Cisco Certified Network Associate (CCNA ) Version 12.0

Size: px
Start display at page:

Download "Cisco Certified Network Associate (CCNA ) Version 12.0"

Transcription

1 Cisco Certified Network Associate (CCNA ) Version 12.0

2 Important Note Please Read Carefully Study Tips This product will provide you questions and answers along with detailed explanations carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything. Further Material For this test TestKing provides: * Online Testing. Practice the questions in an exam environment. Try a demo: For this test TestKing plans to provide: * Study Guide. Concepts and labs. Provides a foundation of knowledge. Latest Version We are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. You should check your member zone at TestKing an update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1. Go to 2. Click on Member zone/log in 3. The latest versions of all purchased products are downloadable from here. Just click the links. For most updates, it is enough just to print the new questions at the end of the new version, not the whole document. Feedback Feedback on specific questions should be send to feedback@testking.com. You should state: Exam number and version, question number, and login ID. Our experts will answer your mail promptly. Copyright Each pdf file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular pdf file is being distributed by you, TestKing reserves the right to take legal action against you according to the International Copyright Laws

3 Note: Section A contains 107 questions. Section B contains 138 questions. Section C contains 71 questions. The total number of questions is 316. Each section starts with QUESTION NO: 1. There are no missing questions. QUESTION NO: 1 You can configure PPP on which of the following types of physical interfaces? (Choose two) A. Ethernet B. Token Ring C. Synchronous Serial D. Asynchronous Serial Answers: C, D. Point-to-Point Protocol (PPP) provides router-to-router and host-network connections over synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols, including IP and IPX. It also has built in security features such PAP (Password Authentication Protocol) and CHAP (Challenged Handshake Authentication Protocol). Incorrect Answers: A: Ethernet is a LAN (Local Area Network) architecture. It uses either a star or a bus topology to exchange data. B: Token Ring is a type of network in which the computers are arranged in a circular fashion. These computers pass a token between each other. This token is used to communicate data. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 373. QUESTION NO: 2 Frame Tagging is used to interconnect multiple switches and to maintain VLAN information as traffic goes between switches. Which of the following statements about the Frame Tagging are true? (Choose two) A. A Filtering table is developed for each switch. B. Frame Tagging defines a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarding between switches. D. Frame Tagging is technique that examines particular information about each frame based on userdefined offsets. Answer: B, C

4 Frame tagging or frame identification uniquely assigns a user-defined ID to each frame. This is sometimes referred to as VLAN ID. Cisco created frame tagging to be used when an Ethernet frame traverses a trunked link. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 3 Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What is the default encapsulation type for Frame Relay on a Cisco router? A. HDLC B. PPP C. IETF D. Cisco E. ANSI Answer: D. Cisco is the default encapsulation type for Frame Relay on a Cisco router. Note: For a router to operate in a Frame Relay network the serial interface must be configured for Frame Relay Encapsulations. There are two types of Frame Relay encapsulation types: Cisco and IETF. When you are connecting to a non Cisco router the frame relay encapsulation type is IETF. Incorrect Answers A. HDLC stands for High level Data Link Control. This is the encapsulation type on synchronous serial links. B. Point to Point Protocol (PPP). This provides for host to network and router to router connections over synchronous and asynchronous circuits. C. IETF should be used in this scenario. However, the default Frame Relay encapsulation type on Cisco routers is Cisco. E. Cisco routers support three types of LMIs: Cisco, ANSI and Q933a. This question is looking for the default encapsulation type. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages , 416, and QUESTION NO: 4-4 -

5 The IP address is a class B address. What is the range of binary values for the first octet in this address class? A B C D E Answer: C Class B addresses have a range of One of these numbers would appear in the first octet of a Class B address. 128 and 191 are converted to binary below: Therefore the first octet converted to binary is Incorrect Answers A: The range, , does not define an address class. B: The range, 0-191, does not define an address class. D: The range, , does not define an address class. E: The range, , does not define an address class. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 5 TCP is a connection-oriented protocol. An advantage of operating in a connection-oriented environment is that a connection is established between both ends before the transfer of information can begin. What is a disadvantage of using a connection-oriented protocol such as TCP? A. Packet acknowledgement may add overhead. B. Packets are not tagged with sequence numbers. C. Loss or duplication of data packets is more likely to occur. D. The application layer must assume responsibility for correct sequencing of the data packets. Answer: A

6 One of the benefits of a connection-orientated protocol is that there is a guarantee of delivery of data. This guarantee is provided as the two communicating exchange PDUs during transmission and if an acknowledgement is not received then the data is retransmitted. As can be imagined this exchange of PDUs can cause an increase in overhead. Incorrect Answers: B: Sequence numbers are added to insure correct order C: Packet loss, duplication, and ordering are handled by connection-oriented protocols. D: The transport layer (such as TCP) handles sequencing. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 6 Switches have three primary modes to handle frame switching. Which one of these modes looks at the destination address and then immediately forwards the frame to the destination? A. CSMA/CD B. FULL DUPLEX C. CUT THROUGH D. HALF DUPLEX E. FRAGMENTATION F. STORE AND FORWARD Answer: C. In cut-through mode, the switch checks the destination address (DA) as soon as the header is received and immediately begins forwarding the frame. Depending on the network transport protocol being used (connection or connectionless orientate), there is a significant decrease in latency from input port to output port. The delay in cut-through switching remains constant regardless of the size of the frame, because this switching mode starts to forward the frame as soon as the switch reads the DA. Incorrect Answers: A: CSMA/CD is not a method of transporting frames. Rather it is a set of rules that are used to determine how network devices will respond to two different devices attempting to communicate on a data channel at the same time. B: Full duplex refers to how two switches communicate with each other. In this case, there is a transmission of data in two directions at the same time. D: Half duplex refers to how two switches communicate with each other. With half duplex the communication can only be in one direction and if not a collision will occur. E: This is not a method of frame communication. F: In store and forward the entire frame must first be received before it can be forwarded on

7 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 7 Which of the following are Application layer protocols that use TCP/IP? (Choose three.) A. ARP B. HTTP C. SMTP D. FTP E. ICMP Answer: B, C, D There are a number of TCP/IP application layer protocols. The common TCP/IP application layer protocols include: FTP, Telnet, SMTP, and HTTP. Incorrect Answers: A. ARP operates at the Internetwork layer of the TCP/IP protocol stack. E. ICMP operates at the Internetwork layer of the TCP/IP protocol stack. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 8 Two types of frame tagging are ISL and 802.lQ. What is the purpose of Frame Tagging? A. They provide best path determination. B. They allow the exchange of filtering tables. C. They specify different implementation of the Spanning-Tree Protocol. D. They provide inter-switch VLAN communication. Answer: D - 7 -

8 The purpose of frame tagging (ISL tagging) is to interconnect multiple switches and to keep VLAN information as it goes through various switches. Incorrect Answers: A, B, and C. This are not the purposed for frame tagging. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 9 You company has decided to use RIP version 1 as the routing on a Cisco router. What is the command to enable rip as the routing protocol on the company s router? Answer: Router rip The key characteristics of RIP include: it is a distance vector protocol, hop count is the metric used for path selection, it maximum allowable hop count is 15, it broadcasts it entire routing table every 30 seconds by default and it can be load balanced as many as six equal cost paths (4 paths are the default). To configure RIP not only does the router rip command need to be inputted but also it must be followed by the network command. The network command must be issued for each directly connected network. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 10 Your company has decided to use IP RIP version 1 as the routing protocol. Which of the following are the commands you can use to configure IP RIP version 1 on your router? A. Router RIP network network B. Router RIP network network C. Router RIP network network D. Router RIP network Network

9 Answer: B. To enable RIP version 1 not only does the router rip command need to be used but also it must be followed by the network command. The network command must be issued for each directly connected network. The network command must be followed by a valid network address. Incorrect Answers: A: Is this series of commands the network is not a valid command. C: If 4 networks are directly connected they must have their own network command. D: There is no need to include a subnet mask with a network command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 11 Spanning-Tree was originally developed by DEC. What is the reason Spanning-Tree is used in a switched LAN? A. To provide a mechanism for network monitoring in switched environments. B. To prevent routing loops in networks with redundant paths. C. To prevent routing switching loops in networks with redundant switched paths. D. To manage, the addition, deletion, and naming of VLANs across multiple switches. E. To segment a network into multiple collision domains. Answer: B. The purpose of the Spanning Tree Protocol (STP) is to provide for redundant paths within a switched environment while ensuring that there is a loop free network. This is done as the redundant ports are blocked. Incorrect Answers: A. STP does not provide mechanism to monitor a switched network. C. Loops are not referred to as routing switching loops. D. STP is not used for VLAN management. E. Switches create multiple collisions domains and not STP. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO:

10 Switches have three primary modes to handle frame switching. Which two statements about the store and forward switching method are true? (Choose two) A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before beginning to forward it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the frame immediately. Answer B, C. In store and forward mode, the switch must receive the complete frame before forwarding takes place. The destination and source addresses are read, the cyclic redundancy check (CRC) is performed, relevant filters are applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. The latency (or delay) through the switch varies with frame length. Incorrect Answers: A: Is wrong because the latency changes with the frame size. D: Is wrong because it waits for the complete name and not merely the destination address. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 162. QUESTION NO: 13 Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers. Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its neighbor. The routers have been working properly. The connection between North and Main ceases operation one day and an unauthorized entry is detected on the South router. Determine the problem and restore connectivity. The network has been configured with the following characteristics: The routers are named North, Main, South. All networks have the default subnet mask. RIP is the routing protocol. The clocking signal is provided on the serial 0 interface

11 Lab 1 Name: North E0: S0: Secret password : testk Lab 2 Name: Main E0: S0: S1: Secret password : testk Lab 3 Name: South E0: S1: Secret password : testk Start by clicking on host that is connected to the router you want to configure

12 Answer Lab 1: <Click on Host2, which is connected to the Lab 1 router> enable config terminal hostname North enable secret testk interface ethernet 0 ip address no shutdown exit interface serial 0 ip address clock rate no shutdown exit router rip network network ^z copy running-config startup-config Note: comments are added in text after the!-sign. They will not be shown during simulation. First we click on the Lab 1 router. Router Con0 is now available Press RETURN to get started.! The router starts! Here we press return Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname North! We change the host name North(config)#enable secret testk! We must enter EXEC mode (or enable mode as it also called)! We must enter configuration mode.! We set the password North(config)#interface ethernet 0! We enter interface configuration mode for ethernet 0 North(config-if)#ip address ! We set the IP address for Ethernet 0.! Note that we use a 24 bit network mask.!it is a class C address.! We start the interface North(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up

13 %LINK-3-UPDOWN: Interface Ethernet0, changed state to up North(config-if)#exit! We exit interface configuration for Ethernet 0 North(config)#interface serial0! We enter interface configuration mode for the serial0 interface.! Note that there are no space in serial0 North(config-if)#ip address ! IP address for serial0! Cisco recommends to set the IP address of the interface before! setting the clockrate North(config-if)#clock rate 64000! We set a clockrate. We must do it to enable communication between! the routers. They must be synchronized. North(config-if)#no shutdown! Start the serial0 interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up %LINK-3-UPDOWN: Interface Serial0, changed state to up North(config-if)#exit! Exit interface configuration mode North(config)#router rip! Start the routing protocol. RIP does not need further configuration.! RIP works well in this small network.! We enter router configuration mode. North(config-router)#network ! We enable RIP on the network of Ethernet E0. North(config-router)#network ! We enable RIP on the network of Serial0. North(config-router)#^Z! We exit configuration mode and return to enable mode. %SYS-5-CONFIG_I: Configured from console by console North#copy running-config startup-config Destination filename [startup-config]? North#! We save our configurations to NVRAM! We confirm with Enter.! We are finished. You don't need to make full configuration because all routers have already been configured but they have some mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks. Wendell Odom. Cisco CCNA Exam # Certification Guide. (Cisco Press: 2000) pages Note: If you are unsure of the testing environment, try the following address: ************************************ Answer Lab 2: enable config terminal hostname Main enable secret testk interface ethernet

14 ip address no shutdown exit interface serial 0 ip address clock rate no shutdown exit interface serial 1 ip address no shutdown exit router rip network network network ^z copy running-config startup-config Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make sure that we enable RIP on all three interfaces with the network command. ****************************************** Answer Lab 3: enable config terminal hostname South enable secret testk interface ethernet 0 ip address no shutdown exit interface serial 1 ip address no shutdown exit router rip

15 network network ^z copy running-config startup-config Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1. QUESTION NO: 14 Which layer of the OSI model ensures reliable end-to-end delivery of data? A. Application B. Presentation C. Session D. Transport E. Network Answer: D The Transport Layer, Layer 4, of the OSI reference model provide to methods of end-to-end delivery of data. These methods of delivery are reliable and unreliable. TCP is a reliable method and UDP is unreliable. Incorrect Answers: A. The Application Layer is best described as the user interface. This is how users/applications access protocols to access a network. B. The Presentation Layer controls how data is presented and also provides other services such as encryption. C. The Transport Layer is in charge of communication management (including establishing and terminating of communication). E. The Network Layer is responsible for an addressing scheme so that routers can determine a path. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO:

16 You company uses a switch in the training department. You need to be able to make changes to this switch remotely so that you can allow different classrooms to have access to the Internet as needed. What do you have to configure on this switch so that you can remotely make these changes? (Choose two.) A. The switch name must match the workgroup name of the local network. B. The switch must be configured with an IP address and default gateway. C. The remote workstations must have access to the VSM of the switch. D. CDP must be enabled on the switch so that other devices on the network can locate it. Answer: B, C To remotely configure a switch you will need to use the Visual Switch Manager (VSM). In order VSM to function properly the switch will require an IP address and network connectivity. Remote locations must use a web browser to connect to VSM. Incorrect Answers: A. VSM does not require that the switch name match the local workgroup name. D. CDP is not required for VSM but it is used as an information-gathering tool. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 165 and 114. QUESTION NO: 16 What one of the following is an example of a layer 2 MAC address? A B C FEG D FE-AA Answer: D. MAC address is a uniquely assigned address to each device on the network. The MAC address is 48 bits in length and is expressed as hexadecimal digit. The first 6 digits specify the manufacturer ID and the remaining 6 are unique to host. No two MAC addresses can be same. In addition MAC addresses are usually comprised of 6 pairs, each pair can be two number, two letters or a combination of a number and a letter. Incorrect Answers: A: contains to many number and is an IP address. B: There only 6 pair combinations in

17 C: FEG is short one letter or one number. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 20. QUESTION NO: 17 You issue the command show ip route which of the following correctly describes the codes displayed in your route table after you issue this command? (Choose two.) A. I-Indicates a route was learned through an internal protocol. B. S-Indicates a route was learned through static command. C. R-Indicates a route was learned through RIP. D. S-Indicates a route was learned through a serial port. E. R-Indicates a route was learned through a reliable port. Answer: B, C B: S stands for static. C: R stands for RIP. Note: Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR Incorrect Answers A: I stands for a route learned through IGRP. D: S stands for static. E: R stands for RIP. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 18 What can you use to connect a user s pc directly to a router?

18 A. Connect the PC's COM port to the router's console port using a straight-through cable. B. Connect the PC's COM port to the router's console port using a crossover cable. C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable. D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable. E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable. F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable. Answer: D. To connect the PC directly to the router we can use a cross-over RJ-45 cable and connect the cable to an Ethernet port on the router and to the Network adapter on the PC. Incorrect Answers A, B: In order to connect to the console port of the router a rollover cable must be used. C: To connect to an Ethernet port on the router we must use a network adapter on the PC. E: A rollover cable can be used to connect a PC to the console port, not an Ethernet port, on the router. Furthermore, one extra adapter would also be required. F: A crossover cable must be used to directly connect a PC to a router. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 19 What are good reasons for using layer two switches? (Choose two) A. To reduce collisions. B. To increase collisions. C. To increase the number of collision domains. D. To decrease the number of collision domains. E. To decrease the number of broadcast domains. Answer: A, C. A switch creates multiple collision domains, and reduces the number of nodes in the domain. This results in less contention and interference which in turn reduces the number of collisions. Incorrect Answers: B: Switches are design to REDUCE collisions and not increase them. D: When a switch segments a network it increase the number of domain and it does not reduce them. E: A switch can neither increase nor decreases the broadcast domains

19 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 20 Full-duplex gives you the ability to send and receive data at the same time. Which of the following Ethernet standards can operate in full-duplex mode? (Choose two.) A. 10Base2 B. 10Base5 C. 10BaseT D. 100BaseT Answer: C, D In order for full duplex transmissions to be supported the cable requires a means by which to receive and send transmissions at the same time. This is achieved through the use of twisted pairs. Both 10BaseT and 100BaseT utilize twisted pairs. Incorrect Answers A, B: Coaxial cable, either Thicknet (10Base5) or Thinnet (10Base2) only support one single transmission. If there is more than one transmission then a collision will occur. Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 15 16, and 164. QUESTION NO: 21 Which of the following devices support Full Duplex Ethernet? (Choose two.) A. Switch to host. B. Switch to switch. C. Hub to hub. D. Switch to hub. E. Hub to host. Answer: A, B

20 Devices that are connected to switches can communicate in full duplex mode. This includes switched that are connected to other switches. Incorrect Answers: C, D, and E. Hubs can only communicate in half duplex mode (CSMA/CD). Therefore none of these options are correct. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 22 Which three are examples of the functions of connection oriented services? (Choose three) A. Connection parameters are synchronized. B. Any loss or duplication of packets can be corrected. C. The data packet is independently routed and the service does not guarantee the packet will be processed in order. D. A data communication path is established between the requesting entity and the peer device on the remote end system. Answer: A, B, D. In order to establish a connection-orientated service, the connection must first be established. An example of this would the TCP/IP suites use of the three-way handshake. The sending and receiving of synchronization and acknowledgment packets between the sending system and the receiving system accomplish a three-way handshake. Errors can be corrected when the sender does not receive an acknowledgment, within a specified amount of time, from the receiving system the packet will be resent. Incorrect Answers: C: Due to the acknowledgement of packets, the order that packets are received is ensured. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 23 What is the correct order of PDUs in data encapsulation? A. Data, Frame, Packet, Segment, Bit B. Data, Frame, Segment, Packet, Bit C. Data, Packet, Frame, Segment, Bit D. Data, Packet, Segment, Frame, Bit

21 E. Data, Segment, Frame, Packet, Bit F. Data, Segment, Packet, Frame, Bit Answer: F Encapsulation steps Step 1: The application creates the data Step 2: The transport layer segments the data. Step 3: The network layer puts the data into packets. Step 4: The data link layer puts data into frames. Step 5: The physical layer transmits the bits. Reference: Wendell Odom. Cisco CCNA Exam # Certification Guide. (Cisco Press: 2002) page 96. QUESTION NO: 24 If you take a dotted-decimal class A IP address such as and convert the first octet to binary. Which of the following is the correct bit pattern for the first octet? A. 0xxxxxxx B. 10xxxxxx C. 110xxxxx D. 1110xxxx E xxx Answer: A The range for Class A address is 1 to convert into binary is The only answer that follows this pattern is A. Incorrect Answers: B. With a 1 in the first bit of the binary number the value will be at least is above the range of Class A addresses. C. With ones in the first 2 bits the value for the octet will need to be 192 or greater. This is outside the range of Class A addresses. D. With ones in the first 3 bits the value for the octet will need to be 224 or greater. This is outside the range of Class A addresses. E. With ones in the first 4 bits the value for the octet will need to be 240 or greater. This is outside the range of Class A addresses

22 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 25 Which of the following statements about a reliable connection oriented data transfer are true? (Choose two) A. Recipients acknowledge receipt of data. B. When buffers are filled to capacity, datagrams are discarded and not re transmitted. C. Windows are used to control the amount in outstanding acknowledged data segments. D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection. E. The receiving device waits for acknowledgements from the sending device before accepting more data segments. Answer: A, C. Connection orientated protocols, such as TCP, communication use acknowledgement of packets. This is how error control is possible. To govern the flow of data between devices, TCP uses a flow control mechanism. The receiving TCP reports a window to the sending TCP. This window specifies the number of octets, starting with the acknowledgment number, that a receiving TCP is currently prepare to receive. TCP windows sizes are variable during the lifetime of the connection. Each acknowledgment contains a window advertisement that indicates how many bytes the receiver can accept. TCP also maintains a congestion control window that is normally the size as the receiver s window but is cut in half when a segment is lost (for example, there is congestion). This approach permits the window to be expanded or contracted as necessary to manage buffer space and processing. Incorrect Answers: B: With connection orientate protocols packet delivery is guaranteed. Packet will not be dropped. Flow control (windowing) addresses the buffer issue. D: If the sending system does not receive an acknowledgement from the receiving system then the packet will be resent. E: The receiving device sends the acknowledgement of packets and this states how much data the receiving device can receive. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 26 Which two statements are valid? (Choose two.)

23 A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a private broadcast domain. B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions. C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth. D. Full-duplex Ethernet provides lower throughput than half-duplex Ethernet of the same bandwidth. E. Full-duplex Ethernet consists of a shared cable segment while half-duplex Ethernet provides a point-topoint link. Answer: B, C Full-duplex involves only two participants. Both can transmit simultaneously. Half-duplex, on the other hand, can have many participants on the same network segment. Only one be transmitting at a time. B: Using Full-Duplex only two participants ensures that there can be no collisions. Half-duplex must use CSMA/CD to handle the collisions. C: Full-duplex mode is faster than half-duplex. Incorrect Answers A: All nodes on a half-duplex Ethernet segment share the same broadcast domain. D: The opposite is true. E: The opposite is true. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 27 What is the network address for a host with the IP address /28? A B C D E F Answer: C In a network with 28 network bits only the last four bits are used for the hosts. We write the 4 th octet in binary: 68 decimal = binary (64+4) We have to clear all host bits:

24 binary = 64 decimal The network part is Incorrect Answers: A. For the network to be represented as then the IP address would need a /24 at the end. In this case /28 was used. B, D, E, and F. In these cases with the IP address provided these options are impossible. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 28 How does a layer two device such as a bridge or switch function? A. It maintains a table of the IP address of the host connected to its internet segment B. It passes packets outside of its network segment if its IP address cannot be found on its table. C. It looks up the frames destination in its address table and sends the frame towards the destination. D. It maintains the table of the data link layer and network layer addresses for the host connected to its network segment. Answer: C. A transparent bridge stores information in memory in what is called a forwarding table. The forwarding table lists each end station (from which the bridge has heard a frame within a particular time period) and the segment on which it resides. When a bridge hears a frame on the network, it views the destination address and compares it to the forwarding table to determine whether to filter, flood or copy the frame into another segment. Incorrect Answers: A: The forwarding table does not contain a list of IP address. Rather it contains a list of devices that it is connect to and on which segment each device resides. B: If the destination device is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding. D: The device maintains a list of the data link layer addresses for host connected to its network segment. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 22. QUESTION NO: 29 Which of the following are reasons to use VLANs? (Choose three.)

25 A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They enhance network security. D. They increase the size of broadcast domains while decreasing the number of broadcast domains. E. They increase the number of broadcasts domain while decreasing their size. F. The simplify switch administration. Answer: B, C, E B: Users can logically be grouped into VLAN. C: By grouping users into different VLANs, a secure VLAN can be created. Only some users could be allowed to access the secure VLAN. This improves security. E: Each separate VLAN is a separate broadcast domain. Creating VLAN increase the number of broadcast domains and decrease the size of each broadcast domain. Incorrect Answers A: The size of the collision domain decreases by the use of VLANs. D: The opposite is true. F: VLANs must be configured so VLANs increase the switch administration. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 30 You need to segment your network which of the following hardware devices can you use to segment your network? (Choose three.) A. Hub B. Repeater C. Switch D. Bridge E. Router F. Media converter Answer: C, D, E

26 C: A switch is able to segment the network at the data link layer. D: A bridge is able to segment the network at the data link layer. E: A router is able to segment the network at the network layer. Incorrect Answers A: A hub regenerates and/or redistributes signal and work at physical layer of the OSI model and is unable to segment the network. B: A repeater only regenerates the signal and works at physical layer of the OSI model and is unable to segment the network. F: Media converter only connects dissimilar media, and connects them into a single segment. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 31 Your company is concerned about Security on your network. Each department has its own file server and the company also has an enterprise server that is shared by all departments. The accounting department is concerned about the accounting information being accessible from the other departments. What can you as the network administrator use to control the information so that it s not being passed between the departments? A. Bridge between management and sites. B. Routers to provide the most secure segmentation. C. A hub to provide the ease of management and a satisfactory alternative for the network security. D. An Ethernet switch to secure separation through programming the access list of each port of the switch. Answer: B. Routers provide better separation, dividing the segments into both separate collision and broadcast domains, and provide access lists for controlling security. Incorrect Answers: A, C, D: Are Layer 2 devices, which breaks up the collision domains, but is still one broadcast domain. Security and filtering within these devices are primitive (although switching is a little more advanced). Any filtering that can be done at layer 2 is primitive and requires a lot of administrative effort. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages

27 QUESTION NO: 32 What are the advantages of using the OSI layered network model? (Choose three.) A. Allows multiple-vendor development through standardization of network components. B. Creates a list of communication rules that all companies must implement to get onto the Internet. C. Allows various types of network hardware and software to communicate. D. Prevents changes in one layer from affecting other layers, so it does not hamper development. E. Allows companies to develop proprietary interfaces. Answer: A, C, D A: The OSI model promotes standardization. C: The layered approach allows various types of network hardware and software to communicate. D: Each layer should be a separate black box. A change in one layer would not impact other layers. Incorrect Answers B: The OSI model does not contain standardization of applications in this way. E: Proprietary interfaces do not fit within the OSI model. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 33 You have a leased line configured at a small office that connects to the corporate office. You company would also like to have a backup incase the lease line goes down. Which WAN service would you most likely choose to backup the leased line? A. Frame relay with SVC B. Dedicated serial line C. ISDN with DDR D. ATM Answer: C ISDN is a low-cost backup solution that only is used when it is needed. DDR (dial-on-demand) dials up the remote site when traffic needs to be transmitted

28 Incorrect Answers A: Frame Relay is a high-performance solution and would be a costly backup solution. B: There is no need to use a dedicated connection. We only need to use the connection if the main line goes down. D: ATM is a high-performance solution and would be a costly backup. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and QUESTION NO: 34 What was one of the most important reasons the International Organization for Standardization released the OSI model? A. Users could access network server faster. B. Different vendor s networks could work with each other. C. The industry could create a standard for how computers work. D. The network administrator could increase the overall speed of their network. Answer: B. The ISO model separated the various functions so that a vendor did not have to write an entire stack. One vendor could write device drivers for their device, and not worry about higher layers, and the work can be contained and modularized. This also speeds up the process of bringing a product to market, as it minimizes code that a vendor needs to write. Incorrect Answers: A: The ISO model does not make things faster; overall they might slow things down a bit because of the overhead of passing data through the layers. C: This ISO model is for networking, not computer functions. D: The ISO model does not provide any speed boost. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 35 Which channels are used by ISDN BRI? A. 2d+b B. 23d+b C. 2b+d

29 D. 23b+d Answer: C ISDN BRI has two Bearer Channels (B) and a Signaling channel (D). Reference: Cisco CCNA Exam # Certification Guide. (Cisco Press: 2002) page 549. QUESTION NO: 36 Access-list 122 permit ip any You apply the access-list above. Which is the effect? A. Permit all packets matching the first three octets of the source address to all destinations. B. Permit all packets matching the last of the destination address and accept all source address. C. Permit all packets from the third subnet of the network address to all destinations. D. Permit all packets matching the host bits in the source address to all destinations. E. Permit all packets to destination matching the first three octets in the destination address. Answer: A This is an extended access list that permits source packets matching the first three octets of the address. Furthermore, the any keyword specifies that all destinations will be accepted. Note: Syntax for an extended access list access-list access-list-number {deny permit} protocol source source-wildcard destination destinationwildcard [precedence precedence] [tos tos] Incorrect Answers B: The source-wildcard is specified first before the destination wildcard. C: All source addresses matching the first three octets of will be permitted. D: The mask used in access-list does not work as a subnet masks. A access-list mask matches the first three octets, not the last host octet. E: The first three octets in the source, not destination, address must match. All destination addresses are allowed with the any keyword

30 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 37 Using a class C address range your network needs twenty-eight subnets. Which subnet mask should you use? A B C D E Answer: D We need to expand the class C subnet mask, and based on the calculation above, the last octet is divided into 5 bits network, 3 bits host, which is 248. By using 5 bits of subnetting for the network subnet, you leave 3 bits for hosts x x x x x 5 bits of subnetting for network x x x 3 bits of subnetting for host So, the value is = 248 A quick way to determine the required subnet mask for Class C addresses you can also use the table below: (Please note: in this case as you need 28 subnets you need to use the subnet. Always pick the subnet mask that supports your requirements. This may mean you waste subnets and hosts but you will meet your requirements.) NUMBER OF BITS SUBNET MASK NUMBER OF SUBNETS NUMBER OF HOSTS Incorrect Answers: A and C: It is not even a valid subnet mask, a valid subnet mask is a continuous string of one bits, then followed by a continuous string of zero bits. Answer A and C both break this rule

31 B: This is a full Class C subnet mask, and only provides for ONE network, and we need 28. E: This gives us 6 bits of network, and the problem calls for 5. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 38 Cisco supports three types of switching modes on switches. Which mode of switching can have a variable latency through the switch? A. Store-and-forward. B. Cut-through. C. Fragment-free. Answer: A There are 3 primary operating modes that are used for frame switching. These modes are sore-and-forward, cut-through and fragment free. When store-and-forward is used the switch must receive the whole frame before it can be forwarded. This makes the latency time variable. Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages Incorrect answers: B: During a cut-through operation, the switch forwards the frame once it receives the Destination Address. This keeps the latency constant. C: The fragment-free mode reads only the first 64 bytes before forwarding the frame. This makes the latency time practically constant. QUESTION NO: 39 Your company has purchased some Cisco routers from an online auction. You need to make a backup copy of the IOS and store it on a TFTP server. Which of the following should be done prior to copying the IOS image to a TFTP server? (Choose three.) A. Make sure that the network server can be accessed. B. Check that the authentication for access is set. C. Ensure that the network server has adequate space for the code image. D. Verify any file naming and path requirements

32 E. Make sure that the server can load and run the bootstrap code. Answer: A, C, D A: The TFTP server must be accessible from the router. C: The TFTP server must be able to store the IOS image. D: The file naming convention and the path of the TFTP server must be checked. Incorrect Answers B: TFTP does not use authentication. E: The TFTP server does not have to boot IOS. It can use any operating system with network functionality. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 40 Which of the following correctly identifies switched and routed data flow? A. Switches create a single collision domain and a single broadcast domain. Routers provide separate broadcast domains. B. Switches create separate collision domains but a single broadcast domain. Routers provide separate broadcast domains. C. Switches create a single collision domain and a separate broadcast domain. Router provides a separate broadcast domain as well. D. Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains. Answer: B Switches break up the collision domains, but it is still a single broadcast domain. Routers also create separate collision domains, but also separate broadcast domains, as routers usually do not pass broadcast traffic. Incorrect Answers: A: Switches create multiple collision domains. C: Switches maintain one broadcast domain, and separate/multiple collision domains. D: Switches maintain one broadcast domain. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages

33 QUESTION NO: 41 Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.) A. Link-state advertisement (LSA) B. Spanning Tree Protocol. C. Shortest path first tree. D. Split horizon. E. Hold-down timers. Answer: D, E RIP and IGRP are distance vector routing protocols. RIP and IGRP use holddown counters and split horizon to prevent route looping. Note: Hold-downs are used to prevent regular update messages from inappropriately reinstating a route that might have gone bad. Split horizons derive from the premise that it is never useful to send information about a route back in the direction from which it came. Incorrect Answers A: Link-state routing protocols use LSAs. However, LSAs are not used by distance vector routing protocols like RIP or IGRP. B, C: The spanning tree protocol and the shortest path first tree is used by Layer 3 routing protocol such as Enhanced IGRP or OSPF, not by RIP or IGRP. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 43 You just finished installing a new operating system on a computer located in the accounting department. You would like to verify the network configuration from the new computer so you establish FTP connection to a remote TFTP server. Which layer of the OSI model did you use for this operation? A. Application B. Presentation C. Session D. Transport

34 E. Data link F. Internet Answer: A The Application layer is the layer at which users use protocols to achieve access to the network. Using FTP to connect to a TFTP server is an excellent example. Incorrect Answers B. The presentation layer is focused on ensuring that data is readable once it has crossed the network. C. The session layer of the OSI model is responsible for communication. That is, the establishment, management, and ending of communication. D. The transport layer is focused on providing the establishment guidelines of communication. E. The data link layer provides the details on where the data is coming from and where it is going. F. The internet layer is not a layer of the OSI Model. It is a layer in the TCP/IP model that corresponds to the network layer of the OSI model. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 44 Match the OSI layer with the appropriate description

35 - 35 -

36 Answer: The transport layer assembles the packets into data, and prepares the data for the session layer above. The Network layer determines the route of moving data. Remember the Network layer is layer 3, and routers work on layer 3. The network layer includes routing functions, and keep this in mind when the question says determines the best way to move data. On the data link layer, the actual transmission occurs. The physical layer does not modify the data and package it, not is involved with addressing and routing, so it does not apply. The session layer also does not modify data or determine routes or transmit data, so it would not apply to any of the above. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO:

37 You have installed a new PC to your access layer switch. You have configured the IP address, subnet mask, default gateway, and DNS settings. You have verified that the information you have entered is correct and that the proper cable was used however this PC is unable to access devices that are connected to the same switch. What is the likely cause of this problem? A. The router lacks a routing table entry for the new host. B. The host switch port is assigned to the incorrect VLAN. C. The host MAC address is incorrectly configured. D. A VTP instance for the new host has not been installed. Answer: B In order for a host to access a switch the host switch port must be configured for the correct VLAN. By default VLAN 1 is configured for the ports. Incorrect Answers A: Hosts do not need route entries at the router. C: This would cause this behavior. D: There is no such ting as VTP instance. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 46 Cisco supports three different LMI types for Frame Relay. Which of the following are the type LMI types? (Choose three.) A. IETF B. Q931 C. Q933A D. IEEE E. CISCO F. ANSI Answer: C, E, and F The Supported LMI Types are cisco (the default), ansi, and q933a

38 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 47 Which hardware device enables high-speed data exchange on a LAN? A. Hub B. Bridge C. Switch D. Repeater Answer: C A switch can be used to gain high-speed data transfer between segments, especially when cut through is used. The internals of the switch are specifically designed for high-speed transfer, even with high volumes. Incorrect Answers: A: A hub causes the segment to be shared, and collisions slow down the segment. A hub does not cause segmentation. B: A bridge usually separates a small amount of segments and with large amounts of data transfer across the bridge; the bridge can become a bottleneck. D: A repeater extends the distance of the segment by amplifying electrical signals, but does not segment the LAN. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 48 To perform password recovery on a Cisco router you have to modify which of the following? (Choose two.) A. Nvram B. Configuration register C. Boot flash D. Cmos E. Flash Answer: A, B

39 During the password recovery procedure NVRAM and the configuration register are resetted. Reference: Password Recovery Procedure QUESTION NO: 49 You just purchased a brand new Cisco 2621 router. By default when the router boots which search sequence does it use to locate the IOS software? A. Flash, TFTP server, ROM B. NVRAM, TFTP server, ROM C. ROM, Flash, TFTP server D. ROM, NVRAM, TFTP server Answer: A First FLASH is used to load the IOS image. If that fails, the IOS image is loaded from a TFTP server. It that fails as well then a minimal IOS is loaded from ROM. Incorrect Answers B: NVRAM is used to store configuration data, not IOS images. C, D: Only if there is no IOS image in Flash memory or at FTP server, a basic version of IOS loaded from ROM. QUESTION NO: 50 You would like the router to look in NVRAM upon boot up. Which one of the following would be the correct value for the configuration register? A. 0x42 B. 0x2102 C. 0x001 D. 0x2101 Answer: B

40 The factory-default setting for the configuration register is 0x2102. This indicates that the router should attempt to load an IOS image from Flash memory and load the startup configuration. Flash memory is also known as NVRAM. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 51 Which of the following are true about connection-oriented network servers? (Choose two.) A. Non-reliable B. Reliable C. Less bandwidth-intensive D. Handshaking Answer: B, D Connection orientation connections are considered reliable as they ensure the deliver of data. This is done through acknowledgements. Further when establishing a communication a three-way handshake is used. Incorrect Answers: A. Connection orientated communication is reliable. C. Due to the acknowledgements connection orientated communications are very bandwidth intensive. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 52 You have been hired as a consultant to troubleshoot the company s network. You issue the debug ip rip command to troubleshooting the rip network. You notice your Ethernet interface shuts down. Which update message is seen in your routers debug ip rip output regarding that network? A. Subnet , metric 0 B. Subnet , metric 1 C. Subnet , metric 15 D. Subnet , metric

41 Answer: D RIP (Routing Information Protocol) is a distance vector protocol. RIP uses hope counts as metric. The designers of RIP believed that the protocol was unlikely to be practical for networks with a diameter larger than 15. The maximum hop count is therefore set to 15. In RIP when a network in not reachable then its metric is changed to 16. Incorrect Answers: A: A metric of 0 denotes a directly connected route and indicates that the interface is up,. B: This metric indicates that the interface is up and that the destination is reached with a hop count of 1. C: This metric indicates that the interface is up and that the destination is reached with a hop count of 15. RFC2453, RIP Version 2 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 53 You have been assigned a class C network address. Your manager has asked to you create 30 subnets with at least 5 hosts per subnet for the different departments in your organization. What should the subnet mask be to create 30 subnets? Answer: We need 3 bits for the hosts (2^3-2=6 > 5). This would provide for 30 subnets (2^5-2=30). A 29- bit (24 + 5) network mask translates the 4 th octet to 248 (= binary). The network mask used should be Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 236. QUESTION NO: 54 Your manager is concerned about security on the subnet /24 that has the accounting servers on it. He would like to make sure users can not telnet to those accounting servers and as asked you to add a statement to your existing access-list to prevent users from accessing those devices via telnet. Which one of the following statements should you enter? A. Access-list 15 deny tcp eq telnet B. Access-list 115 deny tcp any eq telnet

42 C. Access-list 115 deny udp any eq 23 D. Access-list 115 deny tcp any eq 23 E. Access-list 15 deny telnet any eq 23 Answer: D We must use an extended access list. The correct answer is: Access-list 115 deny tcp any eq the access-list number deny the access list denies traffic any any source is allowed allows any destination with addressing with the pattern x eq 23 select the telnet port (TCP 23) Note: Syntax extended access list. access-list access-list-number [dynamic list-name [timeout value]] {deny permit} protocol source sourcewildcard destination destination-wildcard [precedence precedence] [tos tos] [log log-input] Incorrect Answers A: We must specify both source (source + source wildcard) and destination (destination + destination wildcard). Furthermore the mask is incorrect. The mask cannot be used as a subnet mask. B, C: No destination wildcard is specified. E: We cannot specify telnet as protocol. We specify it as a port with the eq 23 (or eq telnet) Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 55 You purchased a router from an online auction and you are unable to login to privileged mode because the router has been configured with a password. You need to perform password recovery. One of the first steps in performing password recovery is recording the current configuration register setting from user mode. What is the command to view the configuration register? A. Show register. B. Show flash. C. Show boot. D. Show version. Answer: D

43 The show version command displays version information for the hardware and firmware. This includes the register settings. Incorrect Answers: A: This is not a valid command. B: The show flash command displays information in relation to router memory and image file. C: The show boot IOS command displays the settings of the boot environment variables. Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 56 What are the generic parts of a layer 3 address? A. An internetnetwork number and a URL. B. A vendor code and a serial number. C. A network number and host number. D. A broadcast number and unicast number. E. A domain identifier and a device identifier. Answer: C The network layer address exists at Layer 3 of the OSI reference model. These address are hierarchical in that they define networks first and then devices or nodes on each of the networks. Incorrect Answers: A: A URL is used in the application layer, (HTTP). B: This is describing a MAC address that is Layer 2. D: This is not an addressing mode. E: This is used in the application layer, Domain for DNS. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 57 There are some differences between routed and routing protocols. Which of the following are examples of those differences? (Choose two.)

44 A. A routed protocol is assigned to an interface and determines the method of packet delivery. B. A routing protocol determines the path of a packet through a network. C. A routed protocol determines the path of a packet through a network. D. A routing protocol operates at the transport layer of the OSI model. E. A routed protocol updates the routing table of a router. Answer: A, B A: A routed protocol delivers data. B: A routing protocol routes data. Incorrect Answers C, E: A routed protocol only delivers data, it does not route data or update any routing tables. D: A routing protocol does not work at transport layer, layer 4. Many routing protocols work at layer 3, the network layer. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 58 Which show commands can you use to identify the local DLCI number? (Choose two.) A. Show frame-relay local-dlci B. Show frame-relay pvc C. Show frame-relay dlci D. Show frame-relay map E. Show ip route Answer: B, D B: The Show frame-relay pvc command is used to display statistics about PVCs for Frame Relay interfaces. The statistical information include the DLCI number of the interface.. D: The show frame-relay map command displays the current map entries and information about the connections. This information includes the DLCI number. Incorrect Answers

45 A, C: There are no such commands. E: The routing information, which is produced by the show ip route command, does not include any DLCI number. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 280. QUESTION NO: 59 When setting up Frame Relay for point-to-point subinterfaces, you enter the following configuration: Router(config)#int s0/0 Router(config-if)#ip address Router(config-if)#encapsulation frame-relay Router(config-if)#interface s0/0.39 point-to-point Router(config-if)#frame-relay interface-dlci 139 Router(config-if)#exit Router(config)#exit Router#copy run start Which of the following must not be configured? A. The Frame Relay encapsulation on the physical interface. B. The local DLCI on each subinterface. C. An IP address on the physical interface. D. The subinterface type as point-to-point. Answer: C When setting up Frame Relay for point-to-point subinterfaces it is recommend that the network layer address, the IP address, should be removed from the physical interface. The network layer address should be configured to the subinterface instead. Incorrect Answers: A: When establishing a Frame Relay for point-to-point subinterfaces the Frame Relay encapsulation on the physical interface must be configured. B: When establishing a Frame Relay for point-to-point subinterfaces the local DLCI on each subinterface must be configured. D: When establishing a Frame Relay for point-to-point subinterfaces the subinterface must be configured as point-to-point. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages

46 QUESTION NO: 60 What is an advantage of segmenting your LAN with a switch? A. Smaller collision domains. B. Elimination of broadcast. C. Decrease cost of implementation. D. Larger number of users within the same domain. Answer: A By making more collision domains, each domain is smaller, resulting in fewer collisions, and thus an advantage. Incorrect Answers: B: Broadcast still occurs on the segments, even with routers. C: Due to extra hardware, or more advanced hardware, implementation is higher. D: By segmenting you are decreasing the number of users, thus reducing the number of contenders for the medium. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 61 Your ISP has provided you the following class B network range /24. Which of the following statements is true regarding this network? (Choose two.) A. There are 254 usable hosts per subnet. B. There is one usable network. C. There are 255 usable hosts per subnet. D. There are 254 usable subnets. E. There are 30 usable subnets. F. There are 62 usable hosts per subnet. Answer: A, D A: There are 8 bits for the hosts (32-24). We use the formula 2^number_of_host_bits-2. So there are 254 hosts (2^8-2) per subnet. D: There are 8 bits for the subnets (8 bits for hosts, 16 bits for the class B subnet: ). Cisco want us to use the formula 2^number_of_subnet_bits-2. This gives 254 (2^8-2) possible subnets

47 Note: Cisco routers are able to use 256 subnets. In Microsoft exams the correct answer would be that 256 subnets are available. Incorrect Answers B: According to Cisco there are two unusable networks namely /24 and /24. C: Only 254 hosts are usable on each subnet. The lowest IP address in subnet is the subnet number. The highest address is the broadcast address. D, E: This are incorrect as well. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 62 You just purchased a Cisco router from an online auction and now you have configured the router and everything is working perfectly in your test lab. You then issue the command copy run start to save your configuration to NVRAM. You turn off the power and mount the router in the production rack. After connecting the power cord you power up the router and the router boots into setup mode. You issue the show startup-config from privileged mode and your entire configuration is there. Which of the following indicates a possible source of the problem? A. Hardware failure NVRAM prevents the router from loading the configuration. B. Startup-config in flash is corrupt and cannot be analyzed. C. Router configuration register set to bypass startup configuration. D. Startup-config in NVRAM is corrupt and cannot be analyzed. Answer: C We must bypass the startup configuration and boot from ROM. This will enable use to select a new user name and password which will enable us to access the router. Basically we perform a password recovery procedure. Reference: Password Recovery Procedure QUESTION NO: 63 Once you have defined interesting traffic with the dialer-list command, you then must associate an ISDN phone number with the next hop router address. Which IOS command should you use? A. Isdn destination number

48 B. Dialer map. C. Isdn spid1. D. Isdn line number. Answer: B The dialer map command is used to define one or more dial-on-demand numbers to reach one or more destinations for a particular interface. This is the exact command to associate an ISDN phone number with the next hop router address. Incorrect Answers: A: This is not a valid command. C: The isdn spid1 command specifies the SPID required for b channel to access the ISDN network when your router makes its call to the local ISDN exchange. D: This is not a valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 64 You have just purchased a new Cisco router. Which mode should you use to create an initial configuration on your router? A. Copy mode. B. User mode. C. Setup mode. D. Startup mode. Answer: C If no configuration file exists for the router in NVRAM, the operating system executes a question driven initial configuration routine often referred to as the system configuration dialog. This special mode is also known as the setup dialog. Incorrect Answers: A: There is no copy mode B: You can t do configurations in user mode. The router only enters this mode when it has already been configured. D: There is a startup procedure but nor a startup mode

49 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 65 If RIP uses hop count to determine the best path what does IGRP use? A. The highest metric value. B. The lowest composite metric value. C. The lowest hop-count and delay. D. The highest bandwidth and reliability E. The lowest administrative distance. Answer: B IGRP calculates the metric by adding together weighted values of different characteristics of the link to the network in question. Incorrect Answers: A. IGRP select the route with the lowest metric value as the best route. C. Hop count is not one of the parts of the IGRP composite metric. D. IGRP uses the lowest bandwidth value when selecting a path. E. Administrative distance is not part of the IGRP composite metric. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 66 Exhibit

50 You are network administrator for the network shown in the exhibit above. Adding the new router, called TK2, the network has been augmented. You would like to backup the IOS image of the new router to the TFTP server. However, the backup procedure fails. What could be the cause of the problem? A. Incorrect default gateway of the tftp server. B. Incorrect subnet mask of the tftp server. C. Incorrect IP address of the tftp server. D. Incorrect IP address on E0 of the TK1 server. E. Incorrect subnet mask on the TK2 router. Answer: B The subnet mask of the tftp server must match the subnet mask of the local ethernet interface of the TK1 router. Incorrect Answers A: The default gateway of the TFTP server is the local e0 interface of TK1. This is the correct setting. C: The IP address of the TFTP server is in the appropriate network range. D: The IP address of the E0 interface of TK1 is in the appropriate network range. E: The subnet mask of TK2 seems to be correct. It is the same as the subnet mask of the laptop client PC. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 67 Exhibit:

51 Central Partial Configuration isdn switch-type basic-ni username Remote password king interface bri0 ip address encapsulation ppp ppp authentication chap isdn spid isdn spid dialer map ip name Remote dialer-list 1 protocol ip permit Your company is using ISDN to connect the Remote office to the Central office. The connection is not working between the two routers. You issue the show running-config command looking at the configuration above. Which additional command must be issued on the Central router before interesting traffic will be sent to the Remote router? A. (config-if)# dialer-group 1 B. (config-if)# dialer-list 1 C. (config-if)# dialer map 1 D. (config-if)# dialer-route 1 Answer: A Once the above commands have been entered to enabled DDR, then the last step required is to bind the traffic destination to an interface by linking the interesting traffic definition already created. This is done with the dialer-group command. In this case the proper command would be (config-if)# dialer-group 1. Incorrect Answers: B: The interesting traffic was already identified the first time the dialer-list 1 command was used

52 C: The dialer map command is used to identify the router to be dialed. In this case this has already been done. D: There is no such thing as a dialer route command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 68 What one of the following protocols is an example of a link state routing protocol that uses the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP ver 2 Answer: D OSPF is a link-state protocol that can be used in routing that is part of the TCP/IP protocol stack. Incorrect Answers: A: IP is a protocol, and a routed protocol, but NOT a routing protocol. B: IS-IS is a routing algorithm used by the ISO protocol stack. C: NLSP is part of the Novell protocol stack. E: RIP (and RIP V2) are distance vector protocols. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages , , 331, and 278. QUESTION NO: 69 The default bandwidth of a high-speed serial link is or T1. What is the correct command to change the bandwidth of the interface to 64K? A. Bandwidth 64 B. Band width 64 C. Bandwidth D. Band width E. Bandwidth 64K

53 Answer: A The command is bandwidth and the parameter should specify the bandwidth in kilobits. Reference: Incorrect Answers B, D: Incorrect command. Bandwidth is one word, not two. C: This would be 64000kbps or 64Mbps. E: Cannot use a parameter 64K. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 105 and 420. QUESTION NO: 70 Exhibit: RouterA# show interface s0 Serial 0 is up, line protocol is down Hardware is HD64570 Internet address Encapsulation HDLC, loopback not set, keepalive set (10sec) Router A is unable to connect to Router B, which is a Nortel router, through the network cloud. Using the command output shown what must be configured on Router A's interface s0 to change the line protocol from down to up? A. No shutdown. B. Encapsulation ppp. C. Interface serial point-to-point. D. Clock rate Answer: B To ensure that the line comes up the encapsulation type must be enabled. This is done with the encapsulation ppp command

54 Incorrect Answers: A: The interface is already enabled therefore this command in not required. C: The serial interface has already been created; this command would not solve the problem. D: This will only set the clock rate and not bring solve the problem. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 381, 105, 432, and 407. QUESTION NO: 71 What is one benefit of using a hierarchical addressing framework? A. Increase availability of addresses. B. Decrease distance between routers. C. Increase router memory requirements. D. No need to maintain routing information. Answer: A By partitioning the address ranges increases the availability of addresses. Instead of having one size fits all, the address ranges are pooled into different sizes to satisfy different needs, and provides a better distribution of addresses. Incorrect Answers: B: Hierarchical addressing will not affect the distance between routers. C: Hierarchical addressing should DECREASE router memory requirements. D: Routing information is needed because the adjacent networks are not sequential in line with the current network, so a routing table is needed to know how to get to other networks. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 72 Frame relay has a feature that prevents PVCs from shutting down from lack of activity. What is the name of this feature? A. DLCI B. BECN C. FECN D. LMI

55 E. CIR F. De Answer: D The keepalive command enables the keepalive sequence, which is part of the Local Management Interface (LMI) protocol. The keepalives will prevent the PVC from shutting down. Incorrect Answers: A. The Data Link Connection Identifier (DLCI) is used for identification purposes and not to maintain a connection. B. BECN is not a LMI signaling standard. It stands for Backward Explicit Congestion Notification. C. FECN is not a LMI signaling standard. It stands for Forward Explicit Congestion Notification. D. CIR stands for Committed Information Rate. It does not maintain a connection. E. DE will not maintain a connection. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 73 Exhibit: Frame Relay switch maps the DLCIs between Router A to Router B to create a PVC. Which statement below correctly identifies the reference point between the local router and the Frame Relay switch to which it is connected? A. Locally significant DLCI B. Globally significant DLCI C. Locally significant LMI D. Globally significant LMI Answer: A The DLCI (Data-Link Connection Identifier) is a number that identifies the logical circuit between the router and the Frame Relay switch. The Frame Relay switch maps the DLCIs between each pair of routers to create a

56 PVC. DLCIs have local significance in that the identifier references the point between the local router and the Frame Relay switch, which it is connected. Incorrect Answers: B: As the DLCI are significant to just the two routers involved in the exchange of information it is not proper o refer to globally significant DLCI. C: Locally significant LMI is not the answer. LMIs are responsible for managing the connection between the routers and not the assignment of numbers. D: Globally significant LMI is not the answer. LMIs are responsible for managing the connection between the routers and not the assignment of numbers. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 74 Novell Netware allows multiple Layer two frame structures. Cisco supports all of the frame types. Cisco and Novell have assigned different names for the same encapsulation type. Which of the following are correct matches of the Novell term to the equivalent Cisco IOS term for the same framing types? (Choose two) A. Ethernet_II-ARPA B. Ethernet_802.3-SAP C. Ethernet_802.2-LLLC D. Ethernet_SNAP-SNAP Answer: A, D When you configure an IPX network, you might need to specify a non default encapsulation type either on the Novell servers or on the Cisco router. Cisco and Novell have assigned a different name for the same encapsulation type. It is imperative that the encapsulations are the same for both the Novell equipment and the Cisco devices. Some of the encapsulation type pairings include: Novell IPX Name Ethernet_802.3 Ethernet_802.2 Ethernet_II Ethernet_SNAP Cisco Name novell-ether sap ARPA snap Incorrect Answers: B: The proper pairing for is novell-ether. C: The proper pairing for is sap

57 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 75 Consider Frame Relay multipoint subinterfaces. Which is a valid statement? A. An IP address is required on the physical interface of the central router. B. All routers are required to be fully meshed. C. All routers must be in the same subnet to forward routing updates and broadcasts. D. Multipoint is the default configuration for Frame Relay subinterfaces. Answer: C All routers must be in the same subnet to forward routing updates and broadcasts. Incorrect Answers A: An IP address is required for each subinterface. An IP address is not required for the physical interface. B: Routers are not required to be fully meshed. D: You are required to select either the multipoint or point-to-point parameter; there is no default. QUESTION NO: 76 Encapsulation is the method of passing data down the stack of the OSI model and adding headers and trailers. Which one of the following shows the correct order of Data Encapsulation? A. Data, Packet, Segment, Frame. B. Segment, Data, Packet, Frame. C. Data, Segment, Packet, Frame. D. Packet, Data, Segment, frame. Answer: C. Data encapsulation is a process in which information is wrapped in the data section of another protocol. In the OSI model each layer encapsulates the layer immediately above as the data flows down the protocol stack. The order of encapsulation is 1. Application/Presentation/Session DATA 2. Transport SEGMENT 3. Network PACKET 4. Data Link FRAMES 5. Physical BITS Incorrect Answers:

58 A: With Data, Packet, Segment, Frame; packet and segment are inverted. B: With Segment, Data, Packet, Frame; data and segment are inverted. D: With Packet, Data, Segment, frame; the only information package in the proper order is frame. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 13. QUESTION NO: 77 The ICMP ping used for troubleshooting a network can be used on a Cisco router in which modes? (Choose two) A. User. B. Privileged. C. Global Configuration. D. Interface Configuration. Answer: A, B The ping command is used to check network and host reachability. The ping command can be used at both the privileged exec mode and the user exec mode. Incorrect Answers: C: The global configuration mode can be used to configure global parameters of the device. The ping command cannot be used in this mode. D: The interface configuration mode is used to configure a specific interface. The ping command cannot be used in this mode. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 99 and QUESTION NO: 78 The advanced editing features are turn on by default on Cisco routers. To turn off these features you enter the command terminal no editing. With the advanced editing features turned on what is the effect of Ctrl-Z? A. Exits back to privileged exec mode. B. Disconnects from the router. C. Aborts the ping operation. D. Exits privileged exec mode

59 Answer: A Ctrl-Z exits back to privileged exec mode (enable mode). Incorrect Answers: B. To end a terminal connection you will need to use the logo command to log off of a router. C. Ctrl Z will not disable the ping command. An Access List could be used to prevent ping from functioning. D. You would need to enter Ctrl Z one more time to exit the privileged exec mode. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 79 A soft drink company has made the decision to provide 3 branches with network connectivity. There is a LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost fully configured. However, it does not have the routing protocol configured. Configure the routing protocol and publish all networks on the Plain router. The configurations of the routers are as follows: The routers are named Vanilla, Chocolate, and Plain. RIP is the routing protocol used. The clocking is provided on the serial 0 interface. The password on the Plain router is TestKing The default subnet mask is used on all interfaces The IP addresses are listed below. Vanilla E S Chocolate E S S Plain E S

60 Lab 1 Name: Vanilla E S Lab 2 Name: Chocolate E S S Lab3 Name: Plain E S Secret Password: TestKing Start by clicking on host that is connected to the router you want to configure. Answer Lab 3: enable config terminal hostname Plain

61 enable secret TestKing interface ethernet 0 ip address no shutdown exit interface serial1 ip address no shutdown exit router rip network network network network network ^z copy running-config startup-config < Click on Host6, which is connected to the Lab 3 router> Router Con0 is now available Press RETURN to get started.! Press enter. Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Plain Plain(config)#enable secret TestKing Plain(config)#interface ethernet 0 Plain(config-if)#ip address ! Enter enable mode! Enter terminal configuration mode.! Change hostname! Enable secret password! Enter interface configuration mode.! Note the space between Ethernet and 0.! Configure the IP address of the interface.! Note that we use a class C subnet mask.! Start the interface Plain(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up Plain(config-if)#exit! Exit configuration of Ethernet 0 interface Plain(config)#interface serial1! Configure serial1 (no space in serial1) Plain(config-if)#ip address ! Configure the IP address of the interface. Plain(config-if)#no shutdown! Start the interface

62 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1, changed state to up Plain(config-if)#exit! Exit interface configuration. Plain(config)#router rip! Enable RIP. Enter router configuration mode. Plain(config-router)#network ! Enable RIP on interface Ethernet 0 Plain(config-router)#network ! Enable RIP on interface Serial1! We have now added the two local networks. That should! be enough, but we are specifically been required to publish! all networks. We add the three remote networks as well. Plain(config-router)#network ! The three external networks are added as well. Plain(config-router)#network Plain(config-router)#network ! Exit configuration mode. Plain(config-router)#^Z %SYS-5-CONFIG_I: Configured from console by console Plain#copy running-config startup-config Destination filename [startup-config]? Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration... [OK] Plain#! Save running configuration to NVRAM! Accept defaults and save it. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 133. QUESTION NO: 80 Exhibit: TestKing# show ipx interface e0 Ethernet0 is up, line protocol is up IPX address is 6F2C c5d.b36e, NOVELL_ETHER [up] line-up, RIPPQ:0, SAPPQ: 0 Delay of this IPX network, in ticks is 1 throughput 0 link delay 0 IPXWAN processing not enabled on this interface. IPX SAP update interval is 1 minute(s) IPX type 20 propagation packet forwarding is disabled Incoming access list is not set Outgoing access list is not set IPX helper access list is not set SAP GNS processing enabled, delay 0 ms, output filter list is not set SAP Input filter list is not set SAP Output filter list is not set SAP Router filter list is not set Input filter list is not set Output filter list is not set Router filter list is not set

63 Netbios Input host access list is not set Netbios Input bytes access list is not set Netbios Output host access list is not set Netbios Outpus bytes access list is not set Updates each 60 seconds, aging multiple RIP: 3 SAP: 3 SAP interpacket delay is 55 ms, maximum size is 480 bytes RIP interpacket delay is 55 ms, maximum size is 432 bytes IPX accounting is disabled IPX fast switching is configured (enabled) RIP packets received 0, RIP packets sent 1 SAP packets received 0, SAP packets sent 1 Novell IPX addressing uses a two-part address that consists of 32 bits for the network number and 48 bits for the node number. What is the node number/layer 2 address as shown in the output of the show ipx interface e0 command? A. 6F2C B c C. 5d.b35e D. 0c5d.b363 E c5d.b363 F. 6F2C c5d.b363 Answer: E An IPX address is composed of two parts: the network number and the node number. For IPX the node number is usually obtain from MAC address of the network interface. In this case the network number is 6F2C and the node number/mac address is c5d.b363 Incorrect Answers: A: 6F2C is the network number, which is a layer 3 address. B: This only part of the MAC address thus incorrect. C: This only part of the MAC address thus incorrect. D: This only part of the MAC address thus incorrect. F: This is the IPX address. As stated previously this address is part layer 3 and part layer 2. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332 and QUESTION NO:

64 Using the following address and subnet mask /24 what is the total number of networks and the total number of host per network? A. 1 network with 254 hosts. B. 2 networks with 128 hosts. C. 4 networks with 64 hosts. D. 6 networks with 30 hosts. Answer: A As the last octet is for host addresses, the maximum number networks is 1 to determine the number of host use the formula (2^8) 2. That is 256-2=254. Incorrect Answers: B and C: These combinations of networks and hosts are not possible. D: This would require a subnet mask of Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 236. Wendell Odom. Cisco CCNA Exam # Certification Guide. (Cisco Press: 2000) page 238. QUESTION NO: 82 Which wide area network technology was designed to work with traditional POTS lines and provide SOHO s and users with a higher speed digital dial-up service? A. Frame relay B. X.25 C. ATM D. ISDN Answer: D Compared to analog modems, ISDN provides a digital service with faster connection times and somewhat higher speeds. Note: POTS= plain old telephone system. SOHO= small office/home office networks Incorrect Answers: A. Frame relay is used to handle multiple virtual circuits. B. X.25 defines how the connections between DTE and DCE are maintained

65 C. ATM was designed to take advantage of the speeds offer by media such as E3 and T3. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 373. QUESTION NO: 83 One of the best ways to understand how to build a network is to understand the method in which traffic is passed across the network. One of the reasons the OSI model was created to help you understand how a network operates. Which three devices operate at all seven layers of the OSI model? (Choose three.) A. Network host B. Network management station C. Transceiver D. Bridge E. Web server F. Switch Answer: A, B, E The three devices that operate at all seven layers of the OSI model are network hosts, network management station and web server. This is how these devices are able to perform their functions. Incorrect Answers: C: A transceiver is not used in a network environment. D: A bridge is a Layer 2 device. F: A switch is a Layer 2 device. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 84 Which of the following are functions that occur at the transport layer of the OSI model? (Choose three) A. Route selection-ip B. Sliding window-udp C. Well known ports-ip D. Route validation-icmp E. Connection oriented-tcp/ip F. Three way handshake TCP/IP G. No acknowledgement-udp

66 Answer: E, F, G The key to answering this question is the difference between connection and connectionless protocols. TCP is a connection orientated protocol that us a three-way handshake to establish a connection. UDP is a connectionless protocol that does not guarantee delivery therefore there is no acknowledgements. Incorrect Answers: A: Route selection and IP are network layer, not transport layer functions. B: Sliding windows is used in connection oriented, and UDP is connectionless. C: Well-known ports are functions of UDP & TCP. D: ICMP, which is used for the ping command, does not validate routes. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 85 Which wide are network technology was designed to use high-performance digital lines and is packet switched? A. FDDI B. ISDN C. ATM D. Frame Relay Answer: D Frame Relay is a packet switching technology that uses digital lines. Incorrect Answers A: FDDI is a topology. B: ISDN is not a packet switched service. C: ATM is a broadband technology. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 86 IP addresses use hierarchical numbering. What portion of the address that will identify the network number? A. Subnet Mask

67 B. Dots between octets. C. Class of first octet. D. Assignments of DHCP. E. Address Resolution Protocol. Answer: C. In general, IP addresses contain two fields: one for the network and another for host. Class A address have a range of 1 to 126 and the network portion of the IP address is restricted to the first eight bits (octet). Class B address have a range of and the network portion of the IP address is contain in the first 2 octets. Class C IP addresses has a range of and the network portion of the IP addresses is the first three octets of the IP address. Class D addresses include the range of to and are used for multicast address. Class E addresses have a range of to and are reserved for experimental purposes. Incorrect Answers: A: Although the subnet mask is used network devices to determine what part of the IP use address for the network, the subnet and the host address but it is not part of the IP address hierarchy. B: The dots are used for making the IP address readable by humans, but have no determination of the network number. D: DHCP (Dynamic Host Configuration Protocol) provides a mechanism for allocating IP addresses dynamically so that addresses can be reused when hosts no longer need them. E: Address Resolution Protocol (ARP) determines the data link layer address of the destination devices for known destination IP addresses network number. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 87 Looking at this address which one of the following is true? A. IP, a flooded broadcast. B. IP, a directed broadcast. C. IPX, a flooded broadcast. D. IPX, a remote directed broadcast. Answer: A Flooded broadcast ( ) are not propagate and are considered local and are sent to every host on the network. Incorrect Answers: B: The IP identified is not directed broadcast. Direct broadcast use the IP of the network

68 C and D: is an IP address, not an IPX address. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 88 Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.) A. Too many hosts in a broadcast domain. B. Full Duplex operation. C. Broadcast storms. D. Multicasting. E. Segmentation. F. Low bandwidth. Answer: A, C, D, F A: Too many hosts in a broadcast domain would cause many collisions and congestion. C: Broadcast storms would have a negative impact on available bandwidth. D: Multicasting targets multiple destinations and requires a lot of bandwidth. F: Low available bandwidth would of course result in a congested network faster than a network with higher bandwidth. Incorrect Answers B: Full duplex operation would decrease congestion. E: Segmentation decreases the collisions domains, the network traffic, and the congestion. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and QUESTION NO: 89 RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to RouterB (you put it administratively down). If you issue the command show interface on RouterB what output status would you see on the interface that is connected to RouterA?

69 A. Interface is down, line protocol is down. B. Interface is down, line protocol is up. C. Interface is up, line protocol is down. D. Interface is up, line protocol is up. Answer: A The line protocol would be down, and the interface would be down. The first part of the result will indicate whether the interface hardware is active or not. As you put the interface administratively down the interface will be down. The line protocol result indicates whether the process believes that interface is usable or not. If three keepalives are missed protocol will be marked as down. Incorrect Answers: B. It can be assumed that the three keepalives have been missed and thus the line protocol would be done. C and D. You put the interface administratively down as a result the interface would be down. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 90 Which layer of the OSI model handles data translation, code formatting, and encryption occur? A. Physical B. Data link C. Network D. Transport E. Session F. Presentation Answer: F The presentation layer provides a variety of coding and conversion functions that are applied to application level data. These functions ensure that the data sent from the application layer of one system can be read the application layer of another system. Incorrect Answers: A: The physical layer is what puts the actual data onto the wire. B: The data link layer is involved in converting bits into bytes, converting bytes into frames and with error detection. C: The network layer provides logical addressing so that routers can perform route determination

70 D: The transport layer provides delivery of the data and error correction prior to retransmit. E: The session layer is responsible for establishing, managing, and terminating communications sessions between presentation layer entities. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 91 Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? A B C D Answer: B will support the configuration. For 5 networks, we need a minimum of 3 bits. We get this in the following way: Add two to the requirement, then round up to the next power of 2. So, we get 5+2=7, next highest is 8, because 2 to the 3 rd power is 8. Thus 3 bits. For 17 hosts, we do the same thing, we get 17+2=19, next highest is 32, which is 5 bits, 2 to the 5 th power is 32. Now 3 bits network and 5 bits host make an octet. For a subnet mask, 3 bits are = 224. Incorrect Answers: A: This supports too many hosts and not enough networks C and D: They support too few hosts and too many networks. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 92 What is the protocol and what is the second part of the following network address? (Choose all that apply.) mask A. IPX MAX address

71 B. IP Class C director broadcast. C. Private IP address node number. D. Public IP address directed broadcast. E. Private IP address directed broadcast. Answer: C The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private Internets: (10/8 prefix) (172.16/12 prefix) ( /16 prefix) Remember all three ranges! Reference: RFC 1918, Address Allocation for Private Internets Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 194. QUESTION NO: 93 There are five different types of IP address classes. What IP address class is used for multicasting? A. A B. B C. C D. D E. E Answer: D Multicasting is possible due to Class D IP addresses. Class D address range is to Incorrect Answers: A. Class A addresses are not used for multicasting. B. Class B addresses are not used for multicasting

72 C. Class C addresses are not used for multicasting. E. Class E addresses are for research purposes. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 94 Which layer of the OSI model uses packets as the PDU (Protocol Data Unit)? A. Data link B. Session C. Presentation D. Network E. Transport Answer: D The packet is the encapsulation type of the Network layer. Incorrect Answers: A: The data unit of the data link layer is the frame. B: The session layer in not involved in the data encapsulation process. C: The presentation layer ensures that the receiving system can read the data and is not involved in encapsulation. E: The transport layer data unit is the segment. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 95 Cisco supports IPX traffic using different encapsulation types can go over the same interface. A. TRUE B. FALSE Answer: A Multiple encapsulations can be specified on an interface, but only if multiple network numbers have also been assigned, where each network number belongs to only one encapsulation type and each encapsulation type has

73 only one network number. Although several encapsulation types can share the same interface, clients and servers with different encapsulation types cannot communicate directly with each other. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 335. QUESTION NO: 96 What must you do to test connectivity on a dial on demand routing (DDR) link? A. Increate the idle import parameter. B. Send interesting traffic across the link. C. Switch D. Repeater Answer: B To test DDR connectivity you will need to send interesting traffic across the link. Incorrect Answers: A. This will not have the desired result. C and D. These devices will not allow you to test connectivity. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 97 Your company is considering purchasing a new accounting software application from ABC accounting company. The ABC accounting company has decided to come in and let you install a demo copy of their software so that you can test it in your network with a few hosts. The server and the hosts that will connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your company has decided to use this new accounting software application. However when you ran your packet analyzer you noticed the rest of the hosts on your network that are not using this application have a bandwidth problem with the new accounting system installed. Since your company has decided to use this new application they would like you to resolve the bandwidth problem. What is the most economical decision would you implement for resolving this problem? A. Install new 100 Mbps switches, and change all hosts NIC to 100 Mbps

74 B. Segment network with router, and place all testing hosts and the new server into a separate subnet (network). C. Add a Bridge and separate the two networks. Answer: B A router helps in creating more broadcast domains and decreasing the scope of each broadcast domain. This will improve network utilization. Incorrect Answers A: A switch would increase the number of collision domains and decrease the scope of each collision domain. However, the broadcast domain would still be the same. C: This would only give two collision domains. A switch would provide more collision domains. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 98 What are the benefits of replacing a hub with a bridge and segmenting the network? A. It increases the number of collision domains. B. It decreases the number of collision domains. C. It increases the number of broadcast domains. D. It decreases the number of broadcast domains. Answer: A. Bridge networks have the following characteristics: each segment has its own collision domain, all connected devices are part of the same broadcast domain, and all segments must have the same data link layer implementation. Incorrect Answers: B: When a network is segmented by a bridge the collisions domains increase and not decrease. C and D: The addition of a bridge to a network has no effect on the number of domains. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 99 To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the following is true about this mechanism?

75 A. TCP makes no effort to check for lost or duplicate data packets. B. The application layer must sequence data packets when using TCP. C. TCP controls the flow of UDP data through negative acknowledgements NAK. D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable. Answer: D Connection oriented protocols are reliable as the usually acknowledge the receipt of data packets. TCP is connection oriented. Incorrect Answers: A: TCP is connection oriented and guarantees packet delivery and order. B: TCP is connection oriented, and guarantees packet ordering C: TCP does not mix with UDP, a different transport protocol. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 and 207. QUESTION NO: 100 Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use autonomous system number 130. Which is the correct command for this installation? A. Router(config)# igrp 130 B. Router(config)# network 130 C. Router(config)# router igrp 130 D. Router(config)# enable igrp 130 Answer: C To enable IGRP as a routing process one uses the router igrp command. This command must include the AS number within it. Thus the command to set IGPR for AS 130 is: router igrp 130 Incorrect Answers: A: Igrp 100 is not a valid command. B: The network command it used to identify what network the AS is directly connected to. In this case (network 100) the command is wrong as it contain the AS number and not the network number. D: The enable command is used for entering privilege mode. Further the enable command does not use the AS number. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and

76 QUESTION NO: 101 Exhibit: TestKing1#show interface serial 0/0 Serial0/0 is down, line protocol is down Hardware is HD64570 Internet address is /30 MTU 1500 bytes, BW 1544 Kbit, DLY usec, rely 255/255, load 1/255 Encapsulation HDLC, loopback not set, keepalive set (10 sec) Last input never, output 00:03:11, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max(drops): Total output drops: 0 Queuing strategy: weighted fair Output queue: 0/1000/64/0 (size/max active/threshold/drops) Conversations 0/2/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 11 packets output, 476 bytes, 0 underruns 0 output errors, 0 collisions, 27 interface resets 0 output buffer failures, 0 output buffers swapped out 11 carrier transitions DCD=down DSR=down DTR=down RTS=down CTS=down TestKing1 cannot establish a connection to TestKing2 using the show interface serial 0/0 command on TestKing1 command which layer of the OSI model is most likely the problem? A. Physical layer. B. Data layer. C. Network layer. D. Transport layer. Answer: A The key to answering this question is Serial0/0 is down. This indicates that the actual serial interface is down. Thus there is a problem with the physical layer. Incorrect Answers: B: The exhibit does not indicate a problem with the data link layer. C: The exhibit does not indicate a problem with the network layer

77 D: If the output just indicated that line protocol is down then a there would be a problem with the line protocol. If this were the only problem then there would ve been a problem with the transport layer. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 102 All TCP/IP hosts implement the ICMP protocol? A. TRUE B. FALSE Answer: A This is a requirement because ICMP has other uses besides ping, for example destination unreachable or when ICMP is sent to provide better routing information. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 103 Aaron is troubleshooting a problem on his network he issues the command ping to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams? A. ICMP echo request. B. Information request. C. Timestamp reply. D. Redirect. E. Source quench. Answer: A The PING utility uses ICMP echo requests. Incorrect Answers: B, C, D. These are all types of ICMP defined messages. E. Source quench is not an ICMP defined message

78 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 104 Exhibit: Looking at the diagram above ports 1 through 4 are assigned to VLAN1 and ports 5 through 8 are assigned to VLAN3 on each switch. The switches are interconnected over an ISL trunk link. Which of the following actions would test proper VLAN and trunk operation? (Choose three.) A. Host 2-1 can ping Host 2-2 B. Host 2-1 can ping Host 7-2 C. Host 2-1 can not ping Host 2-2 D. Host 7-1 can not ping Host 2-2 E. Host 7-1 can ping Host 7-2 Answer: A, D, E

79 A: Host 2-1 and Host 2-2 are both in VLAN1 and a ping should be successful. D: Host 7-1 is in VLAN3 while Host 2-2 is in VLAN1. A ping between those hosts should fail. E: Host 7-1 and Host 7-2 are both in VLAN1 and a ping should be successful. Incorrect Answers B: Host 2-1 and Host 7-2 are in different VLANs and a ping should fail. C: Host 2-1 and Host 2-2 are both in VLAN1 and a ping should be successful. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 124. QUESTION NO: 105 Christopher issues a show cdp neighbor command from RouterA. RouterA has connections to RouterB and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three) A. The neighboring router s host name. B. The neighboring router s hardware platform. C. Up to one address for each protocol supported. D. Up to two addresses for each protocol supported. E. As many addresses as are configured for each protocol supported. Answer: A, B, C When issuing a show cdp entry command, the following information is provided: 1) Neighbor device ID 2) Layer 3 protocol information (ie IP address) 3) Local interface and Port identifiers of the neighbors remote ports 4) The hold time in seconds 5) Devices capabilities 6) Device Platform 7) IOS type and version. Incorrect Answers: D and E: You only display ONE address. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO:

80 How do you change the Console password on the Sonic router to "cisco"? A. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)#password cisco B. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)# password Cisco Answer: A Passwords are case sensitive. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 107 You have just entered the command: Superhero(config-line)#logging sync Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command. Which keystroke(s) did you use to complete the above command above to the completed command below? Superhero(config-line)#logging synchronous A. Ctrl+shift+6 then x. B. Ctrl+Z C. TAB D. /? E. Shift Answer: C The TAB key completes a command if the command is not ambiguous.

81 Section B QUESTION NO: 1 You work as network administrator at TestKing. Your trainee is configuring a router with both physical and logical interfaces. He asks you what factor determines the OSPF router ID. What should you tell him? A. The lowest network number of any interface. B. The lowest IP address of any logical interface. C. The lowest IP address of any physical interface. D. The highest network number of any interface. E. The highest IP address of any logical interface. F. The highest IP address of any physical interface. Answer: C The OSPF topology database includes information about routers and the subnets, or links, to which they are attached. To identify the routers in the neighbor table s topology database, OSPF uses a router ID (RID) for each router. A router s OSPF RID is that router s lowest IP address on a physical interface when OSPF starts running. Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. The lowest IP address configured on the router is the router ID. If a loopback address is configured, then it is the router ID. In case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID is elected it doesn't change unless the IP address is removed or OSPF restarts. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 208 QUESTION NO:

82 Your TestKing trainee is configuring a router. In particular, he is examining a routing table that contains static, RIP, and IGRP routes for the same destination network with each set to its default administrative distance. He asks you which route will be used to forward data? A. The IGRP route B. The static route C. The RIP route D. All three will load balance. Answer: A To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a number that denotes how believable an entire routing protocol is on a single router. The lower the number, the better, or more believable the routing protocol. Route Type Administrative Distance Static 1 IGRP 100 RIP 120 Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 177 QUESTION NO: 3 Three bicycle stores in the TestKing Pro chain have decided to establish network connectivity to maintain their repair business in a centralized manner. The stores contracted a local technician, non-cisco certified, to configure the routers. However, the local MCP certified technician was not able to finish the configuration in an appropriate manner. No network connectivity has been established among the routers. The routers are named TestKing1, TestKing2, and TestKing3. TestKing Pro has contracted you to fix the problems. Identify the fault(s) and make the necessary change(s) to establish connectivity. The routers have been configured with the following specifications: The routers are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol Clocking is provided on the serial 0 interfaces The password on each router is "testking" The subnet mask on all interfaces is the default mask. The IP addresses are listed in chart below. TestKing1 E E

83 S Secret password: testking TestKing2 E S S Secret password: testking TestKing3 E S Secret password: testking To configure the router click on the host icon that is connected to the router by a serial cable. Answer: Click on Host 2: Router TestKing1: TestKing1> enable Password: testking TestKing1 # config terminal TestKing1 (config) # interface ethernet 0 TestKing1 (config-if) # ip address TestKing1 (config-if) # no shutdown TestKing1 (config-if) # exit TestKing1 (config) # interface ethernet

84 TestKing1 (config-if) # ip address TestKing1 (config-if) # no shutdown TestKing1 (config-if) # exit TestKing1 (config) # interface serial 0 TestKing1 (config-if) # ip address TestKing3 (config-if) # clock rate TestKing1 (config-if) # no shutdown TestKing1 (config-if) # exit TestKing1 (config) # router rip TestKing1 (config-router) # network TestKing1 (config-router) # network TestKing1 (config-router) # network TestKing1 (config-router) # Ctrl-Z TestKing1 # copy running-config startup-config Click on Host 4 Router TestKing2: TestKing2> enable Password: testking TestKing2 # config t TestKing2 (config) # interface ethernet 0 TestKing2 (config-if) # ip address TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # interface serial 0 TestKing2 (config-if) # ip address TestKing2 (config-if) # clock rate TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # interface serial 1 TestKing2 (config-if) # ip address TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # router rip TestKing2 (config-router) # network TestKing2 (config-router) # network TestKing2 (config-router) # network TestKing2 (config-router) # Ctrl-Z TestKing2 # copy running-config startup-config Router TestKing3:

85 Click on Host6 TestKing3> enable Password: testking TestKing3 # config t TestKing3 (config) # interface ethernet 0 TestKing3 (config-if) # ip address TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config) # interface serial 1 TestKing3 (config-if) # ip address TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config) # router rip TestKing3 (config-router) # network TestKing3 (config-router) # network TestKing3 (config-router) # Ctrl-Z TestKing3 # copy running-config startup-config QUESTION NO: 4 Exhibit: The exhibit above shows the TestKing.com network. Your trainee David asks you which broadcast addresses of the subnets are shown in the exhibit?(choose three) A B C

86 D E F Answer: B E F /20 has 16 increments and the broad cast address will always be 1 before the actual number next increment will be so then the broadcast address is 1 less than = (Broadcast address). QUESTION NO: 5 Exhibit: Two routers named TestKing1 and TestKing2 are connected via their serial interfaces as illustrated, but they are unable to communicate. The TestKing1 router is known to have the correct configuration. Given the partial configurations, identify the fault on the TestKing2 router that is causing the lack of connectivity. A. Incomplete IP address B. Insufficient bandwidth C. Incorrect subnet mask D. Incompatible encapsulation E. Link reliability too low F. IPCP closed Answer: A HDLC and PPP Configuration

87 HDLC and PPP configuration is straightforward. You just need to be sure to configure the same IP address on each end of the serial link. Otherwise, the routers will misinterpret the incoming frames, because each IP address uses a different frame format. Other than configuring some optional features, that s all you need to do. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 310 QUESTION NO: 6 Exhibit: You work as a network administrator at TestKing.com. A named access list called research_block has been written to prevent users on the research network and public Internet form access to the TestKing Support server. All other users within the TestKing company should have access to this server. The list contains the following statements. deny permit Which of the following commands sequences will place this list to meet these requirements? A. TestKing1(config)# interface e0 TestKing1(config-if)# ip access-group research_block in B. TestKing1(config)# interface s0 TestKing1(config-if)# ip access-group research_block out C. TestKing2(config)# interface s0-86 -

88 TestKing2(config-if)# ip access-group research_block out D. TestKing2(config)# interface s1 TestKing2(config-if)# ip access-group research_block in E. TestKing3(config)# interface s1 TestKing3(config-if)# ip access-group research_block in F. TestKing3(config)# interface e0 TestKing3(config-if)# ip access-group research_block out Answer: C To enable the ACL on an interface and define the direction of packets to which the ACL is applied, the ip access-group command is used. When referring to a router, these terms have the following meanings. Out - Traffic that has already been through the router and is leaving the interface; the source would be where it's been (on the other side of the router) and the destination is where it's going. In - Traffic that is arriving on the interface and which will go through the router; the source would be where it's been and the destination is where it's going (on the other side of the router). Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page QUESTION NO: 7 Exhibit: Based on the display of the command output, what does [120/3] represent? A. 120 is the UDP port for forwarding traffic and 3 is the number of hops. B. 120 is the administrative distance and 3 is the metric for that route. C. 120 is the bandwidth of the link and 3 is the routing process number

89 D. 120 is the value of the update timer and 3 is the number of updates received for that route. Answer: C To decide which route to use, IOS uses a concept called the bandwidth of the link. the bandwidth of the link is a number that denotes how believable an entire routing protocol is on a single router. The lower the number, the better, or more believable the routing protocol. Route Type Administrative Distance Connected 0 IGRP 100 RIP 120 Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 177 QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than hubs take. B. Switches do not forward broadcasts. C. Hubs can filter frames. D. Using hubs can increase the amount of bandwidth available to hosts. E. Switches increase the number of collision domains in the network. Answer: E Switches increases the number of collisions domains in the network. Note: Switches use a couple of different types of internal processing variations. Almost of the more recently released switches use store-and-forward processing, but all three types of switching are supported in at least one type of currently available Cisco Switch. Store-and-forward The switch fully receives all bits in the frame (store) before forwarding the frame (forward). Cut-through The switch performs the address table lookup as soon as the destination address field in the header is received. Fragment-free This performs like cut-through switching, but the switch waits for 64 bytes to be received before forwarding the first bytes of the outgoing frame. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page

90 QUESTION NO: 9 Your boss at TestKing asks you about half-duplex and full-duplex Ethernet. What are unique for halfduplex Ethernet? (Choose two) A. Half-duplex Ethernet operates in a shared collision domain. B. Half-duplex Ethernet operates in a private collision domain. C. Half-duplex Ethernet has higher effective throughput. D. Half-duplex Ethernet has lower effective throughput. E. Half-duplex Ethernet operates in a private broadcast domain. Answer: A C A single device could not be sending a frame and receiving a frame at the same time because it would mean that a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is called half-duplex logic. Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full duplex means that an Ethernet card can send and receive concurrently. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page QUESTION NO: 10 You work as a technician at TestKing. You are required to configure PPP on an interface on a Cisco router. A technician is configuring PPP on an interface. Which PPP authentication methods can you use? (Choose two) A. SSL B. VPN C. PAP D. LAPB E. CHAP F. SLIP Answer: C E

91 Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method today because the identifying codes flowing over the link are created using a MD5 one-way hash, which is more secure that the clear-text passwords sent by PAP. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 314 QUESTION NO: 11 Exhibit: What function does the Frame Relay DLCI provide with respect to TestKingA? A. Defines the signaling standard between TestKingA and the frame switch. B. Identifies the circuit between TestKingA and the frame switch. C. Identifies the circuit between TestKingB and the frame switch. D. Identifies the encapsulation used between TestKingA and TestKingB. E. Defines the signaling standard between TestKingB and the frame switch, Answer: B TestKingA sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and forwards the frame through the Frame Relay network until it reaches the switch connected to TestKingB. The TestKingB s local switch forwards the frame out of the access link to TestKingB. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 386 QUESTION NO: 12 A technician are configuring a router named TestKing2. Why does she use passive-interface command? A. Allows a routing protocol to forward updates out an interface that is missing its IP address. B. Allows a router to send routing updates on an interface but not receive updates via that interface. C. Allows an interface to remain up without receiving keepalives. D. Allows interfaces to share IP addresses

92 E. Allows a router to receive routing updates on an interface but not send updates via that interface. Answer: E The passive-interface command is used to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while allowing updates to be exchanged normally over other interfaces. With most routing protocols, the passive-interface command restricts outgoing advertisements only. However, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, resulting in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while allowing incoming routing updates to be learnt normally from the neighbor. Reference: QUESTION NO: 13 Exhibit: A new network is being designed for your company TestKing. Using a Class C IP network. which subnet mask will provide one useable subnet per department while allowing enough usable host addresses for each department specified in the graphic? A B C D E F

93 Answer: B QUESTION NO: 14 Exhibit: As a network technician at TestKing you are required to troubleshoot the network shown in the exhibit. The host, TK1, is connected to the TestKing1 LAN is unable to connect to resources on other networks. Assuming that host is configured as follows: host address: subnet mask: default gateway: Which of the following is the cause of this problem? A. The default gateway is a subnetwork address. B. The default gateway is on a different subnet form the host. C. The host subnet mask does not match the subnet mask of the attached router interface. D. The IP address of the host is on a different subnet than the default gateway. Answer: C QUESTION NO: 15 Your boss at TestKing asks you why you are using a router to segment the network at the main office. What are the benefits? What should you tell her? (Choose two)

94 A. Filtering can occur based on Layer 3 information. B. Broadcasts are eliminated. C. Routers generally cost less than switches. D. Broadcasts are not forwarded across the router. E. Adding a router to the network decreases latency. Answer: A, D QUESTION NO: 16 You work as a network technician at TestKing. You are required to divide the network into subnets. Each submit must have the capacity of 458 IP addresses. Furthermore, according to the requirement you must provide the maximum number of subnets. Which network mask should you use? Answer: To obtain 459 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned. Keep 9 bits for host means 4 th octet and last bit is 3 rd will be 0. This gives is subnet mask. QUESTION NO: 17 Your new Junior TestKing trainee Rutger has a problem with basic binary math. He must convert the binary number into its decimal and hexadecimal equivalent. Which two numbers must Rutger provide? (Choose two) A. 159 B. 157 C. 185 D. 0x9D E. 0xD9 F. 0x159 Answer: B D = 157 0x9D is ASCII Hexadecimal = 157 Reference:

95 7fc95.html QUESTION NO: 18 Exhibit: Note: SPIDs are not required for this switch. You work as a network consultant. Your customer TestKing wants you to bring up the ISDN link (refer to the exhibit). Which command should you use? (Select three) A. Router(config-if)# encapsulation ppp B. Router(config)# isdn switch-type type C. Router(config)# dialer-list 1 protocol ip permit D. Router(config)# dialer map ip address name name connection number E. Router(config-if)# ip address address subnet mask F. Router(config-if)# dialer-group 1 Answer: A E F Proper encapsulation to be defined on both routers. IP address to be assigned for interface with subnet mask Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration command. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page QUESTION NO: 19 You are required to troubleshoot LAN connectivity on the TestKing main site in Toronto. Which router IOS commands would be useful for you? (Choose three) A. ping B. tracert

96 C. ipconfig D. show ip route E. winipcfg F. show interfaces Answer: A D F QUESTION NO: 20 As a network technician at TestKing you are required to configure an ISDN BRI interface. Specifically, you must configure dial-on-demand routing (DDR). Which sequence of parameters should you use to achieve this goal? Answer: Place 1 st Place 2 nd Place 3 rd Place 4 th Place 5 th - next hop address - Dialer-list - protocol - Dialer-String - group Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 342 QUESTION NO:

97 Your TestKing trainee Tess wants to display the configuration register setting on her router. Which command should she use? A. show register B. show flash C. show boot D. show version Answer: D show version To display the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images, use the show version command in EXEC mode. Examples The following is sample output from the show version command: Router1> show version Cisco Internetwork Operating System Software IOS (tm) 7200 Software (C7200-J-M), Experimental Version 11.3( :164752) [ hampton-nitro-baseline 249] Copyright (c) by cisco Systems, Inc. Compiled Wed 08-Oct-97 06:39 by hampton Image text-base: 0x , data-base: 0x60B98000 ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE BOOTFLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fc 1) Router1 uptime is 23 hours, 33 minutes System restarted by abort at PC 0x C at 10:50:55 PDT Tue Oct System image file is "tftp:// /hampton/nitro/c7200-j-mz" cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory. R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache) Last reset from power-on Bridging software. X.25 software, Version SuperLAT software copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 8 Ethernet/IEEE interface(s) 2 FastEthernet/IEEE interface(s) 4 Token Ring/IEEE interface(s) 4 Serial network interface(s) 1 FDDI network interface(s) 125K bytes of non-volatile configuration memory. 1024K bytes of packet SRAM memory K bytes of Flash PCMCIA card at slot 0 (Sector size 128K) K bytes of Flash PCMCIA card at slot 1 (Sector size 128K). 4096K bytes of Flash internal SIMM (Sector size 256K). Configuration register is 0x0 Reference: -

98 QUESTION NO: 22 You are configuring a subnet on the TestKing branch office in Berlin. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of Which IP address would be valid? (Choose three) A B C D E F Answer: B, C, D B: Valid Host in subnetwork 2 ( to ) C: Valid Host in subnetwork 1( to ) D: Valid host in subnetwork 2 ( to QUESTION NO: 23 You work as network administrator/technician at TestKing. You are configuring Frame Relay on a Cisco router. What is the default LMI (Local Management Interface) frame type transmitted by the Cisco router on a Frame Relay circuit? A. Q933a B. B8ZS C. IETF D. Cisco E. ANSI Answer: D Name Document IOS LMI-Type Parameter Cisco Proprietary cisco ANSI T1.617 Annex D ansi ITU Q.933. Annex A q.933a

99 Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 382 QUESTION NO: 24 You have subnetted the network with a /24 mask. Your boss at TestKing wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her? A. 1 network with 254 hosts B. 2 networks with 128 hosts C. 4 networks with 64 hosts D. 6 networks with 30 hosts Answer: A QUESTION NO: 25 TestKing, a fast growing company with one central headquarters site and 3 regional offices, is looking for a scalable WAN technology. Current plans include adding an additional 7 regional offices with all sites requiring continuous connectivity. The current HQ router has no free ports. Which of the following WAN technologies would meet TestKing's requirements? A. Dedicated PPP/HDLC links B. Frame Relay C. ISDN-BRI D. ADSL E. Broadband cable service Answer: D ADSL work by using a modem and is always on. The question tells you that the HQ router has no free ports, so by using a ADSL modem, it will be the best choice for this question. The cable modem would also be a good choice, but without much security, the ADSL is the better answer. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page

100 QUESTION NO: 26 You work as a network technician at TestKing. You are configuring a E0 interface connected to the /29 LAN on a Cisco router. You apply the following access list to the interface. access-list 123 deny tcp eq 20 any access-list 123 deny tcp eq 21 any What consequence will this access list have? A. All traffic will be allowed to exit E0 except FTP traffic. B. FTP traffic from to any host will be denied. C. FTP traffic from to any host will be denied. D. All traffic exiting E0 will be denied. E. All FTP traffic to network /29 from any host will be denied. Answer: D By default access list is having implicit deny statement at the end. In this example there is no permit statement, so it will deny all traffic exiting E0 Interface. Incorrect answers A: It will deny FTP and Telnet Traffic B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit statement at the end. QUESTION NO: 27 Your TestKing trainee Charles is curios about characteristics of link-state routing protocols. What should you tell him? (Choose three) A. Packets are routed based upon the shortest path to the destination. B. Paths are chosen based upon the cost factor to the destination. C. The exchange of advertisement is triggered by a change in the network. D. In a multipoint network, all routers exchange routing tables directly with all other routers. E. Every router in an OSPF area is capable of representing the entire network topology. F. Only the designated router in an OSPF area is capable of representing the entire network topology. Answer: A C E Open Shortest Path First

101 Each router discovers its neighbors on each interface. The list of neighbors is kept in a neighbor table. Each router uses a reliable protocol to exchange topology information with its neighbors. Each router places the learned topology information into its topology database. Each router runs the SPF algorithm against its own topology database. Each router runs the SPF algorithm against its own topology database to calculate the best routes to each subnet in the database. Each router places the best roué to each subnet into the IP routing table. The following list points out some of the key features of OSPF: Converges very quickly from the point of recognizing a failure, it often can converge in less than 10 seconds. Supports VLSM. Uses short Hello messages on a short regular interval, with the absence of hello messages indicating that a neighbor is no longer reachable. Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding, however, does not happened all at once, so the overhead s minimal. Uses cost for the metric. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page 417 QUESTION NO: 28 As a network technician at TestKing you are configuring access lists on an interface of a Cisco router. You use multiple access lists. Which of the following statements are valid? (Select one) A. There is no limit to the number of access lists that can be applied to an interface, as long as they are applied in order from most specific to most general. B. Cisco IOS allows only one access list to be applied to an interface. C. One access list may be configured per direction for each Layer 3 protocol configured on an interface. D. Up to three access lists per protocol can be applied to a single interface. E. No more than two access lists can be applied to a single interface. F. The maximum number allowed varies depending on the amount of RAM installed in the router. Answer: C QUESTION NO: 29 You work as a network technician at TestKing. You are configuring a WAN link. Which are typical Layer 2 encapsulations for this link? (Choose three)

102 A. Ethernet B. Frame Relay C. POTS D. HDLC E. PPP F. Token Ring Answer: B, D E, WAN data-link protocols used on point-to-point serial links provide the basic function of data delivery across that one link. The two most popular WAN data-link protocols are High-Level Data Link Control (HDLC) and PPP. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page QUESTION NO: 30 Roger is setting up WAN connectivity between the TestKing New York and the TestKing Tokyo offices. He uses a uses two data link layer encapsulations, one for data and one for signaling. Which WAN Service does he use? A. ISDN B. Frame Relay C. ATM D. FDDI Answer: A ISDN Q.931 messages are used for signaling. ISDN B channels are used to transport data. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 327 QUESTION NO: 31 You have segmented a network into two separate segments, segment 1 and segment2, with a Cisco router. Your boss at TestKing is concerned about the cost, and wants to what the purpose of your action is. What should you tell him?

103 A. It increases the number of collisions. B. It decreases the number of broadcast domains. C. It connects segment 1 s broadcasts to segment 2. D. It prevents segment 1 s broadcasts from getting to segment 2. Answer: D QUESTION NO: 32 Your TestKing trainee Ellen is studying the basic of distance vector and link state routing protocols. As her mentor, what could you tell her? (Choose two) A. Distance vector protocols send the entire routing table to directly connected neighbors. B. Link state protocols send the entire routing table to all routers in the network. C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the routing table. D. Link state protocols send updates containing the state of their own links to all other routers on the network. Answer: A D Distance Vector Protocols: Distance Vector Protocols advertise routing information by sending messages, called routing updates, out the interfaces on a router. These updates contain a series of entries, with each entry representing a subnet and a metric. Link-State Protocols: Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding, however, does not happen all at once, so the overhead is minimal. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page QUESTION NO: 33 Your TestKing trainee Bob wants some information regarding the split horizon rule. What should you tell him? A. Only routers can split boundaries (horizons) between concentric networks. B. All distance vector protocols require fall back routes that may cause momentary loops as the topology changes

104 C. Networks can only remain fully converged if all information about routes is sent out all active interfaces. D. Information about a route should not be sent back in the direction from which the original update came. E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary. Answer: D Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated. Reference: 877c6.html QUESTION NO: 34 Your boss at TestKing want you to brief him on differences and similarities between bridges and switches. What should you tell her? (Choose two) A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge, C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. D. A bridge will forward a broadcast but a switch will not. E. Bridges and switches increase the size of a collision domain. Answer: B C Bridges build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page a3e.html QUESTION NO:

105 Exhibit: o/r 0x2142 You are working with a 2500 series Cisco router. You are performing the password recovery procedure. You have just typed the command shown in the exhibit. Your TestKing trainee Mahmoud is curious on the purpose of this command. What should you tell him? A. To restart the router. B. To bypass the configuration in NVRAM. C. To view the lost password. D. To save the changes to the configuration. E. To enter ROM Monitor mode. Answer: B o/r 0x2142!--- Changes the value of config-register to 2142, so that the Router boots,!---ignoring the NVRAM contents. Reference: QUESTION NO: 36 You have told your boss at TestKing that the OSI model has 7 layers. He is curious which protocol is on the application layer. He asks you to give him two examples of items associated with the layer. What should you tell him? (Select two) A. ping B. Telnet C. FTP D. TCP E. IP Answer: B C Layer Name Application (layer 7) Examples Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP

106 Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page 34 QUESTION NO: 37 You are working as a network technician at TestKing. You are required to troubleshooting the WAN link between the TestKing main office at Boston and the TestKing remote office at Rio De Janeiro. A Cisco router that was providing Frame Relay connectivity at the Rio de Janeiro site as replaced with a different vendor s frame relay router. Connectivity is now down between the Boston and Rio De Janeiro site. What is the most likely cause of the problem? A. Mismatched LMI types. B. Incorrect DLCI. C. Mismatched encapsulation types. D. Incorrect IP address mapping. Answer: A Three LMI protocol options are available in Cisco IOS software: Cisco, ITU, and ANSI. Each LMI option is slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each end of an access link use the same LMI standard, LMI works fine. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 381 QUESTION NO: 38 Exhibit:

107 Five new routes need to be configured quickly for testing. While connected to a router by console, the administrator copies and pastes a configuration from a text file, a part of which is shown in the graphic, into the HyperTerminal window. Why would host /29 be unable to ping the Ethernet interface of the router as a result of this procedure? A. The new configuration needs to be saved to the NVRAM before the changes take effect. B. The router needs to be reloaded before the changes are implemented. C. The Ethernet network does not show up in the routing table because the RIP configuration is incomplete. D. The copied configuration did not overwrite the shutdown command on the Ethernet interface. E. The subnet mask on the router prevents the host from communicating with it. Answer: D Default configuration of any interface is always shutdown and always needs the command "no shutdown" in the interface command mode in order to enable the interface. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page

108 QUESTION NO: 39 Exhibit: The network administrator at TestKing has found the following problem. The remote networks , , and are accessed through the testking1 router s serial 0/0 interface. No users are able to access After reviewing the command output shown in the graphic, what is the most likely cause of the problem? A. No gateway of last resort on testking1. B. testking1router s not receiving update. C. Incorrect static route for D not located in testking1 s routing table. Answer: C QUESTION NO:

109 You work as a network technician at TestKing. You have subnetted the network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her? A. 62 networks and 2 hosts B. 6 networks and 30 hosts C. 8 networks and 32 hosts D. 16 networks and 16 hosts E. 14 networks and 14 hosts Answer: E QUESTION NO: 41 Exhibit: You are troubleshooting a Cisco router at the main office of TestKing in Toronto. You enter the show ip route command. The output is displayed in the exhibit. Which route will not be entered into the routing table of a neighboring router? A. R /24 [120/1] via , 00:00:10, Serial0 B. R /24 [120/7] via , 00:00:03, Serial1 C. C /24 is directly connected, Ethernet0 D. R /24 [120/15] via , 00:00:10, Serial0 Answer: C

110 Directly connected routes do not have a next-hop router field, because the packet does not need to be sent to another router, but instead to the destination host. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 166 QUESTION NO: 42 You work as a network technician at TestKing. You have subnetted the network with a /26 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her? A. 64 networks and 4 hosts B. 4 networks and 64 hosts C. 2 networks and 62 hosts D. 62 networks and 2 hosts Answer: C QUESTION NO: 43 Your TestKing trainee Fernanda is studying the spanning three algorithm. She asks you how the spanning-tree path cost is determined by default. What should you tell her? A. Total hop count. B. Sum of the costs based on bandwidth. C. Dynamically determined based on load. D. Individual link cost based on latency. Answer: B QUESTION NO: 44 You are giving a lecture on the Spanning-Tree algorithm for your TestKing trainees. You need to connect the Spanning-Tree Protocol states with the correct functions. (Not all options are used.)

111 Answer: Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward traffic or learn MAC addresses on the interface. Learning learns MAC addresses and builds a filter table but does not forward frames. Forwarding Sends and receives all data on the bridged port. Blocking are used to prevent network loops

112 Reference: CCNA Study guide Second Edition (Sybex, Todd Lammle) page 82 QUESTION NO: 45 You work as a network technician at TestKing. You are required to establish a Telnet session with a cisco router. Which commands should you use? A. testking1(config)# line console 0 testking1(config-if)# enable password testking B. testking1(config)# line console 0 testking1(config-line)# enable secret testking testking1(config-line)# login C. testking1(config)# line console 0 testking1(config-line)# password testking testking1(config-line)# login D. testking1(config)# line vty 0 testking1(config-line)# enable password testking E. testking1(config)# line vty 0 testking1(config-line)# enable secret testking testking1(config-line)# login F. testking1(config)# line vty 0 testking1(config-line)# password testking testking1(config-line)# login Answer: F Access from Password Type Configuration Telnet vty password line vty 0 4 login password cisco Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page 177 QUESTION NO: 46 A Law firm has offices in three different countries. Two of the offices have network connectivity to each other. The third office has recently received a router and is to be connected to the other two. The names of the routers are TestKing1, TestKing2, and TestKing3. Configure the TestKing3's router's IP addresses on the E0 and S1 interfaces so that the E0 interface receives the first usable subnet while the S1 interface

113 receives the second usable subnet from the network /28. Both interfaces should receive the first available IP of the subnet. The zero subnet should not be used. The routers have been configured with the following specifications. The routers are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol. Clocking is provided on the serial 0 interfaces The secret password on the TestKing3 router is "testking" The subnet mask of all networks other than is the default mask. The IP addresses are listed in the chart below. TestKing1 E S TestKing2 E0: S0: S1: TestKing3 E0 to be determined S1 to be determined Secret password: testking To configure the router click on the host icon that is connect to a router by a serial console cable. Answer: TestKing3> enable Password: testking TestKing3 # config terminal

114 TestKing3 (config) # interface ethernet 0 TestKing3 (config-if) # ip address TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config-) # interface serial 0 TestKing3 (config-if) # ip address TestKing3 (config-if) # clock rate TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config) # router rip TestKing3 (config-router) # network TestKing3 (config-router) # network TestKing3 (config-router) # network Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 165 CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page 486 QUESTION NO: 47 You work as a network consultant. You are planning a network installation for a large organization named TestKing. The design requires 100 separate subnetworks, so TestKing has acquired a Class B network address. What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet? A B C D E F Answer: D QUESTION NO: 48 Your TestKing trainee Jose are interested in ACLs (access control lists)

115 He asks you want they can be used for. What should you tell him? (Choose three) A. Protect hosts from viruses. B. Classify network traffic. C. Provide high network availability. D. Identify interesting traffic for DDR. E. IP route filtering. F. Monitor the number of bytes and packets. Answer: C, D, E IP access control lists (ACLs) cause a router to discard some packets based on criteria defined by the network engineer. The goal of these filters is to prevent unwanted traffic in the network whether to prevent hackers from penetrating the network or just to prevent employees from using systems they should not be using. IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service features. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 427 QUESTION NO: 49 You are configuring a network at TestKing main site in Toronto. You use a distance vector routing protocol. What could you use to prevent rooting loops in the network? (Choose two) A. Link-state advertisements (LSA) B. Spanning Tree Protocol C. Shortest path first tree D. Split horizon E. Hold-down timers Answer: D E Split horizon the routing protocol advertises routes out an interface only if they were not learned from updates entering that interface. Hold-down timer After finding out that a router to a subnet has failed, a router waits a certain period of time before believing any other routing information about that subnet. Reference:

116 CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 154 QUESTION NO: 50 Exhibit: Refer to the router topology shown in the exhibit. Assuming that all routers are running RIP, which statements describe how the routers exchange their routing tables? (Choose two) A. TestKing1 exchanges with TestKing3. B. TestKing1 exchanges with TestKing4. C. TestKing1 exchanges with TestKing2. D. TestKing4 exchanges with TestKing3. E. TestKing4 exchanges with TestKing1. F. TestKing4 exchanges with TestKing2. Answer: B, D QUESTION NO: 51 Your TestKing trainee Boris is configuring a serial interface on a Cisco router. He asks you which encapsulations he can use on the interface. What should you tell him? (Choose three) A. Ethernet B. Token Ring C. HDLC D. Frame Relay E. PPP

117 Answer: A, D, E QUESTION NO: 52 You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing requires 5 usable subnets, each capable of accommodating at least 18 hosts. Which subnet mask should you use? Answer: Default subnet mask for class C network is If one has to create 5 subnets, then 3 bits are required. With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts using 5 bits in host field. This matches with requirement. QUESTION NO: 53 Exhibit: Refer to the topology shown in the graphic. Each host is connected through its own 10Mbps half-duplex switch port to the e0 interface of the router TestKing1. What is the bandwidth available to each host? A. 1 Mbps B. 10 Mbps C. 20 Mbps D. 100 Mbps

118 Answer: D QUESTION NO: 54 Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are configured, and the network is functional. Configure and apply an access list will prevent telnet access to the TestKing3 router while allowing all other traffic to pass. The access list should not contain more than three (3) statements and should be applied to the TestKing3 router. The routers have been previously configured with the following specifications: The routers are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol. The clocking signal is provided on the serial 0 interfaces. All passwords on all routers are "testking". The subnet mask on all the interfaces is the default mask. IP addresses are listed in the chart below. TestKing1 E S Secret password: testking TestKing2 E S S Secret password: testking TestKing3 E S

119 To configure the router click on the host icon that is connected to a router by a serial console cable. Answer: Testking3(config): Interface E0 testking3(config-if): Access-list 101 deny TCP any eq 23 testking3(config-if): Access-list 101 permit IP any any testking3(config): interface S1 testking3(config-if): Ip Access-group 101 IN QUESTION NO: 55 You work as a network technician at TestKing. You have completed the password recovery procedure on a Cisco router. The process is successful and the router returns to normal operation. What is configuration register value at this point of time? A. 0x2100 B. 0x2101 C. 0x2102 D. 0x2124 E. 0x2142 Answer: C It is default factory setting. Router should attempt to load an IOS from flash memory and load startup configuration file. Flash memory also called NVRAM Incorrect answers A: It is ROM Monitor mode. A low level problem determination B: Router to boot from ROM

120 E: The value 0x2142 to be set for configuration register in case of password recovery procedure QUESTION NO: 56 What feature of a networks switch allows an administrative to create separate broadcast domains? A. Store-and-forward switching B. Microsegmentation C. Transparent bridging D. Fragment-free switching E. Virtual LANs F. Cut-through switching Answer: E Creation of VLAN in a switch provide separate Broadcast domain. If VLAN is not there all ports as members of one Broadcast domain. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 172 Incorrect Answers A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast domains B: Not related to the question C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the bridges exists. It will not play any role for creating separate broadcast domain D,F: Both are switching methods in a switch. QUESTION NO: 57 New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport. Which switching mode should be configured on the new switches to provide error-free transport to the network? A. cut-through B. fragment-free C. frame-filtering D. store-and-forward E q forwarding F. VTP transparent mode

121 Answer: D The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check the FCS before forwarding the frame. FCS is Ethernet Trailer. Incorrect answers: A. The Switch performs the address table lookup as soon as the destination address field in the header is received. The first bits in the frame can be sent out to out port before the final bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check. B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked. C,E,F : They are not related to Switch mode transport. QUESTION NO: 58 Given a subnet mask of , which of the following addresses can be assigned to network hosts? (Select three.) A B C D E F Answer: B, C, D B: Valid Host in subnetwork 2 ( to ) C: Valid Host in subnetwork 1( to ) D: Valid host in subnetwork 2 ( to Incorrect answers: A. is a broadcast E. is a broadcast F. is a network id QUESTION NO: 59 A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network. Which commands could be used to find this information?

122 A. Router# show protocols B. Router# show version C. Router# show image D. Router# show IOS E. Router# show flash Answer: B "Show flash" displays all the image files in it. There could be more than one file. However, "show version" displays the one that is currently in use by the router.) Incorrect answers: A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address if configured. C,D. There are no such commands. QUESTION NO: 60 Which statement describes the rule of split horizon? A. Only routers can split boundaries (horizons) between concentric networks. B. All distance vector protocols require fall back routers that may cause momentary loops as the topology changes. C. Networks can only remain fully converged if all information about routers is sent out all active interfaces. D. Information about a route should not be sent back in the direction from which the original update come. E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary. Answer: D Split horizon includes two related concepts that affect what routes are included in a routing update: An update does not include the subnet of the interface out which the update is sent All routes with outgoing interface of interface x are not included in updates sent out that same interface x. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 369 Incorrect Answers A: There is no such requirement B: Distance vector protocols updates routing table at regular intervals instead of Topology changes C: This is not a feature of split horizon E: This is not a related feature for split horizon

123 QUESTION NO: 61 Exhibit: Which of the following is the minimum configuration commands required to bring up the ISDN link shown in graphic. Note : SPIDs are not required for this switch. (Choose three) A. Router(Config-if)# encapsulation ppp B. Router(Config-if)# isdn switch-type type C. Router(Config-if)# dialer-list, protocol ip permit D. Router(Config-if)# dialer map ip address name name connection number. E. Router(Config-if)# ip address subnet mask F. Router(Config-if)# dialer group 1 Answer: A, E, F A: Proper encapsulation to be defined on both routers. E: IP address to be assigned for interface with subnet mask F: Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration command. Incorrect Answers: B, C:The commands are executed on global configuration command. D: Syntax is wrong. Proper syntax is dialer map ip ip address/subnet mask name connection name number. QUESTION NO: 62 Which of the following are characteristics of PPP? (Choose three) A. Can be used over analog circuits. B. Maps Layer 2 to Layer 3 address. C. Encapsulates several routed protocols. D. Supports IP only. E. Provides error correction. Answer: A C E

124 PPP can be used on either type of line (dial or switched lines), because data-link protocols are designed for point-to-point environment. PPP uses one LCP per link and one Control Protocol for each Layer 3 protocol defined on the link. If a router is configured for IPX, Apple Talk, and IP on a PPP serial link, the router configured for PPP encapsulation automatically tries to bring I the appropriate control protocols for each layer 3 protocol. Error recovery can be performed by the data-link protocol or a higher-layer protocol, or it might not be performed at all. Supported but not enabled by default. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 309 QUESTION NO: 63 A user types the command ping during a router console session. What does this command use to test connectivity between the two devices? A. ICMP echo request B. Information request C. Timestamp reply D. Redirect E. Source quench Answer: A The ping command sends an ICMP echo request packet to the stated destination address. The TCP/IP software at the destination then replies to the ping echo request packet with a similar packet, called ICMP echo reply. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 146 QUESTION NO: 64 An administrator must assign static IP addresses to the servers in the network. For network /29 the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server? A. IP address: Subnet Mask: Default Gateway: B. IP address: Subnet Mask: Default Gateway:

125 C. IP address: Subnet Mask Default Gateway: D. IP address: Subnet Mask Default Gateway: E. IP address: Subnet Mask Default Gateway: Answer: E QUESTION NO: 65 Which two statements about the store and forward switching method are true? (Choose two) A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before beginning to forward it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the frame immediately. Answer: B C With store-and-forward, the entire frame is received by the switch before the first bit of the frame is forwarded. As soon as the incoming switch port receives enough of the frame to see the destination MAC address, the forwarding decision is made and the frame is transmitted out the appropriate outgoing port to the destination device. So, each frame might experience slightly less latency. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN ) Page 243 QUESTION NO: 66 Match the hex and decimal numbers listed on the left with the corresponding binary number listed on the right. Not all options apply

126 Answer: 170 (Decimal) = (Decimal) = F1 (241 = Decimal) = F (159 = Decimal) =

127 Reference: 186a00800c33e4.html QUESTION NO: 67 A group of bakeries wants to provide network connectivity for 3 factories in the group. Each factory is to have one LAN. The TestKing1 and TestKing2 routers are completely configured. The TestKing3 router has been configured except the routing protocol. Configure the routing protocol to allow a host on the LAN of the TestKing3 router to communicate with a host on the TestKing2 router. The routers have been configured with the following specifications:

128 The routers are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol The clocking is provided on the serial 0 interfaces. The secret password on the TestKing3 router is "testking" The subnet masks on all interfaces is the default mask. The IP addresses are listed in the chart TestKing1 E S TestKing2 E S S TestKing3 E S To configure the router click on a host icon that is connected to a router by a serial cable. Answer: TestKing3#config t Testking3(config)#router rip Testking3(config-router)#network Testking3(config-router)#network Testking3(config)# Ctrl-Z **Output omitted**

129 TestKing3#copy running-config startup-config **Output omitted** [OK] TestKing3#_ QUESTION NO: 68 Which of the following statements are characteristic of a typical VLAN arrangement? (Choose three) A. VLANs logically divide a switch into multiple, independent switches at Layer 2. B. A VLAN can span multiple switches. C. VLANs typically decrease the number of broadcast domains. D. Trunk links can carry traffic for multiple VLANs. E. VLAN implementation significantly increases traffic on a network because trunking information must be added to each packet. F. VLANs extend the collision domain to include multiple switches. Answer: A, B, D QUESTION NO: 69 Which of the following options can be negotiated using LCP during the PPP link establishment? (Choose three) A. callback B. IPCP C. CHAP D. multilink E. TCP F. Q.931 Answer: B C D The NCP phase is used for establishing and configuring different network-layer protocols. The most common layer 3 protocol negotiated is IP. The routers exchange IP Control Protocol (IPCP) messages negotiating options specific to the protocol. Point-to-Point Protocol (PPP) currently supports two authentication protocols: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Both are specified in RFC 1334 and are supported on synchronous and asynchronous interfaces. Reference:

130 CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page QUESTION NO: 70 Match the ISDN term to the appropriate description. Not all options on the left apply. Answer: LAPD provides the data link protocol that allows delivery of messages across that D-channel to the local switch. LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. It is defined by ITU-T Recommendations Q.920 and Q.921. TE1 ISDN capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point. ITU.T.430 Defines connectors, encoding, framing, and reference points. TE2 Equipment that does not understand ISDN protocols and specifications (no ISDN awareness). Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA. NT1 CPE equipment in North America. Connects with a U reference point (two-wire) to the telco. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page Chapter

131 QUESTION NO: 71 Exhibit: An employee Tess of TestKing company has moved to an office on a different floor. Although the administrator is able to telnet to all of the routers, the address of Switch TestKing5 is needed in order to verify that Tess remains in the same VLAN. Which action could be used by the administrator to find the IP address of TestKing5? A. Issue the show ip route command on Router TestKing1. B. Issue the show ip route command on Router TestKing3. C. Issue the show cdp neighbors command on Router TestKing2. D. Issue the show cdp neighbors detail command on Router TestKing3. E. Issue the show arp command on Router TestKing1. F. Issue the show arp command on Router TestKing2. Answer: D To display detailed information about neighboring devices discovered using Cisco Discovery Protocol (CDP), use the show cdp neighbors privileged EXEC command. Detail - (Optional) Displays detailed information about a neighbor (or neighbors) including network address, enabled protocols, hold time, and software version. Reference: d983f.html# QUESTION NO: 72 Exhibit:

132 Which of the following commands can be used to configure the address on the TestKing2 serial interface? A. TESTKING2(config-if)# ip address B. TESTKING2(config-if)# ip address C. TESTKING2(config-if)# ip address D. TESTKING2(config-if)# ip address Answer: C The IP address on the S0/0 interface must be on the same subnet as the S0/0 interface on TestKing. A 22 bit subnet mask must be used. QUESTION NO:

133 Users on the TestKing2 site Ethernet are unable to access the TestKing1 site network. After reviewing the command output, what is the most likely cause of the problem? A. Incorrect IP addressing B. Frame relay is incorrectly configured. C. IGRP is incorrectly configured. D. Link state routing protocol is needed. Answer: C router igrp To configure the Interior Gateway Routing Protocol (IGRP) routing process, use the router igrp global configuration command. To shut down an IGRP routing process, use the no form of this command. router igrp autonomous-system autonomous-system- Autonomous system number that identifies the routes to the other IGRP routers. It is also used to tag the routing information. Reference: f0ab0.html#3674 QUESTION NO: 74 Exhibit: Company TestKing has just added an employee workstation to its network. The employee is unable to connect to the server TestKingA at IP address /27. Identify the incorrectly configured network parameter in the workstation configuration. A. Workstation IP address

134 B. Workstation subnet mask C. Workstation default gateway D. IP address of the Ethernet 0 router interface Answer: B QUESTION NO: 75 Your TestKing trainee Bob asks you what binary is in decimal. What should you tell him? A. 5 B. 192 C. 224 D. 240 E. 248 Answer: E = 248 Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 559 QUESTION NO: 76 Exhibit: Users on the network cannot reach the server located on the network. The network administrator connected to router TestKing1 via the console port, issued the show ip route command, and was able to ping the server. Based on the output of the show ip route command and the topology shown in the graphic, what is the cause of the failure?

135 A. The network has not fully converged. B. IP routing is not enabled. C. A static route is configured incorrectly. D. The FastEthernet interface on TestKing1 is disabled. E. The neighbor relationship table is not correctly updated. F. The routing table on TestKing1 has not updated. Answer: E QUESTION NO: 77 Exhibit: Refer to the displayed graphic. TestKing2 and TestKing3 are configured for RIPv1 and have complete connectivity. TestKing1 is added to the network. What is the most appropriate TestKing1 configuration for full connectivity? A. TestKing1(config)# router rip TestKing1(config-router)# network TestKing1(config-router)# network TestKing1(config-router)# network B. TestKing1(config)# router rip TestKing1(config-router)# network C. TestKing1(config)# router rip TestKing1(config-router)# network TestKing1(config-router)# network D. TestKing1(config)# router rip TestKing1(config-router)# network TestKing1(config-router)# network Answer: A Reference:

136 CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) page 167 QUESTION NO: 78 You are working as network administrator/technician at TestKing Inc. While troubleshooting a network connectivity problem, you observe steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message Request timed out is displayed. At which layer of the OSI model does the problem most likely exist? A. The session layer B. The protocol layer C. The data link layer D. The access layer E. The network layer F. The application layer Answer: E TCP/IP includes ICMP, a protocol designed to help manage and control the operation of a TCP/IP network. The ICMP protocol provides a wide variety of information about a network s health and operational status. Control message is the most descriptive part of a name. ICMP helps control and manage IP s work and therefore is considered part of TCP/IP s network layer. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) page 277 QUESTION NO: 79 Exhibit: Your boss Dr King studies the network diagram shown in the exhibit. She asks you which function the Frame Relay DLCI provides with respect to TestKing1. What should you tell her? A. Defines the signaling standard between TestKing1 and the frame switch. B. Identifies the circuit between TestKing1 and the frame switch. C. Identifies the circuit between TestKing2 and the frame switch

137 D. Identifies the encapsulation used between TestKing1 and TestKing2. E. Defines the signaling standard between TestKing2 and the frame switch. Answer: B TestKing1 sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and forwards the frame through the Frame Relay network until it reaches the switch connected to TestKing2. The TestKing2 s local switch forwards the frame out of the access link to TestKing2. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) Page 386 QUESTION NO: 80 Exhibit: Refer to the graphic. TestKingA is communicating with the server. What will be the source MAC address of the frames received by TestKingA from the server? A. The MAC address of router interface e0. B. The MAC address of router interface e1. C. The MAC address of the server network interface. D. The MAC address of TestKingA. Answer: A

138 QUESTION NO: 81 You work as network administrator at TestKing Ltd. TestKing has three different sites with one router at each site. The routers are named TestKing1, TestKing2, and TestKing3. A non-certified technician has configured all the routers, but no connectivity exists between the routers. You task is to identify all error(s) and make the necessary adjustment(s) to establish network connectivity. The routers have been configured with the following configuration: They are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol Clocking is provided on the serial 0 interface. The password on each router is "testking" The subnet mask on all interfaces is the default subnet mask. The IP addresses are listed in the chart below. TestKing1 E S TestKing2 E S S TestKing3 E S To configure the router click on a host icon that is connected to the router by a serial console cable. Answer:

139 Click on Host 2: Router TestKing1: TestKing1> enable Password: testking TestKing1 # config terminal TestKing1 (config) # interface ethernet 0 TestKing1 (config-if) # ip address TestKing1 (config-if) # no shutdown TestKing1 (config-if) # exit TestKing1 (config) # interface serial 0 TestKing1 (config-if) # ip address TestKing1 (config-if) # no shutdown TestKing1 (config-if) # exit TestKing1 (config) # router rip TestKing1 (config-router) # network TestKing1 (config-router) # network TestKing1 (config-router) # Ctrl-Z TestKing1 # copy running-config startup-config Click on Host 4 Router TestKing2: TestKing2> enable Password: testking TestKing2 # config t TestKing2 (config) # interface ethernet 0 TestKing2 (config-if) # ip address TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # interface serial 0 TestKing2 (config-if) # ip address TestKing2 (config-if) # clock rate TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # interface serial 1 TestKing2 (config-if) # ip address TestKing2 (config-if) # no shutdown TestKing2 (config-if) # exit TestKing2 (config) # router rip

140 TestKing2 (config-router) # network TestKing2 (config-router) # network TestKing2 (config-router) # network TestKing2 (config-router) # Ctrl-Z TestKing2 # copy running-config startup-config Router TestKing3: Click on Host F TestKing3> enable Password: testking TestKing3 # config t TestKing3 (config) # interface ethernet 0 TestKing3 (config-if) # ip address TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config) # interface serial 1 TestKing3 (config-if) # ip address TestKing3 (config-if) # no shutdown TestKing3 (config-if) # exit TestKing3 (config) # router rip TestKing3 (config-router) # network TestKing3 (config-router) # network TestKing3 (config-router) # Ctrl-Z TestKing3 # copy running-config startup-config QUESTION NO: 82 An OSPF interface has been configured with the bandwidth 64 command. What will be the calculated OSPF cost of this link? A. 1 B. 10 C D E Answer: C cost = 10^8 / bandwidth in bps =

141 QUESTION NO: 83 What is the purpose of DLCIs in Frame Relay? A. The determine the Frame Relay encapsulation type. B. They identify the logical circuit between a local router and a Frame Relay WAN switch. C. They represent the keepalives used to maintain the PVC in an active state. D. They represent the physical address of the router attached to a Frame Relay network. Answer: B Routers use the data-link connection identifier (DLCI) as the Frame Replay address, which identifies the VC over which the frame should travel. Reference: CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN X) page 377 QUESTION NO: 84 Which statements is true regarding the command sequence shown below? (Choose three) RouterA(config)# interface loopback 0 RouterA(config-if)# ip address A. It creates a virtual, software only, interface. B. It uses a wildcard mask of C. It ensures that an interface is always active for OSPF processes. D. It provides a way to test the convergence of OSPF routing updates. E. The mask of is called a host mask. F. These commands can only be issued to configure serial interfaces. Answer: A B F QUESTION NO: 85 TestKing wants to implement 1000mbps Ethernet. Which IEEE standards apply in this scenario? (chose 2)? A ae B u

142 C z D i E ab F e Answer: C. E IEEE 802.3z 1000BASE-SX. The 1000BaseT standard was released in June 1999, defined by IEEE 802.3ab. Incorrect Answer: On June 17, 2002 the IEEE 802.3ae specification for 10 Gigabit Ethernet was approved as an IEEE standard by the IEEE Standards Association (IEEE-SA) Standards Board. IEEE 802.3u 100BASE-TX QUESTION NO: 86 Which statement describes the routing protocol OSPF( Choose 3)? A. it supports VLSM B. it is used to router between Autonomous System. C. It confines network instability to one area of network. D. It increases routing overhead over the network E. It allows extensive control of the routing update F. It is simpler to configure than RIPv2 Answer: A, D, E QUESTION NO: 87 Error detection schemes use which field of frame to detect error? A..MTU B. MAC C. FCS D. PDU E. ERR F. Flag Answer: C The FCS is used for error checking. Reference: Todd Lammle's 4th edition study guide, Chapter 5 ip routing pages

143 QUESTION NO: 88 Your TestKing trainee Tess asks you to list options for Frame LMI types. (Choose three) A. IETF B. Q.931 C. Q933a D. IEEE E. Cisco F. ANSI Answer: C, E, F QUESTION NO: 89 Given a subnet mask of , which of the following addresses can be assigned to network hosts? (Choose three) A B C D E F Answer: B, C, E QUESTION NO: 90 Which command will provide you with information regarding the Layer 3 configuration of directly connected router interfaces? A. show ip interface B. show cdp neighbors C. show cdp neighbors detail D. show ip route E. show ip link status F. telnet

144 Answer: C QUESTION NO: 91 Exhibit: You work as a network administrator at TestKing Inc. Hosts in the TestKing sales department are unable to access a new server at the Branch Office. Consider the IP addressing scheme in the accompanying graphic to determine the problem. A. The default gateway of the workstations in the sales department is incorrect. B. The subnet mask of the workstations in the sales department is incorrect. C. The default gateway of the server at the Branch Office is incorrect. D. The host address of the server at the Branch Office is invalid. E. The serial 0 interface on the Main Office router and the serial 1 interface on the Branch Office router are not on the same subnetwork. Answer: D When you convert the IP address ( ) of the server and the subnet mask ( ) to binary you will get the following results: (IP address first and then the subnet mask.) Thus it is determined that the IP address on the host is in fact the subnet address. This is what would be causing the network problems

145 Incorrect Answers: A. The default gateway in the sales department is correct. B. The subnet mask is correct. C. The default gateway in the branch office is correct. E. This is no problem here. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 92 You have a Class B network address with a subnet mask of Which of the following statements are true regarding the resulting network? (Choose two) A. There are 254 usable hosts per subnet. B. There is one usable network. C. There are 255 usable hosts per subnet. D. There are 254 usable subnets. E. There are 30 usable subnets. F. There are 64 usable hosts per subnet. Answer: A, D QUESTION NO: 93 When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? A. The Frame Relay encapsulation on the physical interface. B. The local DLCI on each subinterface. C. An IP address on the physical interface. D. The subinterface type as point-to-point. Answer: B QUESTION NO: 94 The following access list was applied outbound on the E0 interface connected to the /29 LAN: access-list 123 deny tcp eq 20 any

146 access-list 123 deny tcp eq 21 any What effect will this access list have? A. All traffic will be allowed to exit E0 except FTP traffic. B. FTP traffic from to any host will be denied. C. FTP traffic from to any host will be denied. D. All traffic exiting E0 will be denied. E. All FTP traffic to network /29 from any host will be denied. Answer: A QUESTION NO: 95 Which command is used to display the placement and direction of an IP access control list on a router? A. show access-list B. show ip route C. show ip interface D. show interface E. show interface list F. show ip interface brief Answer: C QUESTION NO: 96 Which of the following are characteristics of microsegmentation? (Choose two) A. Dedicated paths between sending and receiving hosts are established. B. The number of collision domains is decreased. C. Broadcast domains are enlarged. D. Multiple subnetwork broadcast addresses are created. E. Multiple ARP tables are required on the connected hosts. F. Bandwidth is dedicated to connect hosts. Answer: A, F

147 QUESTION NO: 97 You are the network administrator of the TestKing company and receive a call from a user who is unable to reach a server at a remote site. After further review your discover the following information. local PC /24 default gateway remote server /24 You then conduct the following tests from the offending local PC. ping unsuccessful ping unsuccessful ping unsuccessful ping unsuccessful Which of the following problems would create the test results listed above? A. TCP/IP not correctly installed. B. Local physical layer problem. C. Default gateway down. D. Remote physical layer problem. Answer: B QUESTION NO: 98 Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN? A. To provide a mechanism for network monitoring in switched environments. B. To prevent routing loops in networks with redundant paths. C. To prevent switching loops in networks with redundant switched paths. D. To manage, the addition, deletion, and naming of VLANs across multiple switches. E. To segment a network into multiple collision domains. Answer: C QUESTION NO: 99 You TestKing trainee Tess ask you which parameter must be supplied when initializing the IGRP routing process. What should you tell her? A. Connected network numbers

148 B. IP address mask C. Metric weights D. Autonomous system number E. Register administrative id Answer: E QUESTION NO: 100 You work as a network technician at TestKing. You need to add a new VLAN, named ACCOUNTS, to your switched network. Which of the following are true regarding configuration of this VLAN? (Choose three) A. The VLAN must be created. B. The VLAN must be named. C. An IP address must be configured for the ACCOUNTS VLAN. D. The desired ports must be added to the new VLAN. E. The VLAN must be added to the STP domain. Answer: A, C, D QUESTION NO: 101 Bob, your TestKing trainee, want to segment a network. What devices could he use? (Choose three) A. hub B. repeater C. switch D. bridge E. router F. media converter Answer: C, D, E QUESTION NO: 102 The junior TestKing trainee Ellen asks you to describe what is specific for a global command. What should you tell her?

149 A. A command that is available in every release of IOS, regardless of the version or deployment status. B. A command that can be entered in any configuration mode. C. A command that is universal in application that supports all protocols. D. A command that is implemented in all foreign and domestic IOS versions. E. A command that is set once and affects the entire router. Answer: D QUESTION NO: 103 What is the range of binary values for the first octet in Class B addresses? A B C D E Answer: C QUESTION NO: 104 Which of the following access list statements will deny all telnet connections to subnet /24? A. access-list 15 deny tcp eq telnet B. access-list 115 deny tcp any eq telnet C. access-list 115 deny udp any eq 23 D. access-list 115 deny tcp any eq 23 E. access-list 15 deny telnet any eq 23 Answer: D QUESTION NO: 105 Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN? A. To provide a mechanism for network monitoring in switched environments. B. To prevent routing loops in networks with redundant paths

150 C. To prevent switching loops in networks with redundant switched paths. D. To manage, the addition, deletion, and naming of VLANs across multiple switches. E. To segment a network into multiple collision domains. Answer: C QUESTION NO: 106 Which wireless data command type has a high data rate but is limited to very short distances? A. narrowband B. spread spectrum C. infrared D. broadband personal comm. Service (PCS) Answer: Pending. Send your suggestions to feedback@testking.com. QUESTION NO: 107 Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be distributed to all the switches in a domain? A. STP B. VTP C. GVRP D. SNMP E. DHCP Answer: B Explanation : Sybex CCNA Study Guide 4th Edition (Page 359) The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs information that is then propagated to all other switches in the VTP domain. QUESTION NO: 108 Which of the follow types of crosstalk?

151 A. near-end crosstalk(next) B. jitter crosstalk(jext) C. far end crosstalk(fext) D. middle closed-end crosstalk(mcext) E. power sum near-end crosstalk(psnext) Answer: B, C QUESTION NO: 109 Which of the following are VLAN frame encapsulation types that may be configured on a catalyst switch? (Choose 2) A. VTP B. ISL C. CDP D Q E. LLC Answer: B, D ISL and 802.1Q are the two trunking encapsulations. QUESTION NO: 110 What command will configure an interface on a Catalyst 2900 series switch to carry traffic from all VLANs to another directly connected switch? (Choose two) A. Switch(config-if)# vlan all B. Switch(config-if)# switchport access clan 30 C. Switch(config-if)# switchport access vlan all D. Switch(config-if)# switchport mode trunk E. Switch(config-if)# switchport trunk encapsulation dot1q Answer: D, E QUESTION NO: 111 Why do large OSPF networks use a hierarchical design? (Choose three)

152 A. To decrease latency by increasing bandwidth B. To reduce routing overhead C. To speed up convergence D. To confine network instability to single areas of the network E. To reduce the complexity of router configuration F. To lower costs by replacing routers with distribution layer switches Answer: B, C, D QUESTION NO: 112 A network administrator is trying to add a new router into a established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? Router(config)# router ospf 1 Router(config-router)# network area 0 A. The process id is configured improperly B. The OSPF area is configured improperly C. The network wildcard mask is configured improperly D. The network number is configured improperly E. The AS is configured improperly F. The network subnet mask is configured improperly Answer: D QUESTION NO: 113 Which commands are required to properly configure a router to run OSPF and to add network /24 to OSPF area 0? (Choose two) A. Router(config)# router ospf 0 B. Router(config)# router ospf 1 C. Router(config)# router ospf area 0 D. Router(config-router)# network E. Router(config-router)# network area 0 F. Router(config-router)# network area

153 Answer: B, E QUESTION NO: 114 Network broadcast traffic from the Business Department is needlessly reaching the Engineering Department LAN. What can be done to contain this traffic within the Business Department network while maintaining connectivity with enterprise servers and the Internet? (Choose two) A. Establish a VTP domain to contain the extraneous traffic B. Provide greater bandwidth to the Engineering Department LAN C. Utilize full-duplex Ethernet on the Engineering Department LAN D. Place the business department on a separate subnet and route between networks E. Change the switch IP address to an address on the Engineering Department LAN F. Create separate VLANs and subnets for the two departments and route between the two Answer: D, E QUESTION NO: 115 OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? (Choose three) A. Each OSPF area requires a loopback interface to be configured B. Areas may be assigned any number from 0 to C. Area 0 is called the backbone area D. Hierarchical OSPF networks do not require multiple areas E. Multiple OSPF areas must connect to area 0 F. Single area OSPF networks must be configured in area 1 Answer: B, C, F QUESTION NO: 116 How is spanning-tree path cost determined by default? A. Total hop count B. Sum of the costs based on bandwidth C. Dynamically determined based on load D. Individual link cost based on latency

154 Answer: B Sybex CCNA Study Guide 4 th Edition (Page 323) The STP cost is an accumulated total path cost based on the available bandwidth of each of the links. QUESTION NO: 117 Refer to the graphic. What should be the IP address of the host? A B C D E Answer: C QUESTION NO: 118 Which mode can be used to quickly configure a router for basic operations? A. RXBOOT mode B. SETUP mode C. ROM Monitor mode D. Autoflash mode

155 Answer: C QUESTION NO: 119 Acknowledgements, sequencing, and flow control are characteristics of which OSI layer? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 E. Layer 6 F. Layer 7 Answer: C QUESTION NO: 120 On which types of network will OSPF elect a backup designated router? A. Point-to-point and multiaccess B. Point-to-multipoint and multiaccess C. Point-to-point and point-to-multipoint D. Nonbroadcast and broadcast multipoint E. Nonbroadcast and broadcast multiaccess Answer: D Sybex CCNA Study Guide 4th Edition (Page 283) DR and BDR are elected on broadcast and nonbroadcast multi-access networks. QUESTION NO:

156 Popcorn# show ip protocols Routing Protocol is rip Sending updates every 30 seconds, next due in 13 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is Incoming update filter list for all interfaces is Redistribution: rip Default version control: send version 1, receive any version Interface Send Recv Triggered RIP Key-chain Ethernet Ethernet Serial 1 12 Routing for Networks: Routing Information Sources: Gateway Distance Last Update :00:04 An administrator who is consoled into the Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router but unable to ping its Ethernet1 interface. Use the graphic and command output to identify possible causes for this problem. (Choose two) A. The Serial interface of the Popcorn router is shutdown. B. The Ethernet1 interface of the Popcorn router is shutdown. C. The Popcorn router did not include network in its routing configuration. D. The Popcorn router is not forwarding RIP updates. E. The clockrate is missing from the configuration of one of the routers. Answer: A, C QUESTION NO: 122 RtrA#debug ip rip Rip protocol debugging is on RtrA# 1d05h: RIP: sending v1 update to via FastEthernet0/0 ( ) 1d05h: RIP: build update entries 1d05h: network metric 1 1d05h: network metric 2 1d05h: RIP: sending v1 update to via Serial0/0 ( ) 1d05h: RIP: build update entries

157 1d05h: network metric 1 RtrA# 1d05h: RIP: received v1 update from on Serial0/0 1d05h: in 1 hops 1d05h: in 16 hops (inaccessible) Which of the following are true regarding the command output shown in the display? (Choose two) A. There are at least two routers participating in the RIP process. B. A ping to will be successful. C. A ping to will be successful. D. RtrA has three interfaces participating in the RIP process. Answer: A, D QUESTION NO: 123 What is the binary equivalent of the decimal number 231? A B C D E Answer: C QUESTION NO: 124 Which type of EIGRP route entry describes a feasible successor? A. A backup route, stored in the routing table B. A primary route, stored in the routing table C. A backup route, stored in the topology table D. A primary route, stored in the topology table Answer: A

158 QUESTION NO: 125 What are the advantages of using full-duplex Ethernet instead of single-duplex? (Choose two) A. Uses inexpensive hubs B. Provides faster data transfer C. Utilizes fewer pairs of wires D. Operates without collisions E. Operates on coaxial cable Answer: B, C QUESTION NO: 126 While troubleshooting a network problem, a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated. Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version? A. Router# copy tftp flash B. Router(config)# restore flash C. Router(config)# repair flash D. Router# copy flash run E. Router> copy start flash F. Router# copy start flash Answer: A QUESTION NO: 127 Which of the following is a Layer 2 protocol used to maintain a loop-free network? A. VTP B. STP C. RIP D. CDP Answer: B

159 QUESTION NO: 128 Which WAN protocol is used for out-of-band signaling? A. NCP B. HDLC C. LAPB D. LAPD Answer: C QUESTION NO: 129 A Cisco router and a router from another manufacturer are directly connected via a serial link. Which command can be used on the Cisco router to form a WAN connection between the routers? A. Lab(config-if)# encapsulation hdlc ansi B. Lab(config-if)# encapsulation ppp C. Lab(config-if)# encapsulation frame-relay default D. Lab(config-if)# encapsulation isdn Answer: C QUESTION NO: 130 Which address represents a unicast address? A B. FFFF.FFFF.FFFF C /30 D E /18 Answer: E QUESTION NO: 131 Which characteristics describe the routing protocol EIGRP? (Choose two) A. Has a maximum hop count of

160 B. Uses a 32-bit metric C. Can differentiate between internal and external routes D. Supports a single routed protocol E. Can maintain only a single routing table F. Required all networks within an AS to use the same subnet mask Answer: B, C QUESTION NO: 132 What type of packets do routers running OSPF send to maintain connectivity with neighboring routers? A. dead interval packets B. hello packets C. LSU packets D. OSP packets E. keepalive packets Answer: B QUESTION NO: 133 What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two) A. hello packets B. SAP messages sent by other routers C. LSAs from other routers D. Beacons received on point-to-point links E. Routing tables received from other link-state routers F. TTL packets from designated routers Answer: A, D QUESTION NO: 134 Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?

161 A. static NAT B. dynamic NAT C. overloading D. overlapping E. port loading Answer: D QUESTION NO: 135 A catalyst switch must be in which VTP mode in order to delete and add VLANs to a management domain? A. Client B. Server C. Domains D. Transparent E. Designated. Answer: A VTP Modes If you intend to make a switch part of a VTP management domain, each switch must be configured in one of three possible VTP modes. The VTP mode assigned to a switch will determine how the switch interacts with other VTP switches in the management domain. The three VTP modes that can be assigned to a Cisco switch include server mode, client mode, and transparent mode. Each of these roles is outlined below: Server Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a switch can be used to add, delete, and modify VLANs, and this information will be passed to all other switches in the VTP management domain. Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any VLANs added, deleted, or modified by a switch in Server Mode within the same management domain. A switch in VTP client mode cannot make any changes to VLAN information. Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in Server Mode to other switches in the VTP management domain, but will not actually process the contents of these messages. When individual VLANs are added, deleted, or modified on a switch running in transparent mode, the changes are local to that particular switch only, and are not passed to other switches in the VTP management domain

162 Based on the roles of each VTP mode, the use of each should be more or less obvious. For example, if you had 15 Cisco switches on your network, you could configure each of them to be in the same VTP management domain. Although each could theoretically be left in the default Server Mode, it would probably be easier to leave only one switch in this configuration, and then configure all remaining switches for VTP Client Mode. Then, when you need to add, delete, or modify a VLAN, that change can be carried out on the VTP Server Mode switch and passed to all Client Mode switches automatically. In cases where you need a switch to act in a relatively standalone manner, or dont want it to propagate information about its configured VLANs, use Transparent Mode. Define flow control and describe the three basic methods used in networking. Flow control is a function that prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data. Flow control is used to ensure data reliability. There are a number of possible causes of network congestion. In basic terms, flow control is used to control the flow of a message from the sender to the receiver by starting and stopping the message transmission as necessary based on the receivers buffer. It is a protocol mechanism that allows the receiver to control the rate at which the sender can transmit data. It makes it possible for a receiver running on a low speed computer to accept data from high speed sender, without being overrun. Usually it is because a high-speed computer generates data faster than the network can transfer it, or faster than the destination device can receive and process it. There are three commonly used methods for handling network congestion: Buffering Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data continues at high speeds Source Quench Messages Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The receiving device sends a source quench message to request that the source reduce its current rate of data transmission. Windowing Windowing is a flow-control method in which the source device requires an acknowledgement from the destination after a certain number of packets have been transmitted. 1. The source device sends a few packets to the destination device. 2. After receiving the packets, the destination device sends an acknowledgment to the source. 3. The source receives the acknowledgment and sends the same amount of packets. 4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate. Windowing is reliable because it uses positive acknowledgement which requires the recipient device to communicate with the sending device, sending back an acknowledgement when it receives data. If the sending device does not receive an acknowledgement it knows to retransmit the packets at a reduced transmission rate. If the receiving device sends a packet with a zero window size, it means it s buffers are full and it cannot receive any more data. Transmission is resumed when the receiving device sends a packet with a window size higher than zero. TCP at the Transport layer uses Windowing as a method flow control. Two mechanisms used with windowing ensure the delivery of segments with no duplication or data loss. These include Acknowledgements and Negative Acknowledgements and also sequencing and necessary retransmission. All these technologies work together to provide data reliability and optimal performance

163 QUESTION NO: 136 Which of the following are types of flow control? (Choose 3) A. Buffering. B. Cut-Through. C. Windowing. D. Congestion Avoidance. E. Load Balancing. Answer: A, C, D There are three commonly used methods for handling network congestion: Buffering Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data continues at high speeds Source Quench Messages Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The receiving device sends a source quench message to request that the source reduce its current rate of data transmission. Windowing Windowing is a flow-control method in which the source device requires an acknowledgement from the destination after a certain number of packets have been transmitted. 1. The source device sends a few packets to the destination device. 2. After receiving the packets, the destination device sends an acknowledgment to the source. 3. The source receives the acknowledgment and sends the same amount of packets. 4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate. QUESTION NO: 137 A training company called TestKing has three production facilities. Two of the facilities have network connectivity to each other. The third facility has recently received a router and is to be connected to the other two. The names of routers are QA, StudyGuide, and Examinator. Configure the Examinator router's IP addresses on the E0 and S1 interfaces so that the E0 resolves the first usable subnet while S1 receives the second usable subnet from the network /27. Both interfaces should receive the first available IP of the subnet. The zero subnet should not be used. The routers have been configured with the following specifications:

164 The routers are named QA, StudyGuide, and Examinator RIP is the routing protocol Clocking is provided on the serial 0 interfaces. The secret password on the Examinator router is "testking" The IP address are listed in the chart below. Name: QA E0 : S0 : Name: StudyGuide E0 : S0 : S1 : Name: Examinator E0 : to be determined S1 : to be determined Secret Password: testking Task: To configure the router click on the host icon that is connected to the router by a serial cable. Answer: Examinator#config t Enter configuration commands, one per line. End with END. Examinator(config)#int e 0

165 Examinator(config-if)#ip add Examinator(config-if)#no shut Examinator(config-if)#exit Examinator(config)#int s 1 Examinator(config-if)#ip add Examinator(config-if)#no shut Examinator(config-if)#CTRL+Z Examinator#copy ru st.... [OK] Examinator# QUESTION NO: 138 Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are configured, and the network is functional. Configure and apply an access list will prevent telnet access to the TestKing1 router while allowing all other traffic to pass. The access list should not contain more than three (3) statements and should be applied to the TestKing3 router. The routers have been previously configured with the following specifications: The routers are named TestKing1, TestKing2, and TestKing3. RIP is the routing protocol. The clocking signal is provided on the serial 0 interfaces. All passwords on all routers are "testking". The subnet mask on all the interfaces is the default mask. IP addresses are listed in the chart below. TestKing1 E S Secret password: testking TestKing2 E S S Secret password: testking TestKing3 E S

166 To configure the router click on the host icon that is connected to a router by a serial console cable. Answer: Pending. Send your suggestion to feedback@testking.com. Note: Compare to Question 54.

167 Section C practice questions QUESTION NO: 1 RouterTK#show ip route Codes: route C-connected, s-static, l IGRP, R RIP, M mobile, B BGP, D EIGRP, EX EIGRP external, O OSPF, IA OSPF inter area, EI OSPF external type 1, E2 OSPF external type 2, E EGP, i IS-IS, L1 IS-IS level-1, L2 IS-IS level-2, * -candidate default, U per-user static Gateway of last resort is not set R /24[120/1] via , 00:00:16, Serial 0 C /24 is directly connected, Serial 1 R /24 is possibly down, routing via , Serial 1 R /24 is possibly down, routing via , Serial 1 C /24 is directly connected, Ethernet 0 C /24 is directly connected, Serial 0 R /24 [120/1] via , 00:00:17. Serial 0 R /24 [120/15/ via , 00:00:17, Serial 0 R /24 [120/15] via , 00:00:17, Serial 0 R /24 [120/15] via , 00:00:17, Serial 0 R /24 [120/1] via , 00:00:17, Serial 0 You are troubleshooting a router with default settings. You are concerned about the and routes. In particular you are interested how long they will be kept in the routing table. What would be the maximum time these routes would be kept in the routing table? A. 30 seconds B. 60 seconds C. 240 seconds D. 360 seconds E. 630 seconds Answer: C The Rs on the and lines (see below) indicates that the routes were learned from the RIP protocol. : R /24 is possibly down, routing via , Serial 1 R /24 is possibly down, routing via , Serial 1 Note: The hold down timer for RIP is 180 sec. The flush timer for RIP is 240 sec

168 QUESTION NO: 2 RouterTK#show ip route Codes: route C-connected, s-static, l IGRP, R RIP, M mobile, B BGP, D EIGRP, EX EIGRP external, O OSPF, IA OSPF inter area, EI OSPF external type 1, E2 OSPF external type 2, E EGP, i IS-IS, L1 IS-IS level-1, L2 IS-IS level-2, * -candidate default, U per-user static Gateway of last resort is not set R /24[120/1] via , 00:00:10, Serial 0 C /24 is directly connected, Serial 1 R /24 [120/7] via , 00:00:02, Serial 1 R /24 [120/7] via , 00:00:03, Serial 1 C /24 is directly connected, Ethernet 0 C /24 is directly connected, Serial 0 R /24 [120/1] via , 00:00:10. Serial 0 R /24 [120/15/ via , 00:00:10, Serial 0 R /24 [120/15] via , 00:00:10, Serial 0 R /24 [120/15] via , 00:00:10, Serial 0 R /24 [120/1] via , 00:00:10, Serial 0 You examine the routing table of your router named RouterTK. This routing table will be send to neighboring routers via broadcasts. Some routes might be discarded and not entered in to the routing tables of the neighboring RIP routers. Which of the following routes would be discarded in this way? A. R /24 [120/1] via , 00:00:10, Serial0 B. R /24 [120/7] via , 00:00:03, Serial1 C. C /24 is directly connected, Ethernet0 D. R /24 [120/15] via , 00:00:10, Serial0 Answer: D RIP has the maximum hop count of 15. This route already has a hop count of 15 and adding one would make it unreachable (see below). This route will be discarded. R /24 [120/15] via , 00:00:10, Serial0 QUESTION NO: 3 At Layer 2 of the OSI model, which component connects a host to the network media? A. Hub B. Switch C. Bridge

169 D. NIC E. Transceiver Answer: D The data link layer is layer 2 of the OSI model. The data link layer involves frames and uses the burned in MAC addresses that NIC cards and router interfaces have. Incorrect Answers A: A hub operates at the physical layer, layer 1. C: Bridges operate the Data Link layer, layer 2, of the OSI model. However, they are used to connect network segments, not to connect hosts to the network media. B: Bridges operate the Data Link layer, layer 2, of the OSI model. However, they are not used to connect hosts to the network media. E: A transceiver works at the physical layer, layer 1. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 4 You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this? A. There is insufficient room for more than one image. B. The router has detected a copy of the current software image on the TFTP server. C. The file can be relocated and not compressed. D. The image to load is a binary executable file. Answer: A There might not be enough free Flash memory to store the new image. Incorrect Answers: B. Detecting a copy of the image will not stop the procedure nor prompt you to erase the current version. C. This would not stop the copying of the file. D. The image is a binary executable file but this will not result in the prompt above. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO:

170 Identify three valid host addresses in the network with a subnet mask of (Choose three) A B C D E F Answer: A, C, D A subnet mask of divides the 4 th octet into a subnet parts: the highest four bits, and a host port: the lowest four bits. We simply check the 4 th octet to check that all subnet and host parts are ok. i.e that cannot be: 0000 or 1111 A: 33 decimal is Both the subnet and the host part are ok. C: 119 decimal is Both the subnet and the host part are ok. D: 126 decimal is Both the subnet and the host part are ok. Incorrect Answers B: 112 decimal is binary. This is not a valid host address in this network. It has all host bits 0. E: 175 decimal is All host bits are 1 s. This is the local broadcast address and cannot be used as a host address. F: 208 decimal is binary. This is not a valid host address in this network. It has all host bits 0. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 6 Exhibit:

171 A network administrator in London has been instructed to prevent all traffic originating on the Paris LAN from entering the TestKing2 router. Which statement would accomplish this filtering? A. access-list 101 deny ip any B. access-list 101 deny ip any C. access list 101 deny ip D. access-list 101 deny ip any Answer: A The access-list is configured to deny all the traffic from Paris router network to any network in london. The wild card mask also correctly defined for Class C network. Incorrect Answers B: Wild card mask for network is wrong. Wild card mask should be instead of C: This access list deny all traffic from network to network( There is type in this answer 192 as printed as 198.This can be defined at Testking 1 router if we want to deny traffic from London network ( ) to Paris Network( ) D: This access-list deny traffic from network to any network. QUESTION NO: 7 Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? A. frame-relay arp B. frame-relay map C. frame-relay interface-dlci D. frame-relay lmi-type Answer: B If inverse arp is not in use,frame-relay map command maps next-hop router's Layer 3 address with Local DLCI to reach that router. Incorrect answers A: There is no such command. C. This Command is used to define DLCI to particular physical interface or Sub Interface. Eg. frame-relay interface-dlci 40 D: This Command is used to define type of LMI messages sent to the switch. The supported LMI types are ansi,q933a,cisco

172 QUESTION NO: 8 A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets? A B C D E F Answer: E First task is which IP address is valid Broadcast address for any of the /27 subnets. By definition broad cast address means all the host bits are 1. In this example 5 bits are used for host. Verify each IP address 4 th byte in binary form to see 5 least significant bits are 1. In this example answer E, 4 th byte in the IP address is 159. Decimal value is So This is broadcast address for /27 network. Incorrect answers A: Binary value for 33 is This is not broadcast address for /27 network B: Binary value for 64 is This is not broadcast address for /27 network C, D: Binary value for 97 is This is not broadcast address for /27 network F: Binary value for This is not broadcast address for /27 network QUESTION NO: 9 Which of the following describe router functions? (Choose three) A. Packet switching B. Collision prevention on a LAN segment C. Packet filtering D. Broadcast domain enlargement E. Broadcast forwarding F. Internetwork communication Answer: B, C, F C: In Packet switching process, packet will be filtered at a particular physical Interface during packet switching. F: In OSI Model each layer dependent on the layer below and above layer for Internetwork communication. Here Router works with Data Link layer and Transport layer

173 Incorrect answers D, E: Broadcast activity is not the function of Router. Router will not transmit Broadcast information out to another router. QUESTION NO: 10 The following access list was applied outbound on he E0 interface connected to the /29 LAN: access-list 123 deny tcp eq 20 any access-list 123 deny tcp eq 21 any What effect will this access list have? A. All traffic will be allowed to exit E0 except FTP traffic. B. FTP traffic from to any host will be denied. C. FTP traffic from to any host will be denied. D. All traffic exiting E0 will be denied. E. All FTP traffic to network /29 from any host will be denied. Answer: D By default access list is having implicit deny statement at the end. In this example there is no permit statement, so it will deny all traffic exiting E0 Interface. Incorrect answers A: It will deny FTP and Telnet Traffic B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit statement at the end. QUESTION NO: 11 Exhibit: hostname TESTKING-A!! interface Ethernet0 ip address ! interface Serial0 ip address clockrate 56000! interface Serial

174 ip address ! router rip network ! line con 0 password testking login line aux 0 line vty 0 4 password testking login!end Five new routers need to be configured quickly for testing. While connected to a router by console, the administrator copies and pastes a configuration from e text file, a part of which is shown in the exhibit, into the HyperTerminal window. Why would host /29 be unable to ping the Ethernet interface of the router as a result of this procedure? A. The new configuration needs to be saved to the NVRAM before the changes take effect. B. The router needs to be reloaded before the changes are implemented. C. The Ethernet network does not show up in the routing table because the RIP configuration is incomplete. D. The copied configuration did not overwrite the shutdown command on the Ethernet interface. E. The subnet mask on the router prevents the host from communicating with it. Answer: A QUESTION NO: 12 Exhibit:

175 A network administrator has been instructed to prevent all traffic originating on the TestKing1 LAN from entering the TestKing2 router. Which command would implement the access list on the interface of the TestKing2 router? A. access-list 101 in B. access-list 101 out C. ip access-group 101 in D. ip access-group 101 out Answer: C In order to use access list for an interface ip access-group command to be defined on interface. Before defining ip access group in an interface one should configure access-list. If ip access-group is not defined it will permit all traffic. Incorrect answers A, B: There are no such commands. D: This will apply on an interface for outgoing packets from the interface. Our question requires access-list to be applied for incoming packets to a particular interface on Testking2. QUESTION NO: 13 A training company called TestKing has three production facilities. Two of the facilities have network connectivity to each other. The third facility has recently received a router and is to be connected to the other two. The names of routers are QA, StudyGuide, and Examinator. Configure the Examinator router's IP addresses on the E0 and S1 interfaces so that the E0 resolves the first usable subnet while S1 receives the second usable subnet from the network /27. Both interfaces should receive the first available IP of the subnet. The zero subnet should not be used. The routers have been configured with the following specifications: The routers are named QA, StudyGuide, and Examinator RIP is the routing protocol Clocking is provided on the serial 0 interfaces

176 The secret password on the Examinator router is "testking" The IP address are listed in the chart below. Name: QA E0 : S0 : Name: StudyGuide E0 : S0 : S1 : Name: Examinator E0 : to be determined S1 : to be determined Secret Password: testking Task: To configure the router click on the host icon that is connected to the router by a serial cable. Answer:

177 The network address is /27. Here 5 bits are used for host. Total valid hosts in each subnetwork are 2 to the power of 5 2. This gives 30 hosts on each subnetwork. The range of each network is below. Subnet 0. Valid Host addresses are to Subnet 1: Valid Host addresses are to Subnet 2: Valid host addresses are to Use first available IP address to Ethernet 0 from 1 st usable subnet. Use first available IP address to interface s1 from 2 nd usable subnet. QUESTION NO: 14 Which of the following statements regarding routed and routing protocols are true? (Choose two)

178 A. A routed protocol is assigned to an interface and determines the method of packet deliver. B. A routing protocol determines the path of a packet through a network. C. A routed protocol determines the path of a packet through a network. D. A routing protocol operates at the transport layer of the OSI model. E. A routed protocol updates the routing table of a router. Answer: A, B A: Routed Protocol delivers data to an interface or host. B: Routing Protocol Routes data. Incorrect answers C, E: Routed protocol only delivers data, Routed Protocol will not update any routing tables. D: A Routing Protocol operates on Layer 3 of OSI Model. ie Network layer. QUESTION NO: 15 What is the subnetwork address for a host with IP address /28? A B C D E F Answer: D Using the subnet mask prefix value 28, 4 bits are left for host portion. Total number of hosts are 16 ( 2 are reserved for Network and Broadcast in each subnetwork) host will reside in subnetwork Valid Hosts in this network are to Incorrect answers A: It is network address for subnet 0. Valid hosts are to B: It is network address. Valid hosts are to C: It is one of the valid host in subnetwork E: It is broadcast address F: It is valid host in subnetwork

179 QUESTION NO: 16 Exhibit: The network administrator of the TestKing1 router adds the following command to the router configuration: ip route What are the results of adding this command? (Choose two) A. The command establishes a static route. B. The command invokes a dynamic routing protocol for C. Traffic for network is forwarded to D. Traffic for all networks is forwarded to E. This route is automatically propagated throughout the entire network. Answer: A, C IP route command defines static route on a particular router, Traffic from network is forwarded to ( IP address of next hop interface). Incorrect answers B: It will not invoke any routing Protocol. It defines static route. D: Only traffic from network is forwarded to E: It will not propagate route automatically by using ip route command. Route will be propagated only if you defined routing protocol configured networks. QUESTION NO: 17 An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Select two)

180 A. The switch must be configured with an IP address, subnet mask, and default gateway. B. The switch must be connected to a router over a VLAN trunk. C. The switch must be reachable through a port connected to its management VLAN. D. The switch console port must be connected to the Ethernet LAN. E. The switch management VLAN must be created and have a membership of at least one switch port. F. The switch must be fully configured as an SMTP agent. Answer: A, C A: You need IP address, subnet mask and default gateway. C: The switch must be reachable from outside of the LAN. Incorrect Answers: B: It does not need to be connected to a router over a VLAN trunk (This is router-on-the-stick configuration) and not a requirement of the question. D: The switch console port must not be connected to the Ethernet LAN but instead to the host (PC) using rollover cable. E: The switch management VLAN is already created by default (VLAN1). F: You don't need SMTP agent for this question, SMTP is for . QUESTION NO: 18 Which of the following belong to the ISDN TE2 function group? (Choose two) A. A standard PC. B. An ISDN phone. C. An ISDN terminal adapter. D. A router serial interface. E. A router ISDN BRI U interface. Answer: A, D TE2 is used to connect any non isdn device by using TA ( Terminal adaptor). In this example Standard PC and router serial interface on non-isdn Terminals. Router BRI or PRI interface are ISDN compatible ports. Incorrect answers B,C, E: Theses are ISDN compatible devices. It uses ISDN TE1 function. QUESTION NO: 19 Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes

181 that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes. Which commands will accomplish these options? (Choose two) A. show hosts B. show sessions C. show connections D. disconnect E. CTRL+SHIFT+6x F. exit Answer: B, D Show sessions will display connection id, hostname and IP address details. Disconnect will inform closing the connection for specified hostname. Incorrect answers A: Show hosts list all hostnames and corresponding ip address in a router. C: Show connections will provide connection id. E,F: These are used for exiting from the present mode. QUESTION NO: 20 Exhibit:

182 The RIP network shown in the exhibit has been fully operational for two days. Each routing table is complete. Which networks will be included in the next routing update from the TestKing1 router to the TestKing3 router? A. A,B,C,D,E,F B. A,C C. A,B,C,D D. B,D E. D,E,F F. A,B,C Answer: F TestKing3 gets routing update from TestKing1 with the following information: Network A, metric 1 Network B, metric 1 Network C, metric 2 Incorrect Answers: A: Not A because of split horizon. It is never useful to send information about a route back in the direction from which the original update came. B: Not B because it is missing one routing update information (Network B). C, D, E: Not C, D & E because you don't get a routing update for your directly connected network (Network D). QUESTION NO: 21 What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure? A. To restart the router. B. To bypass the configuration in Flash. C. To view the password before changes are made. D. To bypass setup configuration mode. E. To access ROM Monitor mode. Answer: E The value 0x2142 to be set for configuration register in case of password recovery procedure. The value to be set in ROM Monitor mode. Incorrect answers:

183 A: To restart the router one can execute reload command in Privilege mode. B: Ctrl+ Break will not bypass the configuration in the flash C: Ctrl + Break will not show the password E: Ctrl+Break will not bypass Setup mode. Setup mode is Router configuration mode that prompts the user for basing configuration Parameters. QUESTION NO: 22 Which connections allow the use of full-duplex Ethernet? (Choose three) A. Switch to host B. Switch to switch C. Hub to hub D. Switch to hub E. Host to host Answer: A, B, E Host and Switch works in full duplex mode. Incorrect answers: C,D: Hub Operates in half duplex mode. So connection from Hub to hub or Hub to switch works in half duplex mode. QUESTION NO: 23 Which of the following host addresses are member of networks that can be routed across the public Internet? A B C D E F Answer: C, E, F These addresses are not Private addresses defined by RFC These addresses can be routed across public Internet. Incorrect answers:

184 A,B,D: These addresses are in Private address Range: The range of Private addresses are to , to and to QUESTION NO: 24 Given a subnet mask of , which of the following addresses can be assigned to network hosts? (Select three.) G H I J K L Answer: B, C, D B: Valid Host in subnetwork 2 ( to ) C: Valid Host in subnetwork 1( to ) D: Valid host in subnetwork 2 ( to Incorrect answers: A. is a broadcast E. is a broadcast F. is a network id QUESTION NO: 25 A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network. Which commands could be used to find this information? F. Router# show protocols G. Router# show version H. Router# show image I. Router# show IOS J. Router# show flash Answer: B

185 "Show flash" displays all the image files in it. There could be more than one file. However, "show version" displays the one that is currently in use by the router.) Incorrect answers: A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address if configured. C,D. There are no such commands. QUESTION NO: 26 Exhibit: hostname tess hostname tess!! username tess password testking! username tess password testking!! interface serial 0 interface serial 0 ip address ip address encapsulation ppp encapsulation ppp ppp authentication chap ppp authentication chap clockrate The output shown in the exhibit was taken from two directly connected routers. Based on the output, which of the following would be displayed when the command Router# show interface serial 0 is entered? (Choose two) A. Serial 0 is up, line protocol is up B. Serial 0 is up, line protocol is down C. LCP open D. LCP closed Answer: B, D For Chap Authentication to perform both Routers should have different hostnames. Each router will refer other router hostname in username command. In this both routers are same hostname. Chap will not perform during PPP negotiation phase. LCP will be terminated. Incorrect answers: A, C: Chap will not be successful because both are pointing to same username. These conditions will not occur. QUESTION NO: 27 Exhibit:

186 Which of the following will configure a static route on Router TestKing1 to network /24 with an administrative distance of 90? A. Testking1(config)# ip route B. Testking1 (config)# ip route C. Testking1 (config)# ip route D. Testking1 (config)# ip route E. Testking1 (config)# ip route Answer: E The syntax is: ip route (Destination prefix) (Destination Prefix mask) (Forwarding Router s address) (Distance metric for this route). In this example it is defined according to syntax. Incorrect answers: A, B: Destination prefix is not matching according to question, Administrative distance also not configured. C: IP address is not network address. It is one of the interface address on Router TestKing1. D: IP address is not network address. It is one of the interface address on Router TestKing2. QUESTION NO: 28 A router with a serial interface will be used for an ISDN link

187 What other function group devices are required to complete the connection to the service provider? (Choose two) A. TE1 B. TE2 C. TA D. NT1 E. NT2 Answer: C, D C: TA is used connect Non ISDN Device. Serial Interface is non-isdn port. BRI Port is IDSN port. D: NT1 is required to Connect to Service Provider. It converts 2-wire line from Service Provider into 4-wire line. Incorrect answers: A: TE1 is used to connect ISDN Terminal. B: TE2 is used to connect non-isdn terminal via TA E: Equipment that uses T interface point to Telco outside North America. QUESTION NO: 29 The network needs to be divided into subnets where each subnet has the capacity of 458 IP addresses. What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? Answer: To obtain 459 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned. Keep 9 bits for host means 4 th octet and last bit is 3 rd will be 0. This gives is subnet mask. QUESTION NO: 30 New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport. Which switching mode should be configured on the new switches to provide error-free transport to the network?

188 A. cut-through B. fragment-free C. frame-filtering D. store-and-forward E q forwarding F. VTP transparent mode Answer: D The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check the FCS before forwarding the frame. FCS is Ethernet Trailer. Incorrect answers: C. The Switch performs the address table lookup as soon as the destination address field in the header is received. The first bits in the frame can be sent out to out port before the final bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check. D. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked. C,E,F : They are not related to Switch mode transport. QUESTION NO: 31 What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router? A. To restart the router. B. To bypass the configuration in NVRAM. C. To view the lost password. D. To save the changes to the configuration. E. To enter ROM Monitor mode. Answer: B On setting 0x2142 in ROM Mon mode Router will bypass configuration in NVRAM. After that user can set new password. Incorrect answers: A. Restart the router can be executed by reload command C: Directly one can not view the lost password by changing the config register 0x2142 D: One can save the config by write command. E: Pressing Ctrl+ break Router will enter into ROM Mon mode

189 QUESTION NO: 32 Which command is used to display the placement and direction of an IP access control list on a router? A. show access-list B. show ip route C. show ip interface D. show interface E. show interface list F. show ip interface brief Answer: C Page 324 of Interconnecting Cisco Network Devices by Steve McQuerry, The show ip interface command displays IP interface information and indicates whether any access lists are set for a specific interface. Incorrect answers: A. show access-list will display all configured access lists but not the placement or direction B. show ip route will show the contents of the ip routing table D. show interface will display the status of an interface, including the encapsulation method, but not the access control list. E. show interface list is not a valid command F. show ip interface brief is not a valid command QUESTION NO: 33 You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise. Which of the following are required to allow remote management of the switch over IP? (Choose two) A. The switch name must match the workgroup name of the local network. B. The switch must be configured with an IP address and default gateway. C. The remote workstations must have access to the management VLAN of the switch. D. CDP must be enabled on the switch so that it can be located by other devices on the network. Answer: B, C For managing switch remotely an IP address and default gateway to be defined on the Switch. The workstations should have access to Management VLAN. I.e. VLAN 1 of the switch. Incorrect answers: A: There is no such requirement D:CDP will determine directly connected devices. It will not play any role for managing switch remotely

190 QUESTION NO: 34 TestKing.com has allocated the IP add is its network, to provide flexibility for the LAN design, a subnet mask of has been chosen. Which of the following address can be assigned to LAN on the resulting subnets (Choose three) A B C D E F Answer: A, C, D These are valid addresses used for hosts. Incorrect Answers: B, F: These are network addresses. E: This is the broadcast address of network QUESTION NO: 35 A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? A. TE1 B. TE2 C. NT1 D. NT2 Answer: C NT1 is used to connect Service Provider. Reference: ICND by Steve McQuerry (Cisco Press: 2000) pages Incorrect answers: A: TE1 is used for connecting ISDN Terminal B: TE2 is used for connecting non ISDN terminal with TA D: NT2 Equipment that uses T interface point to Telco outside North America QUESTION NO: 36 How many usable sub network and usable hosts per subnet result in the network address is sub netted with a mask of /26?

191 A. 64 network and 4 hosts B. 4 network and 64 hosts C. 2 network and 62 hosts D. 62 network and 2 hosts Answer: C On the 4th. octet, /26 will have 2 bits (Subnetwork) and 6 bits (Hosts). Formula: 2^n-2 Networks: 2^2-2 = 2 networks Hosts: 2^6-2 = 62 hosts QUESTION NO: 37 Which of the following if addresses can be assigned to host devices (Choose two) A /27 B /23 C D E /28 F /13 Answer: B, F Incorrect Answer: A: This is a network address. C: That is a loop-back address. D: That is a Type D (Multicast) address. E: This is a broadcast address. QUESTION NO: 38 All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network. A. show CHAP authentication B. show interface serial 0 C. debug PPP authentication D. debug CHAP authentication

192 E. show PPP authentication CHAP Answer: C This command displays all PPP events occurred between two Routers. ( LCP and NCP phase) Incorrect Answers: A, B, E: Show command won't show the process as it occurs between the 2 routers. D: That is an invalid command. QUESTION NO: 39 Exhibit: Refer to the exhibit. Host TK1 has established a connection with the HTTP Server attached to interface E0 of the TestKing2 Router. Which of the following statements describe the information in protocol data units send from host TK1 to this server? (Choose three) A. The destination port number in a segment. Header will have a value of 80. B. The destination port number in a segment. Header will have a unique value greater than or equal to C. The destination address of a frame will be the MAC address of the HTTP Server inter face. D. The destination address of a frame will be the MAC address of the E0 interface of the ABC router. E. The destination IP address of a Packet will be the IP address the E0 interface of the ABC router F. The destination IP address of a packet will the IP address of the network interface of the HTTP. Answer: A, D, F

193 A: The destination port should be port 80 and the source port should be dynamically assigned. D & F: The preceding explanation is taken from the reference book Internetworking Technologies Handbook, 3rd Edition (Cisco Press: 2001) pages Having acquired a router's address by some means, the source host sends a packet addressed specifically to a router's physical (MAC) address, this time with the protocol (network layer) address of the destination host. As it examines the packet's destination protocol address, the router determines that it either knows or does not know how to forward the packet to the next hop. If the router does not know how to forward the packet, it typically drops the packet. If the router knows how to forward the packet, however, it changes the destination physical address to that of the next hop and transmits the packet. The next hop may be the ultimate destination host. If not, the next hop is usually another router, which executes the same switching decision process. As the packet moves through the internetwork, its physical (MAC) address changes, but its protocol (network layer - ip address) address remains constant. QUESTION NO: 40 Exhibit: Refer to the Router Topology show in exhibit Assuming that all routers are running RIP. Which statement describe how the Router Exchange their routing table. (Choose two). A. Utah Exchanges With TestKing. B. Utah Exchanges With Berlin. C. Utah Exchanges With Paris. D. Berlin Exchanges With TestKing. E. Berlin Exchanges With Utah. F. Berlin Exchanges With Paris

194 Answer: A, D In RIP routing protocol Routers exchange routing table only with directly connected Routers. In this case Utah and Berlin are directly connected to Testking. Incorrect answers: B,C,E,F: In these cases Routers defined in the example are not directly connected. QUESTION NO: 41 What does a configuration Register Setting of 0x2105 indicate to the Router? A. The Boot IOS Code is Located in the NVRAM. B. Check NVRAM for boot system Commands. C. Bypass NVRAM Configurations. D. Boot the IOS Code Located in ROM. E. Perform a Password Recovery. F. Bypass The Code In ROM. Answer: B It is stated in the book ICND by Steve McQuerry page 127 that if the configuration register boot field value is from 0x2 to 0xF, the bootstrap code parses any configuration in NVRAM for boot system commands. Incorrect Answers: A: Statement is wrong because IOS code is located in flash not NVRAM (startup-configuration) C: Register setting of 0x2105 where 5 is the boot field. Boot field value of 0x2 to 0xF will look for startupconfiguration in the NVRAM and won't be bypass. D: Statement is wrong because IOS code is located in flash not ROM (RxBoot). E: This register is not for password recovery. F: This statement is wrong. QUESTION NO: 42 Exhibit: The Frame relay circuit between TestKing1 & TestKing2 is experiencing congestion. Which type of

195 notification are used to alleviate the congestion? (Choose three) A. FECN B. CIR C. BECN D. DE E. DLCI 100 is Down Answer: A, C, D A: The FECN is the bit in the Frame relay header that signals any one receiving the frame that congestion is occurring in the same direction of the frame. C: BECN is same as FECN, but congestion is occurring in the opposite direction of the frame. D: The DE is the bit in the frame relay header that signals to a switch to, if frames must be discarded, please choose this frame to discard instead of another frame without the DE bit set. Incorrect answers: B: CIR is the rate at which DTE can send data for an individual virtual circuit. It is not related to congestion. E: DLCI is used for identifying virtual circuit. It will not give any information for congestion. QUESTION NO: 43 Exhibit: Given a Network with a switched topology as illustrated. What will be the result if the Spanning-Tree Protocol is disabled on all the switches? (Choose two) A. Broadcast Storm will occur. B. Broadcast Storm will be detected quickly. C. At least one link will be placed in standby. D. Loops will occur

196 E. Loops will be detected quickly. Answer: A, C Each switch broad casts data to other switch; It will create Broadcast storm and generate loops with in switches. Incorrect answers: B: Broadcast storm will be detected after all switches sending broadcast information D: There is no Standby mode in Spanning Tree protocol. ( Blocking,Listening,Learning and Forwarding are the modes) QUESTION NO: 44 Exhibit: After Configuring the router show in the exhibit, the TestKing technician decides to test and document the network, pings from the technician s laptop to all of the interface on each router were successful, if a technician initiates a telnet session to Router TestKing1 and issues the show arp command, which of the following items will be among the entries displayed in the output? A. The MAC address of the S0 interface on Router TestKing1 B. The MAC address of the E0 interface on Router TestKing1 C. The MAC address of the S0 interface on Router TestKing2 D. The MAC address of the E0 interface on Router TestKing2 Answer: B Because the question stated that the technician initiated a telnet session to Testking1 not TestKing2 so the layer 2 destination address will have the TestKing1 MAC address. Incorrect Answers: A, C: Serial interfaces don't have layer 2 addresses (MAC addresses)? D: Telnet initiated from Testking 1. It will not show Mac address of EO on Testking2 QUESTION NO:

197 Exhibit: *** Out Put Omitted*** MTU 1500 bytes, Bw kbit, Dly 100 Usec. reliability 128/255, txload 1/255. rx 253/255 Encapsulation Arpa, Loopback not set Keepalive set (10 sec) Arp type: Arpa Timeout 04:00:00 Last Input 21:24:36, output 00:00:08, Output hang never *Out Put Omitted*** Users have been complaining that network applications are running very slowly and responding to input commands intermittently. While troubleshooting the problem, a TestKing technician issues the slow interface E0 command on the router attached to the network. Based on the partial output shown in the exhibit.. Which of the following items indicates that interface E0 is overloaded and causing the network to perform slowly? A. MTU 1500 bytes B. BW kbit C. DLY 1000 usec D. Reliability 128/255 E. txload 1/255 F. rxload 253/255 Answer: D Interface E0 is only 50% reliable (128/255) where 255/255 being 100% reliable. Incorrect Answers: A, B, C: Because those are default settings and those output are the output readings in normal operation. QUESTION NO: 46 Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two) A. Transport layer divides a data stream into segments & adds reliability & flow control information B. Data link layer adds physical source & destination address & an FCS to the segment C. Packets are created when the network layer encapsulate a frame with source & destination host address & protocol related control information D. Packets are created when the network layers adds layers 3 address & control information to a segment E. The presentation layer translated bits into bits into voltages for transmission across the physical link

198 Answer: A, D A: It is the function of Transport layer. TCP and UDP operates in this layer D: It is the function of the network layer. Incorrect answers: B: It will use frames instead of segments. C: The network layer can not encapsulate frame. It adds Layer 3 address to segment received from transport layer. E: It is not the function of Presentation layer. It is function of Physical layer. QUESTION NO: 47 Exhibit: Given the topology as illustrated, what commands are needed to configure IGRP on the TestKing1 Router? (Choose three) A. TestKing1 (config ) # Router IGRP 100 B. TestKing1 (config) # router IGRP C. TestKing1 (config - router) # network D. TestKing1 (config - router) # network E. TestKing1 (config - router) # network F. TestKing1 (config - router) # network Answer: A,?,? More information needed. In particular the IP configuration of the routers. A. The 100 in the answer is process-id Network addresses are not defined on each Router in the Exhibit Topology

199 QUESTION NO: 48 Exhibit: MTU 1500 bytes, Bw Kbit, Dly 1000 usec, reliability 128/255, txload 1/255, rxload 1/255 Encapsulation Arpa, loopback not set Keepalive set (10 Sec) ARP type: Arpa, Arp Timeout 04:00:00 Last Input 21:24:36, output 00:00:08, output hang never last clearing of show interface countees never Queuing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75: drops 5 min input rate 0 bits/sec, 0 packets/sec 5 min output rate 0 bits/sec, packets/sec packet input, bytes, 0 buffer Received broadcast, 933 runts, 253 giants, 0 throttles 0 input error, 0 cvc, 0 frame. 0 overrun, 0 ignored 0 input packet with dribble condition detected packet output, bytes, 0 undernuns During routine network maintenance, a technician issues the show interface E0 command. A partial output of the command is shown in exhibit which values displayed in the command output could indicate that collisions have occurred (Choose two) A. MTV 1500 bytes B. Reliability 128/255 C. 933 runts D broadcasts E packets output F. 253 giants Answer: C, F C. Runts means number of packets that are discarded because they are smaller than the minimum packet size of the medium. F. Giants means number of packets that are discarded because they exceed the maximum packet size for the medium. QUESTION NO:

200 The command frame relay map ip broadcast was entered on the router. Which of the following statement is true concerning this command? A. This command should be executed from the global configuration mode. B. The IP address is the local router part used to forward data. C. 102 is the remote DLCI that will receive the information. D. Command is required for all frame relay configuration. E. The broadcast option allows packet, such as RIP update, to be forwarded across the PVC. Answer: E Incorrect Answers: A: The mentioned command is executed at the interface configuration mode. B: The ip address is the adjacent router's address not the local router. C: 102 is the local significant DLCI not remote DLCI. D: Command is not required for all frame relay configuration. You can use the frame interface-dlci command using sub-interface (point-to-point). QUESTION NO: 50 Exhibit: Which of the following is the minimum configuration commands required to bring up the ISDN link shown in graphic. Note : SPIDs are not required for this switch. (Choose three) G. Router(Config-if)# encapsulation ppp H. Router(Config-if)# isdn switch-type type I. Router(Config-if)# dialer-list, protocol ip permit J. Router(Config-if)# dialer map ip address name name connection number. K. Router(Config-if)# ip address subnet mask L. Router(Config-if)# dialer group 1 Answer: A, E, F A: Proper encapsulation to be defined on both routers

201 E: IP address to be assigned for interface with subnet mask F: Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration command. Incorrect Answers: B, C:The commands are executed on global configuration command. D: Syntax is wrong. Proper syntax is dialer map ip ip address/subnet mask name connection name number. QUESTION NO: 51 Which of the following contribute to congestion on an Ethernet network. (Choose two) A. Use of full duplex mode. B. Creation of new collision domain. C. Creation of new broadcast domain. D. Addition of hub to the network. E. Use of switches in the network. F. Amount of ARP or IPX SAP traffic. Answer: D, F D: Hub works on Half duplex mode. If more devices connect to a hub and sending simultaneously collision will occur.it contributes to congestion. F: ARP also creates congestion in the network Incorrect answers: A: Full Duplex will not generate congestion in the network. B: Creation of new collision domain means connecting a switch instead of Hub will not contribute congestion. Switch isolates collision domain. C: Creation of VLAN s in a switch isolate broadcast domain. Each Vlan is separate broadcast domain. It will not generate congestion in network. QUESTION NO: 52 Which characteristics are representative of a link-state routing protocol? (Choose three) A. Provide common view of entire topology B. Exchange routing tables with neighbors. C. Calculates shortest path. D. Utilizes event triggered updates. E. Utilizes frequent periodic updates. Answer: A, C, D

202 These are unique features of Link-State protocols. Incorrect Answers: B: Link-state routing protocol (OSPF) does not exchange routing tables but instead exchanges routing updates (changes). E: This statement is correct but not a unique feature of Link-state routing protocol. QUESTION NO: 53 Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity? A. DLCI B. BECN C. FECN D. LMI E. CIR F. DE Answer: D LMI is the protocol used between a DCE and DTE to manage the connection.signalling messages for SVCs,PVC Status messages, and keepalives are all LMI Messages Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 531. Incorrect Answers A: DLCI is a Frame Relay address and is used in Frame Relay headers to identify the virtual circuit. B: The BECN is the bit in the Frame Relay header that signals to anyone receiving the frame that congestion is occurring in backward direction of the frame. Switches and DTEs can react by slowing the rate by which data is sent in that direction. C: The FECN is same as B, that congestion is occurring in the same direction as the frame. E: The CIR is the rate at which the DTE can send data for an individual virtual circuit,for which the provider commits to deliver that amount of data F: The DE is the bit in the Frame Relay header that signals to a switch to,if frames must be discarded,please choose this frame to discard instead of another frame without the DE bit set. QUESTION NO: 54 Which of the following options lists the steps in PPP session establishment in the correct order? A. Optional authentication phase, link establishment phase, network layer protocol phase. B. Network layer protocol phase, link establishment phase, optional authentication phase. C. Network layer protocol phase, optional authentication phase, link establishment phase

203 D. Link establishment phase, network layer protocol phase, optional authentication phase. E. Link establishment phase, optional authentication phase, network layer protocol phase. F. Optional authentication phase, network layer protocol phase, link establishment phase. Answer: E Link establishment is a function in Link Control Protocol (LCP).It is first phase in PPP. In LCP only authentication phase is defined. It is optional phase. Authentication can be done by PAP or CHAP method to authenticate the device on the other end of the link.network layer protocol is last phase in PPP. PPP is designed to allow the simultaneous use of multiple Network layer protocols. They are IPCP and IPXCP Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 525 Incorrect Answers A: Authentication phase is after Link establishment phase. Order is reversed here B: Network Layer protocol is last phase in PPP instead of first phase C: Order is wrong in this answer also D: Network layer mentioned as Second phase instead of 3 rd phase, and Authentication mentioned as 3 rd phase instead of 2 nd phase. E: Order of all three are not in proper order. QUESTION NO: 55 Construct the correct parameter sequence used to configure dial-on-demand routing (DDR) on an ISDN BRI interface

204 Answer: At Global configuration mode: dialer-list [listnum] protocol [protocol-type] permit/deny At BRI Interface: dialer-group n ( Enables dialer list on this interface) dialer string string dialer map protocol next-hop-address [broadcast] dial-string First define types of traffic considered interesting. Like IP At interface level define dialer group dial string which is used when dialing only one Site. Dialer map to be defined when dialing more than one site. Broadcast ensures that copies of broadcasts go to this next-hop address Note: In the question Broadcast to be mentioned instead of unicast

205 Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 579 QUESTION NO: 56 Exhibit: You are the network administrator on TestKing. It has become necessary to prevent accounting department users on the TestKing1 router from accessing the human resources server attached to interface E0 of the TestKing2 router. The following access control list has been created: access-list 19 deny access-list 19 permit any On which interface and in which direction should this access list be placed to prevent accounting users from accessing the network attached to the E0 interface of the TestKing2 router? Access to other networks should be unaffected. A. TestKing1 S0, out B. TestKing1 E1, in C. TestKing1 E1, out D. TestKing2 S1, in E. TestKing2 E0, out Answer: E

206 The subnetwork address for accounting users in Testking1 is Aim is to prevent accounting users to access Human resource server in Testking 2. E0 is entry point in Testking 2 for accessing Human resource server. So we have to place an access list at interface E0 at Testking 2 to prevent traffic from Accounting users from Testking 1does not sent out to Human resource server. The second line in access-list permit all other traffic entering into interface E0. One has enable access-list inside an interface with ip accessgroup command. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 494 Incorrect Answers A: If enable access list this interface it will stop accounting users traffic from Testking 1 will not enter in to Testking2. B: Question asked outgoing traffic for accounting users for Testking 1 users. This will not provide any solution to the problem C: If enable access-list in this interface stops all outgoing traffic for accounting users in Testking 1 to other interfaces in Testking1 itself D: If enable access list in this interface will stop sending out accounting users of Test King1 to Human resource server in Testking 2 and ISDN cloud also. This is not the requirement for the question. QUESTION NO: 57 What feature of a networks switch allows an administrative to create separate broadcast domains? G. Store-and-forward switching H. Microsegmentation I. Transparent bridging J. Fragment-free switching K. Virtual LANs L. Cut-through switching Answer: E Creation of VLAN in a switch provide separate Broadcast domain. If VLAN is not there all ports as members of one Broadcast domain. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 172 Incorrect Answers A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast domains B: Not related to the question C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the bridges exists. It will not play any role for creating separate broadcast domain

207 D,F: Both are switching methods in a switch. QUESTION NO: 58 An administrator has decided to use the private address for the internal network. If the maximum number of hosts allowed on a subnet is 62, which of the following is true regarding the addressing scheme? A is a host address. B. Ten bits were borrowed for subnets. C is the subnet mask. D is a subnet address. E. Seven host bits must be used to meet the addressing scheme requirement. Answer: B The given address is Class B address. Default mask prefix is 16. In the remaining 16 bits of the IP address 6 bits are sufficient for achieve 62 hosts. So Remaining 10 bits are used for subnetting. Reference: Incorrect Answers A: It is a broadcast address C: This subnet mask allow only 2 hosts. Because only 2 bits are remaining for host. D: The correct subnet address is instead of E: If one uses 7 host bits, we can achieve 124 hosts. It is more than the requirement. It is wasting one extra bit for host. QUESTION NO: 59 A small enterprise, TestKing.com Publishing, has a class C network license. TestKing.com requires 5 usable subnets, each capable of accommodating at least 18 hosts. What is the appropriate subnet mask? Answer: Default subnet mask for class C network is If one has to create 5 subnets, then 3 bits are required. With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts using 5 bits in host field. This matches with requirement. QUESTION NO:

208 What is a global command? A. A command that is available in every release of IOS, regardless of the version or deployment status. B. A command that can be entered in any configuration mode. C. A command that is universal in application and supports all protocols. D. A command that is implemented in all foreign and domestic IOS version. E. A command that is set once and affects the entire router. Answer: D Global command is implemented in all foreign and domestic IOS version. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 36 Incorrect Answers B: It can be entered from usermode or exit from interface mode mainly C: It is not mandatory to support all protocols D: Not clear about foreign and Domestic IOS version E: An interface config may overwrite global config parameter QUESTION NO: 61 You work as network administrator for the TestKing.com Inc. A static route to a TestKing branch office LAN needs to be configured on the testking1 router. The address of the branch office LAN is /24. The point-to-point link between the corporate router and the branch office is configured with the first two usable IP addresses on the /24 network, with the corporate router serial interface receiving the first address, and the branch office serial interface receiving the second. In the box below, enter the command to configure the corporate router with this static route. No optional parameters are required. testking1(config)# Answer: ip route The syntax for ip route is ip route prefix mask { next hop-router/ output-interface). In Our example prefix is Mask is 24 bits, ie Branch office serial interface address is second usable address in the network That is Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 272 QUESTION NO:

209 Exhibit: Several frames from Host TestKing13 were captured while it was communicating with the TestKing.com web server. Which of the following are true regarding the captured and decoded frames? (Choose two) A. The destination address in the packet header is the IP address from the Ethernet interface on the TestKingBerlin router. B. The destination address in the packet header is the IP address of TestKing.com web server. C. The destination address in the packet header is the IP address of the Ethernet interface on the TestKingHongKong router. D. The destination address in the frame header is the MAC address of the TestKing.com web server. E. The destination address in the frame header is the MAC address of the Ethernet interface on the TestKingHongKong router. F. The destination address in the frame header is the MAC address of the Ethernet interface is on the TestKingBerlin router Answer: B, F B.Packet operates in network layer. In IP header sending the packet from Host testking13 to Webserver contains IP address of Web server is destination address. Router finds the route in its routing table for switching the packet F. Routing table at Berlin s router having an entry for web server s network address or default gateway address via Ethernet interface of the Berlin s router. The destination address of the frame header contains Mac address of the Ethernet interface on the Berlin s router. Reference: Incorrect Answers

210 A,C: The destination address in packet header is final destination address,not intermediate IP address D,E: Frame header Mac address is Mac address of nearest interface Mac Address. This can be obtained by ARP QUESTION NO: 63 You have configured a new Frame Relay link on a router that is using IGRP. Which command would you use to set the IGRP metric for the speed of this link? A. TestKingRouter(config)# IGRP metric 256K B. TestKingRouter(config)# bandwidth 256 C. TestKingRouter(config-if)# metric 256K D. TestKingRouter(config-if)# bandwidth 256 Answer: D Bandwidth and delay are used for calculating IGRP metric. They are interface sub commands. (config-if)# mode is interface sub command. This answer is matching with requirement Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 378 Incorrect Answers A: It is Global configuration mode. There is no such command B: It is Global configuration mode C: There is no such command QUESTION NO: 64 A network host is configured as follows: Host IP address: Subnet mask: Default gateway: Which of the following statements describe the network to which this host is attached? (Choose three) A. The default gateway is configured on a different subnet form this host. B. The host is a member of the fifth usable subnet of the network. C. The subnetwork address for this host is /28. D. The address of the next higher subnet is E. The address of the router interface that is attached to this subnetwork is

211 F. There are 60 usable host addresses on this subnet. Answer: B,D,E B: According to subnet mask, 5 bits are used for hosts. So each subnet contains 30 hosts.the fifth usable subnet range is to Here first address is network and later address is broad cast. Our host.183 is member of this subnetwork. D: The next subnet address after fifth usable subnet is E: is the router interface in the fifth usable subnet Incorrect Answers A: Default gateway is same subnet as Host C: Subnet mask is different as compared to mask defined in the question F: There are 30 usable hosts in each subnetwork. QUESTION NO: 65 Which statement describes the rule of split horizon? A. Only routers can split boundaries (horizons) between concentric networks. B. All distance vector protocols require fall back routers that may cause momentary loops as the topology changes. C. Networks can only remain fully converged if all information about routers is sent out all active interfaces. D. Information about a route should not be sent back in the direction from which the original update come. E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary. Answer: B Split horizon includes two related concepts that affect what routes are included in a routing update: An update does not include the subnet of the interface out which the update is sent All routes with outgoing interface of interface x are not included in updates sent out that same interface x. Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 369 Incorrect Answers A: There is no such requirement B: Distance vector protocols updates routing table at regular intervals instead of Topology changes C: This is not a feature of split horizon

212 E: This is not a related feature for split horizon QUESTION NO: 66 Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers. Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its neighbor. The routers have been working properly. The connection between North and Main ceases operation one day and an unauthorized entry is detected on the South router. Determine the problem and restore connectivity. The network has been configured with the following characteristics: The routers are named North, Main, South. All networks have the default subnet mask. RIP is the routing protocol. The clocking signal is provided on the serial 0 interface. Lab 1 Name: North E0: S0: Secret password : testk

213 Lab 2 Name: Main E0: S0: S1: Secret password : testk Lab 3 Name: South E0: S1: Secret password : testk Start by clicking on host that is connected to the router you want to configure. Answer Lab 1: <Click on Host2, which is connected to the Lab 1 router> enable config terminal hostname North enable secret testk interface ethernet 0 ip address no shutdown exit interface serial 0 ip address clock rate no shutdown exit router rip network network ^z copy running-config startup-config

214 Note: comments are added in text after the!-sign. They will not be shown during simulation. First we click on the Lab 1 router. Router Con0 is now available Press RETURN to get started.! The router starts! Here we press return Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname North! We change the host name North(config)#enable secret testk! We must enter EXEC mode (or enable mode as it also called)! We must enter configuration mode.! We set the password North(config)#interface ethernet 0! We enter interface configuration mode for ethernet 0 North(config-if)#ip address ! We set the IP address for Ethernet 0.! Note that we use a 24 bit network mask.!it is a class C address.! We start the interface North(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up North(config-if)#exit! We exit interface configuration for Ethernet 0 North(config)#interface serial0! We enter interface configuration mode for the serial0 interface.! Note that there are no space in serial0 North(config-if)#ip address ! IP address for serial0! Cisco recommends to set the IP address of the interface before! setting the clockrate North(config-if)#clock rate 64000! We set a clockrate. We must do it to enable communication between! the routers. They must be synchronized. North(config-if)#no shutdown! Start the serial0 interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up %LINK-3-UPDOWN: Interface Serial0, changed state to up North(config-if)#exit! Exit interface configuration mode North(config)#router rip! Start the routing protocol. RIP does not need further configuration.! RIP works well in this small network.! We enter router configuration mode. North(config-router)#network ! We enable RIP on the network of Ethernet E0. North(config-router)#network ! We enable RIP on the network of Serial0. North(config-router)#^Z! We exit configuration mode and return to enable mode. %SYS-5-CONFIG_I: Configured from console by console North#copy running-config startup-config Destination filename [startup-config]? North#! We save our configurations to NVRAM! We confirm with Enter.! We are finished

215 You don't need to make full configuration because all routers have already been configured but they have some mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks. Wendell Odom. Cisco CCNA Exam # Certification Guide. (Cisco Press: 2000) pages ************************************ Answer Lab 2: enable config terminal hostname Main enable secret testk interface ethernet 0 ip address no shutdown exit interface serial 0 ip address clock rate no shutdown exit interface serial 1 ip address no shutdown exit router rip network network network ^z copy running-config startup-config Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make sure that we enable RIP on all three interfaces with the network command. ****************************************** Answer Lab 3:

216 enable config terminal hostname South enable secret testk interface ethernet 0 ip address no shutdown exit interface serial 1 ip address no shutdown exit router rip network network ^z copy running-config startup-config Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1. QUESTION NO: 67 A soft drink company has made the decision to provide 3 branches with network connectivity. There is a LAN in each branch. The Vanilla and Chocolate routers are fully configured. The Plain router is almost fully configured. However, it does not have the routing protocol configured. Configure the routing protocol and publish all networks on the Plain router. The configurations of the routers are as follows: The routers are named Vanilla, Chocolate, and Plain. RIP is the routing protocol used. The clocking is provided on the serial 0 interface. The password on the Plain router is TestKing The default subnet mask is used on all interfaces The IP addresses are listed below. Vanilla

217 E S Chocolate E S S Plain E S Lab 1 Name: Vanilla E S Lab 2 Name: Chocolate E S S Lab3 Name: Plain E S

218 Secret Password: TestKing Start by clicking on host that is connected to the router you want to configure. Answer Lab 3: enable config terminal hostname Plain enable secret TestKing interface ethernet 0 ip address no shutdown exit interface serial1 ip address no shutdown exit router rip network network network network network ^z copy running-config startup-config < Click on Host6, which is connected to the Lab 3 router> Router Con0 is now available Press RETURN to get started.! Press enter. Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Plain Plain(config)#enable secret TestKing! Enter enable mode! Enter terminal configuration mode.! Change hostname! Enable secret password

219 Plain(config)#interface ethernet 0 Plain(config-if)#ip address ! Enter interface configuration mode.! Note the space between Ethernet and 0.! Configure the IP address of the interface.! Note that we use a class C subnet mask.! Start the interface Plain(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up %LINK-3-UPDOWN: Interface Ethernet0, changed state to up Plain(config-if)#exit! Exit configuration of Ethernet 0 interface Plain(config)#interface serial1! Configure serial1 (no space in serial1) Plain(config-if)#ip address ! Configure the IP address of the interface. Plain(config-if)#no shutdown! Start the interface %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1, changed state to up Plain(config-if)#exit! Exit interface configuration. Plain(config)#router rip! Enable RIP. Enter router configuration mode. Plain(config-router)#network ! Enable RIP on interface Ethernet 0 Plain(config-router)#network ! Enable RIP on interface Serial1! We have now added the two local networks. That should! be enough, but we are specifically been required to publish! all networks. We add the three remote networks as well. Plain(config-router)#network ! The three external networks are added as well. Plain(config-router)#network Plain(config-router)#network ! Exit configuration mode. Plain(config-router)#^Z %SYS-5-CONFIG_I: Configured from console by console Plain#copy running-config startup-config Destination filename [startup-config]? Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration... [OK] Plain#! Save running configuration to NVRAM! Accept defaults and save it. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages and 133. QUESTION NO: 68 A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a password for the first 5 virtual lines, password for console, and an encrypted password for privileged mode

220 Configure the passwords on the Patton router according to the table below. Type Telnet Console Privileged Password apple pear peach The routers are named Marshal, Sherman, and Patton. The network is subnetted with a mask The routing protocol is RIP The serial 0 interface is provided with clocking. The chart below includes the IP addresses. Lab 1 Name : Marshal E0 : S0 : Lab 2 Name : Patton E0 : S0 : S1 : Lab 3 Name : Sherman E0 : S0 : S1 :

221 Start by clicking on host that is connected to the router you want to configure. Answer Lab 2: <Click Host4, which is connected to Router Lab 2> enable config terminal hostname Patton enable secret peach line con 0 login password pear line vty 0 4 login password apple ^Z copy running-config startup-config

222 We should configure the passwords, not any IP configuration on the interfaces. First we click on the Lab2 router. Router Con0 is now available Press RETURN to get started.! We press enter. Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Patton Patton(config)#enable secret peach Patton(config)#line con 0 Patton(config-line)#login Patton(config-line)#password pear! We enter enable mode! We enter terminal configuration mode! We change the host name. This is however not required.! Set the secret password.! Configure the terminal connection! Specify the terminal connection password Patton(config-line)#line vty 0 4! Configure the telnet connections. Numbered 0, 1, 2, 3, 4. Patton(config-line)#login! Specify password Patton(config-line)#password apple Patton(config)#^Z %SYS-5-CONFIG_I: Configured from console by console Patton#copy running-config startup-config Destination filename [startup-config]? Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration... [OK] Patton#! Exit from configuration mode.! Save the running config to NVRAM.! Confirm default selections Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 69 A Web consulting business has three routers in their systems. These router, Venus, Afrodite, and Zeus, are placed in separate local area networks. The Venus and Afrodite routers need no further configuration. The configuration of Zeus is also complete, except the password for the first 5 virtual lines, the password for the console, and the password for the privileged mode. The CIO has told you that the privileged password must be encrypted to achieve highest possible security. Your task is to configure the passwords on the Zeus router. The passwords to configured are: Type Password Telnet Testking Console Andorra

223 Lab 1 Name: Zeus E0 : SO : Lab 2 Name: Venus E0 : SO : Lab 3 Name: Afrodite E0 : SO : S1 : Start by clicking on host that is connected to the router you want to configure. Simulation answer:

224 Lab 1 <Click on Host2, which is connected to the Lab 1 router> enable config terminal enable secret whatsoever line vty 0 4 login password Testking line console 0 login password andorra ^z copy running-config startup-config For the task you don't need to change anything but passwords and we only have to perform Lab 1. Router Con0 is now available Press RETURN to get started.! We press enter. Zeus>enable Zeus#config terminal Enter configuration commands, one per line. End with CNTL/Z. Zeus(config)#enable secret whatsoever Zeus(config)#line vty 0 4 Zeus(config-line)#login Zeus(config-line)#password Testking Zeus(config-line)#line console 0 Zeus(config-line)#login Zeus(config-line)#password Andorra Zeus(config-line)#^Z %SYS-5-CONFIG_I: Configured from console by console Zeus#copy running-config startup-config Destination filename [startup-config]? Warning: Attempting to overwrite an NVRAM configuration previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration... [OK] Zeus#! Enter enable mode for configuration.! Define an enable password (choose something).! Make sure that you use the secret keyword.! We configure the telnet keyword on all 5 telnet! connections: 0, 1, 2, 3, 4! Specify the telnet password.! We configure the console password! We specify the console password.! We exit configuration mode with Ctrl-Z.! We copy the running configuration to NVRAM.! We accept the default target location (press enter)! We confirm the overwrite (press enter) Wendell Odom. Cisco CCNA Exam # Certification Guide. (Cisco Press: 2000) pages

225 QUESTION NO: 70 You are a network administrator for an Insurance company TestK. The company has three routers named Tokyo, Kobe and Yokohama. You have already configured the Tokyo and the Kobe routers, but Yokohama still need some further configuration. The Yokohama router need: a password for the for the first 5 virtual lines a password for the console a password for the privileged mode. These password must be encrypted. The following passwords should be used: Type Password Telnet Test Console King Privileged TestKing The network use a subnet mask, RIP is the only routing protocol used, and clocking is provided on the serial 0 interface. Lab 1 Name: Tokyo E0: S0: Lab 2 Name: Kobe E0: S0:

226 S1: Lab 3 Name: Yokohama E0: S1: Start by clicking on host that is connected to the router you want to configure

227 Answer: Answer Lab 3: <Click on Host6, which is connected to the Lab 3 Router> enable config terminal hostname Yokohama enable secret TestKing line con 0 login password King line vty 0 4 login password Test ^Z copy running-config startup-config We should configure the passwords, not any IP configuration on the interfaces. First we click on the Lab3 router. Router Con0 is now available Press RETURN to get started.! We press enter. Router>enable Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Yokohama Yokohama(config)#enable secret TestKing Yokohama(config)#line con 0 Yokohama(config-line)#login Yokohama(config-line)#password King! We enter enable mode! We enter terminal configuration mode! We change the host name. This is however not required.! Set the secret password.! Configure the terminal connection! Specify the terminal connection password Yokohama(config-line)#line vty 0 4! Configure the telnet connections. Numbered 0, 1, 2, 3, 4. Yokohama(config-line)#login! Specify password Yokohama(config-line)#password Test Yokohama(config)#^Z %SYS-5-CONFIG_I: Configured from console by console Yokohama#copy running-config startup-config Destination filename [startup-config]? Warning: Attempting to overwrite an NVRAM configuration! Exit from configuration mode.! Save the running config to NVRAM.! Confirm default selections

228 previously written by a different version of the system image. Overwrite the previous NVRAM configuration?[confirm] Building configuration... [OK] Yokohama# Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages QUESTION NO: 71 A German fast food group, TestKing GmbH, has decided to connect three stores to place all ordering and inventory in a central database. The manager has partially configured the routers and named them TestKing1, TestKing2, and TestKing3. No network connectivity has been established among the three stores. Identify the fault(s), and make the necessary change(s) to establish connectivity. The routers have been configured with the following specifications: The routers are named TestKing1, TestKing2, TestKing3 RIP is the routing protocol Clocking is provided on the serial 0 interface The password on each router is "testking" The subnet mask on all interfaces is the default mask. The IP addresses are listed in the chart below. Name TestKing1 E0 : E1 : S0 : Secret password: testking Name TestKing2 E0 : S0 : S1 : Secret password: testking Name TestKing3 E0 : S1 : Secret password: testking

229 Task: To configure the router click on a host icon that is connected to a router by a serial console cable. Answer: TestKing1 configuration:

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B) CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment

More information

Interconnecting Cisco Networking Devices

Interconnecting Cisco Networking Devices Interconnecting Cisco Networking Devices Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

The Quickest Way To Get Certified TestKing's Interconnecting Cisco Networking Devices Exam (ICND ) Version 9.

The Quickest Way To Get Certified TestKing's Interconnecting Cisco Networking Devices Exam (ICND ) Version 9. WWW.REAL-EXAMS.NET The Quickest Way To Get Certified 640-811 TestKing's Interconnecting Cisco Networking Devices Exam (ICND ) Version 9.0 WWW.REAL-EXAMS.NET This Study Guide has been carefully written

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

CCNA Cisco Certified Network Associate CCNA (v3.0)

CCNA Cisco Certified Network Associate CCNA (v3.0) CCNA Cisco Certified Network Associate CCNA (v3.0) Cisco 200-125 Dumps Available Here at: /cisco-exam/200-125-dumps.html Enrolling now you will get access to 455 questions in a unique set of 200-125 dumps

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Seite von 7 05.0.200 Close Window Assessment System Exam Viewer - CCNA Practice Certification Exam # - (Version 4.0) Below you will find the assessment items as presented on the exam as well as the scoring

More information

Q&A. DEMO Version

Q&A. DEMO Version Cisco Certified Network Associate Q&A DEMO Version Copyright (c) 2012 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦 KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

CCNA 4 - Final Exam (A)

CCNA 4 - Final Exam (A) CCNA 4 - Final Exam (A) 1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam. Cisco 640-822 Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam TYPE: DEMO http://www.examskey.com/640-822.html Examskey Cisco 640-822 exam demo product is here for you to test quality of the

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

Course: CCNA Bootcamp (Intensive CCNA)

Course: CCNA Bootcamp (Intensive CCNA) Course: CCNA Bootcamp (Intensive CCNA) Duration: 5 Days Description Introduction to Networking course will prepare you for the basic knowledge and in-depth technology of networking design and implementation.

More information

Connections, addressing and common configuration rules.

Connections, addressing and common configuration rules. Lab #1 r9-1 s2 e1 3/11 VLAN_21 BGP AS 100 s1 3/1 e0 s0 e0 3/2 s1 VLAN_22 BGP AS 200 r1 r2 Ring 4 r4 s0/1 r3 to0/0 s0/0 s0 s1 OSPF Area 33 to0 e0/0 e0 OSPF Area 4 3/4 b0/0 3/3 VLAN_14 VLAN_13 403 304 c15

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

SEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0

SEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0 SEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0 135 points 1.1.1 What are the common components between a router and other computers? CPU RAM ROM Operating System 1.1.1.2 What does a router connect?

More information

GuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider

GuideTorrent.  The best excellent exam certification guide torrent and dumps torrent provider GuideTorrent http://www.guidetorrent.com The best excellent exam certification guide torrent and dumps torrent provider Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Configuring Banyan VINES

Configuring Banyan VINES Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Lab 2.8.1: Basic Static Route Configuration

Lab 2.8.1: Basic Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 172.16.3.1 255.255.255.0 N/A S0/0/0 172.16.2.1 255.255.255.0 N/A Fa0/0 172.16.1.1 255.255.255.0 N/A R2

More information

Pass4sures. Latest Exam Guide & Learning Materials

Pass4sures.   Latest Exam Guide & Learning Materials Pass4sures http://www.pass4sures.top/ Latest Exam Guide & Learning Materials Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get Latest & Valid 200-125

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 100-105 Title : Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Vendor : Cisco Version

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 10 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information

Cisco Exam CCNA Version: 4.1 [ Total Questions: 215 ]

Cisco Exam CCNA Version: 4.1 [ Total Questions: 215 ] s@lm@n Cisco Exam 640-801 CCNA Version: 4.1 [ Total Questions: 215 ] Question No : 1 Which router command can be used to verify the type of cable connected to interface serial 0/0? A. show interfaces serial

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

(ii) Simei(config)#line console 0 Simei(config-line)#password Networking Simei(config-line)#exit

(ii) Simei(config)#line console 0 Simei(config-line)#password Networking Simei(config-line)#exit Sep 2008 Section A 1. Any of the following 2: a. Frame relay b. ISDN c. PPP d. HDLC 2. (i) RAM copy running-config startup-config 3. hardware platform, feature set, file format, version 4. (i) Cisco Discovery

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question

More information

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,

More information

ROUTER COMMANDS. BANNER: Config# banner motd # TYPE MESSAGE HERE # - # can be substituted for any character, must start and finish the message

ROUTER COMMANDS. BANNER: Config# banner motd # TYPE MESSAGE HERE # - # can be substituted for any character, must start and finish the message ROUTER COMMANDS TERMINAL CONTROLS: Config# terminal editing - allows for enhanced editing commands Config# terminal monitor - shows output on telnet session Config# terminal ip netmask-format hexadecimal

More information

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

CCNA 1 Final Exam Answers UPDATE 2012 eg.1 CCNA 1 Final Exam Answers UPDATE 2012 eg.1 January 12th, 2012AdminLeave a commentgo to comments Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255

More information

Q&As. Interconnecting Cisco Networking Devices Part 1. Pass Cisco Exam with 100% Guarantee

Q&As. Interconnecting Cisco Networking Devices Part 1. Pass Cisco Exam with 100% Guarantee 640-822 Q&As Interconnecting Cisco Networking Devices Part 1 Pass Cisco 640-822 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer Introduction to Networks Intro to Networks v5 Network Layer Intro to Networks v5 2 The Network Layer End to End Transport processes Addressing end devices Encapsulation of Packets

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Section 1. General Networking Theory

Section 1. General Networking Theory Section 1 General Networking Theory This chapter ensures you are prepared for questions in the Cisco Certified Internetwork Expert (CCIE) written exam that deal with general networking theories. General

More information

LAB MANUAL for Computer Network

LAB MANUAL for Computer Network LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design,

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 200-120 Title : CCNA Cisco Certified Network Associate CCNA (803) Vendor : Cisco Version : DEMO Get Latest & Valid 200-120 Exam's Question

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Part II. Chapter 3. Determining IP Routes

Part II. Chapter 3. Determining IP Routes Part II Chapter 3 Routers perform two main functions: switching and routing. The switching function is the process of moving packets from an inbound interface to an outbound interface. The switching function

More information

Lab 4: Routing using OSPF

Lab 4: Routing using OSPF Network Topology:- Lab 4: Routing using OSPF Device Interface IP Address Subnet Mask Gateway/Clock Description Rate Fa 0/0 172.16.1.17 255.255.255.240 ----- R1 LAN R1 Se 0/0/0 192.168.10.1 255.255.255.252

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Configuring Redundant Routing on the VPN 3000 Concentrator

Configuring Redundant Routing on the VPN 3000 Concentrator Configuring Redundant Routing on the VPN 3000 Concentrator Document ID: 13354 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Router Configurations

More information

Exam : Cisco Certified Network Associate(CCNA) Title : Version : DEMO

Exam : Cisco Certified Network Associate(CCNA) Title : Version : DEMO Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Version : DEMO 1.Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status? (Choose two.) A. A Layer

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

Cisco Press CCIE Practical Studies CCIE Practice Lab: Enchilada Solutions

Cisco Press CCIE Practical Studies CCIE Practice Lab: Enchilada Solutions Cisco Press CCIE Practical Studies CCIE Practice Lab: Solutions Cisco Press CCIE Practical Studies CCIE Practice Lab: LAB Book Chapter Book Page The 18 1161 Overview... 3 Technical Details... 3 Table 54-1:

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

WebLearning Cisco Curriculum

WebLearning Cisco Curriculum WebLearning Cisco Curriculum Cisco BCMSN: Campus Networks Audience: People who work on the design, administration, and maintenance of campus-sized networks; those working towards Cisco Certified Network

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration:

More information

Fravo.com. Certification Made Easy. World No1 Cert Guides Cisco Certified Network Associate Exam Edition 1.

Fravo.com. Certification Made Easy. World No1 Cert Guides Cisco Certified Network Associate Exam Edition 1. Fravo.com Certification Made Easy M C S E, C C N A, C C N P, O C P, C I W, J A V A, S u n S o l a r i s, C h e c k p o i n t World No1 Cert Guides info@fravo.com Cisco Certified Network Associate Exam

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Vendor: Cisco. Exam Code: Exam Name: Interconnecting Cisco Networking Devices. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Interconnecting Cisco Networking Devices. Version: Demo Vendor: Cisco Exam Code: 640-811 Exam Name: Interconnecting Cisco Networking Devices Version: Demo QUESTION NO: 1 Refer to the exhibit. What can be determined from the output shown? A. Spanning Tree Protocol

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Lab VTY Restriction Instructor Version 2500

Lab VTY Restriction Instructor Version 2500 Lab 11.2.6 VTY Restriction Instructor Version 2500 NOTE: The loopback entry in this graphic is not required in the lab. Objective Scenario Use the access-class and line commands to control Telnet access

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

CCNA2 Chapter 1 Practice

CCNA2 Chapter 1 Practice CCNA2 Chapter 1 Practice Where should a crossover UTP cable be used? (Choose 2) To connect two PCs together directly. To connect a router to an Ethernet switch. To connect a PC to an Ethernet switch. To

More information

Lab Configuring IGRP Instructor Version 2500

Lab Configuring IGRP Instructor Version 2500 Lab 7.3.5 Configuring IGRP Instructor Version 2500 Objective Setup IP an addressing scheme using class C networks. Configure IGRP on routers. Background/Preparation Cable a network similar to the one in

More information

OSPF Commands. Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols IP2R-61

OSPF Commands. Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols IP2R-61 OSPF Commands Use the commands in this chapter to configure and monitor the Open Shortest Path First (OSPF) routing protocol. For OSPF configuration information and examples, refer to the Configuring OSPF

More information

Cisco.BrainDump v by.MuTe

Cisco.BrainDump v by.MuTe Cisco.BrainDump.100-101.v2013-06-25.by.MuTe Number: 100-101 Passing Score: 804 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ ICND1 100-101 Practice Exam QUESTION 1 Which three statements

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 200-101 EXAM QUESTIONS & ANSWERS Number: 200-101 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ CISCO 200-101 EXAM QUESTIONS & ANSWERS Exam Name: Interconnecting

More information

The primary audience for this course includes Network Administrators, Network Engineers,

The primary audience for this course includes Network Administrators, Network Engineers, CCNA COURSE DESCRIPTION: Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation

More information

Cisco Questions & Answers

Cisco Questions & Answers Cisco 200-101 Questions & Answers Number: 200-101 Passing Score: 800 Time Limit: 120 min File Version: 23.7 http://www.gratisexam.com/ Cisco 200-101 Questions & Answers Exam Name: Interconnecting Cisco

More information

Connections, addressing and common configuration rules.

Connections, addressing and common configuration rules. Lab #2 r9-1 r7 Lab 2 BGP AS 100 VLAN_21 r5 e1 3/11 fa0/0.25 fa0/0.15 3/6 2/1 2/1 VLAN_25 VLAN_15 IGRP AS 5 OSPF Area 5 BGP AS 65005 ISDN 3/1 504 Frame-Relay OSPF Area 0 VLAN_22 604 EIGRP AS 6 r9-0 OSPF

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Cisco Testinside Exam Bundle

Cisco Testinside Exam Bundle Cisco Testinside 640-802 Exam Bundle Number: 640-802 Passing Score: 950 Time Limit: 120 min File Version: 18.9 http://www.gratisexam.com/ Cisco 640-802 Exam Bundle Exam Name: Cisco Cisco Certified Network

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might

More information

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3. For More Information:

EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3. For More Information: Page No 1 Cisco 100-105 EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3 Product: Demo For More Information: 100-105-dumps-questions Page No 2 Question: 1 Which three statements are true

More information

Cisco Interconnecting Cisco Networking Devices Part 1.

Cisco Interconnecting Cisco Networking Devices Part 1. Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.

More information

Lab 5: Inter-VLANs Routing

Lab 5: Inter-VLANs Routing Lab 5: Inter-VLANs Routing Network Topology:- Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/0.10 10.5.0.1 255.255.255.192 ----- R1 Fa 0/0.20 10.6.0.1 255.255.255.192 ----- Fa 0/0.30 10.10.0.1

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support

More information

Exam Code : Version: Free Demo. IT Certification Guaranteed, The Easy Way!

Exam Code : Version: Free Demo. IT Certification Guaranteed, The Easy Way! Vendor : Cisco Exam Code : 642-832 Version: Free Demo IT Certification Guaranteed, The Easy Way Cheat-Test.us - The Worldwide Renowned IT Certification Material Provider The safer, easier way to help you

More information

Lab Configuring OSPF Timers 2500 Series

Lab Configuring OSPF Timers 2500 Series Lab 2.3.5 Configuring OSPF Timers 2500 Series Objective Setup an IP addressing scheme for OSPF area. Configure and verify OSPF routing. Modify OSPF interface timers to adjust efficiency of network. Background/Preparation

More information