Top Banner
1 Top of Form Which device or component is located at the customer premises and provides the clocking signal for the customer router on a WAN circuit? DTE serial interface CSU/DSU central office switch internal clock on the router patch panel at the point of demarcation 2 Top of Form What are two characteristics of EIGRP? (Choose two.) It supports a maximum hop count of 15. It sends small hello packets to maintain knowledge of its neighbors. It forwards complete routing tables in its updates to neighboring routers. It supports equal and unequal cost load balancing. It supports only one network layer protocol. 3 Top of Form In an enterprise network, which components are specific to the network operations center? printers wireless access points network attached storage devices Layer 2 workstation switches 4 Top of Form Refer to the exhibit. A network support technician has been asked to set IP address on one of the FastEthernet interfaces on a new router. What i causing the interface to reject the address? The IP address is already in use. The technician is using a network address. The technician is using the wrong subnet mask for /26. The technician must enable VLSM on the interface.
22

Ccna 3rd 2nd

Apr 08, 2015

Download

Documents

prakhendra
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ccna 3rd 2nd

1 Top of FormWhich device or component is located at the customer premises and provides the clocking signal for the customer router on a WAN circuit?

DTE serial interface

CSU/DSU

central office switch

internal clock on the router

patch panel at the point of demarcation

2 Top of FormWhat are two characteristics of EIGRP? (Choose two.)

It supports a maximum hop count of 15.

It sends small hello packets to maintain knowledge of its neighbors.

It forwards complete routing tables in its updates to neighboring routers.

It supports equal and unequal cost load balancing.

It supports only one network layer protocol.

3 Top of FormIn an enterprise network, which components are specific to the network operations center?

printers

wireless access points

network attached storage devices

Layer 2 workstation switches

4 Top of Form

Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?

The IP address is already in use.

The technician is using a network address.

The technician is using the wrong subnet mask for /26.

The technician must enable VLSM on the interface.

5 Top of Form

Page 2: Ccna 3rd 2nd

Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?1=R, 2=O, 3=D, 4=C

1=R, 2=E, 3=O, 4=S

1=R, 2=D, 3=O, 4=S

1=O, 2=R, 3=D, 4=C

1=R, 2=O, 3=E, 4=C6 Top of Form

Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?

R1

R2

R3

ISP

7 Top of Form

Page 3: Ccna 3rd 2nd

Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes:

BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1

However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing?

The first configuration command overwrites the second command.The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0 network.This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table.The first default route cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.

8 Top of FormHow can a network administrator determine if network traffic has matched an ACL if there is no syslog server configured on the network?

Issue the show access-lists command.

Delete the ACL and add it back, noting changes in traffic flow.

Remove the ACL from any configured interface and note traffic changes.

Verify the counters on the router interface and see if they are incrementing.

Page 4: Ccna 3rd 2nd

9 Top of FormWhich two statements correctly describe RIPv1 and RIPv2? (Choose two.)

Both broadcast their entire routing table from all participating interfaces to 255.255.255.255.

Both advertise their routing updates out all active interfaces every 30 seconds.

Both have the same administrative distance value of 120.

Both can turn off automatic summarization.

Both support VLSM and CIDR.

10 Top of FormWhich two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)

to set the duplex mode of a redundant link

to activate looped paths throughout the network

to determine the root bridge

to prevent loops by sharing routing tables between connected switches

to determine which ports are placed in forwarding mode11 Top of Form

What is the purpose of assigning an IP address to a Layer 2 switch?to allow in-band management

to provide inter-VLAN connectivity

to facilitate election of a root bridge

to configure a default gateway for the network

12 Top of Form

Page 5: Ccna 3rd 2nd

Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?

It identifies traffic on all inside interfaces to be translated and given access to the ISP router.

It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.

It allows traffic from the ISP to reach all of the inside interfaces.

It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router.

It allows traffic from the ISP router to the fa0/1 interface.

13 Top of Form

Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?

D 192.168.0.0/24 is a summary, Null0

D 192.168.0.0/22 is a summary, Null0

D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0

D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0

14 Top of FormWhich function does the access layer provide in a hierarchical internetworking model?

Page 6: Ccna 3rd 2nd

It provides a high-speed backbone layer between geographically dispersed networks.

It provides hierarchical design between the core layer and the distribution layer.

It provides an entry point for hosts into the network.

It provides data security and traffic management for the core layer.

15 Top of Form

Refer to the exhibit. Which route will appear in the routing table?R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1

R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0

R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0

R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0

R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/016 Top of Form

A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?

TCP

UDP

PPP

HDLC

17 Top of Form

Page 7: Ccna 3rd 2nd

Refer to the exhibit. Both switches have been configured with static VLANs. Host A and host C belong to one VLAN and host B and D belong to another VLAN. However, the hosts within the same VLAN are unable to communicate with each other.

Which troubleshooting approach should be followed to resolve this problem?Explore the possibility of adding a router to the network.

Ensure that both switches are configured for the same native VLAN.

Ensure that the ports connecting the two switches are configured as trunk ports.

Ensure that both switches are configured with an IP address in the same subnet.

18 Top of FormAn administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco?

Router(config)# line vty 0 4 Router(config-line)# password manageRouter(config-line)# exitRouter(config)# enable password ciscoRouter(config)# line vty 0 4Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# exitRouter(config)# service password-encryption

Page 8: Ccna 3rd 2nd

19 Top of Form

Refer to the exhibit. OSPF has been configured as a routing protocol on all routers in OSPF area 0. Based on the cost value of the links, which path will be selected by the SPF algorithm to forward traffic from router R4 to network A?

R4-R2-R1

R4-R3-R1

R4-R2-R3-R1

R4-R3-R2-R1

20 Top of FormWhat is the correct wildcard mask to define the supernet 192.168.0.0/22 in an ACL?

0.0.0.31

0.0.0.255

0.0.3.255

0.0.7.255

0.0.255.255

21 Top of FormWhat is the purpose of the RIP passive-interface command?

It prevents an interface from sending RIP updates.

It prevents an interface from receiving RIP updates.

It prevents an interface from sending and receiving RIP updates.

It prevents any RIP updates of the network to which the IP address of the interface belongs.

22 Top of Form

Page 9: Ccna 3rd 2nd

Refer to the exhibit. A network administrator configures a Cisco router for inter-VLAN routing. The router is connected to port Fa0/24 on the switch using a straight-through cable and all switchports are configured as access ports. What will be the result of the configuration?

Inter-VLAN traffic will not be routed.

The switch will add VLAN tags and forward them to the router.

The router subinterfaces will add the appropriate VLAN tags and route between VLANs.

The switch port will auto-negotiate to a trunk port and will allow for inter-VLAN routing.

23 Top of FormWhich two statements are true about untagged frames on a switch? (Choose two.)

An untagged frame cannot pass through access ports.

An untagged frame cannot pass through trunk ports.

All frames that pass through trunk ports are untagged frames.

Untagged frames minimize the delays that are associated with inspection of the VLAN ID tag.

Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.

24 Top of FormWhat information is displayed in the output of the show version command on a router?

interface addresses

routing table entries

amount of flash memory

configured routing protocols

Page 10: Ccna 3rd 2nd

25 Top of Form

Refer to the exhibit. If RIPv1 was used as the routing protocol for the network, what would represent the vector that router R1 would use to forward traffic toward the Internet?

the Internet

IP address 172.16.10.13

network 192.168.20.0/24

interface S0/0/0 on the ISP router

26 Top of Form

Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?the session from host A to host B

the session from host B to hosts C and D

the session from host B to hosts E and F

Page 11: Ccna 3rd 2nd

the session from host E and host F to host A and host B

27 Top of FormWhich two interface values does EIGRP use by default to calculate the metric? (Choose two.)

bandwidth

delay

load

hop count

reliability

28 Top of FormWhich two implementations would teleworkers use to allow secure remote configuration and maintenance of firewalls and to support access to company file servers? (Choose two.)

SSH

VPN

Telnet

Extranet

FTP

QoS

29 Top of FormWhat are two characteristics of an extended ACL? (Choose two.)

IP is used to specify TCP traffic only.

IP is used to specify TCP and UDP traffic only.

IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols.

Traffic can be filtered on source address only.

Traffic can be filtered on source and destination address only.

Traffic can be filtered on source and destination address, protocol, and specific port number.

30 Top of Form

Page 12: Ccna 3rd 2nd

Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?

RB has the lowest priority value.

RC and RD have the lowest router IDs on the network.

RA has established adjacencies with all neighbor routers.

RA and RB can not form an adjacency because they are stuck in the 2-way state.31 Top of Form

Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?

C, B, A, D

D, C, B, A

A, B, C, D

Page 13: Ccna 3rd 2nd

A, C, B, D

B, C, A, D

32 Top of Form

Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch?

VTP version mismatch

VTP domain name mismatch

VTP revision number mismatch

time synchronization problems

33 Top of FormWhich routing protocol is unable to support discontiguous networks?

RIPv1

RIPv2

EIGRP

Page 14: Ccna 3rd 2nd

OSPF

34 Top of Form

Refer to the exhibit. A technician wishes to return a switch to its default state. What additional action should be taken before reloading the switch?

The vlan.dat file should be deleted.

The native VLAN should be changed.

The MAC address table should be cleared.

The running configuration should be deleted.

35 Top of FormA network manager is creating an access list to give hosts in the 172.16.15.0/27 network access to the Internet. Which wildcard mask will allow only those hosts?

172.16.15.0 0.0.0.15

172.16.15.0 0.0.0.31

172.16.15.0 0.0.0.255

172.16.15.0 0.0.15.255

36 Top of Form

Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be most specific?

172.16.0.0/21

172.16.4.0/21

172.16.0.0/22

172.16.4.0/22

Page 15: Ccna 3rd 2nd

37 Top of Form

Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?It will set the gateway of last resort for R1.

It will configure the IP address 10.1.1.2 on one interface of R1.It configures the router to forward traffic that is destined for the 192.168.1.128/26 network through the interface with IP address 10.1.1.2.It configures a static route for all packets with the source network address 192.168.1.128/26.

38 Top of FormWhich feature of RSTP differentiates it from STP?

PortFast

UplinkFast

active topology

five port states

39 Top of FormWhich two statements correctly describe the features of IEEE STP? (Choose two.)

It immediately transitions all ports that are not discarding to the forwarding state.

It provides a mechanism for disabling redundant links in a switched network.

It has three port states: discarding, learning, and forwarding.

It ensures that there are no loops in the switched network.

It converges the switched network in less than 1 second.

40 Top of FormA company is trying to decide whether to use a PVC or an SVC for the company WAN connection. Which statement best describes a benefit of using a PVC?

A PVC is dynamically established between two points when a router requests a transmission.

A PVC eliminates the need for call setup and clearing for each transmission session.

A PVC is best suited for small companies with sporadic data flows.

A PVC does not require preconfiguration by a service provider.

41 Top of FormWhat is a limitation of RIPv1?

RIPv1 cannot run on networks that are using RIPv2.

RIPv1 does not send subnet mask information in its updates.

RIPv1 is not widely supported by networking hardware vendors.

Page 16: Ccna 3rd 2nd

RIPv1 requires enhanced router processors and extra RAM to function effectively.

RIPv1 consumes excessive bandwidth by multicasting routing updates using a Class D address.

42 Top of Form

Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?

Router B has EIGRP adjacencies with both router A and C.

Router B has a fully converged topology table.

Router B has not formed an adjacency with router A.

Router B has not formed an adjacency with router C.

43 Top of FormWhich statement is accurate about the CIR in Frame Relay?

It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.

The CIR can be no lower than the port speed of the local loop.The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit.It is possible to burst over the CIR if bandwidth is available.

44 Top of FormWhich subprotocol does PPP use to establish, maintain, test, and terminate a point-to-point link?

LCP

NCP

IPCP

IPXCP

Page 17: Ccna 3rd 2nd

45 Top of FormWhich three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)

CHAP sends passwords in clear text.

CHAP uses repeated challenges for verification.

PPP encapsulation is configured in interface mode.

CHAP uses a 2-way handshake to establish a link.

PPP encapsulation is the default for serial interfaces on Cisco routers.

CHAP uses a challenge/response that is based on the MD5 hash algorithm.46 Top of Form

Refer to the exhibit. What is the result of the address translation configuration for traffic that exits interface s0/0/0?

All hosts on the inside network will have their addresses translated to 172.31.232.182.

All hosts that connect to interface s0/0/0 will have their addresses translated to 172.31.232.0/24 addresses.

All hosts on the 172.31.232.0/24 network will have their addresses translated to 209.165.202.1.All hosts on the inside network will have their addresses translated to any one of the addresses from the 209.165.202.0/24 subnet.

47 Top of Form

Page 18: Ccna 3rd 2nd

Refer to the exhibit. EIGRP has been configured on all routers in the network. What is the reason for the route in the last line of the routing table to be marked as D EX?

The route is configured as a static route on router R1.

The route is a feasible successor to the destination 192.168.2.0/24 network.

The route is learned from another routing protocol or from outside the EIGRP network.

The route is in the “Active” state and will be removed from the routing table in 4 minutes and 23 seconds.

48 Top of FormWhat are two ways VLAN memberships can be created in an enterprise network? (Choose two.)

manually configuring the switch ports to be part of a VLAN

allowing the user to choose a specific VLAN through a GUI menu

configuring the switch to allow VLAN membership based on NetBIOS association

implementing an access list that specifies which devices are placed into specific VLANs.

associating MAC addresses to specific VLANs in a VLAN management policy server database

manually configuring the host devices to be part of a VLAN

49 Top of Form

Page 19: Ccna 3rd 2nd

Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements?

R2: Fa0/0 inbound

R1: S0/1/0 outbound

R1: S0/0/1 inbound

R2: S0/0/1 outbound

R2: Fa0/0 outbound

50 Top of FormAll OSPF routers in a network have been configured to use MD5 authentication. Which two statements describe the reasons for using this technology? (Choose two.)

All data passing between OSPF routers will be encrypted.

MD5 authentication ensures the integrity of the network information.

MD5 authentication optimizes bandwidth use on point-to-point links.

MD5 authentication will ensure that only routers with matching keys share routing updates.

The MD5 key will be sent to adjacent neighbors in plain text, after which OSPF updates will be encrypted.

51 Top of Form

Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed. How will this ACL affect the traffic at R1?

Page 20: Ccna 3rd 2nd

All traffic that exits the Fa0/1 interface will be denied.

All FTP traffic from the 192.168.2.0 network will be denied.

All traffic except FTP will be allowed to exit the Fa0/1 interface.

All traffic except FTP will be allowed from the 192.168.1.0 network.

52 Top of FormWhich statement is true about the difference between CHAP and PAP in PPP authentication?

PAP and CHAP provide equivalent protection against replay attacks.

PAP sends the password encrypted and CHAP does not send the password at all.

PAP uses a two-way handshake method and CHAP uses a three-way handshake method.PAP sends the password once and CHAP sends the password repeatedly until acknowledgement of authentication is received.