Sep 2008 Section A 1. Any of the following 2: a. Frame relay b. ISDN c. PPP d. HDLC 2. (i) RAM copy running-config startup-config 3. hardware platform, feature set, file format, version 4. (i) Cisco Discovery Protocol advertisements 5. path determination, switching 6. (i) hop count 30 seconds 7. Any 2 of the followings: Significant demands on memory and processing resources Requires very strict network design Requires a knowledgeable network administrator Initial flooding can impede network performance 8. (i) 80 23 9. 8 10. load balancing is a technique (usually performed by load balancers) to spread work between two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, throughput, or response time. Section B 11. (A) Any 2 of the following: Routers offer many services, including internetworking and WAN interface ports. Switches in the WAN provide connectivity for voice, data, and video communication. Modems include interface voice-grade services, channel service units/digital service units (CSU/DSUs), and Integrated Services Digital Network (ISDN) services. Communication servers concentrate dial-in and dial-out user communication. (i) 3 bits 255.255.255.224 (iii) 2^5 2 = 30 hosts (iii) 192.168.16.191 7
12. (i) Router>enable Router#configure terminal Router(config)#hostname Simei Simei(config)#line console 0 Simei(config-line)#password Networking Simei(config-line)#exit (iii) Simei(config)#interface FA 0/0 Simei(config-if)#ip address 172.16.0.2 255.255.0.0 Simei(config-if)#no shutdown Simei(config-if)#exit Simei(config)#exit 13. (A) Telnet Ping Traceroute (i) Routing protocol used for communication between routers Routed protocol used to direct user traffic (C) Any 3 of the following: types of devices connected router interfaces they are connected to interfaces used to make the connections model numbers of the devices. 14. (A) West(config)#router rip West(config-router)#network 172.31.0.0 West(config-router)#network 193.162.14.0 15. (A) A lists of conditions applied to traffic travelling across a router s interfaces 8
(i) Router#configure terminal Router(config)#access-list 1 permit 193.162.14.28 Router(config)#access-list 1 deny 193.162.14.0 0.0.0.255 Router(config)#access-list 1 permit any Router(config)#interface FA0/0 Router(config-if)#ip access-group 1 in Mar 2009 Section A 1. A WAN is a data communication network spanning a large geographical area such as a state, province or country. 2. Any of 4 the following: (Chapter 8 page 1) a. Internetwork delay b. Bandwidth c. Reliability d. Load e. Hop count f. MTU 3. show ip protocol 4. (i) Cisco Discovery Protocol(CDP) layer 2 5. (i) 15 routing table 6. overcome large routing loop offer explicit information when a network or network is not accessible 7. Any 2 of the following:(chapter 9 page 1) Respond quickly to network changes Send triggered updates when network change has occurred Use hello mechanism to determine reachability of neighbours 8. (i) below 255 255 to 1023 9. access-list 2 permit 10.71.126.0 0.0.0.254 10. A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. Section B 11. (A) Any 2 of the following: Routers offer many services, including internetworking and WAN interface ports. Switches in the WAN provide connectivity for voice, data, and video communication. Modems include interface voice-grade services, channel service units/digital service units (CSU/DSUs), and Integrated Services Digital Network (ISDN) services. Communication servers concentrate dial-in and dial-out user communication. 9
(D) (i) 196.10.10.0 196.10.10.255 (iii) class C 12. (A) (i) store startup-config file, retain contents when router powered off user EXEC, privileged EXEC Router>enable Router#configure terminal Router(config)#hostname eclab eclab(config)#interface S0 eclab(config-if)#ip address 210.90.90.1 255.255.255.0 eclab(config-if)#exit 13. (A) (i) static manually entered by administrator and dynamic update through routing protocol link state - common view of entire network and distance vector view network from neighbours perspective. (i) enhanced interior gateway routing protocol Any 2 of the following: Hybrid routing protocol (distance vector that has link-state protocol characteristics). Default composite metric of bandwidth and delay. You can factor load and reliability into the metric. Sends partial route updates only when there are changes. Support for authentication. 14. (A) Jurong(config)#router rip Jurong(config-router)#network 171.11.33.0 Jurong(config-router)#network 195.69.12.0 10
15. (A) (i) Router#configure terminal Router(config)#access-list 2 permit 171.7.31.0 0.0.0.7 Router(config)#access-list 2 deny 171.7.31.0 0.0.0.255 Router(config)#access-list 2 permit any Router(config)#interface FA0/0 Router(config-if)#ip access-group 2 in the continuation of service despite the failure of one or more pieces of equipment Sept 2009 Section A 1. Routers, Switches, Modems, Communication servers 2. (i) Any two of the following: Random access memory (RAM) Nonvolatile random access memory (NVRAM) Flash memory Read only memory (ROM) Interfaces CPU Buses Configuration, Troubleshooting 3. (i) C2600 i 4. (i) Layer 2 data link layer Advertisements 5. Default routes are used to route packets with destinations that do not match any of the other routes in the routing table 6. Any 2 of the followings: RIP IGRP EIGRP 7. Any 2 of the followings: Fast convergence Robustness against routing loops Routers know the topology Link-state packets are sequenced and aged Link-state database sizes can be minimized with careful network design 11
8. Internet Control Message Protocol (ICMP) 9. Messages from host 192.168.14.6 are not allowed by the router as the first statement of the access-list deny all traffics from network 192.168.14.0 10. Load balancing Section B 11. (A) WAN technologies operate at the Physical, Data Link and Network layers of the OSI references model. Number of subnets = 2^n -1 where n is the number of bits used for subneting To get 14 subnets, 4 bits are required (2^4-2 = 14) Subnet mask is 11111111.11111111.11111111.11110000 255.255.255.240 Network address of 4th subnet is 200.133.175.01000000 200.133.175.64 12. (A) 256 (i) To change the router name Router>_enable Router#_configure terminal Router(config)#_hostname ITE To set the secret password ITE(config)#_enable secret Aquarius ITE#_exit (iii) To save the active configuration to NVRAM ITE#_copy running-config startup-config ;save configuration file (C) Check Hardware Load IOS image file Find and apply configuration information 13. (A) Ping application layer telnet - network layer traceroute network layer 12
(C) Path determination occurs at the network layer The switching function is the internal process used by a router to accept a packet on one interface and forward it to a second interface on the same router. An autonomous system (AS) is a collection of networks under a common administration sharing a common routing strategy 14. (A) Draw and label the physical topology diagram of the above routers connectivity Alpha(config)# router rip configure RIP protocol Alpha(config-router)# network 192.168.1.0_ ;enter network @ S0 Alpha(config-router)# network 193.10.1.0 ;enter network @ S1 Alpha(config-router)# exit ;exit router configuration (C) Port Number Application 21 ftp 23 telnet 69 tftp 80 http 15. (A) An ACL is a sequential list of permit or deny statements that apply to addresses or upper-layer protocols. or 13
ACLs are lists of conditions that are applied to traffic traveling across a router's interface. (i) Router# configure terminal Router(config)# access-list 1 deny host 192.168.3.2 Router(config)# _access-list 1 permit any_ (C) Router(config)# _interface serial S0/0 Router(config-if)# _ip-access group 1 in_ Any 2 of the followings: Intuitively identify an ACL using an alphanumeric name. Eliminate the limit of 798 simple and 799 extended ACLs Named ACLs provide the ability to modify ACLs without deleting and then reconfiguring them. Mar 2010 Section A 1. (i) Wide Area Network LAN interfaces, WAN interfaces, Management ports 2. (i)ram NVRAM 3. Operating System, Configuration File 4. (i)data Link Layer Verification of application layer connectivity, Connecting to remote network devices 5. To define a static route to an IP destination network 6. (i) Inconsistent routing table information setting a maximum hop count 7. Any 2 of the followings: Significant demands on memory and processing resources Requires very strict network design Requires a knowledgeable network administrator Initial flooding can impede network performance 14
8. TCP, UDP 9. no access-list 3 10. Need less ongoing maintenance, Operates at or near the same speed as the network Section B 11. (A) Router Workgroup Switch Modem or CSU/DSU Communication Server (i) 8 subnets 4 bits (iii) 255.255.255.240 11111111.11111111.11111111.11110000 /28 (iv) 2^4-2 = 14 (v) 2^4-2 = 14 12. (A) (i) Setup mode Set the command history buffer size Recall commands Disable the command history feature (i) To set the enable and secret password Simei(config)# enable password Star Simei(config)# enable secret Libra To set the Fast Ethernet ip address Simei(config)# interface E0 Simei(config-if)# ip address 172.168.14.1 255.255.0.0 Simei(config-if)# no shutdown Simei(config-if)# exit Simei(config)# exit 15
(iii) To save the active configuration to NVRAM Simei#_copy running-config startup-config ;save configuration file 13. (A) (i) A routing protocol is the communication used between routers. A routed protocol is used to direct user traffic. Distance Vector, Link State (C) The primary use of CDP is to discover all Cisco devices that are directly connected to a local device 14. (A) Draw and label the physical topology diagram of the above routers connectivity Write the IOS commands to configure EIGRP on router Alpha Green(config)# router eigrp 200 configure EIGRP protocol Green(config-router)# network 192.168.1.0_ ;enter network @ S0 Green(config-router)# network 192.168.13.0 ;enter network @ S1 Green(config-router)# exit ;exit router configuration (C) Internet Control Message Protocol 15. (A) Host Any (i) Router# configure terminal ;enter configuration mode Router(config)# access-list 1 permit host 192.168.3.1 Router(config)# _access-list 1 deny 192.168.3.0 0.0.0.255_ Router(config)# access-list 1 permit any 16
Router(config)# _interface serial S0/0 ;change to serial interface S0/0 Router(config-if)# _ip-access group 1 in_ ;apply the ACL (C) deny any Sep 2010 Section A 1. Any of the following 2: International Telecommunication Union-Telecommunication Standardization Sector (ITU-T), International Organization for Standardization (ISO). Internet Engineering Task Force (IETF). Electronic Industries Association (EIA). 2. Any of the following 2: a. Frame relay b. ISDN c. PPP d. HDLC 2. Troubleshooting and configuration 3. a. It will enter setup mode b. Lowest four bits of the configuration register 4. a. Data Link b. The primary use of CDP is to discover all Cisco devices that are directly connected to a local device 5. Static Route 6. a. 15 b. Bandwidth and delay 7. Any 2 of the followings: Gets common view of entire network Calculates the shortest path to other routers Event-triggered updates Passes link state routing updates to other routers 8. a. Internet Control Message Protocol b. Port number 9. ip access-group 10. Firewall hardware is a physical piece of equipment that connects directly to your network. It has a self-contained software layer which works in conjunction with the firewall hardware to deliver maximum network security 17
Section B 11. (A) Subnetting is used to divide the network into smaller portion (i) 3 subnets 3 bits (iii)255.255.255.224 (iv) 192.168.1.32, 192.168.1.64, 192.168.1.96, 192.168.1.128, 192.168.1.160, 192.168.1.192 (C)127.x.x.x 12. (A)RAM, ROM, NVRAM, FLASH copy running-config startup-config (C) Router> enable Router# config term Router(config)# line con 0 Router(config-line)# password Virgo Router(config-line)# login Router(config-line)# exit Router(config)# interface S0/0 Router(config-if)# ip address 172.168.15.1 255.255.0.0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# exit Router# disable Router> 13. (A) default route is used to route packets with destinations that do not match any of the other routes in the routing table Routing protocol is the communication used between routers (C)link state and distance vector (D)any 2 of the followings: Ping Traceroute telnet 14. (A) 18
Virgo(config)# router EIGRP 100 Virgo(config-router)# network 172.16.2.0 Virgo(config-router)# network 172.16.4.0 Virgo(config-router)# exit (C)(i)TCP is more reliable UDP is fastest 15. (A)ACLs are lists of conditions that are applied to traffic travelling across a router s interface (i) Router# config term Router(config)# access-list 2 permit 192.168.1.160 Router(config)# access-list 2 deny 192.168.1.0 0.0.0.255 Router(config)# access-list 2 permit any Router(config)# interface FA0/0 Router(config-if)# ip access-group 2 out (C)Extended ACLs are used more often than standard ACLs because they provide a greater range of control Mar 2011 Section A 1. Any 2 of the followings: Routers Switches Modems Communication servers 2. Flash memory is used for storage of a full Cisco software image 3. user Exec and privileged Exec 4. The primary use of COP is to discover all Cisco devices that are directly connected to a local device. 5. Any 2 of the followings: Ping Traceroute telnet 19
6. Any 2 of the followings: RIP IGRP EIGRP 7. Any 2 of the followings: Fast convergence. Robustness against routing loop Link-state packets are sequenced and aged The link-state database sizes can be minimized with careful network design. Routers know the topology. 8. (i) 23 80 9. Any 2 of the followings: access-list 1 permit 193.5.2.76 access-list 1 permit host 193.5.2.76 access-list 1 permit 193.5.2.76 0.0.0.0 10. In computer networking, load balancer is used to spread work between two or more computers, network links, CPUs, Hard drives or other resources Section B 11. (A)physical, data link and network (i)10 bits 255.255.255.192 (iii)62 (iv)172.27.255.63 12. (A)Check hardware, find and load IOS image file, find and apply configuration file BBC(config)# enable password pass BBC(config)# enable secret cisco BBC(config)# interface FAO or FastEthernet 0 BBC(config-if)# ip address172.27.116.1 255.255.0.0 BBC(config-if)# no shutdown BBC(config-if)# exit BBC(config)# exit BBC# copy running-config startup-config 13. (A)any 3 of the followings: Type of devices connected Any Router interfaces they are connected to Interfaces used to make the connections marks Model number of the devices A routing protocol is the communication between routers, sharing of information regarding the network it knows about as well as its proximity to other routers. A routed protocol is used to direct user traffic which provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme. 20
(C)distance vector and link state 14. (A) ACLs are lists of conditions that are applied to traffic trave, across a router's interface. These lists tell the router what types of packets to accept or deny (C) ITE West(config)# router rip ITE West(config-router)# network 192.27.1.0 ITE West(config-router)# network 192.27.13.0 ITE West(config-router)# exit 15. (A)Any 2 of the followings: Intuitively identify an ACL using an alphanumeric name Eliminate the limit of standard and extended ACLs Named ACLs modifies ACLs without deleting and reconfiguring each of them. Router# configure terminal or config term Router(config)# access-list 1 deny host 185.25.64.33 Router(config)# access-list 1 deny host 185.25.35.83 Router(config)# access-list 1 permit 185.25.0.0 0.0.255.255 Router(config)# interface FAO Router(config-if)# ip access-group 1 in (C) deny any 21