You are on page 1of 77

CCNA 640-802 Cisco Certified Network Associate

The following questions exhibit the types of questions that exist on the Cisco 640-802 exam. The exam expands 90 minutes which contains approximately 60 questions that are randomly selected from a pool of 631 available questions in total.

Exam Topics
The following topics are general guidelines for the content likely to be included on the Cisco Certified Network Associate exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe how a network works


Describe the purpose and functions of various network devices Select the components required to meet a network specification Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Describe common networked applications including web applications Describe the purpose and basic operation of the protocols in the OSI and TCP models Describe the impact of applications (Voice Over IP and Video Over IP) on a network Interpret network diagrams Determine the path between two hosts across a network Describe the components required for network and Internet communications Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach Differentiate between LAN/WAN operation and features

Configure, verify and troubleshoot a switch with VLANs and interswitch communications
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts Explain the technology and media access control method for Ethernet networks Explain network segmentation and basic traffic management concepts Explain basic switching concepts and the operation of Cisco switches Perform and verify initial switch configuration tasks including remote access management Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)

Describe how VLANs create logically separate networks and the need for routing between them Configure, verify, and troubleshoot VLANs Configure, verify, and troubleshoot trunking on Cisco switches Configure, verify, and troubleshoot interVLAN routing Configure, verify, and troubleshoot VTP Configure, verify, and troubleshoot RSTP operation Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network. Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.
Describe the operation and benefits of using private and public IP addressing Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM) Implement static and dynamic addressing services for hosts in a LAN environment Calculate and apply an addressing scheme including VLSM IP addressing design to a network Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc). Describe IPv6 addresses Identify and correct common problems associated with IP addressing and host configurations

Configure, verify, and troubleshoot basic router operation and routing on Cisco devices
Describe basic routing concepts (including: packet forwarding, router lookup process) Describe the operation of Cisco routers (including: router bootup process, POST, router components) Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Configure, verify, and troubleshoot RIPv2 Access and utilize the router to set basic parameters.(including: CLI/SDM) Connect, configure, and verify operation status of a device interface Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities Perform and verify routing configuration tasks for a static or default route given specific routing requirements Manage IOS configuration files. (including: save, edit, upgrade, restore) Manage Cisco IOS. Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, traceroute, and telnet or SSH) Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG commands. Implement basic router security

Explain and select the appropriate administrative tasks required for a WLAN
Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC) Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS) Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA1/2)

Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)

Identify security threats to a network and describe general methods to mitigate those threats
Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats Explain general methods to mitigate common security threats to network devices, hosts, and applications Describe the functions of common security appliances and applications Describe security recommended practices including initial steps to secure network devices

Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.
Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM) Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI) Verify and monitor ACLs in a network environment Troubleshoot ACL issues Explain the basic operation of NAT Configure NAT for given network requirements using (including: CLI/SDM) Troubleshoot NAT issues

Implement and verify WAN links


Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Describe VPN technology (including: importance, benefits, role, impact, components) Configure and verify a PPP connection between Cisco routers

CCNA 640-802
which three variables (router, protocol port#, acl direction) apply to an extended ACL that will prevent student02 from securely browsing the internet?

Closest router (extended acl nearest to source), http, and IN direction.

which command is used to display the collection of OSPF link States?

Show ip ospf database


if you are a network admin, how ill you explain VTP configuration to a new technician?

1. in VTP client mode, a switch is unable to update its local VLAN datase 2. Configure a trunk between the switches to forward VTP updates and 3. in VTP transparent mode, a switch will forward the received updates to other switches, but does not apply update to itself.
Switch 1 has been restarted and has passed the POST. Host A sends its initial frame to Host C. What is the first thing the switch will do as regards populating the switching table? Pict. Below

Switch1 will add MAC ending E612 to switching table

why do large OSPF networks use a hierarchical design? (choose three)

1. to confine network instability 2. to speed up convergence 3. to reduce routing overhead


a switch is configured with all ports assigned to VLAN 2. In addition, all ports are configured as full-duplex. What is the effect of adding switch ports to a new VLAN on this switch?

an additional broadcast domain will be created

DLCI 17 is the layer 2 address used by R2 to describe a PVC to R3

on router 1, configure NAT to translate an address on the 209.165.100.0 /24 network to 192.168.1.10

continued next page!!!

router# show cdp neighbor ... Device ID Local Interface Platform PortID Birminham Fas 0//0 2514 E1 Relmap Fas 0/1 2621 Fa0/0 Boaz S0/0 2501 S0 Atlanta S0/1 2620 S0/1 router# show running-configuration ! interface FastEthernet0/0 ip add 192.168.237.1 /24 ! interface FastEthernet0/1 ip add 192.168.107.1 /24 ! interface Serial0/0 ip add 192.168.66.1 /24 ! interface Serial0/1 ip add 192.168.220.1 /24

The internetwork at company XYZ consists of a single OSPF area as shown. There is a concern that a lack of router resources is impeding network performance. The OSPF DR's need to be known. All the router OSPF priorities are at the default and the router ID are shown with each router. Which routers are likely to have been elected as DR? (choose two) *** There are two segments, separated by Corp-3 router. Routers Corp-4 and Branch 2 may be elected as DR's. *** Remember, Highest IP assigned to a loopback. If no loopback, highest IP of interfaces. No loopback in this photo.

A network engineer wants to allow a temporary entry for a remote user with specific username and password so that the user can access the entire network over the internet. Which ACL can be used? Dynamic ACL can be used

Router# config t router(config)# line vty 0 4 router(config-line)# password c1sc0 router(config-line)# login Telnet

which user-mode password has just been set???? (auxiliary, ssh, telnet, console)

The Ethernet network connected to router R1 has been summarized for router R2 as 192.1.144.0 /20. Which packet destination address will R2 forward to R1, according to this summary? (choose two) of A. 192.1.159.2 B. 192.1.160.11 C 192.1.138.41 D. 192.1.151.254 E. 192.1.143.145 6. F. 192.1.1.144

192.1.159.2 and 192.1.151.254 A & D (192.1.144.0 to 192.1.159.255)

When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL? Show ip interface

Total RAM size is 65536 KB 53428 + 12288 for total of (64 MB) and Flash size is 16 MB (16384 bytes)

If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5 because Link Speeds If RIPv2 is the routing protocol, the path will be from R1 to R5 because of Hop Counts

Abcd.abcd.b002 MAC of R2 and 10.2.0.15 IP of Host A

Only use static route to send packets with a remote destination network not in the routing table to the next hop router. Generally, only use default routing where there exists only one path out of the network. Syntax is ip route <remote_network> <netmask> <next_hop_address>. In this case, ip route 0.0.0.0 0.0.0.0 172.16.100.2

Which statements describe two of the benefits of VLAN Trunking Protocol? (choose two) VTP simplifies administration by allowing switches to automatically share VLAN configuration information and... VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.

Switch 1 will flood (broadcast) the data out all of its ports except the port from which the data originated

A catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (choose three) Delete vlan database and... Erase startup configuration and... Restart the switch

network 172.26.0.0

For what two purposes does the Ethernet protocol use physically addresses? (choose two) To uniquely identify devices at layer 2 and... to allow communication between different devices on the same network

Match attributes to Protocol... Drag and Drop. What are two security appliances that can be installed in a network? (choose two) DS intrusion detection system and IPS intrusion protection system

/30 ( *.252 subnet) as it will provide a subnet with 2 hosts which is used between two routers on WAN link. OSPF routing uses AREAS. What are the characteristics of OSPF Areas? (choose three) Areas may be assigned any number from 0 to 65535 and... Area 0 is called the backbone and... Multiple OSPF Areas must connect to Area 0.

Core_Router is connected to more than one multi-access network. An OSPF router will not form adjacencies to just any router. Instead, a client / server design is implemented in OSPF on each broadcast segment. For EACH multi-access segment, there is a DR and a BDR and DROTHERs If you have 10 VLANs, there are 10 DR's and 10 BDR's. *** Except for WAN links like two routers Point to Point.

When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host it wants to talk to ? ARP request

A Layer 1 physical problem exists and an incorrect cable is being used

What are three advantages of VLANS? VLANs establish broadcast domains in switched networks and... VLANs allow access to network services based on departments / physical locations and... VLANs can greatly simplify adding, removing, or changing hosts on the networks.

The mapping between DLCI 100 and the end station IP address 172.16.3.1 were learned through inverse ARP.

The IP Address of Host 1 and the MAC address of the Fa0/1 interface on R1 Which two are features of Ipv6? Multicast and anycast

Which command is used to see the path taken by packets across an IP network? Trace route

Access Control Lists (ACL's) and VLANs

Which protocol provides a method of sharing VLAN configuration between two Cisco switches? Virtual Trunking Protocol - VTP Which three of these statements regarding 802.1q trunking are correct? 802.1Q native VLAN frames are untagged by default and... 802.1Q trunks can use 10 MB/s Ethernet interfaces and... 802.1Q trunks should have native VLAN's that are the same at both ends Which name describes an Ipv6 host-enabled tunneling technique that uses Ipv4 UDP, does not require dedicated gateway tunnels, and can pass through existing Ipv4 NAT gateways? Teredo . NOT dual stack, manual 6to4 or dynamic Which of the following describes the roles of devices in a WAN? (choose three) A CSU / DSU terminates a digital local loop, a modem terminates an analog loop, and... a router is commonly considered a DTE device In which solution is a router ACL used? Filtering packets that are passing through a router What will happen if a private IP address is assigned to a public interface connected to an ISP? Addresses in a private range will not be routed on the internet backbone Which Cisco router IOS commands can be used to troubleshoot LAN connectivity problems? Ping and... show ip route and... show interfaces What is the effect of using the service password-encryption command on Cisco switches? It will encrypt all current and future passwords

Switch A is not the root bridge, becaue not all of the interface roles are identified

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? Network or subnet IP address and... a broadcast address on the network

The Hello and Dead Interval timers are not set to same on all devices. *** the values of these needs to match on all OSPF routers area #, Hello and Dead intervals, OSPF passwords, Area Stub Flag, and MTU size

Which two security appliances will you use in a network? IDS and IPS

Incorrect IP Address assignment. Must have been statically assigned, incorrectly. Which command can you use to determine the Cisco IOS feature set on a Cisco router? Show version

Devices will be able to use SSH but not Telnet

What is the OSPF default frequency, in seconds, at which a cisco router sends HELLO packets on a multi-access network? 10 seconds

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets? Neighbor table and Topology table

Which two benefits are provided by using a hierarchical addressing network addressing scheme? (choose two) It reduces routing table entries and... ease of management / troubleshooting

The number of broadcast domains would remain the same and... the number of collision domains would increase What value is primarily used to determine which port becomes the ROOT port on each Non-Root switch in a Spanning

Tree topology? Path Cost

London# show vtp status vtp version configuration revision max vlan support number of existing vlans vtp mode vtp domain name vtp pruning mode vtp v2 mode vtp traps

Madrid# show vtp status 2 0 64 5 server london disabled disabled disabled server madrid disabled disabled disabled 2 0 64 5

A network administrator has configured two switches, named London and Madrid, to use VTP. However, the switches are not sharing VTP messages. Given the command output. Why are the switches not sharing VTP messages?
Domain Names are different Which of the following correctly describe steps in the OSI data encapsulation process? (choose two) Transport Layer divides a data stream into segments and may add reliability and flow control information Packets are created when the network layer adds Layer 3 addresses and control information to a segment

When running OSPF, What would cause router A not to form an adjacency with router B?

The Dead Interval timers are different NOT Because of --- loopback address are on different subnets, or router summarization is enabled, or the process identifier is different between the routers. Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over Fast Ethernet? 802.1 Q

What is the maximum data rate specified for IEEE 802.11b WLANs? 11 Mbps An administrator issues the command ping 127.0.0.1. If a reply is received, what does this confirm from a PC?

The PC has the TCP/IP protocol stack installed correctly Which two protocols are used by bridges and / or switches to prevent loops in a layer 2 network? 802.1d (STP) and STP

The subnet mask used is 255.255.255.128 (172.16.1.0, 172.16.1.128, 172.16.2.0, 172.16.2.128...) The IP address 172.16.1.125 can be assigned to hosts in VLAN 1 The LAN interface of the router is configured with multiple addresses If IP Routing is enabled, which two commands sets the gateway of last resort to the default gateway? (choose two) Ip default-gateway 0.0.0.0 ip route 0.0.0.0 0.0.0.0 172.16.2.1 Which Cisco IOS command can disrupt the operation of a router under high-load conditions? Debug All On the network 131.1.123.0 /27, what is the last IP address that can be assigned to a host? 131.1.123.30 (subnets are blocks of 32... subnets are 131.1.123.0, *.32, *.64, *.96, *.128...)

Which command will create a default route on Router B to reach all networks beyond Router A?

Ip route 0.0.0.0 0.0.0.0 192.168.2.2

The network default gateway applying to a host by DHCP is 192.168.5.33 /28. Which option is the valid IP address of this host? 192.168.5.55 or 192.168.5.47 or 192.168.5.40 or 192.168.5.32 or 192.168.5.14 192.168.5.40

SwtichA, Fa0/2 is designated SwitchA, Fa0/1, is root SwitchD, Gi0/2 is root Which command can be used from a PC to verify connectivity between hosts that connect through a switch in the same LAN? Ping address

If Fa0/0 is down on R1, Host A cannot access Server 1 QoS policies are applied on the switches of a LAN. Which type of command will show the effects of the policy in real time? Debug command Which two link protocols are used to carry multiple VLANs over a single link? (choose two) 802.1q and ISL. Trunking protocols... ISL is Cisco's

Any packet destined for a network that is not referenced in the routing table of R2 will be directed to R1. R1 will then send packet back to R2, and is a LOOP!!! a big problem! Default route should reference Serial 0/1 and not Serial 0/0 interface on R1.

LMI protocol, a datalink protocol, is used in this network with Frame Relay. Answer is FRAME RELAY protocol. What should be done prior to backing up an IOS image to a TFTP server? (choose three) Make sure the server can be reached across network Assure network server has space required Verify the file name and path requirements Which two statments are true of Ipv6 address representation? (choose two) A single interface may be assigned multiple Ipv6 addresses of any type Every Ipv6 interface contains at least one loopback address An administrator attempts a traceroute but receives Destination Unreadable message. Which protocol is responsible for that message? ICMP An administrator cannot establish a Telnet session with the indicated router. Why? hostname router enable secret $1223baserree interface fastethernet0/0 ip address 192.168.1.1 255.255.255.0 ip access-group 101 in ! access-list 101 deny tcp any any eq 22 access-list 101 permit ip any any ! line con 0 password 749849494 login line vty 0 4 login line vty 5 14 login !

A VTY password is missing

How do you determine what switch sent VLAN information? On switch in question, perform show vtp status to identify last modified by Perform show cdp neighbor detail command to map IP to switch name Which three statements about VTP features are true? (choose three) VTP minimizes misconfigurations and configuration inconsistencies Client, Server, and Transparent are valid VTP modes VTP pruning is used to increase available bandwidth in trunk links

Only Host A will be allowed to transmit frames on fa0/1 All frames arriving on 2950Switch with destination address of 0000.00aa.aaaa will be forwarded out fa0/1 The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely cause of the problem?

Username / password is incorrectly configured How many paths can EIGRP routing process use to forward packets from HQ_Router to a neighbor router? HQ_Router# show ip protocols Routing Protocol is "eigrp 109" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default network flagged in outgoing updates Default network accepted from incoming updates EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 3 Redistributing: eigrp 109 EIGRP NSF-aware route hold timer is 240s Automatic netowrk summarization is not in effect Maximum path: 4 Routing for Networks: 20.10.10.0 /24 172.30.10.0 /24 Routing Information Sources: Gateway Distance Update 192.168.1.1 90 00:13:12 172.16.10.2 90 01:13:06 HQ_Router# 4 unequal cost paths

If a Cisco router has learned about network 10.1.1.0 from multiple sources, the router will select and install only one route. What is the preferences, in order 1st, 2nd, 3rd, 4th, and 5th?

What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL? Router# show access-lists Extended IP access list 110 10 deny tcp 172.16.0.0 0.0.255.255 any eq telnet 20 deny tcp 172.16.0.0 0.0.255.255 any eq smtp 30 deny tcp 172.16.0.0 0.0.255.255 any eq http 40 permit tcp 172.16.0.0 0.0.255.255 any Traffic will be dropped, because of the implicit deny at end of ACL. Line 30 only denies HTTP traffic originating from 172.16.0.0 Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN? Data Link Layer (2)

Because of Split Horizon rule, R2 will be prevented from sending erroneous information to R1 about connectivity to 192.168.1.0 network When R2 learns from R1 that the link is down, R2 will respond by sending a route back to R1 with an infinite metric to 192.168.1.0 network. *** RIP doesnt advertise routes back out the interface in which they came.

Router 3, HTTP and IN direction for ACL Which three elements must be used when you configure a router interface for VLAN trunking? (choose three) Subinterface encapsulation identifiers that match VLAN tags One IP Network or Subnet for each subinterface One subinterface Per VLAN After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table? Router_1# show ip protocols routing protocol is "rip" sending updates every 30 seconds, next due in 8 seconds invalid after 180 seconds, hold down 180, flushed after 240 outgoing update filter list for all interfaces is not set incoming update filter list for all interfaces is not set Router_1# 60 seconds What is the principle reason to use a private IP address on an internal network? Conserve public IP addresses so that we do not run out of them

Which of the following are true regarding the debug output? (choose two) Router1# 1d05h RIP sending v1 update to 255.255.255.255 via FA0/0 (172.16.1.1) 1d05h RIP building update entries 1d05h network 10.0.0.0 metric 1 (<-------- DIRECTLY CONNECTED) 1d05h network 192.168.1.0 metric 2 1d05h RIP sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1) 1d05h RIP building update entries 1d05h network 172.16.0.0 metric1 (<-------- DIRECTLY CONNECTED) 1d05h RIP received v1 update from 10.0.15.2 on Serial0/0 1d05h 192.168.1.0 1 hops 1d05h 192.168.0 in 16 hops (inaccessible) This router was configured with commands router rip network 172.16.0.0 network 10.0.0.0 and... Network 10.0.0.0 will be displayed in the routing table SwX was removed. It will be reconnected to the FA0/16 port of Sw-AC3. What happens to the network when it is reconnected and a trunk exists between the two switches? The pre-existing VLANs (servers, management, production, and no-where)on Sw-AC3 will be removed because Sw-AC3 is configured as a VTP client. Connecting SwX (a VTP server) into Sw-AC3 Fa0/16 will override VLAN configuration. Which two statements best describe the wireless security standard that is defined by WPA ((not WEP))(choose two)? It specifies the use of dynamic encryption keys that change each time a client establishes a connection It includes authentication by PSK Compare OSPF and EIGRP EIGRP: is vendor specific & default admin distance of 90 OSPF: elects a DR on each multiaccess network & uses COST as its metric What command is used to configure a default route? Ip route 0.0.0.0 0.0.0.0 Gateway_IP example, ip route 0.0.0.0 0.0.0.0 192.168.1.1 How are VTP advertisements delivered to switches across the network? Multicast frames every 5 minutes as a multicast in 224.x.x.x range In an Ethernet network, under what two scenarios can devices transmit? (choose two) When they detect no other devices are sending (CSMA/CD) when the medium is idle How does a DHCP server dynamically assign IP addresses to hosts? Addresses are leased to hosts and kept by a lease assignment time period.

** NEED TO LEARN MORE ABOUT THIS **

Ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 19 Match OSPF LSA's on left to area types on right Stub = lsa 1,2,3 NSSA = lsa 1,2,3, 7 Backbone of Transit = lsa 1,2,3,4,5 Totally NSSA = lsa 1,2,7 Totally Stubby = lsa 1,2

Which parameter can be tuned to affect the selection of a static route as a backup, when a dynamic protocol is also being used? Administrative Distance What are three Ipv6 transition mechanisms? 6to4 tunneling, ISATAP tunneling, Teredo Tunneling What information can be used by a router running a link-state protocol to build and maintain its topological database? Hello Packets and Link State Advertisements from other routers

The IP Address of Host B and the MAC address of Router 1 Fa0/0 The IP Subnet Zero command is not configured. What would be the IP Address of Ethernet0/0 using the 1 st available address from the 6th subnet of the network 192.168.8.0 /29 Subnets are: *.0, *.8, *.16, *. 24, *.32, *.40, *.48, *.56... do not count the 1 st subnet as its not configured to be used. 192.168.8.49 is the 1st usable address in the 6th subnet1

What is one benefit of PVST+ PVST+ allows the Root switch location to be optimized per VLAN What does the Frame-Relay interface-dlci command configure? Local DLCI on the SubInterface

Which command is used to copy the configuration from RAM into NVRAM Copy running-config startup-config

R1 will strip off source MAC and replace it with MAC on forwarding FastEthernet interface Fa0/2 R1 will strip off destination MAC and replace it with MAC of Host B R1 will forward data frame out interface Fa0/2 WAN Link Types (advantages & disadvantages) P2P Advantage = quality P2P Disadvantage = limited flexability Circuit Switched Advantage = Cost Circuit Switched Disadvantage = low speed Show interfaces ethernet 0. what is meaning of MTU 1500 bytes? The maximum packet size (not frame size, or segment size) that can traverse the interface is 1500 bytes

a network associate is adding security to the configuration on Corp 1 router. The user on Host C should be able to use a web browser to access financial data from finance web server. No other hosts from the LAN nor Core should be able to use a web browser to access this server. Since there are multiple resources, ALL other traffic is allowed. Task is to create and apply an access-list with no more than three lines that allows only Host C web access to finance server. password= cisco Core 192.18.196.65 A 192.168.33.1 B 192.168.33.2 C 192.168.33.3 D 192.168.33.4 Servers 172.22.242.17 to 172.22.242.30 Finance Server 172.22.242.23

Computers 192.168.33.1 to 192.168.33.254

Corp1 Router enable configure terminal access-list 100 permit host 192.168.33.3 host 172.22.242.23 eq 80 access-list 100 deny tcp any host 172.22.242.23 eq 80 access-list permit ip any any show ip interface brief (to identify type & number) interface fa0/1 no ip address 192.168.x.x 255.x.x.x ip address 172.22.242.30 255.255.255.240 ip access-group 100 out end copy running-configuration startup-configuration show ip interface brief

The diagram shows a topology using static routes. If we change from static routing and use RIP v2, what will need to be done to use RIP v2.?

Configure the S0/0 on R1 as two SubInterfaces, and... configure Point-to-Point links to R2 and R3 A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 10, 15 on Sw11 cannot communicate with hosts in same VLAN on Sw12. Hosts in the Admin VLAN are able to communicate. What is the problem?

The link connecting the switches has not been configured as a Trunk... Which term describes the process of encapsulating Ipv6 packets inside of Ipv4 packets? tunneling Which command shows your active telnet connections? Show session

Serial0/1 is up, line protocol is up = port is operational Serial0/1 is up, line protocol is down = layer 2 problem Serial0/1 is down, line protocol is down = layer 1 problem Serial0/1 is administrator down, line protocol is down = port is disabled with shutdown command

A network admin must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports? Switchport port-security mac address sticky command on all ports that have end devices connected on them A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing. OSPF has been configured on the router. Which statement about this network is true? Direct inter-vlan communication does not require OSPF What are three characteristics of the OSPF routing protocol? It converges quickly it uses Cost to determine best route OSPF routers discover neighbors before exchanging routing information What command is used to display the collection of OSPF link states? Show ip ospf database Which PPP sub-protocol negotiates authentication options? LCP Which command reveals the last method used to power cycle a router? Show version

Which command allows hosts on Branch to communicate with hosts on HQ LAN? HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5 Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6 A switch is configured with all ports assigned to VLAN 2, full duplex. What is the effect of adding switch ports to a new VLAN on the switch? An additional broadcast domain will be created What two statements describes the Cisco implementation of VLANs? VLAN 1 is the default VLAN VLANs 1002 1005 are automatically created and cannot be deleted

What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch? It designates VLAN 999 for untagged traffic (all NON-TAGGED traffic is sent through native vlan) Running both Ipv4 and Ipv6 on a router is known as what? Dual-stack routing Which command is used to enable CHAP authentication with PAP as the fallback on a serial interface? router(config)# ppp authentication chap pap A new subnet with 60 hosts has been added. Which subnet address should this network use to provide enough usable addresses while wasting the fewest?

192.168.1.64 /26 Which of the following are true regarding bridges and switches? (choose two) A switch is a multiport bridge Bridges and Switches learn MAC by examining the Source MAC of each frame recieved Which ports will STP designate if all the links are operating at same bandwidth? (choose three)

Switch A Fa0/1...SwitchB Fa0/0...Switch B Fa0/1

What is most likely the reason that interface Fa0/10 is not the root port for VLAN2?

The switch interface has a higher path cost to the root bridge than another in the topology During the data transmission between hosts over a network, which process does the data experience? Encapsulation Which of the following are types of flow control? (choose three) Buffering...windowing...congestion avoidance Host A cannot ping Host B. What could be the cause of the problem?

The serial interface on the routers are not in same subnet What can be determined from the line of show ip route R 10.10.10.8 [120 / 2] via 10.10.10.6, 00:00:25, Serial0/1 The route is using default administrative distance... and 10.10.10.8 network is two hops away from this router Two switches are connected through a trunk link. Which two commands show that there is a native vlan mismatch? Show interface switchport and show interface trunk Which three layer 2 encapsulation types would be used on a WAN rather than a LAN? HDLC, PPP, and Frame Relay

Which command is used to create a Static Map to S-AMER router? Frame-relay map ip 172.30.0.3 196 Broadcast Allows access to high level testing commands such as debug - enable Allows access to configuration commands that affect system config t Sets the system name - hostname Activates the interface configuration mode for VLAN interface vlan 1 Enables the switch management interface no shutdown Sets the switch management IP address ip address Allows the switch to be managed from remote networks ip default-gateway

Which two states are the port states when RSTP has converged? Learning and... forwarding Which statements about vlan operation on cisco switch is true? Unknown unicast frames are retransmitted only to the ports that belong to the same vlan What is the effect of the configuration below? Line vty 0 4 password 7 030875400 login transport input ssh It configures the use of SSH on incoming virtual terminals

Which component of VPN technology ensures data can be read only by its intended recipient? authentication Assuming the default configuration which vlan can be added, modified and removed from a cisco switch? 2 through 1001 router(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1 MAC 0000.00aa.aaaa does not need to be learned by the switch MAC 0000.00aa.aaaa will be listed in the MAC table for interface fa0/1 What are two characteristics of telnet? It sends data in clear text... and... it requires destination device to support a telnet session Which term describes a spanning-tree network that has all switch ports in either blocking or a forwarding state? converged How can you erase the VTP database of VLANs on a Cisco IOS switch running in VTP server mode? SwitchA# erase vlan dat ...and then reboot A newly created network needs 300 subnetworks and a maximum of 50 hosts per subnet for a Class B addressing scheme. Which m subnet mask is appropriate to accommodate the need? 255.255.255.128 or 255.255.255.192 At which layer of the OSI model do WANs operate? Layer 2 the Data Link and layer 1 the physical layer An inbound access list is applied to a serial interface to deny packet entry for TCP and UDP ports 21, 23, and 25. What types of packets wil be permitted by this ACL?

HTTP, POP3, and DNS The output shown below. Which three statements are true?

The Bridge priority is lower than the default value of 32768... All deisgnated ports are in a forwarding state This switch must be the root bridge for all vlans on this switch Which two data integrity algorithms are commonly used in VPN solutions? HMAC-SHA-1 and HMAC-MD5 Which of the following are associated with the application layer of the OSI model? Telnet and FTP Which of the following describe the process identifier that is used to run OSPF on a router? (choose two) It is locally significatnt It is needed to identify a unique instance of an OSPF database A network admin wants to know every hop the packets take when accessing cisco.com. Which command is the most appropriate? Traceroute cisco.com Which Cisco feature automatically disables the port in an operational PortFast upon a receipt of a BPDU? BPDU Guard

What commands are used to configure RIP v2 on router B?

RouterB(config)# router rip RouterB(config)# version 2 RouterB(config)# network 172.16.0.0 RouterB(config)# network 10.0.0.0

Host 1 cannot receive packets from Host 2. Assuming RIP v1 is the routing protocol, what is wrong with the IP communication?

The fa0/1 network on R2 overlaps with LAN attached to R1 Host 2 has been assigned the incorrect subnet mask Which address and subnet mask represents a summary of the routes learned by EIGRP? Gateway of last resort is not set 192.168.25.0 /30 is subnetted, 4 subnets D 192.168.25.20 [90/2681856] via 192.168.15.5, Serial0/1 D 192.168.25.16 [90/1823638] via 192.168.15.5, Serial0/1 D 192.168.25.14 [90/3838223] via 192.168.15.5, Serial0/1 C 192.168.15.4 /30 is directly connected Serial0/1 C 192.168.2.0 /24 is directly connected, FastEthernet0/0 192.168.25.16 255.255.255.240

What will happen if Host 1 sends a broadcast? Host 2 and the Fa0/0 on R1 will receive the broadcast. Routers break up broadcasts domains and do not forward broadcasts, by default. However, routers can forward them if configured to do so. What can be determined about the router from the console output? 1 FastEthernet / IEEE 802.3 interfaces 125K bytes of non-volatile configuration memory 65536K bytes of ATA PCMCIA at slot 0 8192K of Flash internal SIMM ---- system configuration dialog ---Would you like to enter initial configuration dialog [yes / no] No configuration was found in NVRAM What are possible reasons why destination host unreachable reply when attempting to ping? A link is down / missing between the two end devices If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt? [0] go to IOS command prompt without saving this config. [1] return back to setup without saving this config. [2] save this configuration to nvram and exit. Setup is addidtive and any changes will be added to the configuration script. Which command sets and automatically encrypts the privileged enable mode password? Enable secret C1sc0 As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen? The WAN encapsulation type has changed at layer 2 (for WAN services) and... The Source & Destination MAC address have changed Which IP address can be assigned to an internet interface? 9.255.255.10 a public IP. IP address in private range cannot be assigned; 10.0.0.0 10.255.255.255, 172.16.0.0 to 172.131.255.255, and 192.168.1.0 to 192.168.255.255...

Why do pings fail between hosts on 172.16.2.0 /25 and 172.16.2.128 /25 network? Split Horizion is preventing R2 from learning about the R3 networks, and R3 from learning about R2 networks. Which two statements apply to dynamic access lists? You can set a time-based security poligy... and... they are used to authenticate individual users How many address for hosts will the network 124.12.4.0 /22 provide? 1022 usable host address exists... (physically there is 1024 but 2 are not used; subnet & broadcasts) What would be the effect of issuing the command IP Access-Group 115 on a Serial0/0/1 interface? No host could connect to Router through S0/0/1 What is the most efficient route summarization that R1 can use to advertise its network to R2?

172.1.4.0 /22 (172.1.4.0 255.255.252.0) Which routing protocols will support the following ip addressing scheme? 192.168.10.0 /26 192.168.10.64 /27 192.168.10.96 /27 192.168.10.128 /30 192.168.10.132 /30 RIPv2, EIGRP, and OSPF all support classless IP schemes... RIP v1, IGRP do not as they are classfull

What information will Router E contain in its routing table for subnets 208.149.23.64 and 208.149.23.96?

208.149.23.64 [110/13] via 190.173.23.10 FastEthernet0/0 *** router E is 1 more hop away from A, which has 12. 208.149.23.96 [110/13] via 192.173.23.10 FastEthernet0/0

Inverse ARP *** local DLCI must be mapped to destination routers IP address. In this case, there are two options; one being Inverse ARP or two, being a static mapping. By default, inverse arp runs on Frame Relay when its enabled. To enable a static mapping: R1(config)# interface serial0 R1(config-if)# no frame-relay inverse-arp R1(config-if)# frame-relay map ip 200.1.1.2 122 broadcast R1(config-if)# frame map ip 200.1.1.3 123 broadcast Which pairing reflects a correct protocol and metric relationship? RIPv2 and number of hop counts A request timeout displays when attempting to ping form a PC. At which layer of the OSI model does the problem most likely exist? Network Layer, Layer 3 Matching... a router is this type of device = DTE the most common type of virtual circuit = PVC provides status messages between DTE and DCE device = LMI Identifies the virtual connection between the DTE and the Switch = DLCI (a frame relay switch from carrier) router(config)# line vty 0 4 router(config-line)# password c1sc0 router(config-line)# no login What is the result of setting no login command? Telnet access is denied What is the alternative notation for the Ipv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72 ? B514:82C3::0029:EC7A:0:EC72 (a double colon :: represents a string of 0's) When you are troubleshooting an ACL issue, which command can help you verify which interfaces are affected by ACL? Command show ip interface whereas show ip access-lists does not show interfaces that are affected. How many subnets can be gained by subnetting 172.17.32.0 /23 into a subnetmask of /27, and how many are usable per subnet? 16 subnets with 30 hosts on each subnet

Which type of attack is characterized by flood of packets that are requesting a TCP connection to a server? Denial of Service DoS

Which subnet mask will place ALL hosts on Network B in same subnet with the least amount of wasted addresses? 255.255.254.0 will accommodate serial links between the two routers; each having 1 ip for that link. router# show frame-relay lmi LMI Statistics for interface S0/0 (frame relay DTE) LMI Type= ANSI invalid unnumbered info 0 invalid Prot Disc 0 invalid dummy call ref 0invalid Msg Type 0 invalid status message 0 invalid Lock Shif 0 invalid information ID 0 invalid Report IE 0 invalid Report Request 0 invalid Keep IE 0 Num Status Enq. Sent 61 Num Status msg Rec 0 Num update Status Rcvd 0 Num Status Timeout 60 Which two statements are true based on this output? LMI messages are being sent on DLCI 0 . and Frame Relay switch is not responding to LMI requests from the router if Cisco's LMI was used, the TYPE is 1023 and not ANSI What are two characteristics of Frame-Relay Point-to-Point subinterfaces? (choose two) They require a unique subnet within a routing domain... and... they emulate leased lines Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (choose two) It establishes a static route to the 172.16.3.0 network... and it uses default administrative distance even though its omitted in the command. Which two values are used by Spanning-Tree Protocol to elect a root bridge? Bridge priority... and MAC address (switches having lowest Bridge ID become Root bridge) determine by 32768 and MAC. A company has a small network of a single router and switch. There are two VLANs, and "router-on-a-stick" is being configured for inter-vlan routing. A trunk is configured between switch and router. What is the minimum number of router subinterfaces that are required for all the vlans to communicate? Two (2)... a interface / subinterface for each vlan is needed!!! Which device might be installed at a branch office to enable and manage an IPSec site-to-site VPN? Cisco Adaptive Security Appliance ASA Matching... Blocks unknown MAC address from accessing a WLAN = IDS Detects software designed to capture sensitive information & removes it from computer = AntiSpyware Prevents known malicious programs from being installed on PCs = Antivirus Identifies malicious network traffic and alerts network personnel = Firewall

Which two statements are true?

There are 7 interfaces with differing VLANs on Fa0/1. This means it must be a Trunk Port to accommodate VLANs Int Fa0/5 has two entries in MAC table, yet doesnt show in cdp neighbor command. It must be connected via Hub. Which rule does the DHCP server use when there is an IP address conflict? The address is removed from the pool until the conflict is resolved What is the default routing update for RIPv2? 30 seconds

Switch A does not have an IP Address Which two statistics appear in show frame-relay map? (choose two) Status of PVC that is configured on the router... and the value of the local DLCI# Given the address 192.168.20.19 /28, which of the following are valid host addresses on this subnet? 192.168.20.29... and 192.168.20.17 What IP address would you ping to ping a loopback address on a PC? 127.0.0.1 Which protocols are found in the network layer of the OSI model, and are responsible for path determination and traffic switching? routing

199.99.9.57 A router interface is configured for Frame Relay. The router will not accept the command to configure LMI type. What is the problem? router(config-if)# frame-relay lmi-type cisco ^ % unrecognized command The interface requires the encapsulation frame-relay command be entered 1 st.

The LakeSide Co. admin wants to reduce the routing table on Central router. Which partial table entry represents a route summary for the LAN in Phoenix but no additional subnets? 10.0.0.0 /22 is subnetted, 1 subnet D 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

The IP's between routers is incorrectly assigned on Brevard How many bits are contained in each field of an Ipv6 address? 16 What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command? Defines the DLCI# that is used for all packets that are sent to the 192.168.1.2 address What are two benefits of using NAT? NAT protects network security because private networks are not advertised NAT eliminates the need to re-address all hosts that require external access

Which command enhances the 802.1d convergence time on ports that are connected to hosts? Spanning-tree portfast How should a router that is being used in Frame-relay be configured to avoid split-horizon issues from preventing routing updates? Configure a separate sub-interface for each PVC with unique DLCI and subnet assigned to the sub-interface #231

The web server uses 209.165.200.225 as DA and 3648 as destination port when sending packets to host A Which two statements describe the advantages to the use of RIP over the use of OSPF? RIP is less complex to configure and RIP demands fewer router resources; cpu & memory A network admin is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meets the requirements with fewest subnets and host ip addresses? 10.10.0.0 /25 subnetted with 255.255.255.252

Which command would correctly configure a serial port on a router with the LAST usable host address in 192.216.32.32 / 29 subnet? router(config-if)# ip address 192.168.32.38 255.255.255.248 What two reasons has the router loaded its IOS from the location that is shown... 0x2102 Router 1 has specified boot system commands that instruct it to load IOS from TFTP server

Router 1 cannot locate a valid IOS image in flash memory

How should the Fa0/1 ports on 2950 switches be configured to allow connectivity between all devices? SwitchX(config)# interface fa0/1 SwitchX(config-if)# switchport mode trunk a trunk port needs to be made

Dubai# show frame-relay map int fa0/0 no ip add ! int s1/0 ip add 172.30.0.1 255.255.255.240 encapsulation frame-relay no fair-queue ! int S1/1 ip add 192.168.0.1 255.255.255.252 ! int S1/2 ip add 192.168.0.5 255.255.255.252 The serial connection to the MidEast branch office is using default serial encapsulation The command frame-relay map ip 10.121.16.8 102 broadcast was entered on a router. Which of the following statement is true?

The broadcast option, allows packets such as RIP updates, to be forwarded across the PVC. ACL 102 access-list 102 deny tcp 172.21.1.1 0.0.0.255 any eq 80 access-list 102 deny ip any any an attempt to block www traffic prevented all traffic from the subnet to be blocked. How do you remove the 102 ACL? no ip access-group 102 out Which two are advantages of static routing when compared to dynamic routing? Routing traffic load is reduced in stub network links Security increases because only the admin may change the routing table

Communication between host 1 and host 2 over the ppp wan, which protocol is represented by dashed line A? IP Which command would you configure globally on a router to allow you to view directly connected Cisco devices? Cdp run

A network admin designed a redundant network. All devices in same VLAN. What conclusion can be made? The router will not accept the addressing scheme What three statements are true about how router Jax will choose a path to 10.1.3.0 /24 when differing routing protocols are configured?

By default, if RIPv2 is the routing protocol, only the path JAX ORL will be installed in routing table When EIGRP is routing protocol, the equal cost paths JAX-CHI-ORL and JAX-NY-ORL will be installed into table With EIGRP and OSPF, EIGRP paths will be installed into routing table How do you ensure a particular switch will become the root bridge in STP environment? Lower the bridge priority on switch 1 from 32768 to some number lower. A network interface port has collision detection an carrier sensing enabled on a shared twisted pair network. What is known about the network interface? This is an Ethernet port operating at half duplex. *** remember, Full Duplex has noCSMA/CD because it doesn't need it.

Which command shows system hardware and software version information? Show version You are working in a data center and are assigned the address range 10.188.31.0 /23. You are asked to develop an IP address plan to allow the maximum number of subnets with 30 hosts each. What IP address assignment is this? 10.188.31.0 /27 (255.255.255.224) How many interfaces on R1 should be configured as ip nat inside to grant external access to the entire network?

3 Which approach should you use to configure the extended VLAN range (1006 to 4094) on Cisco Catalyst 3750 Switch? Conifgure the switch to be in the VTP transparent mode What are two results of entering the Switch(config)# vtp mode client command on a switch? The switch will forward vtp summary advertisements The switch will process vtp summary advertisements What command sequence will enable PAT from the inside to outside network? Ip nat pool MICH-NET 1.2.4.10 1.2.4.240 netmask 255.255.255.0 ! interface ethernet 1 description ISP connection ip address 1.2.4.2 255.255.255.0 ip nat outside ! interface ethernet 0 description Ethernet to Firewall eth0 ip address 10.10.0.1 255.255.252.0 ip nat inside ! access-list 1 permit 10.0.0.0 0.255.255.255 (config)# ip nat inside source list 1 interface ethernet 1 overload

R1(config)# int eth0 Ip add 192.1.1.129 255.255.255.192 No shutdown

R1(config)# in serial 0 Ip add 192.1.1.6 255.255.255.252 No shutdown

R1(config) router rip Version 2 Network 192.1.1.0

What is the purpose of the Cisco VLAN trunking protocol? To allow for managing the additions, deletetions, and changes of VLANs between switches If the router ID has not been manually set, what router ID will OSPF use for the router? Highest IP Address of a loopback. If not loopback, then highest IP of all other interfaces

Why would the administration configure RA in this manner? To prevent students from accessing the command prompt on router RA A Cisco router is booting and has completed POST. It is now ready to find and load an IOS image. What function does the router perform next? It checks the configuration register What two things will a router do when running a distance vector routing protocol? Send periodic updates regardless of topology changes Update the routing table based on updates from their neighbors

By default, all ports on a Cisco switch are assigned to VLAN 1. Which two recommendations are key to avoid unauthorized management access? Move the management VLAN to something else other than VLAN 1 Shutdown all unused ports in the switch Select the action that results from executing these commands: switch(config)# switchport port-security switch(config)# switchport port-security mac-address-sticky A dynamically learned MAC address is saved in the running configuration file. It is removed upon a reload. Why do large OSPF networks use a hierarchical design? (choose three) To confine network instability to a single area of the network To speed up convergence To reduce routing overhead Use network 192.168.124.0 for creating the needed subnets and hosts. IP Subnet Zero is used with RIP v2. Complete the IP Address assignments.

Which statement is correct regarding the operation of DHCP? If an address conflict is detected, the address is removed from the pool for an amount of time configured by the admin. The network admin has discovered a power supply has failed. A new switch has been installed. What must be done to ensure this new switch becomes the root bridge on the network? Lower the bridge priority number from 32768 to a lower number Which command is used to debug a ping command? Debug ip icmp

Which three are characteristics of an Ipv6 anycast address? Delivery of packets to the group interface that is closest to the sending device The same address for multiple devices in the group One to Nearest communications model Hostname Gateway int fa0/0 ip add 198.133.219.14 /29 int fa0/1 ip add 192.168.10.254 /24 int s0/0 ip add 64.100.0.2 /30 ip route 0.0.0.0 0.0.0.0 64.100.0.1

The addressing scheme allows useres on the internet to access the WWW server Hosts on the LAN connected to Fa0/1 will NOT be able to access the internet without NAT Which two data link protocols are supported by Cisco IOS software for Ipv6? PPP and Frame Relay PVC What are three valid IP addresses an admin can use from the 255.255.255.224 subnet mask? 172.22.243.190 and 10.16.33.98 and 10.17.64.34

Configure gateway on Host B as 10.1.2.254 (currently using VLAN 1 gateway) Configure the IP Address of Host B as 10.1.2.2 How is an EUI-64 format interface ID created from a 48bit MAC address? By inserting 0xFFFE between the upper three bytes and lower three bytes of MAC address If a router has a packet with a destination address of 192.168.1.255, what describes the operation of the network? The router will drop the packet because this is not a valid ip address. The network admin has been given reasons for moving from Ipv4 to Ipv6. What are two valid reasons for adapting? No Broadcasts and Autoconfiguration What should be part of a comprehensive network security plan? Physically secure network equipment from potential access by unauthorized personnel What is the highest protocol stack that the network admin is using when establishing a FTP session? Application Layer What action can take place to prevent hubs (multiple PC's) from using a single switch port? Implement port security on all interfaces and use port-security maximum 1 to limit port access In order to resolve the LAN problem, which router IOS command can you use? Ping, show ip route, and show interfaces Which network protocol does DNS use? UDP Which switch would STP choose to become the root bridge in the selection process? 32768 11:22:33:44:55:66, 327368 22:33:44:55:66:77, 32768 11:22:33:44:55:65, or 32768 22:33:44:55:66:78 The switch with lowest ID, if all priority # are same. so... 11.22.33.44.55.66 is the root bridge

What is the purpose of ARP? Map an IP to a MAC What is the purpose of Inverse ARP? Map a known DLCI to an IP Which three statements are typical characteristics of VLAN arrangements? Connectivity between VLANS require a Layer 3 device router Each VLAN uses a separate address space A switch maintains a separate bridging table for each VLAN Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0 /24 to OSPF Area 0? Router ospf 1... and network 192.168.16.0 0.0.0.255 area 0

With a mask of 255.255.255.128, each interface requires an IP Add on a subnet With a mask of 255.255.255.0, must be a layer 3 device for PCs to communicate With a mask of 255.255.254.0, each interface does NOT require an IP address Host A pings interface S0/0/0 on R3. What is the TTL value for the ping?

253 Which three IP Add can be assigned to hosts if the subnet mask is /27, and subnet zero is usable? 10.15.32.17...and... 66.55.128.1...and...135.1.64.34

A medium sized company has a Class C address. It has two Cisco routers and one non-Cisco router. All three routers are using RIPv1. The company network is using 198.133.219.0 /24. The company wants to split the network into three subnets using VLSM. What is the best course of action if the company wants to have 40 hosts on each subnet? Cannot use RIPv1 as it is classful. So... use Rip v2, a classless, and use 198.133.219.64 /26, 198.133.219.128 /26, and 198.133.219.192 /26

Which Ipv6 add is the equivalent for the Ipv4 interface loopback address of 127.0.0.1

::1
Which of the following describe private IP addresses? (choose two) Addresses cannot be routed through the public internet...and... a scheme to conserve public addresses What are three basic parameters to configure on a wireless access point? SSID, RF Channel, and Authentication method

Which commands must be configured on Core 2 to allow it to be managed remotely?

(config)# int vlan 1 (config-if) ip add 192.168.1.11 255.255.255.248 line vty 0 4 password c1sc0 ip default-gateway Which two benefits are provided by creating VLANS? Added security...and... provides segmentation

Problem is... fa0/1 and fa0/2 are setup as switchport mode access instead of switchport mode trunk Which entry will be in the ARP cache of Host A to support this transmission of a ping to Host B?

Interface Address Physical Address Type 192.168.4.7 000f.2480.8916 dynamic Which command will show the MAC add of a station connected to switch port? Show mac-address Which two passwords must be supplied in order to connect to telnet to a secured switch? Enable secret password...and... vty password What can a network admin utilize by using PPP Layer 2 encapsulation? Compression, authentication, and multi-link support Fyi...

Half-Duplex and Full Duplex mismatch errors... What are three features of the Ipv6 protocol? Autoconfiguration, plug-n-play, and no broadcasts A router ha learned of three possible routes that could be used to reach a destination. One form EIGRP with metric of20514560. Another OSPF, metric of 782. and Ripv2 with a metric of 4. Which route will router install in the routing table? 0 connected interface route serial 1 static route 90 eigrp 110 ospf 120 ripv1 ripv2 170 external eigrp The EIGRP route. Uses bandwidth ^ delay. Also K1 K3 values What must be set correctly when configuring a serial interface so that higher level protocols calculate the best route? bandwidth Cross Over Cable PC to Router Switch to Switch Straight Rollover Router to Hub PC to Switch Rollover PC serial to console

VLAN Name Status Port 1 default active 10 sales active 11 market active 20 hr active 4. one for each vlan

HOW MANY BROADCAST DOMAINS ARE CONFIGURED ON SW2?

Which switch provides the spanning-tree designated port for segment with printers? The switch with lower Priority#. If a tie, then switch with lowest mac address is selected.

hostname Tampa TAMPA CONNECTS TO ORLAND ROUTER. username orland password 0 c1sc0 WHICH TWO STATEMENTS ARE TRUE? ip subnet zero int fa0/0 ip add 192.168.1.1 255.255.255.0 int s0/0 ip add 10.0.1.1 255.255.255.0 router eigrp 10 network 10.0.0.0 network 192.168.1.0 no auto summary The link uses a 3-way handshake for authentication... and... only Tamp will negotiate a data link with Orlando router

Before installing a new IOS, what should be check on the router, and which command should be used to gather info? Amount of flash and RAM memory... and show version How to determine what switch is a ROOT SWITCH. 1. show spanning-tree vlan # if results shows a ROOT under "Role" then that switch isn't a root switch. identify the "interface" having a "root" status. then 2. show cdp neighbors locate "interface#" from above in this output. identify it with the Device ID - switch it is connected too This shows which switch is the ROOT SWITCH! * remember, root switches do NOT have root ports! If show spanning-tree vlan # output shows all ports as DESG, then it may be the root switch, itself.

Show ip eigrp neighbors... shows the other eigrp router neighbors. If a router in questions doesn't exist in output, that router is not configured properly, completely to participate in eigrp. Which layer of the OSI model is responsible for determining availability of the receiving program and checking to see if enough resources exist for that communication? Application... identify and establish availability of intended communications and resources. What is one reason that WPA encryption is preferred over WEP? Values of the WPA keys can change dynamically while in use A router boots to the RMON prompt. What does this signify, how should the admin respond? rommon1> This prompt signifies IOS image in flash is invalid / corrupt. Admin should use TFTP to transfer IOS to router. Which two privileged mode commands can be used to determine router's serial number? Show inventory and show diag Which type of EIGRP route entry describes a feasible successor? A backup route, stored in the topology table. A neighbor table lists adjacent neighbors. A topology table lists all the learned routers and the best routes to them.

Which two subnetworks would be included in the summarized address of 172.31.80.0? 172.31.80.0 /22 and 172.31.92.0 /22 Which commands helps an admin to mange memory by displaying flash memory and nvram utilization? Show file systems How do you determine what model a router is? Remotely. Show cdp neighbors will show this. You've been instructed to prevent All traffic originating on the Router 1 LAN from entering the router 2. Which command will implement the access list on router 2? 1-------2 Ip access-group 101 in

Create 3 networks from 192.168.164.0 using ip subnet zero with RIPv2.

Describe the state of the switch once the boot process has been completed.? 00:00:39 %lineproto-5-updown: line protocol on interface vlan 1, changed to down 00:00:40 %spanningtree-5-extended: extended sysld enabled for type vlan 00:00:42 %sysconfig_i: configured from memory 00:00:44 %link-5-changed: interface vlan 1, changed state to administratively down Remote access management is not possible without configuration change, no shutdown command for vlan 1 interface In addition to assigning an IP address, which of the following correctly describe TCP/IP stack configuration can DHCP provide? Default gateway, DNS servers and Subnet mask

Where will the router send a packet destined for 10.1.5.65? 10.1.3.3 A new VLAN needs to be created on a router. There are no more open interfaces to do so. How can this be completed?

Configure a single VLAN trunk between R1 and SW1 and configure a subinterface on R1 for each VLAN.

Show flash directory 3803056 bytes used, 4585552 available, 8388608 total. WHAT IS MAX. SIZE A NEW IOS CAN BE STORED? 4MB as there is 4 mb of free space show ip eigrp topology. Determine the feasible successor. 1st, verify the FD value in output. 2Nd, compare Composite Metric values among other interface values. Lowest Composite wins, is feasible successor. Which two statements are characteristics of a distance vector routing protocol? RIP and updates are periodic and include entire routing table The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP address can be assigned to hosts in the third subnet if the ip subnet zero is configured on the router? 172.25.0.0 to 172.25.31.255, 172.25.32.0 to 172.25.63.255, 172.25.64.0 to 172.25.95.255 Access Port carries traffice for single vlan connects a PC to switch uses straight-through Trunk Port uses 802.1q to identify traffic from different vlans carries traffic from a multiple vlan facilitates Inter-Vlan when connected to layer 3 device

What are valid modes for a switch port used as a VLAN trunk? (choose three) Auto, On, Desireable Which three options are valid WAN connectivity methods? (choose three) PPP, HDLC, and ATM What is the purpose using traceroute command? To see the path a packet will take when traveling to a destination What is the summarization for these routers: 10.0.0.0, 10.0.1.0, 10.0.2.0, 10.0.3.0 10.0.0.0 /22 Which two statements are true regarding EIGRP? - EIGRP supports VLSM, Route Summarization, and Routing Update authentication - A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information Which two commands correctly verify whether port security has been configured on fa0/12 of a switch? show running configuration show port-security interface fa0/12

show int s0/0 which three reasons for this interface status? S0/0 is up, line protocol is down 192.168.100.1/24 encapsulation HDLC, loopback not set Keep Alive set (10sec) No Keep-alive messages are received the clock rate is not set there is a mismatch in the encapsulation type Remote access to console = vty password MATCHING.... access to con 0 line = consoole password access to connected networks or resources = access-group viewing of passwords = service password-encryption access to privileged mode = enable secret

Networks connected to R2 have been summarized 192.168.176.0 /21 route and sent to R1. Which two packet destination addresses will R1 forward to R2? (choose two) 192.168.183.41 and 192.168.179.4 What are two characteristics of the 802.1Q protocol? It modifies the 802.3 frame header and requires FCS to be recomputed It is a trunking protocol capable of carrying untagged frames What speeds must be disabled in a mixed 802.11b/g WLAN to allow only 802.11g clients to connect? 1, 2, 5.5 and 11 Mbps What are two recommended ways of protecting network device configuration files from outside network security threats? Use a firewall to restrict access from outside use SSH or another encryption and authenticated transport to access device configurations Access List... access-list 114 permit ip 10.4.4.0 0.0.0.255 What would be the effect of issuing the command ip access-group 114 on a Fast Ethernet port? It would allow all traffic from 10.4.4.0 network What is the operational status of interfaces R2 as indicated by the output shown?

The interfaces are functioning correctly. The output show frame-relay pvc shows PVC STATUS=INACTIVE. What does this mean? The PVC is configured correctly, but there is a problem on remote end of PVC. Which command is necessary to permit SSH or Telnet access to a switch that is otherwise configured for these vty line protocols? transport input all

Hosts in 192.168.2.0 cannot reach hosts in 192.168.3.0. Based on the output from RouterA, what are two reasons why?

Interface S0/0 on Router A is not receiving a clock signal from the CSU/DSU The encapsulation on S0/0 of Router B does not match that of S0/0 on Router A Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which are true? (1)--A----B---C--(2) Router C will send a destination unreachable message Router C will use ICMP to inform Host 1 that Host 2 cannot be reached Which of the following data network would you implement if you wanted wireless network that had high data rate, but was limited to very short distances? Broadband, broadband circuit, infrared, spread spectrum or cable? Infrared What are three benefits of implementing vlans? - A higher level of network security by separating sensitive data from other traffic - A more efficient use of bandwidth can be achieved allowing many logical networks to use same infrastructure - Broadcast storms can be mitigated by increasing number of broadcast domains Which two Ethernet fiber-optic modes support distances greater than 550 meters? 1000Base-LX...and...1000BaseZx On Point-to-Point networks, OSPF hello packets are addressed to which address? 224.0.0.5 Which two devices could you configure as a source for the IOS image in the boot system command for IOS? Flash memory...and...TFTP In the Frame-Relay network, which IP would be assigned to the Point-to-Point PVC?

DLCI 16: 192.168.10.1 /24 DLCI 99: 192.168.10.2 /24 DLCI 17: 192.168.11.1 /24 and DLCI 28 192.168.11.2 /24

Three wireless access points are installed in a small office. What term identifies the wireless topology? A ESS... BSS supports one or multiple users. A set of two or more wireless AP's in same wired network is a ESS. The enable secret command is used to secure access to which CLI mode? Privileged Exec Which address range efficienctly summarizes a routing table for 172.16.1.0 to 172.16.12.0? 172.16.0.0 /20 NOT /18, /16, /21 A network admin needs to allow only ONE telnet session to a router. Which command will encrypt the telnet password? Service password-encryption line vty 1 login password cisco Which routing protocol, by default, uses bandwidth and delay as metrics? EIGRP A admin installed a new switch, B. He can ping it but cannot Telnet to it. How do you resolve this problem? Telnet into a Router. From router, telnet into switch B to correct configuration mistakes. A receiving host computes the Checksum on a frame and determines it is damaged. The frame is discarded. At which OSI layer did this take place? Layer 2, data link layer. Matching Wan Device Label each device

The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must a network admin configure on a switch to meet this policy? (choose two) (config-if)# switchport port-security violation shutdown (config-if)# switchport port-security maximum 1 (switchport port-security violation shutdown | restrict | protect) Which command is used to load a configuration from a TFTP server and merge the configuration into RAM? Copy Tftp: running-config Which statements are true regarding classful or classless routing? Automatic summarization at classful boundaries can cause problems on discontinuous subnets Which of the following protocols use both TCP and UDP ports? DNS port 53 Which command displays CPU utilization? Show process What are two reasons a network administrator would use CDP? Verify layer 2 connectivity between two devices obtain ip address of connected devices

Which item represents the standard IP ACL? Recall, standard acl is 0 99. So, access-list 50 deny 192.168.1.1 0.0.0.255 is a good example What occurs on a Frame Relay network when the CIR is exceeded? All traffic exceeding the CIR is marked discard elgible A static route to the 10.5.6.0 /24 network is to be configured on HFD router. Which commands accomplish this?

(config)# ip route 10.5.6.0. 0.0.0.255 10.5.4.6 (config)# ip route 10.5.6.0 0.255.255.255 10.5.4.6

192.168.3.1 is local to the router

Which two statements are true about Inter VLAN routing? R1 Fa0/0 must be configured with sub-interfaces R1 Fa0/0 and Switch2 trunk ports must be configured using the same encapsulation type An admin pings a gateway 10.10.10.1 and sees a reply of request timed out. At which OSI layer is the problem? Layer 3, network What does * represent in the output below? 02:16:29: NAT: s=10.10.0.2 02:16:43: NAT: s=1.2.4.1 02:16:50: NAT*: s=10.10.0.2 A Packet was translated and fast switched to the destination

Arrange the ACL lines in order to prevent all hosts (except those addresses that are 1 st and last in subnet 172.21.1.128 / 28) from accessing the network. A. permit any B. deny 172.21.1.128 0.0.0.15 C. permit 172.21.1.129 0.0.0.0 D. permit 172.21.1.142 0.0.0.0 Permit 172.21.1.129 0.0.0.0 (C) Permit 172.21.1.142 0.0.0.0 (D) Deny 172.21.1.128 0.0.0.15 (B) Permit any (A)

What is true about the network shown? There are two broadcast domains...and... there are seven collision domains A company implements video conferencing over IP. Users notice the network slows down, video stutters. What is a reason? QoS will attempt to prevent this when the network is overloaded. Recall, QoS doesn't take affect until triggered to do so Matching... User Exec limited to basic monitoring Priv Exec provide access to all other router commands Global Config - commands that affect the entire system Specific Config commands that affect interfaces / processes Setup interactive configuration dialog The router address 192.168.1.250 is the gateway. What is the correct subnet mask for this network?

255.255.255.0

Data transfer is slow between source and destination. QoS requested by the transport layer is not being maintained. To fix this issue, at which layer should the troubleshooting begin? Layer 3, Network

Using VoIP, if UDP datagrams arrive out of sequence, what will happen? UDP will pass the information in the datagram up to the next OSI layer, in order that they arrived. UDP is connectionless and does not provide any flow control wood chipper as it just passes data. Which command can be used to verify DLCI destination address in a Frame Relay static configuration? show frame-relay map In the implementation of VLSM in a Class C network, which subnet mask is the most efficient for Point-to-Point? 255.255.255.252 Address range 10.10.10.0 /24 are not being translated to the 1.1.128.0 /16 range. Which command shows if 10.10.10.0 / 24 are allowed inside addresses? show access-list Which two statements about static NAT translations are true? They are always present in the NAT table They allow connection to be initiated from the outside Which IPSec protocol should be used when confidentiality is required? ESP How do you determine Frame Relay congestion problem. Which output value from show frame-relay pvc indicates the local router traffic sent to corporate site is congested? The In BECN Pkts field will be incrementing Which switch is root bridge for VLAN 1? Show spanning-tree vlan 1. identify Cost#(19 is FE directly connected), Port#, and Role Sts. If Root Fwd, then Show cdp neighbors to map port above to switch. What two facts can be determined from the WLAN diagram?

The two access points generally are configured with common SSID to allow roaming The network diagram represents an extended service set ESS

PC 1 is sending packets to FTP server. Consider the packets as they leave Router A at Fa0/0 toward Router B.

Source Mac= Router A 999

Destination MAC= Router B 3333 Source IP= *.21.7 Destination IP = ftp server ip

What is needed to allow hosts in VLAN A to communicate with hosts in VLAN B? A router with subinterfaces configured on the physical interface that is connected to the switch. What are some advantages of using a router to segment the network? Filtering can occur based on layer 3 information... and... broadcasts are not forwarded How do you identify a router ID? The highest IP of loopback. Use show ip int brief to display Which command displays the CHAP authentication process as it occurs between two routers? Debug PPP authentication What is the difference between a CSU/DSU and a modem? A CSU/DSU converts digital signals, a modem converts a digital signal from a router to a phone line Which of the following IP addresses fall into the CIDR block of 115.64.4.0 /22 (choose three) 115.64 .7.64, .6.255, 5.128 Host A and Host B are on different networks. Host A is trying to communicate with Host B. What step will Host A take? Send the data frames to the default gateway What are some benefits of a VLAN? Logical group of users by function, enhance network security, and increase the number of broadcast domain An admin receives an error while attempting to assign 10.24.24.24 /29. Why? It is a network address.... /29 leaves 3 bits ( 2^3 = 8). so subnets are .0, .8, .16, .24, .30... Inter-VLAN Routing. VLAN 2 hosts wants to communicate with a new VLAN 3 host but cannot. Why? On router, show ip route if needed, add a sub-interface for the new VLAN. int fa0/1.3 encapsulation dot1q 3 ip address 192.168.3.1 255.255.255.0

Which command encrypts all clear text passwords? service password-encryption Which two devices can interfere with wireless networks because they operate on similar frequencies? Cordless phone and microwave ovens Which two commands can be used to verify a trunk link configuration status on Cisco switch? show interface trunk and show interface switchport: A packet with a source IP address of 192.168.2.4 and a destination IP address of 10.1.1.4 arrives at the HokesB router. What action does the router take?

Forwards a packet containing an ICMP message out the Fa0/0 interface

A network administrator needs to configure port security on a switch. What two statements are true? When dynamic address learning is enabled, the switch can learn new addresses The sticky learning feature allows the addition of dynamically learned addresses to be the running configuration Determine which of the following is correct?

John# will receive updates on S0/0...and... send updates out S0/0

When troubleshooting a Frame Relay connection, what is the first step when performing a loopback test? Set encapsulation of the interface to HDLC At what OSI layer is RSTP used to prevent loops? Layer 2, data link Drag items to proper location Next Hop

Whar are the possible trunking modes for a switch port? Auto, On, Desirable At which layer of OSI model does PP perform? Layer 2, data link What are two reasons an admin would use access lists? To control vty access into a router...and... to filter traffic as it passes through a router Which command allows you to verify the encryption type (Cisco or IETF) for a Frame Relay link? show frame-relay map What command enables Ipv6 forwarding on a router? Ipv6 unicast-routing What is the default maximum number of equal-cost paths that can be placed into a routing table with OSPF router? 4 WAN's operate at what layers of OSI model? Physical and Data Link layers Which two statements about using CHAP authentication mechanism in a PPP link are true? CHAP authentication occurs after link establishment...and... CHAP uses a three-way handshake Which VTP mode is capable of creating only local VLANS and does not synchronize with other switches? transparent What function do routers perform in a network? (choose two)

Packet switching...and... path determination A router has two Fast Ethernet interfaces and needs t connect to four VLANS. How can you accomplish this? Implement a router-on-a-stick configuration is a router with a single trunk connection to a switch and routes between VLANS. Interface fe0/0.1 encapsulation dot1q 10 (encapsulation dot1q or ISL) ip add x.x.x.x y.y.y.y Which spread spectrum technology does the 802.11b standard define for operation? DSSS What are two commands, used in troubleshooting, can enable debug output to a remote location? logging host ip-address...and... terminal monitor Which statemetns about RIPng is true? RIPng is enabled on each interface seperately A host 192.168.125.34 /27 needs to be denied access to all hosts outside its subnet. access-list 100 deny ip 192.168.125.34 any 0.0.0.0 All hosts in subnet 172.16.5.118 /26 must be denied Telnet access to hosts outside the LAN. Access-list 128 deny tcp 172.16.5.64 0.0.0.63 any eq 23 What can be done to secure the virtual terminal on a router? Configure virtual terminal password...and... enter ACL and apply it to vty interface using access-class command

Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security? PPP What are three reasons to implement VPN instead of Point-to-Point? Reduced costs, increased security, and scalability What can be said about this configuration?

No further configuration is required. There exists 1 router for all vlans to route between one trunk link. Switch A cannot form a trunk with Switch B. Why? The port needs to be configured as a trunk and not as an access port. Switchport mode trunk switchport trunk access vlan #... Routers are not sharing their routing tables. What is the problem?

R1 is using RIPv2 and R2 is using RIPv1 Identify three statements about this topology router, switch and ports.

R1 connected to SW 1 using subinterfaces (router on a stick one trunk for multiple vlans) SW 1 port to R1 port is a trunk SW 1 port connected to Host B is an access port

Which three statements about RSTP are true? RSTP expands STP port roles by ADDING alternate and backup roles RSTP reduces reconvergence after a link failure RSTP provides faster transition to forwarding state on Point-to-Point links than STP

Switch 4, port Fa0/11 Ipv6.... broadcasts have been eliminated and replaced with multicasts What commands must be configured to allow communications between host 1 and host 2?

Int fa0/0 no shutdown int fa0/0.1 encapsulation dot1q 10 ip add 192.168.10.1 255.255.255.0 int fa0/0.2 encapsulation dot1q 20 ip add 192.168.20.1 255.255.255.0 What is required to configure a switch from outside of the LAN using virtual terminal? Switch must be configured with IP Address, subnet mask, and a default-gateway Switch must be reachable through a port connected to its management VLAN

What are some characteristics of Link State Routing Protocols? Provides common view of entire topoloty calculates shortest path utilizes triggered updates when topology changes occur

Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 4, transport layer Which two locations can be configured as a source for the Cisco IOS image in the boot system command? Flash memory and TFTP server Which command allows you to see output from the OSPF debug command? terminal monitor What benefits can be obtained using VTP? Maintain vlan consistency... and... allow vlan information to be propagated What is the 1st 24 bits in a MAC address called? Organizational Unique Identifier OUI Matching... Refers to the bit error rate of each network link = reliability the number of points in a transmission path = hop count a configurable value based by default of bandwidth on interface = cost amount of activity on a network = load amount of time required to move a packet = delay the data capacity of a link = bandwidth What are Standard ACL's based on? Source Address and Wildcard Mask A router receives information about network 192.168.10.0 /24 from multiple sources. What will the router consider the most reliable information about the path to that network? A directly connected interface with address of 192.168.10.1 gateway Identify four invalid Ipv6 addresses

:: ::192:168:0:1 2002:c0a8:101::42 2003:dead:beef:4dad:23:46:bb: 101


Which command shows if an access list is assigned to an interface? :show ip interface Type_Slot example, show ip interface S0/0/1

You might also like