Wednesday, August 13, 2008

CCENT Practice Certification Exam # 1

CCENT Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0)
1. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

==to identify missing segments at the destination

==to reassemble the segments at the remote location

to specify the order in which the segments travel from source to destination

to limit the number of segments that can be sent out of an interface at one time

to determine if the packet changed during transit

2. Which three statements characterize UDP? (Choose three.)

==UDP provides connectionless, fast transport of data at Layer 4.

UDP provides connection-oriented, fast transport of data at Layer 3.

==UDP relies on application layer protocols for error detection.

==UDP works well when an application does not need to guarantee delivery of data.

UDP relies on IP for error detection and recovery.

UDP provides sophisticated flow control mechanisms.

3. Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?






















4. Which layer of the OSI model defines logical addressing?

application

presentation

session

transport

==network

data link

5. Which device connects a local LAN to a geographically separate network?

switch

hub

==router

bridge

6. Refer to the exhibit. Router1 receives packets addressed as follows:
Source IP address: 192.168.1.88
Destination IP address: 172.16.0.3
Source MAC address: 00-11-12-7a-41-10
Destination MAC address: 00-11-5c-cc-a9-c0
Source Port: 1464
Destination Port: 23
Assuming that Router1 has not been configured with NAT, what will happen to the packets?


The packets will be sent to the server because it is a server-based port.

The packets will be sent to Switch2 and not leave the switch because the packets are local.

The packets will be sent to the laptop host.

==The packets will be sent to Router1 and dropped because private addresses are not transmitted across the Internet.

The packets will be sent to Router2 and dropped because the server is not directly attached.

7. Refer to the exhibit. If host 1 was to send an HTTP request to the web server that connects to Router2, what type of Layer 2 frame would be sent between Router1 and the ISP?


a frame with a header that contains the port number of 80

==a frame with a header and trailer, but no MAC addresses

a frame with a header and a trailer that only contains IP addresses

a frame with the host 1 MAC address as the source and Router1 MAC address as the destination

a frame with the host 1 MAC address as the source and the server MAC address as the destination

8. A company needs to connect an office router to a service provider to access a WAN. What device is needed to connect the router to the ISP if the service provider supplies a T1 line for the connection?

==a CSU/DSU

a cable modem

a DSL router

a DTE device

an SLA device

9. Refer to the exhibit. A technician applies the configuration in the exhibit to an unconfigured router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?


enable password class
line console 0
password ccna

enable secret cisco
enable password class
line console 0
password ccna

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna

enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

==enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

10. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?


DD:DD:DD:DD:DD:DD

172.168.10.99

CC:CC:CC:CC:CC:CC

172.168.10.65

==BB:BB:BB:BB:BB:BB

AA:AA:AA:AA:AA:AA

11. Refer to the exhibit. What two facts can be determined from the output of the ping command? (Choose two.)


There was a destination unreachable error.

The packet type was unknown.

==One packet timed out.

The ping was interrupted.

==Four packets of data were successfully received.

The packet TTL was exceeded.

12. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?


only host D

only router R1

only hosts A, B, and C

only hosts A, B, C, and D

only hosts B and C

==only hosts B, C, and router R1

13. Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode?


Cisco

class

password

==cisco

14. Refer to the exhibit. Switch1 has only the following commands added to a default Cisco 2960 configuration:
enable secret cisco
line vty 0 4
password Kn0ckkn-cK
login
interface vlan 1
ip address 10.0.1.8 255.255.255.0
no shutdown
Assume that routing between networks is functioning properly and that Switch2 has been properly configured for remote access. What would the result be if the telnet 10.0.2.2 command is issued from Switch1 privileged mode?


The following prompt would appear:
User Access Verification
Password:

Switch2 would return a destination unreachable message to Switch1.

Router1 would return a destination unreachable message to Switch1.

==The packet would be dropped.

15. What caused the following error message to appear?
01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state
01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.
01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down
01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down

Another switch was connected to this switch port with the wrong cable.

An unauthorized user tried to telnet to the switch through switch port Fa0/8.

NAT was enabled on a router, and a private IP address arrived on switch port Fa0/8.

A host with an invalid IP address was connected to a switch port that was previously unused.

==Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8.

16. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?

show SSH connected hosts

disconnect SSH connected hosts

create a public and private key pair

show active SSH ports on the switch

access the SSH database configuration

17. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)

==There are no collisions in full-duplex mode.

==A dedicated switch port is required for each node.

Hub ports are preconfigured for full-duplex mode.

The host network card must detect the availability of the media before transmitting.

==The host network card and the switch port must both be in full-duplex mode.

18. Refer to the exhibit. If all the switches have a default configuration, how many broadcast domains are in the network?


1

==2

3

4

5

14

19.


20. Refer to the exhibit. The devices have been configured with static IP addresses as shown. All hosts can communicate with each other but none of the hosts can communicate with the server. What is the cause of this problem?


==The IP address that is assigned to the server is in an incorrect subnet.

The IP address that is assigned to the server is a broadcast address.

The IP address that is assigned to the server is a network address.

The switch to which the server is connected has not been assigned an IP address.

The RouterB LAN interface is incorrectly addressed in the RouterA LAN subnet.

21. A network host has the IP address 10.250.206.55/20. How many more network devices can be added to this same subnetwork?

253

509

1021

2045

==4093

22. Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host?

port-based NAT

==static NAT

dynamic NAT

NAT overload

23. Refer to the exhibit. Which two addresses are "inside global" addresses? (Choose two.)


192.31.7.3

64.40.1.5

==198.133.219.35

192.31.7.2

==198.133.219.44

64.40.1.4

192.31.7.1

24. Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.)

192.168.200.87

194.10.10.104

==223.168.210.100

==220.100.100.154

200.152.2.160

==196.123.142.190

25. The router receives a packet with the destination address of 172.16.30.79/22. To which subnetwork does this packet belong?

172.16.30.0/22

172.16.30.64/22

172.16.30.76/22

==172.16.28.0/22

172.16.28.56/22

172.16.0.0/22

26. Refer to the exhibit. What is the broadcast address for the subnetwork on which host A resides?


10.255.255.255

10.144.255.255

10.149.255.255

10.149.191.255

==10.159.255.255

27.

28. What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.)

system ROM

==the startup configuration file

the system image file
==the configuration register value

the NVRAM file system

29. Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used? (Choose two.)

a crossover cable

a rollover cable

an RJ-15 to DB-9 adapter

terminal emulation software

router VTY port

30. Refer to the exhibit. The router named "myhome" has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?


0008.a3b6.ce05

0009.1281.18a8

000a.8a47.e612

172.16.14.129

172.16.14.243

192.168.254.7

31. Refer to the exhibit. What two facts can be determined about the network from the exhibited output? (Choose two.)


The MontegoBay router does not have any LAN interfaces configured.

The Negril router is connected to the S0/1 interface of the MontegoBay router.

There are only four devices in this network.

Layer 3 is functioning properly on all routers.

The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.

Layer 2 is operational on three ports of the MontegoBay router.

32. Which set of commands is used to name a router and save the configuration?

Router(config)# hostname South
South(config)# copy running-config startup-config

Router(config)# hostname South
South(config)# exit
South# copy running-config startup-config

Router(config)# ip host South
South(config)# copy running-config startup-config

Router(config)# ip host South
South(config)# exit
South# copy running-config startup-config

33. Which command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router?

RouterA(config)# encrypted password cisco

RouterA(config)# password encrypted cisco

RouterA(config)# enable password cisco

RouterA(config)# enable secret cisco

RouterA(config)# service-password encryption cisco

34. Refer to the exhibit. A network administrator working at HostA has problems accessing the FTP server. Layer 3 connectivity testing was successful from HostA to the S0/0/1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB to check its status?


RouterB(config)# enable secret class
RouterB(config)# line vty 0 4
RouterB(config-if)# login

RouterB(config)# enable secret class
RouterB(config)# line vty 0
RouterB(config-line)# password cisco
RouterB(config-line)# login

RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-line)# password cisco
RouterB(config-line)# login

RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-vty)# password cisco
RouterB(config-vty)# login

35. What is the purpose of using SSH to connect to a router?

It allows a router to be configured using a graphical interface.

It allows a secure remote connection to the router command line interface.

It allows the router to be monitored through a network management application.

It allows secure transfer of the IOS software image from an unsecure workstation or server.

36. Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)

A packet that is destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.

The address 192.168.7.9 is the destination network for this route.

The address 192.168.7.24 is the next-hop router in this command.

This command is issued from the interface configuration mode.

This command is used to define a static route.

37. Which protocol is described as an enhanced distance vector routing protocol?

RIP v1

RIP v2

EIGRP

OSPF

38. Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.)


The Jax router is not an entry in the host table of the Atlanta router.

The Jax router does not have an entry for Atlanta in its host table.

The hostname command is not configured correctly on the Atlanta router.

The hostname command is not configured correctly on the Jax router.

Access to a DNS server is not available.

39. From what two locations can a router load the Cisco IOS during the boot process? (Choose two.)

RAM

TFTP server

NVRAM

setup routine

Flash memory

terminal

40. Which two statements describe the functions or characteristics of ROM in a router? (Choose two.)

stores routing tables

allows software to be updated without replacing pluggable chips on the motherboard

maintains instructions for POST diagnostics

holds ARP cache

stores bootstrap program

41. Which two statements correctly identify the function of router memory components? (Choose two.)

RAM permanently stores the configuration file used during the boot sequence.

ROM contains diagnostic self test procedures executed on hardware modules.

NVRAM stores a backup copy of the IOS used during the boot sequence.

Flash memory does not lose its contents when a router is powered off.

ROM contains the most current and most complete version of the IOS.

Flash contains boot system commands to identify the location of the IOS.

42. Which router component holds the routing table, ARP cache, and running configuration file?

RAM

Flash

NVRAM

ROM

43. Refer to the exhibit. A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect remotely via Telnet. Which command or sequence of commands must be applied to the Denver router to allow remote access?


Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco

Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco

Router(config)# line virtual terminal
Router(config-line)# enable login
Router(config-line)# password cisco

Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco

Router(config)# enable secret cisco

Router(config)# enable cisco

44.

45. Which security method uses the Advanced Encryption Standard (AES)?

MAC address filtering

WEP

WPA

WPA2

46. What is the purpose of WEP?

It encrypts data.

It uniquely identifies a wireless network.

It coordinates and accepts transmissions from wireless hosts.

It provides information about a directly connected Cisco network device.

47. A company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment?

802.11a

802.11b

802.11g

802.11n

48.


49. A company has a sales team that travels with laptops. On Fridays, the sales members come into assigned cubicles and connect their laptop to the wired network. The company is concerned that unauthorized users could also connect to the network. What can be done to ensure that unauthorized laptops are not connected to the wired network?

Implement SSH.

Install WEP or WPA.

Use switch port security.

Clearly label the cubicle network port and the switch port.

Configure usernames and passwords on the switch ports assigned to each cubicle.

50. Refer to the exhibit. For security reasons, information about the HQ R1 router model and IP address should not be accessible from the Site 2 R2 router. What security measure should be implemented?


Install an IDS between R1 and R2.

Install an IPS between R1 and R2.

Install a firewall between R1 and R2.

Disable CDP on the R1 interface that connects to R2.

Disable any routing protocol used between R1 and R2 and install static routes.

sem 4 practical.exam

Take Assessment - CCNA Practice Certification Exam# 2 - CCNA Exploration:
Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)

*** improper placement of enterprise level servers

*** addition of hosts to a physical segment

replacement of hubs with workgroup switches

*** increasing use of bandwidth intensive network applications

creation of new collision domains without first adding network hosts

migration to full-duplex Ethernet within the LAN
Which of the following are examples of TCP/IP application layer protocols? (Choose three.)

*** a terminal emulation protocol that supports remote console connections with various network devices

a protocol created by IBM that makes it easier for mainframes to connect to remote offices

*** a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet

a protocol that controls the rate at which data is sent to another computer

*** a protocol that exchanges network management information between a network device and a management console
Which of the following eliminates switching loops?

hold-down timers

poison reverse

*** spanning tree protocol

time to live

split horizon protocol

The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements that are true. (Choose two.)

CDP operates at the network layer of the OSI model.

*** The output of this command displays information about directly connected Cisco devices only.

The switch is attached to the SanJose1 FastEthernet0/21 interface.

SanJose1 is running CDP version 12.0.

SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.

*** SanJose2 is a 2600 series router running several routed protocols

A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?

Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco

*** Router(config)# line vty 0 4
*** Router(config-line)# login
*** Router(config-line)# password cisco

Router(config)# line virtual terminal
Router(config-line)# enable login
Router(config-line)# password cisco

Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco

Router(config)# enable secret cisco

Router(config)# enable cisco
Which of the following is associated with link-state routing protocols?

low processor overhead

poison reverse

routing loops

split horizon

*** shortest-path first calculations

A router does not load its configuration after a power failure. After running the show startup-configuration command, the adminstrator finds that the original configuration is intact. What is the cause of this problem?

The configuration register is set for 0x2100.

The configuration register is set for 0x2101.

The configuration register is set for 0x2102.

*** The configuration register is set for 0x2142.

Boot system commands are not configured.

Flash memory is empty causing the router to bypass the configuration in NVRAM
Nederst på formularen
Which commands are used to verify the content and placement of access control lists? (Choose three.)

*** show ip interface

show ip route

show processes

*** show running-config

show cdp neighbor

*** show access-lists
Which of the following are required when creating a standard access control list? (Choose two.)

destination address and wildcard mask

*** source address and wildcard mask

subnet mask and wildcard mask

access list number between 100 and 199 or 2000 and 2699

*** access list number between 1 and 99 or 1300 to 1999

Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)

most

*** host

all

*** any

some

sum

Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two).

3 collision domains

*** 3 broadcast domains

5 broadcast domains

*** 9 collision domains

10 collision domains

13 collision domains

Refer to the graphic. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?

192.168.16.63/27

192.168.16.158/27

192.168.16.192/27

192.168.16.113/30

192.168.16.145/30

*** 192.168.16.193/30

What is the purpose of the Spanning Tree Protocol (STP)?

*** prevents Layer 2 loops

prevents routing loops on a router

creates smaller collision domains

creates smaller broadcast domains

allows Cisco devices to exchange routing table updates
What is the purpose of a loopback address when using the OSPF routing protocol?

activates the OSPF neighboring process

*** ensures a persistent router ID for the OSPF process

provides a backdoor for connectivity during the convergence process

streamlines and speeds up the convergence process
Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?

Ports are manually configured to be in the forwarding state.

*** Ports listen and learn before going into the forwarding state.

Ports must be blocked before they can be placed in the disabled state.

It takes 15 seconds for a port to go from blocking to forwarding
Which sequence of commands is used to configure a loopback address on a router?

Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1

Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1

Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.0

*** Router1(config)# interface loopback 1
*** Router1(config-if)# ip address 192.168.1.1 255.255.255.255

Which routing protocols are classful and do not support VLSM? (Choose two.)

EIGRP

OSPF

*** RIP v1

RIP v2

*** IGRP

Refer to the graphic. Two switches are connected together through a trunk port. SW2 displays the message shown. Which of the following will solve the duplex mismatch?

SW1(config)# interface fastethernet 0/1
SW1(config-if)# duplex full

SW1(config)# interface fastethernet 0/1
SW1(config-if)# full-duplex

*** SW2(config)# interface fastethernet 0/1
*** SW2(config-if)# duplex full

SW2(config)# interface fastethernet 0/1
SW2(config-if)# full-duplex

Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?

EIGRP does not support VLSM.

The routers were not configured to monitor neighbor adjacency changes.

The default bandwidth was used on the routers.

*** An incorrect IP address was configured on a router interface.

According to the the provided router output, which of the following statements is true regarding PPP operation?

Only the link-establishment phase completed successfully.

Only the network-layer phase completed successfully.

Neither the link-establishment phase nor the the network-layer phase completed successfully.

*** Both the link-establishment and network-layer phase completed successfully

Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvc command indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)

local router

local Frame Relay switch

*** remote router

*** remote Frame Relay switch

R3 has the following configuration:

R3# show running-config
--some output text omitted--
interface serial0/0
bandwidth 128
ip address 192.168.11.2 255.255.255.0
encapsulation frame-relay
frame-relay map ip 192.168.11.2 30 broadcast

After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what might be problem?

*** No clock rate assigned.

There is an incorrect DLCI number in the map statement.

An incorrect IP address exists in the map statement.

The encapsulation command is missing the broadcast keyword
Which statements are true regarding the Frame Relay LMI? (Choose three.)

*** The LMI provides a virtual circuit (VC) status mechanism.

The LMI type must always be manually configured.

The available LMI types are NI1, DMS100 and 5ESS.

The LMI types supported by Cisco routers are CISCO and IETF.

*** The LMI type configured on the router must match the one used on the Frame Relay switch.

*** The LMI uses reserved DLCIs to exchange messages between the DTE and DCE

Which statement describes the process that occurs in Network Address Translation (NAT) overloading?

*** Multiple private IP addresses are mapped to one public IP address.

The number of usable addresses assigned to a company is divided into smaller manageable groups.

A pool of IP addresses are mapped to one or more MAC addresses.

The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured
Which two statements are true about the committed information rate on a Frame Relay link? (Choose two.)

The sum of the CIRs for all PVCs must be less than the port speed.

The sum of the CIRs for all PVCs must equal the port speed.

*** The sum of the CIRs for all PVCs can be greater than the port speed.

*** The DE bit will be set on frames that are transmitted in excess of the CIR.

Frames that are transmitted at greater than the CIR will be discarded at the source.

It is impossible to transmit frames at a rate in excess of the CIR
Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup, signaling, and termination?

show interface bri0/0

show isdn active

debug isdn q921

*** debug isdn q931

debug ppp negotiation

debug ppp authentication
Which of the following statements are true regarding PPP? (Choose three.)

*** PPP can use synchronous and asynchronous physical media.

PPP can only be used between two Cisco devices.

PPP carries packets from several network layer protocols in LCPs.

*** PPP uses LCPs to establish, configure, and test the data link connection.

*** PPP uses LCPs to agree on format options such as authentication, compression, and error detection

A network administrator is evaluating authentication protocols for a PPP link. Which of the following reasons might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)

establishes identities with a two-way handshake

*** uses a three-way authentication periodically during the session to reconfirm identities

control by the remote host of the frequency and timing of login events

*** transmits login information in encrypted format

*** uses an unpredictable variable challenge value to prevent playback attacks

makes authorized network administrator intervention a requirement to establish each session

Why are static routes often used with ISDN DDR?

They are more stable than dynamic routing protocols.

They are more accurate than dynamic routing protocols because they are put in by a network administrator.

They are easier to modify when a faster technology is installed.

*** They prevent the unnecessary activation of the link

Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)

192.168.14.8

*** 192.168.14.16

192.168.14.24

*** 192.168.14.32

192.168.14.148

*** 192.168.14.208

A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?

*** 1) fast forward
*** 2) fragment free
*** 3) store-and-forward

1) store-and-forward
2) fragment free
3) fast forward

1) fragment free
2) fast forward
3) store-and-forward

1) fast forward
2) store-and-forward
3) fragment free
Which of the following commands will display a communication message on a router before the router prompt is shown?

*** banner motd * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *

message Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.

banner * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *

hostname (Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.)
Øverst på formularen
A router needs to be added to OSPF area 0. Which commands should be used to enable OSPF on the router? (Choose two.)

RouterA(config)# router ospf

*** RouterA(config)# router ospf 1

RouterA(config-router)# network 192.168.2.0 0.0.0.255 0

*** RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0

RouterA(config-router)# network 192.168.2.0 255.255.255.0 0

Refer to the graphic. Which of the following commands will configure router A for OSPF?

router ospf 1
network 192.168.10.0

*** router ospf 1
*** network 192.168.10.64 0.0.0.63 area 0
*** network 192.168.10.192 0.0.0.3 area 0

router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252

router ospf 1
network 192.168.10.0 area 0
Which of the following protocols would exchange information between routers to share network addresses and their metrics?

TCP

*** RIP

CSMA/CD

Ethernet
Which ISDN device can be directly connected to a two-wire local loop in a North American city?

a router with a serial interface

a router with an S/T interface

*** a router with a U interface

an ISDN terminal adapter
The output of the show ip interfaces brief command indicates that Serial0 is up but the line protocol is down. Which of the following are possible causes for the line protocol being in the down state? (Choose two.)

The clock rate is not set on the DTE.

An incorrect default gateway is set on the router.

A network is missing from the routing protocol configuration.

*** The encapsulation on the Serial0 interface is incorrect.

*** Keepalives are not being sent by the remote device

Which of the following is a characteristics of TCP? (Choose two.)

*** data transport reliability

best path determination

*** establishing, maintaining, and terminating virtual circuits

encapsulation of packets in a data frame with source and destination MAC addresses

best-effort datagram delivery

Which statement is true regarding the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)

*** A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.

192.168.7.9 is the destination network for this route.

192.168.7.24 is the next-hop router in this command.

This command is issued from the interface configuration mode.

*** This command is used to define a static route

Which of the following application layer protocols use TCP? (Choose three.)

*** SMTP

*** FTP

SNMP

*** HTTP

TFTP

DHCP

Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)

*** BECN

DLCI

*** DE

*** FECN

LMI

Inverse ARP

Which of the following router commands will verify that a path exists to a destination network?

Router# show ip interfaces brief

*** Router# show ip route

Router# show cdp neighbors

Router# show running-config

Router# show protocols

When EIGRP is configured on a router, which table of DUAL information is used to calculate the best route to each destination router?

router table

*** topology table

DUAL table

CAM table

ARP table

Refer to the graphic. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which of the following commands is used on router A to summarize the attached routes, and to which interface is this command applied? (Choose two)

*** ip summary-address eigrp 1 192.168.10.64 255.255.255.192

ip area-range eigrp 1 192.168.10.80 255.255.255.224

summary-address 192.168.10.80 0.0.0.31

ip summary-address eigrp 1 192.168.10.64 0.0.0.63

*** serial interface on router A

serial interface on router B

A router with two LAN interfaces, two WAN interfaces, and two loopback interfaces configured is operating with OSPF as its routing protocol. What is used by the OSPF process to assign the router ID?

the IP address of the interface configured with priority 0

the OSPF area ID configured on the interface with the highest IP address

*** the loopback with the highest IP address configured

the highest IP address on the LAN interfaces

the highest IP address configured on the WAN interfaces
Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?

172.0.0.0

172.16.134.0

*** 172.16.134.32

172.16.134.48

172.16.134.47

172.16.134.63

Which commands show when the last IGRP routing update was received? (Choose two.)

*** Router# show ip protocols

Router# show version

Router# show interfaces

Router# show ip updates

*** Router# show ip route

When using access control lists to filter traffic, which of the following is used to track multiple sessions occurring between hosts?

IP addresses

subnet masks

*** port numbers

routed protocols

routing protocols

interfaces
Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?

This is a useable host address.

This is a broadcast address.

*** This is a network address.

This is not a valid address

The company network shown in the drawing has to be subnetted. The company has leased the Class C IP address of 200.1.2.0. Which of the following network addresses and masks would be appropriate for one of the subnetworks?

200.1.2.96 255.255.255.192

*** 200.1.2.160 255.255.255.224

200.1.2.80 255.255.255.224

200.1.2.32 255.255.255.240

cisco networking

this is an enhancement to help youanswer some of tthe assessments in the final exams of cisco especially sem 4.