
B.
C.
D.
E.

The switch interfaces need the appropriate IP addresses assigned.


Host and the switch need to be in the same subnet.
The switch needs an appropriate default gateway assigned.
The switch interface connected to the router is down.
Host needs to be assigned an IP address in VLAN 1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Which condition does the err-disabled status indicate on an Ethernet interface?

A.
B.
C.
D.
E.
F.

There is a duplex mismatch.


The device at the other end of the connection is powered off.
The serial interface is disabled.
The interface is configured with the shutdown command.
Port security has disabled the interface.
The interface is fully functioning.

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Which statement about RADIUS security is true?
A.
B.
C.
D.

It supports EAP authentication for connecting to wireless networks.


It provides encrypted multiprotocol support.
Device-administration packets are encrypted in their entirety.
It ensures that user activity is fully anonymous.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
A router has learned three possible routes that could be used to reach a destination network. One route is
from EIGRP and has a composite metric of
20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4.
Which route or routes will the router install in
the routing table?
A.
B.
C.
D.
E.

the RIPv2 route


all three routes
the OSPF and RIPv2 routes
the OSPF route
the EIGRP route

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Which two correctly describe steps in the OSI data encapsulation process? (Choose two.)
A. The presentation layer translates bits into voltages for transmission across the physical link.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
D. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control

information.
E. The transport layer divides a data stream into segments and may add reliability and flow control
information.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which two statements about IPv4 multicast traffic are true? (Choose two.)
A.
B.
C.
D.
E.

It burdens the source host without affecting remote hosts.


It uses a minimum amount of network bandwidth.
It is bandwidth-intensive.
It simultaneously delivers multiple streams of data.
It is the most efficient way to deliver data to multiple receivers.

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
Refer to the exhibit.

All of the routers in the network are configured with the ip subnet-zero command. Which network addresses
should be used for Link A and Network A?
(Choose two.)
A.
B.
C.
D.
E.
F.

Link A 172.16.3.0/30
Link A 172.16.3.112/30
Network A 172.16.3.48/26
Network A 172.16.3.128/25
Link A 172.16.3.40/30
Network A 172.16.3.192/26

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which type of device can be replaced by the use of subinterfaces for VLAN routing?
A. Layer 2 bridge

B. Layer 2 switch
C. Layer 3 switch
D. router
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has builtin security mechanisms?
A.
B.
C.
D.

X.25
HDLC
PPP
Frame Relay

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Which statement about LLDP is true?
A.
B.
C.
D.

It is a Cisco proprietary protocol.


It is configured in global configuration mode.
The LLDP update frequency is a fixed value.
It runs over the transport layer.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
What are two benefits of private IPv4 IP addresses? (Choose two.)
A.
B.
C.
D.
E.

They are routed the same as public IP addresses.


They are less costly than public IP addresses.
They can be assigned to devices without Internet connections.
They eliminate the necessity for NAT policies.
They eliminate duplicate IP conflicts.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33

If the primary root bridge experiences a power loss, which switch takes over?
A.
B.
C.
D.

switch 0040.00.90C5
itch 00E0.F90B.6BE3
switch 0004.9A1A.C182
switch 00E0.F726.3DC6

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP
addresses of the devices with which the router
has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need
to be checked. What command will display
the required information?
A.
B.
C.
D.

Router# show ip eigrp neighbors


Router# show ip eigrp interfaces
Router# show ip eigrp adjacency
Router# show ip eigrp topology

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
What is the authoritative source for an address lookup?
A.
B.
C.
D.

a recursive DNS search


the operating system cache
the ISP local cache
the browser cache

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which command can you enter to verify that a BGP connection to a remote device is established?
A.
B.
C.
D.

show ip bgp summary


show ip community-list
show ip bgp paths
show ip route

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 37
Refer to the exhibit.

The two connected ports on the switch are not turning orange or green. Which three would be the most
effective steps to troubleshoot this physical layer problem? (Choose three.)
A.
B.
C.
D.
E.
F.

Ensure the switch has power.


Reseat all cables.
Ensure cable A is plugged into a trunk port.
Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.
Reboot all of the devices.
Ensure that cables A and are straight-through cables.

Correct Answer: ABF


Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
During which phase of PPPoE is PPP authentication performed?
A.
B.
C.
D.
E.

the PPP Session phase


Phase 2
the Active Discovery phase
the Active Discovery phase
Phase 1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)
A.
B.
C.
D.
E.
F.

The tunnel interface IP address is misconfigured.


The tunnel interface is down.
A valid route to the destination address is missing from the routing table.
The tunnel address is routed through the tunnel itself.
The ISP is blocking the traffic.
The ISP is blocking the traffic.

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Which three statements about IPv6 prefixes are true? (Choose three.)
A.
B.
C.
D.
E.
F.

FEC0::/10 is used for IPv6 broadcast.


FC00::/7 is used in private networks.
FE80::/8 is used for link-local unicast.
FE80::/10 is used for link-local unicast.
2001::1/127 is used for loopback addresses.
FF00::/8 is used for IPv6 multicast.

Correct Answer: BDF


Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
Which command can you enter to display duplicate IP addresses that the DHCP server assigns?

A.
B.
C.
D.

show ip dhcp conflict 10.0.2.12


show ip dhcp database 10.0.2.12
show ip dhcp server statistics
show ip dhcp binding 10.0.2.12

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Refer to the exhibit.

Which three ports will be STP designated ports if all the links are operating at the same bandwidth?
(Choose three.)
A.
B.
C.
D.
E.
F.

Switch B - F0/0
Switch A - Fa0/1
Switch - Fa0/l
Switch - F0/1
Switch A - Fa0/0
Switch - Fa0/0

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:
QUESTION 43
Which two statements about using leased lines for your WAN infrastructure are true? (Choose two.)
A.
B.
C.
D.
E.
F.

Leased lines provide inexpensive WAN access.


Leased lines with sufficient bandwidth can avoid latency between endpoints.
Leased lines require little installation and maintenance expertise.
Leased lines provide highly flexible bandwidth scaling.
Multiple leased lines can share a router interface.
Leased lines support up to T1 link speeds.

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
Refer to the exhibit.

The network administrator cannot connect to Switch 1 over a Telnet session, although the hosts attached
to Switch1 can ping the interface Fa0/0 of the
router. Given the information in the graphic and assuming that the router and Switch2 are configured
properly, which of the following commands should
be issued on Switch1 to correct this problem?
A.
B.
C.
D.
E.

Switch1(config)# ip default-gateway 192.168.24.1


Switch1(config)# interface fa0/1Switch1(config-if)# switchport mode trunk
Switch1(config)# line con0Switch1(config-line)# password ciscoSwitch1(config-line)# login
Switch1(config)# interface fa0/1Switch1(config-if)# ip address 192.168.24.3 255.255.255.0
Switch1(config)# interface fa0/1Switch1(config-if)# duplex fullSwitch1(confiq-if)# speed 100

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
Which two statements about IPv6 and routing protocols are true? (Choose two.)
A.
B.
C.
D.
E.

EIGRPv3 was developed to support IPv6 routing.


OSPFv3 was developed to support IPv6 routing.
Loopback addresses are used to form routing adjacencies
EIGRP, OSPF, and BGP are the only routing protocols that support IPv6.
Link-local addresses are used to form routing adjacencies.

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Refer to the exhibit.

Each of these four switches has been configured with a hostname, as well as being configured to run
RSTP. No other configuration changes have been
made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces?
(Choose three.)
A.
B.
C.
D.

SwitchD. Gi0/2, root


SwitchA, Fa0/2, designated
SwitchB, Gi0/l, designated
SwitchA, Fa0/l, root

E. SwitchB, Gi0/2, root


F. SwitchC, Fa0/2, root
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which feature builds a FIB and an adjacency table to expedite packet forwarding?
A.
B.
C.
D.

cut through
fast switching
process switching
Cisco Express Forwarding

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
Which command can you enter to verify that a 128-bit address is live and responding?
A.
B.
C.
D.

traceroute
telnet
ping
ping ipv6

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
What will happen if a private IP address is assigned to a public interface connected to an ISP?
A.
B.
C.
D.

A conflict of IP addresses happens, because other public routers can use the same range.
Addresses in a private range will not be routed on the Internet backbone.
Only the ISP router will have the capability to access the public network.
The NAT process will be used to translate this address to a valid IP address.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
DRAG DROP
PC_1 is sending packets to the FTP server. Consider the packets as they leave RouterA interface Fa0/0
towards RouterB. Drag the correct frame and
packet address to their place in the table

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 51
What are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)
A.
B.
C.
D.
E.

The interface displays a connected (up/up) state even when the duplex settings are mismatched.
1-Gbps interfaces are full-duplex by default.
Full-duplex interfaces use CSMA/CD logic, so mismatches may be disguised by collisions.
The symptoms of a duplex mismatch may be intermittent.
Autonegotiation is disabled.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
Which condition indicates that service password-encryption is enabled?
A.
B.
C.
D.

The local username password is in clear text in the configuration.


The enable secret is in clear text in the configuration.
The local username password is encrypted in the configuration.
The enable secret is encrypted in the configuration.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
Which command would you configure globally on a Cisco router that would allow you to view directly
connected Cisco devices?
A.
B.
C.
D.

cdp run
enable cdp
cdp enable
run cdp

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Which two statements about wireless LAN controllers are true? (Choose two.)
A.
B.
C.
D.
E.

They can simplify the management and deployment of wireless LANs.


They rely on external firewalls for WLAN security.
They are best suited to smaller wireless networks.
They must be configured through a GUI over HTTP or HTTPS.
They can manage mobility policies at a system-wide level.

Correct Answer: AE

Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
Which two statements about northbound and southbound APIs are true? (Choose two.)
A.
B.
C.
D.
E.
F.

Only southbound APIs allow program control of the network.


Only northbound APIs allow program control of the network.
Only southbound API interfaces use a Service Abstraction Layer.
Only northbound API interfaces use a Service Abstraction Layer.
Both northbound and southbound API interfaces use a Service Abstraction Layer.
Both northbound and southbound APIs allow program control of the network.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
Which command can you enter to set the default route for all traffic to an interface?
A.
B.
C.
D.

router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1


router(config-router)#default-information originate always
router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1
route(config-router)#default-information originate

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which step in the router boot process searches for an IOS image to load into the router?
A. mini-IOS
B. ROMMON mode
C. bootstrap
D. POST
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco routing device?
A. FHRP
B. DHCP
C. RSMLT

D. ESRP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
An administrator is unsuccessful in adding VLAN 50 to a switch. While troubleshooting the
problem, the administrator views the output of the show vtp status command, which is displayed
in the graphic. What commands must be issued on this switch to add VLAN 50 to the database?
(Choose two.)

A.
B.
C.
D.
E.
F.

Switch(config-if)# switchport access vlan 50


Switch(vlan)# vtp server
Switch(config)# config-revision 20
Switch(config)# vlan 50 name Tech
Switch(vlan)# vlan 50
Switch(vlan)# switchport trunk vlan 50

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
A.
B.
C.
D.
E.
F.

115.64.8.32
115.64.7.64
115.64.6.255
115.64.3.255
115.64.5.128
115.64.12.128

Correct Answer: BCE


Section: (none)
Explanation
Explanation/Reference:

QUESTION 61
Which of the following are types of flow control? (Choose three.)
A.
B.
C.
D.
E.

buffering
cut-through
windowing
congestion avoidance
load balancing

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse before that
route is removed from the routing table?

A.
B.
C.
D.
E.

30 seconds
60 seconds
90 seconds
180 seconds
240 seconds

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but
has failed to configure routing properly.

Which configuration will allow the hosts on the Branch LAN to access resources on the HQ LAN
with the least impact on router processing and WAN bandwidth?

A. HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5


Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6
B. HQ(config)# router rip
HQ(config-router)# network 192.168.2.0
HQ(config-router)# network 172.16.0.0
Branch(config)# router rip
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.0
C. HQ(config)# router eigrp 56
HQ(config-router)# network 192.168.2.4
HQ(config-router)# network 172.16.25.0
Branch(config)# router eigrp 56
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.4
D. HQ(config)# router ospf 1
HQ(config-router)# network 192.168.2.4 0.0.0.3 area 0
HQ(config-router)# network 172.16.25.0 0.0.0.255 area 0
Branch(config)# router ospf 1
Branch(config-router)# network 192.168.1.0 0.0.0.255 area 0
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
Which additional configuration step is necessary in order to connect to an access point that has SSID
broadcasting disabled?
A.
B.
C.
D.

Set the SSID value in the client software to public.


Configure open authentication on the AP and the client
Set the SSID value on the client to the SSID configured on the AP.
Configured MAC address filtering to permit the client to connect to the AP.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
What is one reason that WPA encryption is preferred over WEP?
A.
B.
C.
D.

A WPA key is longer and requires more special characters than the WEP key.
The access point and the client are manually configured with different WPA key values.
WPA key values remain the same until the client configuration is changed.
The values of WPA keys can change dynamically while the system is used.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which
command will display the CHAP authentication process as it occur between two routers in the network?

A.
B.
C.
D.
E.

show chap authentication


show interface serial0
debug ppp authentication
debug chap authentication
show ppp authentication chap

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67
Refer to the exhibit. The network is converged. After link-state advertisements are received from Router_A,
what information will Router_E contain in its routing table for the subnets 208.149.23.64 and
208.149.23.96?

A. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, FastEthernet0/0


208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0
B. 208.149.23.64[110/1] via 190.173.23.10, 00:00:00:07, Serial1/0
208.149.23.96[110/3] via 190.173.23.10, 00:00:00:16, FastEthernet0/0
C. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0
208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0
208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0
D. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0
208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
What are two characteristics of SSH? (Choose two.)
A. most common remote-access method
B. unsecured

C. encrypted
D. uses port 22
E. operates at the transport layer
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
Refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the
outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two.)
access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnet
access-list 101 permit ip any any

A.
B.
C.
D.
E.
F.

source ip address: 192.168.15.5; destination port: 21


source ip address:, 192.168.15.37 destination port: 21
source ip address:, 192.168.15.41 destination port: 21
source ip address:, 192.168.15.36 destination port: 23
source ip address: 192.168.15.46; destination port: 23
source ip address:, 192.168.15.49 destination port: 23

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
Refer to the graphic. It has been decided that Workstation 1 should be denied access to Server1. Which of
the following commands are required to prevent only Workstation 1 from accessing Server1 while allowing
all other traffic to flow normally? (Choose two.)

A. RouterA(config)# interface fa0/0


RouterA(config-if)# ip access-group 101 out
B. RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 101 in
C. RouterA(config)# access-list 101 deny ip host 172.16.161.150 host 172.16.162.163
RouterA(config)# access-list 101 permit ip any any
D. RouterA(config)# access-list 101 deny ip 172.16.161.150 0.0.0.255 172.16.162.163 0.0.0.0
RouterA(config)# access-list 101 permit ip any any
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
An access list was written with the four statements shown in the graphic. Which single access list
statement will combine all four of these statements into a single statement that will have exactly the same
effect?

A.
B.
C.
D.
E.

access-list 10 permit 172.29.16.0 0.0.0.255


access-list 10 permit 172.29.16.0 0.0.1.255
access-list 10 permit 172.29.16.0 0.0.3.255
access-list 10 permit 172.29.16.0 0.0.15.255
access-list 10 permit 172.29.0.0 0.0.255.255

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
A network administrator wants to add a line to an access list that will block only Telnet access by the hosts
on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish
this task?
A. access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
B. access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
C. access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21
access-list 1 permit ip any any
D. access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23
access-list 1 permit ip any any
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 73
As a network administrator, you have been instructed to prevent all traffic originating on the LAN from
entering the R2 router. Which the following command would implement the access list on the interface of
the R2 router?

A.
B.
C.
D.

access-list 101 in
access-list 101 out
ip access-group 101 in
ip access-group 101 out

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 74
The access control list shown in the graphic has been applied to the Ethernet interface of router R1 using
the ip access-group 101 in command. Which of the following Telnet sessions will be blocked by this ACL?
(Choose two.)

A.
B.
C.
D.
E.
F.

from
from
from
from
from
from

host A to host 5.1.1.10


host A to host 5.1.3.10
host B to host 5.1.2.10
host B to host 5.1.3.8
host C to host 5.1.3.10
host F to host 5.1.1.10

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29
LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7
eq 21 any How will the above access lists affect traffic?
A.
B.
C.
D.
E.

FTP traffic from 192.169.1.22 will be denied


No traffic, except for FTP traffic will be allowed to exit E0
FTP traffic from 192.169.1.9 to any host will be denied
All traffic exiting E0 will be denied
All FTP traffic to network 192.169.1.9/29 will be denied

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any.
What is the effect of this access list configuration?
A.
B.
C.
D.

Permit all packets matching the first three octets of the source address to all destinations
permit all packet matching the last octet of the destination address and accept all source addresses
permit all packet matching the host bits in the source address to all destinations
permit all packet from the third subnet of the network address to all destinations

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
A default Frame Relay WAN is classified as what type of physical network?
A.
B.
C.
D.
E.

point-to-point
broadcast multi-access
nonbroadcast multi-access
nonbroadcast multipoint
broadcast point-to-multipoint

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
Which of the following are key characteristics of PPP? (Choose three.)
A.
B.
C.
D.
E.

can be used over analog circuits


maps Layer 2 to Layer 3 address
encapsulates several routed protocols
supports IP only
provides error correction

Correct Answer: ACE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
How should a router that is being used in a Frame Relay network be configured to avoid split horizon
issues from preventing routing updates?
A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the subinterface
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic
C. Configure many sub-interfaces on the same subnet
D. Configure a single sub-interface to establish multiple PVC connections to multiple remote router
interfaces
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
The Frame Relay network in the diagram is not functioning properly. What is the cause of the problem?

A. The Gallant router has the wrong LMI type configured


B. Inverse ARP is providing the wrong PVC information to the Gallant router
C. The S3 interface of the Steele router has been configured with the frame-relay encapsulation ietf
command
D. The frame-relay map statement in the Attalla router for the PVC to Steele is not correct
E. The IP address on the serial interface of the Attalla router is configured incorrectly
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
As a CCNA candidate, you must have a firm understanding of the IPv6 address structure. Refer to IPv6
address, could you tell me how many bits are included in each filed?
A.
B.
C.
D.

24
4
3
16

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
Refer to the exhibit. How many broadcast domains exist in the exhibited topology?

A.
B.
C.
D.
E.
F.

one
two
three
four
five
six

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
Refer to the exhibit. The network administrator has created a new VLAN on Switch1 and added host C and
host D. The administrator has properly configured switch interfaces FastEthernet0/13 through
FastEthernet0/14 to be members of the new VLAN. However, after the network administrator completed the
configuration, host A could communicate with host B, but host A could not communicate with host C or host
D. Which commands are required to resolve this problem?

A. Router(config)# interface fastethernet 0/1.3


Router(config-if)# encapsulation dot1q 3
Router(config-if)# ip address 192.168.3.1 255.255.255.0
B. Router(config)# router rip

Router(config-router)# network 192.168.1.0


Router(config-router)# network 192.168.2.0
Router(config-router)# network192.168.3.0
C. Switch1# vlan database
Switch1(vlan)# vtp v2-mode
Switch1(vlan)# vtp domain cisco
Switch1(vlan)# vtp server
D. Switch1(config)# interface fastethernet 0/1
Switch1(config-if)# switchport mode trunk
Switch1(config-if)# switchport trunk encapsulation isl
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
On a network of one department, there are four PCs connected to a switch, as shown in the following
figure: After the Switch1 restarts. Host A ( the host on the left ) sends the first frame to Host C (the host on
the right). What the first thing should the switch do?

A.
B.
C.
D.

Switch1 will add 192.168.23.12 to the switching table.


Switch1 will add 192.168.23.4 to the switching table.
Switch1 will add 000A.8A47.E612 to the switching table.
None of the above

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
Refer to the exhibit. The network administrator is in a campus building distant from Building B. WANRouter
is hosting a newly installed WAN link on interface S0/0. The new link is not functioning and the
administrator needs to determine if the correct cable has been attached to the S0/0 interface. How can the
administrator accurately verify the correct cable type on S0/0 in the most efficient manner?

A.
B.
C.
D.
E.
F.

Telnet to WANRouter and execute the command show interfaces S0/0


Telnet to WANRouter and execute the command show processes S0/0
Telnet to WANRouter and execute the command show running-configuration
Telnet to WANRouter and execute the command show controller S0/0
Physically examine the cable between WANRouter S0/0 and the DCE.
Establish a console session on WANRouter and execute the command show interfaces S0/0

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
While troubleshooting a connectivity issue from a PC you obtain the following information:
Local PC IP address: 10.0.0.35/24
Default Gateway: 10.0.0.1
Remote Sever: 10.5.75.250/24
You then conduct the following tests from the local PC:
Ping 127.0.0.1 - Successful
Ping 10.0.0.35 - Successful
Ping 10.0.0.1 - Unsuccessful
Ping 10.5.75.250 - Unsuccessful

What is the underlying cause of this problem?


A.
B.
C.
D.

A remote physical layer problem exists.


The host NIC is not functioning.
TCP/IP has not been correctly installed on the host.
A local physical layer problem exists.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers
cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of
the show ip ospf interface e0 command for routers R1 and R2.

Based on the information in the graphic, what is the cause of this problem?
A.
B.
C.
D.
E.
F.

The OSPF area is not configured properly.


The priority on R1 should be set higher.
The cost on R1 should be set higher.
The hello and dead timers are not configured properly.
A backup designated router needs to be added to the network.
The OSPF process ID numbers must match.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router
Remote27.

Which of the following command sequences will correct this problem?


A. ACCESS1(config)# line console 0
ACCESS1(config-line)# password cisco
B. Remote27(config)# line console 0
Remote27(config-line)# login
Remote27(config-line)# password cisco
C. ACCESS1(config)# line vty 0 4
ACCESS1(config-line)# login
ACCESS1(config-line)# password cisco
D. Remote27(config)# line vty 0 4
Remote27(config-line)# login
Remote27(config-line)# password cisco
E. ACCESS1(config)# enable password cisco
F. Remote27(config)# enable password cisco
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
When upgrading the IOS image, the network administrator receives the exhibited error message.

What could be the cause of this error?


A.
B.
C.
D.
E.

The new IOS image is too large for the router flash memory.
The TFTP server is unreachable from the router.
The new IOS image is not correct for this router platform.
The IOS image on the TFTP server is corrupt.
There is not enough disk space on the TFTP server for the IOS image.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 90
Refer to the exhibit, Host A pings interface S0/0 on router 3, what is the TTL value for that ping?

A.
B.
C.
D.

253
252
255
254

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
Which statement is true, as relates to classful or classless routing?
A.
B.
C.
D.

Automatic summarization at classful boundries can cause problems on discontinuous subnets


EIGRP and OSPF are classful routing protocols and summarize routes by default
RIPv1 and OSPF are classless routing protocols
Classful routing protocols send the subnet mask in routing updates

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
Refer to the exhibit. Why does the telnet connecting fail when a host attempts to connect a remote router?

A. No password was set for tty lines


B. No password was set for aux lines
C. No password was set for vty lines

D. No password was set for cty lines


Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require
dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?
A.
B.
C.
D.

dual stack
dynamic
Teredo
Manual 6to4

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
Which pairing reflects a correct protocol-and-metric relationship?
A.
B.
C.
D.

OSPF and mumber of hops and reliability


EIGRP and link cost
IS-IS and delay and reliability
RIPv2 and number of hops

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
Refer to the exhibit, The VLAN configuration of S1 is not being in this VTP enabled environment. The VTP
and uplink port configurations for each switch are displayed. Which two command sets, if issued, resolve
this failure and allow VTP to operate as expected?(choose two)

A. S2(config)#vtp mode transparent


B. S1(config)#vtp mode client
C. S2(config)#interface f0/24
S2(config-if)#switchport mode access
S2(config-if)#end
D. S2(config)#vtp mode client
E. S1(config)#interface f0/24
S1(config-if)#switchport mode trunk
S1(config-if)#end
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
How are VTP advertisements delivered to switches across the network?
A.
B.
C.
D.

anycast frames
multicast frames
broadcast frames
unicast frames

Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:
QUESTION 97
Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status? (Choose
two.)

A.
B.
C.
D.
E.

A Layer 1 problem exists.


The bandwidth is set too low.
A protocol mismatch exists.
An incorrect cable is being used.
There is an incorrect IP address on the Serial 0/0 interface.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
Refer to the exhibit. Which two statements are true about the loopback address that is configured on
RouterB? (Choose two.)

A.
B.
C.
D.

It ensures that data will be forwarded by RouterB.


It provides stability for the OSPF process on RouterB.
It specifies that the router ID for RouterB should be 10.0.0.1.
It decreases the metric for routes that are advertised from RouterB.

E. It indicates that RouterB should be elected the DR for the LAN.


Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
A network administrator is explaining VTP configuration to a new technician. What should the network
administrator tell the new technician about VTP configuration? (Choose three.)
A.
B.
C.
D.
E.

A switch in the VTP client mode cannot update its local VLAN database.
A trunk link must be configured between the switches to forward VTP updates.
A switch in the VTP server mode can update a switch in the VTP transparent mode.
A switch in the VTP transparent mode will forward updates that it receives to other switches.
A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP
revision number.
F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the
configured VTP domain membership.
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 100
Refer to the exhibit. Both switches are using a default configuration. Which two destination addresses will
host 4 use to send data to host 1? (Choose two.)

A.
B.
C.
D.
E.
F.

the IP address of host 1


the IP address of host 4
the MAC address of host 1
the MAC address of host 4
the MAC address of the Fa0/0 interface of the R1 router
the MAC address of the Fa0/1 interface of the R1 router

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:
QUESTION 101
What are two reasons a network administrator would use CDP? (Choose two.)
A.
B.
C.
D.
E.
F.

to verify the type of cable interconnecting two devices


to determine the status of network services on a remote device
to obtain VLAN information from directly connected switches
to verify Layer 2 connectivity between two devices when Layer 3 fails
to obtain the IP address of a connected device in order to telnet to the device
to determine the status of the routing protocols between directly connected routers

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102
Refer to the exhibit. The router has been configured with these commands:

What are the two results of this configuration? (Choose two.)

A. The default route should have a next hop address of 64.100.0.3.


B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.

C. The address of the subnet segment with the WWW server will support seven more servers.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without
address translation.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103
A company is installing IP phones. The phones and office computers connect to the same device. To
ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is
on a different network from that of the office computer data traffic. What is the best network device to which
to directly connect the phones and computers, and what technology should be implemented on this device?
(Choose two.)
A.
B.
C.
D.
E.
F.

hub
router
switch
STP
subinterfaces
VLAN

Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
What are two benefits of using VTP in a switching environment? (Choose two.)
A.
B.
C.
D.
E.

It allows switches to read frame tags.


It allows ports to be assigned to VLANs automatically.
It maintains VLAN consistency across a switched network.
It allows frames from multiple VLANs to use a single interface.
It allows VLAN information to be automatically propagated throughout the switching environment.

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?
(Choose two.)
A.
B.
C.
D.

It establishes a static route to the 172.16.3.0 network.


It establishes a static route to the 192.168.2.0 network.
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
It configures the router to send any traffic for an unknown destination out the interface with the
address 192.168.2.4.
E. It uses the default administrative distance.

F. It is a route that would be used last if other routes to the same destination exist.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)
A.
B.
C.
D.
E.

decreasing the number of collision domains


filtering frames based on MAC addresses
allowing simultaneous frame transmissions
increasing the size of broadcast domains
increasing the maximum length of UTP cabling between devices

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that
the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet
segments would need to be configured as trunk links? (Choose two.)

A.
B.
C.
D.
E.
F.

A
B
C
D
E
F

Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:

QUESTION 108
Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)
A.
B.
C.
D.
E.
F.

amount of RAM
bridge priority
IOS version
IP address
MAC address
speed of the links

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
Refer to the exhibit. The networks connected to router R2 have been summarized as a 192.168.176.0/21
route and sent to R1. Which two packet destination addresses will R1 forward to R2? (Choose two.)

A.
B.
C.
D.
E.
F.

192.168.194.160
192.168.183.41
192.168.159.2
192.168.183.255
192.168.179.4
192.168.184.45

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A.
B.
C.
D.
E.

A new switch has no VLANs configured.


Connectivity between VLANs requires a Layer 3 device.
VLANs typically decrease the number of collision domains.
Each VLAN uses a separate address space.
A switch maintains a separate bridging table for each VLAN.

F. VLANs cannot span multiple switches.


Correct Answer: BDE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the
10.1.3.0/24 network when different routing protocols are configured? (Choose three.)

A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is
the routing protocol.
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by
default.
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be
installed in the routing table by default.
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths
will be installed in the routing table.
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the
network with their default configurations.
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)

A. With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique
IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with
each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with
each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
Correct Answer: BDE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?
(Choose two.)
A.
B.
C.
D.
E.

alternate
backup
designated
disabled
root

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the most likely reason
that interface FastEthernet 0/10 is not the root port for VLAN 2?

A.
B.
C.
D.

This switch has more than one interface connected to the root network segment in VLAN 2.
This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree.
This switch interface has a higher path cost to the root bridge than another in the topology.
This switch has a lower bridge ID for VLAN 2 than the elected designated switch.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115
Refer to the exhibit. This command is executed on 2960Switch:
2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1
Which two of these statements correctly identify results of executing the command? (Choose two.)

A.
B.
C.
D.
E.

Port security is implemented on the fa0/1 interface.


MAC address 0000.00aa.aaaa does not need to be learned by this switch.
Only MAC address 0000.00aa.aaaa can source frames on the fa0/1 segment.
Frames with a Layer 2 source address of 0000.00aa.aaaa will be forwarded out fa0/1.
MAC address 0000.00aa.aaaa will be listed in the MAC address table for interface fa0/1 only.

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
Which of the following describes the roles of devices in a WAN? (Choose three.)
A.
B.
C.
D.
E.
F.

A CSU/DSU terminates a digital local loop.


A modem terminates a digital local loop.
A CSU/DSU terminates an analog local loop.
A modem terminates an analog local loop.
A router is commonly considered a DTE device.
A router is commonly considered a DCE device.

Correct Answer: ADE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 117

What are two characteristics of Telnet? (Choose two.)


A.
B.
C.
D.
E.

It sends data in clear text format.


It is no longer supported on Cisco network devices.
It is more secure than SSH.
It requires an enterprise license in order to be implemented.
It requires that the destination device be configured to support Telnet connections

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
What are two security appliances that can be installed in a network? (Choose two.)
A.
B.
C.
D.
E.
F.

ATM
IDS
IOS
IOX
IPS
SDM

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119
Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses.
Which are these addresses? (Choose three.)
A.
B.
C.
D.

172.16.9.0
172.16.8.0
172.16.31.0
172.16.20.0

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
QUESTION 120
Refer to the exhibit. A network technician is unable to ping from R1 to R2. What will help correct the
problem?

A.
B.
C.
D.
E.

Ensure that the serial cable is correctly plugged in to the interfaces.


Apply the clock rate 56000 configuration command to the serial0/1 interface of R1.
Configure the serial0/1 interfaces on R1 and R2 with the no shutdown command.
Change the address of the serial0/1 interface of R1 to 192.1.1.4
Change the subnet masks of both interfaces to 255.255.255.240.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 121
Refer to the exhibit. Which two statements are true of the interface configuration? (Choose two.)

A.
B.
C.
D.
E.

The encapsulation in use on this interface is PPP.


The default serial line encapsulation is in use on this interface.
The address mask of this interface is 255.255.255.0.
This interface is connected to a LAN.
The interface is not ready to forward packets.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
QUESTION 122
Refer to the exhibit. What does the address 192.168.2.167 represent?

A.
B.
C.
D.
E.
F.

the TFTP server from which the file startup-config is being transferred
the router from which the file startup-config is being transferred
the TFTP server from which the file router-confg is being transferred
the TFTP server to which the file router-confg is being transferred
the router to which the file router-confg is being transferred
the router to which the file startup-config is being transferred

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 123
Refer to the exhibit. A technician is troubleshooting a host connectivity problem. The host is unable to ping
a server connected to Switch_A. Based on the results of the testing, what could be the problem?

A.
B.
C.
D.

A remote physical layer problem exists.


The host NIC is not functioning.
TCP/IP has not been correctly installed on the host
A local physical layer problem exists.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124

In which situation would the use of a static route be appropriate?


A.
B.
C.
D.
E.

To configure a route to the first Layer 3 device on the network segment.


To configure a route from an ISP router into a corporate network.
To configure a route when the administrative distance of the current routing protocol is too low.
To reach a network is more than 15 hops away.
To provide access to the Internet for enterprise hosts.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 125
An administrator issues the show ip interface s0/0 command and the output displays that interface Serial0/0
is up, line protocol is up What does "line protocol is up" specifically indicate about the interface?
A.
B.
C.
D.
E.

The cable is attached properly.


CDP has discovered the connected device
Keepalives are being received on the interface.
A carrier detect signal has been received from the connected device
IP is correctly configured on the interface.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126
Which three statements are correct about RIP version 2? (Choose three)
A.
B.
C.
D.
E.
F.

It uses broadcast for its routing updates


It supports authentication
It is a classless routing protocol
It has a lower default administrative distance than RIP version 1
It has the same maximum hop count as version 1
It does not send the subnet mask un updates

Correct Answer: BCE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 127
How can an administrator determine if a router has been configured when it is first powered up?
A.
B.
C.
D.

A configured router prompts for a password.


A configured router goes to the privileged mode prompt.
An unconfigured router goes into the setup dialog.
An unconfigured router goes to the enable mode prompt.

Correct Answer: C

Section: (none)
Explanation
Explanation/Reference:
QUESTION 128
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:
QUESTION 129
Drag and Drop Question
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:
QUESTION 130
A network administrator receives an error message while trying to configure the Ethernet interface of a
router with IP address 10.24.24.24/29. Which statement explains the reason for this issue?
A. This address is a broadcast address.

B. VLSM-capable routing protocols must be enabled first on the router.


C. The Ethernet interface is faulty.
D. This address is a network address.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 131
Which address is the IPv6 all-RIP-routers multicast group address that is used by RIPng as the destination
address for RIP updates?
A.
B.
C.
D.

FF02::9
FF02::6
FF05::101
FF02::A

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 132
If all OSPF routers in a single area are configured with the same priority value, what value does a router
use for the OSPF router ID in the absence of a loopback interface?
A.
B.
C.
D.
E.

the IP address of the first Fast Ethernet interface


the IP address of the console management interface
the highest IP address among its active interfaces
the lowest IP address among its active interfaces
the priority value until a loopback interface is configured

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 133
The OSPF Hello protocol performs which of the following tasks? (Choose two.)
A.
B.
C.
D.
E.
F.

It provides dynamic neighbor discovery.


It detects unreachable neighbors in 90 second intervals
It maintains neighbor relationships.
It negotiates correctness parameters between neighboring interfaces.
It uses timers to elect the router with the fastest links as the designated router.
It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:

QUESTION 134
The network administrator of the Oregon router adds the following command to the router configuration: ip
route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding
this command? (Choose two.)
A.
B.
C.
D.
E.
F.

The command establishes a static route.


The command invokes a dynamic routing protocol for 192.168.12.0.
Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
Traffic for all networks is forwarded to 172.16.12.1.
This route is automatically propagated throughout the entire network
Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 135
A network administrator is planning a network installation for a large organization. The design requires 100
separate subnetworks, so the company has acquired a Class B network address. What subnet mask will
provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?
A.
B.
C.
D.
E.
F.

255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.192

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 136
Refer to Exhibit. Based on the network shown in the graphic which option contains both the potential
networking problem and the protocol or setting that should be used to prevent the
problem?

A. routing loops, hold down timers


B. switching loops, split horizon

C.
D.
E.
F.

routing loops, split horizon


switching loops, VTP
routing loops, STP
switching loops, STP

Correct Answer: F
Section: (none)
Explanation
Explanation/Reference:
QUESTION 137
Which of the following services use UDP? (Choose three.)
A.
B.
C.
D.
E.
F.

Telnet
TFTP
SNMP
DNS
SMTP
HTTP

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
QUESTION 138
What are two recommended ways of protecting network device configuration files from outside network
security threats? (Choose two.)
A.
B.
C.
D.
E.

Allow unrestricted access to the console or VTY ports.


Use a firewall to restrict access from the outside to the network devices.
Always use Telnet to access the device command line because its data is automatically encrypted.
Use SSH or another encrypted and authenticated transport to access device configurations.
Prevent the loss of passwords by disabling password encryption.

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 139
Refer to the exhibit. The switches on a campus network have been interconnected as shown. All of the
switches are running Spanning Tree Protocol with its default settings. Unusual traffic patterns are observed
and it is discovered that Switch9 is the root bridge. Which change will ensure that Switch1 will be selected
as the root bridge instead of Switch9?

A.
B.
C.
D.
E.
F.

Raise the bridge priority on Switch1


Lower the bridge priority on Switch9.
Raise the bridge priority on Switch9.
Physically replace Switch9 with Switch1 in the topology.
Disable spanning tree on Switch9.
Lower the bridge priority on Switch1.

Correct Answer: F
Section: (none)
Explanation
Explanation/Reference:
QUESTION 140
The Company WAN is migrating from RIPv1 to RIPv2. Which three statements are correct about RIP
version 2? (Choose three)
A.
B.
C.
D.
E.
F.

It has the same maximum hop count as version 1.


It uses broadcasts for its routing updates.
It is a classless routing protocol.
It has a lower default administrative distance than RIP version 1.
It supports authentication.
It does not send the subnet mask in updates.

Correct Answer: ACE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 141
If a router has four interfaces and each interface is connected to four switches, how many broadcast
domains are present on the router?
A.
B.
C.
D.

1
2
4
8

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 142
Which command can you use to set the hostname on a switch?
A.
B.
C.
D.

switch-mdf-c1(config)#hostname switch-mdf1
switch-mdf-c1>hostname switch-mdf1
switch-mdf-c1#hostname switch-mdf1
switch-mdf-c1(config-if)#hostname switch-mdf1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 143
If the primary root bridge experiences a power loss, which switch takes over?
A.
B.
C.
D.

switch 0004.9A1A.C182
switch 00E0.F90B.6BE3
switch 00E0.F726.3DC6
switch 0040.0BC0.90C5

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 144
Which IPv6 header field is equivalent to the TTL?
A.
B.
C.
D.
E.

Hop Limit
Flow Label
TTD
Hop Count
Scan Timer

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 145
Which two statements about the tunnel mode ipv6ip command are true? (Choose two.)
A.
B.
C.
D.
E.

It enables the transmission of IPv6 packets within the configured tunnel.


It specifies IPv4 as the encapsulation protocol.
It specifies IPv6 as the encapsulation protocol.
It specifies IPv6 as the transport protocol.
It specifies that the tunnel is a Teredo tunnel.

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 146
What is the correct routing match to reach 172.16.1.5/32?
A.
B.
C.
D.

172.16.1.0/26
172.16.1.0/25
172.16.1.0/24
the default route

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 147
Which command can you enter to route all traffic that is destined for 192.168.0.0/20 to a specific interface?
A.
B.
C.
D.

router(config)#ip route 192.168.0.0 255.255.240.0 GigabitEthernet0/1


router(config)#ip route 0.0.0.0 255.255.255.0 GigabitEthernet0/1
router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
router(config)#ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 148
hich technology allows a large number of private IP addresses to be represented by a smaller number of
public IP addresses?
A.
B.
C.
D.

NAT
NTP
RFC 1631
RFC 1918

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 149
What is the effect of the overload keyword in a static NAT translation configuration?
A. It enables port address translation.
B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.

D. It enables the outside interface to forward traffic


Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 150
What are three broadband wireless technologies? (Choose three.)
A.
B.
C.
D.
E.
F.

WiMax
satellite Internet
municipal Wi-Fi
site-to-site VPN
DSLAM
CMTS

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
QUESTION 151
Which condition indicates that service password-encryption is enabled?
A.
B.
C.
D.

The local username password is encrypted in the configuration.


The enable secret is encrypted in the configuration.
The local username password is in clear text in the configuration.
The enable secret is in clear text in the configuration.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 152
Which technology can enable multiple VLANs to communicate with one another?
A.
B.
C.
D.

inter-VLAN routing using a Layer 3 switch


inter-VLAN routing using a Layer 2 switch
intra-VLAN routing using router on a stick
intra-VLAN routing using a Layer 3 switch

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 153
In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three.)

A.
B.
C.
D.
E.
F.

Unlike IPv4 headers, IPv6 headers have a fixed length.


IPv6 uses an extension header instead of the IPv4 Fragmentation field.
IPv6 headers eliminate the IPv4 Checksum field.
IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field.
IPv6 headers use a smaller Option field size than IPv4 headers.
IPv6 headers use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field.

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
QUESTION 154
What is the purpose of the POST operation on a router?
A.
B.
C.
D.

determine whether additional hardware has been added


locate an IOS image for booting
enable a TFTP server
set the configuration register

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 155
Which two types of NAT addresses are used in a Cisco NAT device? (Choose two.)
A.
B.
C.
D.
E.
F.

inside local
inside global
inside private
outside private
external global
external local

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 156
What is the danger of the permit any entry in a NAT access list?
A.
B.
C.
D.

It can lead to overloaded resources on the router.


It can cause too many addresses to be assigned to the same interface.
It can disable the overload command.
It prevents the correct translation of IP addresses on the inside network.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 157
Which protocol is the Cisco proprietary implementation of FHRP?
A.
B.
C.
D.

HSRP
VRRP
GLBP
CARP

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 158
Which two statements about late collisions are true? (Choose two.)
A.
B.
C.
D.
E.

They may indicate a duplex mismatch.


By definition, they occur after the 512th bit of the frame has been transmitted.
They indicate received frames that did not pass the FCS match.
They are frames that exceed 1518 bytes.
They occur when CRC errors and interference occur on the cable.

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 159
Which three characteristics are representative of a link-state routing protocol? (Choose three.)
A.
B.
C.
D.
E.

provides common view of entire topology


exchanges routing tables with neighbors
calculates shortest path
utilizes event-triggered updates
utilizes frequent periodic updates

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
QUESTION 160
Refer to the exhibit. What is the effect of the given configuration?

A.
B.
C.
D.

It configures an inactive switch virtual interface.


It configures an active management interface.
It configures the native VLAN.
It configures the default VLAN.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 161
If primary and secondary root switches with priority 16384 both experience catastrophic losses, which
tertiary switch can take over?
A.
B.
C.
D.

a switch with priority 20480


a switch with priority 8192
a switch with priority 4096
a switch with priority 12288

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 162
Which two features can dynamically assign IPv6 addresses? (Choose two.)
A.
B.
C.
D.
E.

IPv6 stateless autoconfiguration


DHCP
NHRP
IPv6 stateful autoconfiguration
ISATAP tunneling

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163
Which command can you enter to configure a local username with an encrypted password and EXEC
mode user privileges?
A.
B.
C.
D.

Router(config)#username jdone privilege 1 password 7 08314D5D1A48


Router(config)#username jdone privilege 1 password 7 PASSWORD1
Router(config)#username jdone privilege 15 password 0 08314D5D1A48
Router(config)#username jdone privilege 15 password 0 PASSWORD1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 164
Which three commands can you use to set a router boot image? (Choose three.)
A.
B.
C.
D.
E.
F.

Router(config)# boot system flash c4500-p-mz.121-20.bin


Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.bin
Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.bin
Router> boot flash:c180x-adventerprisek9-mz-124-6T.bin
Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin
Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.bin

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
QUESTION 165
Which three statements about static routing are true? (Choose three.)
A.
B.
C.
D.
E.
F.

It uses consistent route determination.


It is best used for small-scale deployments.
Routing is disrupted when links fail
It requires more resources than other routing methods.
It is best used for large-scale deployments.
Routers can use update messages to reroute when links fail.

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
QUESTION 166
Which type of address is the public IP address of a NAT device?
A.
B.
C.
D.
E.
F.

outside global
outside local
inside global
inside local
outside public
inside public

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 167
Which command can you enter to display the hits counter for NAT traffic?
A. show ip nat statistics
B. debug ip nat
C. show ip debug nat

D. clear ip nat statistics


Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 168
Which standards-based First Hop Redundancy Protocol is a Cisco supported alternative to Hot Standby
Router Protocol?
A.
B.
C.
D.

VRRP
GLBP
TFTP
DHCP

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 169
Which command can you execute to set the user inactivity timer to 10 seconds?
A.
B.
C.
D.

SW1(config-line)#exec-timeout 0 10
SW1(config-line)#exec-timeout 10
SW1(config-line)#absolute-timeout 0 10
SW1(config-line)#absolute-timeout 10

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 170
Which command sequence can you enter to create VLAN 20 and assign it to an interface on a switch?
A. Switch(config)#vlan 20
Switch(config)#Interface gig x/y
Switch(config-if)#switchport access vlan 20
B. Switch(config)#Interface gig x/y
Switch(config-if)#vlan 20
Switch(config-vlan)#switchport access vlan 20
C. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk native vlan 20
D. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport access vlan 20
E. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk allowed vlan 20
Correct Answer: A

Section: (none)
Explanation
Explanation/Reference:
QUESTION 171
Which spanning-tree protocol rides on top of another spanning-tree protocol?
A.
B.
C.
D.

MSTP
RSTP
PVST+
Mono Spanning Tree

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 172
Which two statements about IPv6 router advertisement messages are true? (Choose two.)
A.
B.
C.
D.
E.

They use ICMPv6 type 134.


The advertised prefix length must be 64 bits.
The advertised prefix length must be 48 bits.
They are sourced from the configured IPv6 interface address.
Their destination is always the link-local address of the neighboring node.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 173
After you configure the Loopback0 interface, which command can you enter to verify the status of the
interface and determine whether fast switching is enabled?
A.
B.
C.
D.

Router#show ip interface loopback 0


Router#show run
Router#show interface loopback 0
Router#show ip interface brief

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 174
Which NAT function can map multiple inside addresses to a single outside address?
A. PAT
B. SFTP
C. RARP

D. ARP
E. TFTP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 175
What is the first step in the NAT configuration process?
A.
B.
C.
D.

Define inside and outside interfaces.


Define public and private IP addresses.
Define IP address pools.
Define global and local interfaces.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 176
What are two requirements for an HSRP group? (Choose two.)
A.
B.
C.
D.
E.

exactly one active router


one or more standby routers
one or more backup virtual routers
exactly one standby active router
exactly one backup virtual router

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 177
Which two commands can you enter to verify that a configured NetFlow data export is operational?
(Choose two.)
A.
B.
C.
D.
E.
F.

show ip flow export


show ip cache flow
ip flow ingress
ip flow egress
interface ethernet 0/0
ip flow-export destination

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 178
What are three characteristics of satellite Internet connections? (Choose three.)
A.
B.
C.
D.
E.
F.

Their upload speed is about 10 percent of their download speed.


They are frequently used by rural users without access to other high-speed connections.
They are usually at least 10 times faster than analog modem connections.
They are usually faster than cable and DSL connections.
They require a WiMax tower within 30 miles of the user location.
They use radio waves to communicate with cellular phone towers.

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
QUESTION 179
Which command sets and automatically encrypts the privileged enable mode password?
A.
B.
C.
D.

Enable password c1sc0


Secret enable c1sc0
Password enable c1sc0
Enable secret c1sc0

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 180
The enable secret command is used to secure access to which CLI mode?
A.
B.
C.
D.

global configuration mode


privileged EXEC mode
user EXEC mode
auxiliary setup mode

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 181
Refer to the exhibit. What is the result of setting the no login command?

A.
B.
C.
D.

Telnet access is denied


Telnet access requires a new password at the first login.
Telnet access requires a new password.
no password is required for telnet access.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 182
Which option describes a difference between EIGRP for IPv4 and IPv6?
A.
B.
C.
D.

Only EIGRP for IPv6 advertises all connected networks.


Only EIGRP for IPv6 requires a router ID to be configured under the routing processAS numbers are configured in EIGRP but not in EIGRPv3.
Only EIGRP for IPv6 is enabled in the global configuration mode.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 183
What is the best way to verify that a host has a path to other hosts in different networks?
A.
B.
C.
D.

Ping the loopback address.


Ping the default gateway.
Ping the local interface address.
Ping the remote network.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 184
If host Z needs to send data through router R1 to a storage server, which destination MAC address does
host Z use to transmit packets?
A.
B.
C.
D.

the host Z MAC address


the MAC address of the interface on R1 that connects to the storage server
the MAC address of the interface on R1 that connects to host Z
the MAC address of the storage server interface

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 185

Why is the Branch2 network 10.1 0.20.0/24 unable to communicate with the Server farm1 network 10.1
0.10.0/24 over the GRE tunnel?
A.
B.
C.
D.

The GRE tunnel destination is not configured on the R2 router.


The GRE tunnel destination is not configured on the Branch2 router.
The static route points to the tunnel0 interface that is misconfigured on the Branch2 router.
The static route points to the tunnel0 interface that is misconfigured on the R2 router.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 186

Why has the Branch3 router lost connectivity with R1? Use only show commands to troubleshoot because
usage of the debug command is restricted on
the Branch3 and R1 routers.
A.
B.
C.
D.

A PPP chap hostname mismatch is noticed between Branch3 and R1.


A PPP chap password mismatch is noticed between Branch3 and R1.
PPP encapsulation is not configured on Branch3.
The PPP chap hostname and PPP chap password commands are missing on the Branch3 router.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 187

Which statement about the router configurations is correct?


A.
B.
C.
D.
E.

PPP PAP is authentication configured between Branch2 and R1.


Tunnel keepalives are not configured for the tunnel0 interface on Branch2 and R2.
The Branch2 LAN network 192.168.11 0/24 is not advertised into the EIGRP network.
The Branch3 LAW network 192.168.10.0/24 is not advertised into the EIGRP network.
PPP CHAP is authentication configured between Branch1 and R1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 188

Why did Branch1 router lose WAN connectivity with R1 router?


A.
B.
C.
D.

The IP address is misconfigured on PPP multilink interface on the Branch1 router.


The PPP multilink group is
The PPP multilink group is misconfigured on the R1 serial interfaces.
The Branch1 serial interfaces are placed in a shutdown condition.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 189
While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same
switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?
A.
B.
C.
D.

show ip interface brief


show ip nat statistics
show ip statistics
show ip route

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 190
Which statement about DTP is true?
A.
B.
C.
D.

It uses the native VLAN.


It negotiates a trunk link after VTP has been configured.
It uses desirable mode by default.
It sends data on VLAN 1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 191
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the
same switch?
A.
B.
C.
D.

copy run start


traceroute
the ICMP Echo IP SLA
SPAN

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 192
Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.).
A.
B.
C.
D.
E.

duplex mismatches on Ethernet segments in the same VLAN


multiple errors on switchport interfaces
congestion on the switch inband path
a failing NIC in an end device
an overloaded shared segment

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 193
What is a difference between TACACS+ and RADIUS in AAA?
A.
B.
C.
D.

Only TACACS+ allows for separate authentication.


Only RADIUS encrypts the entire access-request packet.
Only RADIUS uses TCP.
Only TACACS+ couples authentication and authorization.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 194
Which version of SNMP first allowed user-based access?
A.
B.
C.
D.

SNMPv3 with RBAC


SNMPv3
SNMPv1
SNMPv2

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 195
Which IEEE standard does PVST+ use to tunnel information?
A.
B.
C.
D.

802.1x
802 1q
802.1w
802.1s

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 196
Which option describes the purpose of traffic policing?
A.
B.
C.
D.

It prioritizes routing protocol traffic.


It remarks traffic that is below the CIR
It drops traffic that exceeds the CIR.
It queues and then transmits traffic that exceeds the CIR.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 197
Which component of the Cisco SDN solution serves as the centralized management system?
A.
B.
C.
D.

Cisco OpenDaylight
Cisco ACI
Cisco APIC
Cisco IWAN

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 198
What are two drawbacks of implementing a link-state routing protocol? (Choose two.)
A.
B.
C.
D.
E.

the sequencing and acknowledgment of link-state packets


the high volume of link-state advertisements in a converged network
the requirement for a hierarchical IP addressing scheme for optimal functionality
the high demand on router resources to run the link-state routing algorithm
the large size of the topology table listing all advertised routes in the converged network

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 199
Which part of the PPPoE server configuration contains the information used to assign an IP address to a
PPPoE client?
A.
B.
C.
D.

virtual-template interface
DHCP
dialer interface
AAA authentication

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 200
Which process is associated with spanning-tree convergence?
A.
B.
C.
D.

determining the path cost


electing designated ports
learning the sender bridge ID
assigning the port ID

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 201
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?
A.
B.
C.
D.

It reduces the need for a backup data center.


It can redirect user requests to locations that are using fewer network resources
It enables the ISP to maintain DNS records automatically.
It eliminates the need for a GSS.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 202
Which protocol supports sharing the VLAN configuration between two or more switches?
A.
B.
C.
D.

multicast
STP
VTP
split-horizon

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 203
How can you disable DTP on a switch port?
A.
B.
C.
D.

Configure the switch port as a trunk.


Add an interface on the switch to a channel group.
Change the operational mode to static access.
Change the administrative mode to access.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 204
Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)
A.
B.
C.
D.
E.

autonomous system number


version number
router ID
subnet mask
IP address

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 205
Which type of interface can negotiate an IP address for a PPPoE client?
A. Ethernet
B. dialer
C. serial

D. Frame Relay
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 206
What is the default VLAN on an access port?
A.
B.
C.
D.

0
1
10
1024

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 207
Which statement about QoS default behavior is true?
A.
B.
C.
D.
E.

Ports are untrusted by default.


VoIP traffic is passed without being tagged.
Video traffic is passed with a well-known DSCP value of 46.
Packets are classified internally with an environment.
Packets that arrive with a tag are untagged at the edge of an administrative domain.

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 208
Refer to the exhibit. While troubleshooting a switch, you executed the show interface port-channel 1
etherchannel command and it returned this output. Which information is provided by the Load value?

A.
B.
C.
D.

the percentage of use of the link


the preference of the link
the session count of the link
the number source-destination pairs on the link

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 209
Which spanning-tree feature places a port immediately into a forwarding stated?
A.
B.
C.
D.
E.

BPDU guard
PortFast
loop guard
UDLD
Uplink Fast

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 210
Which protocol authenticates connected devices before allowing them to access the LAN?
A.
B.
C.
D.

802.1d
802.11
802.1w
802.1x

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 211
Which identification number is valid for an extended ACL?
A.
B.
C.
D.
E.
F.

1
64
99
100
299
1099

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 212
Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)
A. the type of cable that is connected to the interface.

B.
C.
D.
E.

The uptime of the interface


the status of the physical layer of the interface
the full configuration of the interface
the interface's duplex settings

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 213
Which EIGRP for IPv6 command can you enter to view the link-local addresses of the neighbors of a
device?
A.
B.
C.
D.

show ipv6 eigrp 20 interfaces


show ipv6 route eigrp
show ipv6 eigrp neighbors
show ip eigrp traffic

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 214
Which configuration can you apply to enable encapsulation on a subinterface?
A. interface FastEthernet 0/0
encapsulation dot1Q 30
ip address 10.1.1.30 255.255.255.0
B. interface FastEthernet 0/0.30
ip address 10.1.1.30 255.255.255.0
C. interface FastEthernet 0/0.30
description subinterface vlan 30
D. interface FastEthernet 0/0.30
encapsulation dot1Q 30
ip address 10.1.1.30 255.255.255.0
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 215
Which statement about slow inter VLAN forwarding is true?
A.
B.
C.
D.
E.

The VLAN is experiencing slowness in the point-to-point collisionless connection


The VLANs are experiencing slowness because multiple devices are connected to the same hub.
The local VLAN is working normally, but traffic to the alternate VLAN is forwarded slower than expected.
The entire VLAN is experiencing slowness.
The VLANs are experiencing slowness due to a duplex mismatch.

Correct Answer: E

Section: (none)
Explanation
Explanation/Reference:
QUESTION 216
Which statement about the IP SLAs ICMP Echo operation is true?
A.
B.
C.
D.

The frequency of the operation .s specified in milliseconds.


It is used to identify the best source interface from which to send traffic.
It is configured in enable mode.
It is used to determine the frequency of ICMP packets.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 217
Which option describes how a switch in rapid PVST+ mode responds to a topology change?
A. It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.
B. It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP
instance
C. It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.
D. It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP
instance.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 218
Which type of topology is required by DMVPN?
A.
B.
C.
D.

ring
full mesh
hub-and-spoke
partial mesh

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 219
Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1.
Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency?
(Choose two.)

A.
B.
C.
D.
E.

Set the subnet mask on edge-1 to 255 255.255.252.


Reduce the MTU on edge-1 to 1514.
Set the OSPF cost on edge-1 to 1522.
Reduce the MTU on edge-1 to 1500.
Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface.

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 220
Which statement about switch access ports is true?
A.
B.
C.
D.

They drop packets with 802.1Q tags.


A VLAN must be assigned to an access port before it is created.
They can receive traffic from more than one VLAN with no voice support
By default, they carry traffic for VLAN 10.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 221
Which option is a benefit of switch stacking?
A.
B.
C.
D.

It provides redundancy with no impact on resource usage.


It simplifies adding and removing hosts.
It supports better performance of high-needs applications.
It provides higher port density with better resource usage.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 222
What is the first step you perform to configure an SNMPv3 user?
A.
B.
C.
D.

Configure server traps.


Configure the server group.
Configure the server host.
Configure the remote engine ID.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 223
Which statement about named ACLs is true?
A.
B.
C.
D.
E.

They support standard and extended ACLs.


They are used to filter usernames and passwords for Telnet and SSH.
They are used to filter Layer 7 traffic.
They support standard ACLs only.
They are used to rate limit traffic destined to targeted networks.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 224
Which two switch states are valid for 802.1w? (Choose two.)
A.
B.
C.
D.
E.

listening
backup
disabled
learning
discarding

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 225
Which statement about MPLS is true?
A.
B.
C.
D.

It operates in Layer 1.
It operates between Layer 2 and Layer 3.
It operates in Layer 3.
It operates in Layer 2.

Correct Answer: B

Section: (none)
Explanation
Explanation/Reference:
QUESTION 226
Which Cisco platform can verify ACLs?
A.
B.
C.
D.

Cisco Prime Infrastructure


Cisco Wireless LAN Controller
Cisco APIC-EM
Cisco IOS-XE

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 227
Which three options are the HSRP states for a router? (Choose three.)
A.
B.
C.
D.
E.
F.

initialize
learn
secondary
listen
speak
primary

Correct Answer: BDE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 228
You enter the show ipv6 route command on an OSPF device and the device displays a route. Which
conclusion can you draw about the environment?
A.
B.
C.
D.

OSPF is distributing IPv6 routes to BGP.


The router is designated as an ABR.
The router is designated as totally stubby.
OSPFv3 is in use.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 229
Which NTP command configures the local device as an NTP reference clock source?
A. ntp peer
B. ntp broadcast

C. ntp master
D. ntp server
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 230
Which routing protocol has the smallest default administrative distance?
A.
B.
C.
D.
E.

IBGP
OSPF
IS-IS
EIGRP
RIP

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 231
Which statement about static routes is true?
A.
B.
C.
D.

The source interface can be configured to make routing decisions


A subnet mask is entered for the next-hop address.
The subnet mask is 255.255 255.0 by default
The exit interface can be specified to indicate where the packets will be routed

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 232
Under which circumstance should a network administrator implement one-way NAT?
A.
B.
C.
D.

when the network must route UDP traffic


when traffic that originates outside the network must be routed to internal hosts
when traffic that originates inside the network must be routed to internal hosts
when the network has few public IP addresses and many private IP addresses require outside access

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 233
Which component of a routing table entry represents the subnet mask?

A.
B.
C.
D.

routing protocol code


prefix
metric
network mask

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 234
When a router makes a routing decision for a packet that is received from one network and destined to
another, which portion of the packet does if replace?
A.
B.
C.
D.

Layer 2 frame header and trailer


Layer 3 IP address
Layer 5 session
Layer 4 protocol

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 235
On which type of device is every port in the same collision domain?
A. a router
B. a Layer 2 switch
C. a hub
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 236
Which statement about routing protocols is true?
A.
B.
C.
D.

Link-state routing protocols choose a path by the number of hops to the destination.
OSPF is a link-state routing protocol.
Distance-vector routing protocols use the Shortest Path First algorithm.
IS-IS is a distance-vector routing protocol.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 237
Which technology supports the stateless assignment of IPv6 addresses?

A.
B.
C.
D.

DNS
DHCPv6
DHCP
autoconfiguration

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 238
Which feature allows a device to use a switch port that is configured for half-duplex to access the network?
A.
B.
C.
D.

CSMA/CD
IGMP
port security
split horizon

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 239
Which function enables an administrator to route multiple VLANs on a router?
A.
B.
C.
D.

IEEE 802 1X
HSRP
port channel
router on a stick

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 240
Which dynamic routing protocol uses only the hop count to determine the best path to a destination?
A.
B.
C.
D.

IGRP
RIP
EIGRP
OSPF

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 241
What is one requirement for interfaces to run IPv6?

A.
B.
C.
D.

An IPv6 address must be configured on the interface


An IPv4 address must be configured.
Stateless autoconfiguration must be enabled after enabling IPv6 on the interface.
IPv6 must be enabled with the ipv6 enable command in global configuration mode.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 242
Which destination IP address can a host use to send one message to multiple devices across different
subnets?
A.
B.
C.
D.

172.20.1.0
127.0.0.1
192.168.0.119
239.255.0.1

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 243
Which MTU size can cause a baby giant error?
A.
B.
C.
D.

1500
9216
1600
1518

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 244
Which entity assigns IPv6 addresses to end users?
A.
B.
C.
D.

ICANN
APNIC
RIR
ISPs

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 245
Which option is the default switch port port-security violation mode?
A.
B.
C.
D.

shutdown
protect
shutdown vlan
restrict

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 246
Which statement about the inside interface configuration in a NAT deployment is true?
A. It is defined globally
B. It identifies the location of source addresses for outgoing packets to be translated using access or route
maps.
C. It must be configured if static NAT is used
D. It identifies the public IP address that traffic will use to reach the internet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 247
Which value is indicated by the next hop in a routing table?
A.
B.
C.
D.

preference of the route source


IP address of the remote router for forwarding the packets
how the route was learned
exit interface IP address for forwarding the packets

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 248
Which option is a valid hostname for a switch?
A.
B.
C.
D.

Switch-Cisco
Switch-Cisco!
SwitchCisco
SwitchCisc0

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 249
Which component of the routing table ranks routing protocols according to their preferences?
A.
B.
C.
D.

administrative distance
next hop
metric
routing protocol code

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 250
Which statement about unicast frame forwarding on a switch is true?
A. The TCAM table stores destination MAC addresses
B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the
same VLAN except on the port that it was received on.
C. The CAM table is used to determine whether traffic is permitted or denied on a switch
D. The source address is used to determine the switch port to which a frame is forwarded
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 251
Which statement about native VLAN traffic is true?
A.
B.
C.
D.

Cisco Discovery Protocol traffic travels on the native VLAN by default


Traffic on the native VLAN is tagged with 1 by default
Control plane traffic is blocked on the native VLAN.
The native VLAN is typically disabled for security reasons

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 252
Which route source code represents the routing protocol with a default administrative distance of 90 in the
routing table?
A.
B.
C.
D.
E.

S
E
D
R
O

Correct Answer: C

Section: (none)
Explanation
Explanation/Reference:
QUESTION 253
Refer to the exhibit. Which statement describes the effect of this configuration?

A.
B.
C.
D.

The VLAN 10 VTP configuration is displayed.


VLAN 10 spanning-tree output is displayed.
The VLAN 10 configuration is saved when the router exits VLAN configuration mode.
VLAN 10 is added to the VLAN database.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 254
When enabled, which feature prevents routing protocols from sending hello messages on an interface'?
A.
B.
C.
D.

virtual links
passive-interface
directed neighbors
OSPF areas

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 255
Which device allows users to connect to the network using a single or double radio?
A.
B.
C.
D.

access point
switch
wireless controller
firewall

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 256
Two hosts are attached to a switch with the default configuration. Which statement about the configuration
is true?
A.
B.
C.
D.

IP routing must be enabled to allow the two hosts to communicate.


The two hosts are in the same broadcast domain.
The switch must be configured with a VLAN to allow the two hosts to communicate.
Port security prevents the hosts from connecting to the switch.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 257
By default, how many MAC addresses are permitted to be learned on a switch port with port security
enabled?
A.
B.
C.
D.

8
2
1
0

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 258
Which statement about a router on a stick is true?
A. Its date plane router traffic for a single VI AN over two or more switches.
B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs
on the same subnet
C. It requires the native VLAN to be disabled
D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 259
Which network topology allows all traffic to flow through a central hub?
A.
B.
C.
D.

bus
star
mesh
ring

Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:
QUESTION 260
Which NAT type is used to translate a single inside address to a single outside address?
A.
B.
C.
D.

dynamic NAT
NAT overload
PAT
static NAT

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 261
What is the default lease time for a DHCP binding?
A.
B.
C.
D.

24 hours
12 hours
48 hours
36 hours

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 262
Which RFC was created to alleviate the depletion of IPv4 public addresses?
A.
B.
C.
D.

RFC 4193
RFC 1519
RFC 1518
RFC 1918

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 263
Which method does a connected trunk port use to tag VLAN traffic?
A.
B.
C.
D.

IEEE 802 1w
IEEE 802 1D
IEEE 802 1Q
IEEE 802 1p

Correct Answer: C

Section: (none)
Explanation
Explanation/Reference:
QUESTION 264
Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
A.
B.
C.
D.

PortFast on the interface


the interface as an access port to allow the voice VLAN ID
a voice VLAN ID in interface and global configuration mode
Cisco Discovery Protocol in global configuration mode

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

You might also like