36610259 Practice Exam

34
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0) T o p o f F o r m B o tt o m o f F o r m 4463996 Time Remaining:

Transcript of 36610259 Practice Exam

Page 1: 36610259 Practice Exam

Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

Top of Form

Bottom of Form

4463996

Time

Remaining:

Page 2: 36610259 Practice Exam

1 Top of Form

Refer to the exhibit. The network administrator enters the command that is shown in the exhibit and then issues the show ip route command. The route added by the network administrator is missing from the routing table. What is the reason for this?

This static route is providing a backup to the existing route to 192.168.1.0 /24.

The route is incorrectly configured.

Dynamic updates are always preferred over static routes.

The FastEthernet0/0 interface is administratively down.

Bottom of Form

2 Top of Form

Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved?

Page 3: 36610259 Practice Exam

Configure dynamic NAT instead of PAT.

Configure the access list for the correct network.

Include the ip nat pool command in the configuration.

Configure the ip nat inside command on the correct interface.

Bottom of Form

3 Top of Form

Refer to the exhibit. Routers R1 and R2 cannot communicate. What could be the cause of the problem?

Usernames on both routers R1 and R2 are misconfigured.

The passwords are identical on both routers.

The encapsulation command is entered incorrectly.

The IP addressing scheme has incorrect subnet masks.

Bottom of Form

4 Top of Form

Page 4: 36610259 Practice Exam

Refer to the exhibit. Which two facts can be determined from the output? (Choose two.)

The router ID of R2 is 192.168.100.65.

R2 has established adjacencies with three routers.

R2 is not receiving hellos from neighbor 192.168.100.66.

R2 is connected to an Ethernet network that consists of two routers.

Neighbor 192.168.100.3 will become the DR if the current DR becomes unavailable.

Bottom of Form

5 Top of Form

Page 5: 36610259 Practice Exam

Refer to the exhibit. What is the administrative distance for OSPF routes?

0

1

65

110

120

128

Bottom of Form

6 Top of Form

Which statement describes a PVC?

A PVC provides a permanent logical connection to forward data between two points.

A PVC is dynamically established when a router requests a transmission.

A PVC prevents small messages from being held up behind larger messages.

A PVC requires call set-up information to be sent before transmitting any data.

Page 6: 36610259 Practice Exam

Bottom of Form

7 Top of Form

A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?

VPN

Frame Relay

PPP with CHAP authentication

PPP with PAP authentication

Bottom of Form

8 Top of Form

What are two characteristics of a static route? (Choose two.)

A static route can be used by border routers to provide secure and stable paths to the ISP.

By default, a static route is more secure than dynamic routing.

A static route automatically adapts to topology changes.

A static route can only be used with classful addressing schemes.

A static route creates processing overhead in a large network.

Bottom of Form

9 Top of Form

What is one major difference between RIPv1 and RIPv2?

RIPv2 has a higher maximum hop count than RIPv1.

RIPv1 utilizes broadcasts. RIPv2 utilizes multicasts.

RIPv1 supports discontiguous networks. RIPv2 does not.

RIPv1 updates are exchanged more often than RIPv2 updates.

Bottom of Form

10 Top of Form

Page 7: 36610259 Practice Exam

Refer to the exhibit. The network administrator wants to restrict the Production network from accessing the HR network. All other traffic will have access to all networks. Which combination of interface and direction should the administrator use to apply the ACL?

Fa0/1, out

Fa1/0, out

Fa0/1, in

Fa1/0, in

Bottom of Form

11 Top of Form

Page 8: 36610259 Practice Exam

Refer to the exhibit. OSPF has been configured on all routers. What is the DR/BDR status immediately after all routers have converged?

R1 is the DR. R3 is the BDR.

R2 is the DR. R5 is the BDR.

R3 is the DR. R4 is the BDR.

R4 is the DR. R5 is the BDR.

R5 is the DR. R2 is the BDR.

Bottom of Form

12 Top of Form

Page 9: 36610259 Practice Exam

Refer to the exhibit. Workstation H1 is unable to reach the Internet. A network technician issues a ping command to troubleshoot the problem. Based on the results of the commands that are shown, what could be the cause of the problem?

The default gateway on H1 is incorrect.

The IP address on H1 is incorrect.

The subnet mask on H1 is incorrect.

The Fa0/0 IP address on the router is incorrect.

The VLAN IP address on the switch is incorrect.

Bottom of Form

13 Top of Form

Page 10: 36610259 Practice Exam

Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem?

Configure a default route on R3 and propagate it via the use of RIPv2 to all routers.

Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3.

Configure a default route on the ISP, and it will be automatically propagated to all routers.

Configure a default route on R1, and it will be automatically propagated to all routers.

Bottom of Form

14 Top of Form

What are two features of a standard IP ACL? (Choose two.)

It permits or denies access based on the entire protocol.

It filters the packet based on the source IP address only.

It uses identification numbers between 100 and 199.

Page 11: 36610259 Practice Exam

It can filter traffic based on port number.

It can only filter inbound traffic on an interface.

Bottom of Form

15 Top of Form

Refer to the exhibit. A network technician is attempting to manage a switch that has an IP address that has been assigned to the default management VLAN. What is a possible reason that the Telnet session fails from a PC connected to a port that is assigned to VLAN 10?

The incorrect encapsulation command is used.

There is no encapsulation dot1q 1 configuration on the FastEthernet 0/0 port.

The default gateway address of the switch must be in the same network as the PC.

There is no subinterface associated with the default management VLAN on the switch.

Bottom of Form

Top of Form

Showing 1 of 4 <Prev Page:

1Next>

Bottom of Form

Page 12: 36610259 Practice Exam

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks. Top of Form

1

Bottom of Form

Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

Page 13: 36610259 Practice Exam

Top of Form

Bottom of Form

4365444

Time

Remaining:

16 Top of Form

A router in a fully converged EIGRP network detects that a remote route is unreachable. Which two events may occur next? (Choose two.)

EIGRP will look for a feasible successor in the routing table.

DUAL will calculate the highest cost routes to each network.

EIGRP will send a bounded update to alert neighbors about the failure.

The router will forward the complete routing table to the neighboring routers.

DUAL will look for a feasible successor route in the topology table and, if one is found, it will add this route to the routing table.

Bottom of Form

17 Top of Form

When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.)

The key passes between routers in plain text.

The key is used to help generate an encrypted number for authentication.

The key passes between routers in encrypted form.

Page 14: 36610259 Practice Exam

The key is never transmitted.

The key can be captured by using a packet sniffer.

Bottom of Form

18 Top of Form

While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the network configuration. How many host addresses can be created for each subnetwork in this addressing scheme?

510

512

1022

1024

Bottom of Form

19 Top of Form

Refer to the exhibit. The routing protocols are configured with their default settings. Which two statements are true about the path or paths that R1 will choose to the 192.168.2.0/24 network? (Choose two.)

If only EIGRP is configured on the network, only the path R1->R3 will be installed in the routing table.

If OSPF and RIPv2 are both configured on the network, only OSPF paths will be installed in the routing table.If EIGRP and OSPF are both configured on the network, only EIGRP paths will be installed in the routing table.If EIGRP and RIPv2 are both configured on the network, only RIPv2 paths will be installed in the routing table.

Page 15: 36610259 Practice Exam

If RIPv2 is the routing protocol, the two equal cost paths (R1-R2-R3 and R1-R4-R3) will be installed in the routing table.

Bottom of Form

20 Top of Form

Where are EIGRP successor routes stored?

only in the routing table

only in the neighbor table

in the routing table and the topology table

in the routing table and the neighbor table

Bottom of Form

21 Top of Form

A network administrator is configuring an edge router to support external access to several internal web servers that have private IP addresses. Which type of address resolution would be appropriate for this scenario?

PAT

static PAT

static NAT

dynamic NAT

Bottom of Form

22 Top of Form

What is the function of Inverse ARP in a Frame Relay network?

It maps the IP address to the MAC address.

It maps the MAC address to the DLCI.

It maps the DLCI to the remote IP address.

It maps the local IP address to the remote MAC address.

Bottom of Form

23 Top of Form

What can be done to reduce the impact of a failure domain?

Create a single local network on a central switch.

Page 16: 36610259 Practice Exam

Move wired users to a more reliable wireless network.

Add redundant devices to key positions within the network.

Add more VLANs to each switch and assign fewer users per VLAN.

Bottom of Form

24 Top of Form

Refer to the exhibit. Server7 has been added to the server farm network. The hosts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7 cannot ping the other servers connected to the switch. What is the cause of this problem?

The Fa0/1 port on the switch should be in access mode.

The switch IP address is not on the same subnet as Server7.

The switch port used for Server7 is not in the same VLAN as Server2 and Server3.

The Fa0/0 interface of the router has not been configured for subinterfaces to support inter-VLAN routing.

Bottom of Form

25 Top of Form

Page 17: 36610259 Practice Exam

Refer to the exhibit. What is the purpose of assigning the IP address 192.168.30.1 to an access layer switch?

to assign a default gateway to the hosts that are connected to the switch

to allow hosts on the same LAN to connect to each other

to allow remote management of the switch

to allow inter-VLAN communication

Bottom of Form

26 Top of Form

Refer to the exhibit. An administrator sees this error message after entering commands to configure a router interface. Which command could the administrator enter that would avoid the error?

Router(config-if)# ip address 192.168.4.0/24

Router(config-if)# ip address 192.168.4.1 255.255.255.0

Router(config-if)# ip address 192.168.4.0 255.255.255.240

Router(config-if)# ip address 192.168.4.255 255.255.255.0

Bottom of Form

27 Top of Form

A network administrator wishes to log ACL messages on a remote server. Which two procedures should be completed for the remote logging to be successful? (Choose two.)

Configure logging to a syslog server IP address.

Page 18: 36610259 Practice Exam

Configure logging to the router loopback IP address.

Ensure that logging to the console is configured.

Apply the terminal monitor command on the router.

Restrict remote access by applying an ACL to all VTY lines.

Verify that the clock is set to the correct date, time, and time zone.

Bottom of Form

28 Top of Form

Refer to the exhibit. An administrator is adding a new router to the network. The IP address 192.168.13.6/30 has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router?

192.168.13.4/30

192.168.13.5/30

192.168.13.7/30

192.168.13.58/30

192.168.13.61/27

192.168.13.63/27

Bottom of Form

29 Top of Form

A journalist is using a wireless connection to transmit a video clip. Which is the best protocol to use to transport

Page 19: 36610259 Practice Exam

the video packets?

TCP

UDP

PPP

HDLC

Bottom of Form

30 Top of Form

Refer to the exhibit. EIGRP has been configured on all routers in the network. Based on the outputs from the show ip route commands on R1 and R2, how will the routers process traffic from Host2 to the hosts on the 172.16.11.0/24 and 172.16.12.0/24 networks?

The traffic will reach the destination networks.

Traffic will be dropped by R2 because the gateway of last resort is not set.

The traffic will reach the Null interface on router R1 where it will be dropped.

Page 20: 36610259 Practice Exam

Because EIGRP does not support discontiguous networks, the traffic from R1 will not reach R2.

Bottom of Form

Top of Form

Showing 2 of 4 <Prev Page:

2Next>

Bottom of Form

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks. Top of Form

2

Bottom of Form

Close Window

Assessment System

Page 21: 36610259 Practice Exam

1. Assessment

Selection 2. Assessment

Settings 3. Take

Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

Top of Form

Bottom of Form

4303577

Time

Remaining:

31 Top of Form

Page 22: 36610259 Practice Exam

Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address?

192.168.0.0/22

192.168.0.0/23

192.168.0.0/24

192.168.0.0/25

Bottom of Form

32 Top of Form

Page 23: 36610259 Practice Exam

Refer to the exhibit. The command that is displayed was run on a switch with 24 FastEthernet ports. Why are some ports missing from VLAN1?

The missing ports are administratively down.

The missing ports are not configured for STP.

The missing ports are not connected to any active device.

The missing ports are configured for trunk ports.

Bottom of Form

33 Top of Form

Which three IP addresses are valid host addresses in the 10.200.0.0/20 network? (Choose three.)

10.200.11.69

10.200.16.1

10.200.0.255

10.201.0.55

10.200.15.240

10.200.30.29

Bottom of Form

34 Top of Form

Page 24: 36610259 Practice Exam

Refer to the exhibit. Which IP addressing scheme would be correct for the network?H1-172.18.0.10/16H2-172.18.0.11/16 H3-172.18.0.12/16H1-172.18.0.10/16H2-172.19.0.10/16H3-172.18.0.11/16H1-172.18.0.10/16 H2-172.18.0.11/16 H3-172.19.0.11/16H1-172.18.0.10/16 H2-172.19.0.11/16H3-172.19.0.11/16

Bottom of Form

35 Top of Form

Refer to the exhibit. Which VTP function will this switch perform?

Page 25: 36610259 Practice Exam

It will create, change and share local VLAN information with other switches in the XYZ domain.

It will forward to other switches the VLANs that are created in Switch1.

It will back up the VTP database for domain XYZ.

It will forward VTP configuration information for domain XYZ.

Bottom of Form

36 Top of Form

Which type of distance vector routing mechanism helps prevent the formation of loops by preventing routing information from exiting a router interface through the same interface on which it was received?

split horizon

hold-down timer

poisoned reverse

setting maximum hop count

Bottom of Form

37 Top of Form

Which two STP states allow a switch to learn MAC addresses? (Choose two.)

blocking

listening

learning

disabled

forwarding

Bottom of Form

38 Top of Form

Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)

LCP tests the quality of the link.

LCP manages compression on the link.

Only a single NCP is allowed between the two routers.

NCP terminates the link when data exchange is complete.

Page 26: 36610259 Practice Exam

With CHAP authentication, the routers exchange plain text passwords.

Bottom of Form

39 Top of Form

Refer to the exhibit. The network administrator has just configured a default route on the HQ router. What two statements describe what must happen so that all routers in the OSPF network have a route to the Internet? (Choose two.)

The gateway of last resort must be set on each OSPF router.

HQ will automatically propagate the default route to every other OSPF router.

HQ will send the default route information to the DR and BDR for distribution to the other routers.

Each router must be configured with a static route to the 64.104.22.16/28 network.

HQ must be configured with the default-information originate command.

Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in the OSPF configuration.

Bottom of Form

40 Top of Form

What is considered a best practice when configuring ACLs on vty lines?

Use only extended access lists.

Page 27: 36610259 Practice Exam

Place identical restrictions on all vty lines.

Apply the ip access-group command inbound.

Remove the vty password since the ACL restricts access to trusted users.

Bottom of Form

41 Top of Form

Refer to the exhibit. EIGRP has been configured for all routers in the topology. For the network 10.1.2.0/24, which value represents the reported distance of the feasible successor?

256

532

768

1280

Bottom of Form

42 Top of Form

Page 28: 36610259 Practice Exam

Refer to the exhibit. Host H2 and host H3 are able to ping the default gateway but cannot ping host H1. Host H1 cannot ping either the default gateway, host H2, or host H3. The network technician issues the show interfaces command on switch S1 and notes that all unused switch ports are administratively down and ports Fa0/1, Fa0/3, and Fa0/4 are up with their line protocol up. However, S1 port Fa0/2 is shown as down with the line protocol down error (disabled). What is a possible cause for the inability of H1 to communicate with the network?

Routing is misconfigured on router R1.

The default gateway on H1 was misconfigured.

Host H1 is on a different subnet than hosts H2 and H3.

Port security on switch S1 port Fa0/2 is misconfigured.

The administrative VLAN on switch S1 does not have an IP address assigned.

Bottom of Form

43 Top of Form

What are two advantages of using CHAP instead of PAP? (Choose two.)

less router overhead

more secure authentication

immunity from replay attacks

automatically configured usernames

Page 29: 36610259 Practice Exam

support for both IP and non-IP based protocols

Bottom of Form

44 Top of Form

Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trunk link that has been tested and is working properly. Why is VTP unable to propagate VLANs from one switch to the other?

The revision number is different on both switches.

Both switches are in server mode.

The VTP domain name is different on both switches.

The VTP pruning mode is disabled.

Bottom of Form

45 Top of Form

A company requests the service of an ISP for Internet access. Which device is needed to connect the company router to the ISP by a T1 or E1?

CSU/DSU

Page 30: 36610259 Practice Exam

DMZ router

DMZ switch

web server

Bottom of Form

Top of Form

Showing 3 of 4 <Prev Page:

3Next>

Bottom of Form

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks. Top of Form

3

Bottom of Form

Close Window

Assessment System

Page 31: 36610259 Practice Exam

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

Top of Form

Bottom of Form

4229334

Time

Remaining:

46 Top of Form

Page 32: 36610259 Practice Exam

Refer to the exhibit. Which access list, when applied inbound to the Fa0/0 interface of router R1, will prevent all IP traffic from the 172.16.1.16 network from entering the 172.16.1.32 network while allowing all other traffic?

access-list 101 deny tcp 172.16.1.16 0.0.0.7 172.16.1.32 0.0.0.15access-list 101 permit ip any anyaccess-list 101 deny ip 172.16.1.16 0.0.0.15 172.16.1.32 0.0.0.7access-list 101 permit ip any anyaccess-list 10 deny ip 172.16.1.0 0.0.0.255 172.16.1.32 0.0.0.255access-list 10 permit tcp any anyaccess-list 101 deny tcp 172.16.1.16 0.0.0.15 172.16.1.32 0.0.0.7access-list 101 permit ip any any

Bottom of Form

47 Top of Form

Which protocol is a classful routing protocol?

BGP

EIGRP

OPSF

RIPv1

RIPv2

Bottom of Form

48 Top of Form

Which two statements are true when comparing RIP and EIGRP? (Choose two.)

Page 33: 36610259 Practice Exam

Both RIP and EIGRP support equal cost load balancing.

Both RIP and EIGRP can run on Cisco and non-Cisco routers.

RIP supports a maximum hop count of 15 while EIGRP supports up to 255 hops.

By default RIP summarizes networks at the classful boundary while EIGRP does not.

Routes learned via RIP have a lower administrative distance than those learned via EIGRP.

Bottom of Form

49 Top of Form

Refer to the exhibit. A network administrator is configuring an ACL on router R1. The purpose of the ACL is to ensure that traffic from the Internet will only be allowed if it is in response to a request that is initiated from the internal network. However, after the ACL has been applied, internal users report that they cannot visit external web sites. What can be done to solve this problem?

Remove the deny any any statement.

Apply the ACL to the serial 0/0/0 interface inbound.

Consolidate all internal computers into one network.

Page 34: 36610259 Practice Exam

Add a permit tcp any any eq www statement to the top of the ACL.

Bottom of Form

50 Top of Form

Refer to the exhibit. A network administrator is configuring an ACL. Which statement is true about the effect of the ACL?

A host with the IP address 192.168.10.22 is allowed to access the FTP server that has the IP address 172.17.2.240.A host with the IP address 192.168.10.42 is allowed to access the FTP server that has the IP address 172.17.2.241.A host with the IP address 192.168.10.12 is allowed to access the web server that has the IP address 172.17.2.242.A host with the IP address 192.168.10.52 is allowed to have SSH access to the server that has the IP address 172.17.2.240.

Bottom of Form

Top of Form

Showing 4 of 4 <Prev Page:

4Next>

Bottom of Form

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks. Top of Form

4

Bottom of Form