+ All Categories
Home > Documents > Cisco.Certdumps.200-101.v2014-06 · PDF...

Cisco.Certdumps.200-101.v2014-06 · PDF...

Date post: 13-Mar-2018
Category:
Upload: vandieu
View: 218 times
Download: 1 times
Share this document with a friend
68
Cisco.Certdumps.200-101.v2014-06-05.by.CHRISTINA.100q Number : 200-101 Passing Score : 825 Time Limit : 120 min File Version : 14.5 http://www.gratisexam.com/ Exam Code: 200-101 Exam Name: Interconnecting Cisco Networking Devices Part 2 (ICND2) Sections 1. HSRP - VRRP - GLBP & Netflow 2. WAN & Frame Relay 3. VLAN, InterVLAN Routing/IP Routing, Trunking, & IPv6 4. STP & Security 5. OSPF and EIGRP Questions 6. Drag and Drop 7. LAB Sim's EIGRP-Frame Relay - OSFP
Transcript

Cisco.Certdumps.200-101.v2014-06-05.by.CHRISTINA.10 0q

Number: 200-101Passing Score: 825Time Limit: 120 minFile Version: 14.5

http://www.gratisexam.com/

Exam Code: 200-101

Exam Name: Interconnecting Cisco Networking Devices Part 2 (ICND2)

Sections1. HSRP - VRRP - GLBP & Netflow2. WAN & Frame Relay3. VLAN, InterVLAN Routing/IP Routing, Trunking, & IPv64. STP & Security5. OSPF and EIGRP Questions6. Drag and Drop7. LAB Sim's EIGRP-Frame Relay - OSFP

Exam A

QUESTION 1Which one of these is a valid HSRP Virtual Mac Address?

A. 0000.0C07.AC01B. 0000.5E00.0110C. 0007.B400.1203D. 0000.C007.0201

Correct Answer: ASection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Answer: A

Explanation:

With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IPaddress. There are two version of HSRP.

+ With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRPgroup. + With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.

Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through0005.73A0.0FFF.

-> A is correct.(Good resource for HSRP: http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_hsrp.html)

QUESTION 2Which three statements about HSRP operation are true? (Choose three)

A. The virtual IP address and virtual MAC address are active on the HSRP Master router.B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C. HSRP supports only clear-text authenticationD. The HSRP virtual IP address must be on a different subnet than the routers’ interfaces on the same

LAN.E. The HSRP virtual IP address must be the same as one of the router’s interface addresses on the LAN.F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

Correct Answer: ABFSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx , where xx is the HSRP group numberin hexadecimal based on the respective interface. For example, HSRP group 10 uses the HSRP virtualMAC address of 0000.0C07.AC0A. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX(XXX: HSRP group in hexadecimal)

For more information about HSRP operation, please read our HSRP tutorial.

http://www.9tut.com/hot-standby-router-protocol-hsrp-tutorial

QUESTION 3Which statement describes VRRP object tracking?

A. It monitors traffic flow and link utilizationB. It ensures the best VRRP router is the virtual router master for the group.C. It causes traffic to dynamically move to higher bandwidth linksD. It thwarts man-in-the-middle attacks.

Correct Answer: BSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

Object tracking is the process of tracking the state of a configured object and uses that state to determinethe priority of the VRRP router in a VRRP group -> B is correct.

(Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_vrrp.html#wp1074871)

Note: Unlike HSRP which can track interface status directly, VRRP can only track interface status through atracked object.

QUESTION 4In GLBP, which router will respond to client ARP requests?

A. The active virtual gateway will reply with one of four possible virtual MAC addresses.B. All GLBP member routers will reply in round-robin fashion.C. The active virtual gateway will reply with its own hardware MAC address.D. The GLBP member routers will reply with one of four possible burned in hardware addresses.

Correct Answer: ASection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for theprimary to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use ofup to four routers simultaneously. In GLBP, there is still only one virtual IP address but each router has adifferent virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG isresponsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses thatcorrespond to different routers (known as Active Virtual Forwarders – AVFs) so that clients can send trafficto different routers in that GLBP group (load sharing).

QUESTION 5In a GLBP network, who is responsible for the arp request?

http://www.gratisexam.com/

A. AVFB. AVG

C. Active RouterD. Standby Router

Correct Answer: BSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:

QUESTION 6What are three benefits of GLBP? (Choose three)

A. GLBP supports up to eight virtual forwarders per GLBP groupB. GLBP supports clear text and MD5 password authentication between GLBP group membersC. GLBP is an open source standardized protocol that can be used with multiple vendors.D. GLBP supports up to 1024 virtual routersE. GLBP can load share traffic across a maximum of four routers.F. GLBP elects two AVGs and two standby AVGs for redundancy.

Correct Answer: BDESection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:

QUESTION 7What are the benefit of using Netflow? (Choose three)

A. Network, Application & User MonitoringB. Network PlanningC. Security AnalysisD. Accounting/Billing

Correct Answer: ACDSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

NetFlow traditionally enables several key customer applications including:+ Network Monitoring – NetFlow data enables extensive near real time network monitoringcapabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns associated withindividual routers and switches as well as on a network-wide basis (providing aggregate traffic or applicationbased views) to provide proactive problem detection, efficient troubleshooting, and rapid problemresolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain adetailed, time-based, view of application usage over the network. This information is used to plan,understand new services, and allocate network and application resources (e.g. Web server sizing and VoIPdeployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailedunderstanding of customer/user utilization of network and application resources. This information may thenbe utilized to efficiently plan and allocate access, backbone and application resources as well as to detectand resolve potential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing theopportunity to track and anticipate network growth and plan upgrades to increase the number of routingdevices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning includingpeering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total costof network operations while maximizing network performance, capacity, and reliability. NetFlow detectsunwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of newnetwork applications. NetFlow will give you valuable information to reduce the cost of operating yournetwork.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time.Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data isalso a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes detailssuch as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) forhighly flexible and detailed resource utilization accounting. Service providers may utilize the information forbilling based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprisecustomers may utilize the information for departmental charge-back or cost allocation for resourceutilization.(Reference: http://www.cisco.com/en/US/products/sw/netmgtsw/ps1964/products_implementation_design_guide09186a00800d6a11.html#wp1030045)

QUESTION 8What are the three things that the NetFlow uses to consider the traffic to be in a same flow?

A. IP addressB. Interface nameC. Port numbersD. L3 protocol typeE. MAC address

Correct Answer: ACDSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

What is an IP Flow?

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. Theseattributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique orsimilar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.

IP Packet attributes used by NetFlow:

+ IP source address+ IP destination address+ Source port+ Destination port+ Layer 3 protocol type+ Class of Service+ Router or switch interface

(Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html)

QUESTION 9

What NetFlow component can be applied to an interface to track IPv4 traffic?A. flow monitor

A. flow monitorB. flow recordC. flow samplerD. flow exporter

Correct Answer: ASection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network trafficmonitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after youcreate the flow monitor. The flow monitor cache is automatically created at the time the flow monitor isapplied to the first interface. Flow data is collected from the network traffic during the monitoring processbased on the key and nonkey fields in the record, which is configured for the flow monitor and stored in theflow monitor cache.

For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters FlexibleNetFlow flow monitor configuration mode:Router(config)# flow monitor FLOW-MONITOR-1Router(config-flow-monitor)#

(Reference: http://www.cisco.com/c/en/us/td/docs/ios/fnetflow/command/reference/fnf_book/fnf_01.html#wp1314030)

QUESTION 10What command visualizes the general NetFlow data on the command line?

A. show ip flow exportB. show ip flow top-talkersC. show ip cache flowD. show mls samplingE. show mls netflow ip

Correct Answer: CSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:Explanation

The “show ip cache flow” command displays a summary of the NetFlow accounting statistics.

QUESTION 11What are three reasons to collect NetFlow data on a company network? (Choose three)

A. To identify applications causing congestionB. To authorize user network access.C. To report and alert link up / down instancesD. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.E. To detect suboptimal routing in the network.F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Correct Answer: ADFSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:ExplanationNetFlow facilitates solutions to many common problems encountered by IT professionals.+ Analyze new applications and their network impactIdentify new application network loads such as VoIP or remote site additions.+ Reduction in peak WAN trafficUse NetFlow statistics to measure WAN traffic improvement from application-policy changes; understandwho is utilizing the network and the network top talkers.+ Troubleshooting and understanding network pain poin tsDiagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command lineinterface or reporting tools. -> D is correct.+ Detection of unauthorized WAN trafficAvoid costly upgrades by identifying the applications causing congestion. -> A is correct.+ Security and anomaly detectionNetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.+ Validation of QoS parameters

Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS isover- or under-subscribed.-> F is correct.(Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html)

QUESTION 12What are three factors a network administrator must consider before implementing Netflow in the network?(Choose three)

A. CPU utilizationB. where Netflow data will be sentC. number of devices exporting Netflow dataD. Port availabilityE. SNMP versionF. WAN encapsulation

Correct Answer: ABDSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:

QUESTION 13What Cisco IOS feature can be enabled to pinpoint an application that is causing slow networkperformance?

A. SNMPB. NetflowC. WCCPD. IP SLA

Correct Answer: BSection: HSRP - VRRP - GLBP & NetflowExplanation

Explanation/Reference:

QUESTION 14Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choosetwo)

A. CHAP uses a two-way handshake.B. CHAP uses a three-way handshake.C. CHAP authentication periodically occurs after link establishmentD. CHAP authentication passwords are sent in plaintext.E. CHAP authentication is performed only upon link establishmentF. CHAP has no protection from playback attacks.

Correct Answer: BCSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

Point-to-Point Protocol (PPP) can use either Password Authentication Protocol (PAP) or ChallengeHandshake Authentication Protocol (CHAP) for authentication. CHAP is used upon initial link establishmentand periodically to make sure that the router is still communicating with the same host. CHAP passwords

arc exchanged as message digest algorithm 5 (MD5) hash values.

The three-way handshake steps are as follows:

Challenge : The authenticator generates a frame called a Challenge and sends it to the initiator. Thisframe contains a simple text message (sometimes called the challenge text). The message has no inherentspecial meaning so it doesn’t matter if anyone intercepts it. The important thing is that after receipt of theChallenge both devices have the same challenge message.

Response : The initiator uses its password (or some other shared “secret” that the authenticators alsoknows) to encrypt the challenge text. It then sends the encrypted challenge text as a Response back to theauthenticator.

Success or Failure : The authenticator performs the same encryption on the challenge text that theinitiator did. If the authenticator gets the same result that the initiator sent it in the Response, theauthenticator knows that the initiator had the right password when it did its encryption, so the authenticatorsends back a Success message. Otherwise, it sends a Failure message.

(Reference: CCNA Quick Reference Sheets)

QUESTION 15Refer to the exhibit. Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Basedon the output from RouterA, what are two possible reasons for the failure? (Choose two)

A. The cable that is connected to S0/0 on RouterA is faultyB. Interface S0/0 on RouterB is administratively down.C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.D. The IP address that is configured on S0/0 of RouterB is not in the correct subnetE. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSUF. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is

configured on S0/0 of RouterA.

Correct Answer: EFSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

From the output we see the Serial0/0 of RouterA is in “status up/protocol down” state which indicates aLayer 2 problem so the problem can be:

+ Keepalives mismatch+ Encapsulation mismatch+ Clocking problem

QUESTION 16Which command is used to enable CHAP authentication with PAP as the fallback method on a serialinterface?

A. (config-if)# authentication ppp chap fallback pppB. (config-if)# authentication ppp chap papC. (config-if)# ppp authentication chap papD. (config-if)# ppp authentication chap fallback ppp

Correct Answer: CSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

The command “ppp authentication chap pap” command indicates the CHAP authentication is used first. If itfails or is rejected by other side then uses PAP instead. If you want to use PAP first (then CHAP) you canuse the “ppp authentication pap chap” command.

QUESTION 17Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?

A. HDLC B. PPPC. X.25D. Frame Relay

Correct Answer: BSection: WAN & Frame RelayExplanation

Explanation/Reference:PPP supports both synchronous (like analog phone lines) and asynchronous circuits (such as ISDN ordigital links). With synchronous circuits we need to use clock rate.Note: Serial links can be synchronous or asynchronous. Asynchronous connections used to be onlyavailable on low-speed (<2MB) serial interfaces, but now, there are the new HWICs (High-Speed WANInterface Cards) which also support asynchronous mode. To learn more about them please visit http://www.cisco.com/en/US/prod/collateral/modules/ps5949/ps6182/prod_qas0900aecd80274424.html.

QUESTION 18At which layer of the OSI model does PPP perform?

A. Layer 2B. Layer 3C. Layer 4D. Layer 5

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Layer 2 includes the popular WAN standards, such as the Point-to-Point Protocol (PPP), High-Level Data-Link Control (HDLC) and Frame Relay protocols

QUESTION 19Which PPP subprotocol negotiates authentication options

A. NCPB. ISDNC. SUPD. LCPE. DLCI

Correct Answer: DSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

Link Control Protocol (LCP) is a subprotocol within the Point-to-Point Protocol protocol suite that isresponsible for link management. During establishment of a PPP communication session, LCP establishesthe link, configures PPP options, and tests the quality of the line connection between the PPP client andPPP server. LCP automatically handles encapsulation format options and varies packet sizes over PPPcommunication links.LCP also negotiates the type of authentication protocol used to establish the PPP session. Differentauthentication protocols are supported for satisfying the security needs of different environments.Other subprotocol within PPP is Network Control Protocol (NCP), which is used to allow multiple Networklayer protocols (routed protocols) to be used on a point-to-point connection.

QUESTION 20Which two options are valid WAN connectivity methods? (Choose two)

A. PPPB. WAPC. DSLD. L2TPV3E. Ethernet

Correct Answer: ACSection: WAN & Frame RelayExplanation

Explanation/Reference:

QUESTION 21Refer to the exhibit. Which WAN protocol is being used?

A. ATMB. HDLCC. Frame RelayD. PPP

Correct Answer: CSection: WAN & Frame RelayExplanation

Explanation/Reference:Local Management Interface (LMI) is a signaling standard protocol used between your router (DTE) and thefirst Frame Relay switch. From the output we learn this interface is sending and receiving LMI messages ->Frame Relay is being used.

QUESTION 22Refer to the exhibit. The show interfaces serial 0/1 command was issued on the R10-1 router.Based on the output displayed which statement is correct?

A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cableB. The R10-1 router can ping the router interface connected to the serial 0/1 interface.C. The clock rate used for interface serial 0/1 of the R10-1 router is 1,544,000 bits per second.D. The CSU used with the serial 0/1 interface of the R10-1 router has lost connection to the service

provider.E. The interface of the remote router connected to the serial 0/1 interface of the R10-1 router is using the

default serial interface encapsulation.

Correct Answer: ESection: WAN & Frame RelayExplanation

Explanation/Reference:From the output, we see the the line “Serial0/1 is up, line protocol is up”. That means the link is good andthe interface is functioning normally. Also the encapsulation used on this interface is HDLC -> The otherend must use the same encapsulation. Otherwise the line protocol will go down.

QUESTION 23A network administrator needs to configure a serial link between the main office and a remote location. Therouter at the remote office is a non-Cisco router. How should the network administrator configure the serialinterface of the main office router to make the connection?

A. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# no shut

B. Main(config)# interface serial 0/0Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp Main(config-if)# no shut

C. Main(config)# interface serial 0/0Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation frame-relay Main(config-if)# authentication chap Main(config-if)# no shut

D. Main(config)# interface serial 0/0Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf Main(config-if)# no shut

Correct Answer: BSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

“The router at the remote office is a non-Cisco router” so we cannot use HDLC which is a Cisco proprietaryprotocol -> A is not correct (HDLC is the default protocol on Cisco router for serial connection so we don’tneed to type any command).

Frame Relay does not support authentication but if we run PPP over Frame Relay then we can use PAP orCHAP. Answer C does not have enough commands for this type of configuration -> C is not correct.

Cisco routers have two kinds of Frame Relay encapsulation: IETF or Cisco. A non-Cisco device does notunderstand

“Frame Relay Cisco encapsulation” so if two routers use different kind of Frame Relay encapsulation, theycannot operate. So if we have a non-Cisco device we have to configure “encapsulation ietf” on both ends sothat they can work. But the correct command should be “encapsulation frame-relay ietf” -> D is not correct.

Note: The “encapsulation frame-relay ietf” command uses to encapsulate outgoing frames with IETF.Incoming frames can still be decapsulated even if the interface is configured with “Cisco encapsulation”.

QUESTION 24Refer to the exhibit:

Assuming that the entire network topology is shown, what is the operational status of the interfaces of R2as indicated by the command output shown?

A. One interface has a problemB. Two interfaces have problemsC. The interfaces are functioning correctly.D. The operational status of the interfaces cannot be determined from the output shown.

Correct Answer: CSection: WAN & Frame RelayExplanation

Explanation/Reference:

QUESTION 25What can be done to Frame Relay to resolve split-horizon issues?(Choose two)

A. Disable Inverse ARP.B. Create a full-mesh topology.C. Develop multipoint subinterfacesD. Configure point-to-point subinterfaces.E. Remove the broadcast keyword from the frame-relay map command.

Correct Answer: BDSection: WAN & Frame RelayExplanation

Explanation/Reference:ExplanationSPLIT HORIZON: A router never sends information about a route back in same direction which isoriginal information came, routers keep track of where the information about a route came from. Meanswhen router A sends update to router B about any failure network, router B does not send any update forsame network to router A in same direction.

Therefore in order to resolve split-horizon issue, we can create a full-mesh topology (a network topology inwhich there is a direct link between all pairs of nodes) so that all the routers can learn all the routesadvertised by the neighbors -> B is correct.

Configuring Point-to-point subinterfaces is a good way to resolve the split-horizon issue because eachsubinterface is treated as a separate interface so an interface can send and receive information about aroute -> D is correct.

QUESTION 26Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

A. IETFB. ANSI Annex DC. Q9333-A Annex AD. HDLC

Correct Answer: ASection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

Cisco supports two Frame Relay encapsulation types: the Cisco encapsulation and the IETFFrame Relay encapsulation , which is in conformance with RFC 1490 and RFC 2427. The former isoften used to connect two Cisco routers while the latter is used to connect a Cisco router to a non-Cisco

router. You can test with your Cisco router when typing the command Router(config-if)#encapsulationframe-relay ? on a WAN link. Below is the output of this command (notice Cisco is the defaultencapsulation so it is not listed here, just press Enter to use it).

Note: Three LMI options are supported by Cisco routers are ansi, Cisco, and Q933a. They represent theANSI Annex D, Cisco, and ITU Q933-A (Annex A) LMI types, respectively.HDLC is a WAN protocol same as Frame-Relay and PPP so it is not a Frame Relay encapsulation type.

QUESTION 27What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two)

A. They create split-horizon issuesB. They require a unique subnet within a routing domainC. They emulate leased lines.D. They are ideal for full-mesh topologies.E. They require the use of NBMA options when using OSPF.

Correct Answer: BCSection: WAN & Frame RelayExplanation

Explanation/Reference:

QUESTION 28What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?

A. defines the destination IP address that is used in all broadcast packets on DLCI 202B. defines the source IP address that is used in all broadcast packets on DLCI 202C. defines the DLCI on which packets from the 192.168.1.2 IP address are receivedD. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 29What does the frame-relay interface-dlci command configure?

A. local DLCI on the subinterfaceB. remote DLCI on the main interfaceC. remote DLCI on the subinterfaceD. local DLCI on the main interface

Correct Answer: ASection: WAN & Frame RelayExplanation

Explanation/Reference:When configuring on a point-to-point subinterface, the command frame-relay interface-dlciassociates the selected point-to-point subinterface with a DLCI. But remember that the DLCI number in thiscommand is the local DLCI.

An example of using this command is shown below:

R1(config)#interface Serial0/0.1 point-to-point R1(config-subif)#ip address 192.168.1.1 255.255.255.252 R1(config-subif)#frame-relay interface-dlci 1 R1(config-fr-dlci)#exit

QUESTION 30What command is used to verify the DLCI destination address in a Frame Relay static configuration?

A. show frame-relay pvcB. show frame-relay lmiC. show frame-relay mapD. show frame relay end-to-end

Correct Answer: CSection: WAN & Frame RelayExplanation

Explanation/Reference:An example of the output of “show frame-relay map” command is shown below:

We can see the IP address 172.16.3.1 is associated with the DLCI 100.

QUESTION 31What occurs on a Frame Relay network when the CIR is exceeded?

A. All TCP traffic is marked discard eligible.B. All UDP traffic is marked discard eligible and a BECN is sent.C. All TCP traffic is marked discard eligible and a BECN is sent.D. All traffic exceeding the CIR is marked discard eligible.

Correct Answer: DSection: WAN & Frame RelayExplanation

Explanation/Reference:ExplanationCommitted information rate (CIR): The minimum guaranteed data transfer rate agreed to by the FrameRelay switch.

Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can bedropped if the congestion occurs within the Frame Relay network.

Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identifyframes that are first to be dropped when the CIR is exceeded.

QUESTION 32What is the purpose of Inverse ARP?

A. to map a known IP address to a MAC addressB. to map a known DLCI to a MAC addressC. to map a known MAC address to an IP addressD. to map a known DLCI to an IP addressE. to map a known IP address to a SPIDF. to map a known SPID to a MAC address

Correct Answer: DSection: WAN & Frame RelayExplanation

Explanation/Reference:

QUESTION 33What is the advantage of using a multipoint interface instead of point-to-point subinterfaces whenconfiguring a Frame Relay hub in a hub-and-spoke topology?

A. It avoids split-horizon issues with distance vector routing protocols.B. IP addresses can be conserved if VLSM is not being used for subnetting.C. IP addresses can be conserved if VLSM is not being used for subnetting.D. The multiple IP network addresses required for a multipoint interface provide greater addressing

flexibility over point-to-point configurations.

Correct Answer: BSection: WAN & Frame RelayExplanation

Explanation/Reference:Explanation

A main advantage of configuring Frame Relay multipoint compared to point-to-point subinterfaces is we canassign IP addresses on the same subnets/networks to the interfaces of Frame Relay switch, thus savingthe subnets/networks you have.

QUESTION 34Which command allows you to verify the encapsulation type (CISCO or IETF) for a frame relay link?

A. show frame-relay map B. show frame-relay lmiC. show inter serialD. show frame-relay pvc

Correct Answer: ASection: WAN & Frame RelayExplanation

Explanation/Reference:ExplanationThe “show frame-relay map” command displays the current map entries and information about theconnections, including encapsulation type.You can check Table 33 in the following link: http://www.cisco.com/en/US/docs/ios/12_2/wan/command/reference/wrffr4.html#wp1029343It clearly states there is a Field which can be Cisco or IETF, which “indicates the encapsulation type for thismap”. We quote that Table 33 here for your quick reference (you will see what we want to imply in bold):FieldDescriptionSerial 1 (administratively down)Identifies a Frame Relay interface and its status (up or down).ip 131.108.177.177Destination IP address.dlci 177 (0xB1,0x2C10)

DLCI that identifies the logical connection being used to reach this interface. This value is displayed in threeways: its decimal value (177), its hexadecimal value (0xB1), and its value as it would appear on the wire(0x2C10).static

Indicates whether this is a static or dynamic entry.CISCO

Indicates the encapsulation type for this map; eith er CISCO or IETF.TCP/IP Header Compression (inherited), passive (inherited)Indicates whether the TCP/IP header compression characteristics were inherited from the interface or wereexplicitly configured for the IP map.The “show frame-relay lmi” gives us information about the LMI encapsulation type used by the Frame Relayinterface, which can be ANSI, CISCO or Q933a. Therefore it is not what the question requires (CISCO orIETF).

QUESTION 35The command show frame-relay map gives the following output:Serial 0 (up): ip 192.168.151.4 dlci 122, dynamic, broadcast, status defined, activeWhich statements represent what is shown? (Choose three)

A. 192.168.151.4 represents the IP address of the remote routerB. 192.168.151.4 represents the IP address of the local serial interfaceC. DLC1122 represents the interface of the remote serial interfaceD. DLC1122 represents the local number used to connect to the remote addressE. broadcast indicates that a dynamic routing protocol such as RIP v1 can send packets across this PVCF. active indicates that the ARP process is working

Correct Answer: ADESection: WAN & Frame RelayExplanation

Explanation/Reference:

QUESTION 36The output of the show frame-relay pvc command shows ”PVC STATUS=INACTIVE”. What does thismean?

A. The PVC is configured correctly and is operating normally,but no data packets have been detected formore than five minutes.

B. The PVC is configured correctly, is operating normally and is no longer actively seeking the address theremote route.

C. The PVC is configured correctly, is operating normally and is waiting for interesting to trigger a call tothe remote router.

D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of thePVC.

E. The PVC is not configured on the switch.

Correct Answer: DSection: WAN & Frame RelayExplanation

Explanation/Reference:ExplanationThe PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to theDTE devices. There are 4 statuses:+ ACTIVE: the PVC is operational and can transmit data+ INACTIVE: the connection from the local router to the switch is working, but the connection to the remoterouter is not available+ DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “nokeepalive” command). This status is rarely seen so it is ignored in some books.

QUESTION 37

What two statistics appear in show frame-relay map output? (Choose two)

A. The number of FECN packets that are received by the router B. The number of BECN packets that are received by the routerC. The ip address of the local routerD. The value of the local DLCIE. The status of the PVC that is configured on the router

Correct Answer: DESection: WAN & Frame RelayExplanation

Explanation/Reference:ExplanationAn example of the output of this command is shown below:

From the output we can see the local DLCI (102 & 103) and the status of the PVC configured on the router(both are defined, active).

QUESTION 38Which three of these statements regarding 802.1Q trunking are correct? (Choose three)

A. 802.1Q native VLAN frames are untagged by defaultB. 802.1Q trunking ports can also be secure ports.C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.D. 802.1Q trunks require full-duplex, point-to-point connectivityE. 802.1Q trunks should have native VLANs that are the same at both ends.

Correct Answer: ACESection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Native VLAN frames are carried over the trunk link untagged -> A is correct.802.1Q trunking ports carry all the traffic of all VLANs so it cannot be the secure ports. A secure port shouldbe only configured to connect with terminal devices (hosts, printers, servers…) -> B is not correct.The Inter-Switch Link (ISL) encapsulation requires FastEthernet or greater to operate but 802.1q supports10Mb/s Ethernet interfaces. -> C is correct.802.1Q supports point-to-multipoint connectivity. Although in Cisco implementation, a “trunk” is considereda point-to-point link but 802.1q encapsulation can be used on an Ethernet segment shared by more thantwo devices. Such a configuration is seldom needed but is still possible with the disablement of DTPnegotiation. -> D is not correct (Reference: http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a008012ecf3.shtml)The native VLAN that is configured on each end of an 802.1Q trunk must be the same. This is becausewhen a switch receives an untagged frame, it will assign that frame to the native VLAN. If one end isconfigured VLAN1 as the native VLAN while the other end is configured VLAN2 as the native VLAN, aframe sent in VLAN1 on one side will be received on VLAN2 on the other side -> E is correct.

QUESTION 39Refer to the exhibit. A technician has configured the FastEthernet 0/1 interface on Sw11 as an access linkin VLAN 1. Based on the output from the show vlan brief command issued on Sw12, what will be theresult of making this change on Sw11?

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other.B. The hosts in all VLANs on the two switches will be able to communicate with each other.C. Only the hosts in VLAN 10 and VLAN 15 on the two switches will be able to communicate with each

other.D. Hosts will not be able to communicate between the two switches.

Correct Answer: DSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Fa0/1 of Switch11 is configured as an access link of VLAN1 so only frames in VLAN1 can communicatethrough the two switches. But from the output above we see there is no interface belongs to VLAN1 onSwitch12 -> no hosts can communicate between the two switches.

QUESTION 40Refer to the exhibit:

What can be determined about the interfaces of the Main_Campus router from the output shown?

A. The LAN interfaces are configured on different subnets.B. Interface FastEthernet 0/0 is configured as a trunk.C. The Layer 2 protocol of interface Serial 0/1 is NOT operational.D. The router is a modular router with five FastEthernet interfaces.E. Interface FastEthernet 0/0 is administratively deactivated.

Correct Answer: BSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

We can’t confirm answer B is totally correct but all other answers are wrong so B is the best choice.+ We only have 1 LAN interface on Main_Campus router with 4 subinterfaces -> answer A is not correct(although it is a bit unclear).+ The “protocol” column of interface Serial0/1 is up so its Layer 2 is operating correctly -> answer C is notcorrect.+ This router has only 1 FastEthernet interface -> answer D is not correct.+ The “status” column of Fa0/0 is currently “up” so it is operating -> answer E is not correct.

QUESTION 41Refer to the exhibit:

A. Host E and host F use the same IP gateway address.B. Routed and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and host D.D. Router1 will not play a role in communications between host A and host D.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same

encapsulation type

Correct Answer: DFSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:

QUESTION 42Refer to the exhibit:

What commands must be configured on the 2950 switch and the router to allow communication betweenhost 1 and host 2? (Choose two)

A. Router(config)#interface fastethernet 0/0

Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shut down

B. Router(config)#interface fastethernet 0/0Router(config-if)#no shutdownRouter(config)#interface fastethernet 0/0.1Router(config-subif)#encapsulation dot1q 10Router(config-subif)#ip address 192.168.10.1 255.255.255.0Router(config-subif)#interface fastethernet 0/0.2Router(config-subif)#encapsulation dot1q 20Router(config-subif)#ip address 192.168.20.1 255.255.255.0

C. Router (config)#router eigrp 100Router(config-router)#network 192.168.10.0 Router(config-router)#network 192.168.20.0

D. Switch1(config)# vlan databaseSwitch1(config-vlan)# vtp domain XYZ Switch1(config-vlan)# vtp server

E. Switch1(config)# interface fastEthernet 0/1Switch1(config-if)# switchport mode trunk

F. Switch1(config)# interface vlan 1Switch1(config-if)# ip default-gateway 192.168.1.1

Correct Answer: BESection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:ExplanationThe two answers B and E list all the commands needed to configure interVLAN routing. Please notice thatCisco switch 2950, 2960 only support dot1Q trunking so we don’t need to specify which trunkingencapsulation to use in this case. For Cisco switches 3550 or above we have to use these commandsinstead:Switch3550(config-if)#switchport trunk encapsulation dot1qSwitch3550(config-if)#switchport mode trunkQuestion 3

QUESTION 43Refer to the exhibit:

C-router is to be used as a “router-on-a-stick” to route between the VLANs. All the interfaces have beenproperly configured and IP routing is operational. The hosts in the VLANs have been configured with theappropriate default gateway. What can be said about this configuration?

A. These commands need to be added to the configuration:C-router(config)# router eigrp 123 C-router(config-router)# network 172.19.0.0

B. No further routing configuration is required.C. These commands need to be added to the configuration:

C-router(config)# router ospf 1C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0

D. These commands need to be added to the configuration:C-router(config)# router ripC-router(config-router)# network 172.19.0.0

Correct Answer: BSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:

QUESTION 44Which two are advantages of static routing when compared to dynamic routing? (choose two)

A. Security increases because only the network administrator may change the routing tables. B. Configuration complexity decreases as network size increases.C. Routing updates are automatically sent to neighbors.D. Route summarization is computed automatically by the router.E. Routing traffic load is reduced when used in stub network links.F. An efficient algorithm is used to build routing tables using automatic updatesG. Routing tables adapt automatically to topology changes.

Correct Answer: AESection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

Static routing can only be configured for each route manually so it is more secure than dynamic routingwhich only needs to declare which networks to run -> A is correct.Also static route does not use any complex algorithm to find out the best path so no routing updates need tobe sent out -> reduce routing traffic load. Static routing is useful especially in stub network links.Note: Stub network (or stub router) is used to describe a network (or router) that does not have anyinformation about other networks except a default route. This type of network (or router) usually has onlyone connection to the outside.

QUESTION 45Which parameter would you tune to affect the selection of a static route as a backup, when a dynamicprotocol is also being used?

A. hop countB. administrative distanceC. link bandwidthD. link delayE. link cost

Correct Answer: BSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

By default a static route has the Administrative Distance (AD) of 1, which is always preferred to dynamicrouting protocols. In some cases we may want to use dynamic routing protocols and set static routes as abackup route when the “dynamic” routes fail -> we can increase the AD of that static route to a higher valuethan the AD of the dynamic routing protocols.

QUESTION 46

Which statement is true, as relates to classful or classless routing?

A. RIPV1 and OSPF are classless routing protocols.B. Classful routing protocols send the subnet mask in routing updates.C. Automatic summarization at classful boundaries can cause problems on discontigous networks.D. EIGRP and OSPF are classful routing protocols and summarize routes by default.

Correct Answer: CSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Discontiguous networks are networks that have subnets of a major network separated by a different majornetwork. Below is an example of discontiguous networks where subnets 10.10.1.0/24 and 10.10.2.0/24 areseparated by a 2.0.0.0/8 network.

If we configure automatic summarization at classful boundaries, users on network 10.10.1.0/24 cannotcommunicate with users on network 10.10.2.0/24.If you are not clear about automatic summarization please read the last part of this tutorial: http://www.9tut.com/eigrp-routing-protocol-tutorial.

QUESTION 47A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routersare configured with their default configurations. A ping from Host1 to Host2 fails, but the technician is ableto ping the S0/0 interface of R2 from Host1. The configurations of the hosts have been verified as correct.What is the cause of the problem?

A. The serial cable on R1 needs to be replaced.B. The interfaces on R2 are not configured properly.C. R1 has no route to the 192.168.1.128 network.D. The IP addressing scheme has overlapping subnetworks.E. The ip subnet-zero command must be configured on both routers.

Correct Answer: CSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

Host1 can ping the Serial interface of R2 because R1 has the network of 192.168.1.4/30 as directlyconnected route. But R1 does not know how to route to the network of Host2 (192.168.1.128/26) so R1 willdrop that ping without trying to send it out S0/0 interface. To make the ping work, we have to configure aroute pointing to that network (for example: ip route 192.168.1.128 255.255.255.192 s0/0 on R1).

QUESTION 48Refer to the exhibit. The Lakeside Company has the internetwork in the exhibit. The Administrator wouldlike to reduce the size of the routing table to the Central Router. Which partial routing table entry in theCentral router represents a route summary that represents the LANs in Phoenix but no additional subnets?

A. 10.0.0.0 /22 is subnetted, 1 subnetD 10.0.0.0 [90/20514560] via 10.2.0.2 6w0d, serial 0/1

B. 10.0.0.0 /28 is subnetted, 1 subnetD 10.2.0.0 [90/20514560] via 10.2.0.2 6w0d, serial 0/1

C. 10.0.0.0 /30 is subnetted, 1 subnetD 10.2.2.0 [90/20514560] via 10.2.0.2 6w0d, serial 0/1

D. 10.0.0.0 /22 is subnetted, 1 subnetD 10.4.0.0 [90/20514560] via 10.2.0.2 6w0d, serial 0/1

E. 10.0.0.0 /28 is subnetted, 1 subnetD 10.4.4.0 [90/20514560] via 10.2.0.2 6w0d, serial 0/

F. 10.0.0.0 /30 is subnetted, 1 subnetD 10.4.4.4 [90/20514560] via 10.2.0.2 6w0d, serial 0/1

Correct Answer: DSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

All the above networks can be summarized to 10.0.0.0 network but the question requires to “represent theLANs in Phoenix but no additional subnets” so we must summarized to 10.4.0.0 network. The Phoenixrouter has 4 subnets so we need to “move left” 2 bits of “/24″-> /22 is the best choice -> D is correct.

QUESTION 49Refer to the exhibit. How will the router handle a packet destined for 192.0.2.156?

A. The router will drop the packet.B. The router will return the packet to its source.C. The router will forward the packet via Serial2.D. The router will forward the packet via either Serial0 or Serial1

Correct Answer: CSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:ExplanationFrom the output we see a line “Gateway of last resort is 192.168.4.1 to network 0.0.0.0″. Gateway of lastresort refers to the next-hop router of a router’s current default route. Therefore all the traffic through thisrouter to destination networks not matching any other networks or subnets in the routing table will be sent to192.168.4.1 (which is on Serial2) -> packet destined for 192.0.2.156 (or an unknown destination) will beforwarded via Serial2.An weird thing in the output above is the missing of the asterisk mask (*) which represents for the candidatedefault route. To set the “Gateway of last resort is 192.168.4.1 to network 0.0.0.0″ as the output above wecan use these commands:ip route 0.0.0.0 0.0.0.0 192.168.4.1ip default-network 192.168.4.0But these commands will create an static routing in the routing table with an asterisk mask. Maybe theoutput shown above is missing that route.For more information about the command ip default-network please visit: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094374.shtml.

QUESTION 50Refer to the exhibit. RTA is configured with a basic configuration. The link between the two routers isoperational and no routing protocols are configured on either router. The line shown in the exhibit is thenadded to router RTA. Should interface Fa0/0 on router RTB shut down, what effect will the shutdown haveon router RTA?

A. A route to 172.16.14.0/24 will remain in the RTA routing table.B. A packet to host 172.16.14.225 will be dropped by router RTAC. Router RTA will send an ICMP packet to attempt to verify the route.D. Because router RTB will send a poison reverse packet to router RTA, RTA will remove the route.

Correct Answer: ASection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

Static routes remain in the routing table even if the specified gateway becomes unavailable. If the specifiedgateway becomes unavailable, you need to remove the static route from the routing table manually.However, static routes are removed from the routing table if the specified interface goes down, and arereinstated when the interface comes back up.Therefore the static route will only be removed from the routing table if the S0/0 interface on RTA isshutdown.(Reference: http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/route_static.html)

QUESTION 51Which command enables IPv6 forwarding on a Cisco router?

A. ipv6 localB. ipv6 hostC. ipv6 unicast-routingD. ipv6 neighbor

Correct Answer: CSection: VLAN, InterVLAN Routing/IP Routing, Trunki ng, & IPv6Explanation

Explanation/Reference:Explanation

An example of configuring RIPng (similar to RIPv2 but is used for IPv6) is shown below:Router(config)#ipv6 unicast-routing (Enables the forwarding of IPv6 unicast datagrams globally onthe router)Router(config)#interface fa0/0Router(config-if)#ipv6 rip 9tut enable (9tut is the process name of this RIPng)

QUESTION 52Which term describes a spanning-tree network that has all switch ports in either the blocking or forwardingstate?

http://www.gratisexam.com/

A. convergedB. redundantC. provisionedD. spanned

Correct Answer: ASection: STP & SecurityExplanation

Explanation/Reference:Explanation

Spanning Tree Protocol convergence (Layer 2 convergence) happens when bridges and switches havetransitioned to either the forwarding or blocking state. When layer 2 is converged, root bridge is elected andall port roles (Root,

QUESTION 53Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reasons thatinterface FastEthernet 0/10 is not the root port for VLAN 2?

A. This switch has more than one interface connected to the root network segment in VLAN 2.B. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree.C. This switch interface has a higher path cost to the root bridge than another in the topology.D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch.

Correct Answer: CSection: STP & SecurityExplanation

Explanation/Reference:

QUESTION 54Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segmentthat services the printers?

A. Switch1B. Switch2C. Switch3D. Switch4

Correct Answer: CSection: STP & SecurityExplanation

Explanation/Reference:Explanation

First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which isconnected directly to the Printers.Next, by comparing the MAC address of Switch 3 and Switch 4 we found that the MAC of Switch 3 issmaller. Therefore the interface connected to the Printers of Switch 3 will become designated interface andthe interface of Switch 4 will be blocked.(Please notice that Switch 1 will become the root bridge because of its lowest priority, not Switch 3)

QUESTION 55What is one benefit of PVST+?

A. PVST+ supports Layer 3 load balancing without loops.B. PVST+ reduces the CPU cycles for all the switches in the network.C. PVST+ allows the root switch location to be optimized per VLAN.D. PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.

Correct Answer: CSection: STP & SecurityExplanation

Explanation/Reference:Explanation

Per VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in thenetwork. It means a switch can be the root bridge of a VLAN while another switch can be the root bridge of

other VLANs in a common topology. For example, Switch 1 can be the root bridge for Voice data whileSwitch 2 can be the root bridge for Video data. If designed correctly, it can optimize the network traffic.

QUESTION 56Which port state is introduced by Rapid-PVST?

A. learningB. listeningC. discardingD. forwarding

Correct Answer: CSection: STP & SecurityExplanation

Explanation/Reference:Explanation

PVST+ is based on IEEE802.1D Spanning Tree Protocol (STP). But PVST+ has only 3 port states(discarding, learning and forwarding) while STP has 5 port states (blocking, listening, learning, forwardingand disabled). So discarding is a new port state in PVST+.

QUESTION 57Refer to the exhibit. What three actions will the switch take when a frame with an unknown source MACaddress arrives at the interface? (Select three)

A. Send an SNMP trap.B. Send a syslog message.C. Increment the Security Violation counter.D. Forward the traffic.E. Write the MAC address to the startup-config.F. Shut down the port.

Correct Answer: ABCSection: STP & SecurityExplanation

Explanation/Reference:Explanation

Notice that the Violation Mode is Restrict. In this mod, when the number of port secure MAC addressesreaches the maximum limit allowed on the port, packets with unknown source addresses are dropped. You

have to remove the secure mac-addresses below the maximum allowed number in order to learn a newMAC or allowing a host on the port. Also a SNMP trap is sent, a syslog message is logged in the syslogserver and the violation counter increases.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)Question

QUESTION 58Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secureend-to-end communications?

A. RSA B. L2TPC. IPsecD. PPTP

Correct Answer: CSection: STP & SecurityExplanation

Explanation/Reference:Explanation

One of the most widely deployed network security technologies today is IPsec over VPNs. It provides highlevels of security through encryption and authentication, protecting data from unauthorized access.Question 3

QUESTION 59Refer to the exhibit. Which of these correctly describes the results of port security violation of an unknownpacket?

A. port enabled; unknown packets dropped; no SNMP or syslog messagesB. port enabled; unknown packets dropped; SNMP or syslog messagesC. port disabled; no SNMP or syslog messagesD. port disabled; SNMP or syslog messages

Correct Answer: DSection: STP & SecurityExplanation

Explanation/Reference:Explanation

The default violation mode is shutdown, which will shutdown the port when the maximum number of secureMAC addresses is exceeded. It also sends an SNMP trap, logs a syslog message, and increments theviolation counter.The three violation modes are listed below:

+protect – When the number of secure MAC addresses reaches the limit allowed on the port, packets

with unknown source addresses are dropped until you remove a sufficient number of secure MACaddresses or increase the number of maximum allowable addresses. You are not notified that a securityviolation has occurred.

+restrict – When the number of secure MAC addresses reaches the limit allowed on the port, packetswith unknown source addresses are dropped until you remove a sufficient number of secure MACaddresses or increase the number of maximum allowable addresses. In this mode, you are notified that asecurity violation has occurred. Specifically, an SNMP trap is sent, a syslog message is logged, and theviolation counter increments.

+shutdown – In this mode, a port security violation causes the interface to immediately become error-disabled, and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and incrementsthe violation counter. When a secure port is in the error-disabled state, you can bring it out of this state byentering the errdisable recovery cause psecure-violation global configuration command, oryou can manually re-enable it by entering the shutdown and no shutdown interface configurationcommands. This is the default mode.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)Question

QUESTION 60The following configuration is applied to a Layer 2 Switch:

interface fastethernet 0/4 switchport mode access switchport port-securityswitchport port-security mac-address 0000.1111.1111 switchport port-security maximum 2

What is the result of the above configuration being applied to the switch. (Choose 2)

A. A host with a mac address of 0000.1111.1111 and up to two other hosts can connect to FastEthernet0/4 simultaneously

B. A host with a mac address of 0000.1111.1111 and one other host can connect to FastEthernet 0/4simultaneously

C. Violating addresses are dropped and no record of the violation is keptD. The switch can send an SNMP message to the network management stationE. The port is effectively shutdown

Correct Answer: BDSection: STP & SecurityExplanation

Explanation/Reference:Notes from Multiple post on 9TUT

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::Also please note that for Question 4 it doesn’t ask you to choose how many. So you have to choose two. Answer B and D is right. I selected two in my exams and i have passed with 1000 marks so i am pretty sureyou have to choose two.:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

QUESTION 61What can be done to secure the virtual terminal interfaces on a router? (Choose two)

A. Administratively shut down the interface.B. Physically secure the interfaceC. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Correct Answer: DESection: STP & SecurityExplanation

Explanation/Reference:

QUESTION 62

R1 routing commands:ip route 0.0.0.0 0.0.0.0 serial0/0 router ospf 1network 172.16.100.0 0.0.0.3 area 0 network 172.16.100.64 0.0.0.63 area 0 network 172.16.100.128 0.0.0.31 area 0 default-information originateAssuming that all router interfaces are operational and correctly configured, that OSPF has been correctlyconfigured on router R2, how will the default route configured on R1 affect the operation of R2?

A. Any packet destined for a network that is not directly connected to router R1 will be droppedB. Any packet destined for a network that is not referenced in the routing table of router R2 will be directed

to R1. R1 will then send that packet back to R2 and a routing loop will occur.C. Any packet destined for a network that is not directly connected to router R2 will be dropped

immediately.D. Any packet destined for a network that is not directly connected to router R2 will be dropped

immediately because of the lack of a gateway on R1.

Correct Answer: BSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

First, notice that the more-specific routes will always be favored over less-specific routes regardless of theadministrative distance set for a protocol. In this case, because we use OSPF for three networks(172.16.100.0 0.0.0.3, 172.16.100.64 0.0.0.63, 172.16.100.128 0.0.0.31) so the packets destined for thesenetworks will not be affected by the default route.The default route configured on R1 “ip route 0.0.0.0 0.0.0.0 serial0/0″ will send any packet whosedestination network is not referenced in the routing table of router R1 to R2, it doesn’t drop anything soanswers A, B and C are not correct. D is not correct too because these routes are declared in R1 and thequestion says that “OSPF has been correctly configured on router R2″, so network directly connected to

router R2 can communicate with those three subnetworks.As said above, the default route configured on R1 will send any packet destined for a network that is notreferenced in its routing table to R2; R2 in turn sends it to R1 because it is the only way and a routing loopwill occur.

QUESTION 63What information does a router running a link-state protocol use to build and maintain its topologicaldatabase? (Choose two)

A. hello packetsB. SAP messages sent by other routersC. LSAs from other routersD. beacons received on point-to-point linksE. routing tables received from other link-state routersF. TTL packets from designated routers

Correct Answer: ACSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

Link-state protocol uses hello packets to discover neighbors and establish adjacencies. After that, therouters begin sending out LSAs to every neighbor (each received LSA is copied and forwarded to everyneighbor except the one that sent the LSA)

QUESTION 64Which two statements describe the process identifier that is used in the command to configure OSPF on arouter? (Choose two)

Router(config)# router ospf 1

A. All OSPF routers in an area must have the same process IDB. Only one process number can be used on the same routerC. Different process identifiers can be used to run multiple OSPF processesD. The process number can be any number from 1 to 65,535E. Hello packets are sent to each neighbor to determine the processor identifier

Correct Answer: CDSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:

QUESTION 65at is the default administrative distance of OSPF?

A. 90B. 100C. 110D. 120

Correct Answer: CSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:The Administrative Distances (AD) of popular routing protocols are listed below:

QUESTION 66Refer to the exhibit. The network is converged. After link-state advertisements are received from Router_A,what information will Router_E contain in its routing table for the subnets 208.149.23.64 and208.149.23.96?

A. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, FastEthernet0/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0

B. 208.149.23.64[110/1] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/3] via 190.173.23.10, 00:00:00:16, FastEthernet0/0/0

C. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0 208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/00

D. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0

Correct Answer: ASection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A through FastEthernet

interface. The interface cost is calculated with the formula 108 / Bandwidth. For FastEthernet it is 108 / 100Mbps = 108 / 100,000,000 = 1. Therefore the cost is 12 (learned from Router_A) + 1 = 13 for bothsubnets -> B is not correct.The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps = 64; T3 cost =108 / 45 Mbps = 2) so surely OSPF will choose the path through T3 link -> Router_E will choose the pathfrom Router_A through FastEthernet0/0, not Serial1/0 -> C & D are not correct.In fact, we can quickly eliminate answers B, C and D because they contain at least one subnet learned fromSerial1/0 -> they are surely incorrect.

QUESTION 67What are three characteristics of the OSPF routing protocol? (Choose three)

A. It converges quickly.B. OSPF is a classful routing protocol.C. It uses cost to determine the best routeD. It uses the DUAL algorithm to determine the best route.E. OSPF routers send the complete routing table to all directly attached routers.F. OSPF routers discover neighbors before exchanging routing information

Correct Answer: ACFSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

OSPF is a link-state routing protocol so it converges more quickly than distance-vector protocol. OSPFuses cost to determine the best route. The popular formula to calculate OSPF cost is: cost = 108 /Bandwidth [ in kbps] (in fact the formal formula is: cost = reference bandwidth / configured bandwidth ofinterface in kbps. On Cisco routers, the reference bandwidth defaults to 100000 kbps)

QUESTION 68

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic.There is concern that a lack of router resources is impeding internetwork performance.

As part of examining the router resources the OSPF DRs need to be known.

All the router OSPF priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as DR? (Choose two)

A. Corp-1B. Corp-2C. Corp-3D. Corp-4E. Branch-1F. Branch-2

Correct Answer: Section: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment willhave a DR so we have 2 DRs.To select which router will become DR they will compare their router-IDs. The router with highest (best)router-ID will become DR. The router-ID is chosen in the order below:+ The highest IP address assigned to a loopback (logical) interface.+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces willbe chosen.In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IPaddresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20)have highest “active” IP addresses so they will become DRs.

QUESTION 69Which parameter or parameters are used to calculate OSPF cost in Cisco routers?

A. Bandwidth, Delay and MTUB. BandwidthC. Bandwidth and MTUD. Bandwidth, MTU, Reliability, Delay and Load

Correct Answer: BSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:ExplanationThe well-known formula to calculate OSPF cost isCost = 108 / Bandwidthso B is the correct answer.

QUESTION 70Refer to the exhibit:

Assume that all of the router interfaces are operational and configured correctly. How will router R2 beaffected by the configuration of R1 that is shown in the exhibit?

A. Router R2 will not form a neighbor relationship with R1B. Router R2 will obtain a full routing table, including a default route, from R1C. R2 will obtain OSPF updates from R1, but will not obtain a default route from R1D. R2 will not have a route for the directly connected serial network, but all other directly connected

networks will be present, as well as the two networks connected to R1.

Correct Answer: BSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

The default-information originate command advertises a default route to other routers, telling something like“please send me your unknown traffic”. So in this case, besides a full routing table, R2 will also receive adefault route from R1 -> B is correct.Note: But in this question, the static route should be “ip route 0.0.0.0 0.0.0.0 serial0/1″ (not serial0/0), thatmay cause a routing loop.

QUESTION 71Which commands are required to properly configure a router to run OSPF and to add network192.168.16.0/24 to OSPF area 0? (Choose two

A. Router(config)# router ospf 0B. Router(config)# router ospf 1C. Router(config)# router ospf area 0D. Router(config-router)# network 192.168.16.0 0.0.0.255 0E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0F. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0

Correct Answer: BESection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> B is correct but A isnot correct.

QUESTION 72Which command is used to display the collection of OSPF link states?

A. show ip ospf link-stateB. show ip ospf Isa databaseC. ow ip ospf neighbors D. show ip ospf database

Correct Answer: DSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:ExplanationThe output of the “show ip ospf database” is shown below:

From the output above we can see LSA Type 1 (Router Link State) and LSA Type 3 (Summary Net LinkState).

QUESTION 73What are two drawbacks of implementing a link-state routing protocol? (Choose two)

A. the sequencing and acknowledgment of link-state packets B. the requirement for a hierarchical IP addressing scheme for optimal functionalityC. the high volume of link-state advertisements in a converged networkD. the high demand on router resources to run the link-state routing algorithm E. the large size of the topology table listing all advertised routes in the converged network

Correct Answer: BDSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:

QUESTION 74

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic

There is concern that a lack of router resources is impeding internetwork performance.

As part of examining the router resources the OSPF DRs need to be known.

All the router OSPF priorities are at the default and the router IDs are shown with each router.

Which routers are likely to have been elected as DR? (Choose two)

A. Corp-1B. Corp-2C. Corp-3D. Corp-4E. Branch-1F. Branch-2

Correct Answer: DFSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

There are 2 segments on the topology above which are separated by Corp-3 router. Each segment willhave a DR so we have 2 DRs.To select which router will become DR they will compare their router-IDs. The router with highest (best)router-ID will become DR. The router-ID is chosen in the order below:+ The highest IP address assigned to a loopback (logical) interface.+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces willbe chosen.In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IPaddresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) & Branch-2 (10.2.20.20)have highest “active” IP addresses so they will become DRs.

QUESTION 75What is the default maximum number of equal-cost paths that can be placed into the routing of a CiscoOSPF router?

A. 16B. 2C. unlimitedD. 4

Correct Answer: DSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

The default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router is 4. Wecan change this default value by using “maximum-paths” command:Router(config-router)#maximum-paths 2Note: Cisco routers support up to 6 equal-cost paths

QUESTION 76

Given the output for this command, if the router ID has not been manually set, what router ID will OSPF usefor this router?

A. 10.1.1.2B. 10.154.154.1C. 172.16.5.1 D. 192.168.5.3

Correct Answer: CSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the routerID.

QUESTION 77Refer to the exhibit. Which two statements are true about the loopback address that is configured onRouterB? (Choose two)

A. It ensures that data will be forwarded by RouterBB. It provides stability for the OSPF process on RouterBC. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN

Correct Answer: BCSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:A loopback interface never comes down even if the link is broken so it provides stability for the OSPFprocess (for example we use that loopback interface as the router-id) -> B is correct.The router-ID is chosen in the order below:+ The highest IP address assigned to a loopback (logical) interface.+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces willbe chosen.-> The loopback interface will be chosen as the router ID of RouterB -> C is correct.

QUESTION 78Refer to the exhibit. The network associate is configuring OSPF on the Core router. All the connections tothe branches should be participating in OSPF. The link to the ISP should NOT participate in OSPF andshould only be advertised as the default route. What set of commands will properly configure the Corerouter?

A. Core(config-router)#default-information originateCore(config-router)#network 10.0.0.0 0.255.255.255 area 0 Core(config-router)#exit Core(config)#ip route 0.0.0.0 0.0.0.0 10.10.2.14

B. Core(config-router)#default-information originateCore(config-router)#network 10.10.2.13 0.0.0.242 area 0 Core(config-router)#exit Core(config)#ip route 0.0.0.0 0.0.0.0 10.10.2.14

C. Core(config-router)#default-information originateCore(config-router)#network 10.10.2.16 0.0.0.15 area 0 Core(config-router)#exit Core(config)#ip route 0.0.0.0 0.0.0.0 10.10.2.14

D. Core(config-router)#default-information originateCore(config-router)#network 10.10.2.32 0.0.0.31 area 0Core(config-router)#exitCore(config)#ip route 0.0.0.0 0.0.0.0 10.10.2.14

Correct Answer: CSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

The question states that the link to ISP should not participate in OSPF -> answers A, B are not correct.In answer D, the “network 10.10.2.32 0.0.0.31 area 0″ does not cover the IP address of S0/0.103(10.10.2.21) -> D is not correct.The default-information originate command advertises a default route to other routers, telling something like“please send me your unknown traffic”. So in this case, besides a full routing table, other routers will alsoreceive a default route from Core router.But please notice that Core router needs to have a default route in its routing table. That is why thecommand “ip route 0.0.0.0 0.0.0.0 10.10.2.14″ is added to Core router. By adding the “always” (after“default-information originate” command) the default route will be advertised even if there is no default routein the routing table of router Core.

QUESTION 79

A network associate has configured OSPF with the command: City(config-router)# network 192.168.12.64 0.0.0.63 area 0

After completing the configuration, the associate discovers that not all the interfaces are participating inOSPF.Which three of the interfaces shown in the exhibit will participate in OSPF according to this configurationstatement? (Choose three)

A. FastEthernet0/0B. FastEthernet0/1C. Serial0/0D. Serial0/1.102E. Serial0/1.103F. Serial0/1.104

Correct Answer: BCDSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

The “network 192.168.12.64 0.0.0.63″ equals to network 192.168.12.64/26. This network has:+ Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000)+ Network address: 192.168.12.64+ Broadcast address: 192.168.12.127Therefore all interface in the range of this network will join OSPF -> B C D are correct.

QUESTION 80What does a router do if it has no EIGRP feasible successor route to a destination network and thesuccessor route to that destination network is in active status?

A. It routes all traffic that is addressed to the destination network to the interface indicated in the routingtable.

B. It sends a copy of its neighbor table to all adjacent routers.C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the

destination network.D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

Correct Answer: CSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

When a router has no EIGRP feasible successor and the successor route to that destination network is inactive status (the successor route is down, for example) a route recomputation occurs. A routerecomputation commences with a router sending a query packet to all neighbors. Neighboring routers caneither reply if they have feasible successors for the destination or optionally return a query indicating thatthey are performing a route recomputation. While in Active state, a router cannot change the next-hopneighbor it is using to forward packets. Once all replies are received for a given query, the destination cantransition to Passive state and a new successor can be selected.

(Reference: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml#rout_states)

QUESTION 81Which statements are true about EIGRP successor routes? (Choose two)

A. A successor route is used by EIGRP to forward traffic to a destinationB. Successor routes are saved in the topology table to be used if the primary route fails.C. Successor routes are flagged as ‘active* in the routing table.D. A successor route may be backed up by a feasible successor route.E. Successor routes are stored in the neighbor table following the discovery process

Correct Answer: AD

Section: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:

QUESTION 82Which type of EIGRP route entry describes a feasible successor

A. a backup route, stored in the routing tableB. primary route, stored in the routing tableC. a backup route, stored in the topology tableD. a primary route, stored in the topology table

Correct Answer: Section: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

Feasible successor is a route whose Advertised Distance is less than the Feasible Distance of the currentbest path. A feasible successor is a backup route, which is not stored in the routing table but stored in thetopology table.

QUESTION 83Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?

A. The router will forward packets from R3 to R2 to R1 B. The router will forward packets from R3 to R1C. The router will forward packets from R3 to R1 to R2

D. The router will forward packets from R3 to R2 to R1 AND from R3 to R1

Correct Answer: DSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

From the routing table we learn that network 192.168.10.0/30 is learned via 2 equal-cost paths(192.168.10.9 &192.168.10.5) -> traffic to this network will be load-balancing.

QUESTION 84Refer to the exhibit. Given the output from the show ip eigrp topology command, which router is thefeasible successor?

A. 10.1.0.3 (Serial0), from 10.1.0.3, Send flag is 0x0 Composite metric is (46866176/46354176), Route is Internal Vector metric: Minimum bandwidth is 56 Kbit Total delay is 45000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 2

B. 10.0.0.2 (Serial0.1), from 10.0.0.2, Send flag is 0x0 Composite metric is (53973248/128256), Route is Internal Vector metric: Minimum bandwidth is 48 Kbit Total delay is 25000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 1

C. 10.1.0.1 (Serial0), from 10.1.0.1, Send flag is 0x0 Composite metric is (46152000/41640000), Route is Internal Vector metric: Minimum bandwidth is 64 Kbit Total delay is 45000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 2

D. 10.1.1.1 (SerialO.1), from 10.1.1.1, Send flag is 0x0 Composite metric is (46763776/46251776), Route is External Vector metric: Minimum bandwidth is 56 Kbit Total delay is 41000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 2

Correct Answer: BSection: OSPF and EIGRP QuestionsExplanation

Explanation/Reference:Explanation

First we must notice that all the 4 answers are parts of the “show ip eigrp topology” output. As you can see,there are 2 parameters in the form of [FD/AD] in each answer. For example answer C has[46152000/41640000], it means that the FD of that route is 46152000 while the AD is 41640000.To become a feasible successor, a router must meet the feasibility condition:“To qualify as a feasible successor, a router must h ave an AD less than the FD ofthe current successor route “In four answer above, only answer B has an AD of 128256 and it is smaller than the FD of the currentsuccessor route (41152000) so it is the feasible successor -> B is correct.

QUESTION 85Two offices are displayed below:

You work as a network technician at 9tut. Study the exhibit carefully. The company has a main office in LosAngeles and a satellite office in Boston. The offices are connected through two Cisco routers. The Bostonsatellite office is connected through the R2 router s0 interface to the Los Angeles office R1 router s1interface. R1 has two local area networks. Boston users receive Internet access through the R1 router.Drag the boxes on the top to complete the goal on the left.

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:1) Prevent all users from outside the enterprise netwo rk from accessing the server:permit ip 192.168.35.0 0.0 0.255 host 192.168.35.662) Block a user from R1 e0 network from accessing the server: deny ip 192.168.35.550.0.0.0 host 192.168.35.663) Block only the users attached to the e0 interface o f the R2 router from accessingthe server: deny ip 192.168.35.16 0.0.0.15 host 192.168.35.66Question 2

QUESTION 86You are configuring the localhost/nitunetwp office. In particular the host C, with the IP address192.168.125.34/27, needs to be configured so that it cannot access hosts outside its own subnet. Youdecide to use the following command:access-list 100 deny protocol address mask anyYou are required to fill in the protocol , address , and mask in this command using the choices below:

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:ExplanationThe syntax of extended access-list:access-list 100-199 {permit|deny} {ip|tcp|udp|icmp} source source-mask [lt|gt|eq|neq] [source-port]destination dest-mask [lt|gt|eq|neq] [dest-port]By telling the router to drop traffic originated from host C (source), we can guarantee that host C can justcommunicate with hosts inside its own subnet (because this kind of traffic does not need to pass the routerand will not be prevented).

QUESTION 87Exhibit:

Study the exhibit carefully. You need to match output lines in the exhibit with the proper OSI layer. One linewill not be used.

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:Data Link Layer: + Encapsulation PPP+ Line protocol is upPhysical Layer: + Serial 1/0 is up+ Hardware is CD2430 in sync mode

QUESTION 88You work as a network administrator for your corporation, your boss is interested in switch ports. Match theoptions to the appropriate switch ports

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Access Port:+ carries traffic for a single VLAN+ uses a straight-through cable to connect a device+ connects an end-user workstation to a switchTrunk Port:+ carries traffic for a multiple VLAN+ Facilitates interVLAN communications when connected to a Layer 3 device+ uses 802.1q to identify traffic from different VLANs

QUESTION 89Below is the configuration of the R1 router:

R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1R1(config)# ip route 10.1.0.0 255.255.255.0 192.168.2.2

R1(config)# ip route 10.1.0.0 255.255.0.0 192.168.3.3

Drag each destination IP address on the top to its correct next hop address at the bottom.

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:Next hop 192.168.1.1: + 10.2.1.3+ 10.6.8.4Next hop 192.168.2.2:+ 10.1.0.14+ 10.1.0.123Next hop 192.168.3.3: + 10.1.1.10+ 10.1.4.6

QUESTION 90Match the categories with the appropriate router output lines.

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:1) Port operational : Serial0/1 is up, line protocol is up2) Layer 2 problem: Serial0/1 is up, line protocol is down3) Layer 1 problem: Serial0/1 is down, line protocol is down4) Port disabled: Serial0/1 is administratively down, line protocol is downExplanation:A simple way to find out which layer is having problem is to remember this rule: “the first statement is forLayer 1, the last statement is for Layer 2 and if Layer 1 is down then surely Layer 2 will be down too”, soyou have to check Layer 1 before checking Layer 2. For example, from the output “Serial0/1 is up, lineprotocol is down” we know that it is a layer 2 problem because the first statement (Serial0/1 is up) is goodwhile the last statement (line protocol is down) is bad. For the statement “Serial0/1 is down, line protocol isdown”, both layers are down so the problem belongs to Layer 1.

There is only one special case with the statement “…. is administratively down, line protocol is down”. Inthis case, we know that the port is currently disabled and shut down by the administrators.

QUESTION 91The above provides some descriptions, while the below provides some routing protocols. Drag the aboveitems to the proper locations.

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:EIGRP:+ has a default administrative distance of 90+ is vendor-specificOSPF:+ uses cost as its metric+ elects a DR on each multiaccess network

QUESTION 92Drag the term on the left to its definition on the right (not all options are used)

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:+ poison reverse : A router learns from its neighbor that a route is down and the router sends an updateback to the neighbor with an infinite metric to that route+ LSA : The packets flooded when a topology change occurs, causing network routers to update theirtopological databases and recalculate routes+ split horizon : This prevents sending information about a routeback out the same interface thatoriginally learned about the route+ holddown timer : For a given period, this causes the router to ignore any updates with poorer metricsto a lost network

QUESTION 93Drag and Drop

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:+ holddown timer: prevents a router from improperly reinstating a route from a regular routing update+ split horizon: prevents information about a route from being sent in the direction from which the route waslearned+ defining a maximum: prevents invalid updates from looping the internetwork indefinitely+ route poisoning: causes a routing protocol to advertise an infinite metric for a failed route+ triggered update: decreases convergence time by immediately sending route information in response to atopology change

QUESTION 94Drag item on left to match item on right

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer:+ Point to Point Advantage: Quality+ Point to Point Disadvantage: Limited Flexibility+ Circuit Switched Advantage: Cost+ Circuit Switched Disadvantage: Low speed+ Packet Switch Advantage: Efficient+ Packet Switch Disadvantage: More Complex

QUESTION 95Place the Spanning-Tree Protocol port state on its functions (not all options on the left are used)

Select and Place:

Correct Answer:

Section: Drag and DropExplanation

Explanation/Reference:Answer:+ Populating the MAC address table but not forwarding data frames: LEARNING+ Sending and receiving data frames: FORWARDING+ Preparing to forward data frames without populating the MAC address table: LISTENING+ Preventing the use of looped paths: BLOCKING

QUESTION 96As a CCNA candidate, you need to know EIGRP very well.Which tables of EIGRP route information are held in RAM and maintained through the use of hello andupdate packets?Please choose two appropriate tables and drag the items to the proper locations.

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer:Neighbor TableTopology Table

QUESTION 97Frame Relay Sim:type show frame-relay map and show running-config to get its configuration.

What destination Layer 2 address will be used in the frame header containing a packet for host 172.30.0.4?

A. 704B. 196C. 702D. 344

Correct Answer: CSection: LAB Sim's EIGRP-Frame Relay - OSFPExplanation

Explanation/Reference:Explanation

To see what DLCI is used for the destination 172.30.0.4 we can check the output of “show frame-relaymap” command:Serial1/0 (up): ip 172.30.0.4 dlci 702 … -> The DLCI in this case is 702.

QUESTION 98Frame Relay Sim:type show frame-relay map and show running-config to get its configuration.

A static map to the S-AMER location is required. Which command should be used to create this map?

A. frame-relay map ip 172.30.0.3 704 broadcastB. frame-relay map ip 172.30.0.3 196 broadcastC. frame-relay map ip 172.30.0.3 702 broadcastD. frame-relay map ip 172.30.0.3 344 broadcast

Correct Answer: BSection: LAB Sim's EIGRP-Frame Relay - OSFPExplanation

Explanation/Reference:ExplanationFrom the output of “show frame-relay map” command, we learn the IP address of S-AMER is 172.30.0.3and the DLCI used to reach there is 196 so B is the correct answer.

QUESTION 99Frame Relay Sim:type show frame-relay map and show running-config to get its configuration.

Which connection uses the default encapsulation for serial interfaces on Cisco routers?

A. The serial connection to the MidEast branch office B. The serial connection to the DeepSouth branch officeC. The serial connection to the NorthCentral branch officeD. The serial connection to the Multinational Core

Correct Answer: ASection: LAB Sim's EIGRP-Frame Relay - OSFPExplanation

Explanation/Reference:From the output of “show running-config” command we learn that interface S1/1 (connected to MidEast)does not declare any encapsulation -> It uses the default encapsulation HDLC.Note: High-Level Data Link Protocol (HDLC) is the default WAN encapsulation for Cisco routers.

QUESTION 100Frame Relay Sim:type show frame-relay map and show running-config to get its configuration.

If required, what password should be configured on the router in the MidEast branch office to allow aconnection to be established with the Dubai router?

A. No password is requiredB. EnableC. ScrD. TelnetE. Console

Correct Answer: Section: LAB Sim's EIGRP-Frame Relay - OSFPExplanation

Explanation/Reference:This question is not clear for a long time but now maybe the trick was solved. What Cisco wants to ask isthe word used as password, not the type of connection, so in the exam you might see some strange wordsfor answers like “En8ble”, “T1net”, “C0nsole”. All you have to do is to use the command “show running-config” as wx4 mentioned below to find the answer.wx4 commented:Q4: if password required which?in my example it was connection to North!How to figure out which pw is required?#show running-config1. check the interface to the router you need connection to. If there is “ppp authentication” you need apassword!2. you will find the password on the top of your running-config outputcheck the area:username North password c0nsoleusername xxxxx yyyyy

username…in my case it was c0nsole, in your case it can be no password needed or a different password.If you are still not clear, please read anton‘s comment:A big question I noticed here was about the FR Lab regarding the password. You have to perform a showrunning-config and look for USERNAME and PASSWORD.i.e.username South_Router password c0nsol3username North_Router password t31netObviously this has to be en PPP encapsulation, if asked for a posible password for SOUTH_ROUTER youpick c0nsol3, and for NORTH_ROUTER you pick t31net. If you’re running HDLC, i would pick “no passwordis required

http://www.gratisexam.com/


Recommended