Sei sulla pagina 1di 200

CCNA Practice Certification Exam # 1 CCNA Exploration: Accessing the

WAN (Version 4.0)


1. What are three examples of TCP/IP application layer protocols? (Choose three.)
a
t
e
r
m
i
n
a
l
e
m
u
l
a
t
i
o
n
p
r
o
t
o
c
o
l
t
h
a
t
s
u
p
p
o
r
t
s
r
e
m

o
t
e
c
o
n
s
o
l
e
c
o
n
n
e
c
t
i
o
n
s
w
i
t
h
v
a
r
i
o
u
s
n
e
t
w
o
r
k
d
e

v
i
c
e
s
a
p
r
o
t
o
c
o
l
c
r
e
a
t
e
d
b
y
I
B
M
t
h
a
t
m
a
k
e
s
i
t
e
a
s
i
e

r
f
o
r
m
a
i
n
f
r
a
m
e
s
t
o
c
o
n
n
e
c
t
t
o
r
e
m
o
t
e
o
f
f
i
c
e
s
a
p
r
o

t
o
c
o
l
r
e
s
p
o
n
s
i
b
l
e
f
o
r
t
r
a
n
s
p
o
r
t
i
n
g
e
l
e
c
t
r
o
n
i
c
m
a
i

l
o
n
T
C
P
/
I
P
n
e
t
w
o
r
k
s
a
n
d
t
h
e
I
n
t
e
r
n
e
t
a
p
r
o
t
o
c
o
l
t

h
a
t
c
o
n
t
r
o
l
s
t
h
e
r
a
t
e
a
t
w
h
i
c
h
d
a
t
a
i
s
s
e
n
t
t
o
a
n
o

t
h
e
r
c
o
m
p
u
t
e
r
a
p
r
o
t
o
c
o
l
t
h
a
t
e
x
c
h
a
n
g
e
s
n
e
t
w
o
r
k
m
a
n

a
g
e
m
e
n
t
i
n
f
o
r
m
a
t
i
o
n
b
e
t
w
e
e
n
a
n
e
t
w
o
r
k
d
e
v
i
c
e
a
n
d

a
m
a
n
a
g
e
m
e
n
t
c
o
n
s
o
l
e
a
p
r
o
t
o
c
o
l
t
h
a
t
c
o
n
d
u
c
t
s
a
t
e

s
t
o
f
t
h
e
p
a
t
h
t
h
r
o
u
g
h
w
h
i
c
h
a
p
a
c
k
e
t
t
r
a
v
e
l
s
f
r
o
m

s
o
u
r
c
e
t
o
d
e
s
t
i
n
a
t
i
o
n
2. Refer to the exhibit. The exhibit shows simplified protocol data units from
different OSI model layers. Which three statements are true about the PDUs and
the encapsulation process? (Choose three.)
P
D
U
#
1
i
s
a
f
r
a
m
e
.
P
D
U

#
2
i
s
a
n
a
p
p
li
c
a
t
i
o
n
l
a
y
e
r
P
D
U
P
D
U
#
3
i
s
a
s
e
g
m
e
n
t

.
P
D
U
#
4
i
s
a
t
r
a
n
s
p
o
r
t
l
a
y
e
r
P
D
U
.
T
h
e
o
r
d
e
r
i
n
w
h
i
c

h
t
h
e
s
e
P
D
U
s
a
r
e
c
r
e
a
t
e
d
d
u
r
i
n
g
t
h
e
e
n
c
a
p
s
u
l
a
t
i

o
n
p
r
o
c
e
s
s
i
s
3
,
4
,
1
,
2
.
T
h
e
o
r
d
e
r
i
n
w
h
i
c
h
t
h
e
s
e
P

D
U
s
a
r
e
c
r
e
a
t
e
d
d
u
r
i
n
g
t
h
e
e
n
c
a
p
s
u
l
a
t
i
o
n
p
r
o
c
e
s

s
i
s
2
,
1
,
4
,
3
.
3. What are two characteristics of TCP? (Choose two.)
data transport reliability
best path determination
establishing, maintaining, and terminating virtual circuits
encapsulation of packets in a data frame with source and destination MAC addresses
best-effort datagram delivery
4. Refer to the exhibit. What type of Layer 2 encapsulation will be used for
connection D on the basis of this configuration on a newly installed router:
RtrA(config)# interface serial0/0/0
RtrA(config-if)# ip address 128.107.0.2 255.255.255.252
RtrA(config-if)# no shutdown
E
t
h
e
r
n
e
t
F
r
a
m
e
R
e
l
a
y

H
D
L
C
P
P
P
5. Which three factors contribute to congestion on an Ethernet LAN? (Choose
three.)
i
m
p
r
o
p
e
r
p
l
a
c
e
m
e
n
t
o
f
e
n
t
e
r
p
r
i
s
e
l
e
v
e
l
s
e
r

v
e
r
s
a
d
d
i
t
i
o
n
o
f
h
o
s
t
s
t
o
a
p
h
y
s
i
c
a
l
s
e
g
m
e
n
t
r
e
p
l
a
c

e
m
e
n
t
o
f
h
u
b
s
w
i
t
h
w
o
r
k
g
r
o
u
p
s
w
i
t
c
h
e
s
i
n
c
r
e
a
s
i
n
g
u

s
e
o
f
b
a
n
d
w
i
d
t
h
i
n
t
e
n
s
i
v
e
n
e
t
w
o
r
k
a
p
p
l
i
c
a
t
i
o
n
s
c
r

e
a
t
i
o
n
o
f
n
e
w
c
o
ll
i
s
i
o
n
d
o
m
a
i
n
s
w
i
t
h
o
u
t
f
i
r
s
t
a
d
d
i
n

g
n
e
t
w
o
r
k
h
o
s
t
s
m
i
g
r
a
t
i
o
n
t
o
f
u
ll
d
u
p
l
e
x
E
t
h
e
r
n
e
t

w
i
t
h
i
n
t
h
e
L
A
N
6. A Catalyst switch must be in which VTP mode in order to delete or add VLANs to
a management domain?
c
li
e
n
t
s
e
r
v
e
r
d
o
m
a
i
n
t
r
a
n
s
p
a
r
e
n
t
d
e
s

i
g
n
a
t
e
d
7. What creates a loop-free path through a switch network?
h
o
l
d
d
o
w
n
t
i
m
e
r
s
p
o
i
s
o
n
r
e
v
e
r
s
e
S
p
a
n
n
i
n
g

T
r
e
e
P
r
o
t
o
c
o
l
T
i
m
e
t
o
L
i
v
e
S
p
li
t
H
o
r
i
z
o
n
P
r
o
t
o
c
o
l
R
o

u
t
i
n
g
I
n
f
o
r
m
a
t
i
o
n
P
r
o
t
o
c
o
l
8. Refer to the exhibit. All ports on switch fl-1 are in the Production VLAN and all
ports on switch fl-2 are in the Development VLAN. How many broadcast domains
and how many collision domains are in the network? (Choose two.)
o
n
e
b
r
o
a
d
c
a
s
t
d
o
m
a
i

n
t
h
r
e
e
b
r
o
a
d
c
a
s
t
d
o
m
a
i
n
s
t
h
r
e
e
c
o
ll
i
s
i
o
n
d
o
m
a
i
n
s
f
i

v
e
b
r
o
a
d
c
a
s
t
d
o
m
a
i
n
s
n
i
n
e
c
o
l
l
i
s
i
o
n
d
o
m
a
i
n
s
t
e
n
c

o
ll
i
s
i
o
n
d
o
m
a
i
n
s
9. Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and
SW_2 and switch ports have been assigned to the appropriate VLAN. Workstations
in VLAN 10 can ping workstations in VLAN 10 that connect to either switch, but
workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite
switch. Based on the output, what is most likely the problem?
F
A
0
/
1
o
n
S
W
_
1
n
e
e
d
s
t
o
b
e

a
s
s
i
g
n
e
d
t
o
V
L
A
N
2
0
.
F
A
0
/
1
o
n
S
W
_
2
n
e
e
d
s
t
o
b
e

a
s
s
i
g
n
e
d
t
o
V
L
A
N
2
0
.
V
T
P
i
s
n
o
t
w
o
r
k
i
n
g
p
r
o
p
e
r
l
y

b
e
t
w
e
e
n
S
W
_
1
a
n
d
S
W
_
2
.
I
n
t
e
r
f
a
c
e
s
F
A
0
/
1
o
n
S
W
_
1

a
n
d
S
W
_
2
n
e
e
d
t
o
b
e
c
o
n
f
i
g
u
r
e
d
a
s
t
r
u
n
k
p
o
r
t
s
.
I

n
t
e
r
f
a
c
e
s
F
A
0
/
3
o
n
b
o
t
h
s
w
i
t
c
h
e
s
n
e
e
d
t
o
b
e
c
o
n

f
i
g
u
r
e
d
a
s
a
c
c
e
s
s
p
o
r
t
s
.
10. Refer to the exhibit. What can be concluded from the output that is shown?
T
h
e
m
a
n
a
g
e
m
e
n
t
V
L
A
N
i
s

V
L
A
N
9
9
.
T
h
e
o
n
l
y
V
L
A
N
t
h
a
t
c
a
n
b
e
a
p
p
li
e
d
t
o
s
w
i
t

c
h
p
o
r
t
s
i
s
V
L
A
N
9
9
.
T
h
e
o
n
l
y
V
L
A
N
s
t
h
a
t
c
a
n
b
e
a

p
p
li
e
d
t
o
s
w
i
t
c
h
p
o
r
t
s
a
r
e
V
L
A
N
s
1
a
n
d
9
9
.
T
h
e
s
w

i
t
c
h
w
il
l
o
n
l
y
b
e
a
b
l
e
t
o
f
o
r
w
a
r
d
f
r
a
m
e
s
f
o
r
h
o
s
t
s

o
n
t
h
e
1
0
.
9
9
.
0
.
0
n
e
t
w
o
r
k
.
11. Refer to the exhibit and the following error message from the SwA switch.
00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on
non trunk FastEthernet0/1 VLAN1.
00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on
VLAN0001. Inconsistent port type.
Considering that the link between the two switches is good and the correct type,
what could cause this error message?
T
h
e
S
p
a
n
n
i

n
g
T
r
e
e
P
r
o
t
o
c
o
l
h
a
s
b
e
e
n
d
i
s
a
b
l
e
d
o
n
o
n
e
s
w
i
t
c
h

.
T
h
e
S
p
a
n
n
i
n
g
T
r
e
e
P
r
o
t
o
c
o
l
h
a
s
b
e
e
n
d
i
s
a
b
l
e
d
o
n

b
o
t
h
s
w
i
t
c
h
e
s
.
T
h
e
I
E
E
E
8
0
2
.
1
Q
t
r
u
n
k
i
n
g
p
o
r
t
h
a
s

a
s
p
e
e
d
m
i
s
m
a
t
c
h
o
n
o
n
e
o
f
t
h
e
s
w
i
t
c
h
e
s
.
T
h
e
S
w
A

p
o
r
t
i
s
c
o
n
f
i
g
u
r
e
d
a
s
a
t
r
u
n
k
p
o
r
t
a
n
d
t
h
e
S
w
B
p

o
r
t
i
s
c
o
n
f
i
g
u
r
e
d
a
s
a
n
a
c
c
e
s
s
p
o
r
t
.
T
h
e
S
w
A
p
o
r
t

h
a
s
I
E
E
E
8
0
2
.
1
Q
t
r
u
n
k
i
n
g
e
n
a
b
l
e
d
a
n
d
t
h
e
S
w
B
p
o

r
t
h
a
s
I
S
L
t
r
u
n
k
i
n
g
e
n
a
b
l
e
d
.
12. Refer to the exhibit. Based on the exhibited configuration and output, why is
VLAN 99 missing?
b
e
c
a
u
s
e
t
h
e
r
e
i
s
a

c
a
b
li
n
g
p
r
o
b
l
e
m
o
n
V
L
A
N
9
9
b
e
c
a
u
s
e
V
L
A
N
9
9
i
s
n
o

t
a
v
a
li
d
m
a
n
a
g
e
m
e
n
t
V
L
A
N
b
e
c
a
u
s
e
V
L
A
N
1
i
s
u
p
a
n
d

t
h
e
r
e
c
a
n
o
n
l
y
b
e
o
n
e
m
a
n
a
g
e
m
e
n
t
V
L
A
N
o
n
t
h
e
s
w
i

t
c
h
b
e
c
a
u
s
e
V
L
A
N
9
9
n
e
e
d
s
t
o
b
e
e
n
t
e
r
e
d
a
s
a
V
L
A

N
u
n
d
e
r
a
n
i
n
t
e
r
f
a
c
e
b
e
f
o
r
e
i
t
c
a
n
b
e
c
o
m
e
a
n
a
c
t
i

v
e
i
n
t
e
r
f
a
c
e
b
e
c
a
u
s
e
t
h
e
V
L
A
N
9
9
h
a
s
n
o
t
b
e
e
n
m
a
n

u
a
l
l
y
e
n
t
e
r
e
d
i
n
t
o
t
h
e
V
L
A
N
d
a
t
a
b
a
s
e
w
i
t
h
t
h
e
v

l
a
n
9
9
c
o
m
m
a
n
d
13. Refer to the exhibit. Which command needs to be used on router interface Fa
0/1 to complete the VLAN configuration?
R
T
_
1
(
c
o
n
f
i
g
)
#
t
r
u
n
k
e
n
c
a
p
s
u
l
a
t
i

o
n
d
o
t
1
q
R
T
_
1
(
c
o
n
f
i
g
s
u
b
i
f
)
#
e
n
c
a
p
s
u
l
a
t
i
o
n
d
o
t
1
q

1
0
R
T
_
1
(
c
o
n
f
i
g
s
u
b
i
f
)
#
e
n
c
a
p
s
u
l
a
t
i
o
n
n
e
g
o
t
i
a
t
e
R

T
_
1
(
c
o
n
f
i
g
s
u
b
i
f
)
#
e
n
c
a
p
s
u
l
a
t
i
o
n
8
0
2
.
1
q
R
T
_
1
(
c
o
n

f
i
g
)
#
v
l
a
n
e
n
c
a
p
s
u
l
a
t
i
o
n
d
o
t
1
q
14. Refer to the exhibit. Computer A is configured with an IP address of
192.168.20.5 and cannot ping RT_1. What is most likely the problem?
S
W
_
1
F
a
s
t
E
t
h
e
r
n

e
t
i
n
t
e
r
f
a
c
e
0
/
2
4
i
s
n
o
t
a
t
r
u
n
k
p
o
r
t
.
T
h
e
R
T
_
1
F
a

s
t
E
t
h
e
r
n
e
t
0
/
1
.
1
0
i
s
n
o
t
c
o
n
f
i
g
u
r
e
d
f
o
r
V
L
A
N
s
.
T
h
e

F
a
s
t
E
t
h
e
r
n
e
t
p
o
r
t
0
/
1
o
n
S
W
_
1
i
s
c
o
n
f
i
g
u
r
e
d
f
o
r
V
L

A
N
2
0
.
T
h
e
m
a
n
a
g
e
m
e
n
t
V
L
A
N
d
o
e
s
n
o
t
h
a
v
e
a
n
I
P
a
d
d

r
e
s
s
a
s
s
i
g
n
e
d
t
o
t
h
e
s
a
m
e
V
L
A
N
.
T
h
e
I
P
a
d
d
r
e
s
s
o

f
c
o
m
p
u
t
e
r
A
i
s
i
n
c
o
r
r
e
c
t
.
15. Refer to the exhibit. Which three hosts will receive ARP requests from host A,
assuming that port Fa0/4 on both switches is configured to carry traffic for multiple
VLANs? (Choose three.)
h
o
s
t
B
h
o
s
t
C
h
o
s
t
D
h
o
s
t

E
h
o
s
t
F
h
o
s
t
G
16. Refer to the exhibit. Two VLANs have been configured on the switch and hosts
have been assigned. Hosts in the Sales VLAN can ping all hosts in their own
VLAN, but cannot ping the hosts in the HR VLAN. What are two explanations for
this problem? (Choose two.)
A
ll
h
o
s
t
s
a
r
e
i
n
o
n
e
c
o
ll
i
s
i
o
n
d
o
m

a
i
n
.
A
ll
h
o
s
t
s
a
r
e
i
n
o
n
e
b
r
o
a
d
c
a
s
t
d
o
m
a
i
n
.
A
r
o
u
t
e
r

i
s
r
e
q
u
i
r
e
d
f
o
r
c
o
m
m
u
n
i
c
a
t
i
o
n
b
e
t
w
e
e
n
V
L
A
N
s
.
T
h
e

h
o
s
t
s
a
r
e
i
n
s
e
p
a
r
a
t
e
b
r
o
a
d
c
a
s
t
d
o
m
a
i
n
s
.
T
h
e
m
a
n
a

g
e
m
e
n
t
V
L
A
N
h
a
s
n
o
t
b
e
e
n
a
s
s
i
g
n
e
d
a
n
I
P
a
d
d
r
e
s
s
.

17. Which industry-wide specification was developed to decrease the time that is
needed to move to the forwarding state by switch ports that are operating in a
redundantly switched topology?
V
L
S
M
P
V
S
T
8
0
2
.
1
Q
R
S
T
P
V
T
P
18. Refer to the exhibit. Which switch will be elected the root bridge and which
switch will place a port in blocking mode? (Choose two.)
S
W
1
w
il
l
b
e
c
o
m
e
t
h
e
r
o
o

t
b
r
i
d
g
e
.
S
W
2
w
il
l
b
e
c
o
m
e
t
h
e
r
o
o
t
b
r
i
d
g
e
.
S
W
2
w
il
l
g
e
t

a
p
o
r
t
b
l
o
c
k
e
d
.
S
W
4
w
i
l
l
g
e
t
a
p
o
r
t
b
l
o
c
k
e
d
.
S
W
3
w
i
l
l

b
e
c
o
m
e
t
h
e
r
o
o
t
b
r
i
d
g
e
.
S
W
4
w
il
l
b
e
c
o
m
e
t
h
e
r
o
o
t
b
r
i

d
g
e
.
19. What is the purpose of the Spanning Tree Protocol (STP)?
p
r
e
v
e
n
t
s
L
a
y
e
r
2
l
o
o
p
s
p
r
e
v
e
n
t
s
r
o
u
t
i
n
g
l
o
o
p

s
o
n
a
r
o
u
t
e
r
c
r
e
a
t
e
s
s
m
a
ll
e
r
c
o
ll
i
s
i
o
n
d
o
m
a
i
n
s
c
r
e
a

t
e
s
s
m
a
ll
e
r
b
r
o
a
d
c
a
s
t
d
o
m
a
i
n
s
a
ll
o
w
s
C
i
s
c
o
d
e
v
i
c
e
s
t

o
e
x
c
h
a
n
g
e
r
o
u
t
i
n
g
t
a
b
l
e
u
p
d
a
t
e
s
20. Which statement is true regarding states of the IEEE 802.1D Spanning Tree
Protocol?
P
o
r
t
s
a
r
e
m
a
n

u
a
ll
y
c
o
n
f
i
g
u
r
e
d
t
o
b
e
i
n
t
h
e
f
o
r
w
a
r
d
i
n
g
s
t
a
t
e
.
P

o
r
t
s
l
i
s
t
e
n
a
n
d
l
e
a
r
n
b
e
f
o
r
e
g
o
i
n
g
i
n
t
o
t
h
e
f
o
r

w
a
r
d
i
n
g
s
t
a
t
e
.
P
o
r
t
s
m
u
s
t
b
e
b
l
o
c
k
e
d
b
e
f
o
r
e
t
h
e
y

c
a
n
b
e
p
l
a
c
e
d
i
n
t
h
e
d
i
s
a
b
l
e
d
s
t
a
t
e
.
I
t
t
a
k
e
s
1
5

s
e
c
o
n
d
s
f
o
r
a
p
o
r
t
t
o
g
o
f
r
o
m
b
l
o
c
k
i
n
g
t
o
f
o
r
w
a
r
d

i
n
g
.
21. Four bits have been borrowed to create subnets. Which three addresses are
subnet addresses? (Choose three.)
1
9
2
.
1
6
8
.
1
4
.
8
1
9
2
.
1
6
8
.
1
4
.
1
6
1
9
2
.
1
6
8
.
1
4
.
2
4
1
9
2

.
1
6
8
.
1
4
.
3
2
1
9
2
.
1
6
8
.
1
4
.
1
4
8
1
9
2
.
1
6
8
.
1
4
.
2
0
8
22. Refer to the exhibit. What type of header is shown?
I
P
v
4
I
P
v
6

T
C
P
U
D
P
23.
24. Assuming a subnet mask of 255.255.224.0, which three addresses would be
valid host addresses? (Choose three.)
1
0
.
7
8
.
1
0
3
.
0
1
0
.
6
7
.
3
2
.
0
1
0
.
7
8
.
1
6
0
.
0
1
0
.
7
8
.

4
8
.
0
1
7
2
.
5
5
.
9
6
.
0
1
7
2
.
2
1
1
.
1
0
0
.
0
25. What type of IP address is 172.16.134.48/27?
a
u
s
e
a
b
l
e
h
o
s
t
a
d
d
r

e
s
s
a
b
r
o
a
d
c
a
s
t
a
d
d
r
e
s
s
a
n
e
t
w
o
r
k
a
d
d
r
e
s
s
a
m
u
l
t
i
c
a

s
t
a
d
d
r
e
s
s
a
p
u
b
li
c
a
d
d
r
e
s
s
26. Which address is a valid IPv6 global unicast address?
F
E
9
0
:
:
1
:
:
F
F
F
F
F
D
8
0
:
:
1
:
:

1
2
3
4
F
E
8
0
:
:
1
:
4
5
4
5
:
6
5
7
8
:
A
B
C
1
F
E
A
0
:
:
1
0
0
:
:
7
7
8
8
:
9
9
8
F
F

C
9
0
:
:
:
:
5
6
7
8
:
4
2
5
1
:
F
F
F
F
27. A network administrator needs to configure three local networks. The networks
have these requirements:
Network 1 500 hosts
Network 2 100 hosts
Network 3 1000 hosts
Which three subnet masks will be needed to fulfill these requirements? (Choose
three.)
2
5
5
.
2
5
5
.
0
.
0
2
5
5

.
2
5
5
.
2
5
5
.
0
2
5
5
.
2
5
5
.
2
5
4
.
0
2
5
5
.
2
5
5
.
2
5
2
.
0
2
5
5
.
2
5
5
.
2
4
8

.
0
2
5
5
.
2
5
5
.
2
5
5
.
1
2
8
2
5
5
.
2
5
5
.
2
5
5
.
1
9
2
28.
29. A router needs to be configured to route within OSPF area 0. Which two
commands are required to accomplish this? (Choose two.)
R
o
u
t
e
r
A
(
c
o
n
f

i
g
)
#
r
o
u
t
e
r
o
s
p
f
0
R
o
u
t
e
r
A
(
c
o
n
f
i
g
)
#
r
o
u
t
e
r
o
s
p
f
1
R
o
u

t
e
r
A
(
c
o
n
f
i
g
r
o
u
t
e
r
)
#
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
2
.
0
0
.
0
.
0
.

2
5
5
0
R
o
u
t
e
r
A
(
c
o
n
f
i
g
r
o
u
t
e
r
)
#
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
2
.

0
0
.
0
.
0
.
2
5
5
a
r
e
a
0
R
o
u
t
e
r
A
(
c
o
n
f
i
g
r
o
u
t
e
r
)
#
n
e
t
w
o

r
k
1
9
2
.
1
6
8
.
2
.
0
2
5
5
.
2
5
5
.
2
5
5
.
0
0
30. Refer to the exhibit. Two switches have been connected with ports that are
configured as trunks. After the connection was made, SW2 displayed the status
message as shown in the exhibit. What will solve this problem?
S
W
1
(
c
o
n
f
i
g
)
#
i

n
t
e
r
f
a
c
e
f
a
s
t
e
t
h
e
r
n
e
t
0
/
1
S
W
1
(
c
o
n
f
i
g
i
f
)
#
d
u
p
l
e
x

f
u
l
l
S
W
1
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e
f
a
s
t
e
t
h
e
r
n
e
t
0
/
1

S
W
1
(
c
o
n
f
i
g
i
f
)
#
f
u
l
l
d
u
p
l
e
x
S
W
2
(
c
o
n
f
i
g
)
#
i
n
t
e
r

f
a
c
e
f
a
s
t
e
t
h
e
r
n
e
t
0
/
1
S
W
2
(
c
o
n
f
i
g
i
f
)
#
d
u
p
l
e
x
f
u
l

l
S
W
2
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e
f
a
s
t
e
t
h
e
r
n
e
t
0
/
1
S
W
2
(
c

o
n
f
i
g
i
f
)
#
f
u
l
l
d
u
p
l
e
x
31. A router with two LAN interfaces, two WAN interfaces, and one configured
loopback interface is operating with OSPF as its routing protocol. What does the
router OSPF process use to assign the router ID?
t
h
e
I
P
a
d
d
r
e
s
s
o
f
t
h
e

i
n
t
e
r
f
a
c
e
t
h
a
t
i
s
c
o
n
f
i
g
u
r
e
d
w
i
t
h
p
r
i
o
r
i
t
y
0
t
h
e

O
S
P
F
a
r
e
a
I
D
t
h
a
t
i
s
c
o
n
f
i
g
u
r
e
d
o
n
t
h
e
i
n
t
e
r
f
a
c

e
w
i
t
h
t
h
e
h
i
g
h
e
s
t
I
P
a
d
d
r
e
s
s
t
h
e
l
o
o
p
b
a
c
k
i
n
t
e
r
f

a
c
e
I
P
a
d
d
r
e
s
s
t
h
e
h
i
g
h
e
s
t
I
P
a
d
d
r
e
s
s
o
n
t
h
e
L
A
N

i
n
t
e
r
f
a
c
e
s
t
h
e
h
i
g
h
e
s
t
I
P
a
d
d
r
e
s
s
t
h
a
t
i
s
c
o
n
f
i
g
u
r

e
d
o
n
t
h
e
W
A
N
i
n
t
e
r
f
a
c
e
s
32. What table does the EIGRP DUAL algorithm use to calculate the best route to
each destination router?
r
o
u
t
i
n
g
t
a
b
l
e
t
o
p
o
l
o
g
y

t
a
b
l
e
D
U
A
L
t
a
b
l
e
C
A
M
t
a
b
l
e
A
R
P
t
a
b
l
e
33. What two measures are used to prevent routing loops in networks that use
distance vector routing protocols? (Choose two.)
li
n
k
s
t
a
t
e
a

d
v
e
r
t
i
s
e
m
e
n
t
s
(
L
S
A
)
S
p
a
n
n
i
n
g
T
r
e
e
P
r
o
t
o
c
o
l
s
h
o
r
t
e

s
t
p
a
t
h
f
i
r
s
t
t
r
e
e
s
p
l
i
t
h
o
r
i
z
o
n
h
o
l
d
d
o
w
n
t
i
m
e
r
s
34. Refer to the exhibit. When the show ip ospf neighbor command is given from
the R1# prompt, no output is shown. However, when the show ip interface brief

command is given, all interfaces are showing up and up. What is the most likely
problem?
R
2
h
a
s
n
o
t
b
r
o
u
g
h
t
t
h
e
S
0
/
0
/
1
i
n
t
e
r
f
a
c
e
u
p
y
e
t
.

R
1
o
r
R
2
d
o
e
s
n
o
t
h
a
v
e
a
l
o
o
p
b
a
c
k
i
n
t
e
r
f
a
c
e
t
h
a
t
i

s
c
o
n
f
i
g
u
r
e
d
y
e
t
.
T
h
e
I
S
P
h
a
s
n
o
t
c
o
n
f
i
g
u
r
e
d
a
s
t

a
t
i
c
r
o
u
t
e
f
o
r
t
h
e
A
B
C
C
o
m
p
a
n
y
y
e
t
.
R
1
o
r
R
2
d
o
e
s

n
o
t
h
a
v
e
a
n
e
t
w
o
r
k
s
t
a
t
e
m
e
n
t
f
o
r
t
h
e
1
7
2
.
1
6
.
1
0
0
.
0

n
e
t
w
o
r
k
.
R
1
h
a
s
n
o
t
s
e
n
t
a
d
e
f
a
u
l
t
r
o
u
t
e
d
o
w
n
t
o
R
2

b
y
u
s
i
n
g
t
h
e
d
e
f
a
u
l
t
i
n
f
o
r
m
a
t
i
o
n
o
r
i
g
i
n
a
t
e
c
o
m

m
a
n
d
.
35. Refer to the exhibit. The XYZ Company hosts web pages for small companies.
Based on the exhibited information, what would be an appropriate route for the ISP
to configure for the XYZ network?
I
S
P
#
i
p
r
o
u
t
e
0
.
0
.
0
.
0
0
.
0
.
0
.
0
s
0
/
0
/
1
I
S
P

#
i
p
r
o
u
t
e
0
.
0
.
0
.
0
0
.
0
.
0
.
0
s
/
0
/
0
/
0
I
S
P
#
i
p
r
o
u
t
e

1
9
2
.
1
3
5
.
2
5
0
.
0
2
5
5
.
2
5
5
.
2
5
5
.
0
s
0
/
0
/
1
I
S
P
#
i
p
r
o
u
t

e
1
9
2
.
1
3
5
.
2
5
0
.
0
2
5
5
.
2
5
5
.
2
5
5
.
0
s
0
/
0
/
0
I
S
P
#
i
p
r
o
u

t
e
1
9
2
.
1
3
5
.
2
5
0
.
0
2
5
5
.
2
5
5
.
2
5
5
.
2
4
0
s
0
/
0
/
1
I
S
P
#
i
p

r
o
u
t
e
1
9
2
.
1
3
5
.
2
5
0
.
0
2
5
5
.
2
5
5
.
2
5
5
.
2
4
8
s
0
/
0
/
1
36. Refer to the exhibit. A network administrator has configured routers RTA and
RTB, but cannot ping from serial interface to serial interface. Which layer of the
OSI model is the most likely cause of the problem?
a
p

p
li
c
a
t
i
o
n
t
r
a
n
s
p
o
r
t
n
e
t
w
o
r
k
d
a
t
a
l
i
n
k
p
h
y
s
i
c
a
l
37. What best describes the operation of distance vector routing protocols?
T
h
e
y

u
s
e
h
o
p
c
o
u
n
t
a
s
t
h
e
i
r
o
n
l
y
m
e
t
r
i
c
.
T
h
e
y
o
n
l
y
s
e
n
d

o
u
t
u
p
d
a
t
e
s
w
h
e
n
a
n
e
w
n
e
t
w
o
r
k
i
s
a
d
d
e
d
.
T
h
e
y
s
e

n
d
t
h
e
i
r
r
o
u
t
i
n
g
t
a
b
l
e
s
t
o
d
i
r
e
c
t
l
y
c
o
n
n
e
c
t
e
d
n
e

i
g
h
b
o
r
s
.
T
h
e
y
f
l
o
o
d
t
h
e
e
n
t
i
r
e
n
e
t
w
o
r
k
w
i
t
h
r
o
u
t

i
n
g
u
p
d
a
t
e
s
.
38. Refer to the exhibit. Which sequence of commands will configure router A for
OSPF?
r
o
u
t
e
r
o
s
p
f
0
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
0

n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
1
9
2
r
o
u
t
e
r
o
s
p
f
0
n
e
t
w
o
r
k
1
9

2
.
1
6
8
.
1
0
.
0
r
o
u
t
e
r
o
s
p
f
1
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
6
4
0

.
0
.
0
.
6
3
a
r
e
a
0
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
1
9
2
0
.
0
.
0
.
3

a
r
e
a
0
r
o
u
t
e
r
o
s
p
f
1
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
6
4
2
5
5
.
2

5
5
.
2
5
5
.
1
9
2
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
1
9
2
2
5
5
.
2
5
5
.
2
5
5
.

2
5
2
r
o
u
t
e
r
o
s
p
f
1
n
e
t
w
o
r
k
1
9
2
.
1
6
8
.
1
0
.
0
a
r
e
a
0

39. Refer to the exhibit. Router B should not send routing updates to router A.
Which command can be used on router B to prevent RIP from sending these
updates?
p
a
s
s
i
v
e
i
n
t
e
r
f
a
c
e
f
a
s
t
e
t
h
e
r
n
e
t
0
/
0
p
a
s
s
i
v
e
i
n
t

e
r
f
a
c
e
s
e
r
i
a
l
0
/
0
/
0
a
c
c
e
s
s
c
l
a
s
s
1
2
o
u
t
a
c
c
e
s
s
c
l
a

s
s
1
2
i
n
40. A router has learned about network 192.168.168.0 through static and dynamic
routing processes. Which route will appear in the routing table for this network if
the router has learned multiple routes?
D
1
9
2
.
1
6
8
.
1
6
8
.
0
/
2
4
[
9
0
/
2
1
9
5
4
5
6
]
v
i
a
1

9
2
.
1
6
8
.
2
0
0
.
1
,
0
0
:
0
0
:
0
9
,
F
a
s
t
E
t
h
e
r
n
e
t
0
/
0
O
1
9
2
.
1
6
8
.

1
6
8
.
0
/
2
4
[
1
1
0
/
1
0
1
2
]
v
i
a
1
9
2
.
1
6
8
.
2
0
0
.
1
,
0
0
:
0
0
:
2
2
,
F

a
s
t
E
t
h
e
r
n
e
t
0
/
0
R
1
9
2
.
1
6
8
.
1
6
8
.
0
/
2
4
[
1
2
0
/
1
]
v
i
a
1
9
2

.
1
6
8
.
2
0
0
.
1
,
0
0
:
0
0
:
1
7
,
F
a
s
t
E
t
h
e
r
n
e
t
0
/
0
S
1
9
2
.
1
6
8
.
1
6

8
.
0
/
2
4
[
1
/
0
]
v
i
a
1
9
2
.
1
6
8
.
2
0
0
.
1
41. Refer to the exhibit. An administrator who is connected to the console of the
Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router
but unable to ping its Ethernet1 interface. What are two possible causes for this
problem? (Choose two.)
T
h
e
s
e
r
i
a
l
i
n
t
e

r
f
a
c
e
o
f
t
h
e
P
o
p
c
o
r
n
r
o
u
t
e
r
i
s
s
h
u
t
d
o
w
n
.
T
h
e
E
t
h
e
r

n
e
t
1
i
n
t
e
r
f
a
c
e
o
f
t
h
e
P
o
p
c
o
r
n
r
o
u
t
e
r
i
s
s
h
u
t
d
o
w
n
.

T
h
e
P
o
p
c
o
r
n
r
o
u
t
e
r
d
i
d
n
o
t
i
n
c
l
u
d
e
n
e
t
w
o
r
k
1
9
2
.
1
6

8
.
1
2
.
0
i
n
i
t
s
r
o
u
t
i
n
g
c
o
n
f
i
g
u
r
a
t
i
o
n
.
T
h
e
P
o
p
c
o
r
n

r
o
u
t
e
r
i
s
n
o
t
f
o
r
w
a
r
d
i
n
g
R
I
P
u
p
d
a
t
e
s
.
T
h
e
c
l
o
c
k
r

a
t
e
i
s
m
i
s
s
i
n
g
f
r
o
m
t
h
e
c
o
n
f
i
g
u
r
a
t
i
o
n
o
f
o
n
e
o
f
t

h
e
r
o
u
t
e
r
s
.
42. When is a WLAN a better solution than a LAN?
w
h
e
n
s
e
c
u
r
i
t
y
i
s
a
n
i
s
s
u
e
w
h
e
n
u
s
e
r
m

o
b
i
l
i
t
y
i
s
n
e
e
d
e
d
w
h
e
n
m
o
r
e
t
h
a
n
o
n
e
l
a
p
t
o
p
i
s
u

s
e
d
i
n
a
c
u
b
i
c
l
e
w
h
e
n
e
l
e
c
t
r
i
c
a
l
i
n
t
e
r
f
e
r
e
n
c
e
f
r
o

m
s
u
r
r
o
u
n
d
i
n
g
m
a
c
h
i
n
e
r
y
i
s
a
n
i
s
s
u
e
43. Which wireless standard works only in the 2.4 GHz range and provides speeds
up to 54 Mb/s?
8
0
2
.
1
1
a
8
0
2

.
1
1
b
8
0
2
.
1
1
g
8
0
2
.
1
1
i
8
0
2
.
1
1
n
44. Refer to the exhibit. An initial configuration is being performed on a new router.
The network administrator encounters the error message that is shown in the
exhibit. What is the problem?
T
h
e
e
n
a
b
l
e
s
e
c
r
e
t
c
o

m
m
a
n
d
h
a
s
n
o
t
b
e
e
n
i
s
s
u
e
d
y
e
t
.
T
h
e
e
n
a
b
l
e
p
a
s
s
w
o
r

d
c
o
m
m
a
n
d
h
a
s
n
o
t
b
e
e
n
i
s
s
u
e
d
y
e
t
.
T
h
e
p
a
s
s
w
o
r
d
c

o
m
m
a
n
d
h
a
s
n
o
t
b
e
e
n
s
e
t
f
o
r
t
h
e
c
o
n
s
o
l
e
p
o
r
t
.
T
h
e
s

e
r
v
i
c
e
p
a
s
s
w
o
r
d
e
n
c
r
y
p
t
i
o
n
c
o
m
m
a
n
d
h
a
s
n
o
t
b
e
e
n

i
s
s
u
e
d
y
e
t
.
45.
46. Which statement describes the process that occurs in Network Address
Translation (NAT) overloading?
M
u
l
t
i
p
l
e
p
r
i
v
a
t
e
I
P
a
d
d
r
e
s
s
e
s
a
r
e

m
a
p
p
e
d
t
o
o
n
e
p
u
b
l
i
c
I
P
a
d
d
r
e
s
s
.
T
h
e
n
u
m
b
e
r
o
f
u
s

a
b
l
e
a
d
d
r
e
s
s
e
s
t
h
a
t
i
s
a
s
s
i
g
n
e
d
t
o
a
c
o
m
p
a
n
y
i
s

d
i
v
i
d
e
d
i
n
t
o
s
m
a
ll
e
r
m
a
n
a
g
e
a
b
l
e
g
r
o
u
p
s
.
A
p
o
o
l
o
f
I
P

a
d
d
r
e
s
s
e
s
a
r
e
m
a
p
p
e
d
t
o
o
n
e
o
r
m
o
r
e
M
A
C
a
d
d
r
e
s
s

e
s
.
T
h
e
r
o
u
t
e
r
a
c
t
s
a
s
a
D
H
C
P
s
e
r
v
e
r
a
n
d
a
s
s
i
g
n
s
m

u
l
t
i
p
l
e
p
u
b
li
c
I
P
a
d
d
r
e
s
s
e
s
f
o
r
e
a
c
h
p
r
i
v
a
t
e
I
P
a

d
d
r
e
s
s
c
o
n
f
i
g
u
r
e
d
.
47. Which two pieces of information are required when creating a standard access
control list? (Choose two.)
d
e
s
t
i
n
a
t
i
o
n
a
d
d
r
e
s
s
a
n
d
w
il
d

c
a
r
d
m
a
s
k
s
o
u
r
c
e
a
d
d
r
e
s
s
a
n
d
w
i
l
d
c
a
r
d
m
a
s
k
s
u
b
n
e
t

m
a
s
k
a
n
d
w
il
d
c
a
r
d
m
a
s
k
a
c
c
e
s
s
li
s
t
n
u
m
b
e
r
b
e
t
w
e
e
n
1
0

0
a
n
d
1
9
9
a
c
c
e
s
s
l
i
s
t
n
u
m
b
e
r
b
e
t
w
e
e
n
1
a
n
d
9
9
48. Which two keywords can be used in an access control list to replace a wildcard
mask or address and wildcard mask pair? (Choose two.)
m
o
s

t
h
o
s
t
a
ll
a
n
y
s
o
m
e
g
t
49. What guideline is generally followed about the placement of extended access
control lists?
T
h
e
y
s
h
o
u
l
d
b
e
p
l
a
c
e
d
a
s
c
l
o
s

e
a
s
p
o
s
s
i
b
l
e
t
o
t
h
e
s
o
u
r
c
e
o
f
t
h
e
t
r
a
f
f
i
c
t
o
b
e

d
e
n
i
e
d
.
T
h
e
y
s
h
o
u
l
d
b
e
p
l
a
c
e
d
a
s
c
l
o
s
e
a
s
p
o
s
s
i

b
l
e
t
o
t
h
e
d
e
s
t
i
n
a
t
i
o
n
o
f
t
h
e
t
r
a
f
f
i
c
t
o
b
e
d
e
n
i

e
d
.
T
h
e
y
s
h
o
u
l
d
b
e
p
l
a
c
e
d
o
n
t
h
e
f
a
s
t
e
s
t
i
n
t
e
r
f
a
c

e
a
v
a
il
a
b
l
e
.
T
h
e
y
s
h
o
u
l
d
b
e
p
l
a
c
e
d
o
n
t
h
e
d
e
s
t
i
n
a

t
i
o
n
W
A
N
li
n
k
.
50. Refer to the exhibit. A named access list called chemistry_block has been
written to prevent users on the Chemistry Network and public Internet from access
to the Records Server. All other users within the school should have access to this
server. The list contains the following statements:
deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0
Which command sequence will place this list to meet these requirements?
H
e
r
a
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e

f
a
0
/
0
H
e
r
a
(
c
o
n
f
i
g
i
f
)
#
i
p
a
c
c
e
s
s
g
r
o
u
p
c
h
e
m
i
s
t

r
y
_
b
l
o
c
k
i
n
H
e
r
a
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e
s
0
/
0
/
0
H
e
r

a
(
c
o
n
f
i
g
i
f
)
#
i
p
a
c
c
e
s
s
g
r
o
u
p
c
h
e
m
i
s
t
r
y
_
b
l
o
c
k

o
u
t
A
p
o
ll
o
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e
s
0
/
0
/
0
A
p
o
ll
o
(
c
o
n
f

i
g
i
f
)
#
i
p
a
c
c
e
s
s
g
r
o
u
p
c
h
e
m
i
s
t
r
y
_
b
l
o
c
k
o
u
t
A
p

o
ll
o
(
c
o
n
f
i
g
)
#
i
n
t
e
r
f
a
c
e
s
0
/
0
/
1
A
p
o
ll
o
(
c
o
n
f
i
g
i
f
)
#

i
p
a
c
c
e
s
s
g
r
o
u
p
c
h
e
m
i
s
t
r
y
_
b
l
o
c
k
i
n
A
t
h
e
n
a
(
c
o
n

f
i
g
)
#
i
n
t
e
r
f
a
c
e
s
0
/
0
/
1
A
t
h
e
n
a
(
c
o
n
f
i
g
i
f
)
#
i
p
a
c

c
e
s
s
g
r
o
u
p
c
h
e
m
i
s
t
r
y
_
b
l
o
c
k
i
n
A
t
h
e
n
a
(
c
o
n
f
i
g
)
#

i
n
t
e
r
f
a
c
e
f
a
0
/
0
A
t
h
e
n
a
(
c
o
n
f
i
g
i
f
)
#
i
p
a
c
c
e
s
s
g
r

o
u
p
c
h
e
m
i
s
t
r
y
_
b
l
o
c
k
o
u
t
51.
52. Refer to the exhibit. R3 has the following configuration:
R3# show running-config
some output text omitted
interface serial0
bandwidth 128
ip address 192.168.11.2 255.255.255.0
encapsulation frame-relay
frame-relay map ip 192.168.11.2 30 broadcast
After the command R3# debug frame-relay packet is executed, a ping is issued
from R3 to R1 but is unsuccessful. Based on the output of the debug command
shown in the graphic and the router configuration, what is the problem?
N

o
c
l
o
c
k
r
a
t
e
h
a
s
b
e
e
n
c
o
n
f
i
g
u
r
e
d
o
n
i
n
t
e
r
f
a
c
e
s

0
.
T
h
e
r
e
i
s
a
n
i
n
c
o
r
r
e
c
t
D
L
C
I
n
u
m
b
e
r
i
n
t
h
e
m
a
p
s
t
a

t
e
m
e
n
t
.
A
n
i
n
c
o
r
r
e
c
t
I
P
a
d
d
r
e
s
s
e
x
i
s
t
s
i
n
t
h
e
m
a
p

s
t
a
t
e
m
e
n
t
.
T
h
e
e
n
c
a
p
s
u
l
a
t
i
o
n
f
r
a
m
e
r
e
l
a
y
c
o
m
m
a
n

d
i
s
m
i
s
s
i
n
g
t
h
e
b
r
o
a
d
c
a
s
t
k
e
y
w
o
r
d
.
53. What are three Frame Relay congestion management mechanisms? (Choose
three.)
B
E
C
N
D
L
C
I
D
E
F

E
C
N
L
M
I
I
n
v
e
r
s
e
A
R
P
54. Which network device is commonly used to allow multiple VPN connections
into a corporate network?
A
C
L
I
D
S
f
i
r
e
w
a
ll
c
o
n
c
e
n
t
r
a
t
o
r
55. What is the default Layer 2 encapsulation protocol for a synchronous serial
interface on a Cisco router?
P

P
P
H
D
L
C
F
r
a
m
e
R
e
l
a
y
C
H
A
P
I
E
E
E
8
0
2
.
1
Q

Potrebbero piacerti anche