Sei sulla pagina 1di 26

CCENT Practice Certification Exam # 1

CCNA Exploration: Accessing the WAN


(Version 4.0)
CCENT Practice Certification Exam # 1 - CCNA Exploration: Accessing the
WAN (Version 4.0)
1. What are two ways that TCP uses the sequence numbers in a segment?
(Choose two.)
to identify missing segments at the destination
to reassemble the segments at the remote location
to specify the order in which the segments travel from source to destination
to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit
2. Which three statements characterize UDP? (Choose three.)
UDP provides connectionless, fast transport of data at Layer 4.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP relies on application layer protocols for error detection.
UDP works well when an application does not need to guarantee delivery of
data.
UDP relies on IP for error detection and recovery.
UDP provides sophisticated flow control mechanisms.
http://www.ccna4u.org
3. Refer to the exhibit. Host A sends a data packet to host B. What will be the
addressing information of the data packet when it reaches host B? Refer to the
exhibit. Host A sends a data packet to host B. What will be the addressing
information of the data packet when it reaches host B?
4. Which layer of the OSI model defines logical addressing?
application
presentation
session
transport
network
data link
5. Which device connects a local LAN to a geographically separate network?
switch
hub
router
bridge
6. Refer to the exhibit. Router1 receives packets addressed as follows:
Source IP address: 192.168.1.88
Destination IP address: 172.16.0.3
Source MAC address: 00-11-12-7a-41-10
Destination MAC address: 00-11-5c-cc-a9-c0
Source Port: 1464
Destination Port: 23
Assuming that Router1 has not been configured with NAT, what will happen to the
packets?
The packets will be sent to the server because it is a server-based port.
The packets will be sent to Switch2 and not leave the switch because the packets
are local.
The packets will be sent to the laptop host.
The packets will be sent to Router1 and dropped because private addresses
are not transmitted across the Internet.
The packets will be sent to Router2 and dropped because the server is not
directly attached.
7. Refer to the exhibit. If host 1 was to send an HTTP request to the web server
that connects to Router2, what type of Layer 2 frame would be sent between
Router1 and the ISP?
a frame with a header that contains the port number of 80
a frame with a header and trailer, but no MAC addresses
a frame with a header and a trailer that only contains IP addresses
a frame with the host 1 MAC address as the source and Router1 MAC address as
the destination
a frame with the host 1 MAC address as the source and the server MAC address
as the destination
8. A company needs to connect an office router to a service provider to access a
WAN. What device is needed to connect the router to the ISP if the service
provider supplies a T1 line for the connection?
a CSU/DSU
a cable modem
a DSL router
a DTE device
an SLA device
9. Refer to the exhibit. A technician applies the configuration in the exhibit to an
unconfigured router. To verify the configuration, the technician issues the show
running-config command in the CLI session with the router. What lines should the
technician expect to see in the router output from the show running-config
command?
enable password class
line console 0
password ccna
enable secret cisco
enable password class
line console 0
password ccna
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna
enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
10. Refer to the exhibit. If host A sends an IP packet to host B, what will the
destination address be in the frame when it leaves host A?
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA
11. Refer to the exhibit. What two facts can be determined from the output of the
pingcommand? (Choose two.)
There was a destination unreachable error.
The packet type was unknown.
One packet timed out.
The ping was interrupted.
Four packets of data were successfully received.
The packet TTL was exceeded.
12. Refer to the exhibit. The switches are in their default configuration. Host A
needs to communicate with host D, but host A does not have the MAC address for
its default gateway. Which network hosts will receive the ARP request sent by host
A?
only host D
only router R1
only hosts A, B, and C
only hosts A, B, C, and D
only hosts B and C
only hosts B, C, and router R1
13. Refer to the exhibit. Which password will the administrator need to use on this
device to enter privileged EXEC mode?
Cisco
class
password
cisco
14. Refer to the exhibit. Switch1 has only the following commands added to a
default Cisco 2960 configuration:
enable secret cisco
line vty 0 4
password Kn0ckkn-cK
login
interface vlan 1
ip address 10.0.1.8 255.255.255.0
no shutdown
Assume that routing between networks is functioning properly and that Switch2 has been
properly configured for remote access. What would the result be if the telnet
10.0.2.2command is issued from Switch1 privileged mode?
The following prompt would appear:
User Access Verification
Password:
Switch2 would return a destination unreachable message to Switch1.
Router1 would return a destination unreachable message to Switch1.
The packet would be dropped.
15. What caused the following error message to appear?
01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting
Fa0/8 in err-disable state
01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred,
caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.
01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8,
changed state to down
01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down
Another switch was connected to this switch port with the wrong cable.
An unauthorized user tried to telnet to the switch through switch port Fa0/8.
NAT was enabled on a router, and a private IP address arrived on switch port
Fa0/8.
A host with an invalid IP address was connected to a switch port that was
previously unused.
Port security was enabled on the switch port, and an unauthorized
connection was made on switch port Fa0/8.
16. When configuring a switch to use SSH for virtual terminal connections, what is
the purpose of the crypto key generate rsa command?
show SSH connected hosts
disconnect SSH connected hosts
create a public and private key pair
show active SSH ports on the switch
access the SSH database configuration
17. Which three statements are true about full-duplex operation on an Ethernet
network? (Choose three.)
There are no collisions in full-duplex mode.
A dedicated switch port is required for each node.
Hub ports are preconfigured for full-duplex mode.
The host network card must detect the availability of the media before
transmitting.
The host network card and the switch port must both be in full-duplex
mode.
18. Refer to the exhibit. If all the switches have a default configuration, how many
broadcast domains are in the network?
1
2
3
4
5
14
19.
20. Refer to the exhibit. The devices have been configured with static IP addresses
as shown. All hosts can communicate with each other but none of the hosts can
communicate with the server. What is the cause of this problem?
The IP address that is assigned to the server is in an incorrect subnet.
The IP address that is assigned to the server is a broadcast address.
The IP address that is assigned to the server is a network address.
The switch to which the server is connected has not been assigned an IP
address.
The RouterB LAN interface is incorrectly addressed in the RouterA LAN subnet.
21. A network host has the IP address 10.250.206.55/20. How many more network
devices can be added to this same subnetwork?
253
509
1021
2045
4093
22. Which type of Network Address Translation allows a host on a public network
consistent access to a specified private inside host?
port-based NAT
static NAT
dynamic NAT
NAT overload
23. Refer to the exhibit. Which two addresses are inside global addresses?
(Choose two.)
192.31.7.3
64.40.1.5
198.133.219.35
192.31.7.2
198.133.219.44
64.40.1.4
192.31.7.1
24. Which addresses are valid host IP addresses given the subnet mask
255.255.255.248? (Choose three.)
192.168.200.87
194.10.10.104
223.168.210.100
220.100.100.154
200.152.2.160
196.123.142.190
25. The router receives a packet with the destination address of 172.16.30.79/22.
To which subnetwork does this packet belong?
172.16.30.0/22
172.16.30.64/22
172.16.30.76/22
172.16.28.0/22
172.16.28.56/22
172.16.0.0/22
26. Refer to the exhibit. What is the broadcast address for the subnetwork on
which host A resides?
10.255.255.255
10.144.255.255
10.149.255.255
10.149.191.255
10.159.255.255
27.
28. What can a network administrator modify on a router to specify the location
from which the Cisco IOS loads? (Choose two.)
system ROM
the startup configuration file
the system image file
the configuration register value
the NVRAM file system
29. Which two items are required for initial configuration of Cisco routers if the IOS
command-line interface is used? (Choose two.)
a crossover cable
a rollover cable
an RJ-15 to DB-9 adapter
terminal emulation software
router VTY port
30. Refer to the exhibit. The router named myhome has received a frame from
the host 192.168.254.7. The contents of this frame are being sent to host
172.16.14.243. What is the Layer 2 destination address of the frame as it leaves
the myhome router?
0008.a3b6.ce05
0009.1281.18a8
000a.8a47.e612
172.16.14.129
172.16.14.243
192.168.254.7
31. Refer to the exhibit. What two facts can be determined about the network from
the exhibited output? (Choose two.)
The MontegoBay router does not have any LAN interfaces configured.
The Negril router is connected to the S0/1 interface of the MontegoBay
router.
There are only four devices in this network.
Layer 3 is functioning properly on all routers.
The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.
Layer 2 is operational on three ports of the MontegoBay router.
32. Which set of commands is used to name a router and save the configuration?
Router(config)# hostname South
South(config)# copy running-config startup-config
Router(config)# hostname South
South(config)# exit
South# copy running-config startup-config
Router(config)# ip host South
South(config)# copy running-config startup-config
Router(config)# ip host South
South(config)# exit
South# copy running-config startup-config
33. Which command is used to create an encrypted password that restricts access
to the privileged EXEC mode of a Cisco router?
RouterA(config)# encrypted password cisco
RouterA(config)# password encrypted cisco
RouterA(config)# enable password cisco
RouterA(config)# enable secret cisco
RouterA(config)# service-password encryption cisco
34. Refer to the exhibit. A network administrator working at HostA has problems
accessing the FTP server. Layer 3 connectivity testing was successful from HostA
to the S0/0/1 interface of RouterB. Which set of commands will allow the network
administrator to telnet to RouterB to check its status?
RouterB(config)# enable secret class
RouterB(config)# line vty 0 4
RouterB(config-if)# login
RouterB(config)# enable secret class
RouterB(config)# line vty 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-vty)# password cisco
RouterB(config-vty)# login
35. What is the purpose of using SSH to connect to a router?
It allows a router to be configured using a graphical interface.
It allows a secure remote connection to the router command line interface.
It allows the router to be monitored through a network management application.
It allows secure transfer of the IOS software image from an unsecure workstation
or server.
36. Which two statements describe the command ip route 192.168.7.24
255.255.255.248 192.168.7.9? (Choose two.)
A packet that is destined for host 192.168.7.30 will be forwarded to address
192.168.7.9.
The address 192.168.7.9 is the destination network for this route.
The address 192.168.7.24 is the next-hop router in this command.
This command is issued from the interface configuration mode.
This command is used to define a static route.
37. Which protocol is described as an enhanced distance vector routing protocol?
RIP v1
RIP v2
EIGRP
OSPF
38. Refer to the exhibit. A network administrator can successfully ping, using IP
addresses, between router Jax and router Atlanta. However, when the command
telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which
two reasons could be the cause of the failure? (Choose two.)
The Jax router is not an entry in the host table of the Atlanta router.
The Jax router does not have an entry for Atlanta in its host table.
The hostname command is not configured correctly on the Atlanta router.
The hostname command is not configured correctly on the Jax router.
Access to a DNS server is not available.
39. From what two locations can a router load the Cisco IOS during the boot
process? (Choose two.)
RAM
TFTP server
NVRAM
setup routine
Flash memory
terminal
40. Which two statements describe the functions or characteristics of ROM in a
router? (Choose two.)
stores routing tables
allows software to be updated without replacing pluggable chips on the
motherboard
maintains instructions for POST diagnostics
holds ARP cache
stores bootstrap program
41. Which two statements correctly identify the function of router memory
components? (Choose two.)
RAM permanently stores the configuration file used during the boot sequence.
ROM contains diagnostic self test procedures executed on hardware
modules.
NVRAM stores a backup copy of the IOS used during the boot sequence.
Flash memory does not lose its contents when a router is powered off.
ROM contains the most current and most complete version of the IOS.
Flash contains boot system commands to identify the location of the IOS.
42. Which router component holds the routing table, ARP cache, and running
configuration file?
RAM
Flash
NVRAM
ROM
43. Refer to the exhibit. A network administrator can ping the Denver router, but
gets a Password Required but None Set message when trying to connect
remotely via Telnet. Which command or sequence of commands must be applied
to the Denver router to allow remote access?
Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco
Router(config)# line virtual terminal
Router(config-line)# enable login
Router(config-line)# password cisco
Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco
Router(config)# enable secret cisco
Router(config)# enable cisco
44.
45. Which security method uses the Advanced Encryption Standard (AES)?
MAC address filtering
WEP
WPA
WPA2
46. What is the purpose of WEP?
It encrypts data.
It uniquely identifies a wireless network.
It coordinates and accepts transmissions from wireless hosts.
It provides information about a directly connected Cisco network device.
47. A company has an 802.11b wireless access point installed. Which type of
wireless NIC is a valid standards-based one but will not work in this environment?
802.11a
802.11b
802.11g
802.11n
48.
49. A company has a sales team that travels with laptops. On Fridays, the sales
members come into assigned cubicles and connect their laptop to the wired
network. The company is concerned that unauthorized users could also connect to
the network. What can be done to ensure that unauthorized laptops are not
connected to the wired network?
Implement SSH.
Install WEP or WPA.
Use switch port security.
Clearly label the cubicle network port and the switch port.
Configure usernames and passwords on the switch ports assigned to each
cubicle.
50. Refer to the exhibit. For security reasons, information about the HQ R1 router
model and IP address should not be accessible from the Site 2 R2 router. What
security measure should be implemented?
Install an IDS between R1 and R2.
Install an IPS between R1 and R2.
Install a firewall between R1 and R2.
Disable CDP on the R1 interface that connects to R2.
Disable any routing protocol used between R1 and R2 and install static routes.


What are three characteristics of CSMA/CD? (Choose three.)
1. A device listens and waits until the media is not busy before
transmitting.

2. All of the devices on a segment see data that passes on the network
medium.

3. After detecting a collision, hosts can attempt to resume transmission
after a random time delay has expired.

Which feature on a Cisco router permits the forwarding of traffic for which
there is no specific route?
gateway of last resort

An organization is assigned an IPv6 address block of
2001:db8:0:ca00::/56. How many subnets can be created without using
bits in the interface ID space?
256

Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.

Which code is displayed on the web browser?
It works!

Data is being sent from a source PC to a destination server. Which three
statements correctly describe the function of TCP or UDP in this situation?
(Choose three.)
1. The UDP destination port number identifies the application or service on
the server which will handle the data.

2. UDP segments are encapsulated within IP packets for transport across
the network.

3. The source port field identifies the running application or service that
will handle data returning to the PC.

What are two actions performed by a Cisco switch? (Choose two.)
1. using the source MAC addresses of frames to build and maintain a MAC
address table

2. utilizing the MAC address table to forward frames via the destination
MAC address

A network administrator is issuing the login block-for 180 attempts 2
within 30 command on a router. Which threat is the network administrator
trying to prevent?
a user who is trying to guess a password to access the router

How will a router handle static routing differently if Cisco Express
Forwarding is disabled?
Ethernet multiaccess interfaces will require fully specified static routes to
avoid routing inconsistencies.

A network administrator is designing an IPv4 addressing scheme and
requires these subnets.

1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts

Which combination of subnets and masks will provide the best addressing
plan for these requirements?
3 subnets of 126 hosts with a 255.255.255.128 mask
6 subnets of 30 hosts with a 255.255.255.224 mask

Match the description to the various trunking modes for Cisco 2960
Catalyst switches. Not all options are used.

A. The interface becomes a nontrunk interface regardless of whether the
neighboring interface is a trunk interface.

B. The interface becomes a trunk interface if the neighboring interface is
set to trunk or desirable mode.

C. The interface becomes a trunk interface even if the neighboring
interface is not a trunk interface.
1. switchport nonegotiate

2. switchport mode trunk - C

3. switchport mode dynamic desirable

4. switchport mode dynamic auto - B

5. switchport mode access - A

How many /30 subnets can be created from one /27 subnet?
8

Which layer of the OSI model handles the process of identifying and
discarding damaged frames?
data link

Refer to the exhibit. Which password will the administrator need to use on
this device to enter privileged EXEC mode?
cisco

In which memory location are the VLAN configurations of normal range
VLANs stored on a Catalyst switch?
flash

A user calls the help desk to report that a Windows XP workstation is
unable to connect to the network after startup and that a popup window
says "This connection has limited or no connectivity." The technician asks
the user to issue the ipconfig /all command. The user reports the IP
address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing
is displayed for the DNS server IP address. What is the cause of the
problem?
The workstation is unable to obtain an IP address from a DHCP server.

What will be the result of adding the command ip dhcp excluded-address
172.16.4.1 172.16.4.5 to the configuration of a local router that has been
configured as a DHCP server?
The DHCP server function of the router will not issue the addresses from
172.16.4.1 through 172.16.4.5 inclusive.

Refer to the exhibit. After the configuration that is shown in the exhibit is
applied to the SVI, the switch fails to respond to Telnet attempts from a
host in the same subnet. What is the cause of the problem?
The interface is administratively down.

Refer to the exhibit. Match the packets with their destination IP address to
the exiting interfaces on the router. (Not all targets are used.)

A. Packets with a destination of 172.17.10.5

B. Packets with a destination of 172.17.12.10

C. Packets with a destination of 172.17.14.8

D. Packets with a destination of 172.17.8.20

E. Packets with a destination of 172.17.6.15
1. FastEthernet0/0 - E

2. FastEthernet0/1 - C

3. FastEthernet1/0 - B

4. FastEthernet1/1 - A

5. Serial0/0/0 - D

6. The packet is dropped.

A network administrator is using the router-on-a-stick model to configure
a switch and a router for inter-VLAN routing. What configuration should be
made on the switch port that connects to the router?
Configure the port as an 802.1q trunk port.

Which three statements accurately describe duplex and speed settings on
Cisco 2960 switches? (Choose three.)
1. When the speed is set to 1000 Mb/s, the switch ports will operate in
full-duplex mode.

2. The duplex and speed settings of each switch port can be manually
configured.

3. An autonegotiation failure can result in connectivity issues.

Refer to the exhibit. A network administrator has configured R2 for PAT.
Why is the configuration incorrect?
NAT-POOL2 is bound to the wrong ACL.

Which address type is not supported in IPv6?
broadcast

Which device connects a local LAN to a geographically separate network?
router

What is the purpose of the SVI on a Cisco switch?
The SVI provides a virtual interface for remote access to the switch.

Refer to the exhibit. Interfaces Fa0/5, Fa0/7, and Fa0/9 are the only
connected ports on the switch CiscoSwitch. All other ports are unused.
Which security best practice did the administrator forget to configure?
Configure all unused ports to a 'black-hole' VLAN that is not used for
anything on the network.

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One
router is configured as the NTP master, and the other is an NTP client.
Which two pieces of information can be obtained from the partial output of
the show ntp associations detail command on R2? (Choose two.)
1. Router R1 is the master, and R2 is the client.

2. The IP address of R1 is 192. 168. 1. 2.

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that
is created if the subnet prefix is changed to /52?
2001:db8:0:f000::/52

What is the purpose of deploying dual stack devices?
Dual stack allows companies to migrate to IPv6 over time.

Which two devices allow hosts on different VLANs to communicate with
each other? (Choose two.)
1. router

2. Layer 3 switch

Refer to the exhibit. Fill in the blank.
There are collision domains in the topology.
12

Refer to the exhibit. A switch with a default configuration connects four
hosts. The ARP table for host A is shown. What happens when host A wants
to send an IP packet to host D?
Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host
connected to the switch receives the broadcast and host D responds with
its MAC address.

What is the most compressed representation of the IPv6 address
2001:0000:0000:abcd:0000:0000:0000:0001?
2001:0:0:abcd::1

Which three statements are true about full-duplex operation on an Ethernet
network? (Choose three.)
1. A dedicated switch port is required for each node.

2. There are no collisions in full-duplex mode.

3. The host network card and the switch port must both be in full-duplex
mode.

Refer to the exhibit. A network administrator is investigating a lag in
network performance and issues the show interfaces fastethernet 0/0
command. Based on the output that is displayed, what two items should
the administrator check next? (Choose two.)
1. duplex settings

2. cable lengths

What is the purpose of using SSH to connect to a router?
It allows a secure remote connection to the router command line interface.

When creating an IPv6 static route, when must a next-hop IPv6 address and
an exit interface both be specified?
when the next hop is a link-local address

Which series of commands will cause access list 15 to restrict Telnet access
on a router?
R1(config)# line vty 0 4
R1(config-line)# access-class 15 in

Refer to the exhibit. Host A sends a data packet to host B. What will be the
addressing information of the data packet when it reaches host B?
Source af:3c:dc:4c:55:66
Destination a0:4c:5f:21:33:77
Source 172.16.1.10
Destination 172.16.2.10
Data

A network engineer is configuring PAT on a router and has issued the
command:
ip nat source list 1 interface serial 0/1/0 overload
Which additional command is required to specify addresses from the
192.168.128.0/18 network as the inside local addresses?
access-list 1 permit 192.168.128.0 0.0.63.255

Refer to the exhibit. How will R1 generate the interface ID portion of the
IPv6 address on interface FastEthernet 0/0?
by using the interface MAC address with a 16-bit filler

Refer to the exhibit. A network administrator is reviewing port and VLAN
assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are
not included in the output. Why would the interfaces be missing from the
output?
They are configured as trunk interfaces.

A network administrator has been allocated the IPv4 10.10.240.0/20 block
of addresses for a LAN. Two devices on two different, but contiguous,
subnets on the LAN have been assigned the addresses 10.10.247.1/21 and
10.10.248.10/24, respectively. The administrator has to create a third
subnet from the remaining address range. To optimize the use of this
address space, the new subnet will follow on directly from the existing
subnets. What is the first available host address in the next available
subnet?
10.10.249.1

Refer to the exhibit. Interfaces Fa0/2, Fa0/4, and Fa0/6 are connected to
users on the data network of a switch named CiscoSwitch. Interface Fa0/24
is connected to a file server on the management network. All other ports
are unused. Which security best practice did the administrator forget to
configure?
Disable autonegotiation on interfaces that are not being utilized as a trunk.

Which combination of DTP modes will form a link to allow multiple VLANs?
dynamic auto-dynamic desirable

A network administrator has recently implemented OSPFv2 across the
entire network topology. Which command can be implemented to prevent
the forwarding of OSPF messages to Layer 2 switches and hosts on
interface Fast Ethernet 0/1, while maintaining network connectivity?
R1(config-router)# passive-interface FastEthernet 0/1

A network technician is configuring port security on a LAN switch interface.
The security policy requires host MAC addresses to be learned dynamically,
stored in the address table, and saved to the switch running configuration.
Which command does the technician need to add to the following
configuration to implement this policy?

Switch(config)# interface fa0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky

Match the order of precedence to the process logic that an OSPFv3 network
router goes through in choosing a router ID. (Not all options are used.)
A. priority 1

B. priority 2

C. priority 3

D. priority 4
1. The router displays a console message to configure the router ID
manually. - D

2. The router uses the highest configured IPv4 address of an active
interface. - C

3. The router chooses the highest IPv6 address that is configured on the
router.

4. The router uses the highest configured IPv4 address of a loopback
interface. - B

5. The router uses the explicitly configured router ID if any. - A

Refer to the exhibit. OSPFv2 has been configured on router R1, and the
router-id command has not been manually configured. When the network
administrator reboots router R1, what will be the value of the OSPF router
ID?
172.16.1.1

A network administrator has enabled single-area OSPFv3 on a router via
the ipv6 router ospf 100 command. Which command will enable this
OSPFv3 process on an interface of that router?
R1(config-if)# ipv6 ospf 100 area 0

What can a network administrator modify on a router to specify the
location from which the Cisco IOS loads? (Choose two.)
1. the startup configuration file

2. the configuration register value

Which three statements characterize UDP? (Choose three.)
1. UDP provides connectionless, fast transport of data at Layer 4.

2. UDP relies on application layer protocols for error detection.

3. UDP works well when an application does not need to guarantee delivery
of data.

Fill in the blank.

A late collision occurs after bits of a frame have been transmitted.
512

Which three statements describe a DHCP Discover message? (Choose
three.)
1. The message comes from a client seeking an IP address.

2. The destination IP address is 255.255.255.255.

3. All hosts receive the message, but only a DHCP server replies.

Which two issues might cause excessive runt and giant frames in an
Ethernet network? (Choose two.)
1. a malfunctioning NIC

2. excessive collisions

Refer to the exhibit. Which two statements are correct based on the output
as shown in the exhibit? (Choose two.)
1. The output is the result of the show ip nat translations command.

2. The host with the address 209.165.200.235 will respond to requests by
using a source address of 192.168.10.10.

Potrebbero piacerti anche