Chapter 13. Sample Exam 640-811

Question 1

You have the following devices to use in constructing a simple LAN on two separate floors of a building. The distance between each floor is 6 meters .

1 2500 Series router.

10 Catalyst 2950 Switches (24 port).

2 Repeaters.

2 Bridges.

You have 200 desktop workstations and 4 servers. 90 workstations and 2 servers will be located on the 5th floor of the building. 110 workstations and 2 servers will be located on the 7th floor of the building. Because of the extensive traffic between the workstations and the servers, you have decided to create a separate TCP/IP subnet for each floor. Which of the following represents the best use of equipment in designing a simple LAN, given the requirements?

  • A. Place 4 of the Catalyst 2950 switches in stacked configuration on the fifth floor. Connect the 5th floor workstations and the servers to this stack. Place the remaining 6 Catalyst 2960 switches in stacked configuration on the 7th floor. Connect the 7th floor workstations to this stack. Connect the 5th floor stack to one of the bridges. Connect the 7th floor stack to the second bridge. Interconnect the Bridges via the 2 repeaters.

  • B. Place 4 of the Catalyst 2950 switches in stacked configuration on the 5th floor. Connect the 5th floor workstations and the servers to this stack. Place the remaining 6 Catalyst 2950 switches in stacked configuration on the 7th floor. Connect the 7th floor workstations to this stack. Connect the 5th floor stack to the 2500 series router. Connect the 7th floor stack to the 2500 series router. Configure appropriate static routes.

  • C. Place 6 of the Catalyst 2950 switches in stacked configuration on the 5th floor. Connect the 5th floor workstations and the servers to this stack. Place the remaining 4 Catalyst 2950 switches in stacked configuration on the 7th floor. Connect the 7th floor workstations to this stack. Connect the 5th floor stack to the 2500 series router. Connect the 7th floor stack to the 2500 series router. Configure appropriate static routes.

  • D. Place 6 of the Catalyst 2950 switches in stacked configuration on the 5th floor. Connect the 5th floor workstations and the servers to this stack. Place the remaining 4 Catalyst 2950 switches in stacked configuration on the 7th floor. Connect the 7th floor workstations to this stack. Connect the 5th floor stack to the 7th floor stack via repeaters.

Question 2

Rooslan has been asked to help improve the responsiveness of the LAN at his grandfather's architecture consultancy. At present there are 15 hosts on the network. All of these hosts are connected to a single 20 port 10Mbps hub. Copying files to and from the server, or to other workstations, during normal business hours can take quite a lot of time. Which of the following Cisco devices could Rooslan implement to most improve the responsiveness of this network by reducing congestion?

  • A. Replace the 10Mbps hub with a Cisco 2500 series router.

  • B. Replace the 10Mbps hub with a Cisco wireless bridge.

  • C. Replace the 10Mbps hub with a 100Mbps hub.

  • D. Replace the 10Mbps hub with a Cisco Catalyst 2950 10/100Mbps switch.

Question 3

Your Web hosting firm has been allocated a class C IP network address. You have four locations. The first in Phoenix, Arizona hosts 100 servers. The second one in Sydney, Australia hosts 50 servers. The third one in Moscow, Russia hosts 20 servers, and the fourth in Brasilia, Brazil hosts 18 servers. You are tasked with resubnetting the class C IP address space, aware that all of your routers support CIDR. Which of the following subnet masks should be applied to each location?

  • A. Phoenix: 255.255.255.192, Sydney: 255.255.255.192, Moscow: 255.255.255.224, Brasilia 255.255.255.224.

  • B. Phoenix: 255.255.255.128, Sydney: 255.255.255.224, Moscow: 255.255.255.240, Brasilia 255.255.255.248.

  • C. Phoenix: 255.255.255.128, Sydney: 255.255.255.192, Moscow: 255.255.255.224, Brasilia 255.255.255.240.

  • D. Phoenix: 255.255.255.128, Sydney: 255.255.255.192, Moscow: 255.255.255.224, Brasilia 255.255.255.224.

Question 4

You are designing an IP addressing scheme for a company that has three branch offices located throughout the country. Each office can be assigned IP addresses from the private address space, as all of their Internet access is handled through proxy servers and none of the hosts needs to be accessed from the public Internet. The first office in Minneapolis requires a single subnet that will support 300 hosts. The second office in Melbourne requires a single subnet that will support 120 hosts. The third office in Vancouver requires a single subnet that will support 28 hosts. Which of the following private IP addressing schemes will meet the needs of each of the offices? (Select all that apply.)

  • A. Minneapolis: 192.168.1.0 /24

    Melbourne : 192.168.2.0 /24

    Vancouver : 192.168.3.0 /24

  • B. Minneapolis: 192.168.2.0 /23

    Melbourne : 192.168.4.0 /24

    Vancouver : 192.168.5.0 /24

  • C. Minneapolis: 192.168.1.0 /25

    Melbourne : 192.168.2.0 /25

    Vancouver : 192.168.3.0 /25

  • D. Minneapolis: 192.168.2.0 /23

    Melbourne : 192.168.4.0 /25

    Vancouver : 192.168.6.0 /26

Question 5

Rooslan is the network engineer for a university. There are three campuses and several remote sites that are all a part of the university network. Using the traceroute utility Rooslan determines that the network diameter is up to 25 hops. Which of the following routing protocols would not be able to map routes of this length? (Choose all that apply.)

  • A. RIP

  • B. RIPv2

  • C. IGRP

  • D. EIGRP

  • E. OSPF

Question 6

Oksana is the network engineer in a network that has routers from multiple vendors. The majority of the routers on the network were manufactured by Cisco systems, but there are routers from other manufacturers that perform critical tasks and cannot be replaced at this time. Which of the following routing protocols are not proprietary to Cisco and hence are likely to be supported by non-Cisco vendors ? (Choose all that apply.)

  • A. RIPv2

  • B. OSPF

  • C. IGRP

  • D. EIGRP

Question 7

Which of the following devices can be used to connect the local LAN to a wide area network (WAN) connection such as an ISDN line to a remote city?

  • A. Bridge

  • B. Layer 2 switch

  • C. Repeater

  • D. Router

Question 8

Which of the following are most likely to be present in a modern corporate internetwork that spans six cities in four states? (Select 3.)

  • A. Routers

  • B. Switches

  • C. Hubs

  • D. Routing Protocols

  • E. Repeaters

  • F. Bridges

Question 9

Foley wants to write a standard IP access list to block traffic from all hosts coming from the IP address range 128.250.0.0 through to 128.250.255.255. Which of the following access lists will achieve Foley's goal? (Select all that apply.)

  • A. access list 1 permit 128.250.0.0 0.0.0.0

  • B. access list 1 deny 128.250.0.0 0.0.0.0

  • C. access list 1 deny 128.250.255.255 255.255.0.0

  • D. access list 1 deny 128.250.254.254 0.0.255.255

  • E. access list 1 deny 128.250.0.0 0.0.255.255

Question 10

Foley wants to set up an extended IP access list on a Cisco router to block all Telnet access to the host 192.168.81.114. Which of the following access lists will achieve this goal?

  • A. access list 105 deny tcp any host 192.168.81.114 eq telnet

  • B. access list 106 deny tcp 192.168.81.114 any host eq telnet

  • C. access list 107 deny tcp 192.168.81.114 0.255.255.255 any host eq telnet

  • D. access list 108 deny tcp any host 192.168.81.114 eq http

Question 11

Which of the following WAN protocols do not provide error correction?

  • A. SDLC

  • B. LAPB

  • C. HDLC

  • D. PPP

Question 12

Which of the following WAN protocols support STAC and Predictor compression via Cisco's IOS?

  • A. PPP, LAPB, and HDLC

  • B. PPP and LAPB

  • C. PPP and HDLC

  • D. HDLC and LAPB

Question 13

Which of the following protocols are routing rather than routed protocols? (Choose all that apply.)

  • A. RIPv2

  • B. IP

  • C. IPX

  • D. OSPF

  • E. EIGRP

Question 14

Which of the following protocols are routed rather than routing protocols? (Choose all that apply.)

  • A. NWLink

  • B. DECnet

  • C. BGP

  • D. RIP

  • E. IGRP

Question 15

Which of the following sets of IOS commands will set the IP address of router RTR1's ethernet0 interface to 192.168.20.1 /28 and make it active?

  • A. RTR1(config)#interface ethernet0

    RTR1(config-if)#ip address 192.168.20.1 255.255.255.0

    RTR1(config-if)#no shut

  • B. RTR1(config)#interface ethernet0

    RTR1(config-if)#ip address 192.168.20.1 255.255.255.0

    RTR1(config-if)#shut

  • C. RTR1(config)#interface ethernet0

    RTR1(config-if)#ip address 192.168.20.1 255.255.255.240

    RTR1(config-if)#no shut

  • D. RTR1(config)#interface ethernet0

    RTR1(config-if)#ip address 192.168.20.1 255.255.255.240

    RTR1(config-if)#shut

  • E. R TR1(config)#interface ethernet0

    RTR1(config-if)#ip address 192.168.20.1 255.255.240.0

    RTR1(config-if)#no shut

Question 16

Which of the following sets of IOS commands will set the IP address of router ODLT1's ethernet1 interface to 10.10.40.1 /23 and make it active?

  • A. ODLT1(config)#interface ethernet0

    ODLT1(config-if)#ip address 10.10.40.1 255.255.240.0

    ODLT1(config-if)#no shut

  • B. ODLT1(config)#interface ethernet0

    ODLT1(config-if)#ip address 10.10.40.1 255.255.248.0

    ODLT1(config-if)#no shut

  • C. ODLT1(config)#interface ethernet0

    ODLT1(config-if)#ip address 10.10.40.1 255.255.252.0

    ODLT1(config-if)#no shut

  • D. ODLT1(config)#interface ethernet0

    ODLT1(config-if)#ip address 10.10.40.1 255.255.254.0

    ODLT1(config-if)#no shut

  • E. ODLT1(config)#interface ethernet1

    ODLT1(config-if)#ip address 10.10.40.1 255.255.254.0

    ODLT1(config-if)#no shut

  • F. ODLT1(config)#interface ethernet1

    ODLT1(config-if)#ip address 10.10.40.1 255.255.255.0

    ODLT1(config-if)#no shut

Question 17

You are interested in configuring a router so that it can be accessed via a Telnet session from a remote host. Which of the following passwords will you need to set for this option to be enabled?

  • A. Console password

  • B. Enable password

  • C. Auxiliary password

  • D. VTY password

Question 18

Which of the following passwords must be set before its corresponding method of accessing the router becomes available?

  • A. Console password must be set before console access is available.

  • B. Enable password must be set before console access is available.

  • C. Auxiliary password must be set before access via the Auxiliary port is available.

  • D. VTY password must be set before access via Telnet is available.

Question 19

Which of the following statements about VLANs are true? (Select two.)

  • A. Each VLAN on a switch must be on a separate subnet.

  • B. Traffic passing between two ports on a switch that are members of different VLANs must pass through Layer 3 of the OSI model.

  • C. Traffic passing between two ports on a switch that are members of different VLANs only passes through Layer 2 of the OSI model.

  • D. Each VLAN on a switch must be on the same subnet.

Question 20

Which of the following are benefits of instituting VLANs on switches?

  • A. Broadcast traffic is only forwarded on those ports that are members of the same VLAN.

  • B. Broadcast traffic is forwarded to all ports on the switch regardless of VLAN membership.

  • C. Single VLANs can span multiple switches.

  • D. VLANs are limited to the ports on a single switch.

Question 21

Which of the following commands can be used to display which particular ports are configured as members of each particular VLAN configured on a Cisco Catalyst 1900 switch?

  • A. show vtp

  • B. show running-config

  • C. show spantree

  • D. show start-config

  • E. show vlan-membership

Question 22

You are currently configuring a Catalyst 1900 switch's VLANs. You want to configure ports 7 “8 to VLAN 2, 9 “10 to VLAN 3, and ports 11 “12 to VLAN 4. Which of the following sets of command-line instructions will do this?

  • A. switch(config-if)# interface e 0/7

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/8

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/9

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/10

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/11

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/12

    switch(config-if)# vlan-membership static 2

  • B. switch(config-if)# interface e 0/7

    switch(config-if)# vlan-membership static 1

    switch(config-if)# interface e 0/8

    switch(config-if)# vlan-membership static 1

    switch(config-if)# interface e 0/9

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/10

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/11

    switch(config-if)# vlan-membership static 3

    switch(config-if)# interface e 0/12

    switch(config-if)# vlan-membership static 3

  • C. switch(config-if)# interface e 0/7

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/8

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/9

    switch(config-if)# vlan-membership static 3

    switch(config-if)# interface e 0/10

    switch(config-if)# vlan-membership static 3

    switch(config-if)# interface e 0/11

    switch(config-if)# vlan-membership static 4

    switch(config-if)# interface e 0/12

    switch(config-if)# vlan-membership static 4

  • D. switch(config-if)# interface e 0/7

    switch(config-if)# vlan-membership static 4

    switch(config-if)# interface e 0/8

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/9

    switch(config-if)# vlan-membership static 3

    switch(config-if)# interface e 0/10

    switch(config-if)# vlan-membership static 4

    switch(config-if)# interface e 0/11

    switch(config-if)# vlan-membership static 2

    switch(config-if)# interface e 0/12

    switch(config-if)# vlan-membership static 4

Question 23

Which of the following LAN hosts are most likely to require full rather than half duplex ethernet connections? (Select two.)

  • A. File server

  • B. Workstation

  • C. Proxy server

  • D. Web server

Question 24

Which of the following devices can most effectively be used to reduce network congestion caused by unicast transmissions by hosts on the same segment?

  • A. Gateway

  • B. Repeater

  • C. Bridge

  • D. Router

  • E. Switch

Question 25

Which of the following devices can most effectively be used to reduce congestion caused by broadcast transmissions by hosts on the network? (Select all that apply.)

  • A. Repeater

  • B. Bridge

  • C Router

  • D. Switch (Layer 2)

  • E. Switch with VLAN

Question 26

Which of the following, when used while configuring an interface from the command line on a Catalyst 1900 switch, will configure a port into permanent trunk mode and start it negotiating with connected devices to establish a link in trunk mode?

  • A. switch1(config-if)# trunking on

  • B. switch1(config-if)# trunk nonegotiate

  • C. switch1(config-if)# switch trunk enable

  • D. switch1(config-if)# switch enable trunk

  • E. switch1(config-if)# trunk on

Question 27

Which of the following, when used while configuring a Catalyst 1900 switch from the command line, will set the VTP domain name to ROOSLAN?

  • A. vtp enable set domain ROOSLAN

  • B. vtp server domain ROOSLAN

  • C. vtp domain set ROOSLAN

  • D. authenticate VTP domain ROOSLAN

  • E. connect VTP domain ROOSLAN

Question 28

Which of the following commands will correctly configure a Catalyst 1900 switch for in- band management on IP address 10.10.10.225 /29?

  • A. ip address 10.10.10.225 255.255.255.240

  • B. config ip 10.10.10.225 255.255.255.240

  • C. ip address 10.10.10.225 255.255.255.224

  • D. config ip 10.10.10.225 255.255.255.224

  • E. ip address 10.10.10.225 255.255.255.248

  • F. config ip 10.10.10.225 255.255.255.248

Question 29

Which of the following commands will allow a Catalyst 1900 switch to be correctly configured with an addressable (one that is neither broadcast or network address) IPv4 address?

  • A. ip address 10.10.99.224 255.255.255.240

  • B. ip address 10.10.34.239 255.255.255.248

  • C. ip address 10.10.154.91 255.255.255.224

  • D. ip address 10.10.72.127 255.255.255.224

  • E. ip address 10.10.105.31 255.255.255.252

Question 30

You have the following access list:

access-list 1 deny 192.168.10.1 0.255.255.255

access-list 1 deny 10.10.20.1 0.0.255.255

access-list 1 permit 10.15.30.1 0.0.0.255

applied to incoming traffic on the ethernet0 interface. No other access lists have been applied on the router. Given this information, which of the following statements is true? (Choose all that apply.)

  • A. Traffic from host address 192.168.10.20 entering the router from interface ethernet0 will be blocked.

  • B. Traffic from host address 192.168.20.1 entering the router from interface ethernet0 will be blocked.

  • C. Traffic from host address 10.10.100.155 entering the router from interface ethernet0 will be allowed.

  • D. Traffic from host address 10.90.100.10 entering the router from interface ethernet0 will be allowed.

  • E. Traffic from host address 10.240.34.8 entering the router from interface ethernet0 will be blocked.

Question 31

You have the following extended access list applied to inbound traffic on interface Ethernet 0 on a Cisco router.

access-list 101 allow tcp any host 192.168.10.21 eq 80

access-list 101 deny tcp 10.10.20.0 0.0.0.255 192.168.10.21 eq ftp

access-list 101 allow tcp 10.10.20.0 0.0.255.255 192.168.10.22 eq telnet

No other access lists have been applied on Ethernet 0 or any other interfaces on this router. Given this particular access list, which of the following statements are false? (Choose all that apply.)

  • A. All traffic incoming on interface Ethernet 0 for the Web server hosted on host 192.168.10.21 will be allowed.

  • B. All traffic incoming on interface Ethernet 0 for the SSL secured Web site hosted on host 192.168.10.21 will be allowed.

  • C. FTP traffic coming from host 10.100.20.10 to host 192.168.10.21 via interface Ethernet 0 will be blocked.

  • D. FTP traffic coming from host 10.10.20.10 to host 192.168.10.21 via interface Ethernet 0 will be allowed.

  • E. Telnet traffic coming from host 10.10.50.30 to host 192.168.10.21 via interface Ethernet 0 will be allowed.

  • F. Telnet traffic coming from host 10.20.50.30 to host 192.168.10.22 via interface Ethernet 0 will be blocked.

Question 32

Which of the following are properties of frame relay networks?

  • A. Frame relay networks are multi-access networks.

  • B. In frame relay, routers are called data communications equipment.

  • C. In frame relay, switches are called data terminal equipment.

  • D. The line between a router and the nearest frame relay switch is termed the access link.

  • E. Virtual circuits can only exist between switches of the same make and manufacture.

Question 33

Which of the following frame relay acronyms matches its definition?

  • A. DTE: Switches in a frame relay service.

  • B. DCE: Routers in a frame relay service.

  • C. SVC: A pre-configured virtual circuit between two DTE.

  • D. CIR: Length of time of which agreed bandwidth can be exceeded.

  • E. DLCI: Frame relay address used to identify a virtual circuit.

Question 34

Rooslan has the following list of addresses used on a network:

Address 1 : 00-10-5A-6D-50-40

Address 2 : 00-10-5A-6D-38-24

Address 3 : 10.28.12.73

Address 4 : 10.12.05.77

Address 5 : SERVER1

Address 6 : primus.lspace.org

Which of these addresses are examples of Layer 2 addresses as defined in the OSI model? (Select all that apply.)

  • A. Address 1

  • B. Address 2

  • C. Address 3

  • D. Address 4

  • E. Address 5

  • F. Address 6

Question 35

Which of the following correctly describes a MAC address?

  • A. A 12-character fixed address made up of numerals 0 “9 and characters A “F.

  • B. A 12-character dynamic address made up of numerals 0 “9 and characters A “F.

  • C. A 32-bit fixed binary address.

  • D. A 32-bit dynamic binary address.

  • E. A 24-character fixed address made up of numerals 0 “9 and characters A “F.

  • F. A 24-character dynamic address made up of numerals 0 “9 and characters A “F.

Question 36

Which of the following networking devices is paired with the layer of the OSI model that would best describe its core functionality? (Select all that apply.)

  • A. Repeater, Layer 1.

  • B. Bridge, Layer 2.

  • C. Switch, Layer 4.

  • D. Router, Layer 3.

  • E. Gateway, Layer 3.

Question 37

You are investigating the OSI model as a way of understanding how different networking devices operate on the LAN. Which of the following descriptions has a correct match between the description of data transferred, the device used, and the layer of the OSI model that this process occurs at? (Select all that apply.)

  • A. Repeaters work with bits at Layer 2.

  • B. Bridges work with packets at Layer 1.

  • C. Switches work with frames at Layer 2.

  • D. Routers work with packets at Layer 3.

  • E. Routers work with frames at Layer 2.

  • F. Bridges work with packets at Layer 3.

  • G. Switches work with packets at Layer 1.

Question 38

You are the administrator of a LAN that includes four different buildings that are in geographic proximity. Each building has its own router. The router in Building 1 is connected to ISDN lines that go to Building 2 and Building 3. The router in Building 2 is connected to ISDN lines that connect it to Building 1 and Building 4. The router in Building 1 fails. Which of the following statements are true? (Select all that apply.)

  • A. Hosts in Building 4 will be able to contact hosts in Building 2.

  • B. Hosts in Building 2 will be able to contact hosts in Building 3.

  • C. Hosts in Building 1 will be unable to contact hosts in any other buildings.

  • D. Hosts in Building 4 will be able to contact hosts in Building 3.

Question 39

You are the administrator of a LAN where VLANs have been instituted. Switch 1 has been configured to host VLANs 1 and 2. Switch 2 is connected to switch 1 and hosts VLAN 2. Switch 3 is connected to Switch 1 and hosts VLANs 1 and 3. Switch 4 is connected to Switch 3 and hosts VLANs 3 and 4. Switch 3 fails. Which of the following statements are true? (Select all that apply.)

  • A. Some hosts on VLAN 1 will be able to contact hosts on VLAN 2

  • B. All hosts on VLAN 1 will be able to contact hosts on VLAN 2

  • C. Hosts on VLAN 4 will be able to contact some hosts on VLAN 3

  • D. Hosts on VLAN 2 will be able to contact hosts on VLAN 4

Question 40

You are interested in logging messages each time a router intercepts or transmits an RIP update on a TCP/IP network. Which of the following IOS commands will do this?

  • A. debug ip rip

  • B. debug ip igrp

  • C. log rip updates

  • D. log igrp updates

  • E. audit ip rip

  • F. audit ip igrp

Question 41

You want to configure a router to log messages detailing IGRP updates received and sent by the router. Which of the following IOS commands would you use to do this?

  • A. audit

  • B. debug

  • C. log

  • D. watch

  • E. show

Question 42

Which of the following IPv4 addresses exist within the private address space? (Select all that apply.)

  • A. 10.99.244.203

  • B. 172.168.33.28

  • C. 172.16.24.193

  • D. 192.169.0.103

  • E. 192.168.23.12

Question 43

Rooslan is looking at utilizing a private IP address range for a 240-host network. He wants to allocate a single /24 subnet to this task. Which of the following subnets are located within the private IP address space as defined by RFC 1918 and meet Rooslan's requirements? (Select all that apply.)

  • A. 11.128.120.0 /27

  • B. 172.17.119.0 /24

  • C. 172.32.161.0 /24

  • D. 192.168.0.192 /27

  • E. 192.168.101.0 /24

Question 44

Which of the following IP address/subnet mask combinations cannot be used, as they represent either the network address or broadcast address of that specific network? (Choose all that apply.)

  • A. IP: 10.10.10.255, Subnet Mask: 255.255.255.0

  • B. IP: 10.10.10.224, Subnet Mask: 255.255.255.240

  • C. IP: 10.10.192.224, Subnet Mask: 255.255.224.0

  • D. IP: 10.10.10.192, Subnet Mask: 255.255.255.252

  • E. 1IP: 10.10.252.254, Subnet Mask: 255.255.252.0

Question 45

You are attempting to debug some IP address/subnet mask combinations that appear not to be working. Which of the following IP addresses are not addressable hosts given the corresponding subnet masks? (Choose all that apply.)

  • A. IP: 192.168.1.0 /24

  • B. IP: 192.168.224.0 /20

  • C. IP: 192.168.224.0 /18

  • D. IP: 192.168.240.0 /19

  • E. IP: 192.168.240.0 /21

Question 46

You have a host named ALPHA on a TCP/IP subnet that can communicate with other hosts on the same subnet, but cannot communicate with hosts on other subnets. Other hosts on the original TCP/IP subnet can communicate with host ALPHA as well as hosts on remote subnets. Hosts on remote subnets cannot communicate with host ALPHA. Which of the following are possible reasons for this problem? (Select two.)

  • A. The subnet mask on ALPHA is incorrectly set.

  • B. The default gateway on ALPHA is incorrectly set.

  • C. The IP address of ALPHA conflicts with another host on the same subnet.

  • D. The DNS server address on ALPHA is incorrectly set.

Question 47

You have a LAN with a single TCP/IP subnet. Your network is connected to the Internet via an ISDN line to your ISP. This ISDN line runs via a Cisco router. In the last hour you have noticed that you are unable to browse any Web sites, nor have you received any email from outside your network. You are able to ping your router, but not the ISP's router. Which of the following network devices could be at fault? (Select two.)

  • A. The UTP cabling between your computer and the switch.

  • B. The switch at your office may have failed.

  • C. The router at your office may have failed.

  • D. The ISDN line between your office and the ISP may have failed.

  • E. The router at the ISP connected to your ISDN line may have failed.

Question 48

You are attempting to troubleshoot the following access list which has been applied to inbound traffic on interface Ethernet 0 on a Cisco router.

access-list 10 permit 10.20.30.0 0.0.255.255

access-list 10 permit 10.30.20.0 0.0.255.255

access-list 10 permit 10.50.30.0 0.255.255.255

access-list 10 deny 10.60.20.0 0.0.255.255

access-list 10 deny 10.40.20.0 0.0.255.255

You are attempting to ascertain why traffic from the host 10.60.20.55 is able to pass through interface Ethernet 0. No other access lists are currently in use on the router. Which of the following reasons explains this?

  • A. There is an implicit allow at the end of all access lists.

  • B. Line four of the access list should be re-written as "access-list 10 deny 10.60.20.0 255.255.0.0."

  • C. Line three of the access list permits all traffic from the 10.x.x.x range of host addresses.

  • D. Line one of the access list permits all traffic from the 10.x.x.x range of host addresses.

Question 49

You are attempting to troubleshoot the following extended access list which has been applied to interface Ethernet 0 on a Cisco router:

access-list 101 permit tcp 10.10.0.0 0.0.255.255 192.168.10.22 eq 80

access-list 101 permit tcp 10.20.0.0 0.0.255.255 192.168.10.22 eq 23

access-list 101 deny tcp 10.30.0.0 0.0.255.255 192.168.10.22 eq 80

access-list 101 deny tcp 10.40.0.0 0.0.255.255 192.168.10.22 eq 23

access-list 101 permit tcp 10.50.0.0 0.0.255.255 192.168.10.22 eq 80

A particular host with IP address 10.40.22.23 is unable to access the Web server hosted on host 192.168.10.22. Which of the following is the reason for this?

  • A. The fourth line of the access list only grants host on the 10.40.x.x network access to port 23 of host 192.168.10.22.

  • B. The third line of the access list denies hosts on the 10.40.x.x network access to port 80 of host 192.168.10.22.

  • C. The first line of the access list denies hosts on the 10.40.x.x network access to port 80 of host 192.168.10.22.

  • D. The implicit deny statement at the end of all access lists means that packets from network 10.40.x.x destined for port 80 on host 192.168.10.22, which aren't covered by any of the lines in the access list, are discarded.

Question 50

You are currently using STAC compression on a WAN link but are concerned that CPU utilization might be too high on the routers on either end. Which of the following IOS commands will display the CPU utilization on a router for five seconds, at one-minute and five-minute intervals?

  • A. show utilization

  • B. show process

  • C. show compress

  • D. show CPU

Question 51

Which of the following statements about PPP authentication protocols are true? (Select two.)

  • A. When PAP is used over a WAN connection, username and password are sent by the dialing router without encryption.

  • B. When CHAP is used over a WAN connection, username and password are sent by the dialing router without encryption.

  • C. When PAP is used over a WAN connection, the router receiving the connection sends a challenge which includes a random number later input into the MD5 hash algorithm.

  • D. When CHAP is used over a WAN connection, the router receiving the connection sends a challenge which includes a random number later input into the MD5 hash algorithm.

Question 52

Which of the following are benefits of implementing Spanning Tree Protocol (STP) on Cisco switches on a local area network? (Select two.)

  • A. STP stops frames from looping indefinitely in switch-based LANs that have been configured with redundant links.

  • B. STP allows more than one active path to exist at any time between collision domains.

  • C. STP allows only one active path to exist at any time between collision domains.

  • D. STP allows frames to loop indefinitely in switch-based LANs that have been configured with redundant links.

Question 53

There are five switches in a network, ALPHA, BETA, GAMMA, DELTA, and EPSILON. Each switch is connected to each other switch. Spanning Tree Protocol is in use on this network. STP elects switch BETA as the root bridge. Which of the listed switches will have ports that will not transmit frames received from other ports or forward received frames? (Select all that apply.)

  • A. ALPHA

  • B. BETA

  • C. GAMMA

  • D. DELTA

  • E. EPSILON

Question 54

One of the LANs that you administrate has STP operational on all of its 16 Cisco Catalyst 1900 switches. You are connected to the switch via the console and would like to display the spanning tree information for VLAN 2. Which of the following commands will enable you to do this?

  • A. show spantree 2

  • B. show spantree 1

  • C. show trunk

  • D. show cdp neighbors

  • E. show config vlan 2

Question 55

You wish to view the statistics about STP BPDU communications. Which of the following commands can be used while connected to a Catalyst 1900 switch's console port to display this information?

  • A. display spantree statistics

  • B. show spantree statistics

  • C. display bpdu statistics

  • D. show bpdu statistics

  • E. show spantree

Question 56

LAN A consists of 20 hosts with 100Mbps network cards all connected via Cat 5 UTP to a single 25-port 100Mbps Hub. LAN B consists of 20 hosts with 100Mbps network cards all connected via Cat 5 UTB to a single 25 port 10Mbps switch. Which of the following reasons best explains why LAN B often has better performance than LAN A when all hosts are in use?

  • A. Under no circumstances will LAN B have better performance than LAN A.

  • B. Broadcast traffic from every host on LAN A will be transmitted to every other host on LAN A. Broadcast traffic from every host on LAN B will only be transmitted to a single destination host.

  • C. Unicast traffic from each host on LAN A will be transmitted to every other host on LAN A. Unicast traffic from each host on LAN B will only be transmitted to a single destination host.

  • D. Unicast traffic from each host on LAN A will be transmitted to a single destination host. Unicast traffic from each host on LAN B will be transmitted to all other hosts on LAN B.

Question 57

Which of the following routing protocols are classified as "Exterior Routing Protocols"?

  • A. RIPv2

  • B. BGP

  • C. IGRP

  • D. EIGRP

  • E. OSPF

Question 58

Which of the following routing protocols are classified as "Interior Routing Protocols"? (Choose all that apply.)

  • A. RIPv2

  • B. BGP

  • C. IGRP

  • D. EIGRP

  • E. OSPF

Question 59

Which of the following is the maximum routing metric value (non-infinite) of the RIP routing protocol?

  • A. 10 hops

  • B. 15 hops

  • C. 16 hops

  • D. 255 hops

  • E. 256 hops

  • F. 1024 hops

Question 60

Which of the following can IGRP use in the calculation of its routing metrics? (Choose all that apply.)

  • A. Bandwidth

  • B. Delay

  • C. Load

  • D. Reliability

  • E. MTU

  • F. IOS Version




CCNA Exam Cram[tm] 2 (Exams 640-821, 640-811, 640-801)
CCNA Exam Cram[tm] 2 (Exams 640-821, 640-811, 640-801)
ISBN: 789730197
EAN: N/A
Year: 2005
Pages: 155

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net