Rabu, 10 November 2010

Cisco Netacad CCNA 4 Final

Which of the following are primary functions of a router? (Choose two.)
packet switching
microsegmentation
domain name resolution
path selection
flow control
A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a common connection to the Internet that can be shared?
hub
router
access point
Ethernet switch
A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.

Refer to the exhibit. A network administrator adds this command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0. What is the result of adding this command?
This route is automatically propagated throughout the network.
The traffic for network 172.16.1.0 is forwarded to network 192.168.2.0.
A static route is established.
The traffic for all Class C networks is forwarded to 172.16.1.2.
In a complex lab test environment, a router has discovered four paths to 192.168.1.0/24 via the use of the RIP routing process. Which route will be installed in the routing table after the discovery of all four paths?
R 192.168.1.0/24 [120/3] via 192.168.110.1, 00:00:17, Serial0/1/0
R 192.168.1.0/24 [120/2] via 192.168.200.1, 00:00:17, Serial0/0/0
R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial0/0/1
R 192.168.1.0/24 [120/4] via 192.168.101.1, 00:00:17, Serial0/1/1
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
The router maintains the same source and destination IP.
The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.


Refer to the exhibit. Router R1 receives a packet for destination 192.168.1.10. Which route will be preferred for this packet?
through the Fa0/0 interface
through the Fa0/1 interface
through the S0/0/0 interface
through the S0/0/1 interface


Refer to the exhibit. Which two routes are level 1 ultimate routes? (Choose two.)
10.0.0.0
10.1.2.0
10.2.2.0
10.1.1.0
192.168.1.0
192.168.2.0
Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?
RIPv1
RIPv2
OSPF
EIGRP
Which statement is true about the metrics used by routing protocols?
A metric is a value used by a particular routing protocol to compare paths to remote networks.
A common metric is used by all routing protocols.
The metric with the highest value is installed in the routing table.
The router may use only one parameter at a time to calculate the metric.


Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the show ip route command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?
Compared to RIP, EIGRP has a lower administrative distance.
Compared to EIGRP, RIP has a higher metric value for the route.
Compared to RIP, the EIGRP route has fewer hops.
Compared to RIP, EIGRP has a faster update timer.

Refer to the exhibit. RIPv1 has been used as a routing protocol on the network. A new 172.16.2.0/24 network has been added on router R2 and configured under the RIP routing process. When will R1 converge?
after 13 seconds
after 30 seconds
after 180 seconds
after R1 receives triggered updates from R2
Which two statements are true for link-state routing protocols? (Choose two.)
Routers that run a link-state protocol can establish a complete topology of the network.
Routers in a multipoint network that run a link-state protocol can exchange routing tables.
Routers use only hop count for routing decisions.
The shortest path first algorithm is used.
Split horizon is used to avoid routing loops.
An administrator is configuring Router1 so that it can connect to Router2 by using IP. Which protocol can be used by Router1 to determine the IP address of Router2 when they are directly connected and only Layer 2 connectivity exists between them?
ARP
CDP
ICMP
Telnet

Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)
a CSU/DSU device
a modem
an Ethernet switch
a hub
a bridge


What can be determined from the output shown in the exhibit? (Choose two.)
Annapolis is a 2611 router that is connected to the S0/0 interface of the Montgomery router.
All of the routers are connected to Montgomery through an Ethernet switch.
Montgomery has Layer 2 connectivity with Cumberland.
Layer 3 connectivity is operational for all of the devices listed in the Device ID column.
An administrator consoled into the Waldorf router can ping the Brant router.
Brant, Fisherman, and Potomac are directly connected to Montgomery.


Refer to the exhibit. Which route in the routing table of R1 will be discarded by its neighboring router?
192.168.2.0
192.168.3.0
192.168.4.0
192.168.9.0
192.168.10.0
192.168.11.0

Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router without entering a password?
The login command was not entered on the console line.
The enable password should be an enable secret password.
No username and password combination has been configured.
Console connections cannot be configured to require users to provide passwords.

Refer to the exhibit. An administrator is attempting to configure a router by copying and pasting the commands that are shown in the exhibit. However, only one of the FastEthernet interfaces is coming up. What is the problem?
Both interfaces are in the same IP subnet.
FastEthernet0/1 does not have a description.
There can be only one FastEthernet interface enabled on a router at one time.
The administrator did not exit to global configuration mode before configuring FastEthernet0/1.


Refer to the exhibit. The network administrator has run the following command on R1.

R1(config)# ip route 192.168.2.0 255.255.255.0 172.16.1.2

What is the result of running this command?
Traffic for network 192.168.2.0 is forwarded to 172.16.1.2.
This route is automatically propagated throughout the entire network.
Traffic for all networks is forwarded to 172.16.1.2.
The command invokes a dynamic routing protocol for 192.168.2.0.

Refer to the exhibit. The command ip route 0.0.0.0 0.0.0.0 S0/0/0 is run on router R2. What are the two results of this command? (Choose two.)
A static route will be updated in the routing table.
The traffic from the Internet will be directed to R2.
The traffic from the source network 172.16.0.0/22 will be blocked.
The route will be specified as the default route for all networks not defined in the routing table.
All the broadcasts will be forwarded via the S0/0/0 interface of R2.

Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its displayed commands, which statement is true?
The wildcard mask is incorrectly configured.
A default route must be configured on every router.
Routers B, C, and D have no access to the Internet.
The link to the ISP is not advertised by the routing protocol process.
The command ip route 192.168.2.0 255.255.255.0 172.16.2.2 was entered into the router. After network changes were made, the new next hop for the 192.168.2.0/24 network is 172.16.5.1. What should an administrator do so that the router will use the new next hop to reach the 192.168.2.0 network?
Enter the command clear ip route *.
Lower the administrative distance for the new path to ensure that it is used first.
Negate the original command and enter a new static route with the new next hop.
Nothing. The router will learn of the new next hop and automatically update the route table.

Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?










Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are failing between the two routers. What change by the administrator will correct the problem?
Set the encapsulation on both routers to PPP.
Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544.
Change the cable that connects the routers to a crossover cable.
Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.

Refer to the exhibit. Which combination of network ID and subnet mask can be used to meet the 24 host requirement of the LAN that is attached to Router3?
192.168.0.0/27
192.168.0.64/26
192.168.0.192/26
192.168.0.192/27


Refer to the exhibit. The networks that are connected to R1 have been summarized for R2 as 192.168.136.0/21. Which packet destination address will R2 forward to R1?
192.168.135.1
192.168.142.1
192.168.144.1
192.168.128.1
A network administrator has been asked to configure a network using a classful IP addressing scheme. Which statement is true about the IP addressing that will be used?
Classful IP addresses can be used only when static routing is configured in the network.
Classful IP addresses allow the network/host boundary to occur at any bit in the 32-bit address.
The subnet mask for classful IP addresses can be determined by the value of the first octet of the IP address.
Classful IP addresses require the subnet mask to be included in the routing updates that are propagated by the classful routing protocols.

Which range of IP addresses will be used by RIPv2, EIGRP, and OSPF routing protocols to send routing advertisements?








How will a router that is configured with a classless routing protocol determine the subnet mask that should be assigned to routes that are learned from neighboring classless routers?
The subnet mask that is included in the routing updates will be used.
The subnet mask of the interface that receives the update will be used.
The subnet mask that is specified in the network command will be used.
The class of the network in the update will determine the subnet mask that is used.

Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undefined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.168.4.1.

What is the reason for the ping failure?
The serial interface between two routers is down.
R2 is not forwarding the routing updates.
The 192.168.4.0 network is not included in the RIP configuration of R2.
RIPv1 needs to be configured.

Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)
The missing information for Blank 1 is the command show ip route.
The missing information for Blank 1 is the command debug ip route.
The missing information for Blank 2 is the number 100.
The missing information for Blank 2 is the number 120.
The missing information for Blank 3 is the letter R.
The missing information for Blank 3 is the letter C.

Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?
triggered updates
poison reverse
holddown timers
split horizon
How does route poisoning prevent routing loops?
New routing updates are ignored until the network has converged.
Failed routes are advertised with a metric of infinity.
A route is marked as unavailable when its Time to Live is exceeded.
The unreachable route is cleared from the routing table after the invalid timer expires.


Refer to the exhibit. R1 and R2 are both configured with RIPv1. Beginning from global configuration mode, what comand or commands will eliminate RIP updates on the Ethernet segment of R2?
R2# configure terminal
R2(config)# router rip
R2(config-router)# passive-interface FastEthernet0/0
R2# configure terminal
R2(config)# passive-interface FastEthernet0/0
R2# passive-interface FastEthernet0/0
R2# configure terminal
R2(config)# interface FastEthernet0/0
R2(config-if)# passive-interface FastEthernet0/0

Refer to the exhibit. All routers are configured with RIPv2 active on all interfaces. Automatic summarization is in effect. Why does the routing table on R3 include the 209.165.200.228/30 network but not the 172.30.1.0/24 and 172.30.2.0/24 networks?
CIDR is required to route supernets.
There is no default gateway configured.
The 172.30.0.0/16 subnets are discontiguous.
RIPv2 cannot route networks with variable subnets.

Refer to the exhibit. The routers in the exhibit are running the EIGRP routing protocol. What statement is true regarding how packets will travel from the 172.16.1.0/16 network to the 192.168.200.0/24 network?
The router chooses the first path that it learned and installs only that route in the routing table.
The router chooses the path with the lowest administrative distance and installs only that route in the routing table.
The router chooses the highest routing ID based on the advertised network IP addresses and installs only that route in the routing table.
The router installs all the equal cost paths in the routing table but sends packets out only one, holding the others in reserve in case the primary route goes down.
The router installs all the equal cost paths in the routing table and performs equal cost load balancing to send packets out multiple exit interfaces.

Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)
All routes are stable.
Each route has one feasible successor.
The serial interface between the two routers is down.
The administrative distance of EIGRP has been set to 50.
The show ip eigrp topology command has been run on R1.

Refer to the exhibit. Host A is having problems accessing server A. All routers have the same EIGRP configuration as router RTR_A. What should be done so that host A can access server A?
Add the command no auto-summary on all routers.
Change the network statements to include a wildcard mask.
Adjust the EIGRP hello timers to account for the network delay.
Add the command eigrp log-neighbor-changes on all routers.
When would the network administrator use the ip bandwidth-percent eigrp as-number percent command?
when there is a low bandwidth connection
when the connection is on a shared medium
when the connection is serial instead of Ethernet
when the link is always busy

Refer to the exhibit. What information can be determined from the displayed output?
EIGRP packets are waiting to be sent to the neighbors.
The adjacencies between the routers are yet to be established.
The IP address 192.168.10.10 is configured at serial interface S0/0/1 of router R2.
Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interface.

Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on Router1?
The Dijkstra algorithm will calculate the feasible successor.
DUAL will query neighbors for a route to network 192.168.1.0.
Neighbor 172.16.3.2 will be promoted to the feasible successor.
Traffic destined to the 192.168.1.0 network will be dropped immediately due to lack of a feasible successor.
Which statement correctly describes a feasible successor in EIGRP?
It is a primary route that is stored in the routing table.
It is a backup route that is stored in the routing table.
It is a primary route that is stored in the topology table.
It is a backup route that is stored in the topology table.

Refer to the exhibit. A network administrator is trying to determine why router JAX has no OSPF routes in its routing table. All routers are configured for OSPF area 0. From the JAX router, the administrator is able to ping its connected interfaces and the Fa0/1 interface of the ORL router but no other router interfaces. What is a logical step that the network administrator should take to troubleshoot the problem?
Reboot the routers.
Change the OSPF process ID on all of the routers to 0.
Check to see if the cable is loose between ORL and JAX.
Check to see if CDP packets are passing between the routers.
Use show and debug commands to determine if hellos are propagating.
Which of the following are required when adding a network to the OSPF routing process configuration? (Choose three.)
network address
loopback address
autonomous system number
subnet mask
wildcard mask
area ID

Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)
Set a lower priority on R2.
Configure the routers in the same area.
Set a lower cost on R2 compared to R1.
Add a backup designated router to the network.
Match the hello and dead timers on both routers.
A network administrator is analyzing routing update behavior on a network that has both EIGRP and OSPF configured on all routers. Both protocols appear in the output of show ip protocols. However, only EIGRP internal routes appear in the routing tables. Which statement correctly explains the scenario?
The OSPF protocol has a higher cost than EIGRP.
The EIGRP protocol has a lower metric than OSPF.
The EIGRP protocol was configured first on the router.
The EIGRP protocol has a lower administrative distance than OSPF.

Refer to the exhibit. All routers are configured for OSPF area 0. The network administrator requires that R2 always be the DR and maintain adjacency.

Which two configurations can achieve this? (Choose two.)
Change the OSPF area of R2 to a higher value.
Change the router ID for R2 by assigning the IP address 172.16.30.5/24 to
the Fa0/0 interface.
Change the priority values of the Fa0/0 interfaces of R1 and R3 to 0.
Configure a loopback interface on R2, with an IP address higher than any IP
address on the other routers.
Configure R1 and R3 with an IP address whose value is higher than that of R2.


Refer to the exhibit. A network administrator has configured OSPF using the following command:

network 192.168.1.32 0.0.0.31 area 0

Which router interface will participate in OSPF?
FastEthernet0/0
FastEthernet0/1
Serial0/0/0
Serial0/0/1
Which two statements are true for OSPF Hello packets? (Choose two.)
They are used for dynamic neighbor discovery. They are used to maintain neighbor relationships.
They are used to determine the complete network topology.
They are used with timers to elect the designated router with the fastest link.
They are used to negotiate correct parameters among neighboring interfaces.

CCNA2 Final Mar 2010: CCNA Cisco Routing Protocols and Concepts Final Exam Practice

1. What are two functions of a router? (Choose two.)

It connects multiple IP networks.
It controls the flow of data via the use of Layer 2 addresses.
It determines the best path to send packets.
It manages the VLAN database.
It increases the size of the broadcast domain

2. When a router boots, what is the default order to locate the Cisco IOS if there is no boot system command?
ROM, TFTP server, flash
flash, TFTP server, ROM
flash, NVRAM, TFTP server
NVRAM, TFTP server, flash

3. Which router component is used to store the routing table?
Flash
NVRAM
ROM
SDRAM


4. Refer to the exhibit. How many routes are child routes?
1
3

4
6



5. Refer to the exhibit. Which statement is true concerning the routing configuration?
Using dynamic routing instead of static routing would have required fewer configuration steps.
The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.
Packets routed to the R2 Fast Ethernet interface require two routing table lookups.
The static route will not work correctly

6. Refer to the exhibit. The network administrator issues the command no ip classless on Router1. What forwarding action will take place on a packet that is received by Router1 and is destined for host 192.168.0.26?
The packet will be dropped.
The packet will be forwarded to the gateway of last resort.
The packet will match the 192.168.0.0 network and be forwarded out Serial 0/0.
The packet will most closely match the 192.168.0.8 subnet and be forwarded out Serial 0/1


7. Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.

Which path will be used to transmit the data packets between PC1 and PC2?
The packets will travel via R2-R1.
The packets will travel via R2-R3.
The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.
The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path


8. Refer to the exhibit. Router R1 is configured as shown in the exhibit. PC1 on 172.16.1.0/24 network can reach the default gateway on R1. The rest of the routers are configured with the correct IP addresses on the interfaces. Routers R2 and R3 do not have static or dynamic routing enabled. How far will PC1 be able to successfully ping?
router R1 Fa0/0 interface

router R1 S0/0/0 interface
router R2 S0/0/0 interface
router R2 Fa0/0 and S0/0/1 interfaces
router R3 Fa0/0 and S0/0/0 interfaces


9. Refer to the exhibit. All routers are properly configured to use the EIGRP routing protocol with default settings, and the network is fully converged. Which statement correctly describes the path that the traffic will use from the 10.1.1.0/24 network to the 10.1.2.0/24 network?
It will use the A-D path only.
It will use the path A-D, and the paths A-C-D and A-B-D will be retained as the backup paths.
It will use all the paths equally in a round-robin fashion.

The traffic will be load-balanced between A-B-D and A-C-D.

10. Which two statements are true regarding link-state routing protocols? (Choose two.)
They are aware of the complete network topology.
They offer rapid convergence times in large networks.
They do not include subnet masks in their routing updates.
They rely on decreasing hop counts to determine the best path.
They do not work well in networks that require special hierarchical designs.
They pass their entire routing tables to their directly connected neighbors only




11. Refer to the exhibit. R1 knows two routes, Path A and Path B, to the Ethernet network attached to R3. R1 learned Path A to network 10.2.0.0/16 from a static route and Path B to network 10.2.0.0/16 from EIGRP. Which route will R1 install in its routing table?
Both routes are installed and load balancing occurs across both paths.
The route via Path B is installed because the EIGRP route has the best metric to network 10.2.0.0/16.
The route via Path A is installed because the static route has the best metric to network 10.2.0.0/16.
The route via Path B is installed because the EIGRP route has the lowest administrative distance to network 10.2.0.0/16.

The route via Path A is installed because the static route has the lowest administrative distance to network 10.2.0.0/16.
12. What two routing protocols use a hierarchal network topology? (Choose two.)
IS-IS
EIGRP
OSPF
RIPv1
RIPv2



13. Refer to the exhibit. Based on the output from the show running-config and debug ip rip commands, what are two of the routes that are added to the routing table of R1? (Choose two.)
R 192.168.1.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/1
R 192.168.100.0/24 [120/1] via 172.16.1.1, 00:00:24, Serial0/0/0
S 192.168.1.0/24 [1/0] via FastEthernet0/0
R 192.168.9.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/0
R 192.168.2.0/24 [120/1] via 172.16.1.2, 00:00:24, Serial0/0/0


14. Refer to the exhibit. The network has three connected routers: R1, R2 and R3. The routes of all three routers are displayed. What can be verified from the output?
R1 and R3 are connected to each other via the S0/0/0 interface.
The IP address of the S0/0/0 interface of R1 is 10.1.1.2.
The IP address of the S0/0/1 interface of R2 is 10.3.3.2.
R2 is connected to the S0/0/1 interface of R3.

15. Refer to the exhibit. All router interfaces are configured with an IP address and are operational. If no routing protocols or static routes are configured, what information will be included in the show ip route command output for router A?
All of the 192.168.x.0 networks will be in the routing table.
Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be in the routing table.
The routing table will be empty because routes and dynamic routes have not been configured.
A default route is automatically installed in the routing table to allow connectivity between the networks.



16. Refer to the exhibit. A network administrator is accessing router R1 from the console port. Once the administrator is connected to the router, which password should the administrator enter at the R1> prompt to access the privileged EXEC mode?
Cisco001
Cisco123
Cisco789
Cisco901


17. Which of the following could describe the devices labeled "?" in the graphic? (Choose three.)
DCE
CSU/DSU
LAN switch
modem
hub


18. Refer to the exhibit. Which router is advertising subnet 172.16.1.32/28?
Router1
Router2
Router3
Router4

19. Refer to the exhibit. The show cdp neighbors command was run at R1. Which two facts about the newly detected device can be determined from the output? (Choose two.)
ABCD is a router that is connected to R1.
ABCD is a non-CISCO device that is connected to R1.
The device is connected at the Serial0/0/1 interface of R1.
R1 is connected at the S0/0/1 interface of device ABCD.
ABCD does not support switching capability.

20. A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?
Change the routing metric for that route.
Nothing. The static route will go away on its own.
Change the administrative distance for that route.
Remove the route using the no ip route command.


21. Refer to the exhibit. A ping between host A and host B is successful, but pings from host A to operational hosts on the Internet fail. What is the reason for this problem?
The FastEthernet interface of R1 is disabled.
One of the default routes is configured incorrectly.
A routing protocol is not configured on both routers.
The default gateway has not been configured on host A.


22. Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. All routers are operational and pings are not blocked on this network.

Which ping will fail?
from R1 to 172.16.1.1
from R1 to 192.168.3.1
from R2 to 192.168.1.1
from R2 to 192.168.3.1


23. Refer to the exhibit. What action will R2 take for a packet that is destined for 192.168.2.0?
It will drop the packet.
It will forward the packet via the S0/0/0 interface.
It will forward the packet via the Fa0/0 interface.
It will forward the packet to R1


24. Refer to the exhibit. The users on the local network 172.16.1.0/24 complain that they are unable to connect to the Internet. What step should be taken to remedy the problem?
A new static route must be configured on R1 with the R3 serial interface as the next hop.
A new default route must be configured on R1 with the R3 serial interface as the next hop.
The default route on R2 should be configured with the R3 serial interface as the next hop.
The default route on R2 must be replaced with a new static route and the next hop should be the R1 FastEthernet interface


25. Refer to the exhibit. What summary address can Router2 advertise to Router1 to reach the three networks on Routers 3, 4, and 5 without advertising any public address space or overlapping the networks on Router1?
172.16.0.0/8
172.16.0.0/10
172.16.0.0/13
172.16.0.0/20
172.16.0.0/24


26. Refer to the exhibit. Host A is unable to access the Internet, and troubleshooting has revealed that this is due to an addressing problem. What is incorrectly configured in this network?
the IP address of the Fa0/0 interface of R1
the subnet mask of the S0/0/0 interface of R1
the IP address of the S0/0/0 interface of R1
the subnet mask of the S0/0/0 interface of R2

27. Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network properly. What is the cause?
The default gateway is incorrect.
The address is in the wrong subnet.
The host address and default gateway are swapped.
192.168.10.31 is the broadcast address for this subnet


28. Refer to the exhibit. The network administrator is planning IP addressing of a new network. What part of this addressing scheme must be changed to allow communication between host A and the server?
the IP address of the server
the default gateway of host A
the IP address of host A
the default gateway of the server

29. Which network design feature requires the deployment of a classless routing protocol?
private IP addressing
advertising default routes
variable length subnet masks
summarization on major network boundaries

30. A network administrator needs to assign the very last usable IP address in the 172.24.64.0/18 network range to the router interface that serves this LAN. Which IP address should the administrator configure on the interface?
172.16.128.154/18
172.16.255.254/18
172.24.64.254/18
172.24.127.254/18


31. Refer to the exhibit. All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each other. What can be the cause of this problem?
Because RIPv1 is a classless protocol, it does not support this access.
RIPv1 does not support discontiguous networks.
RIPv1 does not support load balancing.
RIPv1 does not support automatic summarization.



32. Refer to the exhibit. What information can be determined from the highlighted output?
R1 is originating the route 172.30.200.32/28.
Automatic summarization is disabled.
The 172.30.200.16/28 network is one hop away from R1.
A classful routing protocol is being used

33. What does RIP use to reduce convergence time in a larger network?
It uses multicast instead of broadcast to send routing updates.
It reduces the update timer to 15 seconds if there are more than 10 routes.
It uses triggered updates to announce network changes if they happen in between the periodic updates.
It uses random pings to detect if a pathway is down and therefore is preemptive on finding networks that are down


34. A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?
A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
B(config)# router rip
B(config-router)# passive-interface S0/0
A(config)# no router rip


35. Refer to the exhibit. Both routers are using the RIP protocol. Devices on the 192.168.1.1 network can ping the S0/0/0 interface on R2 but cannot ping devices on the 192.168.2.1 network.
What is a possible cause of this problem?
The routers are configured with different versions of RIP.
R2 is not forwarding the routing updates.
The R1 configuration should include the no auto-summary command.
The maximum path number has been exceeded.

36. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.)
It is enabled by default on all Cisco IOS implementations.
It assigns a value that represents an infinite metric to the poisoned route.
It sends back the poisoned route update to the same interface from where it was received.
It instructs routers to hold all changes that might affect routes, for a specified period of time.
It limits the number of hops a packet can traverse through the network before it is discarded


37. Refer to exhibit. Given the topology shown in the exhibit, what three commands are needed to configure EIGRP on the Paris router? (Choose three.)
Paris(config)# router eigrp 100
Paris(config)# router eigrp
Paris(config-router)# network 192.168.6.0
Paris(config-router)# network 192.168.7.0
Paris(config-router)# network 192.168.8.0
Paris(config-router)# network 192.168.9.0

38. A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is no feasible successor route to a destination network and the successor route fails?
It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.
It sends queries to adjacent neighbors until a new successor route is found.
It immediately sends its entire routing table to its neighbors.
It will set the metric for the failed route to infinity.

39. Refer to the exhibit. Hosts on the BOS Fa0/0 LAN are able to ping the Fa0/1 interface on the JAX router and all interfaces on the BOS and ORL routers. Why would hosts from the 10.0.0.0/24 network not be able to ping hosts on the Fa0/0 LAN of the JAX router?
The JAX router has the wrong process ID.
The JAX router needs the network 10.0.0.0 0.0.0.255 area 0 command.
The JAX router needs the network 192.168.3.0 0.0.0.255 area 0 command.
The BOS router needs the network 192.168.3.0 0.0.0.255 area 0 command

40. Which three statements describe the operation of routing with EIGRP? (Choose three.)
As new neighbors are discovered, entries are placed in a neighbor table.
If the feasible successor has a higher advertised cost than the current successor route, then it becomes the primary route.
If hello packets are not received within the hold time, DUAL must recalculate the topology.
The reported distance is the distance to a destination as advertised by a neighbor.
EIGRP maintains full knowledge of the network topology in the topology table and exchanges full routing information with neighboring routers in every update.
EIGRP builds one routing table that contains routes for all configured routed protocols.

41. Refer to the exhibit. What happens to a packet that has 172.16.0.0/16 as the best match in the routing table that is shown?
The packet is discarded.
The packet is flooded out all interfaces.
The packet is forwarded via Serial0/0/0.
The packet is forwarded via FastEthernet0/0.

42. A network is configured with the IP, IPX, and AppleTalk protocols. Which routing protocol is recommended for this network?
RIPv1
RIPv2
EIGRP
OSPF


43. Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)
Automatic summarization is disabled.
The EIGRP routing protocol is being used.
There is one feasible successor in the routing table.
The serial interface S0/0/0 is administratively down.
The router is originating the route to 172.16.1.0/24 via the S0/0/0 interface


44. Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this?
The two routers are connected on a multiaccess network.

The hello and dead intervals are different on the two routers.
They have different OSPF router IDs.
They have different process IDs

45. What command would the network administrator apply to a router that is running OSPF to advertise the entire range of addresses included in 172.16.0.0/19 in area 0?
R1(config-router)# network 172.16.0.0 0.0.0.255 area 0
R1(config-router)# network 172.16.0.0 0.0.3.255 area 0
R1(config-router)# network 172.16.0.0 0.0.15.255 area 0
R1(config-router)# network 172.16.0.0 0.0.31.255 area 0

46. What should be considered when troubleshooting a problem with the establishment of neighbor relationships between OSPF routers? (Choose two.)
OSPF interval timers mismatch
administrative distance mismatch
interface network type mismatch
no loopback interface configured
gateway of last resort not redistributed


47. Which two components are used to determine the router ID in the configuration of the OSPF routing process? (Choose two.)
the IP address of the first FastEthernet interface
the highest IP address of any logical interface
the highest IP address of any physical interface
the default gateway IP address
the priority value of 1 on any physical interface

48. What is the function of the OSPF LSR packet?
It is used to confirm the receipt of LSUs.
It is used to establish and maintain adjacency with other OSPF routers.
It is used by the receiving routers to request more information about any entry in the DBD.
It is used to check the database synchronization between routers.


49. Refer to the exhibit. All interfaces are configured with the correct IP addresses and subnet masks. OSPF has been configured as the routing protocol. During troubleshooting, it is determined that hosts on network B can ping the Lo0 interface on R1 but are unable to reach hosts on network A. What is the cause of the problem?
Routers R1 and R2 have incorrect router IDs configured.
Router R1 is unable to form a neighbor relationship with router R2.
Routers R1 and R2 have been configured in different OSPF areas.
The configuration of router R1 fails to include network A in the OSPF routing process


50. Refer to the exhibit. The interface addresses and OSPF priorities are configured as shown. Because of the boot order of the routers, router A is currently the DR and router B is the BDR. If router A fails and is replaced the next day by a new router, router D, what OSPF protocol action or actions will happen?
Router D will be elected DR, and router C will become the BDR.
Router D will be elected DR, and router B will remain the BDR.
Router C will become the DR, and router B will become the BDR.
Router B will remain the BDR, and OSPF will function on the segment via the use of only the BDR

Final CCNA 4 (H)

1. Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router?

PPP
SLIP
xxxHDLC
Frame Relay

2. What is a characteristic feature of a worm?

xxxexploits a known vulnerability
attaches to executable programs
masquerades as a legitmate program
lies dormant until triggered by an event, time, or date

3.An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?

When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
xxxIPv4 is incompatible with RIPng

4.Which statement accurately describes a characteristic of a security policy?

xxxIt creates a basis for legal action if necessary.
It should not need altering once it is implemented.
It provides step-by-step procedures to harden routers and other network devices.
It is kept private from users to prevent the possibility of circumvention of security measures

5. Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized parties?

QoS
latency
reliability
xxxconfidentiality

6. Refer to the exhibit. A network administrator is configuring Frame Relay on router HQ. It is desired that each Frame Relay PVC between the routers be in a separate subnet. Which two commands on HQ will accomplish this task for the connection to R1? (Choose two.)

HQ(config)# interface S0/0/0
HQ(config)# interface S0/0/0.1 multipoint
xxxHQ(config)# interface S0/0/0.1 point-to-point
HQ(config-subif)# frame-relay interface dlci 103
HQ(config-subif)# frame-relay interface dlci 301
xxxHQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast

7. Refer to the exhibit. Router1 and Router2 are directly connected over a point-to-point serial link. Router1 initiates a PPP session with Router2. Which statement is true based on the configuration?

The password is sent in clear text.
The routers are unable to authenticate.
The username and password are sent encrypted.
xxxA hash value of the username and password are sent.

8. A technician has been asked to run Cisco SDM one-step lockdown on the router of a customer. What will be the result of this process?

Traffic is only forwarded from SDM-trusted Cisco routers.
Security testing is performed and the results are saved as a text file stored in NVRAM.
xxxThe router is tested for potential security problems and any necessary changes are made.
All traffic entering the router is quarantined and checked for viruses before being forwarded.

9. Which two statements are true about creating and applying access lists? (Choose two.)

xxxThere is an implicit deny at the end of all access lists.
xxxOne access list per port, per protocol, per direction is permitted.
Access list entries should filter in the order from general to specific.
The term "inbound" refers to traffic that enters the network from the router interface where the ACL is applied.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.

10. Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?

a new WAN service supporting only IPv6
NAT overload to map inside IPv6 addresses to outside IPv4 address
xxxa manually configured IPv6 tunnel between the edge routers R1 and R2
static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for the rest of the inside IPv6 addresses

11. A company uses a PVC with a committed information rate (CIR) of 128 kb/s and a committed burst information rate (CBIR) of 64 kb/s. The link is used to periodically send updates at a rate of 144 kb/s. What will happen to the update traffic?

The traffic will be sent, but the company will be charged a penalty.
The traffic will be sent using the additional CBIR and will be guaranteed delivery.
xxxThe traffic will be dropped at the CO for exceeding the committed information rate.
The traffic will be sent, but the burst traffic will be marked for discard if congestion is encountered.

12. Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?

The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
xxxPort Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.

13. A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?

Configure DHCP and static NAT.
Configure dynamic NAT for ten users.
Configure static NAT for all ten users.
xxxConfigure dynamic NAT with overload.

14. Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?

application
transport
xxxnetwork
data link
physical

15. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?

There is a Layer 2 loop.
xxxThe VTP domain names do not match.
Only one switch can be in server mode.
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.

16. Refer to the exhibit. What is the effect of the extended ACL when applied inbound on the S0/0/0 interface on R2?

All IP traffic will be permitted during the specified days and time range.
Both IP and Telnet traffic will be permitted during the specified days and time range.
Only Telnet traffic destined for 172.16.10.0/24 will be permitted during the specified days and time range.
xxxTelnet traffic will be permitted only during the specified days and time range. All other network traffic will be permitted any time.

17. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)

Once a good password is created, do not change it.
xxxDeliberately misspell words when creating passwords.
xxxCreate passwords that are at least 8 characters in length.
xxxUse combinations of upper case, lower case, and special characters.
Write passwords in locations that can be easily retrieved to avoid being locked out.
Use long words found in the dictionary to make passwords that are easy to remember.

18. Refer to the exhibit. How is the TCP/IP configuration information specified by the default-router and dns-server commands made available?



The TCP/IP information is forwarded to a 10.0.1.3 to be supplied to DHCP clients.
The TCP/IP information is used by DNS clients to forward all data to the default gateway on R1 of 10.0.1.3.
The TCP/IP information is supplied to any DHCP client on the network connected to the FastEthernet 0/0 interface of R1.
The TCP/IP information is applied to each packet that enters R1 through the FastEthernet 0/0 interface that are hosts on the 10.0.1.0 /24 network except packets from addresses 10.0.1.2, 10.0.1.16, and 10.0.1.254.

19. Which variable is permitted or denied by a standard access control list?

protocol type
xxxsource IP address
source MAC address
destination IP address
destination MAC address

20. When configuring a Frame Relay connection, what is the purpose of Inverse ARP?

to assign a DLCI to a remote peer
to disable peer requests from determining local Layer 3 addresses
to negotiate LMI encapsulations between local and remote Frame Relay peers
xxxto create a mapping of DLCI to Layer 3 addresses that belong to remote peers

21. An issue of response time has recently arisen on an application server. The new release of a software package has also been installed on the server. The configuration of the network has changed recently. To identify the problem, individuals from both teams responsible for the recent changes begin to investigate the source of the problem. Which statement applies to this situation?

Scheduling will be easy if the network and software teams work independently.
xxxIt will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.

22. What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control list and applied on the inbound interface of a router?

TCP traffic with a destination to the 10.25.132.0/24 is permitted.
Only Telnet traffic is permitted to the 10.24.132.0/24 network
Ttraffic from 10.25.132.0/24 is permitted to anywhere on using any port.
xxxTraffic using port 25 from the 10.25.132.0/24 is permitted to all destinations.

23. At what point in the PPP connection process does the authentication phase occur?

after NCP establishes Layer 3 parameters
xxxbefore LCP begins the link establishment process
after the initial Configure-Request message from the link initiator
after the link initiator receives a Configure-Ack message from the responder

24. An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local mail server IP address successfully from a remote network and can successfully resolve the mail server name to an IP address via the use of the nslookup command. At what OSI layer is the problem most likely to be found?

physical layer
data link layer
network layer
xxxapplication layer

25. Refer to the exhibit. Which statement is true about the Frame Relay connection?

The Frame Relay connection is in the process of negotiation.
xxxA congestion control mechanism is enabled on the Frame Relay connection.
The “ACTIVE” status of the Frame Relay connection indicates that the network is experiencing congestion.
Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.

26. A light manufacturing company wishes to replace its DSL service with a non-line-of-sight broadband wireless solution that offers comparable speeds. Which solution should the customer choose?

Wi-Fi
satellite
xxxWiMAX
Metro Ethernet

27. Refer to the exhibit. This router is being configured to use SDM, but the SDM interface of the router cannot be accessed. What is the cause of the problem?

xxxThe VTY lines are not configured correctly.
The HTTP timeout policy is not configured correctly.
The authentication method is not configured correctly.
The username and password are not configured correctly.

28. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?

BE
DE
xxxCIR
CBIR

29.Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the DC router to the Orlando router?

DLCI 123
xxxDLCI 321
10.10.10.25
10.10.10.26
MAC address of the Orlando router

30. Where does a service provider assume responsibility from a customer for a WAN connection?

local loop
DTE cable on router
xxxdemarcation point
demilitarized zone

31. A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)

xxxreduced jitter
reduced costs
xxxreduced latency
the ability to burst above guaranteed bandwidth
the ability to borrow unused bandwidth from the leased lines of other customers

32. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 192.168.3.17". What is the problem?

The address 192.168.3.17 address is already in use by Fa0/0.
xxxThe pool of addresses for the 192Network pool is configured incorrectly.
The ip helper-address command should be used on the Fa0/0 interface.
The 192.168.3.17 address has not been excluded from the 192Network pool.

33.A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West side of town. How can this be explained?

The West side has a high volume of POTS traffic.
The West side of town is downloading larger packets.
xxxThe service provider is closer to the location on the East side.
More clients share a connection to the DSLAM on the West side.

34. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?

ATM
Frame Relay
xxxHDLC
PPP
SDLC

35. Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?

flow control
error control
xxxauthentication
synchronous communication

36. When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?

access control list
routing protocol
inbound interface
ARP cache

37. Refer to the exhibit. What statement is true about the core router devices?

They use multiport internetworking devices to switch traffic such as Frame Relay, ATM, or X.25 over the WAN.
They provide internetworking and WAN access interface ports that are used to connect to the service provider network.
They provide termination for the digital signal and ensure connection integrity through error correction and line monitoring.
xxxThey support multiple telecommunications interfaces of the highest speed and are able to forward IP packets at full speed on all of those interfaces.

38. Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?

The serial interfaces are in different subnets.
xxxThe RIPng process is not enabled on interfaces.
The RIPng processes do not match between Router1 and Router2.
The RIPng network command is missing from the IPv6 RIP configuration.

39. Which two protocols in combination should be used to establish a link with secure authentication between a Cisco and a non-Cisco router? (Choose two.)

HDLC
xxxPPP
xxxSLIP
PAP
CHAP

40. Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the most likely cause?

improper LMI type
interface reset
PPP negotiation failure
unplugged cable

41. Which statement is true about NCP?

Link termination is the responsibility of NCP.
xxxEach network protocol has a corresponding NCP.
NCP establishes the initial link between PPP devices.
NCP tests the link to ensure that the link quality is sufficient.

42. Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request packet that enters interface S0/0/0, and is destined for an FTP server at IP address 172.16.1.5?

The router matches the incoming packet to the statement that is created by access-list 201 permit ip any any command and allows the packet into the router.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by access-list 101 permit ip any any command.
xxxThe router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.

43. Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?

xxxEnable RIP authentication on R2.
Issue the ip directed-broadcast command on R2.
Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.
Enable CDP on R2 so that the other routers will receive routing updates

44. Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?

The commands overwrite the existing Managers ACL.
xxxThe commands are added at the end of the existing Managers ACL.
The network administrator receives an error stating that the ACL already exists.
The commands will create a duplicate Managers ACL containing only the new commands being entered.

45. Which security solution has the responsibility of monitoring suspicious processes that are running on a host and that might indicate infection of Trojan horse applications?

xxxantivirus application
operating system patches
intrusion prevention system
Cisco Adaptive Security Appliance

46. Which statement is true about wildcard masks?

A wildcard mask must be created by inverting the subnet mask.
A wildcard mask performs the same function as a subnet mask.
xxxA wildcard mask of 0.0.0.0 means the address should match exactly.
A wildcard mask uses a "1" to identify IP address bits that must be checked.

47. Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?

Use correct source file name in the command.
Verify that the TFTP server software is running.
Make sure that there is enough room on the TFTP server for the backup.
xxxCheck that R1 has a route to the network where the TFTP server resides.

48. Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?

Replace the serial cable .
Replace the WIC on RA.
xxxConfigure RA with a clock rate command.
Issue a no shutdown interface command on RB.

49. Refer to the exhibit. From the output of the show interface commands, at which OSI layer is a fault indicated?

application
transport
network
xxxdata link
physical

50. Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?

extended
xxxreflexive
standard
time-based

51. Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?

Wi-Fi
satellite
xxxWiMAX
Metro Ethernet

52. Which option represents a best practice for applying ACLs?

Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied inside the core layer.
ACLs applied to outbound interfaces use fewer router resources.
xxxExtended ACLs should be applied closest to the source that is specified by the ACL.

My Headlines