CCNA-Practice Test 4


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

Look at the following diagram. Which route will be found in the routing table of the Main router?

  1. C 192.168.2.0 is directly connected, Serial0/1

  2. R 192.168.2.0/24 [120/1] via 192.168.255.26, 00:00:24, Serial0/0

  3. R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1

  4. R 192.168.2.0/24 [120/2] via 192.168.255.21, 00:00:22, Serial0/0

image from book

 Main#debug ip rip RIP protocol debugging is on Main# *Mar   1 17:43:00.567: RIP: received v1 update from 192.168.255.21 on Serial0/0 *Mar   1 17:43:00.571:   192.168.2.0 in 2 hops *Mar   1 17:43:00.571:   192.168.255.16 in 1 hops *Mar   1 17:43:41.419: RIP: received v1 update from 192.168.255.26 on Serial0/1 *Mar  1 17:43:41.423:   192.168.2.0 in 1 hops *Mar  1 17:43:41.427:   192.168.255.16 in 1 hops *Mar  1 17:43:55.099: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (192.168.255.22) *Mar  1 17:43:55.103: RIP: build update entries *Mar  1 17:43:55.103:  network 192.168.2.0 metric 2 *Mar  1 17:43:55.107:  subnet 192.168.255.24 metric 1 *Mar  1 17:43:55.111: RIP: sending v1 update to 255.255.255.255 via Serial0/1 (192.168.255.25) *Mar  1 17:43:55.115: RIP: build update entries *Mar  1 17:43:55.119: subnet 192.168.255.20 metric 1 

image from book

Figure 4-1

image from book

2. 

Look at the following diagram. An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching the web server attached to the Northfield router. On which router, which interface, and in what direction should the access list be placed to most efficiently implement this list? (Choose three.)

  1. Westfield Router

  2. Northfield Router

  3. s0

  4. e0

  5. in

  6. out

image from book
Figure 4-2

image from book

3. 

You're testing an ISDN circuit that uses PPP between two IP hosts. Match the indicator in the left column with the OSI layer on the right that it confirms.

Open table as spreadsheet
 

Layer 1

Layer 2

Layer 3

The line is up.

   

A ping of the remote host is successful.

   

A Telnet connection to the host is successful.

   

A dial session to the remote host is successful.

  

image from book

4. 

Look at the following diagram. HostA has established a Telnet session with HostB. Which intermediate device examines the information at OSI layers 1-2 only?

  1. Switch1

  2. Router1

  3. Router2

  4. HostB

image from book
Figure 4-3

image from book

5. 

You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?

  1. ping 127.0.0.0

  2. ping 203.125.12.1

  3. telnet 127.0.0.1

  4. ping 127.0.0.1

  5. tracert 203.125.12.1

image from book

6. 

Look at the following diagram. A network technician enters the following line into the router:

image from book
Figure 4-4

   Tidmore1(config)# no access-list   106 permit ip any any 

What is the effect of this configuration?

  1. The change has no effect on the packets being filtered.

  2. All traffic from the 192.168.254.0 LAN to the Internet is permitted.

  3. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.

  4. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can access web pages from the Internet.

image from book

7. 

Without a loopback interface, which of the following accurately describes what an OSPF router would use for the router ID if all OSPF routers in one area were configured with the same priority value?

  1. IP address of the Fast Ethernet interface

  2. IP address of the console management interface

  3. Highest IP address among its active interfaces

  4. Lowest IP address among its active interfaces

  5. Priority value until a loopback interface is configured

image from book

8. 

Look at the following diagram. The network has been configured with STP disabled. HostA sends an ARP request for the IP address of a site on the Internet. What will happen to this ARP request? (Choose two.)

  1. Because the ARP request is a broadcast, SW-A will not forward the request.

  2. SW-A will convert the broadcast to a unicast and forward it to SW-D.

  3. The switches will propagate the broadcast, creating a broadcast storm.

  4. From a port on SW-A, HostA will receive an ARP reply containing the MAC address.

  5. From the Ethernet interface of RouterX, HostA will receive an ARP reply that contains the MAC address.

  6. The switches will propagate the broadcast until the TTL of the frame reduces to 0. Then the frame will be discarded.

image from book
Figure 4-5

image from book

9. 

On which OSI layer does the protocol operate that imparts the information you get by using the show cdp neighbors command?

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Application

image from book

10. 

Which command will configure a default route on a router?

  1.  router(config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1 

  2.  router(config)# ip default- route 10.1.1.0 

  3.  router(config)# ip default- gateway 10.1.1.0 

  4.  router(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 

image from book

11. 

Look at the following diagram. Computer 1 is consoled into switch A. Telnet connections and pings run from the command prompt on switch A fail. Which of the following could cause this problem?

  1. Switch A is not directly connected to router JAX.

  2. Switch A does not have a default gateway assigned.

  3. Switch A does not have a CDP entry for switch B or router JAX.

  4. Switch A does not have an IP address.

  5. Port 1 on switch A should be an access port rather than a trunk port.

image from book
Figure 4-6

image from book

12. 

Which of the following statements are true regarding the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)

  1. The command is used to establish a static route.

  2. The default administrative distance is used.

  3. The command is used to configure the default route.

  4. The subnet mask for the source address is 255.255.255.0.

  5. The command is used to establish a stub network.

image from book

13. 

What are the possible trunking modes for a switch port? (Choose three.)

  1. Transparent

  2. Auto

  3. On

  4. Desirable

  5. Client

  6. Forwarding

image from book

14. 

Of these choices, which three host addresses are valid members of networks that can be routed across the Internet?

  1. 10.172.13.65

  2. 172.16.223.125

  3. 172.62.12.29

  4. 192.168.23.252

  5. 198.234.12.95

  6. 212.193.48.254

image from book

15. 

Look at the following diagram. Assuming all hosts and servers are in the same VLAN, which statement is correct about the internetwork shown in the diagram?

  1. Switch2 is the root bridge.

  2. Spanning Tree Protocol is not running.

  3. Host D and Server 1 are in the same network.

  4. No collisions can occur in traffic between Host B and Host C.

  5. If Fa0/0 is down on Router1, Host A cannot access Server 1.

  6. If Fa0/1 is down on Switch3, Host C cannot access Server 2.

image from book
Figure 4-7

image from book

16. 

Look at the following diagram. When PC1 sends an ARP request for the MAC address of PC2, network performance slows dramatically, and the switches detect an unusually high number of broadcast frames. What is the most likely cause of this?

  1. The portfast feature is not enabled on all switch ports.

  2. The PCs are in two different VLANs.

  3. Spanning Tree Protocol is not running on the switches.

  4. PC2 is down and not able to respond to the request.

  5. The VTP versions running on the two switches do not match.

image from book
Figure 4-8

image from book

17. 

The command ip route 192.168.24.64 255.255.255.192 192.168.8.2 100 was configured on a router named Corporate. No routing protocols or other static routes are configured on the Corporate router yet. Which statement is true about this command?

  1. This command sets a gateway of last resort for the Corporate router.

  2. The number 100 indicates the number of hops to the destination network.

  3. The interface with IP address 192.168.8.2 is on the Corporate router.

  4. The command creates a static route for all IP traffic with the source address 192.168.24.64.

  5. Packets destined for host 192.168.24.124 will be sent to 192.168.8.2.

image from book

18. 

Choose the command that will configure a switch port to use the IEEE standard method of adding VLAN membership information into Ethernet frames.

  1.  Switch(config)# switchport trunk encapsulation isl 

  2.  Switch(config)# switchport trunk encapsulation ietf 

  3.  Switch(config)# switchport trunk encapsulation dot1q 

  4.  Switch(config-if)# switchport trunk encapsulation isl 

  5.  Switch(config-if)# switchport trunk encapsulation ietf 

  6.  Switch(config-if)# switchport trunk encapsulation dot1q 

image from book

19. 

If you needed to permit Internet access for the hosts in your network assigned addresses in the 192.168.8.0 through 198.168.15.255 range, which wildcard mask would you employ to achieve that objective?

  1. 0.0.0.0

  2. 0.0.0.255

  3. 0.0.255.255

  4. 0.0.7.255

  5. 0.0.3.255

image from book

20. 

Which command displays all the EIGRP feasible successor routes known to a router?

  1. Router# show ip eigrp routes*

  2. Router# show ip eigrp summary

  3. Router# show ip eigrp topology

  4. Router# show ip eigrp
    adjacencies

  5. Router# show ip eigrp
    neighbors detail

image from book

21. 

Which sequence of actions allows telneting from a user's PC to a router using TCP/IP?

  1. Connect the PC's COM port to the router's console port using a straight-through cable.

  2. Connect the PC's COM port to the router's console port using a crossover cable.

  3. Connect the PC's COM port to the router's Ethernet port using a straight-through cable.

  4. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable.

  5. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable.

  6. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.

image from book

22. 

Which of the following are options for Frame Relay LMI types? (Choose three.)

  1. IETF

  2. Q.931

  3. Q933a

  4. IEEE

  5. Cisco

  6. ANSI

image from book

23. 

What is the subnetwork number of a host with an IP address of 172.16.210.0/22?

  1. 172.16.42.0

  2. 172.16.107.0

  3. 172.16.208.0

  4. 172.16.252.0

  5. 172.16.254.0

c explanation: c. the 172.16.208.0/22 subnetwork has hosts 172.16.208.1 through 172.16.211.254.

24. 

Look at the following diagram. What should be the IP address of the host?

  1. 192.168.5.14

  2. 192.168.5.32

  3. 192.168.5.40

  4. 192.168.5.47

  5. 192.168.5.55

image from book
Figure 4-9

c explanation: c. the subnet 192.168.5.32/28 has hosts 192.168.5.33 through 192.168.5.36.

25. 

Look at the following diagram. The network administrator has configured the switches in the school network to use VTP. The switches are not sharing VLAN information. Which sequence of commands should be issued to correct this problem?

  1.  Offices(config)# vtp mode client Labs(config)# vtp mode client 

  2.  Offices(config)# vtp domain School Labs(config)# vtp domain School 

  3.  Offices(config)# vtp pruning Labs(config)# vtp pruning 

  4.  Offices(config)# vtp version 2 Labs(config)# vtp version 2 

image from book

Labs# show vtp status

 

VTP Version

: 2

Configuration Revision

: 1

Maximum VLANs supported locally

: 64

Number of existing VLANs

: 9

VTP Operating Mode:

: Server

VTP Domain Name

: Labs

VTP Pruning Mode

: Disabled

VTP V2 Mode

: Disabled

VTP Traps Generation

: Disabled

MD5 digest

0xF3 0x6D 0x21 0x7C 0x0F 0xA9 0xE9 0x60


Offices# show vtp status

 

VTP Version

: 1

Configuration Revision

: 3

Maximum VLANs supported locally

: 64

Number of existing VLANs

: 9

VTP Operating Mode

: Server

VTP Domain Name

: Offices

VTP Pruning Mode

: Disabled

VTP V2 Mode

: Disabled

VTP Traps Generation

: Disabled

MD5 digest

: 0x07 0x35 0xFA 0xD5 0xF8 0xBA 0xE5 0xD8

image from book

Figure 4-10

image from book

26. 

Which of the following IP addresses can be assigned to host devices? (Choose two.)

  1. 205.7.8.32/27

  2. 191.168.10.2/23

  3. 127.0.0.1

  4. 224.0.0.10

  5. 203.123.45.47/28

  6. 10.10.0.0/13

image from book

27. 

Look at the following diagram. Assume that ports 1 through 3 are assigned to VLAN1 and ports 4 through 6 are assigned to VLAN2 on each switch. The switches are interconnected over a trunked link. Which of the following conditions verify proper VLAN and trunk operation? (Choose three.)

  1. Host 1-1 can ping Host 1-2.

  2. Host 1-1 can ping Host 4-2.

  3. Host 1-1 can not ping Host 1-2.

  4. Host 4-1 can not ping Host 1-2.

  5. Host 4-1 can ping Host 4-2.

image from book
Figure 4-11

image from book

28. 

The TFR Company is implementing dialup services to enable remote office employees to connect to the local network. The company uses several different layer 3 protocols on the network. Authentication of the users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support. Which protocol is the best choice for these remote access services?

  1. 802.1

  2. Frame Relay

  3. HDLC

  4. PPP

  5. SLIP

  6. PAP

image from book

29. 

Look at the following diagram. Switch1 has just been restarted and has passed the POST routine. When Host A begins communicating with Host C, what will the switch do?

  1. Switch1 will add 192.168.23.4 to the CAM table.

  2. Switch1 will add 192.168.23.12 to the CAM table.

  3. Switch1 will add 000A.8A47.E612 to the CAM table.

  4. Switch1 will add 000B.DB95.2EE9 to the CAM table.

image from book
Figure 4-12

image from book

30. 

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates; converge quickly; and support VLSM, CIDR, IP and IPX. Which routing protocol best fits the requirements of this network?

  1. RIP v1

  2. RIP v2

  3. IGRP

  4. OSPF

  5. EIGRP

image from book

31. 

When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

  1. By default, all defined VLANs are allowed on the trunk.

  2. Each single VLAN, or VLAN range, must be specified with the switchport mode command.

  3. Each single VLAN, or VLAN range, must be specified with the vtp domain command.

  4. Each single VLAN, or VLAN range, must be specified with the vlan database command.

a explanation: a. by default, all defined vlans are allowed on configured trunk links.

32. 

Which command displays RIP routing updates as they are sent and received by the router?

  1. show ip protocols

  2. show ip route rip

  3. debug ip rip

  4. debug ip updates

  5. debug ip transactions

image from book

33. 

In which of the following options would multiple copies of the same unicast frame be the most likely to be relayed in a switched LAN?

  1. During high traffic periods

  2. After broken links are re-established

  3. When upper-layer protocols require high reliability

  4. In an improperly implemented redundant topology

  5. When a dual-ring topology is in use

image from book

34. 

Look at the following diagram. How can a network administrator ensure that the STP election process will result in Switch B being elected as the root switch?

  1. Clear the Switch B STP revision number.

  2. Assign Switch B a low priority number.

  3. Increase the Switch B priority number.

  4. Change the MAC address of Switch B.

image from book
Figure 4-13

image from book

35. 

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two.)

  1. ARP

  2. CDP

  3. DHCP

  4. DNS

  5. ICMP

image from book

36. 

You've just inserted a new router into an established OSPF network, but the networks attached to the recently added router aren't showing up in the routing tables of the other OSPF routers. By looking at the information in the partial configuration given below, what's causing this issue?

 Router(config)# router ospf 1 Router(config-router)# network   10.0.0.0 255.0.0.0 area 0 

  1. The process id is configured improperly.

  2. The OSPF area is configured improperly.

  3. The network wildcard mask is configured improperly.

  4. The network number is configured improperly.

  5. The AS is configured improperly.

  6. The network subnet mask is configured improperly.

image from book

37. 

Match the security features in the column on the left to the exact security risks they help protect against in the right column. (You'll have one left over.)

Access-group

Remote access to device console

Console password

Access to the console 0 line

Enable secret

Access to connected networks or resources

CHAP authentication

Viewing of passwords

VTY password

Access to privileged mode

Service password-encryption

 
Open table as spreadsheet

image from book

38. 

Which command is required to apply an access list on a virtual terminal line of a router?

  1.  Router(config-line)# access- class 10 in 

  2.  Router(config-if)# ip access- class 23 out 

  3.  Router(config-line)# access- group 15 out 

  4.  Router(config-if)# ip access- group 110 in 

  5.  Router(config-line)# access- list 150 in 

  6.  Router(config-if)# ip access- list 128 out 

image from book

39. 

A Cisco router has been configured, and the copy running-config startup-config command has been issued. When the router is power cycled, the router prompts with "Would you like to enter the initial configuration dialog? [yes/no]:". Why does this happen?

  1. There is an error in the router DRAM.

  2. The IOS image is corrupt.

  3. The configuration register is set to 0x2142.

  4. The TFTP server that contains the router configuration file is unreachable.

  5. A boot system configuration command has placed the router into setup mode.

image from book

40. 

An administrator is configuring a Catalyst switch with VLAN information that must be automatically distributed to other Catalyst switches in the network. What conditions must be met in order for the VLANs configured on this switch to be automatically configured on other switches? (Choose three.)

  1. The switch that will share its VLAN configuration must be in VTP server mode.

  2. The switches must be in the same VTP domain.

  3. The switch that will share the VLAN information must be configured as root bridge.

  4. The switches must be connected over VLAN trunks.

  5. The switches must be configured to use the same STP version.

  6. The switches must have VTP pruning activated.

image from book

41. 

Look at the following diagram. You have been asked to diagnose a problem with the network shown. The following symptoms have been observed: None of the user hosts can access the Internet; none of the user hosts can access the server in VLAN9; host A can ping host B; host A cannot ping host C or host D; and host C can ping host D. What can cause these symptoms?

  1. Interface S0/0 on the router is down.

  2. Interface Fa1/0 on the router is down.

  3. Interface Fa0/5 on Switch3 is down.

  4. Interface Fa0/4 on Switch3 is down.

  5. Switch1 is turned off.

  6. Switch3 is turned off.

image from book
Figure 4-14

image from book

42. 

Your security policy dictates that only one host can be permitted to dynamically attach to each interface, and if this policy is violated, the interface should immediately shut down. Choose the two commands you need to configure on the 2950 Catalyst switch to implement your policy.

  1.  Switch1(config-if)# switchport port-security maximum 1 

  2.  Switch1(config)# mac-address- table secure 

  3.  Switch1(config)#Access-list 10 permit ip host 

  4.  Switch1(config-if)# switchport port-security violation shutdown 

  5.  Switch1(config-if)# ip access- group 10 

image from book

43. 

You're configuring a router to act as a hub within a Frame Relay hub-and-spoke topology. Why should you opt for using point-to-point subinterfaces instead of a multipoint interface?

  1. It avoids split-horizon issues with distance vector routing protocols.

  2. Only one IP network address needs to be used to communicate with all spoke devices.

  3. Point-to-point subinterfaces offer greater security than multipoint interface configuration.

  4. Only a single physical interface is needed with point-to-point subinterfaces, whereas a multipoint interface logically combines multiple physical interfaces.

image from book

44. 

Look at the following diagram. Two switches, named Top and Bottom, connect through ports configured as trunks. The trunk ports on both switches have been configured correctly, and both interfaces are up. VTP, however, is not passing VLAN information between the two switches. Based on the output of the show vtp status command from both switches, what is the problem?

  1. The domain names do not match.

  2. Only one switch can be in VTP server mode in a domain.

  3. The configuration revision numbers must match in the two switches.

  4. The VTP timer settings must match.

image from book

Top#show vtp status

 

VTP Version

: 2

Configuration Revision

: 1

Maximum VLANs supported locally

: 250

Number of existing VLANs

: 6

VTP Operating Mode

: Server

VTP Domain Name

: cheryl

VTP Pruning Mode

: Disabled

VTP V2 Mode

: Disabled

VTP Traps Generation

: Disabled

MD5 digest

: 0xBF 0x92 0x87 0xB0 0xA8 0x8F 0xDA 0x86

Configuration last modified by 0.0.0.0 at 3-1-93 00:03:32

Local updater ID is 0.0.0.0 (no valid interface found)

Bottom#show vtp status

 

VTP Version

: 2

Configuration Revision

: 0

Maximum VLANs supported locally

: 250

Number of existing VLANs

: 5

VTP Operating Mode

: Server

VTP Domain Name

: charyl

VTP Pruning Mode

: Disabled

VTP V2 Mode

: Disabled

VTP Traps Generation

: Disabled

MD5 digest

: 0xF3 0x03 0x4C 0x72 0xC8 0x6B 0x29 0x62

Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00

Local updater ID is 0.0.0.0 (no valid interface found)

image from book

Figure 4-15

image from book

45. 

What is the purpose of spanning tree in a switched LAN?

  1. To provide a mechanism for network monitoring in switched environments

  2. To prevent routing loops in networks with redundant switched paths

  3. To prevent switching loops in networks with redundant switched paths

  4. To manage the addition, deletion, and naming of VLANs across multiple switches

  5. To segment a network into multiple collision domains

image from book

46. 

Which two commands would you use to configure running OSPF, plus adding network 192.168.16.0/24 to OSPF area 0?

  1. Router(config)# router ospf 0

  2. Router(config)# router ospf 1

  3. Router(config)# router ospf
    area 0

  4. Router(config-router)# network
    192.168.16.0 0.0.0.255 0

  5. Router(config-router)# network
    192.168.16.0 0.0.0.255 area 0

  6. Router(config-router)# network
    192.168.16.0 255.255.255.0
    area 0

image from book

47. 

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational?

  1. frame-relay arp

  2. frame-relay map

  3. frame-relay interface-dlci

  4. frame-relay lmi-type

image from book

48. 

Which statements describe the routing protocol OSPF? (Choose three.)

  1. It supports VLSM.

  2. It is used to route between autonomous systems.

  3. It confines network instability to one area of the network.

  4. It increases routing overhead on the network.

  5. It allows extensive control of routing updates.

  6. It is simpler to configure than RIP v2.

image from book

49. 

You've configured an interface with the access list shown. Based on the access list, list which information packet in the left column will be permitted and which packets will be denied?

 Access-list 107 deny tcp 207.16.12.0 0.0.3.255 any eq http Access-list 107 permit ip any any 

Open table as spreadsheet
 

Permitted

Denied

Source IP 207.16.32.14, destination application: http

  

Source IP 207.16.15.9, destination port 23

  

Source IP 207.16.14.7, destination port 80

  

Source IP 207.16.13.14, destination application http

  

Source IP 207.16.16.14, destination port 53

  

image from book

50. 

You've configured the Ethernet 0 interface of a router with address 10.64.0.1. 255.224.0.0 and the Ethernet 1 interface with address 10.96.0.1/11. Choose the two commands you can use to configure RIP version 1 on this router so it will advertise both networks to the neighboring routers.

  1.  Router(config)# router rip Router(config-router)# network 10.0.0.0 255.224.0.0 

  2.  Router(config)# router rip Router(config-router)# network 10.64.0.1 255.224.0.0 Router(config-router)# network 10.96.0.1 255.224.0.0 

  3.  Router(config)# router rip Router(config-router)# network 10.0.0.0 

  4.  Router(config)# router rip Router(config-router)# network 10.64.0.0 Router(config-router)# network 10.96.0.0 

image from book

51. 

Look at the following diagram. RouterA is unable to reach RouterB. Both routers are running IOS version 12.0. After reviewing the command output and graphic, what is the most likely cause of the problem?

  1. Incorrect bandwidth configuration

  2. Incorrect LMI configuration

  3. Incorrect map statement

  4. Incorrect IP address

image from book
Figure 4-16

image from book

52. 

Look at the following diagram. Switches A and B have been configured with a trunked link that has been verified as working correctly. However, VTP is not propagating VLANs from one switch to the other. Based on the command output shown, what is the problem?

  1. The revision number is not the same on both switches.

  2. Only one switch can be in server mode.

  3. The VTP domain name is not correctly configured.

  4. VLANs have not been configured on the VTP server.

  5. The VTP pruning mode is not correctly configured.

image from book
Figure 4-17

image from book

53. 

Which functions do routers perform when routing a packet? (Choose two.)

  1. Packet switching

  2. Destination host addressing

  3. Path selection

  4. VLAN membership assignment

  5. ARP request forwarding

image from book

54. 

What does a layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?

  1. The frame is dropped.

  2. The frame is addressed with a broadcast MAC address and sent out all ports.

  3. The frame is sent out all ports except the receiving port.

  4. An ARP request is sent out all ports except the receiving port.

  5. A destination unreachable message is sent back to the source address.

image from book

55. 

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets? (Choose two.)

  1. Neighbor table

  2. SPF table

  3. RTP table

  4. Topology table

  5. Query table

  6. DUAL table

image from book

Answers

1. 

B

Explanation:

B. The route via 192.168.255.26 has a lower metric than the route via 192.168.255.21.

2. 

A, D, E

Explanation:

A, D, E. Extended access lists should be placed as close to the source as possible.

3. 

Explanation:

The line is up.

Layer 2

A ping of the remote host is successful.

Layer 3

A dial session to the remote host is successful.

Layer 1

Open table as spreadsheet

4. 

A

Explanation:

A. Switches only evaluate layer 1-2 information. Routers look at layers 1-3, and the destination host examines all layers.

5. 

D

Explanation:

D. If you suspect an issue with the local protocol stack, pinging the loopback address will tell you if that is the problem.

6. 

B

Explanation:

B. Once you type in "no access-list number," the whole list is gone. And in this question, the LAN segment has no access-list effecting the connection to the Internet or anywhere else. B is the best answer. You cannot remove one line from an access-list unless you are using named access-lists.

7. 

C

Explanation:

C. In the election process of OSPF routers, the priority value is checked first; by default, all routers have a value of one. If a loopback interface is configured, the interface with the highest IP address is used. If there is no loopback interface, then the active interface with the highest IP address is used.

8. 

C, E

Explanation:

C, E. With STP disabled, the looped topology creates a broadcast storm. The router responds to the ARP request.

9. 

B

Explanation:

B. Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol that works at the Data Link layer.

10. 

D

Explanation:

D. A default route is created by assigning a static route with the destination and mask all set to zeros.

11. 

D

Explanation:

D. When a switch cannot ping or telnet any other hosts, including those on its own subnet, the most likely cause is a misconfiguration of the local IP information.

12. 

A, B

Explanation:

A, B. This is a standard static route. Because no administrative distance is specified, the default will be used.

13. 

B, C, D

Explanation:

B, C, D. The three possible trunking modes include on, which means the port is configured to always be a trunk port and attempts to make the port on the far end of the segment a trunk port as well. This negotiation of trunk status is done using the Dynamic Trunking Protocol (DTP). The next mode is desirable, which means the port wishes to be a trunk port and sends DTP frames, but can also be an access port. The other end is not a trunk port. The third mode is auto, which means the port becomes a trunk port if it receives DTP frames to become one; however, it does not send DTP frames to change the other port.

14. 

C, E, F

Explanation:

C, E, F. To answer this question, you must know the private address ranges. There is a range in each of the classes of addresses 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255. Any of the options in these ranges will not be routed on the Internet.

15. 

C

Explanation:

C. The question states that all hosts and servers are in the same VLAN, which implies that the server and the host can communicate without going through a router.

16. 

C

Explanation:

C. If spanning tree is not running when there are loops in the topology, broadcasts will cause broadcast storms.

17. 

E

Explanation:

E. Because no other routing is configured on the router, this static route will be the only entry in the routing table other than connected interfaces. The 192.168.24.124 host is within the address range specified in the static route.

18. 

F

Explanation:

F. There are two trunking encapsulation methods: ISL, which is Cisco propriety; and 802.1q, which is not proprietary. Use the command dot1q when using 802.1q.

19. 

D

Explanation:

D. A wildcard is always one less than the block size. The third octet has a block size of 8, and the fourth octet has a block size of 256. This makes the mask 0.0.7.255.

20. 

C

Explanation:

C. Feasible successor routes are stored in the topology table. They are not shown in the routing table.

21. 

D

Explanation:

D. When attaching directly to a router's interface without a hub or switch in the middle, a crossover cable must be used. You cannot telnet using your PC's COM port.

22. 

C, E, F

Explanation:

C, E, F. The three LMI types supported by Cisco routers are Cisco, ANSI, and Q933a.

23. 

C

Explanation:

C. The 172.16.208.0/22 subnetwork has hosts 172.16.208.1 through 172.16.211.254.

24. 

C

Explanation:

C. The subnet 192.168.5.32/28 has hosts 192.168.5.33 through 192.168.5.36.

25. 

B

Explanation:

B. All switches that share the same VLAN information need to have the same VTP domain name configured.

26. 

B, F

Explanation:

B, F. A is a subnetwork address, C is localhost, D is a multicast address, and E is a broadcast address. Only B and F are valid host addresses (all host bits are not all ones or zeros).

27. 

A, D, E

Explanation:

A, D, E. In this case, there is no router to route between the two VLANs, and thus your hosts should be able to ping only other hosts in the same VLAN. A and E show that hosts in one VLAN can ping hosts in the same VLAN on the other switch.

28. 

D

Explanation:

D. Only PPP meets all the requirements; dialup support, authentication, multiple layer-3 protocols, and callback are all supported by PPP.

29. 

C

Explanation:

C. The switch will learn the source MAC address from the frames that are received on the switchport.

30. 

E

Explanation:

E. Of the routing protocols listed, only EIGRP supports IPX. It also supports the other items listed in the question, as do B and D.

31. 

A

Explanation:

A. By default, all defined VLANs are allowed on configured trunk links.

32. 

C

Explanation:

C. Only a debug command can show you updates as they are sent and received. The correct command for RIP is debug ip rip.

33. 

D

Explanation:

D. If you do not have spanning-tree enabled on your switches, and you have redundant links, you will have broadcast storms and multiple frame copies.

34. 

B

Explanation:

B. A lower assigned priority always results in a switch being elected the root switch.

35. 

A, E

Explanation:

A, E. In order to ping, an IP must be resolved to a MAC address to properly frame the packet. This requires an ARP request. Additionally, a ping uses ICMP to generate a request and reply.

36. 

C

Explanation:

C. OSPF uses an inverse mask to configure the network statement. The mask in this example should be 0.255.255.255.

37. 

Explanation:

Access-group

Access to connected networks or resources

Console password

Access to the console 0 line

Enable secret

Access to privileged mode

VTY password

Remote access to device console

Service password-encryption

Viewing of passwords

Open table as spreadsheet

38. 

A

Explanation:

A. The access-class command is used directly on the VTY line to apply an access list.

39. 

C

Explanation:

C. This configuration register setting will cause the router to boot, ignoring the startup config. It is used in password recovery; however, if this register remains set, the router will always boot without checking for a startup config.

40. 

A, B, D

Explanation:

A, B, D. In order for VTP to work properly, all switches must be in the same VTP domain. Additionally, the switch that will share its VLAN configuration needs to be a VTP server, and the switches must be connected using trunk links.

41. 

B

Explanation:

B. This router interface is required to both access the Internet and route between VLANs.

42. 

A, D

Explanation:

A, D. By using the switchport port-security command, you can implement a security policy on your Catalyst switches.

43. 

A

Explanation:

A. In a case where split horizon is the problem, split horizon defines the rule "it is never useful to send routing information back in the direction from which it came." With this rule in place, routing updates that come from spoke routers are never relayed from the hub router. By implementing point-to-point links and subinterfaces on the spoke router, the routing protocol looks at each of the subinterfaces as separate physical links, allowing the updates to go between each point-to-point link and update the spoke routers.

44. 

A

Explanation:

A. These two VTP domain names do not match, and thus the switches cannot exchange VTP information.

45. 

C

Explanation:

C. The Spanning Tree Protocol is used to prevent loops in the layer-2 switching topology by controlling or blocking the use of redundant links. In a layer-2 network, redundant links are not a bad thing, unless they are uncontrolled, because they provide a secondary path if the primary fails, thus eliminating single points of failure.

46. 

A, E

Explanation:

A, E. When configuring OSPF to route on a network, the OSPF process must be started, using the router OSPF <process id> command. Then, while in the router configuration mode, you can use the network command to add a network and enable interfaces to operate in OSPF. The network command in OSPF includes the network, a wildcard bit mask, and the area to which you want the network to belong.

47. 

B

Explanation:

B. If inverse ARP is not operational, you must manually map the DLCI to upper-layer addresses.

48. 

A, C, E

Explanation:

A, C, E. OSPF supports VLSM, and through the use of areas, it can confine network instability to a single portion of the network. Additionally, it gives the administrator extensive control over routing updates.

49. 

Explanation:

Permitted

Source IP 207.16.13.14, destination application http

Permitted

Source IP 207.1614.7, destination port 80

Denied

Source IP 207.16.32.14, destination application: http

Denied

Source IP 207.16.15.9, destination port 23

Denied

Source IP 207.16.16.14, destination port 53

Open table as spreadsheet

50. 

C, D

Explanation:

C, D. RIP, IGRP and EIGRP are all configured that same way: with classful addresses, which means all default host bits off. In this question, two networks are using the 10.0.0.0 classful network address. If you are studying for your CCNA exam, it would be wise to understand this type of configuration.

51. 

C

Explanation:

C. The Frame Relay map statement is incorrect on RouterA. The other information is fine.

52. 

C

Explanation:

C. The VTP domain name must be the same on both switches in order for them to share VLAN information. In this case, the two switches have different VTP domain names.

53. 

A, C

Explanation:

A, C. When forwarding a packet, a router must switch the packet from one interface to another. In order to know which interface to switch the packet to, the router must perform path selection. Routers do not forward ARP requests, they do not assign VLAN membership, and they do not modify the destination host address (although they do read it to make the path-selection decision).

54. 

C

Explanation:

C. When the destination address is not in the forwarding table, a switch forwards the frame out all ports except the one on which it was received. This is called flooding the frame.

55. 

A, D

Explanation:

A, D. EIGRP maintains a neighbor table. If a router stops sending out updates, it is removed from the neighbor table. Additionally, all routes are kept in the topology table. Only preferred routes are surfaced to the routing table.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net