CCNA-Practice Test 3


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

You have been asked to allow only certain MAC addresses to attach to the switch. Which of the following should you enable?

  1. BDPU Guard

  2. port security

  3. QoS

  4. STP

  5. VTP

b explanation: b. port security allows you to create filters based on mac addresses.

2. 

Look at the following diagram. Assume that ports 1 through 3 are designated to VLAN1 and ports 4 through 6 are designated to VLAN2 on each switch. Further, assume that your switches connect via a trunk link. Pick the three events that confirm that both your VLAN and trunk are working correctly.

  1. Host 1-1 can ping Host 1-2.

  2. Host 1-1 can ping Host 4-2.

  3. Host 1-1 cannot ping Host 1-2.

  4. Host 4-1 cannot ping Host 1-2.

  5. Host 4-1 can ping Host 4-2.

image from book
Figure 3-1

image from book

3. 

Look at the following diagram. You can see the partial output from four switches. Choose the switch that acts as the spanning-tree root bridge for a network that's limited to the following four devices.

  1. Vail

  2. Aspen

  3. Breckenridge

  4. Keystone

image from book

 Vail#sh spanning-tree VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 32768 Address    0005.dccb.d740 Hello Time 2 sec Max Age 20 sec  Forward Delay 15 sec Aspen#sh spanning-tree VLAN0001  Spanning tree enabled protocol ieee Root ID Priority 16384 Address     0005.dccb.d739 Hello Time 2 sec Max Age 20 sec   Forward Delay 15 sec Breckenridge#sh spanning-tree VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 8192 Address    0005.dccb.d738 Hello Time 2 sec Max Age 20 sec  Forward Delay 15 sec Keystone#sh spanning-tree VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 4096 Address    0005.dccb.d737 Hello Time 2 sec Max Age 20 sec  Forward Delay 15 sec 

image from book

Figure 3-2

image from book

4. 

From the following output, choose the two possible causes for status "Serial0/0 is down".

Code Listing 3-1

image from book
 Corp#show interface s0/0 Serial0/0 is down, line protocol is down   Hardware is PowerQUICC Serial Internet address is 10.0.10.2/24   MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely     255/255, load 4/255   Encapsulation HDLC, loopback not set, Keepalive set     (10 sec) [output cut] 
image from book

  1. Layer 1 problem

  2. Incorrect bandwidth setting

  3. Protocol mismatch

  4. Incorrect cable

  5. Incorrect IP address

image from book

5. 

Choose the two of the following that best describe the process identifier used to run OSPF on a router.

  1. It's locally significant.

  2. It's globally significant.

  3. It's needed to identify a unique instance of an OSPF database.

  4. It's an optional parameter required only if multiple OSPF processes are running on the router.

  5. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

image from book

6. 

Over a Telnet session, you find that you can't connect to Switch1, but you can ping the router interface Fa0/0 via the host machines attached to the switch. Both the router and Switch1 are configured properly. Looking at the following diagram, choose one set of the following commands you should use on Switch1 to solve the problem.

  1.  Switch1(config)# line con0 Switch1(config-line)# password cisco Switch1(config-line)# login 

  2.  Switch1(config)# interface fa0/1 Switch1(config-if)# ip address 192.168.24.3 255.255.255.0 

  3.  Switch1(config)# ip default- gateway 192.168.24.1 

  4.  Switch1(config)# interface fa0/1 Switch1(config-if)#  duplex full Switch1(config-if)#   speed 100 

  5.  Switch1(config)# interface fa0/1 Switch1(config-if)# switchport mode trunk 

image from book
Figure 3-3

image from book

7. 

The Sharper Edge chain of ski shops wants to re-design its network that connects its three locations. The administrator gave the networking team 192.168.128.0 to use for addressing the entire network. After subnetting the address, the team is ready to assign the addresses. The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time conserve unused addresses for future growth. With those goals in mind, match the host addresses on the left to the correct router interface.

192.168.128.184/26

Aspen 56 hosts Fa0/0

192.168.128.127/25

Breckenridge 2 hosts S0/1

192.168.128.249/29

Copper 6 hosts Fa0/0

192.168.128.241/30

Keystone 26 hosts Fa0/0

192.168.128.240/30

 

192.168.128.196/27

 
Open table as spreadsheet

image from book

8. 

When routing a packet, which functions do routers perform? (Choose two.)

  1. Packet switching

  2. Destination host addressing

  3. Path selection

  4. VLAN membership assignment

  5. ARP request forwarding

image from book

9. 

Which of the following adds a default route to a router?

  1.  router(config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1 

  2.  router(config)# ip default- route 10.1.1.0 

  3.  router(config)# ip default- gateway 10.1.1.0 

  4.  router(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 

image from book

10. 

When a router is connected to a Frame Relay WAN link using a serial DTE interface, how can the interface clock rate be established?

  1. It is supplied by the CSU/DSU.

  2. It is supplied by the far-end router.

  3. It is determined by the clock rate command.

  4. It is supplied by layer 1 bit stream timing.

image from book

11. 

Your switched network is running Spanning Tree Protocol. Choose from the following statements the one that describes when it's completely converged.

  1. When all switches have the same BID as the root switch

  2. When all switches have received the MAC address of each neighboring switch

  3. When every enabled switch port has been assigned a unique identifier

  4. When every operating switch port is in either the blocking or forwarding state

  5. When all switches are in client, server, or transparent mode

image from book

12. 

Look at the following diagram. Choose the best summarization R1 can employ to display its networks to R2.

  1. 172.1.0.0/22

  2. 172.1.0.0/21

  3. 172.1.4.0/22

  4. 172.1.4.0/24

    172.1.5.0/24

    172.1.6.0/24

    172.1.7.0/24

  5. 172.1.4.0/25

    172.1.4.128/25

    172.1.5.0/24

    172.1.6.0/24

    172.1.7.0/24

image from book
Figure 3-4

image from book

13. 

When dealing with Frame Relay multipoint subinterfaces, which statement best describes what's true about them?

  1. An IP address is required on the physical interface of the central router.

  2. All routers are required to be fully meshed.

  3. All routers must be in the same subnet to forward routing updates and broadcasts.

  4. Multipoint is the default configuration for Frame Relay subinterfaces.

image from book

14. 

Look at the following diagram. Which subnet address you would use for Network A?

  1. 192.168.35.32/27

  2. 192.168.35.64/26

  3. 192.168.35.96/27

  4. 192.168.35.128/26

  5. 192.168.35.192/27

image from book
Figure 3-5

image from book

15. 

What is the default administrative distance for OSPF?

  1. 90

  2. 100

  3. 110

  4. 120

  5. 130

  6. 170

c explanation: c. the default administrative distance for ospf is 110.

16. 

All of your OSPF routers in one location are configured with the same priority value. Without a loopback interface, which of the following is the value a router will use for the OSPF router ID?

  1. The IP address of the first Fast Ethernet interface

  2. The IP address of the console management interface

  3. The highest IP address among its active interfaces

  4. The lowest IP address among its active interfaces

  5. The priority value until a loopback interface is configured

image from book

17. 

Look at the following diagram. You need Host A to send data to Host B. Choose the three true statements that describe how Router1 will deal with a data frame it receives from Host A.

  1. Router1 will strip off the source MAC address and replace it with the MAC address on the forwarding Fast Ethernet interface.

  2. Router1 will strip off the source IP address and replace it with the IP address on the forwarding Fast Ethernet interface.

  3. Router1 will strip off the destination MAC address and replace it with the MAC address of Host B.

  4. Router1 will strip off the destination IP address and replace it with the IP address of Host B.

  5. Router1 will forward the data frame out interface Fast Ethernet 0/1.

  6. Router1 will forward the data frame out interface Fast Ethernet 0/2.

image from book
Figure 3-6

image from book

18. 

Which two reasons describe why you would encapsulate an ISDN link with PPP instead of HDLC?

  1. PPP is consistently implemented among different equipment vendors.

  2. PPP runs faster and more efficiently than HDLC on circuit-switched ISDN links.

  3. PPP authentication prevents unauthorized callers from establishing an ISDN circuit.

  4. PPP is easier to configure and maintain than HDLC.

  5. PPP can be routed across public facilities, whereas HDLC is not routable in circuit-switched networks.

image from book

19. 

You've configured a Cisco router and entered the copy running-config startup-config command, but when the router is power cycled, it gives you the prompt, "Would you like to enter the initial configuration dialog? [yes/no]:" Why is it doing this?

  1. There is an error in the router DRAM.

  2. The IOS image is corrupt.

  3. The configuration register is set to 0x2142.

  4. The TFTP server that contains the router configuration file is unreachable.

  5. A boot system configuration command has placed the router into setup mode.

image from book

20. 

Look at the following diagram. Assume that every router is configured with the ip subnet-zero command. Choose the two network addresses you would use for Link A and Network A.

  1. Network A - 172.16.3.48/26

  2. Network A - 172.16.3.128/25

  3. Network A - 172.16.3.192/26

  4. Link A - 172.16.3.0/30

  5. Link A - 172.16.3.40/30

  6. Link A - 172.16.3.112/30

image from book
Figure 3-7

image from book

21. 

Which two of the following are reasons a network administrator would use access lists?

  1. To control VTY access into a router

  2. To control broadcast traffic through a router

  3. To filter traffic as it passes through a router

  4. To filter traffic that originates from a router

  5. To replace passwords as a line of defense against security incursions

image from book

22. 

Which of the following describes the type of physical network a default Frame Relay WAN is?

  1. Point-to-point

  2. Broadcast multi-access

  3. Nonbroadcast multi-access

  4. Nonbroadcast multipoint

  5. Broadcast point-to-multipoint

c explanation: c. frame relay is a nonbroadcast, multi-access network.

23. 

You can't telnet to a router at IP address 203.125.12.1 from a machine with IP address 203.125.12.23, and you think it's a problem with your protocol stack. What can you do that has the best chance of confirming your suspicion?

  1. ping 127.0.0.0

  2. ping 203.125.12.1

  3. telnet 127.0.0.1

  4. ping 127.0.0.1

  5. tracert 203.125.12.1

image from book

24. 

You've subnetted a Class C network address with a /27 mask. Choose the address that would be the broadcast address for one of your new subnets.

  1. 201.57.78.33

  2. 201.57.78.64

  3. 201.57.78.87

  4. 201.57.78.97

  5. 201.57.78.159

  6. 201.57.78.254

e explanation: e. this is the broadcast address for the 201.57.78.128 network.

25. 

How will spanning tree influence the functioning of your network devices if you have redundant links between switches?

  1. Spanning tree blocks client ports that suffer from excessive errors.

  2. Spanning tree learns client MAC addresses and assigns them to switch ports.

  3. Spanning tree allows these switches to load-balance across the redundant links to increase network throughput.

  4. Spanning tree learns which of the redundant links should be blocked.

  5. Spanning tree automatically configures the switches with VLAN information.

d explanation: d. spanning tree discovers redundant links and places them in blocking mode.

26. 

Choose the command you would use to view all EIGRP-feasible successor routes known to Router 1.

  1. Router# show ip eigrp routes*

  2. Router# show ip eigrp summary

  3. Router# show ip eigrp topology

  4. Router# show ip eigrp
    adjacencies

  5. Router# show ip eigrp
    neighbors detail

c explanation: c. the eigrp topology table shows feasible successors.

27. 

You have two switches, each with a VLAN configured on the switch: one with VLAN 2 and one with VLAN 3. What do you need to use to enable communication between hosts in VLAN 2 and VLAN 3?

  1. CSU/DSU connected to the switches with crossover cables

  2. Router connected to the switches with straight-through cables

  3. Router connected to the switches with crossover cables

  4. Straight-through cable only

  5. Crossover cable only

image from book

28. 

By looking at the following diagram, you can see that Host A and Host B are communicating. Which of the following describes how data will be addressed leaving Host A?

  1. Source MAC 000A.8A47.E612

    Destination MAC 000B.DC04.12F4

    Source IP 192.168.23.4

    Destination IP 192.168.23.1

  2. Source MAC 000A.8A47.E612

    Destination MAC 0010.7BE7.FAEF

    Source IP 192.168.23.4

    Destination IP 192.168.127.7

  3. Source MAC 000A.8A47.E612

    Destination MAC 000B.DC04.12F4

    Source IP 192.168.23.4

    Destination IP 192.168.127.7

  4. Source MAC 000A.8A47.E612

    Destination MAC 0010.7BE7.FAEF

    Source IP 192.168.23.4

    Destination IP 192.168.23.1

image from book
Figure 3-8

image from book

29. 

Match the command sequence on the left with the functions on the right that will properly configure an IP address on an Ethernet interface.

Lab# configure terminal

Enter privileged EXEC mode

Lab(config-if)# ip address 192.168.3.3/24

Enter global configuration mode

Lab(config-if)# ip address 10.8.26.0 255.255.248.0

Enter interface configuration mode

Lab(config)# ip address 172.16.10.1 255.255.255.0

Configure the interface IP address

Lab# interface fa0/0

Enable the interface

Lab(config)# interface fa0/0

 

Lab(config-if)# no shutdown

 

Lab(config-if)# enable interface

 

Lab# enable

 

Lab> enable

 
Open table as spreadsheet

image from book

30. 

If a host has an IP address of 172.16.211.0/22, which of the following is the subnetwork number?

  1. 172.16.42.0

  2. 172.16.107.0

  3. 172.16.208.0

  4. 172.16.252.0

  5. 172.16.254.0

c explanation: c. the subnetwork is 172.16.208.0.

31. 

Which of the following best describes what a layer 2 switch will do when it receives a frame with a destination MAC address that's not in its MAC address table?

  1. The frame is dropped.

  2. The frame is addressed with a broadcast MAC address and sent out all ports.

  3. The frame is sent out all ports except the receiving port.

  4. An ARP request is sent out all ports except the receiving port.

  5. A destination-unreachable message is sent back to the source address.

image from book

32. 

How are OSPF hello packets on a point-to-point network addressed?

  1. 127.0.0.1

  2. 172.16.0.1

  3. 192.168.0.5

  4. 223.0.0.1

  5. 224.0.0.5

  6. 254.255.255.255

e explanation: e. ospf uses multicast address 224.0.0.5 for hello packets.

33. 

By looking at the following diagram, choose the two access-list statements you need to permit FTP access to the HR Server from the Internet, but block all other traffic.

  1.  access-list 101 permit tcp any 192.168.44.252 0.0.0.0 eq 21 

  2.  access-list 101 permit tcp any 192.168.44.252 0.0.0.0 eq 20 

  3.  access-list 101 permit tcp 192.168.44.252 0.0.0.0 any eq 20 

  4.  access-list 101 permit tcp 192.168.44.252 0.0.0.0 any eq 21 

  5.  access-list 101 deny tcp any 192.168.44.252 0.0.0.0 gt 21 

  6.  access-list 101 deny tcp 192.168.44.252 0.0.0.0 any gt 21 

image from book
Figure 3-9

image from book

34. 

You've configured an OSPF interface with the bandwidth 64 command. What will OSPF determine to be the cost of the link?

  1. 1

  2. 10

  3. 1562

  4. 64000

  5. 128000

image from book

35. 

Looking at the following diagram, how can you guarantee that Switch B is elected as the root switch during the STP election process?

  1. Clear the Switch B STP revision number.

  2. Assign Switch B a low priority number.

  3. Increase the Switch B priority number.

  4. Change the MAC address of Switch B.

image from book
Figure 3-10

image from book

36. 

Choose three of the following that accurately represent the OSPF routing protocol.

  1. It supports VLSM.

  2. It is used to route between autonomous systems.

  3. It confines network instability to one area of the network.

  4. It increases routing overhead on the network.

  5. It allows extensive control of routing updates.

  6. It is simpler to configure than RIP v2.

image from book

37. 

Say you entered the ping 192.168.5.2 command to successfully test connectivity to a recently added host machine. Choose the two protocols employed during your test.

  1. ARP

  2. CDP

  3. DHCP

  4. DNS

  5. ICMP

image from book

38. 

Look at the following diagram. Suppose the four switches it shows are the only ones in the network, and they're connected via redundant links. Choose which one of the four switches will be elected the spanning-tree root bridge.

  1. Switch1

  2. Switch2

  3. Switch3

  4. Switch4

image from book
Figure 3-11

image from book

39. 

Look at the following diagram. Your network's IP address is 172.31.0.0/19, and you want to configure it on the router with the partial configuration. Choose the answer that accurately identifies how many available subnets and hosts you'll have after you complete the configuration.

  1. There are 7 useable subnets, with 30 useable host addresses.

  2. There are 7 useable subnets, with 2046 useable host addresses.

  3. There are 7 useable subnets, with 8190 useable host addresses.

  4. There are 8 useable subnets, with 30 useable host addresses.

  5. There are 8 useable subnets, with 2046 useable host addresses.

  6. There are 8 useable subnets, with 8190 useable host addresses.

image from book

 Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname R1 ! ip subnet-zero ! ! ip classless ip route 0.0.0.0 0.0.0.0 Serial0/0 no ip http server ! <output omitted> 

image from book

Figure 3-12

image from book

40. 

The two switches in the following diagram, Core and Core2, are both Catalyst 2950s, and you've created an addressing scheme for each site that looks like this:

  • Router Ethernet port-First useable address

  • Core-Second useable address

  • Core2-Third useable address

image from book
Figure 3-13

Choose the three commands you need to configure on Core2 so you can manage it remotely from any subnet located on your network.

  1.  Core2(config)# interface f0/0 Core2(config-if)# ip address 192.168.1.10 255.255.255.248 

  2.  Core2(config)# interface vlan 1 Core2(config-if)# ip address 192.168.1.11 255.255.255.248 

  3.  Core2(config)# line con 0 Core2(config-line)# password cisco 

  4.  Core2(config)# line vty 0 4 Core2(config-line)# password cisco 

  5.  Core2(config)# ip default- gateway 192.168.1.9 

  6.  Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8 

image from book

41. 

Choose the two things that will happen if you enter the Switch(config)# vtp mode client command on a Catalyst switch.

  1. The switch will ignore VTP summary advertisements.

  2. The switch will forward VTP summary advertisements.

  3. The switch will process VTP summary advertisements.

  4. The switch will originate VTP summary advertisements.

  5. The switch will create, modify, and delete VLANs for the entire VTP domain.

b, c explanation: b, c. the switch will forward and process vtp updates.

42. 

The following diagram displays a partial switch command output. Pay close attention to the topology. The internetwork has some connectivity problems indicated by the inability of Host A to ping Host B. Which of the following should you do to solve the problem?

  1. Change the gateway on Host A.

  2. Reconfigure the IP address on Host B.

  3. Name VLAN2.

  4. Configure the Fa0/1 interface on the ET-1 switch as a trunk port.

  5. Move switch port Fa0/1 to a different VLAN.

image from book
Figure 3-14

image from book

43. 

Choose the two statements that accurately describe the command ip route 172.16.3.0 255.255.255.0 192.168.2.4.

  1. The command is used to establish a static route.

  2. The default administrative distance is used.

  3. The command is used to configure the default route.

  4. The subnet mask for the source address is 255.255.255.0.

  5. The command is used to establish a stub network.

image from book

44. 

You issue the show ip route command that allows you to view the following output. Choose the route that won't be entered into the neighboring router's routing table.

  1. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0

  2. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1

  3. C 192.168.1.0/24 is directly connected, Ethernet0

  4. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0

image from book

45. 

Choose two options that depict the information a router that's running a link-state protocol uses to create and sustain its topological database.

  1. Hello packets

  2. SAP messages sent by other routers

  3. LSAs from other routers

  4. Beacons received on point-to-point links

  5. Routing tables received from other link-state routers

  6. TTL packets from designated routers

image from book

46. 

Choose the three services that use TCP.

  1. DHCP

  2. SMTP

  3. SNMP

  4. FTP

  5. HTTP

  6. TFTP

b, d, e explanation: b, d, e. each of these uses tcp.

47. 

EIGRP successor routes are stored where?

  1. In the routing table only

  2. In the neighbor table only

  3. In the topology table only

  4. In the routing table and neighbor table

  5. In the routing table and topology table

  6. In the topology table and neighbor table

image from book

48. 

Your Breckenridge router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. Which two things are true because of this?

  1. The command establishes a static route.

  2. The command invokes a dynamic routing protocol for 192.168.12.0.

  3. Traffic for network 192.168.12.0 is forwarded to172.16.12.1.

  4. Traffic for all networks is forwarded to 172.16.12.1.

  5. The route is automatically propagated throughout the entire network.

  6. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network.

image from book

49. 

Of these choices, which one is a unicast address?

  1. 224.1.5.2

  2. FFFF.FFFF.FFFF

  3. 192.168.24.59/30

  4. 255.255.255.255

  5. 172.31.128.255/18

e explanation: e. this is a unicast address in the 172.31.128.0 subnet.

50. 

You want to configure a switch via a virtual terminal connection from outside your local LAN. Choose two things that you need to do to successfully gain the ability to configure your switch remotely.

  1. The switch must be configured with an IP address, a subnet mask, and a default gateway.

  2. The switch must be connected to a router over a VLAN trunk.

  3. The switch must be reachable through a port connected to its management VLAN.

  4. The switch virtual terminal must be configured with a password.

  5. The switch-management VLAN must be created and have a membership of at least one switch port.

  6. The switch must be fully configured as an SNMP agent.

image from book

51. 

If your router has both physical and logical interfaces, which of the following will establish the OSPF router ID?

  1. Lowest network number of any interface

  2. Lowest IP address of any logical interface

  3. Lowest IP address of any physical interface

  4. Highest network number of any interface

  5. Highest IP address of any logical interface

  6. Highest IP address of any physical interface

image from book

52. 

On which OSI layer does the protocol operate that imparts the information you get by using the show cdp neighbors command?

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Application

image from book

53. 

Choose the command that configures a switch port to use the IEEE standard method of adding VLAN membership information into Ethernet frames.

  1.  Switch(config)# switchport trunk encapsulation isl 

  2.  Switch(config)# switchport trunk encapsulation ietf 

  3.  Switch(config)# switchport trunk encapsulation dot1q 

  4.  Switch(config-if)# switchport trunk encapsulation isl 

  5.  Switch(config-if)# switchport trunk encapsulation dot1q 

image from book

54. 

You need to configure an existing serial interface so it will receive a second Frame Relay virtual circuit. Which three things do you need to do to achieve this goal?

  1. Remove the IP address from the physical interface.

  2. Encapsulate the physical interface with multipoint PPP.

  3. Create the virtual interfaces with the interfaces command.

  4. Configure each subinterface with its own IP address.

  5. Disable split horizon to prevent routing loops between the subinterface networks.

  6. Configure static Frame Relay map entries for each subinterface networks.

image from book

55. 

You have a Cisco router and a router from another maker that are directly connected through a serial link. What command do you need to issue on the Cisco router to create a WAN connection between the routers?

  1.  Lab(config-if)# encapsulation hdlc ansi 

  2.  Lab(config-if)# encapsulation ppp 

  3.  Lab(config-if)# encapsulation frame-relay default 

  4.  Lab(config-if)# encapsulation isdn 

b explanation: b. ppp is always the best choice in multivendor solutions.

Answers

1. 

B

Explanation:

B. Port Security allows you to create filters based on MAC addresses.

2. 

A, D, E

Explanation:

A, D, E. In this case, there is no router to route between the two VLANs, and thus your hosts should only be able to ping other hosts in the same VLAN. A and E show that hosts in one VLAN can ping hosts in the same VLAN on the other switch.

3. 

D

Explanataion:

D. The switch with the lowest priority (4096, in this case) will become the root bridge.

4. 

A, D

Explanation:

A, D. An interface being in a down/down state indicates a layer 1 problem. That could include an incorrect cable.

5. 

A, C

Explanation:

A, C. The OSPF process ID is locally significant and identifies each individual instance of OSPF running, should multiple instances be running on a single router.

6. 

C

Explanation:

C. The switch does not have a default gateway defined and thus will not be able to support IP communications outside its own subnet.

7. 

Explanation:

192.168.128.184/26

Aspen 56 hosts Fa0/0

192.168.128.241/30

Breckenridge 2 hosts S0/1

192.168.128.249/29

Copper 6 hosts Fa0/0

192.168.128.196/27

Keystone 26 hosts Fa0/0

Open table as spreadsheet

8. 

A, C

Explanation:

A, C. Routers must switch the packets between interfaces and perform path selection based on layer 3 destination addresses. They do not assign VLAN membership, and ARP broadcasts do not cross routers.

9. 

D

Explanation:

D. A static route with a destination network and mask of all zeros is the default route.

10. 

A

Explanation:

A. In a serial connection, one device or end of the cable is the DTE (a router in most cases) and the other device or end of the cable is the DCE (CSU/DSU or ISP device). In this type of connection, the clock rate and control for the connection come from the DCE device.

11. 

D

Explanation:

D. Once every switch port has completed the spanning tree states and is either in blocking or forwarding state, the switched network is said to be converged.

12. 

C

Explanation:

C. 172.1.4.0/22 covers all addresses 172.1.4.0 through 172.1.7.255, exactly what R1 has.

13. 

C

Explanation:

C. Unlike Frame Relay point-to-point subinterfaces, multipoint subinterfaces use one subnet for all PVC connections. Point-to-point uses one subnet for each PVC.

14. 

D

Explanation:

D. You will need a /26 subnet in order to have enough address space for 62 hosts. The address space beginning at 192.168.35.64 is already in use.

15. 

C

Explanation:

C. The default administrative distance for OSPF is 110.

16. 

C

Explanation:

C. When OSPF is configured on a router, a router identification (RID) is created by using the highest IP address on any active interface at the moment of OSPF startup. The RID can be changed by creating a loopback interface, also called a logical interface. This RID is used by routers to determine which router will be a designated router or backup designated router in a broadcast or nonbroadcast multi-access network.

17. 

A, C, F

Explanation:

A, C, F. The layer 2 header will be rebuilt every time it passes through a router. The layer 3 header stays constant from end to end.

18. 

A, C

Explanation:

A, C. PPP is universal, whereas HDLC is vendor proprietary. Additionally, PPP can allow for authentication.

19. 

C

Explanation:

C. The configuration register setting can tell the router to ignore any configuration in startup-config. This is used in the password recovery sequence; however, if it is inadvertently set, it causes the behavior described.

20. 

B, D

Explanation:

B, D. You will need at least a /25 address to for Network A, and the 172.16.3.0 network is the only one available for LinkA.

21. 

A, C

Explanation:

A, C. When connecting two like devices together directly, you must use a crossover cable for them to communicate.

22. 

C

Explanation:

C. Frame Relay is a nonbroadcast, multi-access network.

23. 

D

Explanation:

D. Pinging the loopback address will allow you to verify proper local function of the TCP/IP stack.

24. 

E

Explanation:

E. This is the broadcast address for the 201.57.78.128 network.

25. 

D

Explanation:

D. Spanning Tree discovers redundant links and places them in blocking mode.

26. 

C

Explanation:

C. The EIGRP topology table shows feasible successors.

27. 

B

Explanation:

B. A router is required to communicate between VLANs. Router-to-switch connections use standard straightthrough cables.

28. 

B

Explanation:

B. The destination MAC will be the router, which is local to Host A. The destination IP will be the ultimate destination host.

29. 

Explanation:

Lab> enable

Enter privileged EXEC mode

Lab# configure terminal

Enter global configuration mode

Lab(config)# interface fa0/0

Enter interface configuration mode

Lab(config-if)# ip address 10.8.26.0 255.255.248.0

Configure the interface IP address

Lab(config-if)# no shutdown

Enable the interface

Open table as spreadsheet

30. 

C

Explanation:

C. The subnetwork is 172.16.208.0.

31. 

C

Explanation:

C. In the case where the destination MAC is unknown, the switch will flood the frame out all ports except the receiving port.

32. 

E

Explanation:

E. OSPF uses multicast address 224.0.0.5 for hello packets.

33. 

A, B

Explanation:

A, B. When allowing FTP traffic, you must allow both the data and control ports. The implicit deny will deny all other traffic.

34. 

C

Explanation:

C. OSPF divides the link bandwidth into the reference bandwidth (100Mbps by default).

35. 

B

Explanation:

B. By assigning a lower priority, you can guarantee that a switch is elected root switch.

36. 

A, C, E

Explanation:

A, C, E. OSPF supports VLSM. The use of areas allows for isolation of routing instability and has extensive controls to use in influencing routing updates.

37. 

A, E

Explanation:

A, E. Your host will use ARP to map a destination IP to a MAC and will use ICMP to communicate with the destination host.

38. 

A

Explanation:

A. Because all priorities are equal, the switch with the lowest MAC address will become root bridge.

39. 

F

Explanation:

F. When subnetting a class B network with a /19 mask, you have 8 subnets of 8190 hosts each (assuming you are using IP subnet zero).

40. 

B, D, E

Explanation:

B, D, E. You must add the default gateway and an IP address to the VLAN1 interface. Additionally, you must add a password to the VTY so you can telnet into the switch.

41. 

B, C

Explanation:

B, C. The switch will forward and process VTP updates.

42. 

D

Explanation:

D. The link to the router must be configured as a trunk port in order for the hosts on the two VLANs to communicate with each other.

43. 

A, B

Explanation:

A, B. This is a standard static route; for a default route, the destination network and mask would be all zeros. No specific administrative distance is specified, so the default will be used.

44. 

D

Explanation:

D. This route already has a hop count of 15, which is the maximum for RIP (the routing protocol running here).

45. 

A, C

Explanation:

A, C. A router running a link-state protocol uses hello packets to find neighbors and form adjacencies. Once an adjacency has been formed, it uses link state advertisement (LSA) packets to exchange topology information and updates when changes occur.

46. 

B, D, E

Explanation:

B, D, E. Each of these uses TCP.

47. 

E

Explanation:

E. Successor routers are stored and found in the topology table. They are copied and placed in the routing table for IP to forward traffic with.

48. 

A, C

Explanation:

A, C. This is a standard static route that sends all traffic for 192.168.12.0/24 through 172.16.12.1.

49. 

E

Explanation:

E. This is a unicast address in the 172.31.128.0 subnet.

50. 

A, D

Explanation:

A, D. The switch must have IP communications configured, and the VTY must have a password in order for you to be able to telnet into the switch.

51. 

E

Explanation:

E. The logical address is preferred over the physical, and the highest address wins.

52. 

B

Explanation:

B. Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol that works at the Data Link layer.

53. 

E

Explanation:

E. There are two trunking encapsulation methods: ISL, which is Cisco propriety, and 802.1q, which is not proprietary. Use the command dot1q when using 802.1q.

54. 

A, C, D

Explanation:

A, C, D. Assuming you did not already create subinterfaces, you will need to remove the IP configuration on the major (physical) interface, create multiple subinterfaces, and configure each of them.

55. 

B

Explanation:

B. PPP is always the best choice in multivendor solutions.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net