CCNA-Practice Test 9


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

Which of the following will allow "Unauthorized access prohibited!" to be displayed before the login prompt when someone tries to initiate a Telnet session to a router?

  1.  login banner x Unauthorized access prohibited! x 

  2.  banner exec y Unauthorized access prohibited! y 

  3.  banner motd x "Unauthorized access prohibited!" x 

  4.  login message "Unauthorized access prohibited!" 

image from book

2. 

Look at the following diagram. Switch SW-Seattle01 has recently been added to the network but has yet to get appropriate VLAN information from the VTP domain. What is causing this problem? (Choose two.)

  1. VTP domain name

  2. VTP configuration revision number

  3. VTP mode

  4. VTP version

image from book
Figure 9-1

image from book

3. 

Which of the following information will you not find in a routing table?

  1. Route metrics

  2. Default network

  3. Default gateway

  4. Directly connected active networks

image from book

4. 

Which of the following is a correct subinterface used in Frame Relay networks?

  1.  interface ethernet0/0.10 point-to-point 

  2.  interface serial0/0.11 point- to-point 

  3.  subinterface serial0.1 

  4.  subinterface fasterthernet0.1 multipoint 

image from book

5. 

Look at the following diagram. The following line appears in the routing table of the RT-Denver router:

         ??  192.168.1.0/26 is             directly connected,             Ethernet 0 

What would you expect the first character to be?

  1. O

  2. R

  3. D

  4. C

image from book
Figure 9-2

d explanation: d. the identifier for directly connected routes in a routing table is c.

6. 

What are the valid hosts for the subnet on which 192.168.10.40 255.255.255.224 resides?

  1. 192.168.10.32-63

  2. 192.168.10.33-64

  3. 192.168.10.33-62

  4. 192.168.10.34-65

image from book

7. 

Which of the following are benefits of segmenting your network with routers? (Choose three.)

  1. They provide Application layer security.

  2. They filter by logical address.

  3. They create internetworks.

  4. They stop broadcast storms.

image from book

8. 

What is the purpose of the Spanning Tree Protocol (STP)?

  1. Create link-state routing tables

  2. Stop switching loops in bridged networks

  3. Work with LSA to create a route table

  4. Stop broadcast storms

image from book

9. 

Look at the following diagram. You have been asked to connect these two switches. What type of device do you need to install to provide full communication?

  1. Crossover cable

  2. Router

  3. Switch with 802.1q trunks

  4. Server

image from book
Figure 9-3

image from book

10. 

Which of the following messages displays the code image running in router memory?

  1. System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1) Copyright (c) 2000 by cisco Systems, Inc. C2600 platform with 32768 Kbytes of main memory

  2. program load complete, entry point: 0x80008000, size: 0x43b7fc. Self decompressing the image:

    • ####################################

    • ####################################

    • ####################################

    • #########################[OK]

  3. Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-I-M), Version 12.1(8), RELEASE SOFTWARE (fc1) Copyright (c) 1986–2001 by cisco Systems, Inc. Compiled Tue 17-Apr-01 04:55 by kellythw Image text-base: 0x80008088, data-base: 0x8080853C

  4. cisco 2621 (MPC860) processor (revision 0x101) with 26624K/6144K bytes of memory. Processor board ID JAD050697JB (146699779)M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0.2 FastEthernet/IEEE 802.3 interface(s) 1 Serial network interface(s) 32K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read/Write)

image from book

11. 

Which of the following cables do you use to connect a switchport on a switch to a router's Ethernet interface?

  1. Straight through

  2. Crossover

  3. Rollover

  4. Null modem

image from book

12. 

You have a Class C network address and need eight subnets using the 255.255.255.224 mask. What command must be in effect to allow the use of eight subnets with this mask?

  1. no auto-summary

  2. ip subnet-zero

  3. ip unnumbered

  4. ip classless

image from book

13. 

Look at the following diagram. You have been asked to troubleshoot a problem. Users in LA and Miami are having issues sharing files with each other. What is the likely cause of the problem?

  1. EIGRP autosummary

  2. IP subnet zero

  3. IP addressing

  4. EIGRP network statements

image from book
Figure 9-4

c explanation: c. the la and miami lans have the same address assigned.

14. 

What are the valid hosts for the subnet on which 192.168.10.5 255.255.255.252 resides?

  1. 4–7

  2. 5–6

  3. 4–10

  4. 4–8

image from book

15. 

Look at the following diagram. You have an administrator at 10.1.1.65 who manages several servers on the 10.1.2.0/24 subnet using SSL. No other users should be accessing that subnet. You have created the access list shown. Which interface and direction should you apply it on to achieve the desired result?

  1. RouterA, E0, in

  2. RouterA, E0, out

  3. RouterA, S0, in

  4. RouterA, S0, out

  5. RouterB, E0, in

  6. RouterB, E0, out

image from book
Figure 9-5

image from book

16. 

Which of the following series of commands restricts Telnet access to the router?

  1.  RouterA(config)#access- list 10 permit 172.16.1.1 RouterA(config)#line con 0 RouterA(config-line)#ip access-group 10 in 

  2.  RouterA(config)#access- list 10 permit 172.16.1.1 RouterA(config)#line vty 0 4 RouterA(config-line)# access-class 10 out 

  3.  RouterA(config)#access- list 10 permit 172.16.1.1 RouterA(config)#line vty 0 4 RouterA(config-line)# access-class 10 in 

  4.  RouterA(config)#access- list 10 permit 172.16.1.1 RouterA(config)#line vty 0 4 RouterA(config-line)#ip access-group 10 in 

image from book

17. 

If you want to deny ping traffic entering your network, which protocol should you filter?

  1. ICMP

  2. IGRP

  3. TCP

  4. UDP

image from book

18. 

Look at the following diagram. You have been asked to troubleshoot a problem. This network has failed to converge. What is the likely cause of the problem?

  1. EIGRP auto-summary

  2. IP subnet zero

  3. IP addressing

  4. EIGRP network statements

image from book
Figure 9-6

image from book

19. 

What does a router do with a received packet that is destined for an unknown network?

  1. Forwards the packet

  2. Drops the packet

  3. Holds the packet until the next route update

  4. Sends a broadcast for the unknown network

image from book

20. 

You have the following routing table. Which of the following networks will not be placed in the neighbor's routing table?

         R    192.168.30.0/24            [120/15] via            192.168.40.1,            00:00:12, Serial0         C    192.168.40.0/24 is            directly connected,            Serial0            172.16.0.0/24 is            subnetted, 1 subnets         C    172.16.30.0 is            directly connected,            Loopback0         R    192.168.20.0/24            [120/1] via            192.168.40.1,            00:00:12, Serial0         R    10.0.0.0/8 [120/5]            via 192.168.40.1,            00:00:07, Serial0         C    192.168.50.0/24 is            directly connected,            Ethernet0 

  1. 172.16.30.0

  2. 192.168.30.0

  3. 10.0.0.0

  4. All of them will be placed in the neighbor's routing table.

image from book

21. 

Look at the following diagram. You have been asked to install the router shown in the diagram. What kind of cable and connection do you need to configure between the router and the switch?

  1. Straight-through cable, 100/half connection

  2. Crossover cable, 100/half connection

  3. Straight-through cable, 802.1q connection

  4. Crossover cable, 802.1q connection

image from book
Figure 9-7

image from book

22. 

What happens if you do not set the VTY password?

  1. You can't log on from the console port.

  2. You can't log on from the aux port.

  3. You can't telnet into the router.

  4. Nothing.

image from book

23. 

What does the following command mean?

         access-list 110 permit ip               any 0.0.0.0               255.255.255.255 

  1. It is a standard IP access list that permits network 0.0.0.0 only.

  2. It is an extended IP access list that permits network 0.0.0.0 only.

  3. It is an extended list that permits any host or network.

  4. It is invalid.

image from book

24. 

What is the default encapsulation used on Cisco serial links?

  1. PPP

  2. IETF

  3. HDLC

  4. Frame Relay

image from book

25. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose that a packet destined for 10.1.174.254 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 9-8

image from book

26. 

A port in the STP ___________________ state populates the MAC address table but doesn't forward data frames.

  1. Blocking

  2. Listening

  3. Learning

  4. Forwarding

image from book

27. 

What configuration commands configure a router for fallback? (Choose three.)

  1. copy tftp flash

  2. boot system flash

  3. boot system rom

  4. boot system tftp

  5. boot system host

image from book

28. 

The command copy tftp flash initiates what event?

  1. The router configuration is copied from a TFTP server to the router.

  2. The router IOS software is loaded from a TFTP server to the router's flash.

  3. The router's configuration is loaded into boot ROM.

  4. The router's IOS software is loaded into NVRAM.

image from book

29. 

A route is being advertised by both RIP and EIGRP. Why is only the EIGRP-learned route injected into the routing table?

  1. EIGRP has faster timers.

  2. EIGRP has a lower administrative distance.

  3. EIGRP has a higher administrative distance.

  4. The EIGRP route has fewer hops.

image from book

30. 

Which configuration task must you complete if a remote Frame Relay router does not support Inverse ARP?

  1. Configure static maps.

  2. Define an IP address locally.

  3. Disable DHCP on the Frame Relay router.

  4. Configure a static route to the remote network.

image from book

31. 

Look at the following diagram. You have been asked to troubleshoot a problem. This network has failed to converge. What is the likely cause of the problem?

  1. EIGRP auto-summary

  2. IP subnet zero

  3. IP addressing

  4. EIGRP network statements

image from book
Figure 9-9

image from book

32. 

You're given the following criterion when connecting access from a remote site to your LAN: "Restrict access on interface e0 for Telnet and FTP." Which of the following lines should come last when you configure your access list?

  1. access-list 101 end

  2. access-list 101 deny e0 telnet
    ftp

  3. access-list 101 allow all
    except ftp telnet

  4. access-list 101 permit ip
    0.0.0.0 255.255.255.255 any

  5. access-list 101 deny ip
    128.12.22.55 tcp eq 20 21 23s

image from book

33. 

Which of the following are true regarding Frame Relay? (Choose two.)

  1. Subinterface configuration is provided by multipoint and point-to-point interfaces.

  2. Frame Relay uses an SVC at layer 2.

  3. Frame Relay uses two Bearer channels.

  4. Frame Relay point-to-point subinterfaces must be configured with their own subnet.

image from book

34. 

What is the suggested mask used with VLSM that provides the most efficient use of addressing on a point-to-point serial link?

  1. /24

  2. /25

  3. /27

  4. /28

  5. /29

  6. /30

image from book

35. 

Which of the following is a valid IP extended access list?

  1. access-list 10 permit ip any
    host 172.16.10.1 eq www log

  2. access-list 110 permit ip any
    172.16.10.1 0.0.0.0 eq smtp
    log

  3. access-list 99 permit tcp any
    host eq ftp log

  4. access-list 101 deny tcp
    172.16.1.1 0.0.0.0 host
    1.1.1.1 eq ftp

image from book

36. 

What does a bridge use to filter traffic on a network?

  1. IP addresses

  2. Broadcasts

  3. Application data

  4. Media Access Control addresses

d explanation: d. bridges can read frames and filter only by mac (hardware) address.

37. 

You have a Frame Relay network. What type of encapsulation is necessary if the routers are from different vendors?

  1. IETF

  2. Cisco

  3. ANSI

  4. IEEE

image from book

38. 

Look at the following diagram. In the network pictured, how many host addresses will be in the MAC forwarding table on each switch? Assume that the network and hosts have been running for some time.

  1. None

  2. Two

  3. Four

  4. More

image from book
Figure 9-10

image from book

39. 

Which of the following describes a full-duplex transmission?

  1. Uses a single cable

  2. Uses a point-to-point connection when only two hosts are present

  3. Transmits data in both directions, but only one way at a time

  4. Transmits data in only one direction

image from book

40. 

Which of the following describes the steps of data encapsulation?

  1. User information is converted to data, data is converted to segments, segments are converted to packets or datagrams, packets are converted to frames, and frames are converted to bits.

  2. Data is converted to frames, segments are converted to packets or datagrams, packets are converted to segments, frames are converted to bits, and bits are converted to data.

  3. Frames are converted to bits, bits are converted to segments, segments are converted to packets or datagrams, and packets or datagrams are converted to data.

  4. Data is converted to packets, packets are converted to segments, segments are converted to datagrams, and datagrams are converted to frames. Frames are then converted to bits.

image from book

41. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose that a packet destined for 10.11.128.255 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 9-8

image from book

42. 

What is the IEEE version of spanning tree?

  1. 802.5

  2. 802.3E

  3. 802.2B

  4. 802.1D

d explanation: d. ieee 802.1d is the spanning tree protocol specification.

43. 

You want to back up the IOS on your router to a network server. Which three things should be done prior to performing this task?

  1. Make sure the network server can be accessed.

  2. Check that the authentication for access is set.

  3. Make sure the administrator workstation and the router's LAN connection are in the same subnet.

  4. Verify any file-naming and path requirements.

  5. Make sure the server can load and run the bootstrap code.

image from book

44. 

You connect a new host into the Sales VLAN; however, this new host cannot see the Sales server. What could be the problem?

  1. The host is not using the correct version of Windows.

  2. The switch needs to be reloaded after a configuration takes place.

  3. The port on the switch is not in the correct VLAN.

  4. The host needs to update its MAC address to one that works on the type of segment it is connected to.

image from book

45. 

Which statements are true regarding classless routing protocols? (Choose two.)

  1. The use of discontiguous subnets is not allowed.

  2. The use of variable-length subnet masks is permitted.

  3. RIPv1 is a classless routing protocol.

  4. RIPv2 supports classless routing.

image from book

46. 

What command do you type at a CLI prompt to see the configuration register setting?

  1. show router boot

  2. show flash

  3. show nvram

  4. show version

  5. show config-register

image from book

47. 

What command shows the Frame Relay protocol statistics?

  1. sh frame stat

  2. sh frame-relay traffic

  3. sh ip frame-relay stat

  4. sh frame-relay ip

image from book

48. 

Which of the following use ICMP to test IP connectivity? (Choose two.)

  1. Ping

  2. ARP

  3. Traceroute

  4. Telnet

image from book

49. 

What is the default encapsulation for Cisco routers running Frame Relay?

  1. HDLC

  2. Cisco

  3. PPP

  4. Frame Relay

image from book

50. 

You type show interface serial 0 and see this:

         Serial 0 is up, line            protocol is down 

In which layer of the OSI could the problem be?

  1. Physical

  2. Data Link

  3. Network

  4. Transport

image from book

51. 

Look at the following diagram. You have been asked to create an access list that will allow access to a web server at the 192.168.1.27 subnet but will not allow any other communication with the Internet. Which of the following should you choose?

  1.  access-list 10 permit ip any host 192.168.1.27 eq 80 

  2.  access-list 101 permit tcp any host 192.168.1.27 eq 80 

  3.  access-list 10 permit ip host 192.168.1.27 any eq 80 

  4.  access-list 101 permit ip host 192.168.1.27 any eq 80 

image from book
Figure 9-11

image from book

52. 

What does a switch do with a multicast frame received on an interface?

  1. Forwards the switch to the first available link

  2. Drops the frame

  3. Floods the network with the frame

  4. Sends back a message to the originating station asking for a name resolution

image from book

53. 

Look at the following diagram. You have been asked to create an access list on the RT-Denver router that will block telnet access from the Internet to a server at 192.168.1.198 and allow any other communications with the Internet.

         access-list 101 deny tcp            any host 192.168.1.198            eq telnet         access-list 101 permit ip           any any 

Which interface, and in which direction, should you apply this access list?

  1. Interface facing the ISP, in

  2. Interface facing the ISP, out

  3. Interface facing the LAN, in

  4. Interface facing the LAN, out

image from book
Figure 9-11

a explanation: a. this acl will work on either a or d; however, a is a better choice.

54. 

You need a routing protocol that supports both discontiguous networks and VLSM. It must also provide the lowest impact on router CPU and WAN utilization. Which of the following will provide this?

  1. RIPv1

  2. RIPv2

  3. Static routing

  4. EIGRP

  5. OSPF

image from book

55. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose that a packet destined for 10.16.112.17 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 9-8

image from book

Answers

1. 

C

Explanation:

C. The "Message Of The Day" (motd) is an old Unix command that allows you to display a message when anyone connects to a router or switch device.

2. 

B, C

Explanation:

B, C. VTP is not updating because the switch is in transparent mode, not server or client mode. If the switch is placed in an incorrect mode, the wrong mode will prevent it from receiving updates.

3. 

C

Explanation:

C. The purpose of a default gateway is to provide an access point that is external to the Cisco router and capable of routing packets destined for remote networks. The command ip default-gateway is used when the router is not routing IP; the default gateway does not appear in the routing table.

4. 

B

Explanation:

B. Frame Relay runs on serial interfaces and creates a subinterface using the interface type number.subinterface command.

5. 

D

Explanation:

D. The identifier for directly connected routes in a routing table is C.

6. 

C

Explanation:

C. The 224 mask is 3 bits for subnets and 5 bits for host addressing. That means you have 8 subnets, each with 30 hosts. The valid subnets increment by 256 - 224 32: 0, 32, 64, 96, 128, 160, 192, 224. The valid hosts are the numbers between the subnets, except for the all-zeros and all-ones hosts. The valid hosts in the 32 subnet are 33 through 62, and 63 is the broadcast address.

7. 

B, C, D

Explanation:

B, C, D. Routers filter by logical address, create internetworks, and stop broadcast storms.

8. 

B

Explanation:

B. Bridges use the spanning-tree algorithm, enabling a learning bridge to dynamically work around loops in a network topology by creating a spanning tree.

9. 

B

Explanation:

B. Only a router can route between separate VLANs. Although switches can carry multiple VLANs, they cannot route between them.

10. 

C

Explanation:

C. Although a lot of information is displayed during startup, only option C has the code image name.

11. 

A

Explanation:

A. A standard Ethernet cable is all you need to connect a router to a switch. If you had two switchports, you would need a crossover cable.

12. 

B

Explanation:

B. To allow the use of eight subnets with a /27 Class C mask, you must have implemented the ip subnet-zero command, which is on by default on all Cisco routers using the 12.x IOS.

13. 

C

Explanation:

C. The LA and Miami LANs have the same address assigned.

14. 

B

Explanation:

B. A 252 mask gives you 6 bits for subnets and 2 bits for hosts. This gives you 64 subnets, each with 2 hosts. The host specified in the question is in the second subnet, 0 being the first (the increment is 256 - 252 = 4). The valid hosts are 5 and 6. 7 is the broadcast for the 4 subnet.

15. 

A

Explanation:

A. This ACL can only be placed on RouterA, E0, in to achieve only the desired result. Placing the ACL on any other interface would either do nothing or impact more than is stated in the policy.

16. 

C

Explanation:

C. Telnet access to the router is restricted by using either a standard or extended IP access list on the VTY lines on the router. The command access-class is used to apply the access list to the VTY lines.

17. 

A

Explanation:

A. The ping (Packet Internet Groper) utility uses Internet Control Message Protocol (ICMP) echo messages to test network connectivity.

18. 

D

Explanation:

D. The Houston router is missing the 172.16.0.0 network statement. Without this, it will not enable EIGRP on the serial interface and thus will not form a neighbor relationship with Denver.

19. 

B

Explanation:

B. If a router receives a packet that is looking for a destination network that is not in the routing table, the router drops the packet.

20. 

B

Explanation:

B. The network 192.168.30.0 cannot be placed in the next router's routing table because it is already at 15 hops. One more hop will make the route 16 hops, and that is not valid.

21. 

C

Explanation:

C. You need a straight-through cable between the router and switch. Because there are multiple VLANs, you must have a trunk link (802.1q) configured.

22. 

C

Explanation:

C. If you do not set the VTY password, you will be denied access when trying to telnet into the router, due to the default presence of the login command and its requirement that a password be set. You can set the password during setup or at any time after you finish the initial configuration of your router.

23. 

C

Explanation:

C. The command access-list 110 permit ip any any (0.0.0.0 255.255.255.255 is the same as the any command) is a wildcard allowing any host or network access to any other host or network.

24. 

C

Explanation:

C. Cisco's default encapsulation for serial links is High-Level Data Link Control (HDLC). To use a different encapsulation, you use the encapsulation command in interface configuration mode.

25. 

B

Explanation:

B. This IP address falls into the range 10.1.0.0 0.0.255.255 and thus will be routed out interface E1.

26. 

C

Explanation:

C. A switch port in STP learning state listens to BPDUs and learns all the paths in the switched network.

27. 

B, C, D

Explanation:

B, C, D. If you configure your router using the commands boot system flash, boot system tftp, and boot system rom, in that order, the router first tries to boot from flash. If that is unsuccessful, it tries to boot from a TFTP host; if that is unsuccessful, it boots into ROM mode.

28. 

B

Explanation:

B. By typing copy tftp flash, you tell the router to go to a TFTP host and download the IOS software to the router's flash memory.

29. 

B

Explanation:

B. Routers always look at the administrative distance of a route before using metrics. EIGRP has an administrative distance of 90, and RIP has an administrative distance of 120.

30. 

A

Explanation:

A. Frame Relay can send an Inverse ARP packet to the device on the other side of the virtual circuit. If the other side does not support Inverse ARP, you must configure a static map.

31. 

A

Explanation:

A. The 10.0.0.0 network is discontiguous across the Ethernet interfaces of the branch routers. In this case, EIGRP auto-summarization must be disabled.

32. 

D

Explanation:

D. At the end of all access lists is an implicit deny all statement. Therefore, you must include a permit any any to allow traffic that does not meet your restrictions to continue. Also remember that 0.0.0.0 255.255.255.255 is the same parameter as any.

33. 

A, D

Explanation:

A, D. Frame Relay subinterface configuration is provided by either point-to-point or multipoint subinterfaces. Even though Frame Relay can use an SVC, it is not widely supported or implemented and so is not the best answer to this question. Also, point-to-point interfaces have their own subnet addresses.

34. 

F

Explanation:

F. A /30 provides two hosts, which is the most efficient for point-to-point links.

35. 

D

Explanation:

D. Extended IP access lists use access list numbers 100–199 or 2000–2699 and can filter on the protocol field in the Network layer header as well as on port numbers in the Transport layer header. Of course, source and destination IP addresses can be used as well. To filter on an upper-layer protocol, such as WWW, SMTP, or FTP, you cannot use IP in the protocol field; instead, you must use either UDP or TCP, depending on the Application layer protocol.

36. 

D

Explanation:

D. Bridges can read frames and filter only by MAC (hardware) address.

37. 

A

Explanation:

A. The default Frame Relay encapsulation is Cisco's proprietary encapsulation, and that can be used only if you have Cisco routers on both sides of the Frame Relay link. If you have multiple vendors, you need to use Internet Engineering Task Force (IETF) encapsulation.

38. 

B

Explanation:

B. Each switch should learn the MAC address of the hosts on the network. Because this diagram shows only two hosts, the correct answer is B.

39. 

B

Explanation:

B. Full-duplex transmission uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station. Host-to-host means dedicated transmission to the receiving pair as well as dedicated receiving from the transmitting pair.

40. 

A

Explanation:

A. Encapsulation describes the conversion of data for use at each layer. The order of conversion is as follows: user information is converted to data, data to segments, segments to packets or datagrams, packets to frames, and frames to bits.

41. 

C

Explanation:

C. This IP address falls into the range 10.8.0.0 0.7.255.255 and thus will be routed out interface E2.

42. 

D

Explanation:

D. IEEE 802.1D is the Spanning Tree Protocol specification.

43. 

A, C, D

Explanation:

A, C, D. Before you try to back up the IOS on your router to a network server, ping the server from the router to make sure you have connectivity. Also, verify that you have the Trivial FTP (TFTP) server software running, that the default path is set, and that the host running the TFTP software is in the same subnet as the router's LAN connection to the TFTP host.

44. 

C

Explanation:

C. There could be many answers for this problem, but the best answer is that the port has not been assigned to the correct VLAN.

45. 

B, D

Explanation:

B, D. Classless routing protocols send subnet mask information with each route update. This means they support VLSM, CIDR, and discontiguous networking. EIGRP, OSPF, and RIPv2 are considered classless routing protocols.

46. 

D

Explanation:

D. You can see the current setting of the configuration register by using the show version command.

47. 

B

Explanation:

B. The show frame-relay traffic command shows the Frame Relay protocol statistics.

48. 

A, C

Explanation:

A, C. Both ping and traceroute use ICMP to test IP connectivity in an internetwork. Ping uses ICMP echo requests and responses, and traceroute uses destination-unreachable and IP TTL time-exceeded messages.

49. 

B

Explanation:

B. Cisco routers run High-Level Data Link Control (HDLC) over serial interfaces by default; however, if you are running Frame Relay, they will run the Cisco Frame Relay encapsulation by default.

50. 

B

Explanation:

B. The first up in the line is the Physical layer, and the second up is the Data Link layer.

51. 

B

Explanation:

B. The correct range for an extended access list is 100–199, the correct protocol and port is TCP 80, and the source address is any, but the destination is host 192.168.1.27.

52. 

C

Explanation:

C. If a switch receives a broadcast or multicast frame on a switchport, it is flooded out all ports except for the port it was received on.

53. 

A

Explanation:

A. This ACL will work on either A or D; however, A is a better choice.

54. 

C

Explanation:

C. B, D, and E all meet the minimum requirements of supporting VLSM and discontiguous subnets. However, only static routing minimizes router CPU and WAN utilization.

55. 

D

Explanation:

D. This IP address does not fall into any of the specified ranges and thus will follow the default route out interface serial 0.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net