You are on page 1of 29

Practice CCNA Final

1.

The show cdp neighbors command is a very useful network troubleshooting tool. Using the
output in the graphic, select the statements that are true. (Choose two.)

i
j
k
l
m
n
CDP operates at the network layer of the OSI model.

j
k
l
m
n
The output of this command displays information about directly connected Cisco
devices only.

j
k
l
m
n
The switch is attached to the SanJose1 FastEthernet0/21 interface.

j
k
l
m
n
SanJose1 is running CDP version 12.0.

j
k
l
m
n
SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.

j
k
l
m
n
SanJose2 is a 2600 series router running several routed protocols.

2. Which of the following commands will display "Serial0 is up, line protocol is up"?
(Choose two.)

j
k
l
m
n
Router# show ip route
j
k
l
m
n
Router# show protocols

n
j
k
l
m
Router# show interfaces

j
k
l
m
n
Router# show ip protocols

j
k
l
m
n
Router# show running-config

j
k
l
m
n
Router# show cdp neighbors detail

3. Which of the following statements are true regarding the command "ip route 192.168.7.24 255.255.255.248 192.168.7.9"?
(Choose two.)

j
k
l
m
n
A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.

c
d
e
f
g
192.168.7.9 is the destination network for this route.

j
k
l
m
n
192.168.7.24 is the next-hop router in this command.

c
d
e
f
g
This command is issued from the interface configuration mode.

b
c
d
e
f
g
This command is used to define a static route.

c
d
e
f
g
The route for this network will be propagated to other routers via RIP.

4. Which of the following statements are true regarding IP default routing? (Choose three.)

c
d
e
f
g
Router(config-if)# ip default-route 150.150.150.150 will set a default route.

b
c
d
e
f
g
Router(config)# ip default-network 150.150.150.150 will set a default route.

b
c
d
e
f
g
Default routes keep the routing table shorter.

b
c
d
e
f
g
A default route is used to forward data when the destination network is not explicitly listed in the routing table.
c
d
e
f
g
Default routes are automatically created when the routing protocol is enabled.

5. After several configuration changes are made to a router, the copy run start command is issued. Where will the changes be
stored?

j
k
l
m
n
flash

j
k
l
m
n
ROM

i
j
k
l
m
n
NVRAM

j
k
l
m
n
RAM

j
k
l
m
n
the configuration register

j
k
l
m
n
a TFTP server

j
k
l
m
n
flash

j
k
l
m
n
ROM

i
j
k
l
m
n
NVRAM

j
k
l
m
n
RAM

j
k
l
m
n
the configuration register

j
k
l
m
n
a TFTP server

6. On a Cisco router, which of the following can be configured during setup mode? (Choose three.)

b
c
d
e
f
g
IP addresses

c
d
e
f
g
a message of the day banner

b
c
d
e
f
g
routed protocols
c
d
e
f
g
the clock rate for a serial interface

b
c
d
e
f
g
the enable password

c
d
e
f
g
host tables

7.

A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect
remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?

j
k
l
m
n
Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco

i
j
k
l
m
n
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco

j
k
l
m
n
Router(config)# line virtual terminal
Router(config-line)# enable login
Router(config-line)# password cisco

j
k
l
m
n
Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco

j
k
l
m
n
Router(config)# enable secret cisco

j
k
l
m
n
Router(config)# enable cisco

8. Understanding the differences between PAP and CHAP is essential. Read the items below and determine which are correct.
(Choose three.)

b
c
d
e
f
g
PAP sends passwords in clear text.

c
d
e
f
g
PAP uses a 3-way handshake to establish a link.

c
d
e
f
g
PAP uses the router to control the frequency of login attempts.

c
d
e
f
g
CHAP uses a 2-way handshake to establish a link.

b
c
d
e
f
g
CHAP encrypts the password while providing protection against playback attacks.

b
c
d
e
f
g
CHAP uses repeated challenges for verification.

b
c
d
e
f
g
PAP sends passwords in clear text.

c
d
e
f
g
PAP uses a 3-way handshake to establish a link.

c
d
e
f
g
PAP uses the router to control the frequency of login attempts.

c
d
e
f
g
CHAP uses a 2-way handshake to establish a link.

b
c
d
e
f
g
CHAP encrypts the password while providing protection against playback attacks.

b
c
d
e
f
g
CHAP uses repeated challenges for verification.

9. Which commands can a network administrator use to monitor and verify access list operations? (Choose two.)

c
d
e
f
g
Router# show IOS version

b
c
d
e
f
g
Router# show access-lists

c
d
e
f
g
Router# show ip route

c
d
e
f
g
Router# show protocols

b
c
d
e
f
g
Router# show ip interface

c
d
e
f
g
Router# show cdp neighbor

10. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)

b
c
d
e
f
g
improper placement of enterprise level servers

b
c
d
e
f
g
addition of hosts to a physical segment

c
d
e
f
g
replacement of hubs with workgroup switches

b
c
d
e
f
g
increasing use of bandwidth intensive network applications

c
d
e
f
g
creation of new collision domains without first adding network hosts

c
d
e
f
g
migration to full-duplex Ethernet within the LAN

11. What command will display a list of commands available for viewing the status of the router?

j
k
l
m
n
Router# ?show

j
k
l
m
n
Router# sh?

i
j
k
l
m
n
Router# show ?

j
k
l
m
n
Router# help

j
k
l
m
n
Router# status ?
j
k
l
m
n
Router# ?show

j
k
l
m
n
Router# sh?

i
j
k
l
m
n
Router# show ?

j
k
l
m
n
Router# help

j
k
l
m
n
Router# status ?

12.

Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many
broadcast domains and how many collision domains are shown? (Choose two).

c
d
e
f
g
3 collision domains

b
c
d
e
f
g
3 broadcast domains

c
d
e
f
g
5 broadcast domains

b
c
d
e
f
g
9 collision domains

c
d
e
f
g
10 collision domains

c
d
e
f
g
13 collision domains

13. Which type of VLAN identification is specified by IEEE 802.1q?

j
k
l
m
n
frame filtering
j
k
l
m
n
frame switching

j
k
l
m
n
frame bridging

j
k
l
m
n
frame checking

i
j
k
l
m
n
frame tagging

14.

Refer to the diagram. Two VLANs have been configured on the switch and users have been assigned. Users in the Sales VLAN can
ping all of the users in their VLAN, but can not ping the users in the HR VLAN. Why is this true? (Choose two.)

c
d
e
f
g
All users are in one collision domain.

c
d
e
f
g
All users are in one broadcast domain.

b
c
d
e
f
g
A router is required for communication between VLANs.

b
c
d
e
f
g
The users are in separate broadcast domains.

c
d
e
f
g
The switch has not been assigned an IP address.

15.
Refer to the diagram. Spanning-Tree Protocol is running in all three switches. After running Spanning-Tree Protocol, ports 1,2,3,4, and 5 are
placed in the forwarding state. Which Spanning-Tree state will port 6 be assigned in order to prevent a loop?

j
k
l
m
n
listening state

j
k
l
m
n
disabled state

i
j
k
l
m
n
blocking state

j
k
l
m
n
learning state

j
k
l
m
n
forwarding state

16. Which of the following ISDN devices can be directly connected to the local loop? (Choose three.)

c
d
e
f
g
a router serial port

b
c
d
e
f
g
an ISDN router with a NT interface

c
d
e
f
g
an ISDN terminal adapter

b
c
d
e
f
g
an NT1 device

b
c
d
e
f
g
an NT1/NT2 device

c
d
e
f
g
a TE1 device

c
d
e
f
g
a router serial port

b
c
d
e
f
g
an ISDN router with a NT interface

c
d
e
f
g
an ISDN terminal adapter

b
c
d
e
f
g
an NT1 device

b
c
d
e
f
g
an NT1/NT2 device

c
d
e
f
g
a TE1 device
c
d
e
f
g
a TE1 device

17. Which of the following are true concerning full-duplex operation on an Ethernet network? (Choose three.)

b
c
d
e
f
g
There are no collisions in full-duplex mode.

b
c
d
e
f
g
A dedicated switch port is required for each node.

c
d
e
f
g
Hub ports are preconfigured for full-duplex mode.

c
d
e
f
g
The host network card must detect the availability of the media before transmitting.

b
c
d
e
f
g
The host network card and the switch port must be capable of operating in full-duplex mode.

18. Which of the following encapsulation methods are available on the ISDN B channel? (Choose three.)

c
d
e
f
g
DDR

b
c
d
e
f
g
HDLC

b
c
d
e
f
g
LAPB

c
d
e
f
g
LAPD

c
d
e
f
g
LCP

b
c
d
e
f
g
PPP

c
d
e
f
g
DDR

b
c
d
e
f
g
HDLC

b
c
d
e
f
g
LAPB

c
d
e
f
g
LAPD

c
d
e
f
g
LCP
c
d
e
f
g
LCP

b
c
d
e
f
g
PPP

19.

According to the the provided router output, which of the following statements is true regarding PPP operation?

j
k
l
m
n
Only the link-establishment phase completed successfully.

j
k
l
m
n
Only the network-layer phase completed successfully.

j
k
l
m
n
Neither the link-establishment phase nor the the network-layer phase completed successfully.

i
j
k
l
m
n
Both the link-establishment and network-layer phase completed successfully.

20. Which of the following IOS commands will define the "interesting" traffic that will cause an ISDN link to become active, and which
command will assign that definition to an interface? (Choose two.)

c
d
e
f
g
Router(config)# dialer 100 idle-timeout 180

b
c
d
e
f
g
Router(config)# dialer-list 100 protocol ip permit
c
d
e
f
g
Router(config)# dialer map ip 192.168.100.1 name sanjose 555 1234

b
c
d
e
f
g
Router(config-if)# dialer-group 100

c
d
e
f
g
Router(config-if)# dialer 100 string 555-5000

21.

When troubleshooting a network, it is important to interpret the output of various router commands. Using the graphic, identify which of the
following statements are true. (Choose three.)

b
c
d
e
f
g
The missing information for Blank 1 is the command show ip route.

c
d
e
f
g
The missing information for Blank 1 is the command debug ip route.

c
d
e
f
g
The missing information for Blank 2 is the number 100.

c
d
e
f
g
The missing information for Blank 3 is the letter R.

b
c
d
e
f
g
The missing information for Blank 3 is the letter I.

b
c
d
e
f
g
The missing information for Blank 4 is the letter C.

22. Which of the following best describes the operation of distance vector routing protocols?

j
k
l
m
n
They use hop count as their only metric.

j
k
l
m
n
They only send out updates when a new network is added.

i
j
k
l
m
n
They send their routing tables to directly connected neighbors.

j
k
l
m
n
They flood the entire network with routing updates.

23. Which of the following is associated with link-state routing protocols?

j
k
l
m
n
low processor overhead

j
k
l
m
n
poison reverse

j
k
l
m
n
routing loops

j
k
l
m
n
split horizon

i
j
k
l
m
n
shortest-path first calculations

j
k
l
m
n
low processor overhead

j
k
l
m
n
poison reverse

j
k
l
m
n
routing loops

j
k
l
m
n
split horizon

i
j
k
l
m
n
shortest-path first calculations

24. The output of the show ip interface brief command displays Serial0 is up, line protocol is down. Which of the following are possible
causes for the line protocol being in the down state? (Choose two.)

c
d
e
f
g
The clock rate is not set on the DTE.

c
d
e
f
g
An incorrect default gateway is set on the router.

c
d
e
f
g
A network is missing from the routing protocol configuration.

b
c
d
e
f
g
The encapsulation on the Serial0 interface is incorrect.
b
c
d
e
f
g
Keepalives are not being sent.

25. A router has learned about a network through static and dynamic routing processes. Which of the following routes will be used to
reach network 192.168.168.0?

j
k
l
m
n
I 192.168.168.0/24 [100/8947] via 192.168.200.1, 00:00:09, Ethernet0

j
k
l
m
n
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0

j
k
l
m
n
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0

i
j
k
l
m
n
S 192.168.168.0/24 [1/0] via 192.168.200.1, 00:00:10, Ethernet0

j
k
l
m
n
I 192.168.168.0/24 [100/8947] via 192.168.200.1, 00:00:09, Ethernet0

j
k
l
m
n
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0

j
k
l
m
n
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0

i
j
k
l
m
n
S 192.168.168.0/24 [1/0] via 192.168.200.1, 00:00:10, Ethernet0

26.

A company has outgrown the address space provided by its 192.168.10.0 network. To accommodate new users, the network
administrator decided to implement VLANs and do the following:

1. Place the users of the 192.168.10.0 network in VLAN 168.
2. Assign new users an IP address from the 172.30.10.0/24 network.
3. Place users of the 172.30.10.0 network in VLAN 30.

After implementing the planned VLANs and connecting the network as shown in the graphic, the administrator finds that the users in
VLAN 30 are unable to access the Internet or communicate with users in VLAN 168. However, VLAN 168 users are able to access the
Internet and each other.
Using the graphic, what should be done to enable users in VLAN 30 to communicate with VLAN 168 users and the Internet? (Choose
three.)

b
c
d
e
f
g
Configure E1 with an address in the 172.30.10.0/24 network.

c
d
e
f
g
Place all VLAN 30 hosts on the same switch.

c
d
e
f
g
Configure all hosts with 192.168.10.1 as the default gateway.

b
c
d
e
f
g
Connect the router's E1 port to a switch port configured for VLAN 30.

c
d
e
f
g
Connect the router's E1 port to a switch port configured for VLAN 168.

b
c
d
e
f
g
Add the network 172.30.10.0 to the dynamic routing protocol process.

27.

Which hosts will receive ARP requests from host A, assuming that port 4 on both switches is configured to carry traffic for multiple VLANs?
(Choose three.)

c
d
e
f
g
host B

b
c
d
e
f
g
host C

b
c
d
e
f
g
host D

c
d
e
f
g
host E

b
c
d
e
f
g
host F
28.

A dynamic routing protocol is configured and working on all of the routers shown in the network. The new network, 143.116.123.0/24, was
added to the configuration of Router E and advertised in its routing table 60 seconds ago. Which of the following statements are true
regarding the new network? (Choose three.)

b
c
d
e
f
g
If RIP is the routing protocol, routers A,B,C,D, and E should display the new network in their routing table.

c
d
e
f
g
If RIP is the routing protocol, all of the routers should display the new network in their routing table.

c
d
e
f
g
If IGRP is the routing protocol, routers A,B,C,D, and E should display the new network in their routing table.

b
c
d
e
f
g
If IGRP is the routing protocol, only router E should display the new network in its routing table.

c
d
e
f
g
If OSPF is the routing protocol, routers B,C, and E should display the new network in their routing table.

b
c
d
e
f
g
If OSPF is the routing protocol, all of the routers should display the new network in their routing table.

29.

The Tampa and Orlando routers have been configured but do not have full connectivity. Using the partial command output and the diagram,
which of the following will occur when testing the network?

j
k
l
m
n
Tampa and Orlando will not be able to ping each other through the serial interfaces.

i
j
k
l
m
n
Tampa and Orlando will not learn any routes through the RIP process.

j
k
l
m
n
Orlando will have all five of the networks listed in its routing table.

j
k
l
m
n
Tampa will have all five of the networks listed in its routing table.

30.

The network administrator shown in the graphic is unable to access the TFTP server attached to the Miami router. Consider only the IP
addressing scheme to identify the causes of this problem. (Choose two.)

c
d
e
f
g
The default gateway configured on the network administrator's workstation is not a valid host address.

b
c
d
e
f
g
The IP address configured on interface E1 of the Miami router is not a valid host address.

c
d
e
f
g
The IP address of the TFTP server is a subnetwork address.

c
d
e
f
g
The IP address of the S0 interface of the Detroit router is a broadcast address.

b
c
d
e
f
g
The IP addresses for the Miami S1 interface and the Detroit S0 are not in the same subnet.

31. Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)

c
d
e
f
g
192.168.14.8

b
c
d
e
f
g
192.168.14.16

c
d
e
f
g
192.168.14.24

b
c
d
e
f
g
192.168.14.32
c
d
e
f
g
192.168.14.148

b
c
d
e
f
g
192.168.14.208

32 Which of the following are features of a connection-oriented protocol? (Choose two.)

b
c
d
e
f
g
data transport reliability

c
d
e
f
g
best path determination

b
c
d
e
f
g
establishing, maintaining, and terminating virtual circuits

c
d
e
f
g
encapsulation of packets in a data frame with source and destination MAC addresses

c
d
e
f
g
best-effort datagram delivery

33. Which of the following are private IP addresses? (Choose three.)

c
d
e
f
g
172.168.33.1

b
c
d
e
f
g
10.35.66.70

b
c
d
e
f
g
192.168.99.5

b
c
d
e
f
g
172.18.88.90

c
d
e
f
g
192.169.77.89

c
d
e
f
g
127.33.55.16

c
d
e
f
g
172.168.33.1

b
c
d
e
f
g
10.35.66.70

b
c
d
e
f
g
192.168.99.5

b
c
d
e
f
g
192.168.99.5

b
c
d
e
f
g
172.18.88.90

c
d
e
f
g
192.169.77.89

c
d
e
f
g
127.33.55.16

34. Assuming a subnet mask of 255.255.224.0, which of the following would be valid host addresses? (Choose three.)

b
c
d
e
f
g
124.78.103.0

c
d
e
f
g
125.67.32.0

c
d
e
f
g
125.78.160.0

b
c
d
e
f
g
126.78.48.0

c
d
e
f
g
176.55.96.0

b
c
d
e
f
g
186.211.100.0

b
c
d
e
f
g
124.78.103.0

c
d
e
f
g
125.67.32.0

c
d
e
f
g
125.78.160.0

b
c
d
e
f
g
126.78.48.0

c
d
e
f
g
176.55.96.0

b
c
d
e
f
g
186.211.100.0

35. The router reads each bit to determine the class of an address. Which of the following binary numbers would the router identify as
public class A addresses? (Choose three.)

c
d
e
f
g
00001010.10101100.11001100.00000111

b
c
d
e
f
g
00011111.11110011.11111111.00111011

b
c
d
e
f
g
01011101.11100001.11001100.11011011

c
d
e
f
g
10000000.11111000.11000111.11110011

b
c
d
e
f
g
00010111.11011011.11000001.11001100

36. A network has been assigned the IP address of 156.16.0.0. A decision has been made to divide the network into 1024 subnets.
Which of the following commands are required to activate an Ethernet interface and configure it with an address from the 25th subnet of this
network? (Choose two.)

c
d
e
f
g
Router(config-if)# ip address 156.16.5.0 255.255.255.224

c
d
e
f
g
Router(config-if)# ip address 156.16.5.0 255.255.255.192

b
c
d
e
f
g
Router(config-if)# ip address 156.16.6.65 255.255.255.192

c
d
e
f
g
Router(config-if)# ip address 156.16.4.193 255.255.255.192

b
c
d
e
f
g
Router(config-if)# no shutdown

c
d
e
f
g
Router(config-if)# clockrate 56000

c
d
e
f
g
Router(config-if)# ip address 156.16.5.0 255.255.255.224

c
d
e
f
g
Router(config-if)# ip address 156.16.5.0 255.255.255.192

b
c
d
e
f
g
Router(config-if)# ip address 156.16.6.65 255.255.255.192

c
d
e
f
g
Router(config-if)# ip address 156.16.4.193 255.255.255.192

b
c
d
e
f
g
Router(config-if)# no shutdown

c
d
e
f
g
Router(config-if)# clockrate 56000
37. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)

b
c
d
e
f
g
a terminal emulation protocol that supports remote console connections with various network devices

c
d
e
f
g
a protocol created by IBM that makes it easier for mainframes to connect to remote offices

b
c
d
e
f
g
a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet

c
d
e
f
g
a protocol that controls the rate at which data is sent to another computer

b
c
d
e
f
g
a protocol that exchanges network management information between a network device and a management console

b
c
d
e
f
g
a terminal emulation protocol that supports remote console connections with various network devices

c
d
e
f
g
a protocol created by IBM that makes it easier for mainframes to connect to remote offices

b
c
d
e
f
g
a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet

c
d
e
f
g
a protocol that controls the rate at which data is sent to another computer

b
c
d
e
f
g
a protocol that exchanges network management information between a network device and a management console

38. Which of the following are methods of flow control? (Choose three.)

c
d
e
f
g
positive acknowledgement

b
c
d
e
f
g
buffering

b
c
d
e
f
g
congestion avoidance

c
d
e
f
g
retransmission

b
c
d
e
f
g
windowing

c
d
e
f
g
positive acknowledgement

b
c
d
e
f
g
buffering
b
c
d
e
f
g
buffering

b
c
d
e
f
g
congestion avoidance

c
d
e
f
g
retransmission

b
c
d
e
f
g
windowing

39. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)

b
c
d
e
f
g
BECN

c
d
e
f
g
CIR

c
d
e
f
g
DLCI

b
c
d
e
f
g
DE

b
c
d
e
f
g
FECN

c
d
e
f
g
LMI

b
c
d
e
f
g
BECN

c
d
e
f
g
CIR

c
d
e
f
g
DLCI

b
c
d
e
f
g
DE

b
c
d
e
f
g
FECN

c
d
e
f
g
LMI

40. Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvc
command indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)
c
d
e
f
g
local router

c
d
e
f
g
local Frame Relay switch

b
c
d
e
f
g
remote router

b
c
d
e
f
g
remote Frame Relay switch

41. A serial link between RouterA and RouterB is configured for PPP with PAP authentication. Which of the following additional
commands are required on the routers in order for RouterB to authenticate to RouterA? (Choose two.)

b
c
d
e
f
g
RouterA(config)# username stranger password letmein

c
d
e
f
g
RouterB(config)# username stranger password letmein

c
d
e
f
g
RouterA(config-if)# ppp pap sent-username stranger password letmein

b
c
d
e
f
g
RouterB(config-if)# ppp pap sent-username stranger password letmein

42. Which of the following application layer protocols use TCP? (Choose three.)

b
c
d
e
f
g
SMTP

b
c
d
e
f
g
FTP

c
d
e
f
g
ICMP

b
c
d
e
f
g
Telnet

c
d
e
f
g
HDLC

c
d
e
f
g
ISDN
43. Which of the following applications use the UDP protocol? (Choose two.)

c
d
e
f
g
Telnet

b
c
d
e
f
g
SNMP

c
d
e
f
g
SMTP

c
d
e
f
g
SQL

b
c
d
e
f
g
TFTP

44. What steps are required to implement and assign hosts to VLANs? (Choose two.)

b
c
d
e
f
g
Create the VLANs on a switch.

b
c
d
e
f
g
Assign ports to the VLANs.

c
d
e
f
g
Select the VLAN number on the host machine.

c
d
e
f
g
Configure the switchports with IP addresses.

b
c
d
e
f
g
Create the VLANs on a switch.

b
c
d
e
f
g
Assign ports to the VLANs.

c
d
e
f
g
Select the VLAN number on the host machine.

c
d
e
f
g
Configure the switchports with IP addresses.

45. What must be done to enable a network administrator to configure a switch remotely?

j
k
l
m
n
The switch must be assigned a host name.

j
k
l
m
n
The remote management terminal must be assigned to the management VLAN.

i
j
k
l
m
n
The management IP address of the switch must be set.
j
k
l
m
n
The managment port must be configured for full-duplex operation.

j
k
l
m
n
Cisco Discovery Protocol must be active on the switch.

j
k
l
m
n
SNMP must be configured with the IP address of the management console.

46.

A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process
begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will
begin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?

i
j
k
l
m
n
1) fast forward
2) fragment free
3) store-and-forward

j
k
l
m
n
1) store-and-forward
2) fragment free
3) fast forward

j
k
l
m
n
1) fragment free
2) fast forward
3) store-and-forward
j
k
l
m
n
1) fast forward
2) store-and-forward
3) fragment free

47.

Refer to the partial protocol data unit diagrams shown. Which of the following statements are true regarding the encapsulation process?
(Choose three.)

b
c
d
e
f
g
PDU #1 is an encapsulated packet.

c
d
e
f
g
PDU #2 is an application layer PDU

b
c
d
e
f
g
PDU #3 is a segment.

c
d
e
f
g
PDU #4 is a transport layer PDU.

b
c
d
e
f
g
The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.

c
d
e
f
g
The order in which these PDUs are created during the encapsulation process is 2, 1, 4, 3.

48. Which of the following commands will verify Layer 3 reachability between networks?

j
k
l
m
n
Router# show ip interface brief

i
j
k
l
m
n
Router# show ip route

j
k
l
m
n
Router# show cdp neighbors
j
k
l
m
n
Router# show running-config

j
k
l
m
n
Router# show protocols

49. Which layer of the TCP/IP model corresponds with Layer 3 of the OSI model?

j
k
l
m
n
the application layer

j
k
l
m
n
the network layer

i
j
k
l
m
n
the internet layer

j
k
l
m
n
the IP layer

j
k
l
m
n
the data-link layer

j
k
l
m
n
the network interface layer

j
k
l
m
n
the application layer

j
k
l
m
n
the network layer

i
j
k
l
m
n
the internet layer

j
k
l
m
n
the IP layer

j
k
l
m
n
the data-link layer

j
k
l
m
n
the network interface layer

50. A network host can ping other hosts on its local LAN segment, but it is unable to ping the IP address of the corporate intranet server on
another subnet. Which of the following are potential causes of this problem? (Choose two.)

c
d
e
f
g
a faulty patch cable from the host to the communications outlet

c
d
e
f
g
a NIC hardware resource conflict on the host
b
c
d
e
f
g
an incorrect subnet mask on the host

b
c
d
e
f
g
an incorrect default gateway setting on the host

c
d
e
f
g
a local DNS server failure

51. A router does not load its configuration after a power failure. After running the show startup-configuration command, the
adminstrator finds that the original configuration is intact. What is the cause of this problem?

j
k
l
m
n
The configuration register is set for 0x2100.

j
k
l
m
n
The configuration register is set for 0x2101.

j
k
l
m
n
The configuration register is set for 0x2102.

i
j
k
l
m
n
The configuration register is set for 0x2142.

j
k
l
m
n
Boot system commands are not configured.

j
k
l
m
n
Flash memory is empty causing the router to bypass the configuration in NVRAM.

j
k
l
m
n
The configuration register is set for 0x2100.

j
k
l
m
n
The configuration register is set for 0x2101.

j
k
l
m
n
The configuration register is set for 0x2102.

i
j
k
l
m
n
The configuration register is set for 0x2142.

j
k
l
m
n
Boot system commands are not configured.

j
k
l
m
n
Flash memory is empty causing the router to bypass the configuration in NVRAM.

52. Where should extended access control lists be placed?

i
j
k
l
m
n
They should be placed as close as possible to the source of the traffic to be denied.
j
k
l
m
n
They should be placed as close as possible to the destination of the traffic to be denied.

j
k
l
m
n
They should be placed on the fastest interface available.

j
k
l
m
n
They should be placed on the destination WAN link.

53. Which of the following statements are true regarding the meaning of the access control list wildcard mask 0.0.0.15? (Choose two.)

c
d
e
f
g
The first 28 bits of a supplied IP address will be ignored.

b
c
d
e
f
g
The last four bits of a supplied IP address will be ignored.

c
d
e
f
g
The first 32 bits of a supplied IP address will be matched.

b
c
d
e
f
g
The first 28 bits of a supplied IP address will be matched.

c
d
e
f
g
The last five bits of a supplied IP address will be ignored.

c
d
e
f
g
The last four bits of a supplied IP address will be matched.