Sei sulla pagina 1di 148

1. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.

) The configuration register is set to 02142. The first boot system command executed in the startup configuration file is boot system rom. The configuration register is set to 02100. The boot field is set to the hexadecimal number 2. The startup configuration file is missing or corrupt.

2. What are two recommended uses of login banners? (Choose two.) to display security warning messages to welcome any user to the router to warn people about misusing privileged EXEC mode to identify circuits and other devices connected to the router to announce a scheduled system shutdown

3.

Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting "interface is up, line protocol is up" status. RIP is then configured on Router C using the following commands: RouterC(config)# router rip

RouterC(config-router)# network 192.168.4.0 RouterC(config-router)# network 172.16.0.0 If no additional routing is configured on Router A, Router B, and Router C, what will be the result? Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A. Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16. All networks shown in the graphic will be reachable by Router A, Router B, and Router C. Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.

4. What are the primary functions of a router? (Choose two.) determine the best path for packets prevent collisions on the network LAN regulate flow control between sender and receiver provide domain name resolution forward packets to the appropriate interface

5. What are some reasons to change the configuration register setting? (Choose two.) to force the system to ignore the configuration file stored in NVRAM to monitor password changes to change the POST sequence to force the router to boot the IOS from NVRAM to force the system into ROM monitor mode

6. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 02102 and observes the following output: Erasing the nvram filesystem will remove all files! Continue? [Confirm] [OK] Erase of nvram: complete If the router unexpectedly loses power after this sequence, what will occur when power is restored? The router will enter ROM monitor mode upon completion of the power-on self test (POST). The router will load the last known valid configuration file. The router will enter Rx-boot mode. The router will prompt the user to enter setup mode or to continue without entering setup mode.

7. Why are routed protocols important to networking? (Choose two.) Routed protocols detect collisions and fragments. Routers use routed protocols to calculate the best path to a destination. Routed protocols transport data across the network. The fields and formats used within a packet are defined by routed protocols. Routed protocols are used to configure the metrics used by routing protocols.

8. The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a TFTP server to the flash of the router. Which method will accomplish this task? Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command. Use the setup utility to load the new image to flash. Copy the IOS image file from a TFTP server using the command copyfilenameip addressflash . Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.

9.

A network administrator has a console connection to the Fremantle router. Pings to Melville are successful, but pings to Cottesloe and Nedlands fail. What could be a first step in troubleshooting the problem? Use an extended ping from Fremantle to each router in the network. Use the show interfaces command from a Telnet session on Melville to check the connection to Cottesloe. Use the traceroute command to discover exactly which link in the network is down. Use the show cdp neighbors detail command from Fremantle to gather information about all Cisco routers in the network.

10.

Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy? access-list 197 permit ip 192.0.2.0 0.0.0.255 any access-list 197 permit ip 198.18.112.0 0.0.0.255 any eq www access-list 165 permit ip 192.0.2.0 0.0.0.255 any access-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq www access-list 165 permit ip any any access-list 137 permit ip 192.0.2.0 0.0.0.255 any access-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq www access-list 89 permit 192.0.2.0 0.0.0.255 any access-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www

11.

Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to traffic on the Shannon router interface Fa0/0 implementing this security? access-list 42 deny 172.19.123.0 0.0.0.255 192.0.2.0 0.0.0.255 access-list 42 permit any access-list 56 deny 172.19.123.0 0.0.0.255 access-list 56 permit any access-list 61 deny 172.19.123.0 0.0.0.0 access-list 61 permit any access-list 87 deny ip any 192.0.2.0 0.0.0.255 access-list 87 permit ip any

12. Which of the following commands will correctly configure an extended ACL? (Choose two). Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25 Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 80 Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23 Router(config)# access-list 99 permit host 10.217.32.3 Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 23

13. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.) The startup-config file will be ignored at bootup. The router will load the IOS from Flash. The router will enter ROM monitor mode upon reload. The router will enter boot ROM mode and have limited capabilities. The administrator can enter the b command to manually boot the IOS.

14.

Refer to the exhibit. Router D interface S0 on has gone down. What is the maximum time that will elapse before Router A learns that network 168.58.14.0 is down? 5 seconds 13 seconds 17 seconds 25 seconds 30 seconds

77 seconds

15. During initial router bootup the following line appears: "NVRAM invalid, possibly due to write erase." What are two possible reasons for this result? (Choose two.) The startup-config file was not saved to RAM before reboot. The IOS has been erased. The router has not been configured. The startup-config file cannot be located. The router will not enter initial configuration dialog.

16.

The Suffolk router is directly connected to the networks shown in the graphic and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by the Suffolk router. What can be a reason for this result? The ip classless command is not enabled on the Richmond router. The route was ignored if the Richmond router did not include the 172.29.198.0/24 network in its routing updates. The Richmond router is in a different autonomous system than the Suffolk router. The ip subnet-zero command was not configured on the Suffolk router.

The ip classless command is not enabled on the Suffolk router.

17. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23 access-list 199 permit ip any any Assuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.) All FTP traffic from network 178.15.0.0 will be permitted. All Telnet traffic destined for network 178.15.0.0 will be denied. Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination. Telnet will not be permitted from any hosts on network 178.15.0.0 to any destination. Telnet will not be permitted to any host on network 178.15.0.0 from any destination.

18.

What facts can be determined from the highlighted text shown in the exhibit? (Choose two.) A weak encryption was applied to all unencrypted passwords. The enable password is now more secure than the enable secret password. An MD5 hashing algorithm was used on all encrypted passwords.

Any configured user EXEC mode or Telnet passwords will be encrypted in this configuration. The service password-encryption command was used to encrypt all passwords on the router including enable secret.

19. What are three features of CDP? (Choose three.) provides information on directly connected devices that have CDP enabled tests Layer 2 connectivity enabled by default on each interface provides a layer of security used for debugging Layer 4 connectivity issues

20. What information can be learned during the initial router bootup? (Choose two.) the configuration register value the number and types of interfaces installed the router model and the amount of memory that is available the amount of memory required to load the IOS and configuration the number of interfaces with connected cables

21.

What can be concluded from the output shown in the exhibit? (Choose three.) This is a standard IP access list. This is an extended IP access list. The keyword host is implied in the command line access-list 99 deny 10.213.177.76. The wildcard mask must be configured for this access list to function properly. Host 10.213.177.100 will be allowed access to the Serial0/1 interface.

22. Which statements are true regarding setup mode? (Choose three.) Press Ctrl-z to terminate setup mode. Enter a question mark (?) for help at any point. Press Spacebar to accept the default settings. Use setup mode to enter complex protocol features. Press Enter to accept the default settings. Press Ctrl-c to abort configuration dialog.

23.

Refer to the graphic. Which series of commands will create static routes that will allow Router A and Router B to deliver packets destined for LAN A and LAN B, and direct all other traffic to the Internet? RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2 RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0 RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2 RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2 RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2 RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 172.20.20.4 255.255.255.252 s0/0 RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2 RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0

24.

Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.) Ethernet switch DTE modem hub DCE device CSU/DSU

25.

What will occur when the following ACL is applied inbound to both FastEthernet interfaces of Router A in the graphic? access-list 125 permit tcp 192.168.2.0 0.0.0.255 10.90.3.0 0.0.0.255 eq 23 access-list 125 permit tcp 10.90.3.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 23 access-list 125 permit tcp 192.168.2.0 0.0.0.255 any eq www Workstations A and B will be able to Telnet to each other. Workstation A will be allowed to access Web servers on the Internet, while Workstation B will be denied Internet Web access. Workstations A and B will be able to Telnet to each other. All other traffic will be denied.

The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces. The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.

26. Based on this partial output of the show ip route command, which routing protocol is configured on the router? R 172.16.3.0/24 [120/3] via 172.16.2.2, 00:00:27, Serial0/0 RIP EIGRP OSPF IGP BGP

27.

Which of the following are correct statements verified by the router output shown in the graphic? (Choose two.) Layer 3 connectivity exists between BigCity and the devices in the Device ID column. Layer 2 connectivity exists between BigCity and the devices in the Device ID column. All devices shown in the Device ID column use the TCP/IP protocol suite.

All devices shown in the Device ID column can be pinged from BigCity. All devices listed in the Device ID column are directly connected to BigCity.

28. A network administrator must configure a FastEthernet interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements? StPetersburg(config)# banner San Jose T1 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 netmask 255.255.255.252 StPetersburg(config-if)# description San Jose T1 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# banner remote site San Jose T1 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# description San Jose T1

29. What are the features of a serial interface on a router? (Choose two.) enabled by default assigned a unique MAC address must be configured as a DCE in lab and production environments must be configured with the default clock rate of 56000 may be administratively enabled by using the no shutdown command must be configured with a valid IP address and subnet mask in order to forward packets

30. Assuming the following ACL is correctly applied to a router interface, what can be concluded about this set of commands? (Choose two.)

Router(config)# access-list 165 deny tcp 192.28.115.0 0.0.0.255 172.20.0.0 0.0.255.255 eq 23 Router(config)# access-list 165 permit ip any any This is a standard IP access list that denies network 192.28.115.0 Telnet access to the 172.20.0.0 network. All Telnet traffic destined for 172.20.0.0 from any network will be denied access. Network 192.28.115.0 is denied Telnet access to the 172.20.0.0 network. Network 172.20.0.0 is denied Telnet access to the 192.28.115.0 network. All FTP and HTTP traffic destined for 172.20.0.0 will be permitted access.

31. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.) Use a crossover cable to connect the terminal serial port to the router console port. Use a rollover cable to connect the terminal NIC to the router console port. Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console. Use a transceiver to connect a straight-through cable to the router console port. Use a straight-through cable to connect the router console port to the terminal NIC. Use a rollover cable to connect from a terminal serial port to the router console port.

32. What critical information about the status of the router can be found in the outputs of both the show interfaces and show protocols commands? (Choose two.) the Layer 3 address of each configured interface the routing protocol configured to forward updates out of each interface the operational status of each interface traffic statistics for each interface whether the interface is configured as a DTE or DCE

33.

The following access list has been created to prevent traffic from the 192.0.2.63 host on the Sales LAN from accessing servers and hosts on the Payroll LAN. access-list 26 deny host 192.0.2.63 access-list 26 permit any Refer to the exhibit. Which group of commands will properly place the access list so that only the host on the Sales LAN is denied access to the 172.29.7.0 network but all other traffic is permitted? Payroll(config)# interface fa0/0 Payroll(config-if)# ip access-group 26 out Payroll(config)# interface fa0/1 Payroll(config-if)# ip access-group 26 out Sales(config)# interface fa0/1 Sales(config-if)# ip access-group 26 in Sales(config)# interface fa0/0 Sales(config-if)# ip access-group 26 out

34.

Refer to the exhibit. Assuming default metrics are used and the network is fully converged, which path will RIP use to send a packet from Router A to Router F? A, D, E, F A, B, D, E, F A, C, D, E, G, F A, B, D, E, G, F

35.

Refer to the graphic. Communication is needed between the LAN connected to the fa0/0 interface of the Kansas router and the fa0/0 interface of the Maine router. All hosts on those LANs also need connectivity to the Internet. Which commands will allow this communication? (Choose three). Kansas(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.2

Kansas(config)# ip route 192.168.6.0 255.255.255.0 s0/1 Kansas(config)# ip route 0.0.0.0 0.0.0.0 s0/1 Maine(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.1 Maine(config)# ip route 0.0.0.0 0.0.0.0 s0/1 Maine(config)# ip route 172.16.32.0 255.255.255.0 172.18.64.2

36. Why are interface descriptions used in router configurations? (Choose three). to enable support personnel to easily identify networks and customers that may be affected by a possible interface issue to provide comments on the interface without affecting the router functionality to display access warning messages before users enter the interface configuration mode to eliminate the need to use IP addresses when using the ping and telnet commands to identify the purpose and location of the interface

37.

A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?

A(config)# router rip A(config-router)# passive-interface S0/0 B(config)# router rip B(config-router)# network 192.168.25.48 B(config-router)# network 192.168.25.64 A(config)# router rip A(config-router)# no network 192.168.25.32 B(config)# router rip B(config-router)# passive-interface S0/0 A(config)# no router rip

38. What could a Cisco support technician learn from the IOS filename c2600-d-mz.121-3? (Choose three.) the format of the file the RAM memory requirements of the file the version number of the file the size of the file the device platform of the file

39.

While planning an IOS upgrade, the administrator issues the show version command. Based on the output in the graphic, what is the current IOS boot location? RAM NVRAM Flash ROM

40. A new technician must add boot system commands to one of the department routers. Which available commands will the router return as output when the command shown below is entered? (Choose two.) Router(config)# boot system ? RAM NVRAM IOS IP Address TFTP FLASH

41. From the running-config, the following configuration entries are displayed: Router(config)# line vty 0 2 Router(config-line)# password g8k33pr Router(config-line)# login What can be interpreted from the exhibited configuration? (Choose two.) Three Telnet lines are available for remote access. Two Telnet lines are available for remote access. Future configuration of the remaining Telnet lines will require the password to be set to g8k33pr. To login to the remote device, g8k33pr will be used as the Telnet and secret password. Remote access to this local router will require a Telnet password of g8k33pr.

42. Which router component stores the information that is displayed by the show runningconfig command? flash NVRAM RAM ROM

43. What are two characteristics of the support for Telnet within Cisco IOS software? (Choose two.) Up to five separate Telnet lines are supported by default in standard edition IOS files. For security purposes, Telnet sessions are required to be established from the privileged mode. A router can host simultaneous Telnet sessions. Once established, a Telnet session can remain operational regardless of network status. Telnet tests wireless connectivity and does not require a physical connection between devices to gain remote access.

44. Which router components and operations are correctly described? (Choose two.) RAM stores the ARP cache NVRAM store the operating system ROM stores the backup IOS POST verifies the validity of the running-config Flash executes diagnostics at bootup DRAM loads the bootstrap

45.

Given the output shown in the exhibit, in what order and location will the router search for the IOS if no boot system commands are found in the startup-config file? ROM, Flash, TFTP server Flash, NVRAM, RAM ROM, TFTP server, Flash RAM, Flash, NVRAM Flash, TFTP server, ROM

46. What can a network administrator do to recover from a lost router password? perform a reload or reset telnet from another router and issue the show running-config command to view the password boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes boot the router to bootROM mode and enter the b command to load the IOS manually

47.

Neither router in the exhibit has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.) Tottenham# telnet Oxford Tottenham> telnet 198.18.139.1 Oxford# connect 198.18.139.0 Oxford> connect Tottenham Oxford# telnet Tottenham Oxford# 198.18.139.2

48. If a PC does not have network connectivity to a router, which router port can be used to establish communication?

console Ethernet serial VTY Which of the following are primary functions of a router? (Choose two.) **packet switching microsegmentation domain name resolution path selection flow control

1. If a router cannot find a valid configuration file during the startup sequence, what will occur? The startup sequence will reset. The router will prompt the user for a response to enter setup mode. The startup sequence will halt until a valid configuration file is acquired. The router will generate a default configuration file based on the last valid configuration. The router will monitor local traffic to determine routing protocol configuration requirements.

2.

Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem? The destination networks do not exist. The IP addresses on the router interfaces must be configured as network addresses and not host addresses. The interfaces must be enabled with the no shutdown command. Each interface must be configured with the clock rate command.

3.

Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.) This router only has two interfaces. The router interfaces are not operational yet. This router is configured to forward packets to remote networks. The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command. An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface.

4.

Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.) The router will change the source and destination IP address in the packet before forwarding the frame. The router will change the frame type to one supported by the WAN link before forwarding the frame. The router will use the destination MAC address to determine which interface to forward the packet. The router will look up the MAC address of the S0/0/0 interface in the ARP table and add it to the frame before forwarding. The frame was received on the Fa0/0 interface of the router and will be switched to the S0/0/0 interface. The frame was received on the S0/0/0 interface of the router and will be switched to the Fa0/0 interface.

5. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) VTY interface console interface Ethernet interface

secret EXEC mode privileged EXEC mode router configuration mode 6. Which two statements correctly describe the components of a router? (Choose two.) RAM permanently stores the configuration file used during the boot sequence. ROM contains diagnostics executed on hardware modules. NVRAM stores a backup copy of the IOS used during the boot sequence. Flash memory does not lose its contents during a reboot. ROM contains the most current and most complete version of the IOS. Flash contains boot system commands to identify the location of the IOS

7.

Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem? The subnet mask of host 2 is incorrect. Host 1 and host 2 are on different networks. The switch needs an IP address that is not configured.

The router LAN interface and host 1 are on different networks. The IP address of host 1 is on a different network than is the LAN interface of the router.

8. Which are functions of a router? (Choose three.) packet switching extension of network segments segmentation of broadcast domains selection of best path based on logical addressing election of best path based on physical addressing

9.

Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.) If RouterC receives a packet that is destined for 10.5.1.1, it will be forwarded out interface Fa0/0. If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.

If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1. If RouterB receives a packet that is destined for 172.20.255.1, it will be forwarded out interface S0/0/0. If RouterC receives a packet that is destined for 192.16.5.101, it will be forwarded out interface S0/0/1.

10.

The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) Sydney(config-if)# ip address 201.100.53.2 255.255.255.0 Sydney(config-if)# no shutdown Sydney(config-if)# ip address 201.100.53.1 255.255.255.224 Sydney(config-if)# clock rate 56000 Sydney(config-if)# ip host Melbourne 201.100.53.2

11.

Refer to the exhibit. What can be concluded from the output of the running-configuration of a router? The passwords are encrypted. The current configuration was saved to NVRAM. The configuration that is shown will be the one used on the next reboot. The commands that are displayed determine the current operation of the router.

12.

Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.) source IP address: 192.168.10.129 source IP address: BBBB.3333.5677 destination IP address: 192.168.10.33 destination IP address: 192.168.10.134 destination MAC address: 9999.DADC.1234

13. What is the outcome of entering these commands? R1(config)# line vty 0 4 R1(config-line)# password check123 R1(config-line)# login ensures that a password is entered before entering user EXEC mode sets the password to be used for connecting to this router via Telnet requires check123 to be entered before the configuration can be saved creates a local user account for logging in to a router or switch

14. Which of the following is the correct flow of routines for a router startup? load bootstrap, load IOS, apply configuration

load bootstrap, apply configuration, load IOS load IOS, load bootstrap, apply configuration, check hardware check hardware, apply configuration, load bootstrap, load IOS

15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.) decapsulates the Layer 3 packet by stripping off the Layer 2 frame header uses the destination MAC Address in the IP Header to look up the next-hop address in the routing table leaves the Layer 2 frame header intact when decapsulating the Layer 3 packet uses the destination IP Address in the IP header to look up the next-hop address in the routing table encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface encapsulates the Layer 3 packet into a special Layer 1 frame and forwards it to the exit interface

16. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use? straight-through rollover cross-over serial

17. Which two statements describe characteristics of load balancing? (Choose two.) Load balancing occurs when a router sends the same packet to different destination networks. Load balancing occurs when a router sends the same packet to different destination networks.

Load balancing allows a router to forward packets over multiple paths to the same destination network. Unequal cost load balancing is supported by EIGRP. If multiple paths with different metrics to a destinations exist, the router cannot support load balancing.

18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.) the last restart method the command buffer contents the amount of NVRAM and FLASH used the configuration register settings the location from where the IOS loaded

19.

Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.) 1

2 3 4 5 6

20. From what location can a router load the Cisco IOS during the boot process? (Choose two.) RAM TFTP server NVRAM setup routine Flash memory terminal

21. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM? Router1# copy running-config flash Router1(config)# copy running-config flash Router1# copy running-config startup-config Router1(config)# copy running-config startup-config Router1# copy startup-config running-config Router1(config)# copy startup-config running-config

22. What is the default sequence for loading the configuration file?

NVRAM, FLASH, ROM FLASH, TFTP,CONSOLE NVRAM, TFTP, CONSOLE FLASH, TFTP, ROM 23. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface? only the Layer 2 source address only the Layer 2 destination address only the Layer 3 source address only the Layer 3 destination address the Layer 2 source and destination address the Layer 3 source and destination address 1. Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) Administrative distance refers to the trustworthiness of a particular route. A router first installs routes with higher administrative distances. The value of the administarive distance can not be altered by the network administrator. Routes with the smallest metric to a destination indicate the best path. The metric is always determined based on hop count. The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.

2.

Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2? R1 will install a RIP route using network A in its routing table because the administrative distance of RIP is higher than EIGRP. R1 will install a RIP route using network A in its routing table because the path cost from RIP is lower than EIGRP. R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP. R1 will install an EIGRP route using network B in its routing table because the path cost from EIGRP is lower than RIP. R1 will install an EIGRP route and a RIP route in its routing table and load balance between them.

3. Which two statements are true regarding classless routing protocols? (Choose two.) sends subnet mask information in routing updates sends complete routing table update to all neighbors is supported by RIP version 1 allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology reduces the amount of address space available in an organization

4. Which command would the network administrator issue to determine if load balancing is in effect on a router? show ip protocols show ip route show ip interface brief show ip interface

5. Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.) the network requires a special hierarchical design fast convergence of the network is crucial the network is using a hub and spoke topology the network is using a flat design there are more than 15 hops between the most distant routers

6. What is the purpose of a routing protocol? It is used to build and maintain ARP tables. It provides a method for segmenting and reassembling data packets. It allows an administrator to devise an addressing scheme for the network. It allows a router to share information about known networks with other routers. It provides a procedure for encoding and decoding data into bits for packet forwarding.

7. Which of the following best describes the operation of distance vector routing protocols? They use hop count as their only metric. They only send out updates when a new network is added. They send their routing tables to directly connected neighbors. They flood the entire network with routing updates.

8. When multiple routing protocols have a route to the same destination network, what determines which route is installed in the routing table? best metric lowest hop count greatest available bandwidth lowest administrative distance lowest cost

9. Why is fast convergence desirable in networks that use dynamic routing protocols?

Routers will not allow packets to be forwarded until the network has converged. Hosts are unable to access their gateway until the network has converged. Routers may make incorrect forwarding decisions until the network has converged. Routers will not allow configuration changes to be made until the network has converged.

10. Which of the following conditions must be met in order for a network to have converged? The routers in the network are operating with dynamic routing protocols. The routers in the network are operating with compatible versions of IOS. The routers in the network are operating with the same routing tables. The routers in the network are operating with consistent routing knowledge.

11. Which two statements are true regarding metrics? (Choose two.) RIP uses bandwidth as a metric. OSPF uses delay as a metric. EIGRP uses bandwidth as a metric. OSPF uses cost based on bandwidth as a metric. RIP uses delay as a metric. EIGRP uses hop count only as a metric.

12. Which two statements are true regarding the advantages of the use of static routes? (Choose two). increased security reduced effort in configuring routes the administrator maintains control over routing easier to implement in a growing network reduces the chance of routing errors increased router resource usage

13. The following line of code is displayed in a routing table:


R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0

What can be concluded from this output?

A packet destined for host 192.168.252.2 will be forwarded out the interface connected to network 209.165.201.0/24. The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network. This route was manually configured using the ip route command. 192.168.252.2 is an interface on the router that produced this output.

14. What will be the result of the following commands?


ORL(config)# interface fastethernet 0/0 ORL(config-if)# ip address 172.16.3.1 255.255.255.0 ORL(config-if)# no shutdown

The 172.16.3.0 network will be routed by any dynamic routing protocol automatically. A routing table entry is made to the 172.16.3.0 network with a code of "C". A static route is required to route traffic to the 172.16.3.0 network. The commands will be saved to the startup-configuration automatically.

15. An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route? The administrative distance of this route is 1. 192.168.1.2 is the address of an interface on this router. This route will display as a directly connected network in the routing table. Packets with a destination IP address of 192.168.1.2 will be forwarded to the 10.0.0.0/24 network first.

16.

Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1? Router1 will have 6 directly connected networks. The administrative distance of the route to network 172.16.0.0 will be 90. The metric for routes to 172.16.0.0 will be 1. The interface that is used to forward packets to 172.16.0.0 will always be the S0/1 interface.

17. The following line of code is present in the routing table:


O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1

What does the number 129 indicate in this output? The cost for this link has a value of 129. The clock rate on this serial interface is set to 129,000. The next-hop router is 129 hops away from this router. This route has been updated 129 times in this routing table.

18. A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process? Distance vector routing protocols, such as RIP, converge more quickly than do link-state routing protocols. EIGRP can be used on all of the routers in the company. OSPF can be used between the routers. An exterior routing protocol, such as BGP, is recommended for growing companies.

19.

Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24? 3 4 56 624 724

20. A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network? The router will install the first route it learned into the routing table. The router will install both routes in the routing table and load balance between the two. The router will put the first route in the routing table, and denote the second route as a backup route. The router will pick the path with the higher bandwidth and will place it in the routing table. 1. Which statements are true regarding VTY passwords? (Choose two.) VTY passwords must be encrypted. All VTY lines do not need to use the same password. A VTY password is required to establish telnet sessions. The VTY password is set with the command line console 0.

The VTY password must be identical with the enable secret password.

2.

Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A? It will be forwarded through interface S1. It will be forwarded to the default route. It will be directed toward the Internet. It will be discarded. 3.

Which command will produce the output shown in the graphic?

show cdp show cdp neighbors show cdp neighbors detail show cdp detail

4.

Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.) Router B received a configuration change. Router A sent a message requesting an update. Router C came online after Router B sent the RIP update. Router B received an error message indicating the last update was not received.

5. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS? 4 5 8 10

6. Which of the following WAN connection services typically use synchronous communications? (Choose two.) circuit-switched leased line packet-switched Ethernet analog modem services

7. Which of the following will add a TFTP server as a fallback source for a router to load an IOS image? Router# boot system tftp 163.150.9.31 c2500-d-l.120-9 Router# copy run start Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31 Router# copy run start Router# config t Router(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31 Router(config)# exit Router# copy run start Router# config t Router(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.bin Router(config)# exit Router# copy run start

8. What types of messages are sent periodically by devices configured for CDP? probes beacons signals

advertisements routing updates unicast

9. An administrator has made routing protocol changes to a routers configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear? There was a POST failure. The incorrect IOS loaded. There was an error in the startup configuration file. The configuration register was set to ignore NVRAM.

10. Which command is used to redirect debug information to a device that is connected though a Telnet session? Router# monitor Router# terminal redirect vty 0 Router# terminal monitor Router# monitor output vty 0

11. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.) There is a mismatch in the encapsulation type on both ends of the link. A Layer 1 issue exists. An interface problem exists.

The clockrate was not set during configuration. There is no usable media for the protocol. Keepalive messages are not being sent.

12.

Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.) by forwarding packets over paths of equal cost by forwarding packets according to hop count and speed of the link by determining which interface has the least traffic and sending to it first by first determining the speed of the links and then cycling packets through the fastest links first by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time

13. When would the ROM monitor mode be used? (Choose two.) maintaining routing configuration settings modifying the IOS image stored in Flash running a limited IOS feature set

performing the bootstrap process

14. Which two statements are true about route metrics? (Choose two.) The more factors that make up a metric, the greater the flexibility to tailor network operations. The larger the metric number, the better the path. Routing protocols use metrics to send routing updates to directly connected neighbors. Bandwidth and delay are static metrics used by RIP v1. Ticks, delay, and cost are metrics used by routing protocols.

15.

Which of the following are valid static IP routes? (Choose three.) RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1 RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1 RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2 RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1

16. Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The users PC has successfully booted but can not see the network. What should be checked first? the PC power cord the file server the PC network interface card LEDs the LAN switch in the wiring closet the configuration of the router interface attached to the LAN

17. What can be determined from the partial output of the show ip route command displayed below? (Choose two.) R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0 C 192.168.10.0/24 is directly connected, Serial0/0 The next update will be in 76 seconds. The next update will be in 16 seconds. The administrative distance is 120 and the metric is 1. The metric is 120 and the administrative distance is 1. 200.200.200.0 is configured on Serial0/0. 192.168.10.2 is configured on Serial0/0.

18. Why is it useful to have an interface description? A user can telnet to the router using the interface description. The interface description is a shortcut way to edit the running-config. The interface description helps identify distant network connections. The interface will remain inactive until an interface description is applied.

19.

Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.) Updates start broadcasting every 30 seconds. Updates start broadcasting every 90 seconds. Link-state advertisements are flooded. Link-state advertisements are sent only to neighboring routers. All routers note the change and adjust routes. All routers ignore the change until the route becomes active again.

20.

The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.) Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1 Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0 Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2 Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1 Utah(config)# ip route 172.31.3.0 255.255.255.0 s1 Utah(config)# ip route 0.0.0.0 0.0.0.0 s0

21. Which statement about datagram life is true? Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source. The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed. Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source. The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.

22.

The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network. access-list 22 deny host 204.204.7.122 access-list 22 permit any Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network? RouterA(config)# interface s0/0 RouterA(config-if)# ip access-group 22 in RouterA(config)# interface s0/0 RouterA(config-if)# ip access-group 22 out RouterA(config)# interface fa0/0 RouterA(config-if)# ip access-group 22 in RouterB(config)# interface fa0/0 RouterB(config-if)# ip access-group 22 in RouterB(config)# interface s0/0 RouterB(config-if)# ip access-group 22 in RouterB(config)# interface fa0/0 RouterB(config-if)# ip access-group 22 out

23. A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.) The ip host table on the router is not configured. The command telnet Boston was issued from the wrong router prompt. The routing table is missing. Domain name services are not available.

24. Which of the following are functions of a router? (Choose three.) packet switching extension of network segments segmentation of local area networks selection of best path based on a logical addressing selection of best path based on a physical addressing

25.

The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded? The router will load c2500-js-l.112-26d. The router will load c2500-d-l.120-9. The router will load the IOS from ROM. The router will boot into ROM monitor mode.

26.

A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause? The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one. The wrong port was configured for the ACL so Telnet traffic was still allowed. The access list has not been assigned to an interface. The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.

27.

Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used? F, G, E, D, B, A F, E, D, C, A F, E, D, A F, E, D, B, A

28. Which of the following is the correct flow of routines for a router startup? load bootstrap, load IOS, apply configuration load bootstrap, apply configuration, load IOS load IOS, load bootstrap, apply configuration, check hardware check hardware, apply configuration, load bootstrap, load IOS

29. In the configuration register value 02104, which value represents the boot field setting? x 2 1 0 4

30. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet? The packets will be placed in a buffer and forwarded when the ACL is removed. The packets will be sent to the source with an error notification message. The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited. The implicit deny any statement placed at the end of the list will cause the packets to be dropped.

31. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)

telnetting into the router initiating a debug session configuring a router for the first time using the Aux port to check the current configuration using the console port to check the current configuration

32.

The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0? no update timers holdown-timer 96 poison reverse E0 passive-interface E0 no triggered updates

33. When must a router serial interface be configured with the clock rate command? when the interface is functioning as a DTE device when the interface timers have been cleared

when the connected DTE device is shut down when the interface is functioning as a DCE device

34. What are the major characteristics of a wide area network? (Choose three.) connect devices separated by wide geographical areas includes technologies of FDDI and Ethernet uses serial connections to access bandwidth common carriers are needed for connections type of connection between a router and a switch

35. If the config-register on a router is set to 02102, where is the first place the router will look for boot system commands? RAM ROM Flash NVRAM

36. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.) It can be used to verify the operation of application layer software between the source and destination. Telnet can use the ICMP protocol to verify a hardware connection and network layer address. It is the most complete testing mechanism available. Remote networks may be accessed via a Telnet session for troubleshooting.

Time to Live values are used by Telnet to identify a failure of device between source and destination.

37.

The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.) The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks. All of the routers will have direct knowledge of the exact topology of the entire network. The Key West router will forward routing table information to the Miami and Palm Beach routers. The Miami router will learn about network 192.168.1.0 from the Key West router. If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.

38. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.) functions as a link-state routing protocol discards packets when the hop count is greater than 15 calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL) created as a proprietary routing protocol

floods updates as topology changes occur broadcasts routing updates every 90 seconds or as triggered by topology changes

39. The following line was displayed in the output of the show ip route command. R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0 What is the value of the routing metric? 3 12 20 30 120

40.

Refer to the output from the show ip route command. What can be concluded from the output of this router command? A preferred route to the destination has not been set. There are two equal cost paths to network 1.0.0.0. Both interfaces are being used equally to route traffic. A variance must be set to load-balance across multiple paths.

41. Which of the following are true statements about creating and applying access lists? (Choose three.) Access list entries should filter in the order from general to specific. One access list per port per protocol per direction is permitted. Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination. There is an implicit deny at the end of all access lists. Statements are processed sequentially from top to bottom until a match is found. The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.

42. Which of the following are true regarding the setup configuration mode? (Choose three.) To abort the setup mode, use the CTRL+SHIFT+6 keys. To abort the setup mode, use the CTRL+C keys. Setup mode allows a complete configuration of the router. To enter setup mode, use the privileged mode setup command. A router that does not find a valid IOS during the boot process will start the system configuration dialog. A router that does not find a valid configuration file during the boot process will start the system configuration dialog.

43. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.) TCP/IP must be installed and properly configured on each device. Multiple subnets must be configured on the router to ensure accurate delivery.

A default gateway must be configured for datagrams to travel outside of the LAN. The hosts must be directly connected to a switch to travel outside of the LAN. To ensure accurate delivery, a router must be configured and accessible by hosts on the network.

44.

Given the above topology, which of the following statements are true? (Choose two.) If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1. If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0. If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1. If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0. If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.

45. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name. Router# ip host Fontana 200.100.50.5 Router(config)# ip host Fontana 200.100.50.5 Router(config-if)# ip host Fontana 200.100.50.5 Router(config)# ip host Fontana 200.100.50.5/24

1. A router that has two Ethernet interfaces and one serial interface is configured to route both IP and IPX. What is the maximum number of IP ACLs that can be configured to filter packets on this router? 1 2 3 6 12

2.

An access list has been created that will deny the host 204.204.7.89 access to an ftp server located at 196.6.13.254. access-list 111 deny tcp 204.204.7.89 0.0.0.0 196.6.13.254 0.0.0.0 eq 21 access-list 111 permit tcp any any Which of the following groups of commands will place this ACL in the proper location? Router2(config)# interface s0/0 Router2(config-if)# ip access-group 111 in Router2(config)# interface fa0/0 Router2(config-if)# ip access-group 111 out Router2(config)# interface fa0/0 Router2(config-if)# ip access-group 111 in

Router3(config)# interface fa0/0 Router3(config-if)# ip access-group 111 in Router3(config)# interface s0/1 Router3(config-if)# ip access-group 111 out Router3(config)# interface fa0/0 Router3(config-if)# ip access-group 111 out

3.

Assuming the ACL in the graphic is correctly applied to an interface, what effect will this ACL have on network traffic? Host 192.168.15.4 will be denied ftp access to any destination, but will be permitted all other access. All ftp traffic to host 192.168.15.4 will be denied. All traffic from that interface will be denied. No traffic will be denied because a "permit" statement does not exist in this ACL.

4. Choose the command that will correctly configure a standard ACL. Router# access-list 10 permit any Router# access-list 101 permit any Router(config)# access-list 10 permit any Router(config)# access-list 101 permit any Router(config)# access-list 10 permit any any

5. The router IOS tests each condition statement in an ACL in sequence. Once a match is made, which of the following occurs? (Choose two.)

The entire ACL must be deleted and recreated. The accept or reject action is performed. The packet is forwarded to the next hop. The remaining ACL statements are not checked. The router goes through the list again to verify that a match has been made.

6.

Select the commands that will apply the ACL in the diagram to filter traffic going to the 192.168.2.0 network. Router1# configure terminal Router1(config)# access-list 10 in E0 Router1(config)# interface ethernet 0 Router1(config-if)# access-list 10 in Router2(config)# interface s1 Router2(config-if)# ip access-group 10 out Router2(config)# interface ethernet 0 Router2(config-if)# ip access-group 10 out Router1(config)# interface ethernet 0 Router1(config-if)# ip access-group 10 out Router2# configure terminal Router2(config)# access-group 10 out

7. The following commands were entered on a router: Router(config)# access-list 2 deny 172.16.5.24 Router(config)# access-list 2 permit any What can be concluded about this set of commands? The access list statements are misconfigured. All nodes on 172.16.0.0 will be denied access when these statements are applied. The default wildcard mask, 0.0.0.0 is assumed. The default wildcard mask 255.255.255.255 is assumed.

8. Choose the commands that will correctly configure a standard ACL. (Choose two.) Router(config)# access-list 97 permit host 192.5.5.1 Router(config)# access-list 32 permit 210.93.105.3 0.0.0.0 Router(config)# access-list 148 permit 201.100.11.2 0.0.0.0 Router(config)# access-list 107 permit host 192.5.5.1 213.45.27.0 0.0.0.255 eq 23 Router(config)# access-list 10 permit tcp 192.5.5.1 0.0.0.255 201.100.11.0 0.0.0.255 eq 80

9. Which of the following matches an ACL identification number with the correct protocol?(Choose three.) 0 standard IP 99 standard IP 100 extended IP 210 extended IP 678 extended IPX 888 standard IPX

10. Which of the following parameters can ACLs use to filter traffic? (Choose three.) packet size protocol suite source address destination address source router interface destination router interface

11. Which of the following are reasons to use ACLs? (Choose three.) to provide a basic level of security for network access to speed up network performance by filtering priority packets to preserve bandwidth by providing a mechanism for traffic flow control to decide which packets are forwarded or blocked at the router console port to screen certain hosts to either allow or deny access to part of a network to allow all packets passing through the router access to all parts of the network

12.

Create a standard ACL that will deny traffic from 192.5.5.25 to the 210.93.105.0 network but will allow traffic from all other hosts. (Choose two.) Router(config)# access-list 22 deny 192.5.5.25 0.0.0.0 Router(config)# access-list 22 deny host 192.5.5.25 0.0.0.0 Router(config)# access-list 22 permit any any Router(config)# access-list 22 deny 192.5.5.25 0.0.0.0 Router(config)# access-list 22 permit any Router(config)# access-list 22 deny host 192.5.5.25 Router(config)# access-list 22 permit any Router(config)# access-list 22 deny 192.5.5.0 0.0.0.255 Router(config)# access-list 22 permit any

13. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet? The packets will be placed in a buffer and forwarded when the ACL is removed. The packets will be sent to the source with an error notification message. The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited. The implicit deny any statement placed at the end of the list will cause the packets to be dropped.

14.

Create an access list that will prevent only the host 192.5.5.148 from accessing a web site located at 210.93.105.50. access-list 10 deny tcp host 192.5.5.148 host 210.93.105.50 eq 80 access-list 10 permit tcp any any access-list 10 deny tcp 192.5.5.148 0.0.0.0 210.93.105.50 0.0.0.0 eq 23 access-list 10 permit tcp any any access-list 100 deny tcp 192.5.5.148 0.0.0.0 210.93.105.50 0.0.0.0 eq 80 access-list 100 permit tcp any any access-list 100 deny tcp 192.5.5.148 0.0.0.255 210.93.105.50 0.0.0.255 eq 80 access-list 100 permit tcp any any access-list 100 deny tcp host 192.5.5.148 255.255.255.255 210.93.105.50 255.255.255.255 eq 80 access-list 100 permit tcp any any

15. Select the statements that describe ACL processing of packets. (Choose three.) An implicit deny any rejects any packet that does not match any ACL statement. A packet can either be rejected or forwarded as directed by the statement that is matched. A packet that has been denied by one statement can be permitted by a subsequent statement. A packet that does not match the conditions of any ACL statements will be forwarded by default.

Each statement is checked only until a match is detected or until the end of the ACL statement list. Each packet is compared to the conditions of every statement in the ACL before a forwarding decision is made.

16. Which statements are true regarding the meaning of the access control list wildcard mask 0.0.0.7? (Choose two.) The first 29 bits of a supplied IP address will be ignored. The last three bits of a supplied IP address will be ignored. The first 32 bits of a supplied IP address will be matched. The first 29 bits of a supplied IP address will be matched. The last four bits of a supplied IP address will be matched.

17. Select the correct statements about extended ACLs. (Choose two) Extended ACLs use a number range from 1-99. Extended ACLs end with an implicit permit statement. Extended ACLs evaluate the source and destination addresses. Port numbers can be used to add greater definition to an ACL. Multiple ACLs can be placed on the same interface as long as they are in the same direction.

18. Which statement is true regarding wildcard masks? The wildcard mask and subnet mask perform the same function. The wildcard mask is always the inverse of the subnet mask. A "0" in the wildcard mask identifies IP address bits that must be checked. A "1" in the wildcard mask identifies a network or subnet bit.

19.

Assuming the ACL in the graphic is correctly applied to an interface, what effect will the ACL have on network traffic? All traffic to network 172.16.0.0 will be denied. All TCP traffic will be permitted to and from network 172.16.0.0. All telnet traffic from the 172.16.0.0 network to any destination will be denied. All port 23 traffic to the 172.16.0.0 network will be denied. All traffic from the 172.16.0.0 network will be denied to any other network. 1. Which of the following describe how TCP adds reliability to communication? (Choose three.) Hosts using TCP set up virtual circuits at the beginning of the transmission using the three-way handshake. Hosts using TCP set the error-checking frequency at the beginning of the transmission and maintain this frequency for the duration of the data transfer. When a sending host does not receive an acknowledgment within a timed interval it retransmits data. The receiving host acknowledges that it has received the expected number of segments and requests additional data. The receiving host acknowledges any incorrectly received data and requests retransmission of damaged or missing bytes. The sending host transmits each segment twice to ensure that data is not lost.

2. A computer programmer is developing software that requires a reliable stream of data. Which protocol can be used in the software design to eliminate the need for building error detection and recovery into the application program? TCP

IP ICMP UDP HTTP

3. Why is TCP considered a connection-oriented protocol? It establishes a virtual connection between hosts using a two-way handshake. It uses IP to guarantee delivery of packets between hosts. It requires hosts to go through a synchronization process prior to data transmission. It creates a connection that depends on application layer protocols for error detection.

4. At which point in the transmission process are segments numbered? when received when reassembling before transmission while negotiating window size

5. What is dynamically assigned by the source host when forwarding data? destination IP address destination port number default gateway address source IP address source port number

6. How are originating source port numbers assigned during the data encapsulation process? assigned manually by the user when starting the application assigned dynamically by the source host assigned by the routing protocol during the lookup process assigned by the destination host during session negotiation

7. Which of the following would an administrator do to defend against a denial of service SYN flooding attack? (Choose two.) Hide the source of incoming IP addresses. Decrease the connection timeout period. Synchronize all host communication. Increase the connection queue size. Flood the network with false SYN requests.

8. When a host receives a data segment, what allows the host to determine which application should receive the segment? IP source address IP destination address PAR sliding window port number SYN packet

9. What is used by UDP to determine if the data or header has been transferred without corruption? lower layer protocols checksum PAR sliding window acknowledgment and retransmission IP

10. What is the purpose of using port numbers in the transport layer? to identify the segment as being either TCP or UDP to provide reliability during data transport to identify the interface port number used by the router when forwarding data to track multiple conversations that occur between hosts

11. In the TCP header, which of the following determines the amount of data that can be sent before receiving an acknowledgment? segment number priority number window size value in the length field value in the port field acknowledgment number

12. What does TCP use to ensure reliable delivery of data segments? upper layer protocols lower layer protocols sequence numbers port numbers

13. Which of the following protocols uses UDP for transport layer services? SMTP HTTP DNS FTP

14.

What type of segment and data is shown in the graphic? a UDP segment carrying e-mail traffic a TCP segment carrying FTP traffic an IP segment carrying FTP traffic a UDP segment carrying web traffic a TCP segment carrying web traffic an IP segment carrying e-mail traffic

15. What is the purpose of Positive Acknowledgment and Retransmission (PAR)? PAR allows the presentation layer to request that data be resent in a format the destination host can process. PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment is corrupt. PAR helps ensure that a number of data segments sent by one host are received by another host before additional data segments are sent. PAR is used to renegotiate the window size during the synchronization process.

16. Which of the following are functions of the TCP protocol? (Choose three.) translation of data synchronization path determination flow control data representation reliability

17. What is used by both TCP and UDP when creating a segment? IP address MAC address IPX address socket or port number acknowledgment number sequence number

18. Which authority has control over the assignment of port numbers for applications? IEEE IANA InterNIC Software Developers Association

19. Which of the following describe types of port numbers that can be represented in the headers of TCP and UDP segments? (Choose three.) connectionless well-known operational dynamic registered static

20. What is the purpose of the three-way handshake that occurs between hosts using TCP as the transport layer protocol? to increase the number of packets that can be sent before an acknowledgment is required to allow a host to forward data to a router to establish a round trip connection between sender and receiver before data is transferred to provide a mechanism for data encryption and compression

21. During the encapsulation process, in which order are the IP address, MAC address, and port number assigned when the router is establishing communication with the TFTP server? IP address, MAC address, port number

MAC address, IP address, port number port number, IP address, MAC address port number, MAC address, IP address

22. Which of the following describes a type of denial of service attack designed to exploit the normal function of the TCP three-way handshake? A host sends a packet with a spoofed source IP address. A host sends a packet with an incorrect destination IP address. A source sends a packet containing a garbled header. A host sends an oversized packet that fills the memory buffers of the destination host. A host sends a packet that contains a virus. A host sends a packet that contains a worm.

23. Which transport layer unit of information places the port number in the header? data segment packet frame bit

After issuing the command traceroute 192.168.4.2 from Router A, the following information is returned. Tracing the route to Router_D (192.168.4.2) 1 Router_B (192.168.2.2) 16 msec 16 msec 16 msec 2*** 3*** What can be concluded about the network shown in the graphic based on the output given? Network 192.168.5.0 is missing from the routing table on Router A. There is a problem with the connection between Router B and Router C. Router C is not running CDP. Some of the routers are non-Cisco devices. Router B was not able to return ICMP TEMs to Router A.

2. Which of the following would be the default administrative distance of a static IP route that references the IP address of the next hop? 0 1 5 20

3. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.) There is a mismatch in the encapsulation type on both ends of the link. A Layer 1 issue exists. An interface problem exists. The clockrate was not set during configuration. There is no usable media for the protocol. Keepalive messages are not being sent.

4. Which three correctly pair a routing metric with its description? (Choose three.) hop count the number of routers traversed to reach a destination bandwidth the amount of time it takes a packet to travel a link load the amount of activity on a link delay the link speed reliability the error rate on a link

5.

When issuing the show interfaces serial1 command, a network administrator receives the output shown in the graphic. What are the possible causes of an increase in the number of input errors? (Choose three.) There could be Layer 3 addressing problems. There could be a problem with faulty telephone equipment. The router hardware could be defective. There is an incorrectly configured encapsulation on the interface. There could be a problem with the cabling.

6. Which ICMP message type notifies source hosts that a receiving host or network is not available? time exceeded redirect destination unreachable source quench parameter problem echo reply

7. The show interfaces command provides line and protocol status information. Which of the following conditions would never occur in the output of this command? serial1 is up, line protocol is up serial1 is up, line protocol is down serial1 is down, line protocol is down serial1 is down, line protocol is up serial1 is administratively down, line protocol is down

8.

The network administrator shown in the exhibit can ping the E0 interface of the HAR router, but the telnet intranet.xyz.com command issued from the administrators workstation fails to open a session with the intranet.xyz.com server. What are two possible causes of this problem? (Choose two.) upper-layer application problems domain name system problems IP addressing problems on the HAR router clock rate problems on the HAR router serial interface ICMP connectivity problems

9. The network administrator is using a PC to access a router via the router console port. Both the PC and the router are powered on and a cable has been connected between them. However, a session cannot be established. Which steps might fix this problem? (Choose two.) Verify the cable is properly connected at each end. Reseat the network card in the PC. Verify the cable is the correct type. Verify that a password has been set on the console line. Check the transceiver for link lights. Reseat the console card on the router.

10. Which command will display routing table information about all known networks and subnetworks? Router# show ip interfaces Router# show ip connections Router# show ip route Router# show ip networks

11. A network technician has discovered that a router in the network can no longer be reached. The technician attempts to verify Layer 1 functionality, but is unable to physically inspect the cables. Which command can be used to determine the type of cable connected to the router? Router# show interfaces Router# show controllers serial Router# show ip route Router# show ip protocol Router# show version

Router# show running-config

12. During the lookup process when forwarding a packet, a router checks its routing table for the best path to the destination. If a route has an administrative distance of 0, what does this indicate to the router? The packet should be discarded. The destination is unreachable. The destination is a directly connected network. The source of the update for that route is unreliable.

13. Which command will verify the functionality of all seven layers of the OSI model on a network host? ping debug telnet traceroute

14.

After issuing the show interfaces serial1 command, an administrator notices an increasing number of carrier transitions. What are the possible causes for this increase? (Choose two.) There is an incorrect encapsulation configured on the interface. There could be an interruption in the line by the service provider. There is a faulty switch or CSU/DSU. There is noise on the serial line.

15.

Consider the RIP network shown in the diagram. Which entries would be listed in the routing table of Router A? R 192.168.5.2[120/1] via 192.168.15.0, 00:00:09, Serial0

R 192.168.15.0[120/1] via 192.168.5.2, 00:00:13, Serial1 R 192.168.15.0[120/1] via 192.168.5.1, 00:00:13, Serial0 R 192.168.5.1 [120/1] via 192.168.5.2 00:00:29, Serial1 R 192.168.15.0 [120/1] via 192.168.5.2, 00:00:29, Serial1 R 192.168.5.1 [120/1] via 192.168.5.2 00:00:18, Serial0 R 192.168.15.2 [120/1] via 192.168.5.2, 00:00:18, Serial0

16. Which items would be displayed when the show ip protocols command is executed? (Choose three.) sources of routing updates networks being advertised routing protocol up or down configured routed protocols Layer 2 status of the interface update timer values

17. Which two are true regarding the debug commands? (Choose two.) Debug commands may be issued from the user EXEC prompt. The command undebug all will turn off all debug operations. By default, the router sends the debug output and messages to the telnet session. The high processor overhead incurred using debug may disrupt normal router operation. The debug all command provides a summary view of router activity and can be used frequently for troubleshooting. The show debugging command will display current events such as traffic on an interface and error messages generated by nodes on the network.

18. A network administrator suspects that a network is not being included in the routing updates. Which command will provide information on when the next update is due and which networks are advertised in the update? Router# show interfaces Router# show controllers serial Router# show ip protocols Router# show ip route Router# show running-config

19. Which of the following is a problem at the physical layer of the OSI model? incorrect file formatting incorrect encapsulation on a serial interface incorrect routing protocol incorrect cable type

20.

When the show cdp neighbors command is issued from Router C, which devices will be displayed in the output? D, SWH-2 A, B, D SWH-1, SWH-2 B, D SWH-1, A, B A, B, D, SWH-1, SWH-2

21. Which of the following are advantages of using a static route? (Choose three.) secure operation highly adaptable low maintenance configuration low processor overhead precise control of path selection

22. Which of the following commands can be used to statically configure default routes? (Choose two.) ip static-route ip route ip network-route ip default-network ip default-static

23. Why does a router build a routing table? (Choose two.) to list available routes for forwarding data to map local Layer 2 addresses to the remote Layer 3 destination address to dynamically send periodic updates regarding the routers status to prevent routing loops when redundant links are added to the network to select the best path to a destination

24. Which of the following lines from the show interfaces output would indicate a Layer 2 problem? Serial1 is up, line protocol is up. Serial1 is up, line protocol is down. Serial1 is down, line protocol is down. Serial1 is administratively down, line protocol is down. 1. Refer to the exhibit. RouterA, RouterB, and RouterC in the diagram are running OSPF on their Ethernet interfaces. Router D was just added to the network. Routers are configured with the loopback interfaces (Lo 0) that are shown in the exhibit. What happens to the OSPF DR/BDR after RouterD is added to the network? RouterB takes over as DR and RouterD becomes the BDR.

RouterD becomes the BDR and RouterA remains the DR. RouterD becomes the DR and RouterA becomes the BDR. RouterC acts as the DR until the election process is complete. RouterD becomes the DR and RouterB remains the BDR. There is no change in the DR or BDR until either current DR or BDR goes down.

2. Refer to the exhibit. How many OSPF adjacencies must be formed to build the complete topology if a DR or BDR were not elected in this OSPF network? 4 5 6 7 10

3. What is the default administrative distance for OSPF? 90 100 110 115 120 1. Refer to the exhibit. What does JAX do with link-state packets from ORL? sends out its updated routing table to both ORL and BOS routers sends out the individual link-state packets out the interface connected to BOS queries BOS to see if it has a better route

only adds it to the local routing table and performs no other actions

2. What two events will cause a link state router to send LSPs to all neighbors? (Choose two.) 30 second timer expires whenever the network topology changes immediately after the Bellman-Ford algorithm has run immediately after the DUAL FSM has built the topology database upon initial startup of router or routing protocol

3. What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.) The topology database eliminates the need for a routing table. Each router independently determines the route to each network. Link-state protocols require less router processor power than distance vector protocols. After the inital LSP flooding, they generally require less bandwidth to communicate changes in a topology. Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database. 1. Refer to the exhibit. EIGRP is the only routing protocol enabled on this network. No static routes are configured on this router. What can be concluded about network 198.18.1.0/24 from the exhibited output? A route to network 198.18.1.0/24 is not listed in the routing table. Packets that are destined for 198.18.1.0/24 will be forwarded to 198.18.10.6. EIGRP will perform equal cost load balancing across two paths when forwarding packets to 198.18.1.0/24. The router with interface 172.16.3.2 is a successor for network 198.18.1.0/24.

2. Refer to the exhibit. All interfaces have been configured with the bandwidths that are shown in the exhibit. Assuming that all routers are using a default configuration of EIGRP as their routing protocol, what path will packets take from the 172.16.1.0/16 network to the 192.168.200.0/24 network? A,B,E A,C,E A,D,E Packets will load balance across the A,B,E and A,C,E paths. Packets will load balance across the A,B,E and A,D,E paths. Packets will load balance across the A,C,E and A,D,E paths.

3. Which of the following statements describes the bounded updates used by EIGRP? Bounded updates are sent to all routers within an autonomous system. Partial updates are sent only to routers that need the information. The updates are sent to all routers in the routing table. Updates are bounded by the routers in the topology table.

1. Refer to the exhibit. What parent network will automatically be included in the routing table when the three subnets are configured on Router1? 172.16.0.0/16 172.16.0.0/24 172.16.0.0/30 172.16.1.0/16 172.16.1.0/24

2. Refer to the exhibit. The network administrator has discovered that packets destined for servers on the 172.16.254.0 network are being dropped by Router2. What command should the administrator issue to ensure that these packets are sent out the gateway of last resort, Serial 0/0/1? ip classless no ip classless ip default-network 0.0.0.0 ip default-gateway 172.16.254.1 ip route 0.0.0.0 0.0.0.0 Serial 0/0/1

3. A network is converged and the routing tables are complete. When a packet needs to be forwarded, what is the first criterion used to determine the best path in the routing table? the route with the smallest AD the route with the longest address and mask match to the destination the route with the highest bandwidth the route with the best combination of AD and lowest cost 1. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates propagates the default route to all routers in the network

2. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number address family identifier source and destination IP addresses

3. Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2 1. Refer to the exhibit. RouterA, RouterB, and RouterC in the diagram are running OSPF on their Ethernet interfaces. Router D was just added to the network. Routers are configured with the loopback interfaces (Lo 0) that are shown in the exhibit. What happens to the OSPF DR/BDR after RouterD is added to the network? RouterB takes over as DR and RouterD becomes the BDR. RouterD becomes the BDR and RouterA remains the DR. RouterD becomes the DR and RouterA becomes the BDR. RouterC acts as the DR until the election process is complete. RouterD becomes the DR and RouterB remains the BDR. There is no change in the DR or BDR until either current DR or BDR goes down.

2. Refer to the exhibit. How many OSPF adjacencies must be formed to build the complete topology if a DR or BDR were not elected in this OSPF network?

4 5 6 7 10

3. What is the default administrative distance for OSPF? 90 100 110 115 120 4. Refer to the exhibit. All routers have been configured with the interface priorities that are shown. All routers were restarted simultaneously. The results of the DR/BDR election are shown. What can be concluded about this network? Router C cannot win a DR election under any circumstances. If the link for interface 192.168.1.4 goes down, router B will become the new DR. The highest router ID was most likely determined via an OSPF router-id statement or statements. If a new router is added with a higher router ID than router D, it will become the DR.

5. A fully converged five router OSPF network has been running successfully for several weeks. All configurations have been saved and no static routes are used. If one router looses power and reboots, what information will be in its routing table after the configuration file is loaded but before OSPF has converged? All routes for the entire network will be present. Directly connected networks that are operational will be in the routing table.

Because the SPF algorithm has not completed all calculations, no routes will be in the table. A summary route for all previously learned routes will automatically appear in the routing table until all LSPs have been received by the router.

6. Refer to the exhibit. When OSPF is operational in the exhibited network, what neighbor relationship is developed between Router1 and Router2? A FULL adjacency is formed. A 2WAY adjacency is formed. Router2 will become the DR and Router1 will become the BDR. Both routers will become DROTHERS.

7. Which two statements describe the use of OSPF DR/BDR elections? (Choose two.) Elections are always optional. Elections are required in all WAN networks. Elections are required in point-to-point networks. Elections are required in broadcast multiaccess networks. Elections are sometimes required in NBMA networks.

8. Refer to the exhibit. What must be received between neighbors to prevent the dead time that is shown in the exhibit from reaching zero? any traffic through the router interfaces routing database updates hello packets BPDU packets

9. Refer to the exhibit. Router A is correctly configured for OSPF. Which OSPF configuration statement or set of statements was entered for router B to generate the exhibited routing table? B(config-router)# network 192.168.1.0 0.0.0.3 area 0 B(config-router)# network 10.16.1.0 0.0.0.224 area 0 B(config-router)# network 10.16.1.0 255.255.255.224 area 0 B(config-router)# network 192.168.1.0 255.255.255.255 area 0 B(config-router)# network 10.0.0.0 255.255.255.255 area 0

10. Refer to the exhibit. Routers A, B, C, and D are all running OSPF with default router IDs and OSPF interface priorities. Loopback interfaces are not configured and all interfaces are operational. Router D is the DR and router C is the BDR. What happens immediately after the following commands are entered on router A? A(config)# interface fa0/0 A(config-if)# ip ospf priority 255 A will become the DR. D will become the BDR. A will become the DR. C will remain the BDR. D will remain the DR. A will become the BDR. D will remain the DR. C will remain the BDR.

11. Refer to the exhibit. What does the O*E2 from the O*E2 0.0.0.0/0 [110/1] via 192.168.1.1, 00:05:34, Serial0/0 line represent? an internal type 2 OSPF route. an external OSPF route at least two hops away. an external OSPF route from two different sources. an external OSPF route that will not increment in cost. a default route. The route was distributed into OSPF from a type 2 router.

12. Refer to the exhibit. Which network command or set of commands will cause OSPF to be enabled for any R1 interface connected to the exhibited subnets? R1(config-router)# network 10.0.0.0 0.0.0.0 area 0 R1(config-router)# network 10.1.0.0 0.0.0.255 area 0 R1(config-router)# network 10.1.1.0 0.0.0.255 area 0 R1(config-router)# network 10.1.2.4 0.0.0.3 area 0 R1(config-router)# network 10.1.0.0 0.0.0.255 area 0 R1(config-router)# network 10.2.0.0 0.0.0.255 area 0 R1(config-router)# network 10.0.0.0 0.0.255.255 area 0

13. Refer to the exhibit. All routers are running OSPF. What cost would JAX put in its routing table for the 10.0.0.0/24 network? 2 156 1564 1785 1787

14. Refer to the exhibit. What configuration statements would give the results that are shown in the output of the show ip protocols command? B(config)# int fa0/0 B(config-if)# router-id 192.168.1.5 B(config)# int lo0 B(config-if)# ip address 192.168.1.5 B(config)# router ospf 1 B(config-router)# router-id 192.168.1.5

B (config)# router ospf 1 B(config-router)# ip address 192.168.1.5

15. Refer to the exhibit. The routers in the exhibit are using default OSPF configuration settings to advertise all attached networks. If all of the routers start at the same time, what will be the result of the DR and BDR elections for this single area OSPF network? (Choose three.) HQ will be DR for 10.4.0.0/16. Router A will be DR for 10.4.0.0/16. HQ will be BDR for 10.4.0.0/16. Router A will be DR for 10.5.0.0/16. Remote will be DR for 10.5.0.0/16. Remote will be BDR for 10.5.0.0/16.

16. What does OSPF use to reduce the number of exchanges of routing information in networks where large numbers of neighbors are present? (Choose two.) root router backup root router domain router backup domain router designated router backup designated router

17. Refer to the exhibit. What is the cost of the route to the 10.0.0.0 network? 2 110

1786 1.544

18. What range of networks will be advertised in the OSPF updates by the command Router1(config-router)# network 192.168.0.0 0.0.15.255 area 100? 192.168.0.0/24 through 192.168.0.15/24 192.168.0.0/24 through 192.168.15.0/24 192.168.15.0/24 through 192.168.31.0/24 192.168.15.0/24 through 192.168.255.0/24 192.168.16.0/24 through 192.168.255.0/24

19. Refer to the exhibit. Which command sequence on RouterB will redistribute a gateway of last resort to the other routers in OSPF area 0? RouterB(config)# router ospf 10 RouterB(config-router)# gateway-of-last-resort 172.16.6.6 RouterB(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0/0 RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.6.6 RouterB(config)# router ospf 10 RouterB(config-router)# default-information originate RouterB(config)# router ospf 10 RouterB(config-router)# default-network 172.16.6.6 0.0.0.3 area 0 RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.6.6 RouterB(config)# ip default-route 0.0.0.0 0.0.0.0 172.16.6.6 RouterB(config)# router ospf 10 RouterB(config-router)# redistribute ip default-route

20. Refer to the exhibit. The network administrator wants to set the router ID of Router1 to 192.168.100.1. What steps can the administrator take to accomplish this? shut down the loop back interface

use the OSPF router-id 192.168.100.1 command use the clear ip ospf process command nothing, the router-id of Router1 is already 192.168.100.1

21. What three parameters must be indentical between OSPF routers in order to form an adjacency? (Choose three.) area id K-values metric value hello interval network type interface type

22. Refer to the exhibit. Router1 and Router2 are running OSPF. The show ip ospf neighbor command reveals no neighbors. What is a possible cause? OSPF autonomous system IDs do not match. OSPF process IDs do not match. OSPF network types are identical. OSPF hello or dead timers do not match.

23. What does OSPF use to calculate the cost to a destination network? bandwidth bandwidth and hop count bandwidth and reliability

bandwidth, load, and reliablity

24. Refer to the exhibit. Assuming that the routers have default interface OSPF priorities and no configured loopback interfaces, what two roles will router B play on each network segment? (Choose two.) DR for network 192.168.1.200 BDR for network 192.168.1.200 DROTHER on 192.168.1.200 DR for network 192.168.1.204 BDR for network 192.168.1.204 DROTHER on network 192.168.1.204

25. Refer to the exhibit. What does the 2 stand for in the router ospf 2 statement? The number 2 is the autonomous system number. The number 2 indicates the number of networks advertised by OSPF. The number 2 identifies this particular instance of OSPF on this router. The number 2 indicates the priority of the OSPF process on this router. 1. Refer to the exhibit. What does JAX do with link-state packets from ORL? sends out its updated routing table to both ORL and BOS routers sends out the individual link-state packets out the interface connected to BOS queries BOS to see if it has a better route only adds it to the local routing table and performs no other actions

2. What two events will cause a link state router to send LSPs to all neighbors? (Choose two.)

30 second timer expires whenever the network topology changes immediately after the Bellman-Ford algorithm has run immediately after the DUAL FSM has built the topology database upon initial startup of router or routing protocol

3. What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.) The topology database eliminates the need for a routing table. Each router independently determines the route to each network. Link-state protocols require less router processor power than distance vector protocols. After the inital LSP flooding, they generally require less bandwidth to communicate changes in a topology. Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database. 4. What speeds up convergence in a network using link-state routing? updates triggered by network changes updates sent at regular intervals updates sent only to directly connected neighbors updates that include complete routing tables

5. Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL? hop count uptime of the route

cost of the link a list of all the routing protocols in use

6. What two events will cause a link state router to send LSPs to all neighbors? (Choose two.) 30 second timer expires whenever the network topology changes immediately after the Bellman-Ford algorithm has run immediately after the DUAL FSM has built the topology database upon initial startup of router or routing protocol

7. What two statements correctly describe the link state routing process? (Choose two.) each router in the area floods LSPs to all neighbors all routers in the area have identical link state databases LSPs use the reserved multicast address of 224.0.0.10 to reach neighbors routing loops are prevented by running the Diffusing Update Algorithm (DUAL) Reliable Transport Protocol (RTP) is the protocol used by for the delivery and reception of LSPs

8. When are link-state packets sent to neighbors? every 30 seconds every 180 seconds after the holddown time expires when a link goes up or down when a routing loop occurs

9. What action does a link-state router take immediately upon receipt of an LSP from a neighboring router? floods the LSP to neighbors calculates the SPF algorithm runs the Bellman-Ford algorithm computes the best path to the destination network

10. Refer to the exhibit. When Router D is configured to use a link-state routing protocol and is added to the network, what is the first thing that it does to begin learning the network topology? It sends LSP packets to Routers B and C. It sends LSP packets to all routers in the network. It sends Hello packets to all routers in the network. It sends information about its directly connected neighbors to Routers A and E. It sends information about its directly connected neighbors to all routers in the network. It learns about its directly connected networks when its interfaces reach the up state.

11. Refer to the exhibit. Which statement correctly describes the path traffic would take from the 10.0.0.0/24 network to the 192.168.1.0/24 network if a link-state routing protocol was in use? BOS -> ATL because this path is the least hops BOS -> ATL because this path is highest cost BOS -> ORL -> JAX -> ATL because this path is the lowest cost traffic would load balance across all links

12. Which algorithm is run by link-state routing protocols to calculate the shortest path to destination networks? DUAL Dijkstra Bellman-Ford Diffie-Hellman

13. What are some of the advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.) The topology database eliminates the need for a routing table. Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database. Routers have direct knowledge of all links in the network and how they are connected. After the inital LSA flooding, they generally require less bandwidth to communicate changes in a topology. Link-state protocols require less router processor power than distance vector protocols.

14. Why is it difficult for routing loops to occur in networks that use link-state routing? Each router builds a simple view of the network based on hop count. Routers flood the network with LSAs to discover routing loops. Each router builds a complete and synchronized view of the network. Routers use hold-down timers to prevent routing loops.

15. To achieve network convergence, what three steps does each link state router take? (Choose three.) use automatic summarization to reduce the size of routing tables

build a Link State Packet (LSP) containing the state of each directly connected link flood the LSP to all neighbors, who then store all LSPs received in a database discover neighbors and establish adjacencies using the hello packet sent at regular intervals construct a complete map of the topology and compute the best path to each destination network use the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table

16. A new network administrator is given the task of selecting an appropriate dynamic routing protocol for a software development company. The company has over 100 routers, uses CIDR and VLSM, requires fast convergence, and uses both Cisco and non-Cisco equipment. Which routing protocol is appropriate for this company? RIP version 2 IGRP EIGRP OSPF BGP

17. Which two routing protocols use Dijkstras shortest path first algorithm? (Choose two.) RIPv1 RIPv2 IS-IS BGP EIGRP OSPF

18. To achieve network convergence, what three steps does each link state router take? (Choose three.) use automatic summarization to reduce the size of routing tables build a Link State Packet (LSP) containing the state of each directly connected link flood the LSP to all neighbors, who then store all LSPs received in a database send hello packages at regular intervals to discover neighbors and establish adjacencies construct a complete map of the topology and compute the best path to each destination network use the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table

19. What is the final step in the link state routing process? successors are placed into the routing table SPF computes best path to each destination network LSPs are flooded to all neighbors to converge the network DUAL algorithm is run to find best path to destination networks

20. Which database or table must be identical on all link-state routers within an area in order to construct an accurate SPF tree? routing table adjacency table link-state database neighbor table topology database

21. What feature do modern link-state protocols provide to minimize processing and memory requirements?

splitting routing topologies into smaller areas assigning lower process priorities to route calculations using update timers to restrict routing updates strict split horizon rules to reduce routing table entries 1. Refer to the exhibit. EIGRP is the only routing protocol enabled on this network. No static routes are configured on this router. What can be concluded about network 198.18.1.0/24 from the exhibited output? A route to network 198.18.1.0/24 is not listed in the routing table. Packets that are destined for 198.18.1.0/24 will be forwarded to 198.18.10.6. EIGRP will perform equal cost load balancing across two paths when forwarding packets to 198.18.1.0/24. The router with interface 172.16.3.2 is a successor for network 198.18.1.0/24.

2. Refer to the exhibit. All interfaces have been configured with the bandwidths that are shown in the exhibit. Assuming that all routers are using a default configuration of EIGRP as their routing protocol, what path will packets take from the 172.16.1.0/16 network to the 192.168.200.0/24 network? A,B,E A,C,E A,D,E Packets will load balance across the A,B,E and A,C,E paths. Packets will load balance across the A,B,E and A,D,E paths. Packets will load balance across the A,C,E and A,D,E paths.

3. Which of the following statements describes the bounded updates used by EIGRP? Bounded updates are sent to all routers within an autonomous system.

Partial updates are sent only to routers that need the information. The updates are sent to all routers in the routing table. Updates are bounded by the routers in the topology table. 4. What information is maintained in the EIGRP topology database for a destination route? (Choose three.) the routing protocol the feasible distance of the route the highest cost of the route the SRTT value for the route the route cost as advertised by the neighboring router the physical address of the gateway interface

5. What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.) put the route into passive mode query neighbors for a new route search routing table for a feasible successor run the SPF algorithm to find a new successor search topology table for a feasible successor

6. By default, which two metrics are used by EIGRP to determine the best path between networks? MTU load delay

bandwidth reliability

7. Which term defines a collection of networks under the administrative control of a single entity that presents a common routing policy to the Internet? autonomous system contiguous networks process ID BGP

8. Refer to the exhibit. Network 192.168.0.0/28 goes down. What type of packet does Router2 immediately send to Router1 and Router3? a query for network 192.168.0.0/28 an acknowledgment packet to 224.0.0.9 an update packet that is sent to 255.255.255.255 a packet that contains the new routing table for R2 unicast update packets to 192.168.1.1 and 192.168.2.1

9. The show ip eigrp topology command output on a router displays a successor route and a feasible successor route to network 192.168.1.0/24. In order to reduce processor utilization, what does EIGRP do when the primary route to this network fails? The router sends query packets to all EIGRP neighbors for a better route to network 192.168.1.0/24. The DUAL FSM immediately recomputes the algorithm to calculate the next backup route. Packets that are destined for network 192.168.1.0/24 are sent out the default gateway instead. The backup route to network 192.168.1.0/24 is installed in the routing table.

10. Refer to the exhibit. This is the debug output from 2 directly connected EIGRP routers. They are not forming an adjacency. What is the cause? one router is a non-cisco router they have different autonomous-system numbers they are using difference sequence numbers they are sending incorrect hello types

11. Host 192.168.1.66 in the network illustrated is unable to ping host 192.168.1.130. How must EIGRP be configured to enable connectivity between the two hosts? (Choose two.) R1(config-router)# network 192.168.1.128 R1(config-router)# auto-summary R1(config-router)# no auto-summary R2(config-router)# no auto-summary R2(config-router)# auto-summary R2(config-router)# network 192.168.1.64

12. Refer to the exhibit. In the topology table, what do the numbers 3011840 and 3128695 represent? the route metric that is applied to those EIGRP routes for this router the trustworthiness of the routing information source the composite of the hop count and bandwidth to that destination network the total metric for that network as advertised by the EIGRP neighbor

13. Which of the following types of routes will be denoted by EX in EIGRP routing table entries? (Choose two.) routes learned from other routing protocols routes learned from any non-adjacent EIGRP routers any route with a hop count metric higher than 224 EIGRP routes that originate in different autonomous systems all passive routes in the routing table

14. Refer to the exhibit. Based on the output of show ip eigrp neighbors, what are two possible problems with adjacencies between Router1 and Router2? (Choose two.) The routers are configured with different EIGRP process IDs. Automatic summarization was disabled. The hello timer for R1 was altered. The serial interfaces for both routers are in different networks. No feasible successors were found.

15. Which two statements describe characteristics of EIGRP? (Choose two.) EIGRP is a distance vector routing protocol. EIGRP supports classless routing and VLSM. EIGRP is classified as a link-state routing protocol. EIGRP uses TCP for reliable delivery of EIGRP update packets. With EIGRP, loop-free paths are achieved through the use of hold-down timers. EIGRP sends a periodic update every 30 minutes.

16. Refer to the exhibit. What is indicated by the P at the beginning of the topology entry? the route is in a stable state the route is a preferred route DUAL is searching for a better route to this destination the exit interface is in passive mode and EIGRP advertisements are blocked

17. Refer to the exhibit. The company is using EIGRP with an autonomous system number of 10. Pings between hosts on networks that are connected to router A and those that are connected to router B are successful. However, users on the 192.168.3.0 network are unable to reach users on the 192.168.1.32 network. What is the most likely cause of this problem? IP classless is enabled and is causing the packet to drop. The command network 192.168.1.32 was not issued on router C. The routers are not configured in the same EIGRP routing domain. Automatic summarization of the networks is causing the subnetted routes to be dropped.

18. On a router running EIGRP, what database would maintain a list of feasible successors? routing table neighbor table topology table adjacency table

19. In the command router eigrp 20, what is the purpose of the number 20? specifies the administrative distance for all EIGRP routes identifies the autonomous system number this EIGRP process will advertise

determines what metric is added to all advertised routes indicates the number of addresses in the EIGRP routing domain

20. Refer to the exhibit. Which command will advertise the 192.168.1.64/30 network but not the 192.168.1.32 network on router A? network 192.168.1.0 network 192.168.1.0 255.255.255.0 network 192.168.1.64 0.0.0.3 network 192.168.1.64 0.0.0.7 network 192.168.1.64 0.0.0.255

21. What administrative distance would a router assign to a default route in EIGRP that is learned from a source external to the autonomous system? 1 5 70 90 170 190

22. In which of the following tables does the EIGRP DUAL algorithm store the primary route to a destination? (Choose two.) routing topology neighbor

path shortest path 1. Refer to the exhibit. What parent network will automatically be included in the routing table when the three subnets are configured on Router1? 172.16.0.0/16 172.16.0.0/24 172.16.0.0/30 172.16.1.0/16 172.16.1.0/24

2. Refer to the exhibit. The network administrator has discovered that packets destined for servers on the 172.16.254.0 network are being dropped by Router2. What command should the administrator issue to ensure that these packets are sent out the gateway of last resort, Serial 0/0/1? ip classless no ip classless ip default-network 0.0.0.0 ip default-gateway 172.16.254.1 ip route 0.0.0.0 0.0.0.0 Serial 0/0/1

3. A network is converged and the routing tables are complete. When a packet needs to be forwarded, what is the first criterion used to determine the best path in the routing table? the route with the smallest AD the route with the longest address and mask match to the destination the route with the highest bandwidth the route with the best combination of AD and lowest cost

4. Refer to the exhibit. What protocol was used to distribute the routing information for the network 172.16.1.4? RIPv1 RIPv2 EIGRP OSPF

5. Refer to the exhibit. Which statement correctly describes this network? EIGRP is being used There is at least one parent and one child route 192.168.2.0, 192.168.3.0, and 192.168.4.0 networks are child routes Traffic going to 172.16.3.0 will be directed to s 0/0/1

6. The following entry is displayed in the routing table: R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1 What type of route is this? a level 1 parent route a level 1 supernet route a level 1 ultimate network route a level 2 child route a level 2 ultimate child route

7. Refer to the exhibit. How many routes in this output qualify for use as ultimate routes? 3 4

5 6 7

8. Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need to do so that packets for unknown child routes of 172.16.0.0/24 will not be dropped? issue the ip default-network command use a classful routing protocol such as RIPv1 enable either OSPF or ISIS as the routing protocol issue the ip classless command do nothing, ip classless is on by default

9. What determines if the router implements a classless route lookup process? Child routes are present in the routing table. A classless routing protocol has been configured on the router. The command ip classless is enabled on the router. Multiple routes with different masks to the same destination are in the routing table. Routing table entries have a next-hop IP address and an exit interface for each child route.

10. Refer to the exhibit. What can be determined from this output? The router will have to perform recursive lookups to forward a packet destined for 192.168.2.213/24. The parent route for these networks was removed from the routing table. A route to 192.168.0.0/25 would be classified as a supernet route for the routes listed in the routing table.

All of the routes listed are network routes.

11. Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a packet to forward. Which route in the routing table will be searched first and why? 172.16.1.0/25 because it is the first ultimate route 0.0.0.0/0 because it is the lowest network number 172.16.0.0/25 because it is the first level 1 route 172.18.0.0/15 because it has the shortest mask

12. Refer to the exhibit. A packet destined for host 128.107.0.5/16 is processed by the JAX router. After finding the static route in the routing table that matches the destination network for this packet, what does the router do next? searches for a default route to forward the packet drops the packet since the static route does not have an exit interface performs a recursive lookup to find the exit interface used to forward the packet sends a request to neighboring routers for the location of the 128.107.0.0 network

13. What occurs when no ip classless is implemented on the router? The router will only support classful IP addressing. The router will only support classful routing protocols. The router will use a default route, if present, when a matching route is not found in the routing table. The router will assume it has knowledge of all subnets in the network and will not search beyond child routes for a better match.

14. Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will router B do? drop the packet forward the packet via the route to 10.16.1.0 forward the packet via the route to 10.16.1.64 use the default route

15. Refer to the exhibit. Router1 has been issued the ip classless command. What happens to packets destined to host 172.16.3.10? they are dropped sent to default gateway forward out interface Serial0/0/1 forward out interface FastEthernet 0/0

16. A router has the following entries in its routing table: S 192.168.0.0/24 [1/0] via 192.168.128.2 O 192.168.0.0/25 [110/2175] via 172.16.1.1, 00:02:15, FastEthernet0/1 D 192.168.0.0/25 [90/22455] via 172.16.2.2, 00:12:15, Serial0/0/0 R 192.168.0.0/26 [120/2] via 172.16.3.3, 00:00:15, Serial0/0/1 The router receives a packet that is destined for a host with the address 192.168.0.58. Which route would this router use to forward the packet? the static route the OSPF route the EIGRP route the RIP route

17. Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24 network?

0.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

18. Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet destined for host 172.16.4.234? drop the packet send packet out Serial 0/0/1 send packet to network 0.0.0.0 send packet out FastEthernet 0/0

19. A route to a destination network is learned from multiple routing protocols. What is used by a Cisco router to select the preferred route to the destination that will be installed in the routing table? metric route prefix update timer administrative distance 1. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates

propagates the default route to all routers in the network

2. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number address family identifier source and destination IP addresses

3. Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2 4. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27

5. What are two functions of the network command used when configuring routing protocols? (Choose two.) identifies which networks will be included in the routing updates identifies the hosts addresses that can be summarized in the network used to list all addresses for remote and local networks determines which subnet mask to apply to routing updates determines which interfaces can send and receive routing updates

6. Refer to the exhibit. Which two statements are true? (Choose two.) Router1 will install a route to 192.168.0.0/20 Router1 will install a route to 192.168.0.0/24 Router1 will install a route to 192.168.16.0/24 Router2 will install a route to 192.168.16.0/24 Router2 will not install a route to 192.168.16.0/20

7. Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1? Only version 2 updates are sent to 255.255.255.255. Only version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 255.255.255.255.

8. Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?

The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues. The CHI router will install a route to the 192.168.0.0/16 network in its routing table. The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route. The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.

9. Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router: Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error? The router does not allow loopback interface configurations. This mask can not be used with this class of addresses. Classless routing must be configured before this address can be added. The network address for Loopback1 overlaps with an already configured interface address. The router is over the limit for the maximum paths that can be provided in the routing table.

10. What is the maximum network diameter permitted by the default metric of RIPv2? 15 hops 16 hops 100 hops 120 hops 255 hops

11. Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? Rip version 2 does not send subnet masks in its updates. Router A is not setup with RIP as a routing protocol. Rip version 2 will auto summarize routes by default. Router B is not setup to advertise the 192.168.1.64/30 network.

12. How are RIP v1 and RIP v2 similar to one another? (Choose three.) They both use hop count as a metric. They both have the same metric value for infinite distance. They both broadcast their updates to their neighbors. They both send subnet mask information in their updates. They both provide for authentication of update sources. They both use split horizon to prevent routing loops.

13. Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network? Router1(config)# ip classless Router1(config-router)# network 192.168.16.0 Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2

14. Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router

serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem? A gateway of last resort is required. Subnetting is not supported by RIPv1. VLSM is not supported by RIPv1. One of the routers needs a clock rate on the serial interface.

15. Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0 When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? The network statements are configured incorrectly. A routing loop has been created. RIPv1 is unable to route to discontiguous subnets of a major network. RIPv1 is unable to route networks with a /24 subnet mask.

16. Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B? Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added. A connected route to the 10.16.1.128/27 network is added. A third route to the 10.0.0.0/8 network with RIPv1 as the source is added. The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.

17. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? Subnet masks will be added to the routing updates. Routing updates will be sent out using multicast address 224.0.0.9. Version 1 and 2 updates will be received and the version 2 updates will not be sent. The RIP routing process will be removed from the router and routing updates will not be forwarded.

18. Refer to the exhibit. What can be concluded from the output shown in the exhibit? The routing table is limited to 2 routes. The LAN interfaces are participating in the routing process. One update has been sent out of each serial interface and 2 have been received. The no auto-summary has not been configured on this router.

19. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.) RIP version 2 supports VLSM. RIP version 2 supports more than 16 routers. RIP version 2 supports classful (and not classless) routing. RIP version 2 supports routing update authentication. RIP version 2 supports multi-areas. RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.

20. Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the

same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem? Enable split horizon in the network. Configure RIPv2 on routers. Add network 192.168.1.0 to the RIP configuration on the JAX router. Configure JAX Fa0/0 as a passive interface. Enable the Serial0/0/0 interface on the JAX router. Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24. 1. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.) ping show arp traceroute show ip route show interface show cdp neighbor detail

2. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud? 192.1.1.0/26 and 192.1.1.64/27 192.1.1.128/25 192.1.1.0/23 and 192.1.1.64/23 192.1.1.0/24 192.1.1.0/25

192.1.1.0/24 and 192.1.1.64/24

3. A static route that points to the next hop IP will have what administrative distance and metric in the routing table? administrative distance of 0 and metric of 0 administrative distance of 0 and metric of 1 administrative distance of 1 and metric of 0 administrative distance of 1 and metric of 1 4. Which of the following is true regarding CDP and the graphic shown? CDP running on Router D will gather information about routers A, B, C, and E. By default, Router A will receive CDP advertisements from routers B and C. If routers D and E are running different routing protocols, they will not exchange CDP information. Router E can use CDP to identify the IOS running on Router B.

5. What address can be used to summarize networks 172.16.0.0/24 thru 172.16.7.0/24? 172.16.0.0/21 172.16.1.0/22 172.16.0.0 255.255.255.248 172.16.0.0 255.255.252.0

6. The output of the Router# show interfaces serial 0/1 command displays the following: Serial0/1 is up, line protocol is down. What is the most likely cause for the line protocol being down? Serial0/1 is shutdown.

There is no cable connecting the routers. The remote router is using serial 0/0. No clock rate has been set.

7. A network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet? drops the packet because the destination host is not listed in the routing table looks up the MAC address of the S0/1/0 interface to determine the destination MAC address of the new frame performs a recursive lookup for the IP address of the S0/1/0 interface before forwarding the packet encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface

8. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet? WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1 WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1 WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/0

9. Refer to the exhibit. What two commands are required to provide connectivity between the 192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.) A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0 A(config)# ip route 10.0.0.0 255.0.0.0 172.16.40.2 A (config)# ip route 10.0.0.0 255.0.0.0 s 0/0/0 B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0 B (config)# ip route 192.168.1.0 255.255.255.0 172.16.40.1 B(config)# ip route 192.168.1.0 255.255.255.0 s 0/1/0

10. Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.) load platform reliability holdtime local interface

11. Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network? Adding the next-hop address eliminates the need for the router to do any lookups in the routing table before forwarding a packet. In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address. Using a next-hop address in a static route provides a route with a lower metric.

In multi-access networks, using a next-hop address in a static route makes that route a candidate default route.

12. What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two). the serial port of the router a modem a switch the ethernet port of the router a CSU/DSU device a DTE device

13. Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network? It indicates that there are 8 hops between this router and the 10.0.0.0 network. It represents the time, in milliseconds, it takes for a ping to reply when sent to the 10.0.0.0 network. It indicates that there are 8 subnets in the destination network to which the router can forward packets. It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.

14. Which two statements describe functions or characteristics of CDP? (Choose two.) It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP. It operates at the network layer and allows two systems to learn about each other. It creates a topology map of the entire network.

It allows systems to learn about each other even if different network layer protocols are configured. It forwards advertisements about routes for faster convergence.

15. Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network? ip route 192.168.0.0 172.16.0.0 255.255.0.0 ip route 172.16.0.0 255.255.0.0 192.168.0.1 ip route 172.16.0.0 255.255.0.0 S0/0/1 ip route 172.16.0.0 255.255.0.0 S0/0/0

16. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0. Router1 will perform recursive lookup and packet will exit S0/1. There is no matching interface associated with network 172.16.0.0 so packets will be dropped. There is no matching interface associated with network 172.16.0.0 so packets will take gateway of last resort and exit out S0/2.

17. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.) A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2 A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2 A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2 A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0 A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2

18. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24? 172.16.0.0/21 172.16.1.0/22 172.16.0.0 255.255.255.248 172.16.0.0 255.255.252.0

19. Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link? The rate would be negotiated by both routers. A rate would not be selected due to the DCE/DTE connection mismatch. The rate configured on the DTE determines the clock rate. The rate configured on the DCE determines the clock rate.

20. A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.) The destination network no longer exists. The destination network is moved to a different interface on the same router. The path between the source and destination is upgraded with a higher bandwidth link. A topology change occurs where the existing next-hop address or exit interface is not accessible. The remote destination network interface has to be down for 15 minutes of maintenance.

21. Which piece of information is available from examining the output of the command show ip interface brief?

Interface speed and duplex Interface MTU Errors Interface MAC address Interface IP address

22. Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks? R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1 R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2 R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2 R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1 R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2 R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1 R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1 R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2 R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.2.1 R2(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1

23. What happens to a static route entry in a routing table when the outgoing interface is not available? The route is removed from the table. The router polls neighbors for a replacement route. The route remains in the table because it was defined as static. The router redirects the static route to compensate for the loss of the next hop device. 1. Which two statements are true regarding classless routing protocols? (Choose two.)

sends subnet mask information in routing updates sends complete routing table update to all neighbors is supported by RIP version 1 allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology reduces the amount of address space available in an organization

2. Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) Administrative distance refers to the trustworthiness of a particular route. A router first installs routes with higher administrative distances. The value of the administrative distance can not be altered by the network administrator. Routes with the smallest metric to a destination indicate the best path. The metric is always determined based on hop count. The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.

3. Which of the following conditions must be met in order for a network to have converged? The routers in the network are operating with dynamic routing protocols. The routers in the network are operating with compatible versions of IOS. The routers in the network are operating with the same routing tables. The routers in the network are operating with consistent routing knowledge. 4. Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24? 3 4

56 624 724

5. Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.) the network requires a special hierarchical design fast convergence of the network is crucial the network is using a hub and spoke topology the network is using a flat design there are more than 15 hops between the most distant routers

6. The following line of code is displayed in a routing table: R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0 What can be concluded from this output? A packet destined for host 192.168.252.2 will be forwarded out the interface connected to network 209.165.201.0/24. The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network. This route was manually configured using the ip route command. 192.168.252.2 is an interface on the router that produced this output.

7. An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route? The administrative distance of this route is 1. 192.168.1.2 is the address of an interface on this router.

This route will display as a directly connected network in the routing table. Packets with a destination IP address of 192.168.1.2 will be forwarded to the 10.0.0.0/24 network first.

8. Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1? Router1 will have 6 directly connected networks. The administrative distance of the route to network 172.16.0.0 will be 90. The metric for routes to 172.16.0.0 will be 1. The interface that is used to forward packets to 172.16.0.0 will always be the S0/1 interface.

9. Which command would the network administrator issue to determine if load balancing is in effect on a router? show ip protocols show ip route show ip interface brief show ip interface

10. What will be the result of the following commands? ORL(config)# interface fastethernet 0/0 ORL(config-if)# ip address 172.16.3.1 255.255.255.0 ORL(config-if)# no shutdown The 172.16.3.0 network will be routed by any dynamic routing protocol automatically. A routing table entry is made to the 172.16.3.0 network with a code of C. A static route is required to route traffic to the 172.16.3.0 network.

The commands will be saved to the startup-configuration.

11. The following line of code is present in the routing table: O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1 What does the number 129 indicate in this output? The cost for this link has a value of 129. The clock rate on this serial interface is set to 129,000. The next-hop router is 129 hops away from this router. This route has been updated 129 times in this routing table.

12. When multiple routing protocols have a route to the same destination network, what determines which route is installed in the routing table? best metric lowest hop count greatest available bandwidth lowest administrative distance lowest cost

13. A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network? The router will install the first route it learned into the routing table. The router will install both routes in the routing table and load balance between the two. The router will put the first route in the routing table, and denote the second route as a backup route. The router will pick the path with the higher bandwidth and will place it in the routing table.

14. Which statement is true regarding routing protocols? RIP uses hop count and bandwidth as the metric for path selection and sendsupdates periodically. OSPF is a Cisco proprietary protocol that sends updates triggered by topology changes. EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing. BGP is a path vector interior routing protocol.

15. Which of the following best describes the operation of distance vector routing protocols? They use hop count as their only metric. They only send out updates when a new network is added. They send their routing tables to directly connected neighbors. They flood the entire network with routing updates.

16. Which two statements are true regarding metrics? (Choose two.) RIP uses bandwidth as a metric. OSPF uses delay as a metric. EIGRP uses bandwidth as a metric. OSPF uses cost based on bandwidth as a metric. RIP uses delay as a metric. EIGRP uses hop count only as a metric.

17. Which of the following is associated with link-state routing protocols? low processor overhead poison reverse

routing loops split horizon shortest-path first calculations

18. A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process? Distance vector routing protocols, such as RIP, converge more quickly than do link-state routing protocols. EIGRP can be used on all of the routers in the company. OSPF can be used between the routers. An exterior routing protocol, such as BGP, is recommended for growing companies.

19. Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2? R1 will install a RIP route using network A in its routing table because the administrative distance of RIP is higher than EIGRP. R1 will install a RIP route using network A in its routing table because the path cost from RIP is lower than EIGRP. R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP. R1 will install an EIGRP route using network B in its routing table because the path cost from EIGRP is lower than RIP. R1 will install an EIGRP route and a RIP route in its routing table and load balance between them.

20. Which two statements are true regarding the advantages of the use of static routes? (Choose two).

increased security reduced effort in configuring routes the administrator maintains control over routing easier to implement in a growing network reduces the chance of routing errors increased router resource usage

21. Why is fast convergence desirable in networks that use dynamic routing protocols? Routers will not allow packets to be forwarded until the network has converged. Hosts are unable to access their gateway until the network has converged. Routers may make incorrect forwarding decisions until the network has converged. Routers will not allow configuration changes to be made until the network has converged.

22. What is the purpose of a routing protocol? It is used to build and maintain ARP tables. It provides a method for segmenting and reassembling data packets. It allows an administrator to devise an addressing scheme for the network. It allows a router to share information about known networks with other routers. It provides a procedure for encoding and decoding data into bits for packet forwarding. 1. Refer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A respond? The Holddown timer will wait to remove the route from the table for 60 seconds. The Invalid timer will mark the route as unusable if an update has not been received in 180 seconds.

The Update timer will request an update for routes that were learned from Router B. The Hello timer will expire after 10 seconds and the route will be flushed out of the routing table.

2. Refer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks? 1 2 3 4 5 6

3. Which two conditions are most likely to cause a routing loop? (Choose two.) random jitter implementation of classful addressing inconsistent routing tables incorrectly configured static routes a network converging too quickly 4. Three routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers reload, what will happen? They will share all routes saved in NVRAM prior to the power loss with their directly connected neighbors. They will multicast hello packets to all other routers in the network to establish neighbor adjacencie

They will send updates that include only directly connected routes to their directly connected neighbor They will broadcast their full routing table to all routers in the networ

5. What does a router running RIP do first with a new route that is received from an advertisement? places it immediately in the routing table adjusts the metric for the new route to show the added distance for the route advertises this route out all other interfaces except the one that it came in on sends a ping packet to verify that the path is a feasible route

6. The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect? split horizon error condition hold-down timer route poisoning count to infinity

7. Which two statements describe EIGRP? (Choose two.) EIGRP can be used with Cisco and non-Cisco routers. EIGRP sends triggered updates whenever there is a change in topology that influences the routing information. EIGRP has an infinite metric of 16. EIGRP sends a partial routing table update, which includes just routes that have been changed.

EIGRP broadcasts its updates to all routers in the network.

8. Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is the active routing protocol? The path will be router A -> router B -> router C -> router E. The path will be router A -> router D -> router E Router A will load balance between the router A -> router D -> router E and router A -> router B -> router C -> router E path Packets will alternate paths depending on the order they arrive at router A.

9. What metric does the RIP routing protocol consider to be infinity? 0 15 16 224 255

10. What does the RIP holddown timer do? ensures an invalid route has a metric of 15 prevents a router from sending any updates after it has introduced a routing loop into the network ensures every new route is valid before sending an update instructs routers to ignore updates, for a specified time or event, about possible inaccessible routes

11. What is a routing loop?

a packet bouncing back and forth between two loopback interfaces on a route a condition where a return path from a destination is different from the outbound path forming a "loop" a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destination the distribution of routes from one routing protocol into another

12. Which three routing protocols are distance vector routing protocols? (Choose three). RIPv1 EIGRP OSPF IS-IS RIPv2

13. What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.) RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA. During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network. During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops. Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB. RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.

14. Which of the following methods does split horizon use to reduce incorrect routing information?

Routing updates are split in half to reduce the update time. Information learned from one source is not distributed back to that source. New route information must be learned from multiple sources to be accepted. The time between updates is split in half to speed convergence. New route information is suppressed until the system has converged.

15. Which event will cause a triggered update? an update routing timer expires a corrupt update message is received a route is installed in the routing table the network is converged

16. A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion and must respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (Choose two.) EIGRP uses periodic updates. EIGRP only updates affected neighbors. EIGRP uses broadcast updates. EIGRP updates are partial. EIGRP uses the efficient Bellman-Ford algorithm.

17. Which of the following statements are correct about RIP? uses a broadcast to update all other routers in the network every 60 seconds uses a multicast address to update other routers every 90 seconds

will send out an update if there is a failure of a link updates only contain information about routes that have changed since last update

18. Which statement is true regarding ciscos RIP_JITTER variable? It prevents the synchronization of routing updates by buffering the updates as they leave the router interface It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of the specified interval time from the next routing update It prevents the synchronization of routing updates by causing the router to skip every other scheduled update time It prevents the synchronization of routing updates by forcing the router to listen when its time for other updates on the lines before sending it

19. What is the purpose of the TTL field in the IP header? used to mark routes as unreachable in updates sent to other routers prevents regular update messages from reinstating a route that may have gone bad prevents a router from advertising a network through the interface from which the update came limits the time or hops that a packet can traverse through the network before it should be discarded defines a maximum metric value for each distance vector routing protocol by setting a maximum hop count

20. Which two statements are true regarding the function of the RIPv1 routing updates? (Choose two). updates are broadcast only when there are changes to the topology updates are broadcast at regular intervals broadcast are sent to 0.0.0.0

broadcasts are sent to 255.255.255.255 updates contain the entire network topology only changes are included in the updates

21. Which of the following can exist in a distance vector network that has not converged? (Choose three). routing loops inconsistent traffic forwarding no traffic forwarding until system converges inconsistent routing table entries Routing table updates sent to wrong destinations.

Potrebbero piacerti anche