You are on page 1of 14

1 Top of Form

What do companies gain from the services performed at the enterprise edge?

faster communication with server farms

stronger security against malicious attacks

faster communication with Internet destinations

enhanced performance and reliability through VLANs and redundant trunk links

Bottom of Form
3 Top of Form

Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what
information can be gathered from the show command output?

Router B has EIGRP adjacencies with both router A and C.

Router B has a fully converged topology table.

Router B has not formed an adjacency with router A.

Router B has not formed an adjacency with router C.

Bottom of Form
5 Top of Form
Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)

to set the duplex mode of a redundant link

to activate looped paths throughout the network

to determine the root bridge


to prevent loops by sharing routing tables between connected switches

to determine which ports are placed in forwarding mode

Bottom of Form
7 Top of Form
If a modem is being used to connect to an ISP, which WAN connection type is being used?

leased line

cell switched

circuit switched

packet switched

Bottom of Form
8 Top of Form

Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a n
router. What is causing the interface to reject the address?

The IP address is already in use.

The technician is using a network address.

The technician is using the wrong subnet mask for /26.

The technician must enable VLSM on the interface.

Bottom of Form
10 Top of Form
What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the
172.16.240.0/27 network? (Choose two.)

0.0.0.0

255.255.240.0

255.255.255.255

0.0.31.255

255.255.255.240

0.0.0.31

Bottom of Form
11 Top of Form
How does CHAP secure connectivity on a PPP link?

It uses a two-way handshake to send the username and password.

It encrypts user data that is sent across the link.

It designates the remote node to control the frequency and timing of the login attempts.

It authenticates the username and password during initial link establishment and repeatedly during the time the link is active.

Bottom of Form
12 Top of Form

Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be
most specific?

172.16.0.0/21

172.16.4.0/21

172.16.0.0/22

172.16.4.0/22

Bottom of Form
13 Top of Form
What are two characteristics of EIGRP? (Choose two.)

It supports a maximum hop count of 15.

It sends small hello packets to maintain knowledge of its neighbors.

It forwards complete routing tables in its updates to neighboring routers.

It supports equal and unequal cost load balancing.

It supports only one network layer protocol.

Bottom of Form
14 Top of Form
Refer to the exhibit. Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A to access host B?

192.168.1.32/26

192.168.1.64/26

192.168.1.126/26

192.168.1.129/26

Bottom of Form
15 Top of Form

Refer to the exhibit. All routers are configured to use the OSPF protocol with default settings. Which router will act as the BDR if all
routers start at the same time?
R1

R2

R3

R4

Bottom of Form
16 Top of Form

Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP
network fails to converge?

The network commands have been incorrectly issued on both routers.

Both routers have been configured with the same autonomous number.

The wildcard masks have been incorrectly configured on both routers.

Autosummarization is enabled on both routers.

Bottom of Form
17 Top of Form
What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)

172.16.0.255

172.16.16.16

172.16.127.127

172.16.128.1

172.17.1.1
172.18.1.1

Bottom of Form
18 Top of Form
What are two features of an extended IP ACL? (Choose two.)

It uses numbers 1 through 99 for identification.

It can permit or deny traffic based on source or destination address.

It detects malicious attacks against the network and logs them on a server.

It can filter traffic based on the protocol and port numbers.

It encrypts traffic between hosts.

Bottom of Form
19 Top of Form

Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresse
(Choose two.)

192.168.1.1

192.168.1.2

198.133.219.1

198.133.219.102

198.133.219.103

Bottom of Form
21 Top of Form
Refer to the exhibit. What is the correct description of the highlighted address?

It is the address of the destination network.

It is the routerID of the neighboring router.

It is the next hop address of the feasible successor.

It is the IP address of the serial0/0/0 interface of RouterC.

Bottom of Form
22 Top of Form

Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. Th
hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem?

Enable the Serial0/0/0 interface of R2.


Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using RIPv2.

Configure a default route on the ISP via Serial0/0/0.

Configure the correct subnet mask on the Serial0/0/0 interface of R2.

Bottom of Form
24 Top of Form
Which Frame Relay component provides connection status information about PVCs in the network?

CIR

LMI

DLCI

FECN

Bottom of Form
26 Top of Form
What is the difference between the passive and active route status as displayed in an EIGRP topology table?

Routes that are passive are never updated.

Routes that are active are used to forward data.

Routes that are active are being recalculated by DUAL.

Routes that are passive are waiting for the neighbor adjacency process to complete.

Bottom of Form
27 Top of Form
Refer to the exhibit. The network administrator has just configured a default route on the HQ router. What two statements describe w
must happen so that all routers in the OSPF network have a route to the Internet? (Choose two.)

The gateway of last resort must be set on each OSPF router.

HQ will automatically propagate the default route to every other OSPF router.

HQ will send the default route information to the DR and BDR for distribution to the other routers.

Each router must be configured with a static route to the 64.104.22.16/28 network.

HQ must be configured with the default-information originate command.

Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in the OSPF configuration.

Bottom of Form
28 Top of Form
Refer to the exhibit. Routers R1 and R2 have formed an adjacency, but R3 has no OSPF adjacencies. Based on the R3 configuratio
what is the cause of the problem?

The wildcard mask is incorrect for the OSPF network.

The IP addressing scheme on R3 is configured incorrectly.

The OSPF routing configuration on router R3 is missing a network statement.

There is no problem in the configuration. All routers need to converge to solve the issue.

Bottom of Form

23 Top of Form

Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23
network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

There is a routing loop occurring between all three routers.

There is a network statement missing.

Network 172.30.20.0 has an incorrect wildcard mask.

The OSPF area configuration is incorrect.


/23 is an invalid subnet mask for the 192.168.0.0 network.

Bottom of Form
29 Top of Form
Which characteristic is associated with a floating static route?

always appears in the routing table

has an administrative distance of 0

is considered the primary route because of its low administrative distance

usually has an administrative distance greater than routes learned from a dynamic routing protocol

Bottom of Form

Top of Form

Which type of distance vector routing mechanism helps prevent the formation of loops by preventing routing information from exiting a ro
interface through the same interface on which it was received?

split horizon

hold-down timer

poisoned reverse

setting maximum hop count

Bottom of Form
Top of Form

Which network statement would include the 172.20.64.0 /19 network in the OSPF routing process?

Router(config-router)# network 172.20.64.0 0.0.0.31 area 0

Router(config-router)# network 172.20.64.0 0.0.0.63 area 0

Router(config-router)# network 172.20.64.0 0.0.15.255 area 0

Router(config-router)# network 172.20.64.0 0.0.31.255 area 0

Bottom of Form

Top of Form

Which feature of RSTP differentiates it from STP?

PortFast

UplinkFast
active topology

five port states

Bottom of Form
Top of Form

In order for a VLAN to be created on a switch, what configuration parameter is required?

VTP domain name

VLAN number

VLAN IP address

VLAN database name

Bottom of Form

Top of Form

An administrator wants to configure a new Cisco Catalyst 2960 switch in order to manage the switch remotely. After configuring the vty li
to allow login, which set of commands should the administrator enter?
Switch(config)# line console 0
Switch(config-line)# password cisco
Switch(config-line)# login
Switch(config-line)# exit
Switch(config)# interface vlan 1
Switch(config-if)# ip address 192.168.1.5 255.255.255.0
Switch(config-if)#exit
Switch(config)# line console 0
Switch(config-line)# password cisco
Switch(config-line)# login
Switch(config-line)# exit
Switch(config)# ip default-gateway 192.168.1.1
Switch(config)# interface vlan 1
Switch(config-if)# ip address 192.168.1.5 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# ip default-gateway 192.168.1.1
Bottom of Form
Top of Form

What are two WAN protocols that define parameters for data encapsulation? (Choose two.)

PPP

V.35

X.21

HDLC

EIA/TIA-232

Bottom of Form
Top of Form

What is the purpose of assigning an IP address to a Layer 2 switch?

to allow in-band management

to provide inter-VLAN connectivity

to facilitate election of a root bridge

to configure a default gateway for the network

Bottom of Form
Top of Form

Which device or component is located at the customer premises and provides the clocking signal for the customer router on a WAN circu

DTE serial interface

CSU/DSU

central office switch

internal clock on the router

patch panel at the point of demarcation

Bottom of Form

Top of Form

Which software is typically used on a remote PC to access the enterprise through the Internet via a secure tunnel?

Telnet client

VPN client

FTP client

web browser

Bottom of Form
Top of Form

Which address is used to access a switch from a remote location in order to make configuration changes?

the default gateway that is configured on the switch

the IP address of the management VLAN interface on the switch


the default gateway that is configured on the management workstation

the IP address configured on the VTY line that is used to establish an incoming connection to the switc

Bottom of Form
Top of Form

A network administrator is creating an addressing scheme and has determined that the company network 192.168.1.0/24 will require 8
subnets with at least 25 hosts on each subnet. Which subnet mask will meet these requirements?

/25

/26

/27

/28

/29

Bottom of Form

Top of Form

Which statement is true about ACLs that are applied to VTY lines on Cisco routers?

ACLs can be used to encrypt VTY transmissions.

ACLs are applied using the access-class command.

When ACLs are applied to VTY lines, the VTY password should be removed.

The ACL provides the flexibility for a specific user to login remotely from different locations with any IP address.

Bottom of Form
Top of Form

Which configurable variable is used to determine the election of a spanning tree root bridge?

lowest bridge priority

lowest native VLAN ID

highest VTP revision number

highest management VLAN IP address

Bottom of Form

You might also like