Académique Documents
Professionnel Documents
Culture Documents
On the assumption that every OSPF router in a particular area is configured with the same priority value; which
secondary value would be used as a router ID when there is no loopback interface set?
2.Which of the following a true statements regarding the use of VLANs to segment a network? (Select three.)
D. They increase the size of the broadcast domain while decreasing the number of collision domains
E. They increase the number of broadcast domains while decreasing the size of the broadcast domains
Based on the information shown above, which routing protocols can be used within the Corporate network show in
the diagram? (Choose three).
A. RIP v1
B. RIP v2
C. IGRP
D. OSPF
E. BGP
F. EIGRP
4.The network security policy requires that only one host be permitted to attach dynamically to each switch
interface. If that policy is violated, the interface should shut down. Which two commands must the network
administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)
E. SW1(config-if)# ip access-group 10
5.Which router console commands are used to manage telnet sessions to other routers? Select three.
A. disconnect 3
B. exit session 2
C. kill connection 1
D. show sessions
F. resume 4
6.he ISP assigned you the class CIP address 207.134.6.0/30 for this Internet connection. A default route to the
Internet should be set up. Which of the following are acceptable ways to configure this on the Gateway router?
(Select all that apply)
7.Your ISP has assigned you the following IP address and subnet mask:
IP address: 199.141.27.0
Subnet mask: 255.255.255.240
Which of the following addresses can be allocated to hosts on the resulting subnet? (Select all that apply)
A. 199.141.27.2
B. 199.141.27.175
C. 199.141.27.13
D. 199.141.27.11
E. 199.141.27.208
F. 199.141.27.112
3 (1,6,11)
9.The network is replacing all of their hubs with new switches. How does a switch differ from a hub?
B. A switch does not induce any latency into the frame transfer time
10. You need to find the broadcast address used on a LAN on your router. What command will you type into the
router from user mode to find the broadcast address?
A. show running-config
B. show startup-config
C. show interfaces
D. show protocols
E. show broadcasts
11.Which encapsulation types are configurable on a Cisco switch for a trunk? (Select two answer choices)
A. VTP
B. ISL
C. CDP
D. 802.1Q
E. 802.1p
F. LLC
G. IETF
12.Given that you have a class B IP address network range, which of the subnet masks below will allow for 100
subnets with 500 usable host addresses per subnet?
A. 255.255.0.0
B. 255.255.224.0
C. 255.255.254.0
D. 255.255.255.0
E. 255.255.255.224
13.Which command will show you whether a DTE or a DCE cable is plugged into serial 0?
A. sh int s0
B. sh int serial 0
C. show controllers s0
A. NCP
B. LCD
C. SLIP
D. LCP
E. DLCI
B. LCD
C. SLIP
D. LCP
E. DLCI
16.The network consists of a small office with twenty-five employees that has one connection to the Internet
through the TK1 router.
What routing configurations are recommended on the TK1 and ISP routers?
17.What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?
18.A network associate needs to configure a router by connecting a remote computer to the router through the
router auxiliary port. Which two statements describe the hardware required to make the connection to the router?
(Choose two.)
A. The auxiliary port must be connected to a modem.
20.Which sequence of actions will allow telnet traffic from a user's PC to a router using TCP/IP?
A. Connect the PC's COM port to the router's console port using a straight-through cable.
B. Connect the PC's COM port to the router's console port using a crossover cable
C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable.
D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable
E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable
F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.
21.On the topic of the OSPF hello protocol; which of the statements below are true? (Select two answer choices)
D. The OSPF Hello protocol negotiates the correct parameters between neighboring interfaces
E. The OSPF Hello protocol uses timers to elect the router with the fastest links at the designated router
F. The OSPF Hello protocol broadcast hello packets throughout the internetwork to discover all routers that
are running OSPF
22.Refer to the exhibit shown below. What is needed to allow host A to ping host B?
A. a backbone switch connecting the switches with either fiber optic or straight-through cables
12
24.Five different routers are connected via varying point to point circuit types as displayed below:
Which of the following statements are true regarding how router A will chose a path to router E? (Choose three)
A. If RIP is the routing protocol, router A will determine all paths have an equal cost.
B. If RIP is the routing protocol, router A will install only the ADE path in its routing table.
C. If IGRP is the routing protocol, router A will determine that path ACE has the lowest cost
D. If IGRP is the routing protocol, router A will determine that path ADE has the lowest cost.
E. If RIP and IGRP are both configured on router A, the router will use the route information learned by IGRP
F. If RIP and IGRP are both configured on router A, the router will use the route information learned by RIP
25.Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?
In accordance with the above diagram; which of the statements below correctly describe the switch port
configuration and the router port configurations? (Select three answer choices)
27.You are given a PC, a router, and a cable. Select the correct combination that will allow you to log into the
router locally using a terminal emulation program such as HyperTerminal.
A. Connect the PC's COM port to the router's console port using a straight-through cable.
B. Connect the PC's COM port to the router's console port using a rollover cable
C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable
D. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable
E. Connect the PC's Ethernet port to the router's Ethernet port using a straight- through cable.
28.A network administrator has been asked to set up a fully-meshed Frame Relay network to connect six
remote research sites. How many PVCs are required in this network?
A. 15
B. 6
C. 41
D. 18
E. 36
29.Which switching mode provides the highest level of integrity and error-free transport, rather then maximizing
speed?
A. 802.1q forwarding
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering
An access list needs to be implemented that will block users from the Graphics Department from
Telnetting to the HR server; and this list is to be implemented on the Ethernet 0 interface of the Westfield
router for the inbound direction. All other office communications should be allowed. Which of the following
answer choices would accomplish this?
31.
B. It configures a router to block routing updates from being sent out interface serial 0/0.
C. It configures a router as a firewall, blocking all unauthorized packets from exiting serial 0/0.
D. It configures a router to send all packets for unknown destination networks out interface serial 0/0.
E. It configures a router to drop all packets for which the destination network is unknown.
33.You are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS
command should you use?
A. Switch(config)# ip route-default 192.168.1.115
34.A medical imaging company must redesign its network to use LAN and WAN topologies that provide the
highest degree of redundancy. Which topologies should the company choose for the most redundancy? (Choose
two)
A. Partial mesh
B. Extended star
C. Dual ring
D. Mesh
F. Star
35.You are a network administrator of a small company that's experiencing explosive growth. Within the next
quarter the company is going to open up seven more regional offices with the potential of more in the future.
These regional offices send and receive mission critical traffic, and will need to be connected to the head office
around the clock. However, your head office doesn't have any additional free ports available on the router. Which
of the following technologies would be the best choice for this new WAN?
A. Frame Relay
B. Broadband cable
C. E1
D. ADSL
36.What is the maximum number of hops OSPF allows before it deems a network unreachable?
A. 15
B. 16
C. 99
D. 255
E. Unlimited
37.Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while
accommodating the maximum number of subnets. Which mask would you use?
A. 255.255.0.0
B. 255.255.128.0
C. 255.255.224.0
D. 255.255.254.0
38. What is the maximum data rate for the 802.11a standard?
A. 6Mbps
B. 11Mbps
C. 22Mbps
D. 54Mbps
Assume that RIP v1 is the only routing protocol in use. What is the Maximum number of usable IP address that can
be supported on each LAN if the network is using one Class C address block?
A. 14
B. 16
C. 30
D. 32
E. 62
F. 64
40.You set the console password, but when you display the configuration, the password doesn’t show up; it looks
like this:
Line console 0
Exec-timeout 1 44
Password 7098C0BQR
Login
What cause the password to be stored like this?
A. encrypt password
B. service password-encryption
C. service-password-encryption
D. exec-timeout 1 44
A. RIP version 1
B. RIP version 2
C. IGRP
D. EIGRP
E. OSPF
F. BGP
42.You are a technician at Company. Your newly appointed Company trainee is setting up a new frame relay
connection to a remote branch and wants to know what the valid options for frame relay LMI types are. What would
your reply be? (Choose all that apply.)
A. EIA/TIA
B. Q.932
C. Q.933 A
D. IEEE
E. IETF
F. Cisco
G. ANSI
In the above network, an access list was created in order to prevent students and outsiders on the internet from
changing student files in the Records Server, while still allowing other departments in the enterprise access.
The access control list was applied to the e0 interface of the R3 router going outbound. Which two of the following
conditions below were contained in the access control list? (Select two answer choices)
44.Your router has the following IP address in Ethernet0: 172.16.2.1/23. Which of the following can be valid host
IDs on the LAN interface attached to the router (Choose two)
A. 172.16.0.5
B. 172.16.1.100
C. 172.16.1.198
D. 172.16.2.255
E. 172.16.3.0
F. 172.16.3.255
45.To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
E. 255.255.255.255
46.Using a subnet mask of 255.255.255.224, which of the IP addresses below can you assign to the hosts on this
subnet? (Select all that apply)
A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192
A. Access lists
C. STP
D. VLANs
E. VTP
F. Wireless LANs
48.You have a server that's directly connected to a Cisco switch by way of its Fa0/1 port, and you don't want any
other MAC addresses from any other servers to access this port. How would you accomplish this? (Select two
answer choices)
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing
the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
49.Under which circumstance, i.e. network type, would an OSPF router establish a neighbor
adjacency, even though the DR/BDR election process was not performed?
A. Point-to-point
B. Broadcast multicast
C. Nonbroadcast multicast
D. Backbone area 0
E. Virtual Link
50.You are an administrator and you've just configured OSPF on a router with both physical and logical
interfaces. Which of the following factors determine the router ID?
A. 3
B. 12
C. 23
D. 40
52.The IP network 210.106.14.0 is subnetted using a /24 mask. How many usable networks and host addresses
can be obtained from this?
53.A new switch is installed into an existing LAN and a new VTP trunk is set up with an existing switch. Which
VLANs will be allowed on this new trunk?
B. Each VLAN, or VLAN range, that is specified with the switchport mode command
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command
54.
What are some of the characteristics of a typical VLAN arrangement? (Select all that apply)
A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
55.Which one of the following protocols allows the information about the configuration of a new VLAN to be
distributed across entire switched network?
A. STP
B. VTP
C. EIGRP
D. SNMP
E. CDP
56.
In which situation would the use of a static route be appropriate?
C. To configure a route when the administrative distance of the current routing protocol is too low
57.The corporate LAN shown in the network uses IP network 172.28.4.0/22 for all departments.
All workstations use 172.28.4.1 as a default gateway address. Network administrators have recently become
concerned that excessive broadcasts are slowing network performance. Which change is most likely to reduce
broadcast traffic on the corporate LAN?
You are a network administrator and you've just finished configuring the static route 10.5.6.0 /24 on router
Router1. Which command should you use if you want Router1 to consider this route the most reliable?
60.Which one of the binary bit patterns below denotes a Class B address?
A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx
61.An administrator would like to configure a switch over a virtual terminal connection from locations outside of
the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
(Choose two)
A. The switch must be reachable through a port connected to its management VLAN.
D. The switch must be configured with an IP address, subnet mask, and default gateway.
E. The switch management VLAN must be created and have a membership of at least one switch port
What switch functionality will prevent Layer 2 broadcasts from moving between the networks shown?
A. VLAN
B. STP
C. ISL
D. VTP
63.You need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you
use?
A. Bandwidth 56000
B. Bandwidth 56000000
C. Bandwidth 56
D. Bandwidth 56kbps
64.The company is merging with several local businesses that use routers from multiple vendors. Which routing
protocol would work best to connect company with the enterprise networks it has acquired by providing scalability
and VLSM support while minimizing network overhead?
A. IGRP
B. EIGRP
C. OSPF
D. RIP v2
E. RIP v1
65.You wish to increase the security of all of the routers within your network. What can be done to secure the
virtual terminal interfaces on a router? (Choose two)
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
66. In the network shown below, an associate has the task of planning a Frame Relay implementation to replace
the existing WAN infrastructure.
The addresses for the North, East, and South branch offices have been assigned as shown in the diagram. Which
type of topology should be implemented?
A. Extended star
B. Ring
D. Bus
E. Full mes
A. If no command has been typed in 44 seconds, the console connection will be closed
B. If no router activity has been detected in 1 hour and 44 minutes, the console will be locked out.
C. If no commands have been typed in 1 minute and 44 seconds, the console connection will be closed.
D. If you’re connected to the router by a Telnet connection, input must be detected within 1 minute and 44
seconds or the connection will be closed
68.The network is implementing dialup services for their remote employees. Network uses several different Layer
3 protocols on the network. Authentication of the users connecting to the network is required for security.
Additionally, someemployees will be dialing long distance and will need callback support. Which protocol is the
best choice for these remote access services?
A. 802.1
B. Frame relay
C. HDLC
D. PPP
E. SLIP
F. PAP
69.RIP version 2 is being used as the routing protocol within the network. What does RIP version 2
use to prevent routing loops? (Choose two)
A. CIDR
B. Split horizon
C. Authentication
D. Classless masking
E. Hold-down timers
G. Path Vectoring
70.A network administrator needs to force a high-performance switch that is located in the MDF to become the
root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role
of the Root Bridge?
A. Configure the switch so that it has a lower priority than other switches in the network.
B. Assign the switch a higher MAC address than the other switches in the network have.
C. Configure the switch for full-duplex operation and configure the other switches for half-duplex operation
D. Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge
E. Establish a direct link from the switch to all other switches in the network.