Contact: admin@chungchimang.tk ========== I'M FIXING THIS BLOG...

CCNA 2 - Final Exam v3.0

Options with "*" are correct answer

1. Which of the following could describe the devices labeled "?" in the graphic? (Choose three.)
*DCE
*CSU/DSU
LAN switch
*modem
hub

2. Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting "interface is up, line protocol is up" status. RIP is then configured on Router C using the following commands:
RouterC(config)# router rip
RouterC(config-router)# network 192.168.4.0
RouterC(config-router)# network 172.16.0.0
If no additional routing is configured on Router A, Router B, and Router C, what will be the result?
*Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.
Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.
All networks shown in the graphic will be reachable by Router A, Router B, and Router C.
Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.

3. The following access list has been correctly applied to a router interface:
access-list 52 deny 172.30.65.52
access-list 52 permit any
Which of the following statements are true about this ACL? (Choose three.)
This is an invalid ACL because the wildcard mask is missing from the command.
*A wildcard mask of 0.0.0.0 is assumed for 172.30.65.52.
This is an extended IP access list.
*All traffic from 172.30.65.51 will be permitted.
*This is a standard IP access list.

4. Refer to the graphic. Assuming default metrics are used and the network is fully converged, which path will the IGRP routing protocol use to send a packet from Router A to Router F?
A, D, E, F
*A, B, D, E, F
A, C, D, E, G, F
A, B, D, E, G, F

5. Neither router in the graphic has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)
ATL> connect CHI
ATL> telnet CHI
*ATL# 192.168.4.2
ATL# connect ATL
*CHI# telnet 192.168.4.1
CHI# telnet ATL

6. What will occur if the command service password-encryption is entered on a router? (Choose two).
It will allow only the user EXEC mode password to be encrypted.
It will set an MD5 hashing algorithm on all unencrypted passwords.
*It will apply a weak encryption to all unencrypted passwords.
It will set the enable secret password to be encrypted.
It will apply an MD5 hashing algorithm to encrypt the console and telnet passwords.
*It will configure the user EXEC mode, telnet, and enable passwords as encrypted.

7. A network administrator must configure a serial interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?
Chicago(config)# description San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252

*Chicago(config)# interface serial0/0
*Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
*Chicago(config-if)# description San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 netmask 255.255.255.252
Chicago(config-if)# description San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# remote site San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# interface description San Jose T1

8. A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?
A(config)# router rip
A(config-router)# passive-interface S0/0

B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64

A(config)# router rip
A(config-router)# no network 192.168.25.32

*B(config)# router rip
*B(config-router)# passive-interface S0/0

A(config)# no router rip

9. Which of the following describe Telnet on a router? (Choose two.)
*Simultaneous incoming Telnet sessions can be hosted by a router.
Telnet is the most basic testing mechanism available.
A Telnet session can only be initiated in privileged EXEC mode.
*Five separate Telnet lines are specified by the configuration line vty 0 4.
Telnet is classified as a network layer protocol.

10. Which commands will show the status and IP address of all interfaces on a router? (Choose two.)
*show protocols
show ip protocols
show version
*show interfaces
show ip ports

11. Which router command will generate the router output shown in the graphic?
show arp
show protocols
show interface FastEthernet0/0
show interfaces
*show hardware

12. Which of the following are valid boot system commands? (Choose two.)
Router(config)# boot system ram
*Router(config)# boot system rom
Router(config)# boot system IOS flash
Router(config)# boot system flash c2600-d-mz.121-3 192.168.10.5
*Router(config)# boot system tftp c1700-l-mz.131-2 172.16.24.7

13. During initial router bootup the following line appears:
"NVRAM invalid, possibly due to write erase."
What are two possible reasons for this result? (Choose two.)
The startup-config file was not saved to RAM before reboot.
The IOS has been erased.
*The router has not been configured.
*The startup-config file cannot be located.
The router will not enter initial configuration dialog.

14. While planning an IOS upgrade, the administrator issues the show version command. Based on the output in the graphic, what is the current IOS boot location?
RAM
*NVRAM
Flash
ROM

15. Which statements are true regarding setup mode? (Choose three.)
Press Ctrl-z to terminate setup mode.
*Enter a question mark (?) for help at any point.
Press Spacebar to accept the default settings.
Use setup mode to enter complex protocol features.
*Press Enter to accept the default settings.
*Press Ctrl-c to abort configuration dialog.

16. Which router components and operations are correctly described? (Choose two.)
ROM - stores the backup configuration file
RAM - loads the operating system
*NVRAM - stores the configuration file
Flash - executes diagnostics at bootup
*POST - runs diagnostics on hardware modules
DRAM - loads the bootstrap

17. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23
access-list 199 permit ip any any
Assuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)
*All FTP traffic from network 178.15.0.0 will be permitted.
All Telnet traffic destined for network 178.15.0.0 will be denied.
Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination.
*Telnet will not be permitted from any hosts on network 178.15.0.0 to any destination.
Telnet will not be permitted to any host on network 178.15.0.0 from any destination.

18. Refer to the graphic. Communication is needed between the LAN connected to the fa0/0 interface of the Kansas router and the fa0/0 interface of the Maine router. All hosts on those LANs also need connectivity to the Internet. Which commands will allow this communication? (Choose three).
*Kansas(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.2
Kansas(config)# ip route 192.168.6.0 255.255.255.0 s0/1
*Kansas(config)# ip route 0.0.0.0 0.0.0.0 s0/1
Maine(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.1
*Maine(config)# ip route 0.0.0.0 0.0.0.0 s0/1
Maine(config)# ip route 172.16.32.0 255.255.255.0 172.18.64.2

19. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
*The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
*Access will be permitted for Telnet using "c13c0" as the password.

20. What are some reasons to change the configuration register setting? (Choose two.)
*to force the system to ignore the configuration file stored in NVRAM
to monitor password changes
to change the POST sequence
to force the router to boot the IOS from NVRAM
*to force the system into ROM monitor mode

21. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0x2102 and observes the following output:
Erasing the nvram filesystem will remove all files! Continue? [Confirm]
[OK]
Erase of nvram: complete
If the router unexpectedly loses power after this sequence, what will occur when power is restored?
The router will enter ROM monitor mode upon completion of the power-on self test (POST).
The router will load the last known valid configuration file.
The router will enter Rx-boot mode.
*The router will prompt the user to enter setup mode or to continue without entering setup mode.

22. Which of the following are true regarding the use of login banners? (Choose two.)
The message is only displayed in privileged EXEC mode.
*The message can be seen by everyone who accesses the router.
Good morning is an appropriate message to display.
*The banners should display warning messages.
The banners should identify circuits and other devices connected to the router.

23. Which router component stores the information that is displayed by the show ip route command?
CPU
Flash
NVRAM
*RAM

24. What information can be learned during the initial router bootup? (Choose two.)
the configuration register value
*the number and types of interfaces installed
*the router model and the amount of memory that is available
the amount of memory required to load the IOS and configuration
the number of interfaces with connected cables

25. Which of the following describes CDP? (Choose three.)
*provides information on directly connected Cisco routers that have CDP enabled
*can only be configured between Cisco devices
used for debugging Layer 4 connectivity issues
*should be disabled on non-locally managed ports
presents a potential security risk

26. What can a network administrator do to recover from a lost router password?
perform a reload or reset
telnet from another router and issue the show running-config command to view the password
*boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes
boot the router to bootROM mode and enter the b command to load the IOS manually

27. A network administrator wishes to load a configuration file from a TFTP server into NVRAM on a router. Which of the following methods will create a startup-config file in NVRAM that matches the contents of the configuration file on the TFTP server?
*Copy the configuration file from a TFTP server using the command copy tftp startup-config.
Copy the configuration file from a TFTP server using the command copy < style="font-weight: bold; font-style: italic;">28. Which of the following are primary functions of a router? (Choose two.)
*packet switching
microsegmentation
domain name resolution
*path selection
flow control

29. Which of the following are true regarding an interface description? (Choose three.)
It is a message that is displayed at login.
*It does not affect the operation of the router.
It contains the circuit identifiers of the interface by default.
*It could allow support personnel to better understand the scope of an interface problem.
*It could identify the purpose and location of the interface.
It wastes bandwidth and slows down interface problem resolution.

30. Which ACL can be applied in the outbound direction of Serial 0/0 on router B in the graphic to allow all IP traffic from LAN A to the Internet, allow Web traffic from LAN B to the Internet, and deny all other traffic to the Internet?
access-list 98 permit 192.168.2.0 0.0.0.255 any
access-list 98 permit tcp 10.90.3.0 0.0.0.255 any eq www

*access-list 125 permit ip 192.168.2.0 0.0.0.255 any
*access-list 125 permit tcp 10.90.3.0 0.0.0.255 any eq www

access-list 132 permit ip 192.168.2.0 0.0.0.255 any
access-list 132 permit tcp 10.90.3.0 0.0.0.255 any eq www
access-list 132 permit ip any any

access-list 156 permit ip 192.168.2.0 0.0.0.255 any
access-list 156 permit ip 10.90.3.0 0.0.0.255 any eq www

31. The following access list has been created to prevent traffic from host 172.23.40.36 from accessing the 192.168.34.0 network.
access-list 44 deny host 172.23.40.36
access-list 44 permit any
Refer to the graphic. Which group of commands will properly place the access list so that the host is denied access only to network 192.168.34.0?
Rome(config)# interface fa0/0
Rome(config-if)# ip access-group 44 in

Rome(config)# interface s0/1
Rome(config-if)# ip access-group 44 out

Tokyo(config)# interface s0/0
Tokyo(config-if)# ip access-group 44 in

*Tokyo(config)# interface fa0/0
*Tokyo(config-if)# ip access-group 44 out

32. Which of the following are true statements regarding IGRP and RIP? (Choose two.)
*IGRP uses a combination of different metrics for path selection.
RIP is a proprietary protocol developed by Cisco.
RIP has the ability to scale to large networks.
*IGRP has the ability to scale to large networks.

33. In what order will the initial startup routine of a router locate and load the IOS if the config-register setting is 0x2102 and there are no boot system commands present in the startup-config file?
Flash, ROM, TFTP server
RAM, Flash, NVRAM
*Flash, TFTP server, ROM
ROM, TFTP server, Flash
Flash, NVRAM, RAM
ROM, Flash, TFTP server

34. What will occur when the following ACL is applied inbound to both FastEthernet interfaces of Router A in the graphic?
access-list 125 permit tcp 192.168.2.0 0.0.0.255 10.90.3.0 0.0.0.255 eq 23
access-list 125 permit tcp 10.90.3.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 23
access-list 125 permit tcp 192.168.2.0 0.0.0.255 any eq www
*Workstations A and B will be able to Telnet to each other. Workstation A will be allowed to access Web servers on the Internet, while Workstation B will be denied Internet Web access.
Workstations A and B will be able to Telnet to each other. All other traffic will be denied.
The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces.
The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.

35. Which of the following commands will correctly configure an extended ACL? (Choose two).
Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25
*Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 80
*Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23
Router(config)# access-list 99 permit host 10.217.32.3
Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 23

36. Refer to the graphic. Which command will create a standard ACL that will apply to outbound traffic on interface Fa0/0 of router A and will deny IP traffic from any host on network 172.16.34.0/24 that is destined for network 192.168.5.0/24 while allowing all other IP traffic?
access-list 2 deny 172.16.34.0 0.0.0.0
access-list 2 permit any

*access-list 33 deny 172.16.34.0 0.0.0.255
*access-list 33 permit any

access-list 42 deny 172.16.34.0
access-list 42 permit any

access-list 56 deny tcp 172.16.34.0
access-list 56 permit ip any

37. Refer to the network and routing table entries shown in the graphic. How much time will elapse before Router A expects to receive another update from Router B?
5 seconds
13 seconds
*17 seconds
25 seconds
65 seconds
90 seconds

38. Refer to the graphic. Which series of commands will create static routes that will allow Router A and Router B to deliver packets destined for LAN A and LAN B, and direct all other traffic to the Internet?
RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0

RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1

RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterB(config)# ip route 172.20.20.4 255.255.255.252 s0/0

*RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
*RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
*RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0

39. Which of the following describe Ethernet and serial interfaces of a router? (Choose two.)
They are enabled by default.
*They may be administratively disabled by using the shutdown command.
*They must be configured with an IP address and subnet mask in order to forward packets.
They must be configured with an IP address and a clockrate in order to forward packets.
They may be administratively disabled by using the no shutdown command.

40. Which of the following statements are true regarding routed protocols? (Choose two.)
*They provide enough information in the Layer 3 address to allow a packet to be forwarded from one network to another.
*They carry user data between networks.
They allow routers to share information about networks and their proximity to each other.
They are used by routers to maintain routing tables.
RIP and IGRP are routed protocols.

41. If a PC does not have network connectivity to a router, which router port can be used to establish communication?
*console
Ethernet
serial
VTY

42. Router A is directly connected to the networks shown in the graphic and has a default route that points to Router B. All interfaces are active and properly addressed. However, when the workstation on network 172.16.4.0/24 sends a packet to destination address 172.16.201.5, it is discarded by Router A. What can be a reason for this result?
*The ip classless command is not enabled on Router A.
Router B is in a different autonomous system than Router A.
Routers A and B are using different routing protocols.
Router A has no route in its routing table that includes the address 172.16.201.5.

43. Which of the following prevent successful loading of the Cisco IOS from flash memory? (Choose two.)
*a configuration register set at 0x2102
a missing startup-configuration file
a boot system command not present in the startup-config file
an incorrect configuration register setting
*a boot field set to 2

44. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)
Use a crossover cable to connect the terminal serial port to the router console port.
Use a rollover cable to connect the terminal NIC to the router console port.
*Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.
Use a transceiver to connect a straight-through cable to the router console port.
Use a straight-through cable to connect the router console port to the terminal NIC.
*Use a rollover cable to connect from a terminal serial port to the router console port.

45. Refer to the graphic. A network administrator has a console connection to Router A. Pings to Router B are successful, but pings to Routers C and D fail. What is the first step in troubleshooting the problem?
Use the show cdp neighbors detail command from router A to gather information about all Cisco routers in the network.
Use the traceroute command to discover exactly which link in the network is down.
Use an extended ping from router A to each router in the network.
*Use the show interfaces command from a Telnet session on router B to check the connection to router C.

46. Based on this partial output of the show ip route command, which routing protocol is configured on the router?
I 172.16.3.0/24 [100/80135] via 172.16.2.2, 00:00:27, Serial0/0
RIP v1
RIP v2
*IGRP
EIGRP
OSPF
IGP

47. Assuming the following ACL is correctly applied to a router interface, what can be concluded about this set of commands? (Choose two.)
Router(config)# access-list 165 deny tcp 192.28.115.0 0.0.0.255 172.20.0.0 0.0.255.255 eq 23
Router(config)# access-list 165 permit ip any any
This is a standard IP access list that denies network 192.28.115.0 Telnet access to the 172.20.0.0 network.
All Telnet traffic destined for 172.20.0.0 from any network will be denied access.
*Network 192.28.115.0 is denied Telnet access to the 172.20.0.0 network.
Network 172.20.0.0 is denied Telnet access to the 192.28.115.0 network.
*All FTP and HTTP traffic destined for 172.20.0.0 will be permitted access.

48. What could a Cisco support technician learn from the IOS filename c2600-d-mz.121-3? (Choose three.)
*the format of the file
the RAM memory requirements of the file
*the version number of the file
the size of the file
*the device platform of the file

49. Which of the following are correct statements verified by the router output shown in the graphic? (Choose two.)
Layer 3 connectivity exists between BigCity and the devices in the Device ID column.
*Layer 2 connectivity exists between BigCity and the devices in the Device ID column.
All devices shown in the Device ID column use the TCP/IP protocol suite.
All devices shown in the Device ID column can be pinged from BigCity.
*All devices listed in the Device ID column are directly connected to BigCity.

50. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)
The startup-config file will be ignored at bootup.
The router will load the IOS from Flash.
*The router will enter ROM monitor mode upon reload.
The router will enter boot ROM mode and have limited capabilities.
*The administrator can enter the b command to manually boot the IOS.

51. A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?
The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.
The wrong port was configured for the ACL so Telnet traffic was still allowed.
*The access list has not been assigned to an interface.
The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.

52. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)
*functions as a link-state routing protocol
discards packets when the hop count is greater than 15
calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)
created as a proprietary routing protocol
*floods updates as topology changes occur
broadcasts routing updates every 90 seconds or as triggered by topology changes

53. Which of the following are valid static IP routes? (Choose three.)
RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1
*RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1
*RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2
RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2
*RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1

54. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?
4
*5
8
10

55. The routers shown in the graphic are running IGRP and sending updates about all of their networks. After the network has converged, a packet traveling to Router 4 from Router 2 will take which route based on the lowest metric?
Router2 to Router1 to Router4
*Router2 to Router3 to Router4
Router2 to Router4
Router1 to Router4

56. Which statements are true regarding VTY passwords? (Choose two.)
VTY passwords must be encrypted.
*All VTY lines do not need to use the same password.
*A VTY password is required to establish telnet sessions.
The VTY password is set with the command line console 0.
The VTY password must be identical with the enable secret password.

57. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)
* TCP/IP must be installed and properly configured on each device.
Multiple subnets must be configured on the router to ensure accurate delivery.
* A default gateway must be configured for datagrams to travel outside of the LAN.
The hosts must be directly connected to a switch to travel outside of the LAN.
* To ensure accurate delivery, a router must be configured and accessible by hosts on the network.

58. Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user's PC has successfully booted but can not see the network. What should be checked first?
the PC power cord
the file server
* the PC network interface card LEDs
the LAN switch in the wiring closet
the configuration of the router interface attached to the LAN

59. What types of messages are sent periodically by devices configured for CDP?
probes
beacons
signals
* advertisements
routing updates
unicast

60. The following IGRP configuration was typed in for RouterB:
RouterB(config)# router igrp 100
RouterB(config-router)# network 192.168.2.0
RouterB(config-router)# network 192.169.3.0
After several update periods, a technician notices that RouterB is not receiving updates from all routers shown in the diagram. Which of the following would correct this error?
RouterB(config)# router igrp
RouterB(config-router)# no network 192.169.3.0

RouterB(config)# router igrp 46
RouterB(config)# no network 192.169.3.0
RouterB(config)# network 192.168.3.0

RouterB(config)# router igrp 100
RouterB(config-router)# network 192.169.3.0
RouterB(config-router)# no network 192.168.3.0

*RouterB(config)# router igrp 100
*RouterB(config-router)# no network 192.169.3.0
*RouterB(config-router)# network 192.168.3.0

61. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?
The packets will be placed in a buffer and forwarded when the ACL is removed.
The packets will be sent to the source with an error notification message.
The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.
* The implicit deny any statement placed at the end of the list will cause the packets to be dropped.

62. Which command is used to redirect debug information to a device that is connected though a Telnet session?
Router# monitor
Router# terminal redirect vty 0
* Router# terminal monitor
Router# monitor output vty 0

63. Why is it useful to have an interface description?
* A user can telnet to the router using the interface description.
The interface description is a shortcut way to edit the running-config.
The interface description helps identify distant network connections.
The interface will remain inactive until an interface description is applied.

64. An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?
There was a POST failure.
The incorrect IOS loaded.
There was an error in the startup configuration file.
* The configuration register was set to ignore NVRAM.

65. The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)
* The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.
All of the routers will have direct knowledge of the exact topology of the entire network.
* The Key West router will forward routing table information to the Miami and Palm Beach routers.
The Miami router will learn about network 192.168.1.0 from the Key West router.
* If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.

66. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name.
Router# ip host Fontana 200.100.50.5
* Router(config)# ip host Fontana 200.100.50.5
Router(config-if)# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5/24

67. Which of the following are true regarding route metrics? (Choose three.)
* The more factors that make up a metric, the greater the flexibility to tailor network operations.
The larger the metric number, the better the path.
Routing protocols use metrics to send routing updates to directly connected neighbors.
* Load and reliability are dynamic metrics used by IGRP.
Bandwidth and delay are static metrics used by RIP v1.
* Ticks, delay and cost are metrics used by routing protocols.

68. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)
* telnetting into the router
initiating a debug session
configuring a router for the first time
* using the Aux port to check the current configuration
* using the console port to check the current configuration

69. Which statement about datagram life is true?
Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.
The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.
* Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.
The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.

70. Given the above topology, which of the following statements are true? (Choose two.)
If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.
* If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.
* If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.
If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.
If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.

71. Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)
* by forwarding packets over paths of equal cost
by forwarding packets according to hop count and speed of the link
by determining which interface has the least traffic and sending to it first
by first determining the speed of the links and then cycling packets through the fastest links first
* by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time

72. Which of the following is the correct flow of routines for a router startup?
* load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS

73. The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?
no update timers
holdown-timer 96
poison reverse E0
* passive-interface E0
no triggered updates

74. Which of the following are functions of a router? (Choose three.)
* packet switching
extension of network segments
* segmentation of local area networks
* selection of best path based on a logical addressing
selection of best path based on a physical addressing

75. What can be determined from the partial output of the show ip route command displayed below? (Choose two.)
R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0
C 192.168.10.0/24 is directly connected, Serial0/0
The next update will be in 76 seconds.
*The next update will be in 16 seconds.
*The administrative distance is 120 and the metric is 1.
The metric is 120 and the administrative distance is 1.
200.200.200.0 is configured on Serial0/0.
192.168.10.2 is configured on Serial0/0.

76. The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)
Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1
* Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0
* Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2
Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1
* Utah(config)# ip route 172.31.3.0 255.255.255.0 s1
Utah(config)# ip route 0.0.0.0 0.0.0.0 s0

77. Which command will produce the output shown in the graphic?
show cdp
* show cdp neighbors
show cdp neighbors detail
show cdp detail

78. A network administrator needs to configure a routing protocol that will use bandwidth and delay when making routing decisions. Which of the following commands must be configured on Router2 so those metric values will be used when determining the best path?(Choose two.)
Router2(config)# router rip
* Router2(config)# router igrp 200
* Router2(config-router)# network 192.5.5.0
*Router2(config-router)# network 201.100.11.0
Router2(config-router)# network 192.5.5.0
Router2(config-router)# network 192.5.5.0 201.100.11.0

79. If the config-register on a router is set to 0x2102, where is the first place the router will look for boot system commands?
RAM
ROM
Flash
* NVRAM

80. Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)
* Router B received a configuration change.
Router A sent a message requesting an update.
* Router C came online after Router B sent the RIP update.
Router B received an error message indicating the last update was not received.

81. The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?
The router will load c2500-js-l.112-26d.
The router will load c2500-d-l.120-9.
The router will load the IOS from ROM.
* The router will boot into ROM monitor mode.

82. Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?
F, G, E, D, B, A
F, E, D, C, A
* F, E, D, A
F, E, D, B, A

83. Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?
Router# boot system tftp 163.150.9.31 c2500-d-l.120-9
Router# copy run start

Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router# copy run start

Router# config t
Router(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router(config)# exit
Router# copy run start

* Router# config t
* Router(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.bin
* Router(config)# exit
* Router# copy run start

84. Which of the following are true regarding the setup configuration mode? (Choose three.)
To abort the setup mode, use the CTRL+SHIFT+6 keys.
* To abort the setup mode, use the CTRL+C keys.
Setup mode allows a complete configuration of the router.
* To enter setup mode, use the privileged mode setup command.
A router that does not find a valid IOS during the boot process will start the system configuration dialog.
* A router that does not find a valid configuration file during the boot process will start the system configuration dialog.

85. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
* when the interface is functioning as a DCE device

86. The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.
access-list 22 deny host 204.204.7.122
access-list 22 permit any
Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?
RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 in

RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 out

RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 22 in

RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 in

RouterB(config)# interface s0/0
RouterB(config-if)# ip access-group 22 in

* RouterB(config)# interface fa0/0
* RouterB(config-if)# ip access-group 22 out

87. When would the ROM monitor mode be used? (Choose two.)
maintaining routing configuration settings
* modifying the IOS image stored in Flash
* running a limited IOS feature set
performing the bootstrap process

88. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)
There is a mismatch in the encapsulation type on both ends of the link.
* A Layer 1 issue exists.
* An interface problem exists.
The clockrate was not set during configuration.
* There is no usable media for the protocol.
Keepalive messages are not being sent.

89. What are the major characteristics of a wide area network? (Choose three.)
* connect devices separated by wide geographical areas
includes technologies of FDDI and Ethernet
* uses serial connections to access bandwidth
* common carriers are needed for connections
type of connection between a router and a switch

90. Which of the following are true statements about creating and applying access lists? (Choose three.)
Access list entries should filter in the order from general to specific.
One access list per port per protocol per direction is permitted.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.
* There is an implicit deny at the end of all access lists.
* Statements are processed sequentially from top to bottom until a match is found.
* The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.

91. Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?
It will be forwarded through interface S1.
It will be forwarded to the default route.
It will be directed toward the Internet.
* It will be discarded.

92. Refer to the output from the show ip route command. What can be concluded from the output of this router command?
A preferred route to the destination has not been set.
* There are two equal cost paths to network 1.0.0.0.
Both interfaces are being used equally to route traffic.
A variance must be set to load-balance across multiple paths.

93. Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)
Updates start broadcasting every 30 seconds.
Updates start broadcasting every 90 seconds.
* Link-state advertisements are flooded.
Link-state advertisements are sent only to neighboring routers.
* All routers note the change and adjust routes.
All routers ignore the change until the route becomes active again.

94. A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)
* The ip host table on the router is not configured.
The command telnet Boston was issued from the wrong router prompt.
The routing table is missing.
* Domain name services are not available.

95. The following line was displayed in the output of the show ip route command.
I 192.168.3.0/24 [100/80135] via 192.168.2.2, 00:00:30, Serial0/0
What is the value of the composite metric?
8
24
80
100
135
* 80135

96. In the configuration register value 0x2104, which value represents the boot field setting?
x
2
1
0
* 4

97. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)
* It can be used to verify the operation of application layer software between the source and destination.
Telnet can use the ICMP protocol to verify a hardware connection and network layer address.
* It is the most complete testing mechanism available.
* Remote networks may be accessed via a Telnet session for troubleshooting.
Time to Live values are used by Telnet to identify a failure of device between source and destination.

98. Which of the following WAN connection services typically use synchronous communications? (Choose two.)
circuit-switched
* leased line
packet-switched
Ethernet
* analog modem services

No comments:

Post a Comment

Thank for your comments!!!