KINDLY REPLY HOW YOU LIKE IT

Programming Tutorials on different platforms

Any general and specialized interesting programming language training and exploration . Fun with knowledge .

Search This Blog

Saturday, June 19, 2010

CCNA DUMPS :

1. Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. (Choose three)

A. 192.168.27.33
B. 192.168.27.112
C. 192.168.27.119
D. 192.168.27.126
E. 192.168.27.175
F. 192.168.27.208

Answer:D

2. You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this?

A. There is insufficient room for more than one image. B. The router has detected a copy of the current software image on the TFTP server. C. The file can be relocated and not compressed. D. The image to load is a binary executable file.

Answer:A


3. At Layer 2 of the OSI model, which component connects a host to the network media? A. Hub B. Switch C. Bridge D. NIC E. Transceiver

Answer:D

4. Router1#show ip routeCodes: C-connected, s-static, l ?IGRP, R ?RIP, M ?mobile, B ?BGP, D ?EIGRP, EX ? EIGRP external, O ? OSPF, IA ?OSPF inter area, EI ?OSPF external type 1, E2 ?OSPF external type 2, E ?EGP, i ?IS-IS, L1 ?IS-IS level-1, L2 ?IS-IS level-2, * -candidate default, U ? per-user static route Gateway of last resort is not set R 202.30.8.0 /24[120/1] via 202.30.2.2, 00:00:10, Serial 0 C 202.30.9.0 /24 is directly connected, Serial 1 R 202.30.10.0 /24 [120/7] via 202.30.9.1, 00:00:02, Serial 1 R 202.30.11.0 /24 [120/7] via 202.30.9.1, 00:00:03, Serial 1

C 202.30.1.0 /24 is directly connected, Ethernet 0 C 202.30.2.0 /24 is directly connected, Serial 0 R 202.30.3.0 /24 [120/1] via 202.30.2.2, 00:00:10. Serial 0 R 202.30.4.0 /24 [120/15/ via 202.30.2.2, 00:00:10, Serial 0 R 202.30.5.0 /24 [120/15] via 202.30.2.2, 00:00:10, Serial 0 R 202.30.6.0 /24 [120/15] via 202.30.2.2, 00:00:10, Serial 0 R 202.30.7.0 /24 [120/1] via 202.30.2.2, 00:00:10, Serial 0

You examine the routing table of your router named Router1. This routing table will be send to neighboring routers via broadcasts. Some routes might be discarded and not entered in to the routing tables of the neighboring RIP routers. Which of the following routes would be discarded in this way?

A. R 202.30.8.0/24 [120/1] via 202.30.2.2, 00:00:10, Serial0 B. R 202.30.11.0/24 [120/7] via 202.30.9.1, 00:00:03, Serial1 C. C 202.30.1.0/24 is directly connected, Ethernet0 D. R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0

Answer:D

5. Router1#show ip routeCodes: C-connected, s-static, l ?IGRP, R ?RIP, M ?mobile, B ?BGP, D ?EIGRP, EX ? EIGRP external, O ? OSPF, IA ?OSPF inter area, EI ?OSPF external type 1, E2 ?OSPF external type 2, E ?EGP, i ?IS-IS, L1 ?IS-IS level-1, L2 ?IS-IS level-2, * -candidate default, U ? per-user static route Gateway of last resort is not set

R 202.30.8.0 /24[120/1] via 202.30.2.2, 00:00:16, Serial 0 C 202.30.9.0 /24 is directly connected, Serial 1 R 202.30.10.0 /24 is possibly down, routing via 202.30.9.1, Serial 1 R 202.30.11.0 /24 is possibly down, routing via 202.30.9.1, Serial 1 C 202.30.1.0 /24 is directly connected, Ethernet 0 C 202.30.2.0 /24 is directly connected, Serial 0 R 202.30.3.0 /24 [120/1] via 202.30.2.2, 00:00:17. Serial 0 R 202.30.4.0 /24 [120/15/ via 202.30.2.2, 00:00:17, Serial 0 R 202.30.5.0 /24 [120/15] via 202.30.2.2, 00:00:17, Serial 0 R 192.158.6.0 /24 [120/15] via 202.30.2.2, 00:00:17, Serial 0 R 202.30.7.0 /24 [120/1] via 202.30.2.2, 00:00:17, Serial 0

You are troubleshooting a router with default settings. You are concerned about the 202.30.10.0 and 202.30.11.0 routes. In particular you are interested how long they will be kept in the routing table. What would be the maximum time these routes would be kept in the routing table?

A. 30 seconds B. 60 seconds C. 240 seconds D. 360 seconds E. 630 seconds

Answer:C

6. Cisco?s switching modes include cut-through, store and forwarded and a modified version of the first two methods. Which statement about switching methods is true? A. The stored and forward method has low latency. B. The cut through method and switching has high latency. C. The modified version holds the packet in memory until 50% of the packet reaches the switch. D. The modified version holds the packet in memory until the data portion of the packet reaches the switch.

Answer:D

7. When Layer 2 devices were first created there was no way of detecting bridging loops. A protocol was created by DEC to stop these loops. What protocol did DEC create? A. Virtual LANs. B. Frame filtering. C. Cut through switching. D. Spanning tree protocol.

Answer:D

8. Which switching mode reads the entire frame including the CRC before the frame is forwarded? A. CSMA/CD B. Full duplex. C. Cut through. D. Half duplex. E. Fragmentation. F. Store and forward

Answer:F

9. CSMA/CD was created to help detect collisions. In regards to CSMA/CD what is the backoff algorithm used for on an 802.3 network? A. It is latency in store and forward switching. B. It is the time used for token passing for machine to machine. C. It is the retransmission delay that is reinforced when a collision occurs. D. It is the result of two nodes transmitting at a same time the frames from each transmitting device collide and are damaged.

Answer:C

10. Which two statements are true about half duplex and full duplex? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer. B. In a 100mbps point to point connect, a full duplex connection can provide 400mbs of data transfer. C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single port office switch. D. Full duplex Ethernet takes advantage of UTP using one pair of transmission and other pair for reception.

Answer:A,D

11. The _________ is the rate in bits per second which a Frame Relay switch agrees to transfer data? A. Clock rate. B. Committed information rate. C. Local management interface. D. Data-link connection identifier. E. Committed rate measurement interval.

Answer:B

12. You purchased a router from an online auction. You issued the erase startup-config command on this router to return the router to factory defaults. When you power cycle the router what mode will the router boot up in? A. Setup. B. Startup. C. User EXEC. D. User privileged. E. Global configuration.

Answer:A

13. Which command verifies encapsulation as well as IP address and MAC address on a router configured for Frame Relay? A. Show IP B. Show interface C. Show statistics D. Show frame-relay

Answer:B

14. Which one of the following is a reason to use a hardware address? A. To obtain a vendor code/serial number from the user. B. To transmit a frame from one interface to another interface. C. To transmit a packet from one local device to another local device. D. To transmit data from one local device to remote device across Internet. E. To contain logical information about a device to use an end-to-end transmission.

Answer:B

15. How many valid host IP addresses are available on the following network/subnetwork 131.107.10.16/30 ? A. 2 B. 30 C. 254 D. 16,382 E. 65,534

Answer:A

16. You would like to see if a host table has been created on a router. Which command displays the IP addresses assigned to specific host names? A. Show hosts. B. Show interface. C. Ping host name. D. Config host name. E. Show host mapping. F. Show host name IP address. G. Trace IP addresses host name.

Answer:A

17. You have opened up a TAC case for one of your routers that is not working correctly. One of the fields of the TAC case is what is your software version? Which show command can be issue to display system configuration information, software version and the names and sources of configuration files and boot images on a router? A. Show boot. B. Show flash. C. Show Config. D. Show version.

Answer:D

18. Which layer of the 7 layer OSI model does the ping command operate? A. Session B. Network C. Transport D. Maintenance

Answer:B

19. TCP is considered a reliable protocol. Which one of the following is used to insure reliability? A. Route selection B. Acknowledgement C. Session checkpoints D. System authentication

Answer:B

20. You telnet into Router B from Router A and now would like to be able to telnet to Router C but keep the connection open to Router B. What key sequence is used to suspend your telnet session and return you to Router A so that you can telnet to Router C? A. Suspend. B. The command exit. C. CTRL ? ESC followed by x. D. CTRL ? ALT ? DEL followed b ESC. E. CTRL- Shift-6 followed by x.

Answer:E

21. Which devices operate at the level above the physical layer? (Choose two.)

A. router B. SMTP server C. transceiver D. switch E. bridge F. hub

Answer:D,E

22. Given an IP address of 131.107.2.160 and a subnet mask of 255.255.255.192, to which subnet does the host belong? A. 131.107.2.32 B. 131.107.2.64 C. 131.107.2.96 D. 131.107.2.128 E. 131.107.2.192

Answer:D

23. Which of the following describes the basic steps a connection oriented uses for communication? (Choose three) A. Call setup B. Data transfer C. Load Balancing D. Call termination E. Call prioritization F. Data segmentation G. Data link identification

Answer:A,B,D

24. When configuring a Frame Relay network your provider assigns you a DLCI number between 16 and 1007 which one of the following statements about this data-link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in Frame Relay network. B. It is a signaling standard between the CPE device and the Frame Relay switch. C. It is check speed port speed of the connection (local loop) to the Frame Relay cloud. D. It is maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the committed information rate (CIR).

Answer:A

25. Which of the following are two ways Cisco supports multiple IPX logical networks on an individual interface? (Choose two) A. Network number. B. Routing protocol. C. Encapsulation type. D. Autonomous system number.

Answer:A,C

26. Which one of the following is not a characteristic of a network segment on a transparent switch? A. The segment has its own collision domain. B. The segment can translate from one media to a different media. C. All devices in the segment are part of the same broadcast domain. D. One device per segment can currently send frames to the switch.

Answer:B

27. You want to configure the IP address on the interface of your router.

Which of the following commands achieves this goal?

A. router(config-if)#ip address 163.63.56.5 subnet mask 255.255.240.0 B. router(config-if)# 163.63.56.5 255.255.240.0 C. router(config-if)#ip address 163.63.56.5 255.255.240.0 D. router(config-if)# 163.63.56.5 subnet mask 255.255.240.00 E. router(config-if)#ip address 163.63.56.5 /29 F. router(config-if)#ip address 163.63.56.5 subnet mask /20

Answer:C

28. Given the following IP address from the Class B address range: 131.107.21.12

Your network plan requires no more than 126 hosts on a subnet that includes this address. When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask?

A. 255.255.0.0 B. 255.255.128.0 C. 255.255.255.128 D. 255.255.255.252

Answer:C

29. Which statement is true about Layer 2 bridges? A. While bridges are used to segment networks they will not isolate broadcast or multicast packets. B. A bridge looks at every packet with in its network segment and works like a hub, re-broadcasting the packet if the destination is with in its network segment. C. A bridge maintains a table of the IP addresses of the hosts with in its network segment and forwards the packet directly to the destination based upon the IP address. D. Bridge resets the hop count by keeping all packets within the network segment only packets addressed to its specific destination host outside the network segment are allowed to pass through the bridge.

Answer:A

30. When you issue the command show version, your router returns: Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IS-M), Version 12.2(4)T, RELEASE SOFTWARE (fc1) TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2001 by cisco Systems, Inc. Compiled Fri 28-Sep-01 06:59 by ccai Image text-base: 0x80008088, data-base: 0x812E7ADC ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) DSL uptime is 2 days, 17 hours, 30 minutes System returned to ROM by power-on System image file is "flash:c2600-is-mz.122-4.T.bin" cisco 2621 (MPC860) processor (revision 0x102) with 60416K/5120K bytes of memory.

Processor board ID JAB041306DU (1285222064) M860 processor: part number 0, mask 49 Bridging software. software, Version 3.0.0. 2 FastEthernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ATM network interface(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write) Configuration register is 0x0101 From where does the router boot?

A. ROM B. NVRAM C. FLASH D. A TFTP server

Answer:A

31. The network administrator has just make changes to a router. You have been hired to make sure those changes are correct and that they have been saved in NVRAM. In Cisco IOS software, which command displays the backup configuration to see if the changes have been saved to NVRAM? A. Show flash. B. Show version. C. Show tftp-config. D. Show backup-config. E. Show startup-config .

Answer:E

32. Ethernet switches operate at the Data Link layer of the OSI model. These Layer 2 devices have three major functions which of the following describe these functions? (Choose three) A. Loop avoidance. B. Address learning C. Hop count limiting D. Broadcast filtering E. Packet forward/filtering.

Answer:A,B,E

33. Which one of the following commands will start the IP processing on interface e0? A. IP-Space enable. B. Network IP-Address. C. IP address IP-address subnet mask. D. The exit command from the enable configuration. E. Copy running-configuration to startup-configuration.

Answer:C

34. Which one of the following is true about User Datagram Protocol? A. It is reliable and acknowledged. B. It is unreliable and acknowledged. C. It is reliable and unacknowledged. D. It is unreliable and unacknowledged.

Answer:D

35. What is the benefit of segmenting a network with a router into two different segments called segment one and segment two? A. It increases the number of collisions. B. It decreases the number of broadcast domains. C. It connects segment one?s broadcast to segment two. D. It prevents segment one?s broadcast from getting to segment two.

Answer:D

36. In troubleshooting a Frame Relay Link on serial 0/2 which command displays the LMI, DLCI, and bandwidth for that link? A. Show interface serial 0/2 B. Show frame-relay serial 0/2. C. Show protocol frame-relay serial 0/2 D. Show serial 0/2 encapsulation frame-relay.

Answer:A

37. The data link layer of the OSI model was broken down into two sublayers. What are the names of these sublayers? (Choose two) A. MAC B. LLC C. SAP D. LCP E. NetWare Core Protocol (NCP)

Answer:A,B

38. Which of the following are true about layer 3 of the OSI model? (Choose four) A. It uses a two-part address. B. It maintains routing tables. C. It uses broadcast addresses. D. It establishes network addresses. E. It provides access to the LAN media. F. It provides media independence for upper layers. G. It provides path selection for Internet work communication.

Answer:A,B,C,G

39. IGRP is Cisco propriety routing protocols that as all routing protocols use metrics to determine the best path to a destination. Which are the default metrics for this routing protocol? (choose all that apply) A. Maximum Transmission Unit B. cumulative interface delay C. path bandwidth value D. reliability from source to destination E. link loading in bits-per-second F. hold-down timers for updates

B,C

40. Which of the following can be using to determine the best path to reach a remote destination on a Cisco router? (Choose two) A. Static route entry. B. Default route entry. C. Dynamic route entry. D. Temporary route entry. E. Permanent route entry.

Answer:A,C

41. You are configuring NAT (Network Address Translation) on a Cisco Router. The instructions that you found on Cisco?s web site recommend that on your inside network the following IP addresses shown in the EXHIBIT are used. Why are these addresses recommended? EXHIBIT:

10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

A. They are private IP addresses. B. They cannot be leased with DHCP. C. They are allocated for VOIP. D. They represent IP classless addresses. E. They are used by the inter NIC for administration.

Answer:A

42. Ten personal computers are connected to separate 10Mbps ports on a switch. How much bandwidth will be available for each pc? A. 1.25 B. 4 C. 16 D. 10 E. 60

Answer:D

43. Which key do I press to have the IOS finish typing a known command for me? A. B. C. D.

Answer:A

44. When using Frame Relay which statement about the Committed Information Rate (CIR) is true? A. It is the rate, in bits per second, at which the Frame Relay switch agrees to transfer data B. It is the clock speed (port speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that the switch can transfer during any Committed Rate Measurement Interval D. It is a signaling standard between the CPE device and the FR switch. It is responsible for managing the connection and maintaining status between the devices.

Answer:A

45. In 100BaseT Ethernet cabling 100 is the maximum segment length, and T is the Type of Media in this case Twisted-Pair. What does the term ?Base? refer to? A. Cabling type. B. Signaling type. C. 100 mode type. D. Spectrum used. E. Speed category.

Answer:B

46. You need to install RIP on your router. Which command enables directly connected network 131.107.10.0 to be used by RIP? A. Router(Config)# rip 131.107.10.0 B. Router(Config-router)# rip 131.107.10.0 C. Router(Config-router)# network 131.107.10.0 D. Router(Config-router)# network 131.107.0.0

Answer:D

47. Which of the following WAN encapsulations support multiple upper layer protocols? (Choose Two) A. PPP B. LAPD C. ISDN D. HDLC

Answer:A,D

48. Most modern IP networks today use a variety of different equipment. Which statements are true about IP networks? A. A broadcast source MAC contains all zeros. B. A MAC address is part of the physical layer of the OSI model. C. Bridges to make forwarding decisions use MAC addresses: routers use IP addresses. D. IP addresses are now a flat addressing scheme: MAC addresses use a hierarchical addressing scheme.

Answer:C

49. Which one of the following protocols used in the TCP/IP protocol stack is considered a reliable connection-oriented protocol? A. IP B. UDP C. TCP D. DNS E. OSPF

Answer:C

50. You are troubleshooting a router that you believe it configured with an incorrect IP address. You issue the show configuration command from privileged mode. Which part of the output shows the specific configured IP addresses and subnet masks? A. The IP host table. B. The interfaces output. C. Each section of the output. D. Each section of the output. E. The global configuration statements. F. The section under the autonomous system number.

Answer:B

51. If you issued the command show access-list 101 list what would be displayed? A. All extended access lists. B. All access lists within the router. C. The contents of standard access list 101 D. The contents of extended access list 101

Answer:D

52. 48-131.107.2.63 131.107.2.48 is the network, and the all zeros broadcast range. 131.107.2.63 is the broadcast, and is the all ones broadcast range. So, we can?t user 48 or 63, and the valid host address range would be 49-62.

Answer:C

276. Which of the following are true about 172.16.0.254/16?

A. IPX:MAC addresses. B. IP:classC directed broadcast. C. Private IP address:node number D. Public IP addresses:directed broadcast. E. Private IP addresses directed broadcast.

Answer:C

53. A. There is no show filters command.A. Even though the show running-config is a very common and powerful tool it cannot be used to display the contents of an access list. Rather it will display the configuration files. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324 ? 325 and 98 ? 99. 275. Which IP address range is allowable given an IP address of 131.107.2.56 and 28-bits of subnetting? B. 131.107.2.48 to 131.107.2.63 C. 131.107.2.48 to 131.107.2.6.2 D. 131.107.2.49 to 131.107.2.62 E. 131.107.2.49 to 131.107.2.63 F. 131.107.2.55 to 131.107.2.126

Answer:D

54. What are two commands that you can use to view your access lists? (Choose two) A. Show filters. B. Show access-lists. C. Show IP access-list. D. Show running-Config.

Answer:B,C

55. Which two statements about a Layer 2 bridge are true? (Choose two) A. A bridge floods multicasts. B. A bridge floods broadcasts. C. A bridge does not flood multicasts. D. A bridge does not flood broadcasts.

Answer:A,B

56. A Novell IPX address has 80 bits. 32 bits for the network number and 48 bits for the node number. How is the node number determined?

A. It is the serial number of the given device. B. It is assigned as a lease by Novell DHCP. C. It is also set by the network administrator. D. It is usually the MAC address of one interface. E. It is downloaded by NetWare Core Protocol (NCP).

Answer:D

57. Point-to-Point protocol (PPP) is used as a WAN encapsulation between two routers. Which one of the following is true regarding PPP? A. PPP supports TCP/IP, but not Novell IPX. B. PPP is being phased out of existence by the Serial Line Internet protocol. C. PPP provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits. D. PPP is an ITU-T and ANSI standard that defines the process for sending data over a packet-switched data network.

Answer:C

58. You are configuring a PPP CHAP connection between two routers. The hostnames are SNOWBALL1 and SNOWBALL2. The SNOWBALL1 router has already been configured. You are responsible for configuring SNOWBALL2. The password configured on SNOWBALL1 is cisco. Which of the following is the correct username syntax that you will need to configure on SNOWBALL2? A. Username SNOWBALL2 password cisco B. Username SNOWBALL1 password cisco C. Username SNOWBALL2 password SNOWBALL1 D. Username SNOWBALL1 password SNOWBALL2

Answer:B

59. In today?s networks which encapsulation methods are most commonly used (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC

Answer:D

60. The Internet Control Message Protocol (ICMP) is implemented by all TCP/IP hosts. Which of the following demonstrate the functions of the ICMP Protocol? (Choose Two)

A. To map IP addresses to Ethernet addresses. B. To map common names to network addresses. C. To forward SNMP alerts to management consoles. D. To generate an echo reply in response to a ping test. E. To send a host or post unreachable message from a router to the source of an undeliverable packet.

Answer:D,E

61. Billy was hired to setup Frame Relay subinterfaces on a point-point connection between two routers. Which of the following should Billy take into consideration when setting up this connection? (Choose Two) A. Configure the router to forward all broadcast packets. B. Remove any network address assigned to the physical interface. C. Configure the local data-link connection identifier for the subinterfaces. D. Partition the total committed information rate available among the subinterfaces.

Answer:B,C

62. You would like to configure IP RIP on your Cisco Router. Which of the following steps below are required to install IP RIP? (Choose two) A. Specify the routing protocol. B. Configure static Rip routes. C. Specify directly connected subnets. D. Specify directly connected networks.

Answer:A,D

63. ISDN is sometimes used in locations that do not offer support for DSL or Cable Modems connections. Your choices may be Analog modems or an ISDN connection in those remote locations. ISDN has benefits over regular dial up modem connections. Which of the following are examples of these benefits? (Choose three) A. PVCs are faster and more reliable. B. No specialized equipment is required. C. Data transfer is faster than typical modems. D. Call setup is faster than with standard telephone service. E. It carries many types of data traffic such as voice, video, and data.

Answer:C,D,E

64. When troubleshooting Frame Relay peer problems between two routers which two commands should you use to show the routers that are reachable? (Choose two) A. Show IP map. B. Show IP route. C. Show frame-relay map. D. Debug frame-relay map.

Answer:B,C

65. Which of the following are modes used for frame switching on Cisco switches? (Choose two) A. Full duplex B. Half duplex C. CSMA/CD D. Cut through E. Fragmentation F. Store and forward

Answer:D,F

66. Which of the following can be used as methods that can be used to simplified network management by implementing (VLANs)? (Choose four) A. VLANs allow you to implement multiple layers switching easily. B. VLAN can group several broadcasts domains into multiple logical subnets. C. It is no longer necessary to install cables to move a user from a new network to another. D. Network adds, moves and changes are achieved by configuring a port into a VLAN. E. A group of users needing high security can be put into a VLAN so that no users outside the VLANs can communicate with them. F. As a logical grouping of users, VLANs can be considered independent from their physical or geographic locations.

Answer:C,D,E,F

67. Computer A is trying to ping Computer B on the same Ethernet LAN using the IP address. A request is sent out of Computer A as a broadcast looking for the MAC address of Computer B. What is the protocol that sent out this broadcast to find Computer B?s MAC address? A. It uses a Proxy ARP. B. It uses ARP requests. C. It uses RARP requests. D. It uses router look up table.

Answer:B

68. Which command is used to set the bandwidth metric of a Frame Relay connection? A. Router(Config)# clock rate 56 B. Router(Config-if)# bandwidth 56 C. Router(Config)# bandwidth 56000 D. Router(Config-if)# clock rate 56000

Answer:B

69. The TCP/IP model was created to provide standards used in internetworking. Which of the following statements are true about this model? (Choose three) A. IP provides connection less service and routing capabilities. B. ARP enables devices to locate the IP address of local devices. C. UDP provides simple connection less service without windowing or acknowledgements. D. ICMP provides connection oriented management data to routers and layer three switches. E. TCP enables devices to send large quantities of data using switching in a connection-oriented manner.

Answer:A,C,E

70. You need to install RIP as the routing protocol of your network. Which of the following shows the correct prompt and command to install RIP as the routing protocol? (Choose one) A. Router# rip. B. Router rip. C. Router (Config)# rip. D. Router (Config)# router rip.

Answer:D

71. Which two are facts about integrated services digital network (ISDN)? (Choose two) A. ISDN provides only data only capability. B. ISDN provides an integrated voice/data capability. C. The ISDN standards define the hardware and call setup schemes for end-to-end digital connectivity. D. Users receive more bandwidth on WANs with a leased line of 56kbps than with multiple b channels.

Answer:B,C

72. Which of the following correctly compares Fast Ethernet to Ethernet? (Choose four.) A. Fast Ethernet uses the Same Maximum Transmission Unit (MTU). B. Fast Ethernet is based on an extension to the IEEE 802.3 specification. C. Fast Ethernet uses the same Media Access control (MAC mechanisms). D. Fast Ethernet preserves the frame format that is used by Ethernet. E. Fast Ethernet offers a speed increase one hundred times that of the Ethernet.

Answer:A,B,C,D

73. An IPX address consists of which of the following? A. Network number; IP address. B. MAC address; node number. C. Network number; MAC address. D. Network number; subnet number.

Answer:C

74. John was having problems connecting to the company?s game server by the FQDN. John then used the ping command and was successful in pinging the game server. If a packet analyzer were used while John was using the ping command what would the two most common request/reply pair with ICMP messages be? (Choose two) A. Echo reply B. Echo request C. Source quench D. Fragment offset E. Information redirect F. Destination reachable G. Echo control message

Answer:A,B

75. If I have VLAN 3, and VLAN 4 configured on a Cisco Switch, and I would like to have pc?s on VLAN 3 communicate with pc?s on VLAN 4. Which of the following will allow this inter-VLAN communication to take place? A. It takes place through any Cisco router. B. It takes place through a Cisco router than can run ISL. C. It takes place through a router, but this disables all the router's Security and filtering functionality for the VLANs. D. For nonroutable protocols, (e.g., NetBEUI) the router provides communications between VLAN domains. E. Inter-VLAN communications is not possible because each VLAN is a separate broadcast domain.

Answer:B

76. Which one of the following is a layer two broadcast? A. The IP subnet used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00-00-00-00-00-00 D. The MAC address used is FF-FF-FF-FF-FF-FF.

Answer:D

77. Which of the following troubleshooting tools use the protocol ICMP? (Choose two) A. Ping B. Telnet C. Configure D. Trace route E. Show commands F. Standard access list

Answer:A,D

78. You are suggesting that your company uses IP RIP as its routing protocol. Your boss would like you to list some facts about IP RIP before he approves your request. Which of the following statements about IP RIP are true? (Choose two.) A. It limits hop counts to 31. B. It is a link-state routing protocol. C. It uses autonomous system numbers. D. It is capable of load sharing over multiple paths. E. It uses bandwidth as the metric for path selection. F. It broadcasts updates every 30 seconds by defaults

Answer:D,F

79. In comparing TCP with UDP what is an advantage of using a connectionless protocol such as UDP? A. Packet acknowledgement may reduce overhead traffic. B. Loss or duplication of data packets is less likely to occur. C. Packets are not acknowledged which reduces overhead traffic. D. The application relies on the transport layer for sequencing of the data packets.

Answer:C


80. You are troubleshooting a problem between RouterA and RouterB from RouterA. Which command will successfully ping the ip address of RouterB?

A. RouterA>ping 131.5.5.0 B. RouterA# ping 131.5.5.30 C. RouterA> ping 131.5.5.256 D. RouterA# ping 131.5.5.255

Answer:B

81. Which of the following can reset a hold-down timer? (Choose three.) A. When the hold-down timer expires. B. When infinity is finally defined as some maximum number. C. When the router exchanges update summaries at area borders. D. When the router detect faulty LSPs propagating through the internetwork. E. When another update is received indicating a new route with a better metric. F. When another update is received indicating the original route to the network has been restored. G. When the router receives a processing task proportional to the number of links in the internetwork.

Answer:A,E,F

82. What are two benefits of segmenting a network with a later 2 bridge? (Choose two) A. To reduce collisions. B. To increase collisions. C. To add collision domains. D. To reduce collision domains. E. To have more broadcast domains.

Answer:A,C

83. Company ABC was supplied the following Class C IP address 195.20.10.0. You have been hired as the network administrator of Company ABC. Your first task is two split of the address for the different buildings that Company ABC owns and operates. Which of the following are the most important factors when subnetting the addresses? (Choose two) A. Determine the number of separate networks required. B. Determine how many devices will require DHCP addressing. C. Determine the maximum number of host that will be on each subnet. D. Determine the minimum number of host that will be on each subnet. E. Determine which router will be the IP default gateway for each subnet.

Answer:A,C

84. You as the administrator issue the shutdown command on Serial 1. You later view this interface using the show interface Serial 1 command. How will this interface be displayed? A. Serial 1 is up, line protocol is up. B. Serial 1 is up, line protocol is down. C. Serial 1 is down, line protocol is down. D. Serial 1 is administratively down, the line protocol is down.

Answer:D

85. Using a class C address 192.168.10.X what would the subnet mask be if we needed two subnets with a maximum of 35 hosts on each subnet? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

Answer:A

86. You are trying to convince your boss to switch from a hub to a Cisco switch. You have explained to your boss that you will have fewer collisions with the Cisco switch because you will be using full-duplex. Your boss responds with how many collisions are caused by transmitting and receiving frames simultaneously in full-duplex mode. What should your response be? A. One B. Two C. None D. Several

Answer:C

87. Given the configuration example: interface ethernet0 ipx network 100 ipx access-group 800 out interface ethernet1 ipx network 200 interface ethernet2 ipx network 300 access-list 800 permit 200 100

Which two actions result from implementing this configuration? (Choose two.)

A. IPX network 400 will not receive any traffic. B. Traffic from network 200 for network 100 will be forwarded out e0. C. Traffic from network 200 for network 200 will be forwarded out e0. D. Traffic from network 200, destined for network 100, will be forwarded out e2. E. The access list is applied to an outgoing interface and filters outbound traffic.

Answer:B,E

88. Which statement should you use to deny telnet access only from Network 210.93.105.0 to Network 223.8.151.0? A. Access-list one deny 210.93.105.0.0.0.0.0.0 any eq 23 access-list one permit any. B. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq 23 C. Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq 23 Access-list 100 permit ip any any D. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq telnet Access-list 100 permit ip any any

Answer:D

89. Your company is using Novell v4.1. You need to display the Novel IPX address on a router. Which one of the following commands will allow you to display this address? A. Show IPX addresses. B. Show IPX interface. C. IPX network D. Display IPX addresses E. Show IPX routing details

Answer:B

90. Using a Packet analyzer you discover the following address 238.255.255.255. What is the protocol and what is the purpose of the address?

A. IPX; a SAP broadcast. B. IP; a multicast address. C. IP; a reserved address. D. IP; a directed broadcast. E. IPX; a flooded broadcast.

Answer:B

91. You have decided to remove RIP routing on your router and install IGRP. You have issued the command no router rip on all of your routers. You now need to install IGRP on your routers. Which commands should you use to enable IGRP routing? A. router igrp 100 network 192.168.1.0 network 10.0.0.0 B. router igrp 100 network 192.168.1.0 network 10.2.0.0 C. router igrp 100 network 192.168.1.0 192.168.1.1 network 10.2.0.0 10.2.1.1 D. router igrp 100 network 192.168.1.0 255.255.255.0 network 10.2.0.0 255.255.0.0

Answer:A

92. Our network uses both IPX and IP addressing and we have a direct connection to the Internet using IP. We would like to allow our IPX traffic to also be able to go across this internet to a remote router on the other side. Which term below will allow us to encapsulation IPX inside of IP so that we can send it across the Internet? A. Bridging. B. Tunneling. C. Data-link control. D. Generic routing. E. Packet switching.

Answer:B

93. Which of the following is a Layer 2 device? A. Hub B. Router C. Switch D. Repeater

Answer:C

94. You are trying to determine if the connection between your Router and the Frame-Relay switch is good. Which show command should you use to view Frame Relay local management interface (LMI) traffic statistics?

A. Show lmi. B. Show ip route. C. Show interface. D. Show statistics. E. Show frame-relay lmi.

Answer:E

95. Frame Relay uses ___________ to define the rate, in bits per second , that the Frame Relay switch agrees to transfer data? A. Clock rate (CR). B. Committed Information Rate (CIR) C. Local management interface (LMI) D. Data-link connection identifier (DLCI) E. Committed Rate Measurement Interval (CRMI)

Answer:B

96. You issued the show spantree e0/1 command which part of the output indicates that virtual LAN1 (VLAN1) is functioning properly? A. Root port is fast Ethernet 0/26. B. Port Ethernet 0/1 of VLAN is forwarding. C. Designated port is Ethernet 0/1, path cost 10. D. Designated root has priority 0 address 00D0.588F.B600. E. VLAN is executing the IEEE compatible spanning tree protocol.

Answer:E

97. You need to create a subinterface so that you can support different Frame-Relay encapsulations. Which command specifies a second subinterface on serial interface zero? A. Interface s 0.2 point - to point. B. Interface 2 s 0 point to point. C. Sub interface 2 s 0 point to point. D. Interface 0 sub 2 point to point. E. Interface s 0.1 point to point sub 2.

Answer:A

98. You have just configured DDR (Dial on Demand Routing) and would like to test the link. What can you use to bring up the connection? A. Increase the idle timeout parameter. B. Send interesting traffic across the link. C. Reboot one of the Integrated Services Digital Network (ISDN) routers. D. Reset the DDR Integrated Services Digital Network (ISDN) router statistics to zero.

Answer:B

99. Define static routes ? What route do I take to get to the destination?2. Specify interesting traffic ? What traffic type should enable the link? 3. Configure the dialer information ? What number do I call to get to the next hop router, and what service parameters do I use to call?

Answer:D

100. For security reasons you would like a system message displayed when logging into a router. Which of the following allows you to create this message?

A. Banner MOTD B. Message MOTD C. Banner Message D. Message Banner

Answer:A

101. Your company has decided to use a (BRI) connection between the Florida office and the Georgia office. You would like to configure dial on demand routing (DDR) on this connection. Which of the following commands are required to setup DDR? (Choose three) A. Define static routes. B. Configure the dialer information. C. Specify interesting traffic that can enable the link. D. Define DDR password to exchange when the link comes up.

Answer:A,B,C

102. Which of the following are facts about Reverse Address Resolution Protocol? (Choose two.) A. It generates parameter problem messages. B. It maps IP addresses to Ethernet addresses. C. It maps Ethernet addresses to IP addresses. D. It is implemented directly on top of the data link layer.

Answer:c,D

103. You are performing password recovery on a router and you have already adjusted the configuration egister and are now in the router that appears to have no configuration. You notice the old configuration is still saved in NVRAM and you now want to copy the old configuration that is in NVRAM to the current configuration that is in RAM. Which command retrieves the configuration file from NVRAM? A. Config NVRAM. B. Copy NVRAM running-config. C. Copy startup-config running-config. D. Copy running-config startup-config.

Answer:C

103. Which of the following correctly describe IP addressing? (Choose Two) A. IP multicast addresses start with 240. B. A host portion of all 1?s indicates a network broadcast. C. The value of zero (0) in the host portion means ?all hosts? on the network. D. IP addresses are four octets long and contain a network portion and a host portion.

Answer:B,D

104. You are concerned about security on your network. You have a router that is connected to the Internet and do not want your RIP updates being sent out this interface that is connected to the Internet. Which command will prevent these updates from going out the interface without using access-lists? A. Passive route. B. Default routes. C. Passive interface. D. Route update filtering.

Answer:C

105. You have just purchased a router from an online auction and this router had an existing IOS installed on it. You would like to make a backup copy of this IOS. Which one of the following commands will allow you to do this? A. Copy Flash TFTP B. Save Copy TFTP C. Write Backup TFTP D. Write Backup (server-name) E. Copy backup 2 (server-name)

Answer:A

106. You are using setup mode to configure your router for the first time. What does the square bracket indicate in setup mode?

A. Current or default settings. B. Hard coded values that cannot be modified. C. Values entered by the administrator but not saved. D. Values that must be returned to NVRAM before becoming enabled.

Answer:A

107. Gail is having trouble configuring Frame Relay subinterfaces. You decide to send Gail an email explaining some of the installation procedures. Which of the following should you include in your email? (Choose three) A. Each subinterface is configured either multi point or point to point. B. Any network address must be removed from the physical interface. C. The configuration of subinterfaces is done in router Config-(if)# mode. D. Frame relay encapsulation must be configured on each sub interface.

Answer:A,B,C

108. Which of the following are considered VLAN benefits? A. It increases the number of broadcast domains. B. It decreases the number of broadcast domains. C. It increases the number of collision domains. D. It decreases the number of collision domains. E. Since it is a virtual interface, it never shuts down.

Answer:A

109. You have just purchase a brand new router and need to configure this router after the router boots up you exit the setup mode by pressing Ctrl-C and you are now in user mode which command do you use to enter the privileged mode so that you can configure the router?

A. Set B. Enable C. Configure D. Privileges

Answer:B

110. You are using two back-to-back serial cables in your test lab between two Cisco routers. You have determined that one of these routers is the DCE by using the show controllers command. You now need to configure the clock rate to 64 Kbps on serial0 which one of the following commands will allow you to do this? A. Clockrate 64 B. Clock rate 64 C. Clockrate 64000 D. Clock rate 64000 E. Set clockrate 64 F. Serial 10 clockrate 64 G. Clock rate 64000 serial 10

Answer:D

111. Your company has decided to pay for one ISDN B channel to your to house so that you can do some technical support from home. What is the bandwidth capacity of a single ISDN B channel? A. 16 Kbps B. 64 Kbps C. 128 Kbps D. 512 Kbps E. 1.54 Mbps

Answer:B

112. Which of the following are true about debug output? A. The default is to send debug output to the console screen. B. To view debug output from a telnet session, the "terminal monitor" command must be used. C. If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed with the "show log" command. D. If the "no logging console" command were configured, output would not be sent to the console. E. All of the above.

Answer:E

113. What is the maximum cable distance for 100BaseT? A. 607 ft B. 25 meters C. 1000 ft D. 100 meters E. 185 meters

Answer:D

114. Using your protocol analyzer you have determined your network is very congested. Currently all the devices are connected through a hub. Which solution would best decrease congestion on the network? A. Add a second hub. B. Replace the hub with a router. C. Replace the hub with a switch. D. Replace the hub with a repeater.

Answer:C

115. One of the security mechanisms used in securing a router is access-lists. You have decided to use Standard IP access lists in your company which of the following is an example of a Standard IP access lists? A. Access-list standard 172.16.4.13 B. Access-list 2 deny 172.16.4.13 0.0.0.0 C. Access-list 101 deny 172.16.4.13 0.0.0.0 D. Access-list 199 deny 172.16.4.13 255.255.255.255

Answer:B

116. You would like to use Ethernet 100BaseTx in your network. What is the maximum cable length? A. 10 m B. 50 m C. 100 m D. 1000 m

Answer:C

117. You have just been hired to setup a new company network. This company will be using an accounting package that requires multiple hosts. These hosts are the accountants and they must be able to support data transfer between each other at a rate of 10 Mbps. The company will also have a file server that is used for the other employees of the company who just use word processing applications that use less than 3 Mbps to transfer files to server. What is your economical recommendation?

A. That the existing 10BaseT hub be replaced with 100BaseT hub to improve overall performance. B. That a router can separate the testing application from the rest of the network thus allowing the testing application more bandwidth. C. That the switch be installed so that enterprise server can be provided a 100 Mbps port and each of the testing application hosts can be given dedicated 10 Mbps ports. D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application.

Answer:C

118. AJ has just created an IP access-list and you will like to see if he has applied this access-list to an interface. Which one of following commands will allow you to see if an access-list has been applied to an interface? A. Router# show ip interface B. Router> show access-list C. Router# show ip access-list D. Router> show interface ip access-list

Answer:A

119. Assuming that our network is using an older version of UNIX what is the maximum number of subnets that can be assigned to networks when using the address 131.107.0.0 with a subnet mask of 255.255.240.0? A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network

Answer:D

120. Which one of the following statements about an Ethernet LAN is true? A. The advantage of a full duplex is the ability to transmit data over Mbase2 cable. B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present. C. Ethernet switches can use full duplex mode to connect multiple nodes to a single port of a switch. D. Half duplex is a cut through packet processing method that is very fast with little error correction, full duplex is store and forward method that is slower but has better error correction.

Answer:B

121. You want to make sure that access-list you just created does not conflict with an existing access-list. Which router command allows you to view all of the access-lists created and the contents of all access lists? A. Router# show interface. B. Router> show IP interface. C. Router# show access-lists. D. Router> show all access list.

Answer:C



251. Your company is concerned about Security on your network. Each department has its own file server and the company also has an enterprise server that is shared by all departments. The accounting department is concerned about the accounting information being accessible from the other departments. What can you as the network administrator use to control the information so that it?s not being passed between the departments? A. Bridge between management and sites. B. Routers to provide the most secure segmentation. C. A hub to provide the ease of management and a satisfactory alternative for the network security. D. An Ethernet switch to secure separation through programming the access list of each port of the switch.

Answer:B

252. You need to segment your network which of the following hardware devices can you use to segment yournetwork? (Choose three.)

A. Hub B. Repeater C. Switch D. Bridge E. Router F. Media converter

Answer:C,D,E

253. Which of the following are reasons to use VLANs? (Choose three.) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They enhance network security. D. They increase the size of broadcast domains while decreasing the number of broadcast domains. E. They increase the number of broadcasts domain while decreasing their size. F. The simplify switch administration.

Answer:B,C,E

254. How does a layer two device such as a bridge or switch function?

A. It maintains a table of the IP address of the host connected to its internet segment B. It passes packets outside of its network segment if its IP address cannot be found on its table. C. It looks up the frames destination in its address table and sends the frame towards the destination. D. It maintains the table of the data link layer and network layer addresses for the host connected to its network segment.

Answer:C

255. What is the network address for a host with the IP address 123.200.8.68/28? A. 123.200.8.0 B. 1231.200.8.32 C. 123.200.8.64 D. 123.200.8.65 E. 123.200.8.31 F. 123.200.8.1

Answer:C

256. Which two statements are valid? (Choose two.) A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a private broadcast domain. B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions. C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth. D. Full-duplex Ethernet provides lower throughput than half-duplex Ethernet of the same bandwidth. E. Full-duplex Ethernet consists of a shared cable segment while half-duplex Ethernet provides a point-topoint link.

Answer:A,C

257. Which of the following statements about a reliable connection oriented data transfer are true? (Choose two) A. Recipients acknowledge receipt of data. B. When buffers are filled to capacity, datagrams are discarded and not re transmitted. C. Windows are used to control the amount in outstanding acknowledged data segments. D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection. E. The receiving device waits for acknowledgements from the sending device before accepting more data segments.

Answer:A,C

258. If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary. Which of the following is the correct bit pattern for the first octet? A. 0xxxxxxx B. 10xxxxxx C. 110xxxxx D. 1110xxxx E. 11110xxx



Answer:B

121. Using a protocol analyzer we noticed sustained, heavy collisions in our CSMA/CD LANs. What are some possible affects could this have our LAN? (Choose three.)

A. Increased broadcast traffic. B. Delay. C. Low throughput. D. High throughput. E. Congestion. F. Higher bandwidth.

Answer:B,C,E

191. Which of the following are layer 7 protocols? (Choose two.) A. Ping B. Telnet C. FTP D. TCP E. IP

Answer:B,C

192. What is the total bandwidth of an ISDN BRI circuit? A. 54 kps B. 64 kps C. 112 kps D. 128 kps E. 144 kps

Answer:E

193. A. As all devices connected to the same bridge are in the same broadcast domain, all broadcasts are forward to all collisions domains. Therefore broadcasts are not reduced.A. Bridges do not affect the number of broadcast domains. B. Bridges neither increase nor decrease the broadcasts within a collision domain. C. Bridges do not necessarily increase the efficiency of routing. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 22 ? 24 and 30 ? 31. 118. To successfully troubleshoot LAN/WAN connectivity problems on a router which of the following commands could you use? (Choose three.) D. Ping E. Tracert F. Ipconfig G. Show ip route H. Winipcfg I. Show interfaces

Answer:A,D,F

194. C. FTP is an application layer protocol. This protocol deals with transferring of files.A. TFTP is a simpler version of FTP and resides at the application layer. B. SMTP is an application layer protocol. This protocol deals with the sending of emails. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 11. 117. What are benefits of bridging (Choose two.) C. To reduce broadcasts within collisions domains. D. To reduce collisions within broadcasts domain. E. To increase the number of broadcasts domains. F. To increase the broadcasts within collisions domains. G. To increase the number of collision domains. H. To increase the efficiency of routing.

Answer:B,E

195. The Presentation layer of the OSI model has a variety of coding and conversation functions that are applied to the application layer data. Which of the following are examples of this coding? (Choose three) A. Rich Text Format (RTF) B. Quick Time movie C. FTP D. TFTP E. SMTP F. MIDI

Answer:A,B,F

196. A. The application layer is how users and applications access protocols and does not deal with the receipting and resending of data.A. The presentation layer deal with several things, such as how things are presented and encrypted, but not with the transmission of data. B. The session layer ensures that data from different applications are kept separate and with the controlling the communication process. C. The data link layer detects errors but not the transmission of data. D. The physical layer moves the bits between the devices and is not concerned with the process. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 ? 11. 115. Ron is an employee that is able to work from home to provide technical support for the company during the evening hours. Part of Ron?s responsibility is to make sure the company?s SQL database is working at all times for the companies customers. Ron runs big client-server applications and also transfers large files. These changes must happen quickly. The company is concerned about cost for these connections and also would like a practical solution. What connection would you suggest for this organization? E. An ISDN basic rate interface (BRI) connection to the user?s home. F. A dedicated T1 connection to the user?s home. G. A dedicated Frame Relay connection to the user?s home. H. A standard 28.8 analogue dial up connection to the users home

Answer:A

197. Which one of the layers of the seven layer OSI model uses positive acknowledgement and retransmission to ensure reliable delivery? A. Application B. Presentation C. Session D. Transport E. Data link F. Physical

Answer:D

198. To distinguish between each PVC what does the Frame Relay switch use? A. Data link connection identifier (DLCIs) B. CNs C. FECNs D. Local management interface LMI

Answer:A

199. A. The ipx load-balance is not a valid command.A. The ip maximum-paths 2 is not a valid load balancing command for ip. B. The ipx load-share is not a valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 340 ? 341. 111. The ABC Company has hired you as a consultant to add a new VLAN named SALES to there existing switched network. Which of the following are true regarding configuration of this VLAN? (Choose three.) C. The VLAN must be created. D. The VLAN must be named. E. An IP address must be configured for the SALES VLAN. F. The desired ports must be added to the new VLAN: G. The VLAN must be added to the STP domain.

Answer:A,B,D

200. RouterA has two redundant paths serial links to RouterB. RouterA and RouterB are only using the IPX protocol. You have noticed that RouterA is not using both paths to get to RouterB. Which command can you enter to enable load balancing across those serial links? A. ipx load-balance. B. ip maximum-paths 2. C. ipx maximum-paths 2. D. ipx load-share.

Answer:C

201. Julia telnets to a pc on a remote subnet, which MAC address will be present in the ARP table when you issue the show arp command? A. MAC address of the destination host Ethernet port. B. MAC address of the local router Ethernet port. C. MAC address of the destination router Serial port. D. MAC address of the local router Serial Port.

Answer:B

202. A. This is not a CLI editing key sequence.A. This will exit you out of the mode you are currently in. D and E. These are not a CLI editing key sequence. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 96 ? 97. 108. Which of the following statements about layer 2 bridges and switches are true? (Choose three.) B. Switches are primarily software based while bridges are hardware based. C. Both bridges and switches forward Layer 2 broadcasts. D. Bridges are frequently faster than switches. E. Switches have a higher number of ports than most bridges. F. Bridges define broadcast domains while switches define collision domains. G. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

Answer:B,D,F

203. You have just entered the command: Superhero(config-line)#logging sync Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command.

Which keystroke(s) did you use to complete the above command above to the completed following command: Superhero(config-line)#logging synchronous ?

A. Ctrl+shift+6 then x. B. Ctrl+Z C. TAB D. /? E. Shift

Answer:C

204. How do you change the Console password on the Sonic router to "cisco"? A. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)#password cisco B. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)# password Cisco

Answer:A

205. Christopher issues a show cdp neighbor command from RouterA. RouterA has connections to RouterB and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three)

A. The neighboring router?s host name. B. The neighboring router?s hardware platform. C. Up to one address for each protocol supported. D. Up to two addresses for each protocol supported. E. As many addresses as are configured for each protocol supported.

Answer:A,B,C

206. Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams? A. ICMP echo request. B. Information request. C. Timestamp reply. D. Redirect. E. Source quench.

Answer:A

207. All TCP/IP hosts implement the ICMP protocol? A. TRUE B. FALSE

Answer:A

208. Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use autonomous system number 130. Which is the correct command for this installation? A. Router(config)# igrp 130 B. Router(config)# network 130 C. Router(config)# router igrp 130 D. Router(config)# enable igrp 130

Answer:C

209. To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the following is true about this mechanism? A. TCP makes no effort to check for lost or duplicate data packets. B. The application layer must sequence data packets when using TCP. C. TCP controls the flow of UDP data through negative acknowledgements NAK. D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable.

Answer:D

210. What are the benefits of replacing a hub with a bridge and segmenting the network? A. It increases the number of collision domains. B. It decreases the number of collision domains. C. It increases the number of broadcast domains. D. It decreases the number of broadcast domains.

Answer:A

211. Your company is considering purchasing a new accounting software application from ABC accounting company. The ABC accounting company has decided to come in and let you install a demo copy of their software so that you can test it in your network with a few hosts. The server and the hosts that will connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your company has decided to use this new accounting software application. However when you ran your packet analyzer you noticed the rest of the hosts on your network that are not using this application have a bandwidth problem with the new accounting system installed. Since your company has decided to use this new application they would like you to resolve the bandwidth problem. What is the most economical decision would you implement for resolving this problem?

A. Install new 100 Mbps switches, and change all hosts? NIC to 100 Mbps. B. Segment network with router, and place all testing hosts and the new server into a separate subnet (network). C. Add a Bridge and separate the two networks.

Answer:B

212. What must you do to test connectivity on a dial on demand routing (DDR) link? A. Increate the idle import parameter. B. Send interesting traffic across the link. C. Switch D. Repeater

Answer:B

213. Cisco supports IPX traffic using different encapsulation types can go over the same interface. A. TRUE B. FALSE

Answer:A

214. There are five different types of IP address classes. What IP address class is used for multicasting?

A. A B. B C. C D. D E. E

Answer:D

216. What is the protocol and what is the second part of the following network address: 10.0.0.254 mask 255.0.0.0 ? (Choose all that apply.) A. IPX MAX address. B. IP Class C director broadcast. C. Private IP address node number. D. Public IP address directed broadcast. E. Private IP address directed broadcast.

Answer:c

217. Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

Answer:B

218. Which layer of the OSI model handles data translation, code formatting, and encryption occur?

A. Physical B. Data link C. Network D. Transport E. Session F. Presentation

Answer:F

219. RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to RouterB (you put it administratively down). If you issue the command show interface on RouterB what output status would you see on the interface that is connected to RouterA? A. Interface is down, line protocol is down. B. Interface is down, line protocol is up. C. Interface is up, line protocol is down. D. Interface is up, line protocol is up.

Answer:A

220. Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.) A. Too many hosts in a broadcast domain. B. Full Duplex operation. C. Broadcast storms. D. Multicasting. E. Segmentation. F. Low bandwidth.

Answer:A,C,D,F

221. Looking at this address 255.255.255.255 which one of the following is true? A. IP, a flooded broadcast. B. IP, a directed broadcast. C. IPX, a flooded broadcast. D. IPX, a remote directed broadcast.

Answer:A

222. IP addresses use hierarchical numbering. What portion of the address that will identify the network number? A. Subnet Mask. B. Dots between octets. C. Class of first octet. D. Assignments of DHCP. E. Address Resolution Protocol.

Answer:C

223. Which wide are network technology was designed to use high-performance digital lines and is packet switched? A. FDDI B. ISDN C. ATM D. Frame Relay

Answer:D

224. Which of the following are functions that occur at the transport layer of the OSI model? (Choose three) A. Route selection-IP B. Sliding window-UDP C. Well known ports-IP D. Route validation-ICMP E. Connection oriented-TCP/IP F. Three way handshake TCP/IP G. No acknowledgement-UDP

Answer:E,F,G

225. A. Frame relay is used to handle multiple virtual circuits.A. X.25 defines how the connections between DTE and DCE are maintained. B. ATM was designed to take advantage of the speeds offer by media such as E3 and T3. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387 ? 389 and 373. 83. One of the best ways to understand how to build a network is to understand the method in which traffic is passed across the network. One of the reasons the OSI model was created to help you understand how a network operates. Which three devices operate at all seven layers of the OSI model? (Choose three.) C. Network host D. Network management station E. Transceiver F. Bridge G. Web server H. Switch

Answer:A,B,E

226. Which wide area network technology was designed to work with traditional POTS lines and provide SOHO?s and users with a higher speed digital dial-up service? A. Frame relay B. X.25 C. ATM D. ISDN

Answer:D

227. Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and the total number of host per network?

A. 1 network with 254 hosts. B. 2 networks with 128 hosts. C. 4 networks with 64 hosts. D. 6 networks with 30 hosts.

Answer:A

228. Exhibit: You are configuring R2 so that it can communicate with R1 on serial port s0. What encapsulation should you use on s0 to setup this IPX network?

A. SAP B. HDLC C. ARPA D. Novel Ether

Answer:B

229. In which order takes the data encapsulation place.Click the task button & Place the encapsulation.


A.

Answer:A

230. Exhibit You want to create a sub interface on serial 0 on Router R2. Which of the following is the correct syntax to create this sub interface 2?

A. Interface s0.2 point-to-point. B. Interface 2s0 point-to-point. C. Subinterface 2s 0 point-to-point. D. Interface s0 sub2 point-to-point. E. Interface s0.1 point-to-point sub2.

Answer:A

231. Exhibit: You are configuring the IPX encapsulation between RouterA and RouterB. This connection will be using the S0/0 port on RouterA to S0/0 on RouterB. Which encapsulation type should be used for the S0/0 port of RouterB?

A. SAP B. HDLC C. ARP D. NOVELLETHER

Answer:B

232. Exhibit:

You are configuring R3 so that it can communicate with R2 on Ethernet port e1. What encapsulation should you use on s0 to setup this IPX network?

A. SAP B. HDLC C. ARPA D. Novell-Ether

Answer:D

233. Which one of the following characteristics about Ethernet Switches is true?

A. Symmetric switching allows connection between ports of unlike bandwidth and does not require memory buffering. B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected on a symmetric switch. C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store and forward is better for error detection. D. The cut-trough method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address.

Answer:D

234. A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a password for the first 5 virtual lines, password for console, and an encrypted password for privileged mode.Configure the passwords on the Patton router according to the table below. Type Password Telnet apple Console pear Privileged peach ? The routers are named Marshal, Sherman, and Patton. ? The network is subnetted with a mask 255.255.255.224 ? The routing protocol is RIP ? The serial 0 interface is provided with clocking. ? The chart below includes the IP addresses. Lab 1 Name : Marshal E0 : 192.168.12.33 S0 : 192.168.12.65 Lab 2 Name : Patton E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68 Lab 3 Name : Sherman E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68

Start by clicking on host that is connected to the router you want to configure.

A. Lab 2: enable config terminal hostname Berley enable secret peach line con 0 login password pear line vty 0 4 login password apple ^Z copy running-config startup-config

Answer:A

235. Exhibit: You are configuring an IP printer that is connected to your network. You would like to use the last IP address that is on your subnet for this printer. You run ipconfig on your personal computer and the exhibit shows your IP address and its subnet mask. Based on your IP address and subnet mask what would the last possible address be on your subnet?

A. 172.20.7.255 B. 172.20.7.197 C. 172.20.7.190 D. 172.20.7.129 E. 172.20.255.255

Answer:C

236. If we are using IPX as our routed protocol and our network has an existing Novell Server with an IPX network address of 4ad1 and we are connecting a Cisco routers Ethernet port to the same segment. The MAC address of the Ethernet port is 021f.2cfe.8322. What will the complete IPX address be for the Ethernet port.Enter the IPX address for the port.


A.

Answer:A

237. The network 131.107.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses. What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum?Type the correct value in each box below.


A.

Answer:A

238. Exhibit:

Company XYZ has purchased another switch to add to their existing network. They want you to connect this new Ethernet switch to an existing Ethernet switch. Which cable from the diagram above would you used to connect these two switches together?

A. Cable A B. Cable B C. Cable C D. Cable D

Answer:B

239. Exhibit: Which one of the following cables allows a router to another router over the Ethernet? This is a direct connection and not using a hub or a switch.

A. Cable A B. Cable B C. Cable C D. Cable D

Answer:B

240. Exhibit

You are the network administrator of the network shown in the exhibit. You have just added a PC to the network. However, the PC is unable to connect to the SQL Server computer. What can be the cause of this problem?

A. PCs IP address. B. PCs subnet mask. C. PCs default gateway. D. Router interface E0 IP address.

Answer:C

241. Exhibit: Catalyst Switches have three primary operating modes that are used to handle frame switching Cutthrough, Store-and-forward and Fragment-free looking a the frame shown in the diagram which point is the store-and-forward switching decision made?

A. 1 B. 2 C. 3 D. 4

Answer:D

242. Exhibit: Looking at the diagram above ports 1 through 4 are assigned to VLAN1 and ports 5 through 8 are assigned to VLAN3 on each switch. The switches are interconnected over an ISL trunk link. Which of the following actions would test proper VLAN and trunk operation? (Choose three.)

A. Host 2-1 can ping Host 2-2 B. Host 2-1 can ping Host 7-2 C. Host 2-1 can not ping Host 2-2 D. Host 7-1 can not ping Host 2-2 E. Host 7-1 can ping Host 7-2

Answer:A,D,E

243. You are a network administrator for an Insurance company. The company has three routers named Tokyo, Kobe and Yokohama. You have already configured the Tokyo and the Kobe routers, but Yokohama still need some further configuration. The Yokohama router need:? a password for the for the first 5 virtual lines ? a password for the console ? a password for the privileged mode. These password must be encrypted. The following passwords should be used: Type Password Telnet Test Console myconsolepassword Privileged myprivegedpassword The network use a 255.255.255.0 subnet mask, RIP is the only routing protocol used, and clocking is provided on the serial 0 interface.

Lab 1 Name: Tokyo E0: 30.15.7.1 S0: 30.15.8.1 Lab 2 Name: Kobe E0: 30.15.9.1 S0: 30.15.10.1 S1: 30.15.8.2 Lab 3 Name: Yokohama E0: 30.15.11.1 S1: 30.15.10.2 Start by clicking on host that is connected to the router you want to configure.

A. Lab 3: enable config terminal hostname Yokohama enable secret mypassword line con 0 login password mypassword line vty 0 4 login password Test ^Z copy running-config startup-config

Answer:A

244. A Web consulting business has three routers in their systems. These router, Venus, Afrodite, and Zeus, are placed in separate local area networks. The Venus and Afrodite routers need no further configuration. The configuration of Zeus is also complete, except the password for the first 5 virtual lines, the password for the console, and the password for the privileged mode. The CIO has told you that the privileged password must be encrypted to achieve highest possible security. Your task is to configure the passwords on the Zeus router. The passwords to configured are: Type Password Telnet Router1 Console andorra Lab 1 Name: Zeus E0 : 213.197.14.189 SO : 213.197.14.211 Lab 2 Name: Venus E0 : 213.197.14.23 SO : 213.197.14.37 Lab 3 Name: Afrodite E0 : 213.197.14.73 SO : 213.197.14.113 S1 : 213.197.14.120

Start by clicking on host that is connected to the router you want to configure.

A. Lab 1 enable config terminal enable secret whatsoever line vty 0 4 login password mypassword line console 0 login password andorra ^z copy running-config startup-config

Answer:A

245. Exhibit:Router1#show interface serial 0/0 Serial0/0 is down, line protocol is down Hardware is HD64570 Internet address is 172.22.5.1/30 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation HDLC, loopback not set, keepalive set (10 sec) Last input never, output 00:03:11, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max(drops): Total output drops: 0 Queuing strategy: weighted fair Output queue: 0/1000/64/0 (size/max active/threshold/drops)

Conversations 0/2/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 11 packets output, 476 bytes, 0 underruns 0 output errors, 0 collisions, 27 interface resets 0 output buffer failures, 0 output buffers swapped out 11 carrier transitions DCD=down DSR=down DTR=down RTS=down CTS=down Router1 cannot establish a connection to Router2 using the show interface serial 0/0 command on Router1 command which layer of the OSI model is most likely the problem?

A. Physical layer. B. Data layer. C. Network layer. D. Transport layer.

Answer:A

246. Exhibit:Router1# show ipx interface e0 Ethernet0 is up, line protocol is up IPX address is 6F2C.0000.0c5d.b36e, NOVELL_ETHER [up] line-up, RIPPQ:0, SAPPQ: 0 Delay of this IPX network, in ticks is 1 throughput 0 link delay 0 IPXWAN processing not enabled on this interface. IPX SAP update interval is 1 minute(s) IPX type 20 propagation packet forwarding is disabled Incoming access list is not set Outgoing access list is not set IPX helper access list is not set

SAP GNS processing enabled, delay 0 ms, output filter list is not set SAP Input filter list is not set SAP Output filter list is not set SAP Router filter list is not set Input filter list is not set Output filter list is not set Router filter list is not set Netbios Input host access list is not set Netbios Input bytes access list is not set Netbios Output host access list is not set Netbios Outpus bytes access list is not set Updates each 60 seconds, aging multiple RIP: 3 SAP: 3 SAP interpacket delay is 55 ms, maximum size is 480 bytes RIP interpacket delay is 55 ms, maximum size is 432 bytes IPX accounting is disabled IPX fast switching is configured (enabled) RIP packets received 0, RIP packets sent 1 SAP packets received 0, SAP packets sent 1 Novell IPX addressing uses a two-part address that consists of 32 bits for the network number and 48 bits for the node number. What is the node number/layer 2 address as shown in the output of the show ipx interface e0 command?

A. 6F2C B. 0000.0c C. 5d.b35e D. 0c5d.b363 E. 0000.0c5d.b363 F. 6F2C.0000.0c5d.b363

Answer:E

247. A soft drink company has made the decision to provide 3 branches with network connectivity. There is a LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost fully configured. However, it does not have the routing protocol configured. Configure the routing protocol and publish all networks on the Plain router. The configurations of the routers are as follows: ? The routers are named Vanilla, Chocolate, and Plain. ? RIP is the routing protocol used. ? The clocking is provided on the serial 0 interface. ? The password on the Plain router is ?mypassword? ? The default subnet mask is used on all interfaces ? The IP addresses are listed below. Vanilla E0 192.168.149.1 S0 192.168.199.1 Chocolate E0 192.168.55.1 S0 192.168.101.1 S0 192.168.199.1 Plain E0 192.168.65.1 S0 192.168.101.1


Lab 1 Name: Vanilla E0 192.168.149.1 S0 192.168.199.1 Lab 2 Name: Chocolate E0 192.168.55.1 S0 192.168.101.1 S1 192.168.199.1 Lab3 Name: Plain E0 192.168.65.1 S1 192.168.101.2 Secret Password: mypassword Start by clicking on host that is connected to the router you want to configure.

A. Lab 3: enable config terminal hostname Plain enable secret mypassword interface ethernet 0 ip address 192.168.65.1 255.255.255.0 no shutdown exit interface serial1 ip address 192.168.101.2 255.255.255.0 no shutdown exit router rip network 192.168.65.0 network 192.168.101.0 network 192.168.55.0 network 192.168.149.0 network 192.168.199.0 ^z copy running-config startup-config

Answer:A

248. Exhibit:

Frame Relay switch maps the DLCIs between Router A to Router B to create a PVC. Which statement below correctly identifies the reference point between the local router and the Frame Relay switch to which it is connected?

A. Locally significant DLCI B. Globally significant DLCI C. Locally significant LMI D. Globally significant LMI

Answer:A

249. You have a leased line configured at a small office that connects to the corporate office. You company would also like to have a backup incase the lease line goes down. Which WAN service would you most likely choose to backup the leased line? A. Frame relay with SVC B. Dedicated serial line C. ISDN with DDR D. ATM

Answer:C

250. What are the advantages of using the OSI layered network model? (Choose three.) A. Allows multiple-vendor development through standardization of network components. B. Creates a list of communication rules that all companies must implement to get onto the Internet. C. Allows various types of network hardware and software to communicate. D. Prevents changes in one layer from affecting other layers, so it does not hamper development. E. Allows companies to develop proprietary interfaces.

Answer:A,c,D

259. What is the correct order of PDUs in data encapsulation? A. Data, Frame, Packet, Segment, Bit B. Data, Frame, Segment, Packet, Bit C. Data, Packet, Frame, Segment, Bit D. Data, Packet, Segment, Frame, Bit E. Data, Segment, Frame, Packet, Bit F. Data, Segment, Packet, Frame, Bit

Answer:F

260. Which three are examples of the functions of connection oriented services? (Choose three) A. Connection parameters are synchronized. B. Any loss or duplication of packets can be corrected. C. The data packet is independently routed and the service does not guarantee the packet will be processed in order. D. A data communication path is established between the requesting entity and the peer device on the remote end system.

Answer:A,B,D

261. Which of the following devices support Full Duplex Ethernet ? (Choose two.) A. Switch to host. B. Switch to switch. C. Hub to hub. D. Switch to hub. E. Hub to host.

Answer:A,B

262. Full-duplex gives you the ability to send and receive data at the same time. Which of the followingEthernet standards can operate in full-duplex mode? (Choose two.)

A. 10Base2 B. 10Base5 C. 10BaseT D. 100BaseT

Answer:A,D

263. What are good reasons for using layer two switches? (Choose two) A. To reduce collisions. B. To increase collisions. C. To increase the number of collision domains. D. To decrease the number of collision domains. E. To decrease the number of broadcast domains.

Answer:A,C

264. What can you use to connect a user?s pc directly to a router? A. Connect the PC's COM port to the router's console port using a straight-through cable. B. Connect the PC's COM port to the router's console port using a crossover cable. C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable. D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable. E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable. F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.

Answer:D

265. You issue the command show ip route which of the following correctly describes the codes displayed in your route table after you issue this command? (Choose two.) A. I-Indicates a route was learned through an internal protocol. B. S-Indicates a route was learned through static command. C. R-Indicates a route was learned through RIP. D. S-Indicates a route was learned through a serial port. E. R-Indicates a route was learned through a reliable port.

Answer:B,C

266. What one of the following is an example of a layer 2 MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEG D. 00-00-12-34-FE-AA

Answer:D

267. You company uses a switch in the training department. You need to be able to make changes to this switch remotely so that you can allow different classrooms to have access to the Internet as needed. What do you have to configure on this switch so that you can remotely make these changes? (Choose two.) A. The switch name must match the workgroup name of the local network. B. The switch must be configured with an IP address and default gateway. C. The remote workstations must have access to the VSM of the switch. D. CDP must be enabled on the switch so that other devices on the network can locate it.

Answer:B,C

268. Which layer of the OSI model ensures reliable end-to-end delivery of data? A. Application B. Presentation C. Session D. Transport E. Network

Answer:D

269. Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers. Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its neighbor. The routers have been working properly.

The connection between North and Main ceases operation one day and an unauthorized entry is detected on the South router. Determine the problem and restore connectivity. The network has been configured with the following characteristics: The routers are named North, Main, South. All networks have the default subnet mask. RIP is the routing protocol. The clocking signal is provided on the serial 0 interface.


Lab 1 Name: North E0: 192.168.159.1 S0: 192.168.75.1 Secret password : testk Lab 2 Name: Main E0: 192.168.112.1 S0: 192.168.201.1 S1: 192.168.75.2

Secret password : testk Lab 3 Name: South E0: 192.168.65.1 S1: 192.168.201.2 Secret password : testk Start by clicking on host that is connected to the router you want to configure.

A. Answer Lab 1: enable config terminal hostname North enable secret testk interface ethernet 0 ip address 192.168.159.1 255.255.255.0 no shutdown exit interface serial 0 ip address 192.168.75.1 255.255.255.0 clock rate 64000 no shutdown exit router rip network 192.168.159.0 network 192.168.75.0 ^z copy running-config startup-config Comments: Note: comments are added in text after the !-sign. They will not be shown during simulation. First we click on the Lab 1 router. Router Con0 is now available ! The router starts Press RETURN to get started. ! Here we press return Router>enable ! We must enter EXEC mode (or enable mode as it also called) Router#config terminal ! We must enter configuration mode. Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname North ! We change the host name North(config)#enable secret testk ! We set the password North(config)#interface ethernet 0 ! We enter interface configuration mode for ethernet 0 North(config-if)#ip address 192.168.159.1 255.255.255.0 ! We set the IP address for Ethernet 0. ! Note that we use a 24 bit network mask. !It is a class C address. North(config-if)#no shutdown ! We start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up North(config-if)#exit ! We exit interface configuration for Ethernet 0 North(config)#interface serial0 ! We enter interface configuration mode for the serial0 interface. ! Note that there are no space in serial0 North(config-if)#ip address 192.168.75.1 255.255.255.0 ! IP address for serial0 ! Cisco recommends to set the IP address of the interface before ! setting the clockrate North(config-if)#clock rate 64000 ! We set a clockrate. We must do it to enable communication between ! the routers. They must be synchronized. North(config-if)#no shutdown ! Start the serial0 interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up %LINK-3-UPDOWN: Interface Serial0, changed state to up North(config-if)#exit ! Exit interface configuration mode North(config)#router rip ! Start the routing protocol. RIP does not need further configuration. ! RIP works well in this small network. ! We enter router configuration mode. North(config-router)#network 192.168.159.0 ! We enable RIP on the network of Ethernet E0. North(config-router)#network 192.168.75.0 ! We enable RIP on the network of Serial0. North(config-router)#^Z ! We exit configuration mode and return to enable mode. %SYS-5-CONFIG_I: Configured from console by console North#copy running-config startup-config ! We save our configurations to NVRAM Destination filename [startup-config]? ! We confirm with Enter. North# ! We are finished. You don't need to make full configuration because all routers have already been configured but they have some mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks. Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 374-403. Note: If you are unsure of the testing environment, try the following address: http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html ************************************ Answer Lab 2: enable config terminal hostname Main enable secret testk interface ethernet 0 ip address 192.168.112.1 255.255.255.0 no shutdown exit interface serial 0 ip address 192.168.201.1 255.255.255.0 clock rate 64000 no shutdown exit interface serial 1 ip address 192.168.75.2 255.255.255.0 no shutdown exit router rip network 192.168.75.0 network 192.168.112.0 network 192.168.201.0^z copy running-config startup-config Comments: Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make sure that we enable RIP on all three interfaces with the network command. ****************************************** Answer Lab 3: enable config terminal hostname South enable secret testk interface ethernet 0 ip address 192.168.65.1 255.255.255.0 no shutdown exit interface serial 1 ip address 192.168.201.1 255.255.255.0 no shutdown exit router rip network 192.168.201.0 network 192.168.65.0 ^z copy running-config startup-config Comments: Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1.

Answer:A

270. Switches have three primary modes to handle frame switching. Which two statements about the storeand forward switching method are true? (Choose two)

A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before beginning to forward it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the frame immediately.

Answer:B,C

271. Spanning-Tree was originally developed by DEC. What is the reason Spanning-Tree is used in a switched LAN? A. To provide a mechanism for network monitoring in switched environments. B. To prevent routing loops in networks with redundant paths. C. To prevent routing switching loops in networks with redundant switched paths. D. To manage, the addition, deletion, and naming of VLANs across multiple switches. E. To segment a network into multiple collision domains.

Answer:C

272. Your company has decided to use IP RIP version 1 as the routing protocol. Which of the following are the commands you can use to configure IP RIP version 1 on your router? A. Router RIP network 172.16.1.0 network 10.1.0.1 B. Router RIP network 172.16.0.0 network 10.0.0.0 C. Router RIP network 172.16.1.0 172.16.1.1 network 10.1.0.0 10.1.1.1 D. Router RIP network 172.16.1.0 265.255.255.0 Network 10.1.0.0 255.255.0.0

Answer:B

273. Which of the following are Application layer protocols that use TCP/IP? (Choose three.) A. ARP B. HTTP C. SMTP D. FTP E. ICMP

Answer:B,C,D

274. Switches have three primary modes to handle frame switching. Which one of these modes looks at the destination address and then immediately forwards the frame to the destination? A. CSMA/CD B. FULL DUPLEX C. CUT THROUGH D. HALF DUPLEX E. FRAGMENTATION F. STORE AND FORWARD

Answer:C

275. TCP is a connection-oriented protocol. An advantage of operating in a connection-oriented environment is that a connection is established between both ends before the transfer of information can begin. What is a disadvantage of using a connection-oriented protocol such as TCP? A. Packet acknowledgement may add overhead. B. Packets are not tagged with sequence numbers. C. Loss or duplication of data packets is more likely to occur. D. The application layer must assume responsibility for correct sequencing of the data packets.

Answer:A

276. The IP address 131.107.0.0 is a class B address. What is the range of binary values for the first octet in this address class? A. 10000000-11111111 B. 00000000-10111111 C. 10000000-10111111 D. 10000000-11011111 E. 11000000-11101111

Answer:C

277. Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What is the default encapsulation type for Frame Relay on a Cisco router? A. HDLC B. PPP C. IETF D. Cisco E. ANSI

Answer:D

278. Frame Tagging is used to interconnect multiple switches and to maintain VLAN information as traffic goes between switches. Which of the following statements about the Frame Tagging are true? (Choose two) A. A Filtering table is developed for each switch. B. Frame Tagging defines a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarding between switches. D. Frame Tagging is technique that examines particular information about each frame based on userdefined offsets.

Answer:B,C

279. You can configure PPP on which of the following types of physical interfaces? (Choose two)

A. Ethernet B. Token Ring C. Synchronous Serial D. Asynchronous Serial

Answer:C,D

280. The advanced editing features are turn on by default on Cisco routers. To turn off these features you enter the command terminal no editing. With the advanced editing features turned on what is the effect of Ctrl-Z? A. Exits back to privileged exec mode. B. Disconnects from the router. C. Aborts the ping operation. D. Exits privileged exec mode.

Answer:A

281. The ICMP ping used for troubleshooting a network can be used on a Cisco router in which modes? (Choose two) A. User. B. Privileged. C. Global Configuration. D. Interface Configuration.

Answer:A,B

282. Encapsulation is the method of passing data down the stack of the OSI model and adding headers and trailers. Which one of the following shows the correct order of Data Encapsulation? A. Data, Packet, Segment, Frame. B. Segment, Data, Packet, Frame. C. Data, Segment, Packet, Frame. D. Packet, Data, Segment, frame.

Answer:C

283. Consider Frame Relay multipoint subinterfaces. Which is a valid statement? A. An IP address is required on the physical interface of the central router. B. All routers are required to be fully meshed. C. All routers must be in the same subnet to forward routing updates and broadcasts. D. Multipoint is the default configuration for Frame Relay subinterfaces.

Answer:D

284. Novell Netware allows multiple Layer two frame structures. Cisco supports all of the frame types. Cisco and Novell have assigned different names for the same encapsulation type. Which of the following are correct matches of the Novell term to the equivalent Cisco IOS term for the same framing types? (Choose two) A. Ethernet_II-ARPA B. Ethernet_802.3-SAP C. Ethernet_802.2-LLLC D. Ethernet_SNAP-SNAP

Answer:A,D

285. Frame relay has a feature that prevents PVCs from shutting down from lack of activity. What is the name of this feature? A. DLCI B. BECN C. FECN D. LMI E. CIR F. De

Answer:D

286. What is one benefit of using a hierarchical addressing framework? A. Increase availability of addresses. B. Decrease distance between routers. C. Increase router memory requirements. D. No need to maintain routing information.

Answer:A

287. Exhibit:

RouterA# show interface s0 Serial 0 is up, line protocol is down Hardware is HD64570 Internet address 10.1.1.1 Encapsulation HDLC, loopback not set, keepalive set (10sec) Router A is unable to connect to Router B, which is a Nortel router, through the network cloud. Using the command output shown what must be configured on Router A's interface s0 to change the line protocol from down to up?

A. No shutdown. B. Encapsulation ppp. C. Interface serial point-to-point. D. Clock rate 56000.

Answer:B

288. The default bandwidth of a high-speed serial link is 1.544 or T1. What is the correct command to change the bandwidth of the interface to 64K? A. Bandwidth 64 B. Band width 64 C. Bandwidth 64000 D. Band width 64000 E. Bandwidth 64K

Answer:A

289. What one of the following protocols is an example of a link state routing protocol that uses the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP ver 2

Answer:D

290. Exhibit:

Central Partial Configuration isdn switch-type basic-ni username Remote password king interface bri0 ip address 10.1.1.1 255.255.255.0 encapsulation ppp ppp authentication chap isnd spid1 51055512360001 isnd spid1 51055512360002 dialer map ip 10.1.1.2 name Remote 1238001 dialer-list 1 protocol ip permit

Your company is using ISDN to connect the Remote office to the Central office. The connection is not working between the two routers. You issue the show running-config command looking at the configuration above. Which additional command must be issued on the Central router before interesting traffic will be sent to the Remote router?

A. (config-if)# dialer-group 1 B. (config-if)# dialer-list 1 C. (config-if)# dialer map 1 D. (config-if)# dialer-route 1

Answer:A

291. Exhibit You are network administrator for the network shown in the exhibit above. Adding the new router, called TK2, the network has been augmented. You would like to backup the IOS image of the new router to the TFTP server. However, the backup procedure fails. What could be the cause of the problem?

A. Incorrect default gateway of the tftp server. B. Incorrect subnet mask of the tftp server. C. Incorrect IP address of the tftp server. D. Incorrect IP address on E0 of the TK1 server. E. Incorrect subnet mask on the TK2 router.

Answer:B

292. If RIP uses hop count to determine the best path what does IGRP use? A. The highest metric value. B. The lowest composite metric value. C. The lowest hop-count and delay. D. The highest bandwidth and reliability E. The lowest administrative distance.

Answer:B

293. You have just purchased a new Cisco router. Which mode should you use to create an initial configuration on your router? A. Copy mode. B. User mode. C. Setup mode. D. Startup mode.

Answer:C

294. Once you have defined interesting traffic with the dialer-list command, you then must associate an ISDN phone number with the next hop router address. Which IOS command should you use? A. Isdn destination number. B. Dialer map. C. Isdn spid1. D. Isdn line number.

Answer:B

295. You just purchased a Cisco router from an online auction and now you have configured the router and everything is working perfectly in your test lab. You then issue the command copy run start to save your configuration to NVRAM. You turn off the power and mount the router in the production rack. After connecting the power cord you power up the router and the router boots into setup mode. You issue the show startup-config from privileged mode and your entire configuration is there. Which of the following indicates a possible source of the problem? A. Hardware failure NVRAM prevents the router from loading the configuration. B. Startup-config in flash is corrupt and cannot be analyzed. C. Router configuration register set to bypass startup configuration. D. Startup-config in NVRAM is corrupt and cannot be analyzed.

Answer:C

296. Your ISP has provided you the following class B network range 131.107.0.0/24. Which of the following statements is true regarding this network? (Choose two.) A. There are 254 usable hosts per subnet. B. There is one usable network. C. There are 255 usable hosts per subnet. D. There are 254 usable subnets. E. There are 30 usable subnets. F. There are 62 usable hosts per subnet.

Answer:A,D

297. What is an advantage of segmenting your LAN with a switch? A. Smaller collision domains. B. Elimination of broadcast. C. Decrease cost of implementation. D. Larger number of users within the same domain.

Answer:A

298. When setting up Frame Relay for point-to-point subinterfaces, you enter the following configuration:Router(config)#int s0/0 Router(config-if)#ip address 10.39.0.1 255.255.0.0 Router(config-if)#encapsulation frame-relay Router(config-if)#interface s0/0.39 point-to-point Router(config-if)#frame-relay interface-dlci 139 Router(config-if)#exit Router(config)#exit Router#copy run start Which of the following must not be configured?

A. The Frame Relay encapsulation on the physical interface. B. The local DLCI on each subinterface. C. An IP address on the physical interface. D. The subinterface type as point-to-point.

Answer:C

299. Which show commands can you use to identify the local DLCI number? (Choose two.) A. Show frame-relay local-dlci B. Show frame-relay pvc C. Show frame-relay dlci D. Show frame-relay map E. Show ip route

Answer:B,D

300. There are some differences between routed and routing protocols. Which of the following are examples of those differences? (Choose two.) A. A routed protocol is assigned to an interface and determines the method of packet delivery. B. A routing protocol determines the path of a packet through a network. C. A routed protocol determines the path of a packet through a network. D. A routing protocol operates at the transport layer of the OSI model. E. A routed protocol updates the routing table of a router.

Answer:A,B

301. What are the generic parts of a layer 3 address? A. An internetnetwork number and a URL . B. A vendor code and a serial number. C. A network number and host number. D. A broadcast number and unicast number. E. A domain identifier and a device identifier.

Answer:C

302. You purchased a router from an online auction and you are unable to login to privileged mode because the router has been configured with a password. You need to perform password recovery. One of the first steps in performing password recovery is recording the current configuration register setting from user mode. What is the command to view the configuration register? A. Show register. B. Show flash. C. Show boot. D. Show version.

Answer:D

303. Your manager is concerned about security on the subnet 10.0.1.0/24 that has the accounting servers on it. He would like to make sure users can not telnet to those accounting servers and as asked you to add a statement to your existing access-list to prevent users from accessing those devices via telnet. Which one of the following statements should you enter? A. Access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet B. Access-list 115 deny tcp any 10.0.1.0 eq telnet C. Access-list 115 deny udp any 10.0.1.0 eq 23 D. Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23 E. Access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23

Answer:D

304. You have been assigned a class C network address. Your manager has asked to you create 30 subnets with at least 5 hosts per subnet for the different departments in your organization. What should the subnet mask be to create 30 subnets? A. 255.255.255.255 B. 255.255.255.248 C. 255.255.255.0

Answer:B

305. A. Connection orientated communication is reliable.A. Due to the acknowledgements connection orientated communications are very bandwidth intensive. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 - 30. 52. You have been hired as a consultant to troubleshoot the company?s network. You issue the debug ip rip command to troubleshooting the rip network. You notice your Ethernet interface 10.1.0.0 shuts down. Which update message is seen in your routers debug ip rip output regarding that network? B. Subnet 10.1.0.0, metric 0 C. Subnet 10.1.0.0, metric 1 D. Subnet 10.1.0.0, metric 15 E. Subnet 10.1.0.0, metric 16

Answer:D

306. Which of the following are true about connection-oriented network servers? (Choose two.) A. Non-reliable B. Reliable C. Less bandwidth-intensive D. Handshaking

Answer:B,D

307. You would like the router to look in NVRAM upon boot up. Which one of the following would be the correct value for the configuration register? A. 0x42 B. 0x2102 C. 0x001 D. 0x2101

Answer:B

308. You just purchased a brand new Cisco 2621 router. By default when the router boots which search sequence does it use to locate the IOS software? A. Flash, TFTP server, ROM B. NVRAM, TFTP server, ROM C. ROM, Flash, TFTP server D. ROM, NVRAM, TFTP server

Answer:A

309. To perform password recovery on a Cisco router you have to modify which of the following? (Choose two.) A. Nvram B. Configuration register C. Boot flash D. Cmos E. Flash

Answer:A,B

310. Which hardware device enables high-speed data exchange on a LAN? A. Hub B. Bridge C. Switch D. Repeater

Answer:C

311. Cisco supports three different LMI types for Frame Relay. Which of the following are the type LMI types? (Choose three.) A. IETF B. Q931 C. Q933A D. IEEE E. CISCO F. ANSI

Answer:C,E,F

312. You have installed a new PC to your access layer switch. You have configured the IP address, subnet mask, default gateway, and DNS settings. You have verified that the information you have entered is correct and that the proper cable was used however this PC is unable to access devices that are connected to the same switch. What is the likely cause of this problem? A. The router lacks a routing table entry for the new host. B. The host switch port is assigned to the incorrect VLAN. C. The host MAC address is incorrectly configured. D. A VTP instance for the new host has not been installed.

Answer:B

313. Match the OSI layer with the appropriate description.

A.

Answer:A

314. You just finished installing a new operating system on a computer located in the accounting department. You would like to verify the network configuration from the new computer so you establish FTP connection to a remote TFTP server. Which layer of the OSI model did you use for this operation? A. Application B. Presentation C. Session D. Transport E. Data link F. Internet

Answer:A

315. Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.) A. Link-state advertisement (LSA) B. Spanning Tree Protocol. C. Shortest path first tree. D. Split horizon. E. Hold-down timers.

Answer:D,E

316. Which of the following correctly identifies switched and routed data flow? A. Switches create a single collision domain and a single broadcast domain. Routers provide separate broadcast domains. B. Switches create separate collision domains but a single broadcast domain. Routers provide separate broadcast domains. C. Switches create a single collision domain and a separate broadcast domain. Router provides a separate broadcast domain as well. D. Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains.

Answer:B

317. Your company has purchased some Cisco routers from an online auction. You need to make a backup copy of the IOS and store it on a TFTP server. Which of the following should be done prior to copying the IOS image to a TFTP server? (Choose three.) A. Make sure that the network server can be accessed. B. Check that the authentication for access is set. C. Ensure that the network server has adequate space for the code image. D. Verify any file naming and path requirements. E. Make sure that the server can load and run the bootstrap code.

Answer:A,C,D

318. Cisco supports three types of switching modes on switches. Which mode of switching can have a variable latency through the switch? A. Store-and-forward. B. Cut-through. C. Fragment-free.

Answer:A

319. Using a class C address range 192.168.21.12 your network needs twenty-eight subnets. Which subnet mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252

Answer:D

320. Access-list 122 permit ip 131.107.30.0 0.0.0.255 any You apply the access-list above. Which is the effect? A. Permit all packets matching the first three octets of the source address to all destinations. B. Permit all packets matching the last of the destination address and accept all source address. C. Permit all packets from the third subnet of the network address to all destinations. D. Permit all packets matching the host bits in the source address to all destinations. E. Permit all packets to destination matching the first three octets in the destination address.

Answer:A

321. Which channels are used by ISDN BRI? A. 2d+b B. 23d+b C. 2b+d D. 23b+d

Answer:C

322. What was one of the most important reasons the International Organization for Standardization released the OSI model?

A. Users could access network server faster. B. Different vendor?s networks could work with each other. C. The industry could create a standard for how computers work. D. The network administrator could increase the overall speed of their network.

Answer:B



183. You have just entered the command copy running-config startup-config command to save your configuration so that if the router is rebooted it will keep your configuration. Which type of router memory normally stores the startup configuration? A. RAM B. ROM C. FLASH D. NVRAM

Answer:D

184. Assuming a default subnet mask which two pieces of information can be derived from the IP address 131.107.2.200? (Choose Two) A. It is a Class C address B. It is a Class B address C. The network address is 131.0.0.0 D. The network address is 131.107.2.0 E. The host portion of the address is 2.200

Answer:B,E

185. Comparing half-duplex Ethernet to full-duplex Ethernet which of the following are true? (Choose two.) A. Shared collision domain. B. Private collision domain. C. Higher effective throughput. D. Lower effective throughput. E. Private broadcast domain.

Answer:A,D

186. You are configuring an old router that is running an old IOS that does not support inverse arp. If a router does not support inverse arp how can you setup this frame relay connection? A. Configure static maps. B. Define an IP address. C. Disable DHCP on the Frame Relay router. D. Configure a static route to the remote network.

Answer:A

187. Given the following criteria for granting access from a remote site to your LAN: Restrict access on interface E1 E1=207.87.81.173 Deny access to telnet, FTP, SNMP Allow all other types of operations.

Which line should come last in configuring your access list?

A. Access-List 101 B. Access-List 101 deny E0 telnet FTP C. Access list 101 allow all except FTP telnet D. Access list 101 permit IP 0.0.0.0 255.255.255.255 any E. Access List 101 deny IP 207.87.81.173 TCP EQ 20 21 23

Answer:D

188. Most networks are often described as using either 10BaseT or 100BaseTX media. What does the 'Base' in these media types mean? A. It describes the signaling method for communication on the network. B. It refers to the type of media used in the network. C. It relates to the speed of transmission of network signals. D. It defines the allowable length of media that can be used. E. It defines half-duplex or full-duplex operation.

Answer:A

189. To configure a Frame Relay Router with subinterfaces on interface Serial 3. Which subinterface number could you use for this configuration? A. 1 and 2. B. 3.2 and 3.3 C. 1 and 1.1 D. 3.1a and 3.1b.

Answer:B

121. Using a protocol analyzer we noticed sustained, heavy collisions in our CSMA/CD LANs. What are some possible affects could this have our LAN? (Choose three.)

A. Increased broadcast traffic. B. Delay. C. Low throughput. D. High throughput. E. Congestion. F. Higher bandwidth.

Answer:B,C,E

191. Which of the following are layer 7 protocols? (Choose two.) A. Ping B. Telnet C. FTP D. TCP E. IP

Answer:B,C

192. What is the total bandwidth of an ISDN BRI circuit? A. 54 kps B. 64 kps C. 112 kps D. 128 kps E. 144 kps

Answer:E

193. A. As all devices connected to the same bridge are in the same broadcast domain, all broadcasts are forward to all collisions domains. Therefore broadcasts are not reduced.A. Bridges do not affect the number of broadcast domains. B. Bridges neither increase nor decrease the broadcasts within a collision domain. C. Bridges do not necessarily increase the efficiency of routing. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 22 ? 24 and 30 ? 31. 118. To successfully troubleshoot LAN/WAN connectivity problems on a router which of the following commands could you use? (Choose three.) D. Ping E. Tracert F. Ipconfig G. Show ip route H. Winipcfg I. Show interfaces

Answer:A,D,F

194. C. FTP is an application layer protocol. This protocol deals with transferring of files.A. TFTP is a simpler version of FTP and resides at the application layer. B. SMTP is an application layer protocol. This protocol deals with the sending of emails. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 11. 117. What are benefits of bridging (Choose two.) C. To reduce broadcasts within collisions domains. D. To reduce collisions within broadcasts domain. E. To increase the number of broadcasts domains. F. To increase the broadcasts within collisions domains. G. To increase the number of collision domains. H. To increase the efficiency of routing.

Answer:B,E

195. The Presentation layer of the OSI model has a variety of coding and conversation functions that are applied to the application layer data. Which of the following are examples of this coding? (Choose three) A. Rich Text Format (RTF) B. Quick Time movie C. FTP D. TFTP E. SMTP F. MIDI

Answer:A,B,F

196. A. The application layer is how users and applications access protocols and does not deal with the receipting and resending of data.A. The presentation layer deal with several things, such as how things are presented and encrypted, but not with the transmission of data. B. The session layer ensures that data from different applications are kept separate and with the controlling the communication process. C. The data link layer detects errors but not the transmission of data. D. The physical layer moves the bits between the devices and is not concerned with the process. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 ? 11. 115. Ron is an employee that is able to work from home to provide technical support for the company during the evening hours. Part of Ron?s responsibility is to make sure the company?s SQL database is working at all times for the companies customers. Ron runs big client-server applications and also transfers large files. These changes must happen quickly. The company is concerned about cost for these connections and also would like a practical solution. What connection would you suggest for this organization? E. An ISDN basic rate interface (BRI) connection to the user?s home. F. A dedicated T1 connection to the user?s home. G. A dedicated Frame Relay connection to the user?s home. H. A standard 28.8 analogue dial up connection to the users home

Answer:A

197. Which one of the layers of the seven layer OSI model uses positive acknowledgement and retransmission to ensure reliable delivery? A. Application B. Presentation C. Session D. Transport E. Data link F. Physical

Answer:D

198. To distinguish between each PVC what does the Frame Relay switch use? A. Data link connection identifier (DLCIs) B. CNs C. FECNs D. Local management interface LMI

Answer:A

199. A. The ipx load-balance is not a valid command.A. The ip maximum-paths 2 is not a valid load balancing command for ip. B. The ipx load-share is not a valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 340 ? 341. 111. The ABC Company has hired you as a consultant to add a new VLAN named SALES to there existing switched network. Which of the following are true regarding configuration of this VLAN? (Choose three.) C. The VLAN must be created. D. The VLAN must be named. E. An IP address must be configured for the SALES VLAN. F. The desired ports must be added to the new VLAN: G. The VLAN must be added to the STP domain.

Answer:A,B,D

200. RouterA has two redundant paths serial links to RouterB. RouterA and RouterB are only using the IPX protocol. You have noticed that RouterA is not using both paths to get to RouterB. Which command can you enter to enable load balancing across those serial links? A. ipx load-balance. B. ip maximum-paths 2. C. ipx maximum-paths 2. D. ipx load-share.

Answer:C

201. Julia telnets to a pc on a remote subnet, which MAC address will be present in the ARP table when you issue the show arp command? A. MAC address of the destination host Ethernet port. B. MAC address of the local router Ethernet port. C. MAC address of the destination router Serial port. D. MAC address of the local router Serial Port.

Answer:B

202. A. This is not a CLI editing key sequence.A. This will exit you out of the mode you are currently in. D and E. These are not a CLI editing key sequence. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 96 ? 97. 108. Which of the following statements about layer 2 bridges and switches are true? (Choose three.) B. Switches are primarily software based while bridges are hardware based. C. Both bridges and switches forward Layer 2 broadcasts. D. Bridges are frequently faster than switches. E. Switches have a higher number of ports than most bridges. F. Bridges define broadcast domains while switches define collision domains. G. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

Answer:B,D,F

203. You have just entered the command: Superhero(config-line)#logging sync Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command.

Which keystroke(s) did you use to complete the above command above to the completed following command: Superhero(config-line)#logging synchronous ?

A. Ctrl+shift+6 then x. B. Ctrl+Z C. TAB D. /? E. Shift

Answer:C

204. How do you change the Console password on the Sonic router to "cisco"? A. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)#password cisco B. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)# password Cisco

Answer:A

205. Christopher issues a show cdp neighbor command from RouterA. RouterA has connections to RouterB and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three)

A. The neighboring router?s host name. B. The neighboring router?s hardware platform. C. Up to one address for each protocol supported. D. Up to two addresses for each protocol supported. E. As many addresses as are configured for each protocol supported.

Answer:A,B,C

206. Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams? A. ICMP echo request. B. Information request. C. Timestamp reply. D. Redirect. E. Source quench.

Answer:A

207. All TCP/IP hosts implement the ICMP protocol? A. TRUE B. FALSE

Answer:A

208. Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use autonomous system number 130. Which is the correct command for this installation? A. Router(config)# igrp 130 B. Router(config)# network 130 C. Router(config)# router igrp 130 D. Router(config)# enable igrp 130

Answer:C

209. To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the following is true about this mechanism? A. TCP makes no effort to check for lost or duplicate data packets. B. The application layer must sequence data packets when using TCP. C. TCP controls the flow of UDP data through negative acknowledgements NAK. D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable.

Answer:D

210. What are the benefits of replacing a hub with a bridge and segmenting the network? A. It increases the number of collision domains. B. It decreases the number of collision domains. C. It increases the number of broadcast domains. D. It decreases the number of broadcast domains.

Answer:A

211. Your company is considering purchasing a new accounting software application from ABC accounting company. The ABC accounting company has decided to come in and let you install a demo copy of their software so that you can test it in your network with a few hosts. The server and the hosts that will connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your company has decided to use this new accounting software application. However when you ran your packet analyzer you noticed the rest of the hosts on your network that are not using this application have a bandwidth problem with the new accounting system installed. Since your company has decided to use this new application they would like you to resolve the bandwidth problem. What is the most economical decision would you implement for resolving this problem?

A. Install new 100 Mbps switches, and change all hosts? NIC to 100 Mbps. B. Segment network with router, and place all testing hosts and the new server into a separate subnet (network). C. Add a Bridge and separate the two networks.

Answer:B

212. What must you do to test connectivity on a dial on demand routing (DDR) link? A. Increate the idle import parameter. B. Send interesting traffic across the link. C. Switch D. Repeater

Answer:B

213. Cisco supports IPX traffic using different encapsulation types can go over the same interface. A. TRUE B. FALSE

Answer:A

214. There are five different types of IP address classes. What IP address class is used for multicasting?

A. A B. B C. C D. D E. E

Answer:D

216. What is the protocol and what is the second part of the following network address: 10.0.0.254 mask 255.0.0.0 ? (Choose all that apply.) A. IPX MAX address. B. IP Class C director broadcast. C. Private IP address node number. D. Public IP address directed broadcast. E. Private IP address directed broadcast.

Answer:c

217. Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

Answer:B

218. Which layer of the OSI model handles data translation, code formatting, and encryption occur?

A. Physical B. Data link C. Network D. Transport E. Session F. Presentation

Answer:F

219. RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to RouterB (you put it administratively down). If you issue the command show interface on RouterB what output status would you see on the interface that is connected to RouterA? A. Interface is down, line protocol is down. B. Interface is down, line protocol is up. C. Interface is up, line protocol is down. D. Interface is up, line protocol is up.

Answer:A

220. Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.) A. Too many hosts in a broadcast domain. B. Full Duplex operation. C. Broadcast storms. D. Multicasting. E. Segmentation. F. Low bandwidth.

Answer:A,C,D,F

221. Looking at this address 255.255.255.255 which one of the following is true? A. IP, a flooded broadcast. B. IP, a directed broadcast. C. IPX, a flooded broadcast. D. IPX, a remote directed broadcast.

Answer:A

222. IP addresses use hierarchical numbering. What portion of the address that will identify the network number? A. Subnet Mask. B. Dots between octets. C. Class of first octet. D. Assignments of DHCP. E. Address Resolution Protocol.

Answer:C

223. Which wide are network technology was designed to use high-performance digital lines and is packet switched? A. FDDI B. ISDN C. ATM D. Frame Relay

Answer:D

224. Which of the following are functions that occur at the transport layer of the OSI model? (Choose three) A. Route selection-IP B. Sliding window-UDP C. Well known ports-IP D. Route validation-ICMP E. Connection oriented-TCP/IP F. Three way handshake TCP/IP G. No acknowledgement-UDP

Answer:E,F,G

225. A. Frame relay is used to handle multiple virtual circuits.A. X.25 defines how the connections between DTE and DCE are maintained. B. ATM was designed to take advantage of the speeds offer by media such as E3 and T3. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387 ? 389 and 373. 83. One of the best ways to understand how to build a network is to understand the method in which traffic is passed across the network. One of the reasons the OSI model was created to help you understand how a network operates. Which three devices operate at all seven layers of the OSI model? (Choose three.) C. Network host D. Network management station E. Transceiver F. Bridge G. Web server H. Switch

Answer:A,B,E

226. Which wide area network technology was designed to work with traditional POTS lines and provide SOHO?s and users with a higher speed digital dial-up service? A. Frame relay B. X.25 C. ATM D. ISDN

Answer:D

227. Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and the total number of host per network?

A. 1 network with 254 hosts. B. 2 networks with 128 hosts. C. 4 networks with 64 hosts. D. 6 networks with 30 hosts.

Answer:A

228. Exhibit: You are configuring R2 so that it can communicate with R1 on serial port s0. What encapsulation should you use on s0 to setup this IPX network?

A. SAP B. HDLC C. ARPA D. Novel Ether

Answer:B

229. In which order takes the data encapsulation place.Click the task button & Place the encapsulation.


A.

Answer:A

230. Exhibit You want to create a sub interface on serial 0 on Router R2. Which of the following is the correct syntax to create this sub interface 2?

A. Interface s0.2 point-to-point. B. Interface 2s0 point-to-point. C. Subinterface 2s 0 point-to-point. D. Interface s0 sub2 point-to-point. E. Interface s0.1 point-to-point sub2.

Answer:A

231. Exhibit: You are configuring the IPX encapsulation between RouterA and RouterB. This connection will be using the S0/0 port on RouterA to S0/0 on RouterB. Which encapsulation type should be used for the S0/0 port of RouterB?

A. SAP B. HDLC C. ARP D. NOVELLETHER

Answer:B

232. Exhibit:

You are configuring R3 so that it can communicate with R2 on Ethernet port e1. What encapsulation should you use on s0 to setup this IPX network?

A. SAP B. HDLC C. ARPA D. Novell-Ether

Answer:D

233. Which one of the following characteristics about Ethernet Switches is true?

A. Symmetric switching allows connection between ports of unlike bandwidth and does not require memory buffering. B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected on a symmetric switch. C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store and forward is better for error detection. D. The cut-trough method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address.

Answer:D

234. A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a password for the first 5 virtual lines, password for console, and an encrypted password for privileged mode.Configure the passwords on the Patton router according to the table below. Type Password Telnet apple Console pear Privileged peach ? The routers are named Marshal, Sherman, and Patton. ? The network is subnetted with a mask 255.255.255.224 ? The routing protocol is RIP ? The serial 0 interface is provided with clocking. ? The chart below includes the IP addresses. Lab 1 Name : Marshal E0 : 192.168.12.33 S0 : 192.168.12.65 Lab 2 Name : Patton E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68 Lab 3 Name : Sherman E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68

Start by clicking on host that is connected to the router you want to configure.

A. Lab 2: enable config terminal hostname Berley enable secret peach line con 0 login password pear line vty 0 4 login password apple ^Z copy running-config startup-config

Answer:A

235. Exhibit: You are configuring an IP printer that is connected to your network. You would like to use the last IP address that is on your subnet for this printer. You run ipconfig on your personal computer and the exhibit shows your IP address and its subnet mask. Based on your IP address and subnet mask what would the last possible address be on your subnet?

A. 172.20.7.255 B. 172.20.7.197 C. 172.20.7.190 D. 172.20.7.129 E. 172.20.255.255

Answer:C

236. If we are using IPX as our routed protocol and our network has an existing Novell Server with an IPX network address of 4ad1 and we are connecting a Cisco routers Ethernet port to the same segment. The MAC address of the Ethernet port is 021f.2cfe.8322. What will the complete IPX address be for the Ethernet port.Enter the IPX address for the port.


A.

Answer:A

237. The network 131.107.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses. What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum?Type the correct value in each box below.


A.

Answer:A

238. Exhibit:

Company XYZ has purchased another switch to add to their existing network. They want you to connect this new Ethernet switch to an existing Ethernet switch. Which cable from the diagram above would you used to connect these two switches together?

A. Cable A B. Cable B C. Cable C D. Cable D

Answer:B

239. Exhibit: Which one of the following cables allows a router to another router over the Ethernet? This is a direct connection and not using a hub or a switch.

A. Cable A B. Cable B C. Cable C D. Cable D

Answer:B

240. Exhibit

You are the network administrator of the network shown in the exhibit. You have just added a PC to the network. However, the PC is unable to connect to the SQL Server computer. What can be the cause of this problem?

A. PCs IP address. B. PCs subnet mask. C. PCs default gateway. D. Router interface E0 IP address.

Answer:C

241. Exhibit: Catalyst Switches have three primary operating modes that are used to handle frame switching Cutthrough, Store-and-forward and Fragment-free looking a the frame shown in the diagram which point is the store-and-forward switching decision made?

A. 1 B. 2 C. 3 D. 4

Answer:D

242. Exhibit: Looking at the diagram above ports 1 through 4 are assigned to VLAN1 and ports 5 through 8 are assigned to VLAN3 on each switch. The switches are interconnected over an ISL trunk link. Which of the following actions would test proper VLAN and trunk operation? (Choose three.)

A. Host 2-1 can ping Host 2-2 B. Host 2-1 can ping Host 7-2 C. Host 2-1 can not ping Host 2-2 D. Host 7-1 can not ping Host 2-2 E. Host 7-1 can ping Host 7-2

Answer:A,D,E

243. You are a network administrator for an Insurance company. The company has three routers named Tokyo, Kobe and Yokohama. You have already configured the Tokyo and the Kobe routers, but Yokohama still need some further configuration. The Yokohama router need:? a password for the for the first 5 virtual lines ? a password for the console ? a password for the privileged mode. These password must be encrypted. The following passwords should be used: Type Password Telnet Test Console myconsolepassword Privileged myprivegedpassword The network use a 255.255.255.0 subnet mask, RIP is the only routing protocol used, and clocking is provided on the serial 0 interface.

Lab 1 Name: Tokyo E0: 30.15.7.1 S0: 30.15.8.1 Lab 2 Name: Kobe E0: 30.15.9.1 S0: 30.15.10.1 S1: 30.15.8.2 Lab 3 Name: Yokohama E0: 30.15.11.1 S1: 30.15.10.2 Start by clicking on host that is connected to the router you want to configure.

A. Lab 3: enable config terminal hostname Yokohama enable secret mypassword line con 0 login password mypassword line vty 0 4 login password Test ^Z copy running-config startup-config

Answer:A

244. A Web consulting business has three routers in their systems. These router, Venus, Afrodite, and Zeus, are placed in separate local area networks. The Venus and Afrodite routers need no further configuration. The configuration of Zeus is also complete, except the password for the first 5 virtual lines, the password for the console, and the password for the privileged mode. The CIO has told you that the privileged password must be encrypted to achieve highest possible security. Your task is to configure the passwords on the Zeus router. The passwords to configured are: Type Password Telnet Router1 Console andorra Lab 1 Name: Zeus E0 : 213.197.14.189 SO : 213.197.14.211 Lab 2 Name: Venus E0 : 213.197.14.23 SO : 213.197.14.37 Lab 3 Name: Afrodite E0 : 213.197.14.73 SO : 213.197.14.113 S1 : 213.197.14.120

Start by clicking on host that is connected to the router you want to configure.

A. Lab 1 enable config terminal enable secret whatsoever line vty 0 4 login password mypassword line console 0 login password andorra ^z copy running-config startup-config

Answer:A

245. Exhibit:Router1#show interface serial 0/0 Serial0/0 is down, line protocol is down Hardware is HD64570 Internet address is 172.22.5.1/30 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation HDLC, loopback not set, keepalive set (10 sec) Last input never, output 00:03:11, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max(drops): Total output drops: 0 Queuing strategy: weighted fair Output queue: 0/1000/64/0 (size/max active/threshold/drops)

Conversations 0/2/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 11 packets output, 476 bytes, 0 underruns 0 output errors, 0 collisions, 27 interface resets 0 output buffer failures, 0 output buffers swapped out 11 carrier transitions DCD=down DSR=down DTR=down RTS=down CTS=down Router1 cannot establish a connection to Router2 using the show interface serial 0/0 command on Router1 command which layer of the OSI model is most likely the problem?

A. Physical layer. B. Data layer. C. Network layer. D. Transport layer.

Answer:A

246. Exhibit:Router1# show ipx interface e0 Ethernet0 is up, line protocol is up IPX address is 6F2C.0000.0c5d.b36e, NOVELL_ETHER [up] line-up, RIPPQ:0, SAPPQ: 0 Delay of this IPX network, in ticks is 1 throughput 0 link delay 0 IPXWAN processing not enabled on this interface. IPX SAP update interval is 1 minute(s) IPX type 20 propagation packet forwarding is disabled Incoming access list is not set Outgoing access list is not set IPX helper access list is not set

SAP GNS processing enabled, delay 0 ms, output filter list is not set SAP Input filter list is not set SAP Output filter list is not set SAP Router filter list is not set Input filter list is not set Output filter list is not set Router filter list is not set Netbios Input host access list is not set Netbios Input bytes access list is not set Netbios Output host access list is not set Netbios Outpus bytes access list is not set Updates each 60 seconds, aging multiple RIP: 3 SAP: 3 SAP interpacket delay is 55 ms, maximum size is 480 bytes RIP interpacket delay is 55 ms, maximum size is 432 bytes IPX accounting is disabled IPX fast switching is configured (enabled) RIP packets received 0, RIP packets sent 1 SAP packets received 0, SAP packets sent 1 Novell IPX addressing uses a two-part address that consists of 32 bits for the network number and 48 bits for the node number. What is the node number/layer 2 address as shown in the output of the show ipx interface e0 command?

A. 6F2C B. 0000.0c C. 5d.b35e D. 0c5d.b363 E. 0000.0c5d.b363 F. 6F2C.0000.0c5d.b363

Answer:E

247. A soft drink company has made the decision to provide 3 branches with network connectivity. There is a LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost fully configured. However, it does not have the routing protocol configured. Configure the routing protocol and publish all networks on the Plain router. The configurations of the routers are as follows: ? The routers are named Vanilla, Chocolate, and Plain. ? RIP is the routing protocol used. ? The clocking is provided on the serial 0 interface. ? The password on the Plain router is ?mypassword? ? The default subnet mask is used on all interfaces ? The IP addresses are listed below. Vanilla E0 192.168.149.1 S0 192.168.199.1 Chocolate E0 192.168.55.1 S0 192.168.101.1 S0 192.168.199.1 Plain E0 192.168.65.1 S0 192.168.101.1


Lab 1 Name: Vanilla E0 192.168.149.1 S0 192.168.199.1 Lab 2 Name: Chocolate E0 192.168.55.1 S0 192.168.101.1 S1 192.168.199.1 Lab3 Name: Plain E0 192.168.65.1 S1 192.168.101.2 Secret Password: mypassword Start by clicking on host that is connected to the router you want to configure.

A. Lab 3: enable config terminal hostname Plain enable secret mypassword interface ethernet 0 ip address 192.168.65.1 255.255.255.0 no shutdown exit interface serial1 ip address 192.168.101.2 255.255.255.0 no shutdown exit router rip network 192.168.65.0 network 192.168.101.0 network 192.168.55.0 network 192.168.149.0 network 192.168.199.0 ^z copy running-config startup-config

Answer:A

248. Exhibit:

Frame Relay switch maps the DLCIs between Router A to Router B to create a PVC. Which statement below correctly identifies the reference point between the local router and the Frame Relay switch to which it is connected?

A. Locally significant DLCI B. Globally significant DLCI C. Locally significant LMI D. Globally significant LMI

Answer:A

249. You have a leased line configured at a small office that connects to the corporate office. You company would also like to have a backup incase the lease line goes down. Which WAN service would you most likely choose to backup the leased line? A. Frame relay with SVC B. Dedicated serial line C. ISDN with DDR D. ATM

Answer:C

250. What are the advantages of using the OSI layered network model? (Choose three.) A. Allows multiple-vendor development through standardization of network components. B. Creates a list of communication rules that all companies must implement to get onto the Internet. C. Allows various types of network hardware and software to communicate. D. Prevents changes in one layer from affecting other layers, so it does not hamper development. E. Allows companies to develop proprietary interfaces.

Answer:A,c,D



122. You just purchased a brand new Cisco 2621 Router and now would like to configure password protection on this router. Which of the following are true regarding passwords on this router? A. All passwords can be encrypted. B. All passwords can be entered using the set-up dialogue. C. A password can be set before a user can enter the privileged mode. D. A password can be set for individual lines. E. TACACS or Radius password authentication can be used.

Answer:A,C,D,E

124. There are three major groups of routing protocols: distance-vector protocols, link-state protocols, and hybrid protocols. Select two valid statements regarding routing protocols? (Choose two) A. Distance vector protocols send the entire routing table to directly connected neighbors. B. Link state protocols send the entire routing table to all routers in the network. C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the routing table. D. Link state protocols send updates containing the state of their own links to all other routers on the network.

Answer:A,D

125. Which of the following ranges are used for IPX standard access lists? A. 100 - 199 B. 600 - 699 C. 800 - 899 D. 1000 - 1099

Answer:C

126. ExhibitRouter1#show access-list

Extended IP access list 135 deny tcp any 131.107.0.0 0.0.255.255 eq 53 deny tcp any any eq telnet Router1#show ip interface e0 Ethernet0 is up, line protocol is up Internet address is 172.17.9.60/24 Broad address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is enabled Outgoing access list is 135 Inbound access list is not set

Proxy ARP is enabled Security level is default Split horizon is enabled Rest of configuration omitted.

You have created an Extended IP access list. Now you apply the access list to Ethernet 0.

What is the result of this action?

A. Only e-mail and telnet access will be permitted out of Ethernet 0. B. All hosts on the 172.30.24.64 network will be permitted e-mail and telnet access. C. All TCP protocols will be permitted out of Ethernet 0 except e-mail and telnet. D. All IP traffic out of Ethernet 0 will be denied. E. The access-list is numbered incorrectly and will fail.

Answer:D

127. To configure Router1 for operation in a Frame Relay environment, one of the recommended items to configure is the IGRP metric for the speed of the link. What command should you use? A. Router1(config)# IGRP metric 36k B. Router1(config)# bandwidth 36 C. Router1(config-if)# metric 36k D. Router1(config-if)# bandwidth 36

Answer:D

128. You have just created an IP extended access list and now wish to apply this to an interface. Which command will allow you to apply the list to an interface? A. Permit access-list 101 out B. Ip access-group 101 out C. Apply access-list 101 out D. Access-class 101 out E. Ip access-list e0 out

Answer:B

129. Which of the following devices operate at Data Link layer of the OSI model? (Choose two) A. Router B. SMTP server C. Transceiver D. Switch E. Bridge F. Hub

Answer:D,E

130. You have been called in to fix a router that is having security issues. The router has an access list configured on it but the list does not seem to be working. What command can you use to see if the access list has been applied to an interface? A. Show access-list. B. Show ip route. C. Show ip interface. D. Show interface. E. Show interface list.

Answer:C

131. User Datagram Protocol is a Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is defined in RFC 768. Which of the following are generally considered to be characteristics of UDP? (Choose two.) A. Non-reliable. B. Reliable. C. Less bandwidth-intensive. D. Handshaking.

Answer:A,C

132. How many bits are used for a MAC address and how is number expressed? A. 24 bits expression as a decimal number. B. 24 bits expression as a hexadecimal number. C. 36 bits expression as a binary number. D. 48 bits expression as a decimal number. E. 48 bits expression as a hexadecimal number.

Answer:E

133. Which command will provide you with information regarding the Layer 3 IP address of a directly connected neighbor?

A. Show ip interface B. Show cdb neighbors C. Show cdp neighbors detail D. Show ip route E. Show ip link status F. Telnet

Answer:C

134. What is the bit pattern for the first octet of a class B network address 129.107.0.0? A. 0xxxxxxx B. 10xxxxxx C. 110xxxxx D. 1110xxxx E. 11110xxx

Answer:B

135. Gail was working on your Cisco router while you were at lunch. Which command will display the last commands Gail entered? A. Control header. B. Show buffer. C. Show history. D. Show history buffer.

Answer:C

136. You are the network administrator of the ABC Tire Company. You receive a call from a user who is unable to reach a server at a remote server 10.0.5.250/240. Using VNC (Virtual Network Computing) you connect to the user?s computer and discover the following information:Local PC ? 10.0.3.35/24 Default gateway ? 10.0.3.1 Remote server ? 10.0.5.250/240 You then conduct the following tests from the user?s PC: ping 127.0.0.1 ? successful ping 10.0.3.35 ? successful ping 10.0.3.1 ? successful ping 10.0.5.250 ? unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed. B. Local physical layer problem. C. Local NIC not functioning. D. Remote physical layer problem.

Answer:D

137. Which are the following are considered ISDN benefits? (Choose four) A. Full time connectivity across the ISDN supported by Cisco IOS routing using dial on demand routing DDR. B. Small office and home office sites can be economically supported with ISDN basic rate interface BRI services. C. ISDN replaces signaling system ss7 in the public switch telephone network PSTN backbone. D. ISDN can be used as a backup service for a lease line connection between the remote and central offices. E. Modem racking and cabling can be eliminated by integration with digital modem cards on Cisco IOS network access servers NAS.

Answer:A,B,D,E

138. You are the network administrator of the Sonic Water Company. One of your users is unable to reach the company?s web site that is hosted at a remote site. Looking at the personal computer you discover the following information:Local PC ? 10.0.3.35/24 Default gateway ? 10.0.3.1 Remote server ? 10.0.5.250/240

You then conduct the following tests from the offending local PC: ping 127.0.0.1 ? successful ping 10.0.3.35 ? successful ping 10.0.3.1 ? unsuccessful ping 10.0.5.250 ? unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed. B. Local physical layer problem. C. Local NIC not functioning. D. Remote physical layer problem.

Answer:B

139. Your router stores routing tables, ARP cache, and packet buffers where are these stored? A. ROM B. RAM C. NVRAM D. Flash memory

Answer:B

140. Exhibit Router1(config)#router igrp 200 Router1(config-router)#network 192.168.3.0 Router1(config-router)#network 192.168.4.0 Router1(config-router)#network 192.168.5.0 Router1(config-router)#network 172.16.0.0 Router2(config)#router igrp 300 Router2(config-router)#network 192.168.3.0 Router2(config-router)#network 192.168.6.0 Router2(config-router)#network 192.168.7.0

Examine the Routing tables of Router1 and Router2 above after the next IGRP update is sent from Router1 to Router2 what networks will show up in Router2?s route table.

A. 192.168.3.0 192.168.4.0 192.168.5.0 192.168.6.0 192.168.7.0 172.16.0.0 B. 192.168.3.0 192.168.6.0 192.168.7.0 C. 192.168.3.0 192.168.4.0 192.168.5.0 192.168.6.0 192.168.7.0 D. 172.16.0.0 E. 192.168.3.0 192.168.4.0 192.168.5.0

Answer:B

141. The Defense Advanced Research Projects Agency (DAPRA) developed the TCP/IP suite of protocols. Which layer in that TCP/IP model corresponds to the OSI model?s network layer?

A. Application B. Transport C. Internet D. Network E. Physical

Answer:C

142. A. Data Link layer is concern with a number of things (error detection for example) but not for route determination.A. Physical layer has nothing to do with route determination. It puts the bits onto the physical wire. B. Presentation layer deals with how the data is presented and not how it is routed. C. Session layer is responsible for establishing, managing, and ending communication. D. Transport layer is responsible for the connection type and error correction. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 11 ? 12. 179. Which two of the following were created to avoid routing loops with distance vector routing protocols? (Choose two) E. Split horizon. F. Route Poison. G. Area Hierarchies. H. Link State Algorithms.

Answer:A,B

143. Routing Protocols use which OSI layer to determine the best path to a network? A. Data Link B. Network C. Physical D. Presentation E. Session F. Transport

Answer:B

144. Your access list has one statement; access-list 131 permit ip any 131.107.7.0 0.0.0.255 eq tcp What does the word ?any? mean in the following extended access list statement?

A. Check any of the bits in the source address. B. Permit any wildcard mask for the address. C. Accept any source address. D. Check any bit in the destination address. E. Permit 255.255.255 0.0.0.0. F. Accept any destination address.

Answer:C

145. You would like to be able to make a backup copy of your IOS that is stored on your router. Which of the following commands can you use so that the router will become a TFTP host so that it can save the IOS to a TFTP server? A. Copy flash tftp B. Config tftp server C. Write network D. Tftp-server system E. Setup server tftp

Answer:A

146. Which of the following protocols is referred to as a hybrid routing protocol because it has features of both distance-vector and link-state? A. RIP B. OSPF C. EIGRP D. IGRP

Answer:C

147. Exhibit#debug ppp authentication ppp serial1: send CHAP challenge id-47 t remote ppp serial1: CHAP challenge from Router1 ppp serial1: CHAP response received from Router1 ppp serial1: CHAP response id=47 received from Router1 ppp serial1: Send CHAP success id=47 to remote ppp serial1: Remote passed CHAP authentication ppp serial1: Passed CHAP authentication ppp serial1: Passed CHAP authentication with remote

You issued the command debug ppp authentication what type of handshaking was used for this PPP session?

A. One-way B. Two-way C. Three-way D. No handshake required during authentication.

Answer:C

148. Cisco has just released a new version of Cisco IOS and you would like to use this new version. You have downloaded this IOS from Cisco?s web site and stored it on your TFTP server. Which of the following commands should you use to copy this IOS to your router? A. Copy flash ftp. B. Copy ftp flash. C. Copy flash tftp. D. Copy tftp flash.

Answer:D

149. When installing the IGRP routing protocol which of the following is also required? A. Connected network numbers. B. IP address mask. C. Metric weights. D. Autonomous system number. E. Registered administrative id.

Answer:D

150. What is the broadcast address for this network 192.57.78.0/27? A. 192.57.78.33 B. 192.57.78.64 C. 192.57.78.87 D. 192.57.78.97 E. 192.57.78.159 F. 192.57.78.254

Answer:E

151. You just purchased a new router from Cisco and now are in the process of installing it. Upon boot up the router enters the setup mode. You are prompted to enter the enable password and the enable secret password. What is the difference between the two passwords? A. The enable password is encrypted. B. The enable secret password uses IPSec password authentication. C. The enable secret password cannot be seen as clear text when viewing the configuration. D. The enable secret password acts as a backup in case the enable password is compromised.

Answer:C

152. The network 131.107.4.0/24 was advertised by a neighbor router from RIP and IGRP. You also added a static route to 131.107.4.0/24 manually. Which route would be used to forward traffic? A. The IGRP route. B. The static route. C. The RIP route. D. All three will load balance.

Answer:B

153. To configure information into RAM on a router which three commands can be used? (Choose three) A. Configure memory. B. Configure terminal. C. Configure overwrite. D. Copy TFTP startup-Config. E. Copy running-Config startup-Config. F. Copy startup-Config running-Config.

Answer:A,B,F

154. What does ISL trunking protocol use to identify the VLAN membership of a frame over trunked links? A. Frame filtering with VLAN ID B. Frame tagging with VLAN ID C. Frame filtering with trunk ID D. Frame tagging with trunk ID E. Frame filtering with VTP port ID

Answer:B

155. You have typed the command clock on a Cisco router and pressed enter/return you received ?% INCOMPLETE COMMAND? response from a Cisco CLI. How can you receive help on this command? A. Type ?history? to review the prompt before the error. B. Enter a question mark to display all console commands. C. Type ?help? followed by the command to see the command parameter. D. Re enter the command followed by question mark to view key words.

Answer:D

156. You have issued the show ip route command and looking at the routing table entry, which of the following are used by default in the calculation of the number 8675309 I 131.107.0.0 [100/8675309] via 192.168.16.3, 00:00:55, Ethernet0? (Choose two.)

A. MTU B. Bandwidth C. Administrative distance D. Hop count E. Metric F. Delay

Answer:B,F

157. Which WAN technology uses two Bearer (B) channels for data plus one Delta (D) channel for signaling information? A. ISDN B. Frame Relay C. ATM D. FDDI

Answer:A

158. Which one of the following commands will allow you to configure a login password that will be used when you connect to the routers console port using the roll-over from your notebook? A. Line vty 0 Log in Password Cisco B. Line console Login Password Cisco C. Line login terminal Password Cisco D. Line console 0 Login Password CISCO E. Line console 0 Login Password Cisco

Answer:E

159. A. DLCI does not determine the Frame Relay encapsulation type.A. DLCI has nothing to do with keepalives. B. The physical address is represented by the MAC address. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 412 ? 414. 158. Exhibit: Router1#show ip route Codes: C-connected,s-static,I-IGRP,R-RIP,M-Mobile,B-BGP,D-EIGRP,EIGRP external, O-OSPF,IA-OSPFinter area,EI-OSPF external type 1,E2-OSPF external type 2, E-EGP, i-IS-IS,L1-IS-IS level-1,L2-IS-IS level-2,*-candidate default,U-per-user static route Gateway of last resort is not set R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 C 192.168.9.0/24 is directly connected, Serial 1 R 192.168.10.0/24 [120/7] via 192.168.9.1, 00:00:02, Serial1 R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1 C 192.168.1.0/24 is directly connected, Ethernet0 C 192.168.2.0/24 is directly connected, Serial0 R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 R 192.168.4.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.6.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 R 192.168.7.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 Based on the output of the show ip route command which route will not be entered into a neighbor RIP router? C. R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 D. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1 E. C 192.168.1.0/24 is directly connected, Ethernet0 F. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0

Answer:F

160. For what purpose does Frame Relay use DLCIs? A. They determine the Frame Relay encapsulation type. B. They identify the logical circuit between a local router and a Frame Relay WAN switch. C. The represent the keepalives used to maintain the PVC in an active state. D. They represent the physical address of the router attached to a Frame Relay network.

Answer:B

161. Exhibit: I 154.128.16.0 [100/1100] via 30.100.192.4, 00:00: Ethernet 0

Your trainee studies the routing table on your Catalyst 5000 Switch. One specific entry draws the attention of the trainee (see Exhibit). He is curious about the number 1100 and asks you how it is calculated. You need to tell the trainee what is used in the calculation. (choose two.)

A. MTU B. bandwidth C. administrative distance D. hop count E. metric F. delay

Answer:B,F

162. To perform proper and efficient routing what must a router have? A. Destination application of an incoming packet. B. Number of other packets in a single flow of data. C. Destination network address of an incoming packet. D. Number of routers that know a path to the destination.

Answer:C

163. Given the network 192.141.27.0/28, identify the valid host addresses. (Choose three.) A. 192.141.27.33 B. 192.141.27.112 C. 192.141.27.119 D. 192.141.27.126 E. 192.141.27.175 F. 192.141.27.208

Answer:A,C,D

164. A. The command ping 127.0.0.0 will not test the local protocol stack.A. This command will ping that remote host. B. You cannot telnet to 127.0.0.1. C. This tracert command will trace the route to 203.125.12.1. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 123 ? 124. 151. Users on your network 10.1.0.0/16 are complaining that they cannot access the company?s intranet server using the FQDN www.snowball.com. You are able to ping the IP address but you cannot ping www.snowball.com. What is the likely cause of this problem? D. TCP/IP failure. E. DNS failure. F. FTP failure. G. SNMP failure.

Answer:B

165. You are unable to connect to the company?s local tftp server using the IP address 10.0.0.20 from your personal computer. You would to test your personal computer to make sure the TCP/IP has been corrected installed. Which one of the following actions will allow you to test the protocol stack on your personal computer?

A. Ping 127.0.0.0 B. Ping 203.125.12.1 C. Telnet 127.0.0.1 D. Ping 127.0.0.1 E. Tracert 203.125.12.1

Answer:D

166. You need to issue the command show startup-config from privileged mode. How can you tell you are in privileged mode? A. > B. ! C. # D. :

Answer:C

167. A graphics art company located in Miami, Florida noticed that their windows size was changed from 3000 to 4000 during the data transfer stage of a TCP session, what can a sending host do? A. Transmit 3000 bytes before waiting for an acknowledgement. B. Transmit 4000 packets before waiting for an acknowledgement. C. Transmit 4000 bytes before waiting for an acknowledgement. D. Transmit 4000 segments before waiting for an acknowledgement. E. Transmit 3000 frames before waiting for an acknowledgement. F. Transmit 3000 packets before waiting for an acknowledgement.

Answer:C

168. An Ethernet switch has many functions. Which of the following are correct functions of a Layer 2 Ethernet switch? (Choose two) A. Establishes a single collision domain. B. Establishes multiple collision domains. C. Builds a dynamic MAC address mapping table. D. Maintains a routing table. E. Forwards unicast frames only.

Answer:C

169. Which one of the following is a fact about half-duplex Ethernet operation?

A. With half duplex transmission frames feed into a single cable in one direction at a time. B. Half duplex transmission between stations is achieved by using point-to-point Ethernet and fast Ethernet connection. C. Half duplex transmission between stations is achieved by using point to multi point Ethernet and fast Ethernet connection. D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the receivercircuit at the other end of the connection.

Answer:A

170. You need to find out the IPX address on a Cisco 2500 series router. Which command displays all routed protocols and the interfaces on which the protocol is enabled? A. Show protocols. B. Show protocol brief. C. Show interfaces protocol. D. Show interfaces. E. Show routed. F. Show routed interfaces.

Answer:D

171. You are concerned about broadcast traffic in your network. You would like to split up your network into two separate broadcast domains. Which one of the following hardware devices can you use? A. Hub B. Router C. Bridge D. Repeater

Answer:B

172. B. There is no shortcut to move the cursor one line up.A. Ctrl n or the down arrow will move to more commands. B. There is no shortcut to capitalize the command line. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 104 ? 107. 143. In comparing Fast Ethernet to 10baseT Ethernet which of the following are true? (Choose four) C. Fast Ethernet uses the same maximum transmission unit (MTU). D. Fast Ethernet is based on an extension to the IEE 802.3 specifications. E. Fast Ethernet uses the same media access control MAC mechanism. F. Fast Ethernet preserves the frame format that is used by the 10BaseT Ethernet. G. Fast Ethernet uses a speed increase 100 times to that of the 10BaseT Ethernet.

Answer:A,B,C,D

173. If Ctrl-p recalls the previous command line what does the up arrow key provide within the Cisco IOS? A. Recalls the previous command line. B. Moves the cursor one line up. C. Redisplays the current command line. D. Capitalize the command line.

Answer:A

174. In your test environment you are connecting two routers together using a back-to-back serial cable. You are not using DSU/CSUs between these devices. Which additional command must be used to be able to establish this connection between these two routers on the router acting as the DCE? A. Serial up. B. Line protocol up. C. Clock rate. D. Dce rate. E. Dte rate.

Answer:C

175. This means that multiple stations have access to media , and before one station can access that media, it must first ?listen? (carrier sense) to make sure no other station using the same media. If two stations transmit at the same time, the result is a collision. If this happens a back off algorithm is used. What is this back off algorithm used for? A. It is latency stored and forward switching. B. It is the time used to token passing from machine to machine. C. It is re transmission delay that is encountered when a collision occurs. D. It the result of two nodes transmitting at the same time the frames from each transmitting device collide and are damaged.

Answer:C

176. In troubleshooting an Internetwork which of the following commands are usually used? (Choose two.) A. Ping B. Trace C. Verify D. Test IP E. Echo IP F. Config IP

Answer:A,B

177. Which one of the following commands below is an example of a hybrid routing protocol? A. Router rip B. Router igrp 100 C. Router ospf 1 D. Router eigrp 100

Answer:D

178. A. The show ip protocol command is used to see if a router is delivering bad routing information.A. This is not a valid command. RIP is not a parameter of show ip route command. D and E. These are not valid debug commands. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 279 ? 282. 136. To configure and apply a standard access list on an interface which two of the following are required? (Choose two) B. Define and access list number and its parameter. C. Enable an interface to become part of the access list group. D. Define the number of access list to be supported on an interface. E. Copy the access list definition to each interface that will support it.

Answer:A,B

179. A. Serial 0 would be down.A. The line protocol would be down. B. Serial 0 would be marked as down and not administratively down. C. Serial 0 would be marked as down and not administratively down plus the line protocol would also be down. D. Serial 0 would be down. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 106 ? 109. 134. RouterC does not appear to be receiving RIP updates from RouterB, which command can you enter on RouterC to see if it is receiving these RIP updates? E. Show ip protocols. F. Show ip route rip. G. Debug ip rip. H. Debug ip updates. I. Debug ip transactions.

Answer:C

180. You have a direct serial link to an adjacent router. You do not have connectivity, and when you run the show running-config the output says that the serial interface is shutdown. You issue the command: show interface s0

What will the output include?

A. Serial 0 is up, line protocol is down. B. Serial 0 is down, line protocol is down. C. Serial 0 is down, line protocol is up. D. Serial is administratively down, line protocol is down. E. Serial 0 is administratively down, line protocol is up. F. Serial 0 is administratively up, line protocol is down.

Answer:B

181. Management has reported that they cannot access the corporate files on the company?s ftp server from home. They were able to do this in the past. You feel that somebody has changed an access list that is preventing those managers from accessing the corporate data. The access list number is 131. Which command displays access list 131? A. Show access-list 131 B. Show IP access list 131 C. Display IP address list 131 D. Display access-list 131 details

Answer:A
The answers to numbers 1-3 are included:
1.Which statement describes the routing protocol OSPF (choose 3)
A.It supports VLSM
B.It is used to between Autonomous systems
C.It confines network instability to one area of network
D.It increases routing overhead over the network
E.It allows extensive control of the routing update
F.it is simpler to configure than RIPv2
ANSWER: A, B and C OSPF uses both AS numbers and areas to define routing table responsibilities. It includes the subnet mask in its frame allowing for Variable Length Subnet Masks. D is wrong because it only communicates its routing table to neighbors on initial Hello messages and multicasts to neighbors on changes (as opposed to RIP and IGRP which use update intervals and broadcast their entire tables). E is wrong because their isn?t must control since it doesn?t use holddown timers, etc. the way that RIP does. F is wrong because you have to map out both AS and areas whereas with RIPv2, you enter in Router Rip and the networks and that is it!! 2. Error detection schemes use which field of frame to detect error? A.MTU B.MAC C.FCS D.PDU E.ERR F. Flag ANSWER ? C. FCS (Frame Check Sequence) (This is used by Fragment Free switching mode on Cisco switches to detect errors without requiring the switch to wait for the entire packet before forwarding) 3. Which of the following are characteristics of microsegmentation? (Choose two) A. Dedicated paths between sending and receiving host are established B. the number of collision domains is decreased C. Broadcast domain are enlarged D. Multiple subnetwork broadcast addresses are created E. Multiple ARP tables are required on the connected hosts F. Bandwidth is dedicated to connect hosts ANSWER ? D and F (Microsegmentation is implementing a Layer 3 switch, so you basically just get the advantage of a multiport router)

No comments:

Post a Comment