1 Top of Form
Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?
C, B, A, D
D, C, B, A
A, B, C, D
A, C, B, D
B, C, A, D
2 Top of FormWhich network statement would include the 172.20.64.0 /19 network in the OSPF routing process?
Router(config-router)# network 172.20.64.0 0.0.0.31 area 0
Router(config-router)# network 172.20.64.0 0.0.0.63 area 0
Router(config-router)# network 172.20.64.0 0.0.15.255 area 0
Router(config-router)# network 172.20.64.0 0.0.31.255 area 0
3 Top of FormWhich characteristic is associated with a floating static route?
always appears in the routing table
has an administrative distance of 0
is considered the primary route because of its low administrative distance
usually has an administrative distance greater than routes learned from a dynamic routing protocol
4 Top of FormWhich address is used to access a switch from a remote location in order to make configuration changes?
the default gateway that is configured on the switch
the IP address of the management VLAN interface on the switch
the default gateway that is configured on the management workstation
the IP address configured on the VTY line that is used to establish an incoming connection to the switch
5 Top of Form
Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements?
R2: Fa0/0 inbound
R1: S0/1/0 outbound
R1: S0/0/1 inbound
R2: S0/0/1 outbound
R2: Fa0/0 outbound
6 Top of FormWhat will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.)
0.0.0.0
255.255.240.0
255.255.255.255
0.0.31.255
255.255.255.240
0.0.0.31
7 Top of FormWhat are two characteristics of EIGRP? (Choose two.)
It supports a maximum hop count of 15.
It sends small hello packets to maintain knowledge of its neighbors.
It forwards complete routing tables in its updates to neighboring routers.
It supports equal and unequal cost load balancing.
It supports only one network layer protocol.
8 Top of FormWhich feature of RSTP differentiates it from STP?
PortFast
UplinkFast
active topology
five port states
9 Top of Form
Refer to the exhibit. Which rows of numbers represent the correct subnet masks necessary to accommodate the hosts on the network?
1, 2, 4, 5
1, 2, 5, 8
1, 5, 6, 7
2, 3, 4, 8
2, 4, 5, 6
10 Top of Form
Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be most specific?
172.16.0.0/21
172.16.4.0/21
172.16.0.0/22
172.16.4.0/22
11 Top of FormWhat is the purpose of assigning an IP address to a Layer 2 switch?
to allow in-band management
to provide inter-VLAN connectivity
to facilitate election of a root bridge
to configure a default gateway for the network
12 Top of Form
Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch?
VTP version mismatch
VTP domain name mismatch
VTP revision number mismatch
time synchronization problems
13 Top of FormAn administrator wants to configure a new Cisco Catalyst 2960 switch in order to manage the switch remotely. After configuring the vty lines to allow login, which set of commands should the administrator enter?
Switch(config)# line console 0Switch(config-line)# password ciscoSwitch(config-line)# loginSwitch(config-line)# exit
Switch(config)# interface vlan 1Switch(config-if)# ip address 192.168.1.5 255.255.255.0Switch(config-if)#exit
Switch(config)# line console 0Switch(config-line)# password ciscoSwitch(config-line)# loginSwitch(config-line)# exitSwitch(config)# ip default-gateway 192.168.1.1
Switch(config)# interface vlan 1Switch(config-if)# ip address 192.168.1.5 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# exitSwitch(config)# ip default-gateway 192.168.1.1
14 Top of FormWhich device or component is located at the customer premises and provides the clocking signal for the customer router on a WAN circuit?
DTE serial interface
CSU/DSU
central office switch
internal clock on the router
patch panel at the point of demarcation
15 Top of Form
Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?
D 192.168.0.0/24 is a summary, Null0
D 192.168.0.0/22 is a summary, Null0
D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0
D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0
16 Top of FormWhat are two WAN protocols that define parameters for data encapsulation? (Choose two.)
PPP
V.35
X.21
HDLC
EIA/TIA-232
17 Top of Form
Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.
How can the administrator solve this problem?Enable the Serial0/0/0 interface of R2.
Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using RIPv2.
Configure a default route on the ISP via Serial0/0/0.
Configure the correct subnet mask on the Serial0/0/0 interface of R2.
18 Top of Form
Refer to the exhibit. Identify the path the frames will take from PC1 to PC2 in an OSPF network.R1, R5
R1, R3, R5
R1, R4, R5
R1, R2, R3, R5
19 Top of Form
Refer to the exhibit. All routers are configured to use the OSPF protocol with default settings. Which router will act as the BDR if all routers start at the same time?
R1
R2
R3
R4
20 Top of FormWhat is the difference between the passive and active route status as displayed in an EIGRP topology table?
Routes that are passive are never updated.
Routes that are active are used to forward data.
Routes that are active are being recalculated by DUAL.
Routes that are passive are waiting for the neighbor adjacency process to complete.
21 Top of FormA network administrator is creating an addressing scheme and has determined that the company network 192.168.1.0/24 will require 8 subnets with at least 25 hosts on each subnet. Which subnet mask will meet these requirements?
/25
/26
/27
/28
/29
22 Top of Form
Refer to the exhibit. The network administrator has just configured a default route on the HQ router. What two statements describe what must happen so that all routers in the OSPF network have a route to the Internet? (Choose two.)
The gateway of last resort must be set on each OSPF router.
HQ will automatically propagate the default route to every other OSPF router.
HQ will send the default route information to the DR and BDR for distribution to the other routers.
Each router must be configured with a static route to the 64.104.22.16/28 network.
HQ must be configured with the default-information originate command.
Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in the OSPF configuration.
23 Top of FormWhich software is typically used on a remote PC to access the enterprise through the Internet via a secure tunnel?
Telnet client
VPN client
FTP client
web browser
24 Top of Form
Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?
Router B has EIGRP adjacencies with both router A and C.
Router B has a fully converged topology table.
Router B has not formed an adjacency with router A.
Router B has not formed an adjacency with router C.
25 Top of Form
Refer to the exhibit. A technician is unable to telnet from PC1 to R1. What can the technician do to resolve the problem?
Create a password for vty access on R1.
Change the IP address on interface Fa0/0 on R1.
Apply the access-class inbound on the Fa0/0 interface of R1.
Apply the access-class outbound on the vty 0 4 interfaces of R1.
26 Top of Form
Refer to the exhibit. Routers R1 and R2 have formed an adjacency, but R3 has no OSPF adjacencies. Based on the R3 configuration, what is the cause of the problem?
The wildcard mask is incorrect for the OSPF network.
The IP addressing scheme on R3 is configured incorrectly.
The OSPF routing configuration on router R3 is missing a network statement.
There is no problem in the configuration. All routers need to converge to solve the issue.
27 Top of Form
Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)
There is a routing loop occurring between all three routers.
There is a network statement missing.
Network 172.30.20.0 has an incorrect wildcard mask.
The OSPF area configuration is incorrect.
/23 is an invalid subnet mask for the 192.168.0.0 network.
28 Top of FormWhat are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)
172.16.0.255
172.16.16.16
172.16.127.127
172.16.128.1
172.17.1.1
172.18.1.1
29 Top of FormIn order for a VLAN to be created on a switch, what configuration parameter is required?
VTP domain name
VLAN number
VLAN IP address
VLAN database name
30 Top of Form
Refer to the exhibit. An access list contains the four statements that are shown. Which single access list statement will have exactly the same effect?
access-list 10 permit 192.168.10.0 0.0.0.15
access-list 10 permit 192.168.10.0 0.0.0.127
access-list 10 permit 192.168.10.0 0.0.0.191
access-list 10 permit 192.168.10.0 0.0.0.25531 Top of Form
Which configurable variable is used to determine the election of a spanning tree root bridge?lowest bridge priority
lowest native VLAN ID
highest VTP revision number
highest management VLAN IP address
32 Top of Form
Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?
The IP address is already in use.
The technician is using a network address.
The technician is using the wrong subnet mask for /26.
The technician must enable VLSM on the interface.
33 Top of Form
Refer to the exhibit. Router1 and Router2 are both running RIPv2 with autosummarization disabled. Which subnet mask will Router1 associate with network 192.168.4.16/28?
255.255.0.0
255.255.240.0
255.255.255.0
255.255.255.240
255.255.255.248
34 Top of Form
Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP network fails to converge?
The network commands have been incorrectly issued on both routers.
Both routers have been configured with the same autonomous number.
The wildcard masks have been incorrectly configured on both routers.
Autosummarization is enabled on both routers.
35 Top of FormWhich type of distance vector routing mechanism helps prevent the formation of loops by preventing routing information from exiting a router interface through the same interface on which it was received?
split horizon
hold-down timer
poisoned reverse
setting maximum hop count
36 Top of FormWhat do companies gain from the services performed at the enterprise edge?
faster communication with server farms
stronger security against malicious attacks
faster communication with Internet destinations
enhanced performance and reliability through VLANs and redundant trunk links
37 Top of FormWhat are two features of an extended IP ACL? (Choose two.)
It uses numbers 1 through 99 for identification.
It can permit or deny traffic based on source or destination address.
It detects malicious attacks against the network and logs them on a server.
It can filter traffic based on the protocol and port numbers.
It encrypts traffic between hosts.
38 Top of FormWhich Frame Relay component provides connection status information about PVCs in the network?
CIR
LMI
DLCI
FECN
39 Top of Form
Refer to the exhibit. A packet with a destination IP address of 192.168.1.22 has entered router R1. How will this packet be routed?
It will be dropped.
It will be routed out interface Serial0/0/1.
It will be routed out interface Serial0/0/0.
It will be routed out interface FastEthernet0/0.
40 Top of Form
Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?
R1
R2
R3
ISP
41 Top of Form
Refer to the exhibit. EIGRP has been configured on all routers in the network. Based on the outputs from the show ip route commands on R1 and R2, how will the routers process traffic from Host2 to the hosts on the 172.16.11.0/24 and 172.16.12.0/24 networks?
The traffic will reach the destination networks.
Traffic will be dropped by R2 because the gateway of last resort is not set.
The traffic will reach the Null interface on router R1 where it will be dropped.
Because EIGRP does not support discontiguous networks, the traffic from R1 will not reach R2.
42 Top of Form
Refer to the exhibit. What is the correct description of the highlighted address?It is the address of the destination network.
It is the routerID of the neighboring router.
It is the next hop address of the feasible successor.
It is the IP address of the serial0/0/0 interface of RouterC.
43 Top of Form
Refer to the exhibit. Which two statements are correct about the VTP configuration on S2? (Choose two.)The default mode is used.
The default domain name is used.
A new client mode switch in the CISCO domain would receive updates from S2.
S2 would not update a new client mode switch whose VTP revision number is 3.
S2 will share VLAN database updates with a switch that is configured with VTP version 1.
44 Top of Form
Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses? (Choose two.)
192.168.1.1
192.168.1.2
198.133.219.1
198.133.219.102
198.133.219.103
45 Top of FormHow does CHAP secure connectivity on a PPP link?
It uses a two-way handshake to send the username and password.
It encrypts user data that is sent across the link.
It designates the remote node to control the frequency and timing of the login attempts.It authenticates the username and password during initial link establishment and repeatedly during the time the link is active.
46 Top of FormWhich two items of information would be contained in an EIGRP topology table? (Choose two.)
the reported distance of the successor
the next hop IP address for the feasible successor
the hop count for the route to a particular destination
the administrative distance that is associated with the route
the amount of time since an adjacency was established
47 Top of FormWhich two statements correctly describe RIPv1 and RIPv2? (Choose two.)
Both broadcast their entire routing table from all participating interfaces to 255.255.255.255.
Both advertise their routing updates out all active interfaces every 30 seconds.
Both have the same administrative distance value of 120.
Both can turn off automatic summarization.
Both support VLSM and CIDR.
48 Top of FormWhich two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)
to set the duplex mode of a redundant link
to activate looped paths throughout the network
to determine the root bridge
to prevent loops by sharing routing tables between connected switches
to determine which ports are placed in forwarding mode
49 Top of Form
Refer to the exhibit. Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A to access host B?
192.168.1.32/26
192.168.1.64/26
192.168.1.126/26
192.168.1.129/26
50 Top of Form
Refer to the exhibit. A network administrator is configuring an ACL. Which statement is true about the effect of the ACL?
A host with the IP address 192.168.10.22 is allowed to access the FTP server that has the IP address 172.17.2.240.A host with the IP address 192.168.10.42 is allowed to access the FTP server that has the IP address 172.17.2.241.A host with the IP address 192.168.10.12 is allowed to access the web server that has the IP address 172.17.2.242.A host with the IP address 192.168.10.52 is allowed to have SSH access to the server that has the IP address 172.17.2.240.
51 Top of Form
Which statement is true about ACLs that are applied to VTY lines on Cisco routers?ACLs can be used to encrypt VTY transmissions.
ACLs are applied using the access-class command.
When ACLs are applied to VTY lines, the VTY password should be removed.The ACL provides the flexibility for a specific user to login remotely from different locations with any IP address.
52 Top of FormIf a modem is being used to connect to an ISP, which WAN connection type is being used?
leased line
cell switched
circuit switched
packet switched