• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/248

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

248 Cards in this Set

  • Front
  • Back
A. It has more than one interface that is connected to the root network segment.B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.C. It has a higher MAC address than the elected root bridge.D. It has a higher brid...

A. It has more than one interface that is connected to the root network segment.


B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.


C. It has a higher MAC address than the elected root bridge.


D. It has a higher bridge ID than the elected root bridge.

It has a higher bridge ID than the elected root bridge.

Refer to the exhibit. Which switch provides the spanning-tree designated port role for the networksegment that services the printers?

Refer to the exhibit. Which switch provides the spanning-tree designated port role for the networksegment that services the printers?

Switch 3

A. Switch3, port fa0/1  
B. Switch3, port fa0/12C. Switch4, port fa0/11D. Switch4, port fa0/2 
E. Switch3, port Gi0/1
F. Switch3, port Gi0/2

A. Switch3, port fa0/1


B. Switch3, port fa0/12


C. Switch4, port fa0/11


D. Switch4, port fa0/2


E. Switch3, port Gi0/1


F. Switch3, port Gi0/2

Switch4, port fa0/11

A. This switch has more than one interface connected to the root network segment in VLAN 2. 
B. This switch is running RSTP while the elected designated switch is running 802.1d SpanningTree. 
C. This switch interface has a higher path cost to the...

A. This switch has more than one interface connected to the root network segment in VLAN 2.


B. This switch is running RSTP while the elected designated switch is running 802.1d SpanningTree.


C. This switch interface has a higher path cost to the root bridge than another in the topology.


D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch.

This switch interface has a higher path cost to the root bridge than another in the topology.

Which two of these statements regarding RSTP are correct? (Choose two.)


A. RSTP cannot operate with PVST+.


B. RSTP defines new port roles.


C. RSTP defines no new port states.


D. RSTP is a proprietary implementation of IEEE 802.1D STP.


E. RSTP is compatible with the original IEEE 802.1D STP.

RSTP defines new port roles.




RSTP is compatible with the original IEEE 802.1D STP.

Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three ofthese show the correct RSTP port roles for the indicated s...

Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three ofthese show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)




A. SwitchA, Fa0/2, designated


B. SwitchA, Fa0/1, root


C. SwitchB, Gi0/2, root


D. SwitchB, Gi0/1, designated


E. SwitchC, Fa0/2, root


F. SwitchD, Gi0/2, root

SwitchA, Fa0/2, designated




SwitchA, Fa0/1, root




SwitchD, Gi0/2, root



Which port state is introduced by Rapid-PVST?


A. learning


B. listening


C. discarding


D. forwarding

discarding

Which two states are the port states when RSTP has converged? (Choose two.)




A. discarding


B. listening


C. learning


D. forwarding


E. disabled

discarding


forwarding

Which three statements about RSTP are true? (Choose three.)




A. RSTP significantly reduces topology reconverging time after a link failure.


B. RSTP expands the STP port roles by adding the alternate and backup roles.


C. RSTP port states are blocking, discarding, learning, or forwarding.


D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.


E. RSTP also uses the STP proposal-agreement sequence.


F. RSTP uses the same timer-based process as STP on point-to-point links.

RSTP significantly reduces topology reconverging time after a link failure.




RSTP expands the STP port roles by adding the alternate and backup roles.




RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

At which layer of the OSI model is RSTP used to prevent loops?


A. physical


B. data link


C. network


D. transport

data link

What is one benefit of PVST+?




A. PVST+ supports Layer 3 load balancing without loops.


B. PVST+ reduces the CPU cycles for all the switches in the network.


C. PVST+ allows the root switch location to be optimized per VLAN.


D. PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.

PVST+ allows the root switch location to be optimized per VLAN.

Which three statements are typical characteristics of VLAN arrangements? (Choose three.)




A. A new switch has no VLANs configured.


B. Connectivity between VLANs requires a Layer 3 device.


C. VLANs typically decrease the number of collision domains.


D. Each VLAN uses a separate address space.E. A switch maintains a separate bridging table for each VLAN.


F. VLANs cannot span multiple switches.

Connectivity between VLANs requires a Layer 3 device.




Each VLAN uses a separate address space.




A switch maintains a separate bridging table for each VLAN.

A. All ports will be in a state of discarding, learning, or forwarding. 
B. Thirty VLANs have been configured on this switch. 
C. The bridge priority is lower than the default value for spanning tree. 
D. All interfaces that are shown are on s...

A. All ports will be in a state of discarding, learning, or forwarding.


B. Thirty VLANs have been configured on this switch.


C. The bridge priority is lower than the default value for spanning tree.


D. All interfaces that are shown are on shared media.


E. All designated ports are in a forwarding state.


F. This switch must be the root bridge for all VLANs on this switch.

All ports will be in a state of discarding, learning, or forwarding.




The bridge priority is lower than the default value for spanning tree.




All designated ports are in a forwarding state.

Which term describes a spanning-tree network that has all switch ports in either the blocking orforwarding state?




A. converged


B. redundant


C. provisioned


D. spanned

Converged

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other. 
B. The hosts in all VLANs on the two switches will be able to communicate with each other. 
C. Only the hosts in VLAN 10 and VLAN 15 on the two switch...

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other.


B. The hosts in all VLANs on the two switches will be able to communicate with each other.


C. Only the hosts in VLAN 10 and VLAN 15 on the two switches will be able to communicate witheach other.


D. Hosts will not be able to communicate between the two switches.

Hosts will not be able to communicate between the two switches.


Router(config)# interface fastethernet 0/0Router(config-if)# no shut downRouter(config)# interface fastethernet 0/0.1Router(config-subif)# encapsulation dot1q 10Router(config-subif)# ip address 192.168.10.1 255.255.255.0Router(config)# interface fastethernet 0/0.2Router(config-subif)# encapsulation dot1q 20Router(config-subif)# ip address 192.168.20.1 255.255.255.0





Switch1(config)# interface fastethernet 0/1Switch1(config-if)# switchport mode trunk

A. Host E and host F use the same IP gateway address. 
B. Router1 and Switch2 should be connected via a crossover cable. 
C. Router1 will not play a role in communications between host A and host D. 
D. The FastEthernet 0/0 interface on Router...

A. Host E and host F use the same IP gateway address.


B. Router1 and Switch2 should be connected via a crossover cable.


C. Router1 will not play a role in communications between host A and host D.


D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.


E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.


F. The FastEthernet 0/0 interface on Router1 and the FastEthernet 0/1 interface on Switch2 trunkports must be configured using the same encapsulation type.

The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.




The FastEthernet 0/0 interface on Router1 and the FastEthernet 0/1 interface on Switch2 trunk ports must be configured using the same encapsulation type.

Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)




A. 802.1Q native VLAN frames are untagged by default.


B. 802.1Q trunking ports can also be secure ports.


C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.


D. 802.1Q trunks require full-duplex, point-to-point connectivity.


E. 802.1Q trunks should have native VLANs that are the same at both ends.

802.1Q native VLAN frames are untagged by default.




802.1Q trunks can use 10 Mb/s Ethernet interfaces.




02.1Q trunks should have native VLANs that are the same at both ends

Which two statements describe the process identifier that is used in the command to configureOSPF on a router? (Choose two.)Router(config)# router ospf 1




A. All OSPF routers in an area must have the same process ID.


B. Only one process number can be used on the same router.


C. Different process identifiers can be used to run multiple OSPF processes


D. The process number can be any number from 1 to 65,535.


E. Hello packets are sent to each neighbor to determine the processor identifier.

Different process identifiers can be used to run multiple OSPF processes




The process number can be any number from 1 to 65,535.





Refer to the exhibit. RTA is configured with a basic configuration. The link between the two routers
is operational and no routing protocols are configured on either router. The line shown in the
exhibit is then added to router RTA. Should inte...

Refer to the exhibit. RTA is configured with a basic configuration. The link between the two routersis operational and no routing protocols are configured on either router. The line shown in theexhibit is then added to router RTA. Should interface Fa0/0 on router RTB shut down, what effectwill the shutdown have on router RTA?




A. A route to 172.16.14.0/24 will remain in the RTA routing table.


B. A packet to host 172.16.14.225 will be dropped by router RTA.


C. Router RTA will send an ICMP packet to attempt to verify the route.


D. Because router RTB will send a poison reverse packet to router RTA, RTA will remove the route.

A route to 172.16.14.0/24 will remain in the RTA routing table.

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)




A. Administratively shut down the interface.


B. Physically secure the interface.


C. Create an access list and apply it to the virtual terminal interfaces with the access-groupcommand.


D. Configure a virtual terminal password and login process.


E. Enter an access list and apply it to the virtual terminal interfaces using the access-classcommand.

Configure a virtual terminal password and login process.




Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the
192.168.10.192/26 LAN be forwarded to 192.168.10.1?

A. The router will forward packets from R3 to R2 to R1. 
B. The router will forward packets...

Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?




A. The router will forward packets from R3 to R2 to R1.


B. The router will forward packets from R3 to R1 to R2.


C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.


D. The router will forward packets from R3 to R1.

The router will forward packets from R3 to R2 to R1 AND from R3 to R1.

Refer to the exhibit. What information about the interfaces on the Main_Campus router is true?
A. The LAN interfaces are configured on different subnets. 
B. Interface FastEthernet 0/0 is configured as a trunk.
C. The Layer 2 protocol of interf...

Refer to the exhibit. What information about the interfaces on the Main_Campus router is true?


A. The LAN interfaces are configured on different subnets.


B. Interface FastEthernet 0/0 is configured as a trunk.C. The Layer 2 protocol of interface Serial 0/1 is NOT operational.


D. The router is a modular router with five FastEthernet interfaces.


E. Interface FastEthernet 0/0 is administratively deactivated.



Interface FastEthernet 0/0 is configured as a trunk.

A. These commands need to be added to the configuration:
C-router(config)# router eigrp 123 C-router(config-router)# network 172.19.0.0
B. These commands need to be added to the configuration:
C-router(config)# router ospf 1
C-router(config-ro...

A. These commands need to be added to the configuration:C-router(config)# router eigrp 123 C-router(config-router)# network 172.19.0.0


B. These commands need to be added to the configuration:C-router(config)# router ospf 1C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0


C. These commands need to be added to the configuration:C-router(config)# router ripC-router(config-router)# network 172.19.0.0


D. No further routing configuration is required.

No further routing configuration is required.

A. Any packet destined for a network that is not directly connected to router R1 will be dropped. 
B. Any packet destined for a network that is not directly connected to router R2 will be dropped
immediately.
C. Any packet destined for a netwo...

A. Any packet destined for a network that is not directly connected to router R1 will be dropped.


B. Any packet destined for a network that is not directly connected to router R2 will be droppedimmediately.C. Any packet destined for a network that is not directly connected to router R2 will be droppedimmediately because of the lack of a gateway on R1.


D. The networks directly connected to router R2 will not be able to communicate with the172.16.100.0, 172.16.100.128, and 172.16.100.64 subnetworks.


E. Any packet destined for a network that is not referenced in the routing table of router R2 willbe directed to R1. R1 will then send that packet back to R2 and a routing loop will occur.

Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1. R1 will then send that packet back to R2 and a routing loop will occur.

A. Router R2 will not form a neighbor relationship with R1.
B. Router R2 will obtain a full routing table, including a default route, from R1. 
C. R2 will obtain OSPF updates from R1, but will not obtain a default route from R1.
D. R2 will not...

A. Router R2 will not form a neighbor relationship with R1.B. Router R2 will obtain a full routing table, including a default route, from R1.


C. R2 will obtain OSPF updates from R1, but will not obtain a default route from R1.D. R2 will not have a route for the directly connected serial network, but all other directlyconnected networks will be present, as well as the two Ethernet networks connected to R1.

A. Router R2 will not form a neighbor relationship with R1.

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the
graphic. There is concern that a lack of router resources is impeding internetwork performance. As
part of examining the router resources, the OSPF DR...

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in thegraphic. There is concern that a lack of router resources is impeding internetwork performance. Aspart of examining the router resources, the OSPF DRs need to be known. All the router OSPFpriorities are at the default and the router IDs are shown with each router. Which routers are likelyto have been elected as DR? (Choose two.)

Corp-4
Branch-2

What are three characteristics of the OSPF routing protocol? (Choose three.)




A. It converges quickly.


B. OSPF is a classful routing protocol.


C. It uses cost to determine the best route.


D. It uses the DUAL algorithm to determine the best route.


E. OSPF routers send the complete routing table to all directly attached routers.


F. OSPF routers discover neighbors before exchanging routing information.

It converges quickly




Uses cost to determine the best route




OSPF routers discover neighbors before


exchanging routing information.

Which statement is true, as relates to classful or classless routing?




A. Classful routing protocols send the subnet mask in routing updates.


B. RIPv1 and OSPF are classless routing protocols.


C. Automatic summarization at classful boundaries can cause problems on discontiguous subnets.


D. EIGRP and OSPF are classful routing protocols and summarize routes by default.

Automatic summarization at classful boundaries can cause problems on discontiguous subnets.

Which parameter or parameters are used to calculate OSPF cost in Cisco routers?




A. Bandwidth


B. Bandwidth and Delay


C. Bandwidth, Delay, and MTU


D. Bandwidth, MTU, Reliability, Delay, and Load

Bandwidth

Which statements are true about EIGRP successor routes? (Choose two.)




A. A successor route is used by EIGRP to forward traffic to a destination.


B. Successor routes are saved in the topology table to be used if the primary route fails.


C. Successor routes are flagged as 'active' in the routing table.


D. A successor route may be backed up by a feasible successor route.E. Successor routes are stored in the neighbor table following the discovery process.

A successor route is used by EIGRP to forward traffic to a destination.




A successor route may be backed up by a feasible successor route. E. Successor routes are stored in the neighbor table following the discovery process.

A. Core(config-router)# default-information originate
Core(config-router)# network 10.0.0.0 0.255.255.255 area 0
Core(config-router)# exit
Core(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14 
B. Core(config-router)# default-information originat...

A. Core(config-router)# default-information originateCore(config-router)# network 10.0.0.0 0.255.255.255 area 0Core(config-router)# exitCore(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14


B. Core(config-router)# default-information originateCore(config-router)# network 10.10.2.13 0.0.0.242 area 0Core(config-router)# exitCore(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14


C. Core(config-router)# default-information originateCore(config-router)# network 10.10.2.16 0.0.0.15 area 0Core(config-router)# exitCore(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14


D. Core(config-router)# default-information originateCore(config-router)# network 10.10.2.32 0.0.0.31 area 0Core(config-router)# exitCore(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14

Core(config-router)# default-information originateCore(config-router)# network 10.10.2.16 0.0.0.15 area 0Core(config-router)# exitCore(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14

A. It ensures that data will be forwarded by Router B.  
B. It provides stability for the OSPF process on RouterB. 
C. It specifies that the router ID for RouterB should be 10.0.0.1. 
D. It decreases the metric for routes that are advertised ...

A. It ensures that data will be forwarded by Router B.


B. It provides stability for the OSPF process on RouterB.


C. It specifies that the router ID for RouterB should be 10.0.0.1.


D. It decreases the metric for routes that are advertised from RouterB.


E. It indicates that RouterB should be elected the DR for the LAN.

It provides stability for the OSPF process on RouterB.




It specifies that the router ID for RouterB should be 10.0.0.1.

What is the default maximum number of equal-cost paths that can be placed into the routing tableof a Cisco OSPF router?




A. 2


B. 4


C. 16


D. unlimited

4

Which parameter would you tune to affect the selection of a static route as a backup, when adynamic protocol is also being used?




A. hop count


B. administrative distance


C. link bandwidth


D. link delay


E. link cost

administrative distance

What are two drawbacks of implementing a link-state routing protocol? (Choose two.)






A. the sequencing and acknowledgment of link-state packets


B. the requirement for a hierarchical IP addressing scheme for optimal functionality


C. the high volume of link-state advertisements in a converged network


D. the high demand on router resources to run the link-state routing algorithm


E. the large size of the topology table listing all advertised routes in the converged network

the requirement for a hierarchical IP addressing scheme for optimal functionality




the high demand on router resources to run the link-state routing algorithm

Which two are advantages of static routing when compared to dynamic routing? (Choose two.)




A. Configuration complexity decreases as network size increases.


B. Security increases because only the network administrator may change the routing table.


C. Route summarization is computed automatically by the router.


D. Routing tables adapt automatically to topology changes.


E. An efficient algorithm is used to build routing tables, using automatic updates.


F. Routing updates are automatically sent to neighbors.


G. Routing traffic load is reduced when used in stub network links.

Security increases because only the network administrator may change the routing table.




Routing traffic load is reduced when used in stub network links.

A router is running three routing processes: RIP, OSPF, and EIGRP, each configured with defaultcharacteristics. Each process learns a route to the same remote network. If there are no staticroutes to the destination and none of the routes were redistributed, which route will be placed inthe IP routing table?






A. the route learned through EIGRP


B. the route learned through OSPF


C. the route learned through RIP


D. the route with the lowest metric


E. all three routes with the router load balancing

The route learned through EIGRP

A. 10.1.1.2 
B. 10.154.154.1
C. 172.16.5.1
D. 192.168.5.3

A. 10.1.1.2


B. 10.154.154.1


C. 172.16.5.1


D. 192.168.5.3

172.16.5.1

A. Corp-1 
B. Corp-2 
C. Corp-3 
D. Corp-4 
E. Branch-1 
F. Branch-2

A. Corp-1


B. Corp-2


C. Corp-3


D. Corp-4


E. Branch-1


F. Branch-2

Corp-4


Branch-2

What does a router do if it has no EIGRP feasible successor route to a destination network and thesuccessor route to that destination network is in active status?




A. It routes all traffic that is addressed to the destination network to the interface indicated in therouting table.


B. It sends a copy of its neighbor table to all adjacent routers.


C. It sends a multicast query packet to all adjacent neighbors requesting available routing pathsto the destination network.


D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.

A. O 208.149.23.64 [110/13] via 190.173.23.10, 00:00:07, FastEthernet 0/0
O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0 
B. O 208.149.23.64 [110/1] via 190.172.23.10, 00:00:07, Serial 1/0
O 208.149.23.96 [110/3] via 19...

A. O 208.149.23.64 [110/13] via 190.173.23.10, 00:00:07, FastEthernet 0/0O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0


B. O 208.149.23.64 [110/1] via 190.172.23.10, 00:00:07, Serial 1/0O 208.149.23.96 [110/3] via 190.173.23.10, 00:00:16, FastEthernet 0/0


C. O 208.149.23.64 [110/13] via 190.172.23.10, 00:00:07, Serial 1/0O 208.149.23.96 [110/13] via 190.172.23.10, 00:00:16, Serial 1/0O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0


D. O 208.149.23.64 [110/3] via 190.172.23.10, 00:00:07, Serial 1/0O 208.149.23.96 [110/3] via 190.172.23.10, 00:00:16, Serial 1/0

O 208.149.23.64 [110/13] via 190.173.23.10, 00:00:07, FastEthernet 0/0O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0

Which command is used to display the collection of OSPF link states?




A. show ip ospf link-state


B. show ip ospf lsa database


C. show ip ospf neighbors


D. show ip ospf database

show ip ospf database

What is the default administrative distance of OSPF?

110

A. AS numbers must be changed to match on all the routers. 
B. Loopback interfaces must be configured so a DR is elected. 
C. The no auto-summary command is needed on Router A and Router C. 
D. Router B needs to have two network statements, on...

A. AS numbers must be changed to match on all the routers.


B. Loopback interfaces must be configured so a DR is elected.


C. The no auto-summary command is needed on Router A and Router C.


D. Router B needs to have two network statements, one for each connected network.

AS numbers must be changed to match on all the routers

A. The router will drop the packet. 
B. The router will return the packet to its source. 
C. The router will forward the packet via Serial2.
D. The router will forward the packet via either Serial0 or Serial1.

A. The router will drop the packet.


B. The router will return the packet to its source.


C. The router will forward the packet via Serial2.


D. The router will forward the packet via either Serial0 or Serial1.

The router will forward the packet via Serial2.

Refer to the exhibit. The Lakeside Company has the internetwork in the exhibit. The administrator
would like to reduce the size of the routing table on the Central router. Which partial routing table
entry in the Central router represents a rou...

Refer to the exhibit. The Lakeside Company has the internetwork in the exhibit. The administratorwould like to reduce the size of the routing table on the Central router. Which partial routing tableentry in the Central router represents a route summary that represents the LANs in Phoenix but noadditional subnets?

10.0.0.0/22 is subnetted, 1 subnetsD 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

What information does a router running a link-state protocol use to build and maintain itstopological database? (Choose two.)




A. hello packets


B. SAP messages sent by other routers


C. LSAs from other routers


D. beacons received on point-to-point links


E. routing tables received from other link-state routers


F. TTL packets from designated routers

Hello packets


LSAs from other routers



Which commands are required to properly configure a router to run OSPF and to add network192.168.16.0/24 to OSPF area 0? (Choose two.)




A. Router(config)# router ospf 0


B. Router(config)# router ospf 1


C. Router(config)# router ospf area 0


D. Router(config-router)# network 192.168.16.0 0.0.0.255 0


E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0


F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0

Router(config)# router ospf 1




Router(config-router)# network 192.168.16.0 0.0.0.255 area 0

Which type of EIGRP route entry describes a feasible successor?




A. a backup route, stored in the routing table


B. a primary route, stored in the routing table


C. a backup route, stored in the topology tableD. a primary route, stored in the topology table

a backup route, stored in the topology table



Which command enables IPv6 forwarding on a Cisco router?




A. ipv6 local


B. ipv6 host


C. ipv6 unicast-routing


D. ipv6 neighbor

ipv6 unicast-routing

The following configuration is applied to a Layer 2 Switch:




interface fastethernet 0/4switchport mode accessswitchport port-securityswitchport port-security mac-address 0000.1111.1111switchport port-security maximum 2swithcport port-security




What is the result of the above configuration being applied to the switch?




A. A host with a mac address of 0000.1111.1111 and up to two other hosts can connect toFastEthernet 0/4 simultaneously


B. A host with a mac address of 0000.1111.1111 and one other host can connect to Fast Ethernet0/4 simultaneously


C. Violating addresses are dropped and no record of the violation is kept


D. The switch can send an SNMP message to the network management station


E. The port is effectively shutdown

A host with a mac address of 0000.1111.1111 and one other host can connect to Fast Ethernet 0/4 simultaneously




The switch can send an SNMP message to the network management station

A. port enabled; unknown packets dropped; no SNMP or syslog messages 
B. port enabled; unknown packets dropped; SNMP or syslog messages 
C. port disabled; no SNMP or syslog messages 
D. port disabled; SNMP or syslog messages

A. port enabled; unknown packets dropped; no SNMP or syslog messages


B. port enabled; unknown packets dropped; SNMP or syslog messages


C. port disabled; no SNMP or syslog messages


D. port disabled; SNMP or syslog messages

port disabled; SNMP or syslog messages

A. Send an SNMP trap. 
B. Send a syslog message. 
C. Increment the Security Violation counter. 
D. Forward the traffic.
E. Write the MAC address to the startup-config. 
F. Shut down the port.

A. Send an SNMP trap.


B. Send a syslog message.


C. Increment the Security Violation counter.


D. Forward the traffic.E. Write the MAC address to the startup-config.


F. Shut down the port.

Send an SNMP trap


Send a syslog message


Increment the security violation counter`

A. One interface has a problem. 
B. Two interfaces have problems. 
C. The interfaces are functioning correctly.
D. The operational status of the interfaces cannot be determined from the output shown.

A. One interface has a problem.


B. Two interfaces have problems.


C. The interfaces are functioning correctly.D. The operational status of the interfaces cannot be determined from the output shown.

The interfaces are functioning correctly

A. The cable that is connected to S0/0 on RouterA is faulty. 
B. Interface S0/0 on RouterB is administratively down. 
C. Interface S0/0 on RouterA is configured with an incorrect subnet mask. 
D. The IP address that is configured on S0/0 of Ro...

A. The cable that is connected to S0/0 on RouterA is faulty.


B. Interface S0/0 on RouterB is administratively down.


C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.


D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet.


E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation thatis configured on S0/0 of RouterA.

Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.




The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.

A. 2 
B. 3 
C. 4 
D. 5 
E. 6 
F. 7

A. 2


B. 3


C. 4


D. 5


E. 6


F. 7

4




Other answer




Network converge question:


hello packets every 10 seconds




Prevent load balancing question:


R2(config-if)#bandwidth


R2(config-if)#ip ospf cost




R1 default config question:


192.168.0.1

Dubai#sh frame-relay map




Layer 2 address for frame forwarded to Dubai 172.30.4.4:




694




Default encapsulation:


Serial connection to the North branch office




Static map to S-AMER command:


frame-relay map ip 172.30.0.3 825 broadcast

Which two options are valid WAN connectivity methods? (Choose two.)




A. PPP


B. WAP


C. DSL


D. L2TPv3


E. Ethernet

PPP


DSL

Refer to the exhibit. Which WAN protocol is being used?

Refer to the exhibit. Which WAN protocol is being used?

Frame Relay

What occurs on a Frame Relay network when the CIR is exceeded?




A. All TCP traffic is marked discard eligible.


B. All UDP traffic is marked discard eligible and a BECN is sent.


C. All TCP traffic is marked discard eligible and a BECN is sent.


D. All traffic exceeding the CIR is marked discard eligible.

All traffic exceeding the CIR is marked discard eligible.

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)




A. They create split-horizon issues.


B. They require a unique subnet within a routing domain.


C. They emulate leased lines.


D. They are ideal for full-mesh topologies.


E. They require the use of NBMA options when using OSPF.

They require a unique subnet within a routing domain.


They emulate leased lines.

Which two statements about using the CHAP authentication mechanism in a PPP link are true?(Choose two.)




A. CHAP uses a two-way handshake.


B. CHAP uses a three-way handshake.


C. CHAP authentication periodically occurs after link establishment.


D. CHAP authentication passwords are sent in plaintext.


E. CHAP authentication is performed only upon link establishment.


F. CHAP has no protection from playback attacks.

CHAP uses a three-way handshake.




CHAP authentication periodically occurs after link establishment.

Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?




A. show frame-relay lmi


B. show frame-relay map


C. show frame-relay pvc


D. show interfaces serial

show frame-relay map

What is the purpose of Inverse ARP?




A. to map a known IP address to a MAC addressB. to map a known DLCI to a MAC address


C. to map a known MAC address to an IP address


D. to map a known DLCI to an IP address


E. to map a known IP address to a SPIDF. to map a known SPID to a MAC address

to map a known DLCI to an IP address

A network associate has configured OSPF with the command:
City(config-router)# network 192.168.12.64 0.0.0.63 area 0
After completing the configuration, the associate discovers that not all the interfaces are
participating in OSPF. Which three...

A network associate has configured OSPF with the command:City(config-router)# network 192.168.12.64 0.0.0.63 area 0After completing the configuration, the associate discovers that not all the interfaces areparticipating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPFaccording to this configuration statement? (Choose three.)




A. FastEthernet0 /0


B. FastEthernet0 /1


C. Serial0/0


D. Serial0/1.102


E. Serial0/1.103


F. Serial0/1.104

FastEthernet0 /1


Serial0/0


Serial0/1.102

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces whenconfiguring a Frame Relay hub in a hub-and-spoke topology?




A. It avoids split-horizon issues with distance vector routing protocols.


B. IP addresses can be conserved if VLSM is not being used for subnetting.


C. A multipoint interface offers greater security compared to point-to-point subinterfaceconfigurations.


D. The multiple IP network addresses required for a multipoint interface provide greateraddressing flexibility over point-to-point configurations.

IP addresses can be conserved if VLSM is not being used for subnetting.

Which two statistics appear in show frame-relay map output? (Choose two.)




A. the number of BECN packets that are received by the router


B. the value of the local DLCI


C. the number of FECN packets that are received by the router


D. the status of the PVC that is configured on the router


E. the IP address of the local router

The value of the local DLCI


the status of the PVC that is configured on the router

Which protocol is an open standard protocol framework that is commonly used in VPNs, to providesecure end-to-end communications?




A. RSA


B. L2TP


C. IPsec


D. PPTP

IPsec

At which layer of the OSI model does PPP perform?






A. Layer 2


B. Layer 3


C. Layer 4


D. Layer 5

Layer 2

The command show frame-relay map gives the following output:Serial 0 (up): ip 192.168.151.4 dlci 122, dynamic, broadcast, status defined, activeWhich statements represent what is shown? (Choose three.)




A. 192.168.151.4 represents the IP address of the remote router


B. 192.168.151.4 represents the IP address of the local serial interface


C. DLCI 122 represents the interface of the remote serial interface
D. DLCI 122 represents the local number used to connect to the remote address


E. broadcast indicates that a dynamic routing protocol such as RIP v1 can send packets across thisPVC


F. active indicates that the ARP process is working



192.168.151.4 represents the IP address of the remote router


DLCI 122 represents the local number used to connect to the remote address


broadcast indicates that a dynamic routing protocol such as RIP v1 can send packets across this PVC

What can be done to Frame Relay to resolve split-horizon issues? (Choose two.)




A. Disable Inverse ARP.


B. Create a full-mesh topology.


C. Develop multipoint subinterfaces.


D. Configure point-to-point subinterfaces.


E. Remove the broadcast keyword from the frame-relay map command.

Create a full-mesh topology


Configure point-to-point subinterfaces

What are three reasons that an organization with multiple branch offices and roaming users mightimplement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)




A. reduced cost


B. better throughput


C. broadband incompatibility


D. increased security


E. scalability


F. reduced latency

reduced cost


increased security


scalability

Which command is used to enable CHAP authentication, with PAP as the fallback method, on aserial interface?




A. Router(config-if)# ppp authentication chap fallback ppp


B. Router(config-if)# ppp authentication chap pap


C. Router(config-if)# authentication ppp chap fallback ppp


D. Router(config-if)# authentication ppp chap pap

Router(config-if)# ppp authentication chap pap

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?




A. defines the destination IP address that is used in all broadcast packets on DCLI 202


B. defines the source IP address that is used in all broadcast packets on DCLI 202


C. defines the DLCI on which packets from the 192.168.1.2 IP address are received


D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits andhas built-in security mechanisms?




A. HDLC


B. PPP


C. X.25


D. Frame Relay

PPP

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?


A. IETF


B. ANSI Annex D


C. Q9333-A Annex A


D. HDLC

IETF

A network administrator needs to configure a serial link between the main office and a remotelocation. The router at the remote office is a non-Cisco router. How should the networkadministrator configure the serial interface of the main office router to make the connection?

Main(config)# interface serial 0/0Main(config-if)# ip address 172.16.1.1 255.255.255.252Main(config-if)# encapsulation pppMain(config-if)# no shut

Which PPP subprotocol negotiates authentication options?




A. NCP


B. ISDN


C. SLIP


D. LCP


E. DLCI

LCP

What command is used to verify the DLCI destination address in a Frame Relay static configuration?




A. show frame-relay pvc


B. show frame-relay lmi


C. show frame-relay map


D. show frame relay end-to-end

show frame-relay map

The output of the show frame-relay pvc command shows "PVC STATUS = INACTIVE". What doesthis mean?




A. The PVC is configured correctly and is operating normally, but no data packets have beendetected for more than five minutes.


B. The PVC is configured correctly, is operating normally, and is no longer actively seeking theaddress of the remote router.


C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic totrigger a call to the remote router.


D. The PVC is configured correctly on the local switch, but there is a problem on the remote endof the PVC.


E. The PVC is not configured on the local switch.

The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.

A. The serial cable on R1 needs to be replaced. 
B. The interfaces on R2 are not configured properly. 
C. R1 has no route to the 192.168.1.128 network. 
D. The IP addressing scheme has overlapping subnetworks. 
E. The ip subnet-zero command m...

A. The serial cable on R1 needs to be replaced.


B. The interfaces on R2 are not configured properly.


C. R1 has no route to the 192.168.1.128 network.


D. The IP addressing scheme has overlapping subnetworks.


E. The ip subnet-zero command must be configured on both routers.

R1 has no route to the 192.168.1.128 network.

What does the frame-relay interface-dlci command configure?




A. local DLCI on the subinterface


B. remote DLCI on the main interface


C. remote DCLI on the subinterface


D. local DLCI on the main interface

local DLCI on the subinterface

A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable. 
B. The R10-1 router can ping the router interface connected to the serial 0/1 interface.
C. The clock rate used for interface serial 0/1 of the R10-1 router ...

A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable.


B. The R10-1 router can ping the router interface connected to the serial 0/1 interface.


C. The clock rate used for interface serial 0/1 of the R10-1 router is 1,544,000 bits per second.


D. The CSU used with the serial 0/1 interface of the R10-1 router has lost connection to the serviceprovider.


E. The interface of the remote router connected to the serial 0/1 interface of the R10-1 router isusing the default serial interface encapsulation.

The interface of the remote router connected to the serial 0/1 interface of the R10-1 router is using the default serial interface encapsulation.

SwitchX(config)# interface fastethernet 0/1SwitchX(config-if)# switchport mode trunk

A. Host E and host F use the same IP gateway address. 
B. Router1 and Switch2 should be connected via a crossover cable.
C. Router1 will not play a role in communications between host A and host D. 
D. The FastEthernet 0/0 interface on Router1 ...

A. Host E and host F use the same IP gateway address.


B. Router1 and Switch2 should be connected via a crossover cable.


C. Router1 will not play a role in communications between host A and host D.


D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.


E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in theexhibit.


F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configuredusing the same encapsulation type.

The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.




The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

A department decides to replace its hub with a Catalyst 2950 switch that is no longer neededby another department. To prepare the switch for installation, the network administrator haserased the startup configuration and reloaded the switch. However, PCs that are connected tothe switch experience various connectivity problems. What is a possible cause of the problem?




A. The VLAN database was not erased.


B. The management VLAN is disabled.


C. The running configuration should have been erased.


D. The "mode" button was not pressed when the switch was reloaded.


E. The switch was not configured with an IP address or a default gateway.

The VLAN database was not erased

Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?

  A. It has more than one interface that is connected to the root network segment. 
B. It is running RSTP while the elected root bridge is running 802.1d sp...

Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?




A. It has more than one interface that is connected to the root network segment.


B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.


C. It has a higher MAC address than the elected root bridge.


D. It has a higher bridge ID than the elected root bridge.

It has a higher bridge ID than the elected root bridge.

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B. Only host A will be allowed to transmit frames on fa0/1. 
C. This frame will be discarded when it is received by 2950Switch. 
D. All frames arriving on 2950...

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.B. Only host A will be allowed to transmit frames on fa0/1.


C. This frame will be discarded when it is received by 2950Switch.


D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwardedout fa0/1.


E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches willnot be forwarded out fa0/1.F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch,will be forwarded out fa0/1.

Only host A will be allowed to transmit frames on fa0/1.




All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwardedout fa0/1.

Which two of these statements regarding RSTP are correct? (Choose two.)




A. RSTP cannot operate with PVST+.


B. RSTP defines new port roles.


C. RSTP defines no new port states.


D. RSTP is a proprietary implementation of IEEE 802.1D STP.


E. RSTP is compatible with the original IEEE 802.1D STP.

RSTP defines new port roles


RSTP is compatible with the originnal IEEE 802.1D STP.

Refer to exhibit. A network administrator cannot establish a Telnet session with the indicatedrouter. What is the cause of this failure?




A. A Level 5 password is not set.


B. An ACL is blocking Telnet access.


C. The vty password is missing.


D. The console password is missing.

VTY password is missing

A network administrator needs to configure port security on a switch. Which two statementsare true? (Choose two.)




A. The network administrator can apply port security to dynamic access ports.


B. The network administrator can apply port security to EtherChannels.


B. When dynamic MAC address learning is enabled on an interface, the switch can learn newaddresses, up to the maximum defined.C. The sticky learning feature allows the addition of dynamically learned addresses to therunning configuration.


D. The network administrator can configure static secure or sticky secure MAC addresses inthe voice VLAN.

The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.


The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.

What are two characteristics of a switch that is configured as a VTP client? (Choose two.)




A. If a switch that is configured to operate in client mode cannot access a VTP server, thenthe switch reverts to transparent mode.


B. On switches that are configured to operate in client mode, VLANs can be created, deleted,or renamed locally.


C. The local VLAN configuration is updated only when an update that has a higherconfiguration revision number is received.


D. VTP advertisements are not forwarded to neighboring switches that are configured in VTPtransparent mode.


E. VTP client is the default VTP mode.


F. When switches in VTP client mode are rebooted, they send a VTP advertisement requestto the VTP servers.

The local VLAN configuration is updated only when an update that has a higher configuration revision number is received.




When switches in VTP client mode are rebooted, they send a VTP advertisement request to the VTP servers.

At which layer of the OSI model is RSTP used to prevent loops?




A. physical


B. data link


C. network


D. transport

Data link



Which protocol provides a method of sharing VLAN configuration information between twoCisco switches?




A. STP


B. VTP


C. 802.1Q


D. RSTP

VTp

A. 10.0.0.0 /21 
B. 10.0.0.0 /22 
C. 10.0.0.0 /23 
D. 10.0.0.0 /24

A. 10.0.0.0 /21


B. 10.0.0.0 /22


C. 10.0.0.0 /23


D. 10.0.0.0 /24

10.0.0.0 /22

The network administrator has been asked to give reasons for moving from IPv4 to IPv6. Whatare two valid reasons for adopting IPv6 over IPv4? (Choose two.)




A. no broadcast


B. change of source address in the IPv6 headerC. change of destination address in the IPv6 header


D. Telnet access does not require a passwordE. autoconfiguration


F. NAT

no broadcast


auto configuration

The network technician is planning to use the 255.255.255.224 subnet mask on the network.Which three valid IP addresses can the technician use for the hosts? (Choose three.)




A. 172.22.243.127


B. 172.22.243.190


C. 172.22.243.191


D. 192.168.1.160


E. 10.17.64.34


F. 10.16.33.98

172.22.243.190


10.17.64.34


10.13.33.98

Which of these represents an IPv6 link-local address?




A. FE80::380e:611a:e14f:3d69


B. FE81::280f:512b:e14f:3d69


C. FEFE:0345:5f1b::e14d:3d69


D. FE08::280e:611:a:f14f:3d69

A. FE80::380e:611a:e14f:3d69

A. the use of summarization for discontiguous networks 
B. the use of CIDR with a routing protocol that does not support it 
C. the use of VLSM with a routing protocol that does not support it 
D. the use of the no auto-summary command with a ...

A. the use of summarization for discontiguous networks


B. the use of CIDR with a routing protocol that does not support it


C. the use of VLSM with a routing protocol that does not support it


D. the use of the no auto-summary command with a protocol that does not supportsummarization


E. the use of the ip route 0.0.0.0 0.0.0.0 command with a routing protocol that does notsupport it

the use of summarization for discontiguous networks

A. It ensures that data will be forwarded by RouterB. 
B. It provides stability for the OSPF process on RouterB. 
C. It specifies that the router ID for RouterB should be 10.0.0.1. 
D. It decreases the metric for routes that are advertised fro...

A. It ensures that data will be forwarded by RouterB.


B. It provides stability for the OSPF process on RouterB.


C. It specifies that the router ID for RouterB should be 10.0.0.1.


D. It decreases the metric for routes that are advertised from RouterB.


E. It indicates that RouterB should be elected the DR for the LAN.

It provides stability for the OSPF process on RouterB




It specifies that the router ID for RouterB should be 10.0.0.1.

What are three characteristics of the OSPF routing protocol? (Choose three.)




A. It converges quickly.


B. OSPF is a classful routing protocol.


C. It uses cost to determine the best route.


D. It uses the DUAL algorithm to determine the best route.


E. OSPF routers send the complete routing table to all directly attached routers.


F. OSPF routers discover neighbors before exchanging routing information.

Converges quickly


Uses cost to determine route


OSPF discovers neighbors before exchanging routing info

An administrator is troubleshooting a problem between routers that are using differentversions of RIP. Which two commands would provide information about which version of RIPwas being sent and received on an interface? (Choose two.)




A. show ip protocols


B. show ip route rip


C. show interfaces


D. debug rip routing


E. debug ip rip

show ip protocols


debug ip rip

Refer to the exhibit. You are connected to the router as user Mike. Which command allows
you to see output from the OSPF debug command?

A. terminal monitor 
B. show debugging 
C. show sessions 
D. show ip ospf interface

Refer to the exhibit. You are connected to the router as user Mike. Which command allowsyou to see output from the OSPF debug command?




A. terminal monitor


B. show debugging


C. show sessions


D. show ip ospf interface





terminal monitor

A. 10.16.176.1
B. 192.168.1.6 
C. 192.168.1.1 
D. 172.16.182.1

A. 10.16.176.1


B. 192.168.1.6


C. 192.168.1.1


D. 172.16.182.1

172.16.182.1

Refer to the exhibit. What is the result of setting the no login command?

A. Both SSH and Telnet access is denied. 
B. Both SSH and Telnet access requires a password.
 C. Both SSH and Telnet access requires a new password at first login. 
D. ...

Refer to the exhibit. What is the result of setting the no login command?




A. Both SSH and Telnet access is denied.


B. Both SSH and Telnet access requires a password.


C. Both SSH and Telnet access requires a new password at first login.


D. There is a virtually limitless supply of IP addresses.


E. All telnet and SSH connections will be allowed without a password.

There is a virtually limitless supply of IP addresses

What does the "Inside Global" address represent in the configuration of NAT?




A. the summarized address for all of the internal subnetted addresses


B. the MAC address of the router used by inside hosts to connect to the Internet


C. a globally unique, private IP address assigned to a host on the inside network


D. a registered address that represents an inside host to an outside network

a registered address that represents an inside host to an outside network

R1(config)# interface serial0/1R1(config-if)# ip nat outside




R1(config)# interface fastethernet0/0R1(config-if)# ip nat inside

Refer to the exhibit. A network technician enters the following lines into the router.
Tidmore1(config)# interface FastEthernet 0/0
Tidmore1(config-if)# no ip access-group 106 in
Tidmore1(config-if)# interface Serial 0/0
Tidmore1(config-if)# ...

Refer to the exhibit. A network technician enters the following lines into the router.Tidmore1(config)# interface FastEthernet 0/0Tidmore1(config-if)# no ip access-group 106 inTidmore1(config-if)# interface Serial 0/0Tidmore1(config-if)# ip access-group 106 out




A. The change has no effect on the packets being filtered.


B. All traffic from the 192.168.254.0 LAN to the Internet is permitted.


C. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.


D. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can telnet to hosts on theInternet.





The change has no effect on the packets being filtered.

Refer to the exhibit. Router4 can ping Router5 (172.16.6.5), but not Router7 (172.16.11.7).
There are no routing protocols running in any of the routers, and Router4 has Router6 as its
default gateway. What can be done to address this problem?
...

Refer to the exhibit. Router4 can ping Router5 (172.16.6.5), but not Router7 (172.16.11.7).There are no routing protocols running in any of the routers, and Router4 has Router6 as itsdefault gateway. What can be done to address this problem?




A. Convert to static NAT.


B. Convert to dynamic NAT.


C. Add a static route in Router7 back to Router4.


D. Change the inside and outside NAT commands.

Add a static route in Router7 back to Router4.

A network engineer wants to allow a temporary entry for a remote user with a specificusername and password so that the user can access the entire network over the Internet.Which ACL can be used?






A. standard


B. extended


C. dynamic


D. reflexive

Dynamic

What is the advantage of using a multipoint interface instead of point-to-point subinterfaceswhen configuring a Frame Relay hub in a hub-and-spoke topology?




A. It avoids split-horizon issues with distance vector routing protocols.


B. IP addresses can be conserved if VLSM is not being used for subnetting.


C. A multipoint interface offers greater security compared to point-to-point subinterfaceconfigurations.


D. The multiple IP network addresses required for a multipoint interface provide greateraddressing flexibility over point-to-point configurations.

IP addresses can be conserved if VLSM is not being used for subnetting.

Which command displays the CHAP authentication process as it occurs between two routers?




A. debug chap authentication


B. debug authentication


C. debug chap ppp


D. debug ppp authentication

debug ppp authentication

A network administrator has configured access list 173 to prevent Telnet and ICMP traffic fromreaching a server with the address of 192.168.13.26. Which commands can the administratorissue to verify that the access list is working properly? (Choose three.)




A. Router# ping 192.168.13.26


B. Router# debug access-list 173


C. Router# show open ports 192.168.13.26


D. Router# show access-listsE. Router# show ip interface


E. Router# show ip interface

Router# ping 192.168.13.26




Router# show access-lists E. Router# show ip interface




Router# show ip interface

A. A NAT pool has not been defined. 
B. The wrong interface is overloaded. 
C. NAT has not been applied to the inside and outside interfaces. 
D. The access list has not been applied to the proper interface to allow traffic out of the
interna...

A. A NAT pool has not been defined.


B. The wrong interface is overloaded.


C. NAT has not been applied to the inside and outside interfaces.


D. The access list has not been applied to the proper interface to allow traffic out of theinternal network.

NAT has not been applied to the inside and outside interfaces.

A. These commands need to be added to the configuration:
C-router(config)# router eigrp 123
C-router(config-router)# network 172.19.0.0 
B. These commands need to be added to the configuration:
C-router(config)# router ospf 1
C-router(config...

A. These commands need to be added to the configuration:C-router(config)# router eigrp 123C-router(config-router)# network 172.19.0.0


B. These commands need to be added to the configuration:C-router(config)# router ospf 1C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0


C. These commands need to be added to the configuration:C-router(config)# router ripC-router(config-router)# network 172.19.0.0


D. No further routing configuration is required.

No further routing configuration is required

A. C 192.168.2.0 is directly connected, Serial0/1 
B. R 192.168.2.0/24 [120/1] via 192.168.255.26, 00:00:24, Serial0/0 
C. R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1 
D. R 192.168.255.16 [120/2] via 192.168.255.21, 00:00:...

A. C 192.168.2.0 is directly connected, Serial0/1


B. R 192.168.2.0/24 [120/1] via 192.168.255.26, 00:00:24, Serial0/0


C. R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1


D. R 192.168.255.16 [120/2] via 192.168.255.21, 00:00:22, Serial0/0

R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1

A. The routing on Router2 is not functioning properly.
B. An access list is applied to an interface of Router3.
C. The Fa0/24 interface of Switch1 is down. 
D. The gateway address of HostA is incorrect or not configured.

A. The routing on Router2 is not functioning properly.B. An access list is applied to an interface of Router3.C. The Fa0/24 interface of Switch1 is down.


D. The gateway address of HostA is incorrect or not configured.

he gateway address of HostA is incorrect or not configured.

An organization is concerned that too many employees are wasting company time accessingthe Internet. Which access list statement would stop World Wide Web access for employeeson the range of subnets from 172.16.8.0/24 to 172.16.11.0/24?




A. access-list 103 deny tcp 172.16.8.0 0.0.0.3 any eq 80


B. access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80


C. access-list 103 deny http 172.16.8.0 0.0.7.255 any


D. access-list 103 deny tcp any 172.16.8.0 0.0.3.255 eq 80


E. access-list 103 deny tcp 172.16.8.0 0.0.11.255 any eq 80

access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80

What are two drawbacks of implementing a link-state routing protocol? (Choose two.)




A. the sequencing and acknowledgment of link-state packets


B. the requirement for a hierarchical IP addressing scheme for optimal functionality


C. the high volume of link-state advertisements in a converged network


D. the high demand on router resources to run the link-state routing algorithm


E. the large size of the topology table listing all advertised routes in the converged network

the requirement for a hierarchical IP addressing scheme for optimal functionality




the high demand on router resources to run the link-state routing algorithm

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)




A. Global addresses start with 2000::/3.


B. Link-local addresses start with FE00:/12.


C. Link-local addresses start with FF00::/10.


D. There is only one loopback address and it is ::1.


E. If a global address is assigned to an interface, then that is the only allowable address forthe interface.

Global addresses start with 2000::/3.


There is only one loopback address and it is ::1.

Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet
with the least amount of wasted addresses?

A. 255.255.255.0 
B. 255.255.254.0 
C. 255.255.252.0 
D. 255.255.248.0

Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnetwith the least amount of wasted addresses?




A. 255.255.255.0


B. 255.255.254.0


C. 255.255.252.0


D. 255.255.248.0

255.255.254.0

A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segmentexisting departmental traffic. What is the effect of adding switch ports to a new VLAN on theswitch?




A. More collision domains will be created.


B. IP address utilization will be more efficient.C. More bandwidth will be required than was needed previously.


D. An additional broadcast domain will be created.

D. An additional broadcast domain will be created.

Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straightthroughcable. Attempts to ping between the hosts are unsuccessful. What are two things thatcould be attempted that would allow communications between the hosts? (Choose two.)




A. Replace the straight-through cable with a crossover cable.


B. Change the subnet mask of the hosts to /25.C. Change the subnet mask of the hosts to /26.D. Change the address of Workstation A to 192.0.2.15.


E. Change the address of Workstation B to 192.0.2.111.

Replace the straight-through cable with a crossover cable.




Change the subnet mask of the hosts to /25.

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)




A. They create split-horizon issues.


B. They require a unique subnet within a routing domain.


C. They emulate leased lines.


D. They are ideal for full-mesh topologies.


E. They require the use of NBMA options when using OSPF.

They require a unique subnet within a routing domain.


They emulate leased lines.



Refer to the exhibit. A network engineer is troubleshooting an Internet connectivity problem
on the computer. What is causing the problem?

A. incorrect subnet mask 
B. incorrect IP address
C. wrong default gateway 
D. wrong DNS server

Refer to the exhibit. A network engineer is troubleshooting an Internet connectivity problemon the computer. What is causing the problem?




A. incorrect subnet mask


B. incorrect IP addressC. wrong default gateway


D. wrong DNS server

incorrect IP address

A. 172.16.0.0./21 
B. 172.16.0.0./20 
C. 172.16.0.0./16 
D. 172.16.0.0/18

A. 172.16.0.0./21


B. 172.16.0.0./20


C. 172.16.0.0./16


D. 172.16.0.0/18

172.16.0.0./20

Which two data link layers are supported by Cisco IOS Software for IPv6? (Choose two.)




A. FDDI


B. PPP


C. NBMA


D. Frame Relay SVC


E. Frame Relay PVC

PPP




Frame Relay PVC

Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12 on a switch? (Choose two.)




A. SW1#show port-secure interface FastEthernet 0/12


B. SW1#show switchport port-secure interface FastEthernet 0/12


C. SW1#show running-config


D. SW1#show port-security interface FastEthernet 0/12


E. SW1#show switchport port-security interface FastEthernet 0/12

SW1#show running-config




SW1#show port-security interface FastEthernet 0/12

Which two statements about using the CHAP authentication mechanism in a PPP link are true?(Choose two.)




A. CHAP uses a two-way handshake.


B. CHAP uses a three-way handshake


C. CHAP authentication periodically occurs after link establishment.


D. CHAP authentication passwords are sent in plaintext.


E. CHAP authentication is performed only upon link establishment.


F. CHAP has no protection from playback attacks.

CHAP uses a three-way handshake


CHAP authentication periodically occurs after link establishment.

Which two privileged mode Cisco IOS commands can be used to determine a Cisco routerchassis serial number? (Choose two.)




A. show diag


B. show controllers


C. show inventory


D. show flash: filesys


E. dir flash: | include chassis

Show diag


show inventory

Which two are features of IPv6? (Choose two.)




A. anycast


B. broadcast


C. multicast


D. podcast


E. allcast

anycast


multicast

Which three are characteristics of an IPv6 anycast address? (Choose three.)




A. one-to-many communication model


B. one-to-nearest communication model


C. any-to-many communication model


D. a unique IPv6 address for each device in the group


E. the same address for multiple devices in the group


F. delivery of packets to the group interface that is closest to the sending device

one-to-nearest communication model


the same address for multiple devices in the group


delivery of packets to the group interface that is closest to the sending device

Which two data integrity algorithms are commonly used in VPN solutions? (Choose two.)




A. DH1


B. DH2


C. HMAC-MD5


D. HMAC-SHA-1


E. RSA

HMAC-MD5




HMAC-SHA-1

Which two states are the port states when RSTP has converged? (Choose two.)




A. blocking


B. listening


C. learning


D. forwarding


E. disabled

blocking




forwarding



Which two statistics appear in show frame-relay map output? (Choose two.)




A. the number of BECN packets that are received by the router


B. the value of the local DLCI


C. the number of FECN packets that are received by the router


D. the status of the PVC that is configured on the router


E. the IP address of the local router

the value of the local DLCI




the status of the PVC that is configured on the router

What are three benefits of implementing VLANs? (Choose three.)




A. A higher level of network security can be reached by separating sensitive data traffic fromother network traffic.


B. A more efficient use of bandwidth can be achieved allowing many physical groups to usethe same network infrastructure.


C. A more efficient use of bandwidth can be achieved allowing many logical networks to usethe same network infrastructure.


D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thusreducing their size.


E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thusincreasing their size.


F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs allbelong to the same broadcast domain.


G. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.

A higher level of network security can be reached by separating sensitive data traffic from other network traffic.




A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.




Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.

What are three features of the IPv6 protocol? (Choose three.)




A. optional IPsec


B. autoconfiguration


C. no broadcasts


D. complicated header


E. plug-and-play


F. checksums

autoconfiguration


no broadcasts


plug-and-play

Which three approaches can be used while migrating from an IPv4 addressing scheme to anIPv6 scheme? (Choose three.)




A. enable dual-stack routing


B. configure IPv6 directly


C. configure IPv4 tunnels between IPv6 islandsD. use proxying and translation to translate IPv6 packets into IPv4 packets


E. statically map IPv4 addresses to IPv6 addresses


F. use DHCPv6 to map IPv4 addresses to IPv6 addresses

enable dual-stack routing




configure IPv4 tunnels between IPv6 islands




use proxying and translation to translate IPv6 packets into IPv4 packets

What are two benefits of using NAT? (Choose two.)






A. NAT facilitates end-to-end communication when IPsec is enabled.


B. NAT eliminates the need to re-address all hosts that require external access.


C. NAT conserves addresses through host MAC-level multiplexing.


D. Dynamic NAT facilitates connections from the outside of the network.


E. NAT accelerates the routing process because no modifications are made on the packets.


F. NAT protects network security because private networks are not advertised.

NAT eliminates the need to re-address all hosts that require external access.




NAT protects network security because private networks are not advertised.

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switchover Fast Ethernet?




A. 802.3ad


B. 802.1w


C. 802.1D


D. 802.1Q

802.1Q

VLAN 3 is not yet configured on your switch. What happens if you set the switchport accessvlan 3 command in interface configuration mode?




A. The command is rejected.


B. The port turns amber.


C. The command is accepted and the respective VLAN is added to vlan.dat.


D. The command is accepted and you must configure the VLAN manually.

The command is accepted and the respective VLAN is added to vlan.dat.

When you are troubleshooting an ACL issue on a router, which command can help you to verifywhich interfaces are affected by the ACL?




A. show ip access-lists


B. show access-lists


C. show interface


D. show ip interface


E. list ip interface

show ip interface

A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the localnetwork. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?




A. Use a hub to connect the four VLANS with a Fast Ethernet interface on the router.


B. Add a second router to handle the VLAN traffic.


C. Add two more Fast Ethernet interfaces.


D. Implement a router-on-a-stick configuration.

Implement a router-on-a-stick

Which name describes an IPv6 host-enabled tunneling technique that uses IPv4 UDP, does notrequire dedicated gateway tunnels, and can pass through existing IPv4 NAT gateways?




A. manual 6to4


B. dual stack


C. dynamic


D. Teredo

Teredo

What is the default maximum number of equal-cost paths that can be placed into the routingtable of a Cisco OSPF router?




A. 2


B. 4


C. 16


D. unlimited

4

Which IPv6 routing protocol uses multicast group FF02::9 to send updates?




A. static


B. RIPng


C. OSPFv3


D. IS-IS for IPv6

RIPng

On which options are standard access lists based?




A. destination address and wildcard mask


B. destination address and subnet mask


C. source address and subnet mask


D. source address and wildcard mask

source address and wildcard mask



Which device might be installed at a branch office to enable and manage an IPsec site-to-siteVPN?




A. Cisco IOS IPsec/SSL VPN Client


B. Cisco Adaptive Security Appliance


C. Cisco VPN Client


D. ISDN terminal adapter

Cisco Adaptive Security Appliance

Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuitsand has built- in security mechanisms?




A. HDLC


B. PPP


C. X.25


D. Frame Relay

PPP

Which command can be used from a PC to verify the connectivity between hosts that connectthrough a switch in the same LAN?




A. ping address


B. tracert address


C. traceroute address


D. arp address

ping address

Which command is used to enable CHAP authentication, with PAP as the fallback method, ona serial interface?




A. Router(config-if)# ppp authentication chap fallback ppp


B. Router(config-if)# ppp authentication chap pap


C. Router(config-if)# authentication ppp chap fallback ppp


D. Router(config-if)# authentication ppp chap pap

Router(config-if)# ppp authentication chap pap

Which protocol is an open standard protocol framework that is commonly used in VPNs, toprovide secure end-to-end communications?




A. RSA


B. L2TP


C. IPsec


D. PPTP

IPsec

Which IPv6 address is the all-router multicast group?




A. FF02::1


B. FF02::2


C. FF02::3


D. FF02::4

FF02::2

Which command can be used to verify the DLCI destination address in a Frame Relay staticconfiguration?




A. show frame-relay pvc


B. show frame-relay lmi


C. show frame-relay map


D. show frame relay end-to-end

show frame-relay map

Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correctnetwork address?




A. 172.16.16.0


B. 172.16.0.0


C. 172.16.24.0


D. 172.16.28.0

172.16.16.0

Which command helps a network administrator to manage memory by displaying flashmemory and NVRAM utilization?




A. show version


B. show ram


C. show flash:


D. show file systems

show file systems

Which statement is true, as relates to classful or classless routing?




A. Classful routing protocols send the subnet mask in routing updates.


B. RIPv1 and OSPF are classless routing protocols.


C. Automatic summarization at classful boundaries can cause problems on discontinuoussubnets.


D. EIGRP and OSPF are classful routing protocols and summarize routes by default.

Automatic summarization at classful boundaries can cause problems on discontinuous subnets

Which pairing reflects a correct protocol-and-metric relationship?




A. EIGRP and link cost


B. OSPF and number of hops and reliability


C. RIPv2 and number of hops


D. IS-IS and delay and reliability

RIPv2 and number of hops

What is one benefit of PVST+?




A. PVST+ supports Layer 3 load balancing without loops.


B. PVST+ reduces the CPU cycles for all the switches in the network.


C. PVST+ allows the root switch location to be optimized per VLAN.


D. PVST+ automatically selects the root bridge location, to provide optimized bandwidthusage.

PVST+ allows the root switch location to be optimized per VLAN.

The network administrator is asked to configure 113 point-to-point links. Which IP addressingscheme best defines the address range and subnet mask that meet the requirement and wastethe fewest subnet and host addresses?




A. 10.10.0.0/16 subnetted with mask 255.255.255.252


B. 10.10.0.0/18 subnetted with mask 255.255.255.252


C. 10.10.1.0/24 subnetted with mask 255.255.255.252


D. 10.10.0.0/23 subnetted with mask 255.255.255.252


E. 10.10.1.0/25 subnetted with mask 255.255.255.252





10.10.1.0/25 subnetted with mask 255.255.255.252

Which address is the IPv6 all-RIP-routers multicast group address that is used by RIPng as thedestination address for RIP updates?




A. FF02::6


B. FF02::9


C. FF05::101


D. FF02::A

FF02::9

Which command shows your active Telnet connections?




A. show cdp neigbors


B. show session


C. show users


D. show vty logins

show session

Which component of VPN technology ensures that data is unaltered between the sender andrecipient?




A. encryption


B. authentication


C. key exchange


D. data integrity

data integrity

What is the alternative notation for the IPv6 addressB514:82C3:0000:0000:0029:EC7A:0000:EC72?




A. B514 : 82C3 : 0029 : EC7A : EC72


B. B514 : 82C3 :: 0029 : EC7A : EC72


C. B514 : 82C3 : 0029 :: EC7A : 0000 : EC72


D. B514 : 82C3 :: 0029 : EC7A : 0 : EC72

B514 : 82C3 :: 0029 : EC7A : 0 : EC72

In which integration method is an IPv6 packet encapsulated within an IPv4 protocol?




A. dual-stack


B. proxy


C. dot1q


D. tunneling

tunneling

Which command is used to display the collection of OSPF link states?




A. show ip ospf link-state


B. show ip ospf lsa database


C. show ip ospf neighbors


D. show ip ospf database

show ip ospf database

Which parameter or parameters are used to calculate OSPF cost in Cisco routers?




A. Bandwidth


B. Bandwidth and Delay


C. Bandwidth, Delay, and MTU


D. Bandwidth, MTU, Reliability, Delay, and Load

bandwidth

A. The LAN interfaces are configured on different subnets. 
B. Interface FastEthernet 0/0 is configured as a trunk
C. The Layer 2 protocol of interface Serial 0/1 is NOT operational.
D. The router is a modular router with five FastEthernet inter...

A. The LAN interfaces are configured on different subnets.


B. Interface FastEthernet 0/0 is configured as a trunkC. The Layer 2 protocol of interface Serial 0/1 is NOT operational.


D. The router is a modular router with five FastEthernet interfaces.


E. Interface FastEthernet 0/0 is administratively deactivated.





Interface FastEthernet 0/0 is configured as a trunk



Select the action that results from executing these commands.Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address sticky




A. A dynamically learned MAC address is saved in the startup-configuration file.


B. A dynamically learned MAC address is saved in the running-configuration file.


C. A dynamically learned MAC address is saved in the VLAN database.


D. Statically configured MAC addresses are saved in the startup-configuration file if framesfrom that address are received.


E. Statically configured MAC addresses are saved in the running-configuration file if framesfrom that address are received.

A dynamically learned MAC address is saved in the running-configuration file.

Refer to the exhibit. Some 2950 series switches are connected to the conference area of thecorporate headquarters network. The switches provide two to three jacks per conferenceroom to host laptop connections for employees who visit the headquarters office. When largegroups of employees come from other locations, the network administrator often finds thathubs have been connected to wall jacks in the conference area although the ports on theaccess layer switches were not intended to support multiple workstations. What action couldthe network administrator take to prevent access by multiple laptops through a single switchport and still leave the switch functional for its intended use?




A. Configure static entries in the switch MAC address table to include the range of addressesused by visiting employees.


B. Configure an ACL to allow only a single MAC address to connect to the switch at one time.C. Use the mac-address-table 1 global configuration command to limit each port to onesource MAC address.


D. Implement Port Security on all interfaces and use the port-security maximum 1 commandto limit port access to a single MAC address.


E. Implement Port Security on all interfaces and use the port-security mac-address stickycommand to limit access to a single MAC address.


F. Implement Port Security at global configuration mode and use the port-security maximum1 command to allow each switch only one attached hub.

Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.

Refer to the exhibit. Which two statements about the configuration of the switch interface arecorrect? (Choose two.)




SwitchA(config)# interface fa0/0


SwitchA(config-if)# switchport access vlan 2




A. The switchport belongs only to VLAN 2.


B. By default, all switch ports are members of VLAN 1005.


C. Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2.


D. The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2.


E. A network host can be connected to this interface.

The switchport belongs only to VLAN 2.




A network host can be connected to this interface.

A. SwitchA, Fa0/2, designated 
B. SwitchA, Fa0/1, root
C. SwitchB, Gi0/2, root
D. SwitchB, Gi0/1, designated 
E. SwitchC, Fa0/2, root 
F. SwitchD, Gi0/2, root

A. SwitchA, Fa0/2, designated


B. SwitchA, Fa0/1, rootC. SwitchB, Gi0/2, rootD. SwitchB, Gi0/1, designated


E. SwitchC, Fa0/2, root


F. SwitchD, Gi0/2, root

SwitchA, Fa0/2, designated




SwitchA, Fa0/1, root




SwitchD, Gi0/2, root

Which three elements must be used when you configure a router interface for VLAN trunking?(Choose three.)




A. one physical interface for each subinterfaceB. one IP network or subnetwork for each subinterface


C. a management domain for each subinterface


D. subinterface encapsulation identifiers that match VLAN tags


E. one subinterface per VLANF. subinterface numbering that matches VLAN tags



one IP network or subnetwork for each subinterface




subinterface encapsulation identifiers that match VLAN tags




one subinterface per VLAN

Which three statements about VTP features are true? (Choose three.)




A. VTP works at Layer 3 of the OSI model and requires that a management VLAN IP addressbe configured.


B. When properly configured, VTP minimizes VLAN misconfigurations and configurationinconsistencies.


C. When properly configured, VTP maintains VLAN configuration consistency andaccelerates trunk link negotiation.


D. Each broadcast domain on a switch can have its own unique VTP domain.


E. VTP pruning is used to increase available bandwidth in trunk links.


F. To configure a switch to be part of two VTP domains, each domain must have its ownpasswords.


G. Client, server, and transparent are valid VTP modes.

When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies.




VTP pruning is used to increase available bandwidth in trunk links.




Client, server, and transparent are valid VTP modes.

Two switches are connected through a trunk link. Which two commands show that there is anative VLAN mismatch on that link? (Choose two.)




A. show vlan brief


B. show interface trunk


C. show interface vlan


D. show interface switchport


E. show interface interface


F. show switchport trunk

show interface trunk




show interface switchport

Which two of these statements are true of IPv6 address representation? (Choose two.)




A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.


B. A single interface may be assigned multiple IPv6 addresses of any type.


C. Every IPv6 interface contains at least one loopback address


D. The first 64 bits represent the dynamically created interface ID.


E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

A single interface may be assigned multiple IPv6 addresses of any type.




Every IPv6 interface contains at least one loopback address

Which statement about IPv6 is true?




A. Addresses are not hierarchical and are assigned at random.


B. Only one IPv6 address can exist on a given interface.


C. There are 2.7 billion addresses available.


D. Broadcasts have been eliminated and replaced with multicasts.

Broadcasts have been eliminated and replaced with multicasts.

A. The IP address for Server A is a broadcast address. 
B. The IP address for Workstation B is a subnet address. 
C. The gateway for Workstation B is not on the same subnet.
D. The gateway for Server A is not on the same subnet.

A. The IP address for Server A is a broadcast address.


B. The IP address for Workstation B is a subnet address.


C. The gateway for Workstation B is not on the same subnet.


D. The gateway for Server A is not on the same subnet.

The gateway for Server A is not on the same subnet.

You have been asked to come up with a subnet mask that will allow all three web servers tobe on the same network while providing the maximum number of subnets. Which networkaddress and subnet mask meet this requirement?




A. 192.168.252.0 255.255.255.252


B. 192.168.252.8 255.255.255.248


C. 192.168.252.8 255.255.255.252


D. 192.168.252.16 255.255.255.240


E. 192.168.252.16 255.255.255.252

192.168.252.8 255.255.255.248

A. The router will forward packets from R3 to R2 to R1. 
B. The router will forward packets from R3 to R1 to R2.
C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1. 
D. The router will forward packets from R3 to R1.

A. The router will forward packets from R3 to R2 to R1.


B. The router will forward packets from R3 to R1 to R2.


C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.


D. The router will forward packets from R3 to R1.

The router will forward packets from R3 to R2 to R1 AND from R3 to R1.

How does using the service password-encryption command on a router provide additionalsecurity?




A. by encrypting all passwords passing through the router


B. by encrypting passwords in the plain text configuration file


C. by requiring entry of encrypted passwords for access to the device


D. by configuring an MD5 encrypted key to be used by routing protocols to validate routingexchanges


E. by automatically suggesting encrypted passwords for use in configuring the router

by encrypting passwords in the plain text configuration file

Refer to the exhibit. How will the router handle a packet destined for 192.0.2.156?

A. The router will drop the packet. 
B. The router will return the packet to its source. 
C. The router will forward the packet via Serial2. 
D. The router wi...

Refer to the exhibit. How will the router handle a packet destined for 192.0.2.156?




A. The router will drop the packet.


B. The router will return the packet to its source.


C. The router will forward the packet via Serial2.


D. The router will forward the packet via either Serial0 or Serial1.

The router will forward the packet via Serial2.

Refer to the exhibit. The show interfaces serial 0/1 command was issued on the R10-1 router.
What can be concluded from the output in the exhibit?

A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable. 
B. The R...

Refer to the exhibit. The show interfaces serial 0/1 command was issued on the R10-1 router.What can be concluded from the output in the exhibit?




A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable.


B. The R10-1 router can ping the router interface connected to the serial 0/1 interface.


C. The clock rate used for interface serial 0/1 of the R10-1 router is 1,544,000 bits per second.


D. The CSU used with the serial 0/1 interface of the R10-1 router has lost connection to theservice provider.


E. The interface of the remote router connected to the serial 0/1 interface of the R10-1router is using the default serial interface encapsulation.

The interface of the remote router connected to the serial 0/1 interface of the R10-1router is using the default serial interface encapsulation

Refer to the exhibit. A technician pastes the configurations in the exhibit into the two new
routers shown. Otherwise, the routers are configured with their default configurations. A ping
from Host1 to Host2 fails, but the technician is able to...

Refer to the exhibit. A technician pastes the configurations in the exhibit into the two newrouters shown. Otherwise, the routers are configured with their default configurations. A pingfrom Host1 to Host2 fails, but the technician is able to ping the S0/0 interface of R2 from Host1.The configurations of the hosts have been verified as correct. What could be the cause of theproblem?




A. The serial cable on R1 needs to be replaced.


B. The interfaces on R2 are not configured properly.


C. R1 has no route to the 192.168.1.128 network.


D. The IP addressing scheme has overlapping subnetworks.


E. The ip subnet-zero command must be configured on both routers

R1 has no route to the 192.168.1.128 network.

A router is running three routing processes: RIP, OSPF, and EIGRP, each configured with defaultcharacteristics. Each process learns a route to the same remote network. If there are no staticroutes to the destination and none of the routes were redistributed, which route will be placedin the IP routing table?




A. the route learned through EIGRP


B. the route learned through OSPF


C. the route learned through RIP


D. the route with the lowest metric


E. all three routes with the router load balancing

the route learned through EIGRP

A network administrator needs to allow only one Telnet connection to a router. For anyoneviewing the configuration and issuing the show run command, the password for Telnet accessshould be encrypted. Which set of commands will accomplish this task?





service password-encryption


line vty0


login


password cisco

Refer to the exhibit. Given the output for this command, if the router ID has not been manually
set, what router ID will OSPF use for this router?

A. 10.1.1.2 
B. 10.154.154.1 
C. 172.16.5.1 
D. 192.168.5.3

Refer to the exhibit. Given the output for this command, if the router ID has not been manuallyset, what router ID will OSPF use for this router?




A. 10.1.1.2


B. 10.154.154.1


C. 172.16.5.1


D. 192.168.5.3

172.16.5.1

Which command can be used from a router to verify the Layer 3 path to a host?




A. tracert address


B. traceroute address


C. telnet address


D. ssh address

traceroute address

An access list has been designed to prevent Telnet traffic from the Graphics Department fromreaching the HR server attached to the Eastfield router but allow Telnet traffic to otherdestinations. Given the following access list:




access-list 101 deny tcp any any eq 23


permit ip any any




On which router, interface, and in what direction should the access list be placed to mostefficiently implement this list? (Choose three.)




A. Westfield


B. Eastfield


C. e0


D. s0


E. in


F. out

out

Which form of NAT maps multiple private IP addresses to a single registered IP address by usingdifferent ports?




A. static NAT


B. dynamic NAT


C. overloading


D. overlapping


E. port loading

overloading

Unauthorized users have used Telnet to gain access to a company router. The networkadministrator wants to configure and apply an access list to allow Telnet access to the router,but only from the network administrator's computer. Which group of commands would be thebest choice to allow only the IP address 172.16.3.3 to have Telnet access to the router?





access-list 3 permit host 172.16.3.3


line vty 0 4


access-class 3 in

A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload 
B. (config-if) ip nat outside overload 
C. (config) ip nat inside source list 1 interface ethernet1 overload 
D. (config-if) ip nat inside overload

A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload


B. (config-if) ip nat outside overload


C. (config) ip nat inside source list 1 interface ethernet1 overload


D. (config-if) ip nat inside overload

(config) ip nat inside source list 1 interface ethernet1 overload

Which two statements about static NAT translations are true? (Choose two.)




A. They allow connections to be initiated from the outside.


B. They require no inside or outside interface markings because addresses are staticallydefined.


C. They are always present in the NAT table.


D. They can be configured with access lists, to allow two or more connections to be initiatedfrom the outside.

They allow connections to be initiated from the outside.




They are always present in the NAT table.

The output of the show frame-relay pvc command shows "PVC STATUS = INACTIVE". Whatdoes this mean?




A. The PVC is configured correctly and is operating normally, but no data packets have beendetected for more than five minutes.


B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.


C. The PVC is configured correctly, is operating normally, and is waiting for interesting trafficto trigger a call to the remote router.


D. The PVC is configured correctly on the local switch, but there is a problem on the remoteend of the PVC.


E. The PVC is not configured on the local switch.

The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC

What are three reasons that an organization with multiple branch offices and roaming usersmight implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)




A. reduced cost


B. better throughput


C. broadband incompatibility


D. increased security


E. scalability


F. reduced latency

reduced cost


increased security


scalability

A network administrator wants to ensure that only the server can connect to port Fa0/1 on aCatalyst switch. The server is plugged into the switch Fa0/1 port and the network administratoris about to bring the server online. What can the administrator do to ensure that only the MACaddress of the server is allowed by switch port Fa0/1? (Choose two.)




A. Configure port Fa0/1 to accept connections only from the static IP address of the server.


B. Employ a proprietary connector type on Fa0/1 that is incompatible with other hostconnectors.


C. Configure the MAC address of the server as a static entry associated with port Fa0/1.


D. Bind the IP address of the server to its MAC address on the switch to prevent other hostsfrom spoofing the server IP address.


E. Configure port security on Fa0/1 to reject traffic with a source MAC address other thanthat of the server.


F. Configure an access list on the switch to deny server traffic from entering any port otherthan Fa0/1.

Configure the MAC address of the server as a static entry associated with port Fa0/1.




Configure port security on Fa0/1 to reject traffic with a source MAC address other thanthat of the server.

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other. 
B. The hosts in all VLANs on the two switches will be able to communicate with each other. 
C. Only the hosts in VLAN 10 and VLAN 15 on the two switch...

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other.


B. The hosts in all VLANs on the two switches will be able to communicate with each other.


C. Only the hosts in VLAN 10 and VLAN 15 on the two switches will be able to communicatewith each other.


D. Hosts will not be able to communicate between the two switches.

Hosts will not be able to communicate between the two switches.

Refer to the exhibit. What commands must be configured on the 2950 switch and the router
to allow communication between host 1 and host 2? (Choose two.)

Refer to the exhibit. What commands must be configured on the 2950 switch and the routerto allow communication between host 1 and host 2? (Choose two.)





Router(config)# interface fastethernet 0/0Router(config-if)# no shut downRouter(config)# interface fastethernet 0/0.1Router(config-subif)# encapsulation dot1q 10Router(config-subif)# ip address 192.168.10.1 255.255.255.0Router(config)# interface fastethernet 0/0.2Router(config-subif)#encapsulation dot1q 20Router(config-subif)# ip address 192.168.20.1 255.255.255.0




Switch1 (config)# interface fastethernet 0/1Switch1 (config-if)# switchport mode trunk

A. All ports will be in a state of discarding, learning, or forwarding. 
B. Thirty VLANs have been configured on this switch.
C. The bridge priority is lower than the default value for spanning tree.
D. All interfaces that are shown are on share...

A. All ports will be in a state of discarding, learning, or forwarding.


B. Thirty VLANs have been configured on this switch.


C. The bridge priority is lower than the default value for spanning tree.


D. All interfaces that are shown are on shared media.


E. All designated ports are in a forwarding state.


F. This switch must be the root bridge for all VLANs on this switch.

All ports will be in a state of discarding, learning, or forwarding.




The bridge priority is lower than the default value for spanning tree




All designated ports are in a forwarding state

Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)




A. 802.1Q native VLAN frames are untagged by default.


B. 802.1Q trunking ports can also be secure ports.


C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.


D. 802.1Q trunks require full-duplex, point-to-point connectivity.


E. 802.1Q trunks should have native VLANs that are the same at both ends.





802.1Q native VLAN frames are untagged by default.




802.1Q trunks can use 10 Mb/s Ethernet interfaces.




802.1Q trunks should have native VLANs that are the same at both ends.

Which set of commands is recommended to prevent the use of a hub in the access layer?




A. switch(config-if)#switchport mode trunkswitch(config-if)#switchport port-security maximum 1


B. switch(config-if)#switchport mode trunkswitch(config-if)#switchport port-security mac-address 1


C. switch(config-if)#switchport mode accessswitch(config-if)#switchport port-security maximum 1


D. switch(config-if)#switchport mode accessswitch(config-if)#switchport port-security mac-address 1

switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

A. trunk mode mismatches 
B. allowing only VLAN 2 on the destination
C. native VLAN mismatches 
D. VLANs that do not correspond to a unique IP subnet

A. trunk mode mismatches


B. allowing only VLAN 2 on the destinationC. native VLAN mismatches


D. VLANs that do not correspond to a unique IP subnet

native VLAN mismatches

Assuming the default switch configuration, which VLAN range can be added, modified, andremoved on a Cisco switch?




A. 1 through 1001


B. 2 through 1001


C. 1 through 1002


D. 2 through 1005

2 through 1001

The ROUTE Company has a small network. The network consists of one switch and one router.The switch has been configured with two VLANs. The router has been configured as a routeron-a-stick to allow inter- VLAN routing. A trunk is configured to connect the switch to therouter. What is the minimum number of router subinterfaces that are required for all theVLANs to communicate?




A. zero


B. one


C. two


D. three

two

Identify the four valid IPv6 addresses. (Choose four.)




A. ::


B. ::192:168:0:1


C. 2000::


D. 2001:3452:4952:2837::


E. 2002:c0a8:101::42


F. 2003:dead:beef:4dad:23:46:bb:101

::


::192:168:0:1


2002:c0a8:101::42


2003:dead:beef:4dad:23:46:bb:101

A network administrator receives an error message while trying to configure the Ethernetinterface of a router with IP address 10.24.24.24/29. Which statement explains the reason forthis issue?




A. VLSM-capable routing protocols must be enabled first on the router.


B. This address is a network address.


C. This address is a broadcast address


D. The Ethernet interface is faulty.

This address is a network address.

You are working in a data center environment and are assigned the address range10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum numberof subnets with as many as 30 hosts each. Which IP address range meets these requirements?




A. 10.188.31.0/26


B. 10.188.31.0/25


C. 10.188.31.0/28


D. 10.188.31.0/27


E. 10.188.31.0/29

10.188.31.0/27

Which IPv6 address is valid?




A. 2001:0db8:0000:130F:0000:0000:08GC:140BB. 2001:0db8:0:130H::87C:140B


C. 2031::130F::9C0:876A:130B


D. 2031:0:130F::9C0:876A:130B

2031:0:130F::9C0:876A:130B

Which statements are true about EIGRP successor routes? (Choose two.)




A. A successor route is used by EIGRP to forward traffic to a destination.


B. Successor routes are saved in the topology table to be used if the primary route fails.


C. Successor routes are flagged as "active" in the routing table.


D. A successor route may be backed up by a feasible successor route.


E. Successor routes are stored in the neighbor table following the discovery process.

A successor route is used by EIGRP to forward traffic to a destination.




A successor route may be backed up by a feasible successor route.

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)




A. Administratively shut down the interface.


B. Physically secure the interface.


C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.


D. Configure a virtual terminal password and login process.


E. Enter an access list and apply it to the virtual terminal interfaces using the access-classcommand.



Configure a virtual terminal password and login process.




Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

A. 208.149.23.64[110/13] via 190.173.23.10,00:00:07, FastEthemet0/0
208.149.23.96[110/13] via 190.173.23.10,00:00:16, FastEthemet0/0 

B. 208.149.23.64[110/1] via 190.172.23.10,00:00:07, Serial1/0
208.149.23.96[110/3] via 190.173.23.10,00:00:1...

A. 208.149.23.64[110/13] via 190.173.23.10,00:00:07, FastEthemet0/0208.149.23.96[110/13] via 190.173.23.10,00:00:16, FastEthemet0/0




B. 208.149.23.64[110/1] via 190.172.23.10,00:00:07, Serial1/0208.149.23.96[110/3] via 190.173.23.10,00:00:16, FastEthemet0/0


C. 208.149.23.64[110/13] via 190.173.23.10,00:00:07, Serial1/0208.149.23.96[110/13] via 190.173.23.10,00:00:16, Serial1/0208.149.23.96[110/13] via 190.173.23.10,00:00:16, FastEthemet0/0


D. 208.149.23.96[110/3] via 190.173.23.10,00:00:16, Serial1/0208.149.23.96[110/3] via 190.173.23.10,00:00:16, Serial1/0

208.149.23.64[110/13] via 190.173.23.10,00:00:07, FastEthemet0/0 208.149.23.96[110/13] via 190.173.23.10,00:00:16, FastEthemet0/0

Which command reveals the last method used to powercycle a router?




A. show reload


B. show boot


C. show running-config


D. show version

show version

Which two statements are characteristics of a distance vector routing protocol? (Choose two.)




A. Each router has its own view of the topology.


B. Updates are periodic and include the entire routing table.


C. Routing updates are sent only after topology changes.


D. Convergence is usually faster than with link state protocols.


E. RIP is an example of distance vector routing protocols.


F. The protocol can be useful in hub-and-spoke and hierarchical networks.

Updates are periodic and include the entire routing table.




RIP is an example of distance vector routing protocols.

Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two.)




A. terminal monitor


B. logging host ip-address


C. no logging console


D. snmp-server enable traps syslog


E. show logging | redirect flash:output.txt

terminal monitor




logging host ip-address

Which parameter can be tuned to affect the selection of a static route as a backup, when adynamic protocol is also being used?




A. hop count


B. administrative distance


C. link bandwidth


D. link delay


E. link cost

administrative distance

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwiseconfigured for these vty line protocols?




A. transport output all


B. transport preferred all


C. transport type all


D. transport input all

transport input all

A. The configuration that is shown provides inadequate outside address space for
translation of the number of inside addresses that are supported. 
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will...

A. The configuration that is shown provides inadequate outside address space fortranslation of the number of inside addresses that are supported.


B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.


C. The number 1 referred to in the ip nat inside source command references access-listnumber 1.D. ExternalRouter must be configured with static routes to networks 172.16.1.0/24 and172.16.2.0/24.

The number 1 referred to in the ip nat inside source command references access-list number 1

Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order
and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are
the first and last IP of subnet 172.21.1.128/28) from acc...

Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown orderand applied to interface E0 inbound, to prevent all hosts (except those whose addresses arethe first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACLdoes not restrict anyone from the network. How can the ACL statements be re-arranged sothat the system works as intended?




A. ACDB


B. BADC


C. DBAC


D. CDBA

CDBA

A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts onnetworks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which twoACL statements, when combined, are the best for accomplishing this task? (Choose two.)


A. access-list 10 permit ip 192.168.146.0 0.0.1.255


B. access-list 10 permit ip 192.168.147.0 0.0.255.255


C. access-list 10 permit ip 192.168.148.0 0.0.1.255


D. access-list 10 permit ip 192.168.149.0 0.0.255.255


E. access-list 10 permit ip 192.168.146.0 0.0.0.255


F. access-list 10 permit ip 192.168.146.0 255.255.255.0

access-list 10 permit ip 192.168.146.0 0.0.1.255




access-list 10 permit ip 192.168.148.0 0.0.1.255

In which solution is a router ACL used?




A. filtering packets that are passing through a router


B. to change the default administrative distance of a route in the route table


C. protecting a server from unauthorized access


D. controlling path selection, based on the route metric

filtering packets that are passing through a router

Which IPsec security protocol should be used when confidentiality is required?




A. MD5


B. PSK


C. AH


D. ESP

ESp

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?




A. defines the destination IP address that is used in all broadcast packets on DCLI 202


B. defines the source IP address that is used in all broadcast packets on DCLI 202


C. defines the DLCI on which packets from the 192.168.1.2 IP address are received


D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

Refer to the topology. If most of the communication is between hosts and the servers, which
switch is best as the root switch for VLAN 20?

A. Sw-A 
B. Sw-B 
C. Sw-C 
D. Sw-D 
E. Sw-E

Refer to the topology. If most of the communication is between hosts and the servers, whichswitch is best as the root switch for VLAN 20?




A. Sw-A


B. Sw-B


C. Sw-C


D. Sw-D


E. Sw-E











Which switch is best as the root switch for VLAN 20?


Sw-E




Path from Host A to Server 1:


Sw-A, Sw-E, Sw-C, Sw-D




What technology helps prevent frames from looping continuously?


STP




What is reqd. for communication to occur between C and Server 3:


a router




What link is needed between Sw-A and Sw-B so C and D can communicate through Sw-A


trunk