CCNA-Practice Test 1


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

Of the choices below, which one is needed for connectivity in a Frame Relay network if Inverse ARP isn't operational?

  1. frame-relay arp

  2. frame-relay map

  3. frame-relay interface dlci

  4. frame-relay Imi-type

image from book

2. 

Look at Figure 1-1. As soon as SwitchB was added to the network, VLAN connectivity problems began cropping up. Why?

  1. Both switches are in server mode in the same domain.

  2. The revision number of SwitchB was higher than the revision number of SwitchA.

  3. SwitchA was not rebooted prior to adding SwitchB to the network.

  4. V-2 was not enabled.

  5. VTP pruning was not activated, so the new paths of the network have not been recalculated.

image from book

SwitchA# show vtp status

SwitchB# show vtp status

VTP version

: 2

VTP version

: 2

Configuration Revision

: 1

Configuration Revision

: 7

Maximum VLANs supported locally

: 64

Maximum VLANs supported locally

: 64

Number of existing VLANs

: 8

Number of existing VLANs

: 4

VTP Operating Mode

: Server

VTP Operating Mode

: Server

VTP Domain Name

: cisco

VTP Domain Name

: cisco

VTP Pruning Mode

: disabled

VTP Pruning Mode

: disabled

V2 Mode

: disabled

VTP V2 Mode

: disabled

image from book

Figure 1-1

image from book

3. 

Look at Figure 1-2. Note both the IP addresses and how the network's routers are configured. Let's say the Sys Admin types in the show ip eigrp neighbors command from Router1 and gets the resulting output beneath the topology. Of the following, which is true?

  1. It's normal for Router1 to show one active neighbor at a time to prevent routing loops.

  2. Routing isn't configured completely in Router3.

  3. The IP addresses aren't configured properly on the Router 1 and Router3 interfaces.

  4. The no auto-summary command configured on the routers prevents Router1 and Router2 from forming a neighbor relationship.

image from book
Figure 1-2

image from book

4. 

Match each EIGRP item on the left with the correct interpretation on the right. (You won't use all the terms on the right.)

Neighbor table

Backup route

Topology table

Lists adjacent routers

Routing table

Contains only successor routes

Successor route

Route installed in routing table

Summary route

Holds all feasible routes in the AS

Feasible successor

 
Open table as spreadsheet

image from book

5. 

You're configuring a router to act as a hub within a Frame-relay hub-and-spoke topology. Why would you opt for using point-to-point subinterfaces instead of a multipoint interface?

  1. It avoids split horizon issues with distance vector routing protocols.

  2. Only one IP network address needs to be used to communicate with all spoke devices.

  3. Point-to-point subinterfaces offer greater security than multipoint interface configuration.

  4. Only a single physical interface is needed with point-to-point subinterfaces, whereas a multipoint interface logically combines multiple physical interfaces.

image from book

6. 

Choose two of the following that best describe the process identifier used to run OSPF on a router.

  1. It's locally significant.

  2. It's globally significant.

  3. It's needed to identify a unique instance of an OSPF database.

  4. It's an optional parameter required only if multiple OSPF processes are running on the router.

  5. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

image from book

7. 

Correctly complete the basic switch configuration by matching each switch IOS command in the left column to its relevant function in the right column.

IP default gateway

Allows access to high-level testing commands such as debug

Interface vlan 1

Allows access to configuration commands that affect the systems as a whole

Hostname

Sets the system name

Ip address

Activates the interface configuration mode for vlan1

Enable

Enables the switch-management interface

No shutdown

Sets the switch-management IP address

Configure terminal

Allows the switch to be managed from remote networks

Open table as spreadsheet

image from book

8. 

How would the interface clock rate be established when a router is connected to a Frame Relay WAN link using a serial DTE interface?

  1. It is supplied by the CSU/DSU.

  2. It is supplied by the far-end router.

  3. It is determined by the clock rate command.

  4. It is supplied by layer 1 bit stream timing.

image from book

9. 

Choose which of the following show ip interface command output options signifies a layer 1 problem.

  1. Serial0/1 is up, line protocol is up

  2. Serial0/1 is up, line protocol is down

  3. Serial0/1 is down, line protocol is down

  4. Serial0/1 is administratively down, line protocol is down.

image from book

10. 

Pick two of the following reasons why a network administrator would use access lists.

  1. To control VTY access into a router

  2. To control broadcast traffic through a router

  3. To filter traffic as it passes through a router

  4. To filter traffic that originates from a router

  5. To replace passwords as a line of defense against security incursions

image from book

11. 

You have two routers directly connected via a serial link. One of them is made by Cisco; the other is a different brand. Choose the command you would use on a Cisco router to create a WAN connection between these two routers.

  1.  Lab(config-if)#  encapsulation hdlc ansi 

  2.  Lab(config-if)#  encapsulation ppp 

  3.  Lab(config-if)#  encapsulation frame-relay default 

  4.  Lab(config-if)#  encapsulation isdn 

image from book

12. 

Look at Figure 1-3. In it, you can see a new, 60-host subnet that is now part of the network. Of the options below, which one best provides a sufficient number of usable addresses while also wasting the fewest addresses?

  1. 192.168.1.56/26

  2. 192.168.1.56/27

  3. 192.168.1.64/26

  4. 192.168.1.64/27

image from book
Figure 1-3

image from book

13. 

Choose two options that depict the information used by a router running a link-state protocol to create and sustain its topological database.

  1. Hello packets

  2. SAP messages sent by other routers

  3. LSAs from other routers

  4. Beacons received on point to point links

  5. Routing tables received from other link-state routers

  6. TTL packets from designated routers

image from book

14. 

Look at Figure 1-4. Serial0/0 isn't replying to a ping from a host on the FastEthernet0/0 LAN. What would resolve this problem?

  1. Enable the serial 0/0 interface.

  2. Correct the IP address for serial 0/0.

  3. Correct the IP address for FastEthernet 0/0.

  4. Change the encapsulation type on serial 0/0.

  5. Enable auto-configuration on the serial 0/0 interface.

image from book

BHM# show ip interface brief

Interface

IP-Address

OK?

Method

Status

Protocol

FastEthernet0/0

192.168.16.1

YES

NVRAM

up

up

Serial0/0

192.168.15.2

YES

NVRAM

administratively down

down

FastEthernet0/1

192.168.17.1

YES

NVRAM

up

up

Serial0/1

unassigned

YES

NVRAM

administratively down

down

image from book

Figure 1-4

image from book

15. 

What can you accurately conclude by analyzing the router output depicted in Figure 1-5?

  1. 200.1.1.64 is a default route.

  2. The output shows that there are three default routes.

  3. The output came from router R2.

  4. The output came from a router that has four physical interfaces.

  5. EIGRP is in use in this network.

image from book
Figure 1-5

image from book

16. 

Which of the following best describes the purpose of Inverse ARP?

  1. To map a known IP address to a Mac address

  2. To map a known DLCI to a Mac address

  3. To map a known Mac address to an IP address

  4. To map a known DLCI to an IP address

  5. To map a known IP address to a SPID

  6. To map a known SPID to a Mac address

image from book

17. 

Look at the router table output in Figure 1-6. The corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Which of the following represents what the router will do with this packet?

  1. It will encapsulate the packet as a frame relay and forward it out of Serial 0.0.117.

  2. It will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0.

  3. It will forward the packet out interface Serial 0/1 and send an ICMP echo reply message out interface Serial 0/0.102.

  4. It will change the IP packet to an ARP frame and forward it out as FastEthernet 0/0.

image from book

 Corp#show ip route … Gateway of last resort is not set C 192.168.13.0/24 is directly connected, Serial0/1 C 192.168.14.0/24 is directly connected, FastEthernet0/0 C 192.168.15.0/24 is directly connected, Serial0/0.102 C 192.168.20.0/24 is directly connected, Serial0/0.117 R 192.168.16.0/24 [120/1] via 192.168.15.2, 00:00:05, Serial0/0.102 R 192.168.17.0/24 [120/1] via 192.168.15.2, 00:00:05, Serial0/0.102 R 192.168.30.0/24 [120/2] via 192.168.20.2, 00:00:25, Serial0/0.117 R 192.168.19.0/24 [120/1] via 192.168.20.2, 00:00:25, Serial0/0.117 R 192.168.21.0/24 [120/3] via 192.168.20.2, 00:00:25, Serial0/0.117 R 192.168.214.0/24 [120/1] via 192.168.14.2, 00:00:22, FastEthernet0/0 

image from book

Figure 1-6

image from book

18. 

You're testing an ISDN circuit that uses PPP between two IP hosts. Match the indicator in the left column with the OSI layer on the right that it confirms.

The line is up.

Layer 3

A ping of the remote host is successful.

Layer 2

A telnet connection to the host is successful.

Layer 1

A dial session to the remote host is successful.

 
Open table as spreadsheet

image from book

19. 

Look at Figure 1-7. One of the routers has 25 hosts with one connection to the Internet through the R1 router. Which routing configurations would be the best to implement on both the R1 and ISP routers?

  1. BGP on both routers

  2. RIP on both routers

  3. Default routes on both routers

  4. BGP on the ISP router and a static route on R1

  5. A default route on R1 and a static route on the ISP router

image from book
Figure 1-7

image from book

20. 

Look at Figure 1-8. Which two of the following options depict what the output line of show ip route tells you?

  1. The next routing update can be expected in 35 seconds.

  2. The IP address 10.10.10.6 is configured on S0/1.

  3. The IP address 10.10.10.8 is configured on S0/1.

  4. This route is using the default administrative distance.

  5. The 10.10.10.8 network is two hops away from this router.

image from book

R 10.10.10.8 [120/2] via 10.10.10.6, 00:00:25, Serial0/1

image from book

Figure 1-8

image from book

21. 

Without a loopback interface, which of the following accurately describes what an OSPF router would use for the router ID if all OSPF routers in one area were configured with the same priority value?

  1. The IP address of the Fast Ethernet interface

  2. The IP address of the console-management interface

  3. The highest IP address among its active interfaces

  4. The lowest IP address among its active interfaces

  5. The priority value until a loopback interface is configured

image from book

22. 

Your VLAN with the subnet address of 172.16.4.0/22 contains hosts that must be prevented from accessing websites on the Internet. Match the options from the left column and write them on the right to fulfill this command: access-list 156 deny protocol 172. 16.4.0 mask any eq port. (Obviously, you won't use all the options.)

image from book

image from book

23. 

Look at Figure 1-9. What would you use to enable communication between host A and host B?

  1. A CSU/DSU connected to the switches with crossover cables

  2. A router connected to the switch with straight-through cables

  3. A router connected to the switches with crossover cables

  4. A straight-through cable only

  5. A crossover cable only

image from book
Figure 1-9

image from book

24. 

Look at Figure 1-10. You have two 2950 switches that connect via ports Fa0/24 and a straight-through cable. What facts can you gain by combining the output of the show cdp neighbor command from both switches and the information given?

  1. Port Fa0/24 on each switch must be configured on VLAN 1 in order for the switches to see neighbor information.

  2. Port Fa0/24 on each switch must be configured as a trunk port in order for neighbor information to be received.

  3. The switches are not cabled properly.

  4. An IP address needs to be assigned to both switches.

  5. VTP is incorrectly configured on switch A.

image from book
Figure 1-10

image from book

25. 

On which OSI layer does the protocol operate that imparts the information you get by using the show cdp neighbors command?

  1. Physical

  2. Data link

  3. Network

  4. Transport

  5. Application

image from book

26. 

Figure 1-11 depicts a corporate LAN that uses IP network 172.28.4.0/22 for all departments. All hosts use 172.28.4.1 as a default gateway address. You've been called on to address the issue of excessive broadcasts slowing network performance. What would you do to resolve the problem?

  1. Implement VLANs after creating IP subnets for each department.

  2. Configure each NIC and switch port to operate at full duplex.

  3. Increase the number of switches in the network closet of each department.

  4. Change the router-to-switch connection from Fast Ethernet to Gigabit Ethernet.

  5. Configure an access control list on the router to prevent broadcast forwarding.

image from book
Figure 1-11

image from book

27. 

Look at Figure 1-12. Pick the two commands you must configure on the 2950 switch and the router that will permit communication between host 1 and host 2.

  1.  Router(config)# interface fastethernet 0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shut down 

  2.  Router(config)# interface fastethernet 0/0 Router(config-if)# no shut down Router(config)# interface fastethernet 0/0.1 Router(config-subif)# encapsulation dot1q 10 Router(config-subif)# ip address 192.168.10.1 255.255.255.0 Router(config)# interface fastethernet 0/0.2 Router(config-subif)# encapsulation dot1q 20 Router(config-subif)# ip address 192.168.20.1 255.255.255.0 

  3.  Router(config)# router eigrp 100 Router(config-router)# network 192.168.10.0 Router(config-router)# network 192.168.20.0 

  4.  Switch1(config)# vlan database Switch1(config-vlan)# vtp domain XYZ Switch1(config-vlan)# vtp server 

  5.  Switch1(config)# interface fastethernet 0/1 Switch1(config-if)# switchport mode trunk 

  6.  Switch1(config)# interface vlan 1 Switch1(config-if)# ip default gateway 192.168.1.1 

image from book
Figure 1-12

image from book

28. 

Look at Figure 1-13. In it, you can see that the switches have been configured with static VLANs. But when testing, the Sys Admin finds that VLAN 20 on SwitchA isn't connecting with VLAN 30 on SwitchB. What steps should be taken solve this problem?

  1. Configure the interconnected ports on SwitchA and SwitchB in access mode.

  2. Connect the two switches with a straight-through cable.

  3. Add a Layer 3 device to connect VLAN 20 and VLAN 30.

  4. Configure the management VLAN with IP addresses.

  5. Ensure that the VTP passwords match on both switches.

image from book
Figure 1-13

image from book

29. 

Of the choices below, which three host addresses are valid members of networks that can be routed across the Internet?

  1. 10.172.13.65

  2. 172.16.223.125

  3. 172.62.12.29

  4. 192.168.23.252

  5. 198.234.12.95

  6. 212.193.48.254

image from book

30. 

Choose the command that will configure a switch port to use the IEEE standard method of adding VLAN membership information into Ethernet frames.

  1.  Switch(config)# switchport trunk encapsulation isl 

  2.  Switch(config)# switchport trunk encapsulation ietf 

  3.  Switch(config)# switchport trunk encapsulation dot1q 

  4.  Switch(config-if)# switchport trunk encapsulation isl 

  5.  Switch(config-if)# switchport trunk encapsulation ietf 

  6.  Switch(config-if)# switchport trunk encapsulation dot1q 

image from book

31. 

Look at Figure 1-14 with these goals in mind:

  1. Allow Telnet from the Internet to the HR server.

  2. Allow HTTP access from the Internet to the web server.

  3. All other traffic from the Internet should be blocked.

image from book
Figure 1-14

Choose the two access list statements you need to achieve your objective.

  1.  access-list 101 permit tcp any 172.17.18.252 0.0.0.0 eq 80 

  2.  access-list 101 permit tcp any 172.17.17.252 0.0.0.0 eq 23 

  3.  access-list 101 deny tcp any 172.17.18.252 0.0.0.0 eq 80 

  4.  access-list 101 permit tcp 172.17.18.252 0.0.0.0 any eq 23 

  5.  access-list 101 deny tcp 172.17.18.252 0.0.0.0 eq 23 

  6.  access-list 101 permit tcp 172.17.18.252 0.0.0.0 eq 23 

image from book

32. 

Look at the newly installed network in Figure 1-15. Host B can access the Internet, but it can't ping Host C. Why?

  1. Host B should be in VLAN 13.

  2. The address of Host C is incorrect.

  3. The gateway for Host B is in a different subnet than the host is on.

  4. The switch port that sends VLAN 13 frames from the switch to the router is shut down.

  5. The switch port connected to the router is incorrectly configured as an access port.

image from book
Figure 1-15

image from book

33. 

If you needed to permit Internet access for the hosts in your network assigned addresses in the 192.168.8.0 through 198.168.15.255 range, which wildcard mask would you employ to achieve that objective?

  1. 0.0.0.0

  2. 0.0.0.255

  3. 0.0.255.255

  4. 0.0.7.255

  5. 0.0.3.255

image from book

34. 

Of the following situations, when would multiple copies of the same unicast frame be the most likely to be relayed in a switched LAN?

  1. During high-traffic periods

  2. After broken links are re-established

  3. When upper-layer protocols require high reliability

  4. In an improperly implemented redundant topology

  5. When a dual-ring topology is in use

image from book

35. 

You've just inserted a new router into an established OSPF network, but the networks attached to the recently added router aren't showing up in the routing tables of the other OSPF routers. By looking at the information within the partial configuration given below, what's causing this issue?

 Router(config)# router ospf 1 Router(config-router)# network 10.0.0.0 255.0.0.0 area 0 

  1. The process id is configured improperly.

  2. The OSPF area is configured improperly.

  3. The network wildcard mask is configured improperly.

  4. The network number is configured improperly.

  5. The AS is configured improperly.

  6. The network subnet mask is configured improperly.

image from book

36. 

Choose two options that best describe the steps of the OSI encapsulation process.

  1. The transport layer divides a data stream into segments and adds reliability and control information.

  2. The data link layer adds physical source and destination addresses and an FCS to the segment.

  3. Packets are created when the network encapsulates a frame with source and destination host addresses and protocol-related control information.

  4. Packets are created when the network layer adds Layer 3 addresses and control information to the segment.

  5. The presentation layer translates bits into voltages for transmission across the physical link.

image from book

37. 

Match and drag the security features in the column on the left to the exact security risks they help protect against in the right column. (You'll have some left over.)

Access-group

Remote access to device console

Console password

Access to the console 0 line

Enable secret

Access to connected networks or resources

CHAP authentication

Viewing of passwords

VTY password

Access to privileged mode

Service password-encryption

 
Open table as spreadsheet

image from book

38. 

You need to stop 172.16.1.5 from accessing the 172.16.4.0 network, but permit access to all other networks. Choose the command sequence that will properly apply this access list.

  1.  routerA(config)# interface fa0/0 routerA(config-if)# ip access- group 10 in 

  2.  routerA(config)# interface s0/0 routerA(config-if)# ip access- group 10 out 

  3.  routerB(config)# interface fa0/1 routerB(config-if)# ip access- group 10 out 

  4.  routerB(config)# interface fa0/0 routerB(config-if)# ip access- group 10 out 

  5.  routerB(config)# interface s0/1 routerB(config-if)# ip access- group 10 out 

image from book
Figure 1-16

image from book

39. 

Your security policy dictates that only one host can be permitted to dynamically attach to each interface, and if this policy is violated, the interface should immediately shut down. Choose the two commands you need to configure on the 2950 Catalyst switch to implement your policy.

  1.  Switch1(config-if)# switchport port-security maximum 1 

  2.  Switch1(config)# mac-address- table secure 

  3.  Switch1(config)#Access-list 10 permit ip host 

  4.  Switch1(config-if)# switchport port-security violation shutdown 

  5.  Switch1(config-if)# ip access- group 10 

image from book

40. 

When analyzing Figure 1-17, what does the term dynamic mean as indicated in the output of the show frame-relay map command?

  1. The Serial0/0 interface is passing traffic.

  2. The DLCI 100 was dynamically allocated by the router.

  3. The Serial0/0 interface acquired the IP address of 172.16.3.1 from a DHCP server.

  4. The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud.

  5. The mapping between the DLCI 100 and the end station IP address 172.16.3.1 was learned through Inverse ARP.

image from book

R1# show frame-relay map

Serial0/0 (up): ip 172.16.3.1 dlci 100 (0×64, 0×1840), dynamic broadcast,, status defined, active

image from book

Figure 1-17

image from book

41. 

You're troubleshooting a connectivity issue when you notice that a port-status LED on a Cisco Catalyst series switch is alternating green and amber. What does this mean?

  1. The port is experiencing errors.

  2. The port is administrator disabled.

  3. The port is blocked by spanning tree.

  4. The port has an active link with normal traffic activity.

image from book

42. 

You need to reconfigure a Catalyst 2950, and you must make sure the old configuration is erased. Which two options will ensure you're successful?

  1. Erase flash.

  2. Restart the switch.

  3. Delete the VLAN database.

  4. Erase the running configuration.

  5. Erase the startup configuration.

  6. Modify the configuration register.

image from book

43. 

Look at Figure 1-18. You've configured a new router and entered the copy startup-config running-config command on it. You power down the router and set it up at a remote location, but when it starts up, it enters the system configuration dialog shown in the figure. What's causing this to happen?

  1. The network administrator failed to save the configuration.

  2. The configuration register is set to 0x2100.

  3. The boot system flash command is missing from the configuration.

  4. The configuration register is set to 0x2102.

  5. The router is configured with the boot system startup command.

image from book

---System Configuration Dialog---

Would you like to enter the initial configuration dialog? [yes/no]: % Please answer 'yes' or 'no'.

Would you like to enter the initial configuration dialog? [yes/no]: n

Would you like to terminate autoinstall? [yes]:

  • Press RETURN to get started!

image from book

Figure 1-18

image from book

44. 

On point-to-point networks, OSPF hello packets are addressed to which address?

  1. 127.0.0.1

  2. 172.16.0.1

  3. 192.168.0.15

  4. 223.0.0.2

  5. 224.0.0.5

image from book

45. 

What is the purpose of spanning tree in a switched LAN?

  1. To provide a mechanism for network monitoring in switched environments

  2. To prevent routing loops in networks with redundant switched paths

  3. To prevent switching loops in networks with redundant switched paths

  4. To manage the addition, deletion, and naming of VLANs across multiple switches

  5. To segment a network into multiple collision domains

image from book

46. 

Look at Figure 1-19. If all switches are set to the default priority setting, which switch will be the root bridge?

  1. Switch 1

  2. Switch 2

  3. Switch 3

  4. Switch 4

image from book
Figure 1-19

image from book

47. 

Looking at Figure 1-20, why hasn't the network converged?

  1. The no auto-summary command needs to be applied to the routers.

  2. The network numbers have not been properly configured on the routers.

  3. The subnet masks for the network numbers have not been properly configured.

  4. The autonomous system number has not been properly configured.

  5. The bandwidth values have not been properly configured on the serial interfaces.

image from book
Figure 1-20

image from book

48. 

Examine Figure 1-21. You've installed SwitchB, and you want to configure it to allow remote access from the management workstation connected to SwitchA. Choose the set of commands that will enable you to achieve this.

  1.  SwitchB(config)# interface FastEthernet 0/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown 

  2.  SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# ip default gateway 192.168.8.254 255.255.255.0 SwitchB(config-if)# no shutdown 

  3.  SwitchB(config)# ip default- gateway 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown 

  4.  SwitchB(config)# ip default network 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown 

  5.  SwitchB(config)# ip route 192.168.8.254 255.255.255.0 SwitchB(config)# interface FastEthernet 0/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown 

image from book
Figure 1-21

image from book

49. 

Choose the three feasible trunking modes for a switch port.

  1. Transparent

  2. Auto

  3. On

  4. Desirable

  5. Client

  6. Forwarding

image from book

50. 

Which two commands would you use to configure running OSPF, plus adding network 192.168.16.0/24 to OSPF area 0?

  1. Router(config)# router ospf 0

  2. Router(config)# router ospf 1

  3. Router(config)# router ospf
    area 0

  4. Router(config-router)# network
    192.168.16.0 0.0.0.255 0

  5. Router(config-router)# network
    192.168.16.0 0.0.0.255 area 0

  6. Router(config-router)# network
    192.168.16.0 255.255.255.0
    area 0

image from book

51. 

You've configured an interface with the access list shown. Based on the access list, which information packets in the left column would be permitted, and which packets would be denied?

Access-list 107 deny tcp 207.16.12.0 0.0.3.255 any eq http

Access-list 107 permit ip any any

Source IP 207.16.32.14, destination application: http

 

Source IP 207.16.15.9, destination port 23

 

Source IP 207.16.14.7, destination port 80

 

Source IP 207.16.13.14, destination application http

 

Source IP 207.16.16.14, destination port 53

 
Open table as spreadsheet

image from book

52. 

You've configured the Ethernet 0 interface of a router with address 10.64.0.1. 255.224.0.0 and the Ethernet 1 interface with address 10.96.0.1/11. Choose the two commands you would use to configure RIP version 1 on this router so it would advertise both networks to the neighboring routers.

  1.  Router(config)# router rip Router(config-router)# network 10.0.0.0 255.224.0.0 

  2.  Router(config)# router rip Router(config-router)# network 10.64.0.1 255.224.0.0 Router(config-router)# network 10.96.0.1 255.224.0.0 

  3.  Router(config)# router rip Router(config-router)# network 10.0.0.0 

  4.  Router(config)# router rip Router(config-router)# network 10.64.0.0 Router(config-router)# network 10.96.0.0 

image from book

53. 

Look at Figure 1-22, and give the reason the switch has two MAC addresses assigned to the FastEthernet 0/1 port in the switch address table.

  1. Data from two of the devices connected to the switch has been sent to Host3.

  2. Data from Host3 and Host4 has been received by the switch port FastEthernet 0/1.

  3. Either Host3 or Host4 has just had the NIC replaced.

  4. Host3 and Host4 are on two different VLANs.

image from book
Figure 1-22

image from book

54. 

A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address used for subnets?

  1. 201.57.78.33

  2. 201.57.78.84

  3. 201.57.78.87

  4. 201.57.78.97

  5. 201.57.78.159

  6. 201.57.78.254

image from book

55. 

Where are EIGRP successor routes stored?

  1. In the routing table only

  2. In the neighbor table only

  3. In the topology table only

  4. In the routing table and neighbor table

  5. In the routing table and topology table

  6. In the topology table and neighbor table

image from book

Answers

1. 

B

Explanation:

B. Inverse ARP is used to resolve an IP address to local DLCI number. If a router does not support IARP or is used on the network, a frame-relay map must be configured for each PVC.

2. 

B

Explanation:

B. If the revision number of the new switch is higher, then the other switches will begin taking the new switches' update, which could cause connectivity problems.

3. 

B

Explanation:

B. From the output of the show ip eigrp neighbors command, the administrator can see that Router3 has not found Router1 as a neighbor. This is because Router3 does not have a network statement for the 192.168.3.1 network.

4. 

Explanation:

Neighbor table

Lists adjacent routers

Topology table

Holds all feasible routes in the AS

Routing table

Contains only successor routes

Successor route

Route installed in routing table

Feasible successor

Backup route

Open table as spreadsheet

EIGRP creates three tables to providing routing services, unlike RIP that creates only one. The three tables are neighbor table, which lists all adjacent neighbors; the topology table that lists every link in the network, called successor routers and feasible successor router (backup routes) and the routing table, where the success routes are copied from the topology table and placed.

5. 

A

Explanation:

A. In a case where split horizon is the problem, split horizon defines the rule "it is never useful to send routing information back in the direction from which it came." With this rule in place, routing updates that come from spoke routers would never be relayed from the hub router. By implementing point-to-point links and sub-interfaces on the spoke router, the routing protocol looks at each of the sub-interfaces as separate physical links, allowing the updates to go between each point-to-point link and update the spoke routers.

6. 

A, C

Explanation:

A, C The OSPF process id is locally significant and identifies each individual instance of OSPF that is running, should multiple instances be running on a single router.

7. 

Explanation:

IP default gateway

Allows the switch to be managed from remote networks

Interface vlan 1

Activates the interface configuration mode for vlan1

Hostname

Sets the system name

Ip address

Sets the switch management IP address

Enable

Allows access to high level testing commands such as debug

No shutdown

Enables the switch management interface

Configure terminal

Allows access to configuration commands that affect the systems as a whole

Open table as spreadsheet

Switches do not need an IP address. It is very important that you remember this. IP addresses are used on a switch for management reasons only. The ip default-gateway command allows you to manage the switch from outside your local LAN or VLAN. If you do set an IP address, it would be set under the management VLAN, which by default is VLAN 1. A router or switch name is set by using the hostname command. You can set an IP address on an interface of a router or switch interface, logical or physical, by using the ip address command. The enable command allows you to access privledge mode. No shutdown enables and interface. All switch ports are enabled by default and the configure terminal command puts you into global configuration mode.

8. 

A

Explanation:

A. In a serial connection, only a device or the end of the cable is the DTE (router in most cases), and the other device or end of the cable is the DCE (CSU/DSU or ISP device). In this type of connection, the clock rate and control for the connection come from the DCE device.

9. 

C

Explanation:

C. In the interface output Serial0/1 is down, line protocol is down, the section Serial0/1 is down means that the interface is not receiving carrier detect; this is a physical layer (layer 1) problem. Line protocol is down means that the interface is not receiving keepalives from the remote router, which is considered a data link (layer 2) problem.

10. 

A, C

Explanation:

A, C. Access lists filter traffic as it is trying to pass through the router, and traffic generated at the router will not be filtered. Also, by placing an access list on the VTY lines, you can provide telnet security on your router.

11. 

B

Explanation:

B. Cisco uses the default serial encapsulation of HDLC, which is proprietary. If you have a Cisco router and a different brand of router on another side of the link, you have to use another encapsulation. One example is PPP.

12. 

C

Explanation:

C. Having 60 hosts on the network requires that at least 6 host bits be left from the network bits. 6 host bits will create 62 hosts on the network. Because network 192.168.1.64 is the next network, that will be the network id. With 6 host bits, that leaves 26 network bits or a /26 mask.

13. 

A, C

Explanation:

A, C. A router running a link-state protocol uses hello packets to find neighbors and form adjacencies. Once an adjacency has been formed, it will use link-state advertisement (LSA) packets to exchange topology information and updates when changes occur.

14. 

A

Explanation:

A. Administratively down means the interface must be enabled with the no shutdown command.

15. 

E

Explanation:

E. The D in the router output means the router is using EIGRP as a routing protocol. There are three directly connected networks attached to this router.

16. 

D

Explanation:

D. Inverse ARP is the automatic process of finding a DLCI from a known IP address. If this function is not available, then the mapping of the DLCI to the IP address must be done manually through the frame-relay map command.

17. 

B

Explanation:

B. Because there is no route entry for the 192.168.22.0 network, the router will discard the frame and use ICMP to tell the transmitting host (out fa0/0) that the network is unreachable.

18. 

Explanation:

The line is up.

Layer 2

A ping of the remote host is successful.

Layer 3

A dial session to the remote host is successful.

Layer 1

Open table as spreadsheet

A successful dial session is the Physical layer, or layer 1, the "line is up" is a Data Link, or layer 2 function, and ping is a program that runs at the Network layer, or layer 3.

19. 

C

Explanation:

C. Because there is only one Internet connection, and the size and complexity of the network is small, default routes are the easiest and lowest overhead options for routing data.

20. 

D, E

Explanation:

D, E. The exhibit shows an entry from a routing table. The R to the left of the entry means the RIP routing protocol is being run. Moving to the right, 10.10.10.8 is the network that was learned. In the brackets [120/2], 120 is the default administrative distance (AD) for RIP, and 2 is the metric; for RIP, this is given in hops, meaning the network is 2 hops or routers away.

21. 

C

Explanation:

C. In the election process of OSPF routers, the priority value is checked first. By default, all routers have a value of 1. If a loopback interface is configured, the interface with the highest IP address is used. If there is no loopback interface, then the active interface with the highest IP address is used.

22. 

Explanation:

image from book

Web traffic uses HTTP, which is port 80. HTTP uses TCP at the Transport layer. Since the subnet mask is a /20, which is a block size of 4 in the third octet, the wildcard mask would be 0.0.3.255.

23. 

B

Explanation:

B. Because different VLANs are configured, different networks must be configured. In order to communicate from one network to another, a router is required. The router can be connected to each switch with a straight-through cable on different router interfaces.

24. 

C

Explanation:

C. When connecting two like devices together directly, a crossover cable must be used for them to communicate.

25. 

B

Explanation:

B. Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol that works at the data link layer.

26. 

A

Explanation:

A. VLANs break up broadcast domains in layer-2 switched networks. Figure 1-11 shows all hosts in one broadcast domain, because switches do not break up broadcast domains by default.

27. 

B, E

Explanation:

B, E. By configuring logical interfaces on the router for each VLAN and then trunking the port from the switch to the router, and by using a frame-tagging encapsulation type of either 802.1q or ISL, inter-VLAN communication would occur at that router's interface.

28. 

C

Explanation:

C. When VLANs are configured, they provide a broadcast domain boundary or separate network. In order for a host to communicate from one network to another, a layer 3 or routing device is required.

29. 

C, E, F

Explanation:

C, E, F. To answer this question, the private address ranges must be known. There is a range in each class of addresses: 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255. Any of the options in these ranges will not be routed on the Internet.

30. 

F

Explanation:

F. There are two trunking encapsulation methods: ISL, which is Cisco propriety, and 802.1q, which is not proprietary. Use the command dot1q when using 802.1q.

31. 

A, B

Explanation:

A, B. The access-list statement access-list 101 permit tcp means that it is an extended list and will be used port numbers to filter the network. The next command is any and means "any source." The next command is the destination address and is specified by using the 0.0.0.0 wildcard. Finally, eq port tells the destination port number.

32. 

B

Explanation:

B. Host C's address is on the wrong network: It is on the 13 network, whereas its current IP is on the 14 network.

33. 

D

Explanation:

D. A wildcard is always one less than the block size. The third octet has a block size of 8, and the fourth octet has a block size of 256. This makes the mask 0.0.7.255.

34. 

D

Explanation:

D. If you do not have spanning-tree enabled on your switches, and you have redundant links, you will have broadcast storms and multiple frame copies.

35. 

C

Explanation:

C. OSPF uses an inverse mask to configure the network statement. The mask in this example should be 0.255.255.255.

36. 

A, D

Explanation:

A, D. This question is asking about Protocol Data Units (PDUs). The Transport layer creates segments and uses port number, the Network layer creates packets and uses logical addressing, the Data Link layer creates Frames and uses hardware addresses (MAC) and the Physical layer uses bits.

37. 

Explanation:

Access-group

Access to connected networks or resources

Console password

Access to the console 0 line

Enable secret

Access to privileged mode

VTY password

Remote access to device console

Service password-encryption

Viewing of passwords

Open table as spreadsheet

The access-group command is used to place an access-list on a router interface. The console password is used to secure the console port, the enable secret is used to secure privileged mode, the VTY password is used for securing telnet access and the service password-encryption is used to encrypt your routers passwords in the configuration.

38. 

D

Explanation:

D. Because a standard access list is being used in this network, you should place the access list closest to the destination network.

39. 

A, D

Explanation:

A, D. By using the switchport port-security command, you can implement a security policy on your Catalyst switches.

40. 

E

Explanation:

E. You can statically map IP addresses to your local DLCI, or IARP will dynamically learn mappings. By default, IARP is enabled.

41. 

A

Explanation:

A. If a port on a switch is turning from green to amber and back again, there is some type of problem with the cabling or device connected to the switch.

42. 

C, E

Explanation:

C, E. If you erase the startup-config and reload the router, you will still have the VLAN database on the switch (vlan.dat, stored in flash). You must also delete the VLAN database to restore a switch back to factory defaults.

43. 

A

Explanation:

A. In this example, the administrator has incorrectly used the copy command. The correct syntax for this is copy "source file" "destination file". Because the configuration was made directly to the router, the changes were made to the running-configuration file stored in RAM. The permanent location for the configuration file is in NVRAM as the startup-configuration file. The command should have been copy running-configuration startup-configuration.

44. 

E

Explanation:

E. OSPF uses a multicast address of 224.0.0.5 to send hello packets to adjacent neighbors.

45. 

C

Explanation:

C. The spanning-tree protocol is used to prevent loops in the layer 2 switching topology by controlling or blocking the use of redundant links. In a layer 2 network, redundant links are not a bad thing, unless they are uncontrolled, because they provide a secondary path if the primary fails and thus eliminate single points of failure.

46. 

A

Explanation:

A. Switch1 has the lowest MAC address, which by default is used to find the root bridge.

47. 

A

Explanation:

A. The network shown in Figure 1-20 is a discontiguous network, and the no auto-summary command must be applied under the routing protocol.

48. 

C

Explanation:

C. By configuring an IP address, enabling interface VLAN 1, and then setting a default gateway with the ip default-gateway command, the switch will allow a remote host access for administrative purposes.

49. 

B, C, D

Explanation:

B, C, D. The three possible trunking modes include on, which means it is configured as "always" a trunk port and attempts to make the port on the far end of the segment a trunk port as well. This negotiation of trunk status is done using the dynamic trunking protocol (DTP). The next mode is desirable, which desires to be a trunk port send DTP frames, but can be an access port the other end will not be a trunk port. The third mode is auto, which becomes a trunk port if it receives DTP frames to become one; however it will not send DTP frames to change the other port.

50. 

B, E

Explanation:

B, E. When configuring OSPF to route on a network, the OSPF process must be started using the router OSPF <process id> command. Then, while in the router configuration mode, the network command can be used to add a network and enable interfaces to operate in OSPF. The network command in OSPF includes the network, a wildcard bit mask, and the area to which you want the network to belong.

51. 

Explanation:

Source IP 207.16.13.14, destination application http

Permitted

Source IP 207.16.14.7, destination port 80

Permitted

Source IP 207.16.32.14, destination application: http

Denied

Source IP 207.16.15.9, destination port 23

Denied

Source IP 207.16.16.14, destination port 53

Denied

Open table as spreadsheet

The wildcard 0.0.3.255 is a block size of 4, which means that the third octet will permit anything from 12 to 15. Also, the applicaiton is HTTP, so the access list will only permit port 80.

52. 

C, D

Explanation:

C, D. RIP, IGRP, and EIGRP are all configured the same way: with classful addresses, which means all default host bits are off. In this question, two networks are using the 10.0.0.0 classful network address. If you are studying for your CCNA exam, it would be wise to understand this type of configuration.

53. 

B

Explanation:

B. Multiple hosts can be connected to a switch port, by either a hub or another switch. All MAC addresses connected to that switch port will be placed into the CAM table.

54. 

E

Explanation:

E. With a /27 mask, the networks will increment by 32. The 201.57.78.128/27 network will have a broadcast address of 201.57.78.159.

55. 

E

Explanation:

E. EIGRP successor routes (the best routes) are stored in the topology table with all the other routes. Only the successor routes are then copied into the route table to be used for routing.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net