Answer Key

1. A and C

2. B

3. A, B, and C

4. C

5. A

6. D and E

7. A

8. A and D

9. D

10. C

11. E

12. B

13. B and C

14. D

15. D and E

16. B

17. B

18. D

19. A

20. A

21. B

22. A, E, and F

23. A and E

24. E

25. B, D, and E

26. B and C

27. C, D, and E

28. A, D, and E

29. B, D, and E

30. A, C, and D

31. C, D, E, and F

32. A and D

33. A, C, E, and F

34. A and B

35. A

36. C

37. C

38. D

39. A and D

40. E

41. B and C

42. A, B, E, and F

43. D

44. D

45. A and D

46. B

47. C

48. D

49. A

50. C

51. A

52. A

53. D

54. A, B, and D

55. C, D, and E

A1:

Answers A and C are correct. Ping and trace are used to check connectivity between two routers. Ping sends ICMP messages to verify connectivity. Trace sends UDP packets to verify the current route to a host. Answer B is incorrect because the enable command is used to enter the enable mode. Answer D is incorrect because the show ip arp command is used to display the IP ARP cache.

A2:

Answer B is correct. Trace will display as much of the path as is available. Answer A is incorrect because the path command is not an IOS command. Answer C is incorrect because the show route command will not be useful in diagnosing this fault. Answer D is incorrect; although ping could be used by attempting to contact each router in the known path, the question specifies which command can be used once to make this determination.

A3:

Answers A, B, and C are correct. Direct console connection via a cable, connecting via the network using the Telnet protocol, or connecting via a terminal server (a terminal server is an especially configured router with multiple asynchronous ports that are connected to the console ports of other routers on the network) can be used to perform configuration tasks on Cisco routers. Answer D is incorrect because SSH, an encrypted and secure terminal protocol similar to telnet, is not supported natively by IOS at this time and cannot be used to perform configuration tasks .

A4:

Answer C is correct. Answer C lists Port 23, which is the Telnet TCP/IP port that routers accept network connections from. Routers can be configured via the network using telnet. Answer A is incorrect because the console port is used for a direct cable uplink to the router, not a connection via the network. The console port is a physical port on the router, Port 23, a TCP/IP port is a logical port. Answers B, D, and E are incorrect because these TCP/IP ports support other protocols rather than Telnet.

A5:

Answer A is correct. The show ip interface brief command will print out a brief summary of each interface's IP addressing information. Answers B and C are not valid Cisco IOS commands. Answer D is incorrect because the show hosts command will only display host names and corresponding IP addresses. The show hosts command will display nothing about which router interface uses which IP.

A6:

Answers D and E are correct. The trick with this question is that it asks which will not display the IP address information for interface e0 rather than which commands will. The false answers (correct in this case) are show ip arp and show ip interface e1 , both of which show the arp table and the ip information for interface e1 rather than e0. Answer A is incorrect because show ip interface brief will display the IP address information for all interfaces on a router, of which e0 is one. Answers B and C are incorrect because the show interface e0 command and show ip interface e0 command will display this information.

A7:

Answer A is correct. The configuration of programs like HyperTerminal or a terminal emulator on Linux require that the console connection be configured with the settings 9600bps, 8 data bits, no parity, 1 stop bit, and no flow control. Answers B, C, D, and E are incorrect because they do not include the required settings.

A8:

Answers A and D are correct. The console port on Cisco routers uses an RJ-45 connection. A rollover cable is required to connect to a laptop. To connect to the 9-pin com port you will need an RJ-45 to DB-9 Adapter. Answer B is incorrect because a DB-9 adapter is not required. Answer C is incorrect because DB-25 will not connect to the com port and a DB-25 is not required.

A9:

Answer D is correct. Copy tftp flash will initiate the process of copying an IOS file from a TFTP server to the router's flash memory. Other information will need to be specified such as the image name , the address of the TFTP server, and whether or not you wish to erase other images stored in the flash memory. Answer A is incorrect because it attempts to copy data in flash memory to a TFTP server. Answers B and C are also incorrect as neither command can be used to copy an IOS image from a TFTP server.

A10:

Answer C is incorrect. Copy running-config tftp will upload a copy of the running configuration to the TFTP server. Answer D is incorrect because it will download a copy of a configuration into the running-configuration. Answer A is incorrect because it will allow information, generally an IOS image, to be copied from the TFTP server to flash memory. Answer B is incorrect because it will copy the startup config to the TFTP server rather than the running-config. Although the startup and running configs could possibly be the same, this should not be assumed.

A11:

Answer E is correct. The hostname command will allow the router's hostname to be set. In this case, hostname ROOSKA will allow the router's hostname to be set to ROOSKA. Answers A, B, C, and D are incorrect. These are invalid IOS commands.

A12:

Answer B is correct. The banner motd #BANNER TEXT# command provides the correct IOS command to set the message for incoming terminal connection clients . Answers A, C, and D are incorrect. The commands are syntactically incorrect.

A13:

Answers B and C are correct. Both the ping and the pathping commands can be used to check connectivity between two hosts on a network. Answer A is incorrect, although the show cdp neighbors command will display routers directly connected to the router from which the command is issued, it will not show routers several hops away from that router. Answer D is incorrect, Display network does not exist as a command in IOS.

A14:

Answer D is correct as it is within the specified address range and uses the correct subnet mask. The first part in solving this problem is translating the CIDR notation of /20 into decimal quad notation. /20 is equal to 255.255.240.0. This eliminates answers A, B, and C. The next step is to calculate the network range: 10.10.224.0 has a range of 10.10.224.1 through to 10.10.239.255. 10.10.239.255 is the broadcast address of that network which leaves 10.10.239.254 as the last addressable host address. Answer E is incorrect because it is an IP address outside the network range in question.

A15:

Answers D and E are correct. They both have the correct subnet mask and have IP addresses which lie within the specified address range (192.168.20.225 through to 192.168.20.231). Interface e0 is connected to network 192.168.20.224 /29. Calculating the range of this network forms the bulk of solving this question. CIDR (Classless Inter Domain Routing) notation /29 translates to 255.255.255.248 in decimal quad. This means that answers that have an alternative subnet mask listed to 255.255.255.248 are incorrect. Answer A is incorrect because it has the subnet mask 255.255.255.240 and hence is incorrect. Answer C is incorrect because it has the subnet mask 255.255.255.240 and hence is incorrect. Answer F is incorrect because it has the subnet mask 255.255.255.240 and hence is incorrect.

A16:

Answer B is correct. Of the devices listed, only switches can be used on the local area network to directly provide VLAN functionality. Answer A is incorrect because routers cannot be used to provide VLAN functionality directly. Answer B is incorrect because routers cannot be used to provide VLAN functionality directly. Answer C is incorrect as routers cannot be used to provide VLAN functionality directly.

A17:

Answer B is correct. Only IOS, which was originally based on a variant of Unix, runs on Cisco routers. Answer A is incorrect, Linux will not run on a Cisco router. Answer C is incorrect, FreeBSD will not run on a Cisco router. Answer D is incorrect, Windows Server 2003 will not run on a Cisco router. Answer E is incorrect, Solaris will not run on a Cisco router.

A18:

Answer D is correct. The show cdp neighbors command will not only list the devices that neighbor the router, but, assuming that the devices neighboring the router also use CDP (Cisco Discovery Protocol), which is default for Cisco devices, it will also list whether or not the devices are routers, switches, or repeaters. Answer A is incorrect because it lists network devices and will not display this information. Answer B is incorrect because ping devices will not list this information. Answer C is incorrect because it identifies connections and will not list this information. Answer E is incorrect because it lists trace neighbors and will not list this information.

A19:

Answer A is correct. The show cdp neighbor detail command will provide an in-depth summary of the details of neighboring Cisco devices. This information includes the version of IOS that the neighboring router is running. Answer B is incorrect. Although show cdp neighbor does display information about neighboring Cisco devices, it does not include IOS version in its output. The other commands C and D are not valid in IOS.

A20:

Answer A is correct. The shutdown command, issued from the interface configuration mode, will shut down an interface, suspending connectivity and informing routing protocols that this particular interface is now down. Answers B, C, D, and E are incorrect because they will not shut down an interface.

A21:

Answer B is correct. This question is complex and may require that you draw a diagram to resolve it. Only one set of shutdown commands, e0 on Router 1 and s1 on Router 2, can be implemented while retaining connectivity between all routers. This option is presented in answer B. This question involves working out where the redundant links exist in this network. Three paths exist between routers 2 and 4. A direct path from 2 via interface s1, a two-hop path via router 5, and a three-hop path via router 1 and 3. As the first connection broken in every answer is the one between router 1 and 2, a route between 2 and 4 can be broken while maintaining connectivity to all routers. Answer A is incorrect because it will break connectivity between routers, as no redundant link exists between these interfaces. Answer C is incorrect because it will break connectivity between routers, as no redundant link exists between these interfaces. Answer D is incorrect because it will break connectivity between routers, as no redundant link exists between these interfaces.

A22:

Answer A, E, and F are correct. A Cisco candidate should be able to convert freely between decimal, binary, and hexadecimal. Answer A maps correctly with 255 = FF = 11111111. Answer E maps correctly with 240 = F0 = 11110000. Answer F maps correctly with 224 = E0 = 11100000. Answer B is incorrect. The mapping should be: 254 = FE = 11111110. Answer C is incorrect, the mapping should be: 252 = FC = 11111100. Answer D is incorrect, the mapping should be: 248 = F8 = 11111000.

A23:

Answer A and E are correct. 10.23.193.237 maps to 0A.17.C1.ED and 10.77.228.100 maps to 0A.4D.E4.64. Answer B is incorrect as 10.178.19.113 maps to 0A.B2.13.71. Answer C is incorrect as 10.42.164.211 maps to 0A.2A.A4.D3. Answer D is incorrect as 10.191.37.123 maps to 0A.BF.25.7B.

A24:

Answer E is correct. A switch is used to configure the network so that each individual host on the LAN is connected to its own individual segment. Answer A is incorrect as routers do not segment a network; they are used to divide logical networks. Answer C is incorrect as bridges do segment networks; however, hosts still share a segment when a bridge is implemented. Answer D is incorrect as repeaters forward all data transmitted to them and do not segment the network.

A25:

Answers B, D, and E are correct. Hosts on LANs are usually connected via high-speed data links. LANs are often in close geographic proximity to one another, whereas WANs can stretch across a continent . Frame Relay is used for WAN connections. Answer A is incorrect because hosts on WANs are linked at speeds much lower than LAN speeds. Answer C is incorrect because WANs are geographically diverse, the next suburb or the next town rather than the next room or building.

A26:

Answers B and C are correct. Star networks have a central point to which each host on the network is connected. The two devices that can form the core of star topologies are the hub (B) and the switch (c). Routers are used to send traffic to remote networks. The question states that sending remote traffic is not required. Bridges (D) are generally used to reduce the size of collision domains and do not form the core of star topology LANs. Repeaters (E) are used to lengthen the distance between the switch or hub and the host and do not form the core of star topology LANs.

A27:

Answers C, D, and E are correct. To communicate with hosts on a remote TCP/IP network, a host requires an IP address, a subnet mask, and a default gateway address. Answer A is incorrect, because though a DNS server can help in resolving FQDN addresses to IP addresses, it is not required for communication to occur between a host and another host on a remote subnet. Answer B is incorrect. Although DHCP servers are useful in providing address information, this can be configured manually.

A28:

Answers A, D, and E are correct. CAT 5 UTP does not handle electromagnetic interference well and hence is an inappropriate technology to use in that situation. It supports bandwidths up to 100 megabits per second. Without using a repeater it reaches 100 meters. Depending on which repeaters are used, this can be extended to near 300 meters, not 340. Answers B and C are incorrect. Answer B is incorrect, as CAT 5 UTP can be used without problem on a host only 90 meters from the switch. Answer C is incorrect, as CAT 5 UTP can be used on Token Ring networks.

A29:

Answers B, D, and E are correct. 100BASE-FX runs on fiber- optic cable. It is able to run a length of 412 meters before needing a repeater and it runs at 100 megabits per second. Answer A is incorrect, 100BASE-FX does not run on UTP. Answer C is incorrect as it will run a maximum of 412, not 200 meters without needing signal enhancement.

A30:

Answers A, C, and D are correct. Leased lines, Frame Relay, and PPP are WAN technologies. Answer B is incorrect because ATM is limited to LAN distances and cannot provide connectivity over WAN distances (such as between two cities). Answer E is incorrect because Gigabit Ethernet suffers from distance limitations as well.

A31:

Answers C, D, E, and F are correct. LAN connections are characterized by their proximity to one another. Connected LANs might be in adjacent buildings or on different floors of an office tower. WAN networks often span states if not continents. WAN connections generally operate at lower speed than LAN connections. 100BASE-FX has a maximum range of 412 meters. 100BASE-TX has a maximum range of 100 meters. FDDI has a better range, but cannot span the hundreds of kilometers that some WAN links must. Gigabit Ethernet also provides high bandwidth but is limited in its range. Answers A and B are incorrect because ISDN and frame relay connections can be used not only across the city but across the continent and are the most common types of WAN connections.

A32:

Answers A and D are correct. This question asks which statements are false. Answer A is correct because its statement is false: IOS is not a graphic interface, it is a text-only interface. Answer D is correct as its statement is false: there are only two modes, privileged and user exec . Answer B is true hence is an incorrect answer. IOS does run on almost all of Cisco's routers and most of Cisco's switches. Answer C is true hence is an incorrect answer. IOS images are stored in a router's flash memory. Although such a "list the false answer" question is unlikely to occur on the exam, it should remind you to read a question carefully rather than to briefly glance at it assuming you have fully grasped its scope.

A33:

Answers A, C, E, and F are correct. There are four configuration modes available once the Privileged EXEC mode is entered. These four modes are Global, Router, Line, and Interface configuration. Answer B is incorrect, as Auxiliary configuration mode does not exist, even though connections can be initiated through the auxiliary port. Answer D is incorrect, as UTP configuration modes do not exist, even though there are UTP ports. Certain tasks, such as assigning an IP address to an interface, must be done within particular configuration modes.

A34:

Answers A and B are correct. Routers forward packets based on the network address contained within the destination header. This means that routers will determine which packets need to be forwarded to remote networks via the WAN line. Routers can also be configured to initiate WAN connections when traffic meeting specific criteria is encountered . Answer C is incorrect, as routers on WANs are not limited to using TCP/IP. Routers using leased or dial-up lines can transmit other protocols such as IPX. Answer D is incorrect, as routers do not forward broadcast traffic to remote sites.

A35:

Answer A is correct as RAM stores the running/active configuration. Answer B is incorrect, as ROM stores the bootable IOS image that is used until the router locates the full IOS image. Answer C is incorrect, as flash memory stores fully functional IOS images. Answer D is incorrect, as NVRAM stores the initial/startup config file.

A36:

Answer C is correct; Flash Memory stores fully functional IOS images. Answer A is incorrect, as RAM stores the running/active configuration. Answer B is incorrect, as ROM stores the bootable IOS image that is used until the router locates the full IOS image. Answer D is incorrect, as NVRAM stores the initial/startup config file.

A37:

Answer C is correct. The sequence for router bootup is

POST (power on self test)

Load bootstrap code

Find and load IOS software

Find and load configuration

Begin operation

Answer A is incorrect, as it presents the sequence out of order, placing POST after loading bootstrap code. Answer B is incorrect for the same reason. Answer D is incorrect, as the configuration is loaded before the IOS software. Answer E is incorrect, as IOS software is loaded before bootstrap code.

A38:

Answer D is correct. The IOS software is loaded before the startup-configuration file is located. Answer A is incorrect, as POST occurs before anything else at the start of the sequence. Answer B is incorrect, as loading the bootstrap code occurs well before the startup-configuration is located. Answer C is incorrect, as this occurs two steps before, not immediately before the startup-configuration is located. Answer E is incorrect, as the loading of the configuration is performed after the startup-configuration is located.

A39:

Answers A and D are correct. The configuration register is a 16-bit software register. It can be set via the config-register global configuration command. Some older routers did use jumpers for the configuration register. The configuration register is used to inform the router which of the three operating systems ”full function IOS, limited function IOS, or ROMMON ”to load. Limited function IOS is used when images in flash memory have become corrupted and connectivity is required to retrieve a new uncorrupted image from a TFTP server. ROMMON is used for debugging and password recovery. Answer B is incorrect, as the register is in software not in hardware. Answer C is incorrect, as the register is 16 rather than 64 bit.

A40:

Answer E is correct. The first step in resetting a router's password is to get the router to boot into ROMMON mode so the configuration register can be reconfigured to bypass NVRAM when booting. This is done by holding down the <break> key on the device connected to the console within 60 seconds of the router powering up. Additional steps for completing this task can be found on Cisco's Web site: http://www.cisco.com. Answer A is incorrect, as this method will not work. Answer B is incorrect, as this method will not work. Answer C is incorrect, as this method will not work. Answer D is incorrect, as this method will not work.

A41:

Answers B and C are correct. Answer B is correct because routing uses Layer 3 logical address information to forward data. Answer C is correct, as routing protocols update routing tables. Answer A is incorrect, as switches use Layer 2 information to forward data. Answer D is incorrect as routing rather than routed protocols update routing tables. Answer E is incorrect as only some routing protocols broadcast route information every 60 seconds.

A42:

Answers A, B, E, and F are correct. IGRP (a), EIGRP (b), RIP (e), and OSPF (f) are all routing protocols. Routing protocols find paths through networks, generating routing tables that are used to forward packets expeditiously to their destination. Answers C and D are incorrect. FTP is used for file transfer and HTTP is used for the transfer of Web pages. Both are considered routed protocols.

A43:

Answer D is correct. Scheme four allocates four subnets. The first, 172.16.1.0 /25, will allow 126 hosts on the network, meeting the requirement of 112. The second, 172.16.1.128 /26 will allow 62 hosts on the network, meeting the requirement of 50. Networks 172.16.1.192 and 172.16.1.224 will both allow 30 hosts on the network, meeting the requirements of 28 and 16 addressable hosts respectively. Answer A is incorrect as Scheme 1 contains incorrect subnetting information. Answer B is incorrect as Scheme 2 doesn't meet the requirements listed in the question. Answer C is incorrect as scheme 3 deals with subnets other than the original /24 allocated.

A44:

Answer D is correct. A /28 subnetting will provide 16 networks that can host a maximum of 14 hosts per network, meeting the requirement listed in the question. Answer A is incorrect, as /25 network will have 2 networks with 126 hosts. Answer B is incorrect, as a /26 network will have 4 networks of 62 hosts. Answer C is incorrect, as a /27 network will have 8 networks with 30 hosts each. Answer E is incorrect, as a /29 network will have 32 networks with 6 hosts per network.

A45:

Answers A and C are correct. Bridges segment a network into separate collision domains while forwarding broadcast traffic. Routers do not forward broadcast traffic and divide networks into different broadcast domains. This means answer A is correct. Answer C is correct because routers work at Layer 3 of the OSI model and bridges work at Layer 3 of the OSI model. Answer B is incorrect because it is the opposite of answer A and suggests that routers forward broadcast traffic. Answer D is incorrect, as routers work at Layer 3 of the OSI model.

A46:

Answer B is correct. Of the options presented, only a bridge has these characteristics listed in the question. Answer A is incorrect, as routers deal with packets (Layer 3) rather than frames (Layer 2). Answer C is incorrect, as hubs forward all traffic and do not generate tables. Answer D is incorrect, as bridges forward broadcast and multicast frames .

A47:

Answer C is correct. Placing a bridge between the two hubs will reduce the size of the collision domain by 50% as specified in the question. Answer A is incorrect, as replacing the two hubs with switches will reduce the size of the collision domain by far more than half. Answer B is incorrect, as placing a router between the hubs will require re-subnetting the network. Answer D is incorrect, as placing a repeater between the two hubs will not change the size of the broadcast domains.

A48:

Answer D is correct. Only by implementing a router will broadcast traffic be reduced. Answer A is incorrect, as switches forward broadcast traffic. Answer B is incorrect, as bridges do not filter broadcast traffic. Answer C is incorrect, as switches do not forward broadcast traffic.

A49:

Answer A is correct. Store and forward switching has each frame read into a buffer and performs a CRC check on it. Any frame that fails the CRC check is discarded. Answer B is incorrect because fragment free checks the first 64 bytes of a frame, as statistical analysis has shown that if a frame is corrupted, almost always the corruption will be evident in the first 64 bytes. However, this is not true 100% of the time, hence will not satisfy the question condition that all frames with errors should be dropped. Answer C is incorrect, as cut-through switching only checks the frame's destination address and performs no error correction function. Answer D is incorrect, as hybrid is another name for fragment free.

A50:

Answer C is correct. Cut-through switching only checks the frame's destination address and performs no error correction function. This method has the lowest latency. Answer A is incorrect, as store-and-forward switching has each frame read into a buffer and performs a CRC check on it. Any frame that fails the CRC check is discarded. This method has the highest latency. Latency increases with frame size. Answer B is incorrect, as fragment free checks the first 64 bytes of a frame as statistical analysis has shown that if a frame is corrupted, almost always the corruption will be evident in the first 64 bytes. The latency of the 64-byte check, although small, is higher than that imposed by cut-through switching. Answer D is incorrect, as hybrid switching is another name for fragment-free switching, which as explained in answer B has more latency than cut-through switching.

A51:

Answer A is correct. In the CSMA/CD routine on a segment of shared ethernet, if a collision is detected, a random timer is set. Once that timer expires , the process starts again with the host checking the network for traffic and, if the network is clear, initiating transmission. Answer B is incorrect, as the next step is waiting for a random amount of time rather than a fixed amount. Answer C is incorrect because the next step is to wait for a random amount of time, not to check the network. Answer D is incorrect, as the next step is to wait a random amount of time, not to analyze the frame. Answer E is incorrect, as the next step is to wait a random amount of time, not to retransmit if a multicast frame is detected .

A52:

Answer A is correct. When CSMA/CD is in use on Ethernet, the first part of the process is that the host wishing to initiate a transmission checks the network for any current traffic. Answer B is incorrect, as ethernet networks cannot be placed into a hold state. Answers C and D are incorrect, as Ethernet networks do not use tokens.

A53:

Answer D is correct. ARP is the Address Resolution Protocol and is used to determine MAC addresses for a given TCP/IP address. ARP is used when one host wishes to determine the MAC address of another host when it knows its IP address. Answer A is incorrect because RIPv2 is not used when one host wishes to determine the MAC address of another host when it knows its IP address. Answer B is incorrect because IGRP is not used when one host wishes to determine the MAC address of another host when it knows its IP address. Answer C is incorrect because OSPF is not used when one host wishes to determine the MAC address of another host when it knows its IP address. Answer E is incorrect because EIGRP is not used when one host wishes to determine the MAC address of another host when it knows its IP address.

A54:

Answers A, B, and D are correct. Answer A provides the definition of the ICMP Destination Unreachable Message, that there is a problem delivering the packet. Answer B provides the definition of the Time Exceeded message, that the packet has been discarded after the amount of time it takes for a packet to be delivered. Answer C is incorrect; Ping does not use a source quench to verify connectivity. Answer D provides the correct definition of the Redirect message, that a better route exits. Answer E is incorrect; Echo is not generated in response to data being sent too fast.

A55:

Answers C, D, and E are correct. Answer C, frame relay, is classified as a packet-switching technology. Frame relay is sometimes called frame switching, but it is common within Cisco nomenclature to refer to frame relay as a packet-switching technology. Answer D, ATM, is classified as a packet-switching technology. Answer E, X.25, is classified as a packet-switching technology. Answer A, HDLC, is used on leased lines rather than over a packet switched service. Answer B, LAPB, is used on leased lines rather than over a packet-switched service.




CCNA Exam Cram[tm] 2 (Exams 640-821, 640-811, 640-801)
CCNA Exam Cram[tm] 2 (Exams 640-821, 640-811, 640-801)
ISBN: 789730197
EAN: N/A
Year: 2005
Pages: 155

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net