Vous êtes sur la page 1sur 22

Which of the following are primary functions of a router? (Choose two.

packet switching
domain name resolution
path selection
flow control,

Which three statements are true regarding the encapsulation and de-encapsulation of packets when
traveling througha router? (Choose three.)
The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
The router maintains the same source and destination IP.
The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.

What is the purpose of the TTL field within an IP packet header?

clears an unreachable route from the routing table after the invalid timer expires
prevents regular update messages from inappropriately reinstating a route that may have gone bad
removes an unreachable route from the routing table after the flush timer expires
limits the period of time or number of hops a packet can traverse through the network before it
should be discarded
used to mark the route as unreachable in a routing update that is sent to other routers

Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are failing
between the two routers. What change by the administrator will correct the problem?
Set the encapsulation on both routers to PPP.
Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544.
Change the cable that connects the routers to a crossover cable.
Change the IP address on Serial 0/1/0 on router 2 to

Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?

A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.

Which statement correctly describes a feature of RIP?

RIP is a link-state routing protocol.
RIP uses only one metrichop count for path selection.
Advertised routes with hop counts greater than 10 are unreachable.
Messages are broadcast every 10 seconds

Which prompt is used to allow a user to change the IP address of an interface on a router?

Which additional piece of information is included in the updates of classless routing protocols to
support the use of VLSM and discontiguous networks?
network mask
neighbor router ID
administrative distance

Because of a topology change, the next hop IP address in the current static route must be
reconfigured. How can a static route entry be altered to accommodate a topology change?

Keep the existing static route and configure a new static route with the correct next hop IP address.
Negate the existing static route and configure a new static route with the correct next hop IP
Do nothing. The existing static route will automatically update the next hop entry with the new IP
Keep the existing static route, reload the router, and configure a new static route with the correct
next hop IP address

Which router mode is accessed by entering the enable command?

user EXEC
privileged EXEC
global configuration
interface configuration

Refer to the exhibit. An administrator is attempting to configure a router by copying and pasting the
commands that are shown in the exhibit. However, only one of the FastEthernet interfaces is coming
up. What is the problem?
Both interfaces are in the same IP subnet.
FastEthernet0/1 does not have a description.
There can be only one FastEthernet interface enabled on a router at one time.
The administrator did not exit to global configuration mode before configuring FastEthernet0/1

Refer to the exhibit. Which solution provides the most efficient use of router resources for
forwarding traffic between BR and HQ?
static routes

Refer to the exhibit. Why is the state of the serial0/0/0 interface administratively down?
An IP address has not been configured on the interface.
The WIC was installed into the incorrect slot on the router.
The default encapsulation on the interface has been modified.
The no shutdown command has not been executed on the interface

On a router, which three components are stored in RAM? (Choose three.)

POST code
the routing table
the running-configuration
the start-up configuration
the bootstrap instructions
a copy of the operating system

What is a function of the console port on a router?

It is used to manage the router.
It is used for packet receiving and forwarding.
It is used to interconnect various types of LANs.
It is used to interconnect a variety of serial links including T1, DSL, and ISDN

Refer to the exhibit. After the commands are entered, which password will be required to establish a
Telnet sessionwith the router?

Due to a security violation, the router passwords must be changed. What information can be learned
from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.

The entries specify four Telnet lines for remote access.

The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.

Assuming that the entire network topology is shown, what is the operational status of the interfaces
of R2 as indicated by the command output shown?
A. One interface has a problem.
B. Two interfaces have problems.
C. The interfaces are functioning correctly.
D. The operational status of the interfaces cannot be determined from the output shown.

Refer to the exhibit. What three statements are true about the IP configuration that is shown?
(Choose three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.

What information can be gathered by using the command netstat?

the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask

Which three addresses are private IP addresses? (Choose three.)

Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4

What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.

A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is
functioning properly on the local network segment. Which action will verify that the TCP/IP stack is
functioning correctly on this PC?
Use the ipconfig /all command at the hosts command prompt.
Use the ping command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturers website.

Which subnet mask will allow 2040 hosts per subnet on the IP network

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable
as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.

Refer to the exhibit. Which layered network model is shown in the diagram?

An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
Reboot the router.
Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.

What can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.

Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can
communicate with its default gateway?
Use the ping command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping command.

Refer to the exhibit. The serial interface of the router was configured with the use of the commands
that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0.
What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.

A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which
type of password would require this login and be considered the most secure?
enable secret

hen must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport
and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer

What happens when a host station receives a frame that contains its own MAC address in the
destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.

In a network design project, a network designer needs to select a device to provide collision free
connections to 40 hosts on the LAN. Which device should be selected?

Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?
network access

How many host addresses may be assigned when using the network address with a
subnet mask of

Which service is used when the nslookup command is issued on a computer?


What is the Cisco IOS?

system software for Cisco devices
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions

A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?
access point

Which statement is true about Layer 3 addresses?

They are physical addresses.
They are used in routing decisions.
They are only used on local networks.
They are altered each time a packet crosses a router.

An administrator is in the middle of entering a lengthy command when suddenly output from the IOS
appears stating that an interface has gone down and then up again. Consequently, the command
that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be
entered to return to the line that the administrator was typing?

What is the first 24 bits in a MAC address called?


Which of the following statements describe the network shown in the graphic? (Choose two)
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.

A network interface port has collision detection and carrier sensing enabled on a shared twisted pair
network. From this statement, what is known about the network interface port?
A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.

For what two purposes does the Ethernet protocol use physical addresses? (Choose two)
A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two)
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server

Where does routing occur within the DoD TCP/IP reference model?
A. application
B. internet
C. network
D. transport

Refer to the exhibit. An administrator pings the default gateway at and sees the output as
shown. At which OSI layer is the problem?
C:\> ping
Pinging with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for
Packets: sent 4, Received = 0, Lost 4 (100% loss)
A. data link layer
B. application layer
C. access layer
D. session layer
E. network layer

What does a Layer 2 switch use to decide where to forward a received frame?
A. source MAC address
B. source IP address
C. source switch port
D. destination IP address
E. destination port address
F. destination MAC address

How many broadcast domains are shown in the graphic assuming only the default vlan is configured
on the switches?
A. one
B. six
C. twelve
D. two