CCNA-Practice Test 2


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

Your router discovers a remote network via a static route, EIGRP, and OSPF, and all the routing protocols are set to their default administrative distance. In this situation, which route will the router use to forward data to the newly discovered remote network?

  1. The router will use the static route.

  2. The router will use the OSPF route.

  3. The router will use the EIGRP route.

  4. The router will load balance and use all three routes.

image from book

2. 

Look at the following diagram. You've added another router called Vine2, but no routing updates are being exchanged between it and the pre-existing Vine1 router. You look into the issue and find that other interconnectivity and Internet access for all your existing locations throughout the corporate network are working great. What must you do to isolate the problem and tweak the router configurations so they can communicate fully?

  1. Connect to the Internet router, and reload it.

  2. Connect to Vine1 and Vine2, and reload them.

  3. Connect to Vine1 and Vine2, and make sure they are both in the same autonomous system and the network statements are correctly configured on both routers.

  4. Add RIP to both routers.

image from book
Figure 2-1

image from book

3. 

Look at the following diagram. You can see that all your hosts are maintaining connectivity with each other. Choose three of the following that would be relevant to the addressing scheme likely used by this network:

  1. The subnet mask in use is 255.255.255.192.

  2. The subnet mask in use is 255.255.255.128.

  3. The IP address 172.16.1.25 can be assigned to hosts in VLAN1.

  4. The IP address 172.16.1.205 can be assigned to hosts in VLAN1.

  5. The LAN interface of the router is configured with one IP address.

  6. The LAN interface of the router is configured with multiple IP addresses.

image from book
Figure 2-2

image from book

4. 

Choose three of the following that accurately describe RIP.

  1. RIPv1 does not support routing update authentication. RIPv2 does support routing update authentication.

  2. RIPv1 does not include subnet information in routing updates. RIPv2 does include subnet information in routing updates.

  3. RIPv1 does not support advertising routes across WANs. RIPv2 supports advertising routes across LANs as well as WANs.

  4. RIPv1 uses hold-down timers and split horizon to prevent routing loops. RIPv2 does not require hold-down timers or split horizon to prevent routing loops.

  5. RIPv1 sends periodic routing updates over the multicast IP address 224.0.0.10. RIPv2 sends periodic routing updates over the multicast IP address 224.0.0.9.

  6. RIPv1 does not support a network addressing scheme in which hosts within the same major network have different subnet masks. RIPv2 does allow hosts within the same major network to have different subnet masks.

image from book

5. 

Look at the following diagram. Which of the following will happen if you enter these command lines into the router?

           Napa(config)# interface              FastEthernet 0/0           Napa(config-if)# no ip              access-group 106 in           Napa(config-if)#              interface Serial 0/0           Napa(config-if)# ip              access-group 106 out 

  1. The change has no effect on the packets being filtered.

  2. All traffic from the 192.168.254.0 LAN to the Internet is permitted.

  3. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.

  4. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can telnet to hosts on the Internet.

image from book
Figure 2-3

image from book

6. 

In a Spanning Tree topology, which of the following would you use to delimit the root port on each non-root switch?

  1. Path cost

  2. Lowest port MAC address

  3. VTP revision number

  4. Highest port priority number

  5. Port priority number and MAC address

image from book

7. 

Which of the following is the reason you configure port security on a switch?

  1. To prevent unauthorized Telnet access to a switch port

  2. To limit the number of Layer 2 broadcasts on a particular switch port

  3. To prevent unauthorized hosts from accessing the LAN

  4. To protect the IP and MAC address of the switch and associated ports

  5. To block unauthorized access to the switch-management interfaces over common TCP ports

image from book

8. 

Choose which IP address you would assign to Host 1 based on the following diagram.

  1. 192.168.1.143/28

  2. 192.168.1.144/28

  3. 192.168.1.145/28

  4. 192.168.1.159/28

  5. 192.168.1.160/28

image from book
Figure 2-4

image from book

9. 

While troubleshooting your internetwork's connection problems, you view Host1's output. Based on the following diagram, which of the following is the problem Host1's output is showing you?

  1. The routing on Router2 is not functioning properly.

  2. An access list is applied to an interface of Router3.

  3. The Fa0/24 interface of Switch1 is down.

  4. The gateway address of Host1 is incorrect or not configured.

image from book
Figure 2-5

image from book

10. 

Look at the following diagram. What's the best way to configure the FastEthernet0/1 ports on the 2950 model switches to achieve connectivity between all machines?

  1. The ports only need to be connected by a crossover cable.

  2. SwitchX(config)# interface
    fastethernet0/1
    SwitchX(config-if)# switchport
    mode trunk

  3. SwitchX(config)# interface
    fastethernet0/1
    SwitchX(config-if)# switchport
    mode access
    SwitchX(config-if)# switchport
    access vlan 1

  4. SwitchX(config)# interface
    fastethernet0/1
    SwitchX(config-if)# switchport
    mode trunk
    SwitchX(config-if)# switchport
    trunk vlan 1
    SwitchX(config-if)# switchport
    trunk vlan 10
    SwitchX(config-if)# switchport
    trunk vlan 20

image from book
Figure 2-6

image from book

11. 

You need the 192.1.1.0/24 address to be subnetted over all three Ethernet networks that are attached to Vine1. Based on the following diagram, which of the following equals the greatest number of host addresses you can get using VLSM on all three networks collectively?

  1. 126

  2. 186

  3. 192

  4. 224

  5. 250

  6. 254

image from book
Figure 2-7

image from book

12. 

You've installed a new router in the Cabernet location, but you can't back up the IOS image of this new router to a TFTP server at the Chardonnay location. Based on the following diagram, why is this happening?

  1. Incorrect default gateway of the TFTP server

  2. Incorrect subnet mask of the TFTP server

  3. Incorrect IP address of the TFTP server

  4. Incorrect IP address on e0 of the Chardonnay router

  5. Incorrect subnet mask on the Cabernet router

image from book
Figure 2-8

image from book

13. 

Which of these situations would cause numerous copies of the same unicast frame to be transmitted over a switched LAN?

  1. During high-traffic periods

  2. After broken links are re-established

  3. When upper-layer protocols require high reliability

  4. In an improperly implemented redundant topology

  5. When a dual ring topology is in use

image from book

14. 

Which command would you use to configure a default route to a destination network that's not listed in the routing table?

  1.  Router(config)# ip default- route 0.0.0.0 255.255.255.255 s0 

  2.  Router(config)# ip route 0.0.0.0 255.255.255.255 s0 

  3.  Router(config)# ip default- route 0.0.0.0 s0 

  4.  Router(config)# ip route 0.0.0.0 0.0.0.0 s0 

  5.  Router(config)# ip route any any e0 

image from book

15. 

Look at the following router output, and choose the answer that best describes what the term dynamic means in the output obtained via the show frame-relay map command:

Code Listing 2-1

image from book
 Vine#show frame-relay map Serial0/0 (up): ip 192.168.10.1     dlci 16 (0x64, 0x1840), dynamic Broadcast, status defined, active 
image from book

  1. The Serial0/0 interface is passing traffic.

  2. The DLCI 16 was dynamically allocated by the router.

  3. The Serial0/0 interface acquired the IP address of 192.168.10.1 from a DHCP server.

  4. The DLCI 16 will be dynamically changed as required to adapt to changes in the Frame Relay cloud.

  5. The mapping between DLCI 16 and the end station IP address 192.168.10.1 was learned through inverse ARP.

image from book

16. 

The Winery Coop now has five branches throughout Napa and Sonoma, and they want to build a WAN to give them a completely meshed environment with a minimum of 512 kbps throughput. They also need the most cost-effective solution. Which WAN service should they choose?

  1. Frame Relay

  2. Leased lines

  3. ISDN BRI

  4. ATM

  5. PPP

image from book

17. 

Look at the following diagram. You're trying to configure the FastEthernet0/0 interfaces on the two interconnected routers, and you've configured Boundary1 without a hitch. But when you move on to configure the interface on the Sales router; you get the error message shown in the figure. Why is this happening?

  1. The address being applied to the Sales interface is a broadcast address.

  2. The Sales router needs to be configured to re-enable the use of subnet 0.

  3. The FastEthernet0/0 interfaces of the two routers are using different Layer 2 protocols.

  4. The FastEthernet0/0 interface on the Border1 router has the bandwidth improperly configured.

image from book
Figure 2-9

image from book

18. 

Based on the following switch output, how would the switch have received the MAC table entry for 0012.7f4b.6882?

Code Listing 2-2

image from book
 Switch#sh mac address-table           Mac Address Table ------------------------------------------- Vlan    Mac Address       Type        Ports ----    -----------       --------    ----- All     0005.dccb.d740    STATIC      CPU All     0100.0ccc.cccc    STATIC      CPU All     0100.0ccc.cccd    STATIC      CPU All     0100.0cdd.dddd    STATIC      CPU   1     000a.f467.9e80    DYNAMIC     Fa0/11   1     0010.7b7f.c2b0    DYNAMIC     Fa0/11   1     0012.7f4b.6880    DYNAMIC     Fa0/11   1     0012.7f4b.6881    DYNAMIC     Fa0/11   1     0012.7f4b.6882    DYNAMIC     Fa0/11   1     0030.80dc.460b    DYNAMIC     Fa0/11   1     0030.9492.a5dd    DYNAMIC     Fa0/2   1     00d0.58ad.05f4    DYNAMIC     Fa0/1 Total Mac Addresses for this criterion: 12 Switch# 
image from book

  1. It was forwarded from an adjacent switch.

  2. It was entered from the configuration mode.

  3. It was acquired by a broadcast from the switch.

  4. It represents a MAC address of the switch.

image from book

19. 

Look at the following diagram. From what you see there, which of the following switches will be elected root bridge, and why?

  1. Switch A, because it has the lowest MAC address

  2. Switch A, because it is the most centrally located switch

  3. Switch B, because it has the highest MAC address

  4. Switch C, because it is the most centrally located switch

  5. Switch C, because it has the lowest priority

  6. Switch D, because it has the highest priority

image from book
Figure 2-10

image from book

20. 

You're adding a new router into an OSPF network, and the networks connected to your new router aren't showing up in the routing tables of the other OSPF routers. You have the subnets 10.10.10.0/24 and 10.11.11.0/24. What will your OSPF configuration be if you want to create one network entry and place both subnets into area 0?

  1.  Router(config)# router ospf 1 Router(config)# network 10.0.0.0 255.0.0.0 area 0 

  2.  Router(config)# router ospf 1011 Router(config)# network 10.0.0.0 255.255.255.0 area 0 

  3.  Router(config)# router ospf 1 Router(config)# network 10.0.0.0 0.0.0.255 area0 

  4.  Router(config)# router ospf 1 Router(config)# network 10.0.0.0 0.0.0.255 area 0 

image from book

21. 

Looking at the following output, what two things would you expect to discover in the line of show ip route output?

     R    192.168.10.32 [120/3] via          192.168.10.17 00:00:23 

  1. The next routing update can be expected in 35 seconds.

  2. The IP address 192.168.10.17 is configured on S0/1.

  3. The IP address 10.10.10.8 is configured on S0/1.

  4. This route is using the default administrative distance.

  5. The 192.168.10.32 network is three hops away from this router.

image from book

22. 

You need to keep the hosts with the subnet address 172.16.24.0/21 in the VLAN from accessing telnet services. Which of the following would provide the missing answers in this command? (Choose three.)

     access-list 110 deny         protocol     172.16.24.0 mask any         eq port 

  1. Port 23

  2. Port 80

  3. Protocol IP

  4. Protocol TCP

  5. Wildcard 0.0.3.255

  6. mask 0.0.7.255

image from book

23. 

Why would you use this command?

     ip route 0.0.0.0 0.0.0.0         serial0/0 

  1. It configures a router to send all packets out interface serial0/0.

  2. It configures a router to block routing updates from being sent out interface serial0/0.

  3. It configures a router as a firewall, blocking all unauthorized packets from exiting serial0/0.

  4. It configures a router to send all packets for unknown destination networks out interface serial0/0.

  5. It configures a router to drop all packets for which the destination network is unknown.

image from book

24. 

Figure 2-11 shows a host connected to a switch port with a crossover cable. Everything is configured as shown in the figure and is correct. Why can't the host communicate with other hosts on the network?

  1. The switch port is a trunk port.

  2. The cable is the wrong type.

  3. The switch has the wrong IP address.

  4. STP has blocked the port.

  5. The switch and host are using the same subnet mask.

image from book
Figure 2-11

image from book

25. 

Looking at the following diagram, why did VLAN connectivity issues begin to happen right after SwitchB was added to the network?

  1. Both switches are in server mode in the same domain.

  2. The revision number of SwitchB was higher than the revision number of SwitchA.

  3. SwitchA was not rebooted prior to adding SwitchB to the network.

  4. V2-mode is not enabled.

  5. VTP pruning is not activated, so the new paths in the network have not been recalculated.

image from book

SwitchA# show vtp status

 

SwitchB# show vtp status

 

VTP version

: 2

VTP version

: 2

Configuration Revision

: 1

Configuration Revision

: 7

Maximum VLANs supported locally

: 64

Maximum VLANs supported locally

: 64

Number of existing VLANs

: 8

Number of existing VLANs

: 4

VTP Operating Mode

: Server

VTP Operating Mode

: Server

VTP Domain Name

: cisco

VTP Domain Name

: cisco

VTP Pruning Mode

: disabled

VTP Pruning Mode

: disabled

V2 Mode

: disabled

VTP V2 Mode

: disabled

image from book

Figure 2-12

image from book

26. 

You're faced with reconfiguring a Catalyst 2950. Pick three steps that will guarantee the old configuration is erased.

  1. Erase flash.

  2. Restart the switch.

  3. Delete the VLAN database.

  4. Erase the running configuration.

  5. Erase the startup configuration.

  6. Modify the configuration register.

image from book

27. 

If you were implementing VLSM on a network with a single Class C IP address, which subnet mask would you use to create the most effective point-to-point serial link?

  1. 255.255.255.0

  2. 255.255.255.240

  3. 255.255.255.248

  4. 255.255.255.252

  5. 255.255.255.254

image from book

28. 

You've subnetted your client's internetwork using 29 bits. You now need to configure an extended access list to control access to a whole subnetwork. To achieve this, which of the following wildcard masks should you use?

  1. 255.255.255.224

  2. 255.255.255.248

  3. 0.0.0.224

  4. 0.0.0.8

  5. 0.0.0.7

  6. 0.0.0.3

image from book

29. 

Look at following output, and pick the option that solves the problem of why Serial0/0 won't respond to a ping from a machine on the FastEthernet0/0 LAN.

Code Listing 2-3

image from book
 Napa#sh ip interface brief Interface   IP-Address    OK? Method  Status            Protocol Ethernet0/0 192.168.10.1  YES NVRAM   up                up Serial0/0   192.168.15.1  YES NVRAM   administratively  down                                       down Serial0/1   192.168.16.1  YES NVRAM   up                up Serial0/2   unassigned    YES NVRAM   administratively  down                                       down Router# 
image from book

  1. Enable the Serial0/0 interface.

  2. Correct the IP address for Serial0/0.

  3. Correct the IP address for FastEthernet0/0.

  4. Change the encapsulation type on Serial0/0.

  5. Enable autoconfiguration on the Serial0/0 interface.

image from book

30. 

You've configured a router three different times. You tested each configuration and successfully saved each of them to NVRAM using the copy running-config startup-config command. Then, you typed in the reload command. But now, when the router restarts, it looks as though it's got the default blank configuration. What's causing this?

  1. The boost system commands were left out of the configuration.

  2. The NVRAM is corrupted.

  3. The configuration register setting is incorrect.

  4. The upgraded IOS just loaded is not compatible with the hardware.

  5. The upgraded configuration is not compatible with the hardware platform.

image from book

31. 

Look at the following diagram. Host A sends an ARP request for the MAC address of Host B, and the network's performance practically grinds to a halt. The switches reveal a huge number of broadcast frames. What's causing this?

  1. The portfast feature is not enabled on all switch ports.

  2. The PCs are in two different VLANs.

  3. Spanning Tree Protocol is not running on the switches.

  4. Host B is down and is not able to respond to the request.

  5. The VTP versions running on the two switches do not match.

image from book
Figure 2-13

image from book

32. 

Why is a default route important?

  1. It is a route to be used when the routing protocol fails.

  2. It is a route configured by an ISP that sends traffic into a corporate network.

  3. It is a route used when a packet is destined for a remote network that is not listed in the routing table.

  4. It is a route manually configured for a specific remote network for which a routing protocol is not configured.

  5. It is used to send traffic to a stub network.

image from book

33. 

Based on the following diagram, choose two options that describe ports that can safely be configured with PortFast:

  1. Switch1 - port Fa1/2

  2. Switch2 - port Fa1/2

  3. Switch1 - port Fa1/3

  4. Switch2 - port Fa1/3

  5. Switch1 - port Fa1/1

  6. Switch2 - port Fa1/1

image from book
Figure 2-14

image from book

34. 

The steps in PPP session establishment occur in a specific order. Choose the correct order from these alternatives:

  1. optional authentication phase, link establishment phase, network layer protocol phase

  2. network layer protocol phase, link establishment phase, optional authentication phase

  3. network layer protocol phase, optional authentication phase, link establishment phase

  4. link establishment phase, network layer protocol phase, optional authentication phase

  5. link establishment phase, optional authentication phase, network layer protocol phase

  6. optional authentication phase, network layer protocol phase, link establishment phase

image from book

35. 

Look at the following diagram. You've configured this internetwork as shown, and it appears that routing has been configured improperly. Of the following configuration options, which one will give hosts on the Branch LAN access to resources on the Corp LAN with the most efficient use of bandwidth and the least burden on router processing?

  1.  Corp(config)# ip route 192.168. 1.0 255.255.255.0 192.168.2.5 Branch(config)# ip route 172.16. 25.0 255.255.255.0 192.168.2.6 

  2.  Corp(config)# router rip Corp(config-router)# network 192.168.2.0 Corp(config-router)# network 172.16.0.0 Branch(config)# router rip Branch (config-router)# network 192.168.1.0 Branch (config-router)# network 192.168.2.0 

  3.  Corp(config)# router eigrp 56 Corp(config-router)# network 192.168.2.4 Corp(config-router)# network 172.16.25.0 Branch(config)# router eigrp 56 Branch (config-router)# network 192.168.1.0 Branch (config-router)# network 192.168.2.4 

  4.  Corp(config)# router ospf 1 Corp(config-router)# network 192.168.2.4 0.0.0.3 area 0 Corp(config-router)# network 172.16.25.0 0.0.0.255 area 0 Branch(config)# router ospf 1 Branch (config-router)# network 192.168.1.0 0.0.0.255 area 0 Branch (config-router)# network 192.168.2.4 0.0.0.3 area 0 

image from book
Figure 2-15

image from book

36. 

The local router's routing has been enabled with these commands:

Code Listing 2-4

image from book
 Local(config)# ip route 0.0.0.0 0.0.0.0 192.168.10.1 Local(config)# ip route 172.16.0.0 255.255.255.0 192.168.20.2 Local(config)# ip route 172.16.0.0 255.255.0.0 192.168.30.3 
image from book

Match the destination IP address in the left column to the proper next hop address on the right:

Table 2-1
Open table as spreadsheet

172.16.10.10

Next hop 192.168.10.1

172.16.0.33

Next hop 192.168.20.2

172.44.98.1

Next hop 192.168.30.3

172.16.41.2

 

172.16.0.23

 

172.2.5.6

 

image from book

37. 

Choose two of the following options that accurately describe the tasks that the OSPF Hello protocol performs:

  1. It provides dynamic neighbor discovery.

  2. It detects unreachable neighbors at 90-second intervals.

  3. It maintains neighbor relationships.

  4. It negotiates correctness parameters between neighboring interfaces.

  5. It uses timers to elect the router with the fastest links as the designated router.

image from book

38. 

Which type of EIGRP route entry describes a feasible successor?

  1. A backup route, stored in the routing table

  2. A primary route, stored in the routing table

  3. A backup route, stored in the topology table

  4. A primary route, stored in the topology table

image from book

39. 

What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?

  1. The frame is dropped.

  2. The frame is addressed with a broadcast MAC address and sent out all ports.

  3. The frame is sent out all ports except the receiving port.

  4. An ARP request is sent out all ports except the receiving port.

  5. A destination unreachable message is sent back to the source address.

image from book

40. 

You want the phrase "Unauthorized access prohibited!" to show up before the login prompt when a Telnet session to a router is attempted. Choose the command that you would use to achieve this.

  1.  login banner x Unauthorized access prohibited! x 

  2.  banner exec y Unauthorized access prohibited! y 

  3.  banner motd x Unauthorized access prohibited! x 

  4.  login message "Unauthorized access prohibited!" 

  5.  vty motd "Unauthorized access prohibited!" 

  6.  vty 0 4 banner "Unauthorized access prohibited!" 

image from book

41. 

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two.)

  1. ARP

  2. CDP

  3. DHCP

  4. DNS

  5. ICMP

image from book

42. 

You've created the following access list and applied it to an interface. Which of the following are denied based on the access list? (Choose two.)

Code Listing 2-5

image from book
 access-list 107 deny tcp 207.16.12.0 0.0.3.255 any eq http access-list 107 permit ip any any 
image from book

  1. Source IP: 207.16.32.14, destination application: http

  2. Source IP: 207.16.15.9, destination port: 23

  3. Source IP: 207.16.14.7, destination port: 80

  4. Source IP: 207.16.13.14, destination application: http

  5. Source IP: 207.16.16.14, destination port: 53

image from book

43. 

Look at both the topology and configuration illustrated in the following diagram. Based on the fact that the router is configured to allow communication between the VLANs, choose the three IOS commands you need to configure switch port fa0/1 and establish a link with router R1 using the IEEE standard protocol:

  1.  Switch(config)# interface fastethernet 0/1 

  2.  Switch(config-if)# switchport mode access 

  3.  Switch(config-if)# switchport mode trunk 

  4.  Switch(config-if)# switchport access vlan1 

  5.  Switch(config-if)# switchport trunk encapsulation isl 

  6.  Switch(config-if)# switchport trunk encapsulation dot1q 

image from book
Figure 2-16

image from book

44. 

Look at the following diagram. You want to use NAT in that network, so choose the two commands you can use to apply NAT configuration to the correct interfaces:

  1.  R1(config)# interface serial0/1 R1(config-if)# ip nat inside 

  2.  R1(config)# interface serial0/1 R1(config-if)# ip nat outside 

  3.  R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside 

  4.  R1(config)# interface fastethernet0/0 R1(config-if)# ip nat outside 

  5.  R1(config)# interface serial0/1 R1(config-if)# ip nat outside source pool 200.2.2.18 255.255.255.252 

  6.  R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0 

image from book
Figure 2-17

image from book

45. 

Match the cable type in the left column to the task for which it's best used, in the right column:

Table 2-2
Open table as spreadsheet

crossover

switch access port to router

null modem

switch to switch

straight-through

PC COM port to switch

rollover

9–25 pin serial

image from book

46. 

Look at the following diagram. You want Host A to communicate with Host B, but the e0 interface on router 3 is down. Choose the two events that will occur:

  1. Router 3 will use ICMP to inform Host A that Host B cannot be reached.

  2. Router 3 will use ICMP to inform Router 2 that Host B cannot be reached.

  3. Router 3 will use ICMP to inform Host A, Router 1, and Router 2 that Host B cannot be reached.

  4. Router 3 will send a Destination Unreachable message type.

  5. Router 3 will send a Router Selection message type.

  6. Router 3 will send a Source Quench message type.

image from book
Figure 2-18

image from book

47. 

You view the code listing below. What does the 128 refer to in the router output?

Code Listing 2-6

image from book

image from book

image from book

  1. OSPF cost

  2. OSPF priority

  3. OSPF Hop count

  4. OSPF process ID

  5. OSPF administrative distance

image from book

48. 

Choose three of the following options that accurately describe OSPF routing areas:

  1. Each OSPF area requires a loopback interface to be configured.

  2. Areas may be assigned any number from 0 to 65535.

  3. Area 0 is called the backbone area.

  4. Hierarchical OSPF networks do not require multiple areas.

  5. Multiple OSPF areas must connect to area 0.

  6. Single-area OSPF networks must be configured in area 1.

image from book

49. 

Choose the three services that use TCP:

  1. DHCP

  2. SMTP

  3. SNMP

  4. FTP

  5. HTTP

  6. TFTP

image from book

50. 

By analyzing the following diagram, you're trying to understand how the Acme Corporation works. You can see that the server in VLAN4 supplies all resources required by the user hosts in the other VLANs. Choose the three interfaces that are access ports:

  1. Switch1 - Fa0/2

  2. Switch1 - Fa0/9

  3. Switch2 - Fa0/3

  4. Switch2 - Fa0/4

  5. Switch2 - Fa0/8

  6. Router - Fa1/0

image from book
Figure 2-19

image from book

51. 

What is the subnetwork number of a host with an IP address of 172.16.210.0/22?

  1. 172.16.42.0

  2. 172.16.107.0

  3. 172.16.208.0

  4. 172.16.252.0

  5. 172.16.254.0

image from book

52. 

When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured?

  1. Frame Relay encapsulation on the physical interface

  2. Local DLCI on each subinterface

  3. IP address on the physical interface

  4. Subinterface type as point-to-point

image from book

53. 

What is the purpose of the OSPF router ID in a DR/BDR election?

  1. It is used with the OSPF priority values to determine which OSPF router will become the DR or BDR in a point-to-point network.

  2. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router.

  3. It is used with the OSPF priority values to determine which router will become the DR or BDR in a multi-access network.

  4. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers.

image from book

54. 

Which of the following is true concerning Frame Relay multipoint subinterfaces?

  1. An IP address is required on the physical interface of the central router.

  2. All routers are required to be fully meshed.

  3. All routers must be in the same subnet to forward routing updates and broadcasts.

  4. Multipoint is the default configuration for Frame Relay subinterfaces.

image from book

55. 

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

  1. BPDU

  2. Port security

  3. RSTP

  4. STP

  5. VTP

  6. Blocking mode

image from book

Answers

1. 

A

Explanation:

A. Administrative Distance (AD) is the value a router uses to differentiate between routing information. Each routing protocol is given a value; a static route has the best AD with 1 (the lower the better; only a directly connected network is better with 0).

2. 

C

Explanation:

C. EIGRP (as well as IGRP) uses an autonomous system (AS) number in the routing configuration. As long as you use the same number on all your routers, they will exchange routing information. If they do not use the same AS number, they will not exchange information. In addition, the network statements are configured in a classful manner, which means all default host bits are off. For example, if you have a subnet of 10.10.16.0/28, the network statement under EIGRP would be 10.0.0.0.

3. 

B, C, F

Explanation:

B, C, F. The network shown in the figure has two VLANs configured; for the hosts in each VLAN to communicate, the router must be configured with subinterfaces, one for each VLAN. The block size in use is 128, so the mask is a /25 or 255.255.255.128.

4. 

A, B, F

Explanation:

A, B, F. RIPv1 is a classful routing protocols, which means all masks on every host in the network must be exactly the same. RIPv1 send broadcasts, and RIPv2 uses multicast: 224.0.0.9. RIP has many loop-avoidance mechanisms, some of which are split-horizon and hold-down timers. Others include route poison, setting infinity, and triggered updates. RIP v2 supports authentication as well; v1 does not.

5. 

A

Explanation:

A. The lines added to the ACL will be placed at the end of the access list, after the permit ip any any command line, which has no effect on denying packets.

6. 

A

Explanation:

A. Path cost is the first value that is used to determine which port should be blocking or forwarding. If path cost does not differentiate, then bridge id and port id can be used.

7. 

C

Explanation:

C. Port security can prevent unauthorized hosts from accessing the LAN. It can be configured with a maximum number of MAC addresses per port, or to allow only specifically configured MAC access.

8. 

C

Explanation:

C. The router is configured with the 192.168.1.158/28 address, which is the last valid host ID in the 192.168.1.144 subnet. The broadcast address for the subnet is 192.168.1.159, so the only valid host is 192.168.1.145.

9. 

A

Explanation:

A. Host1 can ping the default gateway, and traceroute does get to Router2, however, the packets cannot get past Router2, so this indicates a routing problem with Router2.

10. 

B

Explanation:

B. The cable between the switches needs to be a crossover cable, but they also need to be configured as a trunk port because multiple VLANs are configured on the switches.

11. 

E

Explanation:

E. Since you can VLSM this network, you can use one network of /25 and two /26 networks. That is 126 hosts and two 62 hosts. Add them up and that is 250 hosts.

12. 

B

Explanation:

B. The subnet mask on the TFTP is wrong. It should be 255.255.255.240, which is a /28.

13. 

D

Explanation:

D. If you have switches connected with dual links, and STP is not running, then you will have broadcast storms, multiple frame copies, and MAC table instability.

14. 

D

Explanation:

D. The ip route command can be used for a couple of different reasons: to set a static route to a network, and to set a default route. Here, a default route is being set. The syntax for the command includes the ip route command followed by the network and subnet mask being added. In this case, the fields are filled with zeros to indicate any network or default. The last field is the next hop address where the router must send packets to deliver them to the listed network.

15. 

E

Explanation:

E. Inverse ARP is the automatic process of finding a DLCI from a known IP address. If this function is not available, then the mapping of the DLCI to the IP address must be done manually through the frame-relay map command.

16. 

A

Explanation:

A. The bandwidth requirement and the fact that it is to be cost effective make Frame Relay the only real choice.

17. 

B

Explanation:

B. The router will not accept the IP address and mask without the ip subnet-zero command configured. This command allows the router to use the 0 subnet of a network that has been subnetted.

18. 

A

Explanation:

A. The best answer is that the MAC address was forwarded from another switch, because port Fa0/11 has many MAC addresses associated with it.

19. 

A

Explanation:

A. SW-A will become the root bridge because it has the lowest bridge ID, which is a combination of MAC address and priority. In this case, lowest MAC address becomes the root. Even though SW-C says it has a priority of 1; that is not possible. The lowest priority that can be set on a switch is 4096.

20. 

D

Explanation:

D. Although answer C is close to being correct, only answer D is correct, because you must have a space after the command area before listing the associated area.

21. 

D, E

Explanation:

D, E. The router output is a RIP entry in a routing table. The default administrative distance of RIP is 120, and the 120/3 means that the default AD of 120 is being used and the network in the table is three hops away.

22. 

A, D, F

Explanation:

A, D, F. To answer this question, you must know what a /21 is. A /21 is 255.255.248.0, which is a block size of 8, wildcard of 7, in the third octet (wildcards are always one less then the block size). Telnet uses TCP at the Transport layer and is well-known port number 23.

23. 

D

Explanation:

D. The ip route command with all zeros is a default route. Any traffic without a specific route will be sent out the interface specified at the end of the command. A next hop can also be used with the command instead of the exit interface.

24. 

B

Explanation:

B. Host C's address is on the wrong network. It is on the 13 network, whereas its current IP is on the 14 network.

25. 

B

Explanation:

B. If the revision number of the new switch is higher, the other switches will begin taking the new switch's update, which could cause connectivity problems.

26. 

B, C, E

Explanation:

B, C, E. A typical router can be set back to factory defaults by erasing the startup-config in NVRAM and then reloading the device. However, a switch keeps the VLAN database in Flash, and that must also be deleted on a switch to set it back to factory defaults.

27. 

D

Explanation:

D. A /30 or 255.255.255.252 provides only two hosts, regardless of the class of address, which is perfect for a point-to-point link.

28. 

E

Explanation:

E. First, you must know what a /29 is. The mask is 255.255.255.248, which means the block size is 8 in the fourth octet. A wildcard is always one less than the block size, so the answer is 0.0.0.7.

29. 

A

Explanation:

A. If an interface is administratively down, this means the interface is not enabled and must be enabled with the no shutdown command. All interfaces on a router are shut down by default

30. 

C

Explanation:

C. The default configuration register is set to 0x2102. If this is changed, then the router will not boot the default setting of loading the IOS from flash and the configuration from NVRAM.

31. 

C

Explanation:

C. If STP is disabled on the switches, then broadcast storms, multiple frame copies, and MAC address table instability problems will occur.

32. 

C

Explanation:

C. The ip route command can be used for a couple of different reasons: to set a static route to a network, and to set a default route. The default route allows IP to send packets to remote networks that are not specifically listed in the routing table.

33. 

C, D

Explanation:

C, D. PortFast is a feature that allows a port on a switch to transition directly to forwarding. Only ports that have end stations and are not connected to other switches should be configured like this.

34. 

E

Explanation:

E. The steps included in a PPP session establishment are link establishment, optional authentication, and network layer protocol.

35. 

A

Explanation:

A. By using static routes instead of a routing protocol configured on each router, processing will be minimized. However, this can be done because the network is small. In a larger network, static routes would be difficult to maintain.

36. 

Explanation:

Table 2-3
Open table as spreadsheet

Next hop 192.168.10.1

 
  • 172.44.98.1

 
  • 172.2.5.6

 

Next hop 192.168.20.2

 
  • 172.16.0.33

 
  • 172.16.0.23

 

Next hop 192.168.30.3

 
  • 172.16.10.10

 
  • 172.16.41.2

 

This is a hard question, no doubt about that. The top route is a default route, so any destination IP address that doesn't match the second and third line will be sent to 192.168.10.1. The difference between the second and third lines is the subnet mask. The second static route has a /24 mask, which makes the third octet the subnet address. Because the third static route has a /16 mask, the third octet is not part of the subnet. Once you determine that the third octet has to be a 0 to match the second static route, the rest of the answers fall into place.

37. 

A, C

Explanation:

A, C. A router running a link-state protocol uses hello packets to dynamically find neighbors and form adjacencies. Once an adjacency has been formed, it uses link state advertisement (LSA) packets to exchange topology information and updates when changes occur.

38. 

C

Explanation:

C. A feasible successor is stored in EIGRP's topology table, which holds all links known in the autonomous system. A successor route is copied from the topology table and placed in the routing table, which is then used by IP to route packets. The feasible successor is the backup route to the successor route.

39. 

C

Explanation:

C. A LAN switch uses MAC addresses to segment the network into collision domains. The switch looks at the source MAC address of each frame received on a port and places this in a forward/filter table, also called the content addressable memory (CAM) table. If a frame is received and the destination hardware (MAC) address is not found in the CAM table, the frame will be sent out all ports except the port it was received on.

40. 

C

Explanation:

C. The banner motd command means "message of the day." This is an old Unix command, but it is still useful on routers to provide messages to users logging in either via the console port or through telnet to a router or switch.

41. 

A, E

Explanation:

A, E. The ping program uses ICMP echo request and ICMP echo reply packets to find out if a host is "alive" on the network. Of course, ARP is used to resolve IP-to-hardware addresses for sending frames on a local network.

42. 

C, D

Explanation:

C, D. The wildcard in the mask is the key to the answer. 0.0.3.255 means the third octet has a wildcard of 4. The 12 in the third octet means that the access list will match 12, 13, 14, and 15, which make C and D the answers. B is wrong because the port number is wrong.

43. 

A, C, F

Explanation:

A, C, F. To configure a switch port to communicate with a router and share VLAN information, first choose the interface; then set the encapsulation type, in this case 802.1q; and then set the port to trunk. That is the correct order of configuration.

44. 

B, C

Explanation:

B, C. This is a pretty simple question. It ask you how to configure the interfaces, not the actual NAT commands. The interface commands are "ip nat inside" and "ip nat outside" from interface configuration mode.

45. 

Explanation:

Table 2-4
Open table as spreadsheet

crossover

switch to switch

straight-through

switch access port to router

rollover

PC COM port to switch

A switch port (called an access port if it is a member of only one VLAN) directly attached to a router needs a straight-through cable. However, if you have a switch-to-switch connection, you need a crossover cable. A cable from a COM port connecting to a router or switch console port would use a rolled cable.

46. 

A, D

Explanation:

A, D. If the interface e0 of Router 3 goes down, Router 4 will send a destination unreachable message type to the transmitting host, in this cast Host A.

47. 

A

Explanation:

A. OSPF uses only bandwidth to determine the best path to a remote network. By calculating the entire path, OSPF determines the cost of the path, which is shown in the router output.

48. 

C, D, E

Explanation:

C, D, E. When configuring OSPF, you must have an area 0, which is also called the backbone area. This area may be assigned any number from 0 to 2.4 billion. You must have an area 0, according to the CCNA objectives, but you don't have to have multiple areas. All routers can be in area 0.

49. 

B, D, E

Explanation:

B, D, E. SMTP, FTP, and HTTP are Application layer protocols that use TCP at the Transport layer. DHCP, SNMP, and TFTP all use UDP at the Transport layer.

50. 

A, C, D

Explanation:

A, C, D. There are two types of ports on a switch: an access port and a trunk port. A switch port cannot be both types of ports. An access port means the switch port is part of one VLAN and is typically used for a host and/or phone. A trunk port is used to connect to other switches and to routers.

51. 

C

Explanation:

C. To answer this question, you must know what a /22 is. A /22 is 255.255.252.0. This is a block size of 4 in the third octet. You count in increments of 4 until you pass 210. The subnet is 208.0, and the broadcast address is 172.16.211.255.

52. 

C

Explanation:

C. When creating subinterfaces on a router, an IP address is not configured under the physical interface of the router. IP addresses can only be configured under the logical (subinterfaces) interfaces, or the network will not function.

53. 

C

Explanation:

C. When OSPF is configured on a router, a router identification (RID) is created by using the highest IP address on any active interface at the moment of OSPF startup. The RID can be changed by creating a loopback interface, also called a logical interface. This RID is used by routers to determine which router will be a designated router or backup designated router in a broadcast or nonbroadcast multi-access network.

54. 

C

Explanation:

C. Unlike Frame Relay point-to-point subinterfaces, multipoint subinterfaces use one subnet for all PVC connections. Point-to-point uses one subnet for each PVC.

55. 

B

Explanation:

B. Port security can help you manage your switched network by allowing you to filter by MAC address and controlling the number of MAC addresses allowed on each port.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net