Vous êtes sur la page 1sur 36

c. Which statements are true regarding VTY passwords? (Choose two.

VTY passwords must be encrypted.

All VTY lines do not need to use the same password.

A VTY password is required to establish telnet sessions.

The VTY password is set with the command  .

The VTY password must be identical with the enable secret password.

Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network
192.66.7.0 is received by Router A?

It will be forwarded through interface S1.

It will be forwarded to the default route.

It will be directed toward the Internet.

It will be discarded.

Which command will produce the output shown in the graphic?


   

    

     

    

.

Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have
triggered this update? (Choose two.)

Router B received a configuration change.

Router A sent a message requesting an update.

Router C came online after Router B sent the RIP update.

Router B received an error message indicating the last update was not received.

. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?

10

. Which of the following WAN connection services typically use synchronous communications? (Choose two.)

circuit-switched

leased line

packet-switched

Ethernet

analog modem services

. Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?

Router# c
c
c   c 
Router# 
Router#    c c
c
c
Router# 

Router# 
Router(config)#    c c
c
c
Router(config)# 
Router# 

Router# 
Router(config)# c
c
c   c 
Router(config)# 
Router# 

. What types of messages are sent periodically by devices configured for CDP?

probes

beacons

signals

advertisements

routing updates

unicast

. An administrator has made routing protocol changes to a router¶s configuration. To ensure that the changes are implemented,
the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays
"Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?

There was a POST failure.

The incorrect IOS loaded.

There was an error in the startup configuration file.

The configuration register was set to ignore NVRAM.

c. Which command is used to redirect debug information to a device that is connected though a Telnet session?

Router# 

Router#   !

Router#  

Router# !

cc. After issuing the    command, a technician notices the line "Serial1 is down, line protocol is down" in the
output. Which of the following are possible reasons for this message output? (Choose three.)

There is a mismatch in the encapsulation type on both ends of the link.

A Layer 1 issue exists.

An interface problem exists.

The clockrate was not set during configuration.

There is no usable media for the protocol.

Keepalive messages are not being sent.


c .

Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New
York? (Choose two.)

by forwarding packets over paths of equal cost

by forwarding packets according to hop count and speed of the link

by determining which interface has the least traffic and sending to it first

by first determining the speed of the links and then cycling packets through the fastest links first

by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time

c
. When would the ROM monitor mode be used? (Choose two.)

maintaining routing configuration settings

modifying the IOS image stored in Flash

running a limited IOS feature set

performing the bootstrap process

c. Which two statements are true about route metrics? (Choose two.)

The more factors that make up a metric, the greater the flexibility to tailor network operations.

The larger the metric number, the better the path.

Routing protocols use metrics to send routing updates to directly connected neighbors.

Bandwidth and delay are static metrics used by RIP v1.

Ticks, delay, and cost are metrics used by routing protocols.

c.
Which of the following are valid static IP routes? (Choose three.)

RouterB(config)# c c    "c

RouterC(config)# c c c   "c

RouterA(config)# c c 


   c c  

RouterB(config)# c c c   c c  

RouterC(config)# c c     c c c

RouterA(config)# c c    c c  c

c. Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user¶s PC has
successfully booted but can not see the network. What should be checked first?

the PC power cord

the file server

the PC network interface card LEDs

the LAN switch in the wiring closet

the configuration of the router interface attached to the LAN

c. What can be determined from the partial output of the   command displayed below? (Choose two.)
#   $ %c $c&!c c c '((c'" $
)c c c$    '" $

The next update will be in 76 seconds.

The next update will be in 16 seconds.

The administrative distance is 120 and the metric is 1.

The metric is 120 and the administrative distance is 1.

200.200.200.0 is configured on Serial0/0.

192.168.10.2 is configured on Serial0/0.

c . Why is it useful to have an interface description?

A user can telnet to the router using the interface description.

The interface description is a shortcut way to edit the running-config.

The interface description helps identify distant network connections.

The interface will remain inactive until an interface description is applied.


c.

Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)

Updates start broadcasting every 30 seconds.

Updates start broadcasting every 90 seconds.

Link-state advertisements are flooded.

Link-state advertisements are sent only to neighboring routers.

All routers note the change and adjust routes.

All routers ignore the change until the route becomes active again.

.

The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to
the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured
in order to enable this communication? (Choose three.)
Idaho(config)# c 
cc   c 
c c

Idaho(config)# 

Idaho(config)# c 
c    c 
c 

Utah(config)# c 
c
   c 
c c

Utah(config)# c 
c
   c

Utah(config)# 

c. Which statement about datagram life is true?

Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet
is then returned to the source.

The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.

Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message
is sent to the source.

The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent
back to the source.

The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.
      c 
  
Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?

RouterA(config)# $
RouterA(config-if)#  

RouterA(config)# $
RouterA(config-if)#  

RouterA(config)# $
RouterA(config-if)#  

RouterB(config)# $
RouterB(config-if)#  
RouterB(config)# $
RouterB(config-if)#  

RouterB(config)# $
RouterB(config-if)#  


. A network administrator can establish a remote session to a host using the Router>  c c cc command but is
unsuccessful when using the Router>  * command to connect to the same interface. Which of the following could be
the problem? (Choose two.)

The ip host table on the router is not configured.

The command  * was issued from the wrong router prompt.

The routing table is missing.

Domain name services are not available.

. Which of the following are functions of a router? (Choose three.)

packet switching

extension of network segments

segmentation of local area networks

selection of best path based on a logical addressing

selection of best path based on a physical addressing

.

The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be
loaded?

The router will load c2500-js-l.112-26d.

The router will load c2500-d-l.120-9.

The router will load the IOS from ROM.

The router will boot into ROM monitor mode.

.

A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the
commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing
between those networks. What is the cause?
The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.

The wrong port was configured for the ACL so Telnet traffic was still allowed.

The access list has not been assigned to an interface.

The  allowed all traffic to pass regardless of the other statements listed in this ACL.

.

Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing
protocol if the default metrics are used?

F, G, E, D, B, A

F, E, D, C, A

F, E, D, A

F, E, D, B, A

. Which of the following is the correct flow of routines for a router startup?

load bootstrap, load IOS, apply configuration

load bootstrap, apply configuration, load IOS

load IOS, load bootstrap, apply configuration, check hardware

check hardware, apply configuration, load bootstrap, load IOS

. In the configuration register value 0×2104, which value represents the boot field setting?

. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not
checked. If all of the ACL statements are unmatched, what happens to the packet?

The packets will be placed in a buffer and forwarded when the ACL is removed.

The packets will be sent to the source with an error notification message.
The implicit  statement placed at the end of the list will allow the packets to flow through uninhibited.

The implicit  statement placed at the end of the list will cause the packets to be dropped.

c. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)

telnetting into the router

initiating a debug session

configuring a router for the first time

using the Aux port to check the current configuration

using the console port to check the current configuration

The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on
router B to conserve bandwidth on port E0?

 

  

!+

!+

  

. When must a router serial interface be configured with the  ,command?

when the interface is functioning as a DTE device

when the interface timers have been cleared

when the connected DTE device is shut down

when the interface is functioning as a DCE device

. What are the major characteristics of a wide area network? (Choose three.)

connect devices separated by wide geographical areas

includes technologies of FDDI and Ethernet

uses serial connections to access bandwidth


common carriers are needed for connections

type of connection between a router and a switch

. If the config-register on a router is set to 0×2102, where is the first place the router will look for boot system commands?

RAM

ROM

Flash

NVRAM

. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)

It can be used to verify the operation of application layer software between the source and destination.

Telnet can use the ICMP protocol to verify a hardware connection and network layer address.

It is the most complete testing mechanism available.

Remote networks may be accessed via a Telnet session for troubleshooting.

Time to Live values are used by Telnet to identify a failure of device between source and destination.

.

The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network
discovery process that will occur for this network? (Choose three.)

The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.

All of the routers will have direct knowledge of the exact topology of the entire network.

The Key West router will forward routing table information to the Miami and Palm Beach routers.

The Miami router will learn about network 192.168.1.0 from the Key West router.

If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.

. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)

functions as a link-state routing protocol

discards packets when the hop count is greater than 15

calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)

created as a proprietary routing protocol


floods updates as topology changes occur

broadcasts routing updates every 90 seconds or as triggered by topology changes

. The following line was displayed in the output of the   command.


#c c 
$ %c $
&!c c   '((
'" $
What is the value of the routing metric?

12

20

30

120

.

Refer to the output from the    command. What can be concluded from the output of this router command?

A preferred route to the destination has not been set.

There are two equal cost paths to network 1.0.0.0.

Both interfaces are being used equally to route traffic.

A variance must be set to load-balance across multiple paths.

c. Which of the following are true statements about creating and applying access lists? (Choose three.)

Access list entries should filter in the order from general to specific.

One access list per port per protocol per direction is permitted.

Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.

There is an implicit deny at the end of all access lists.

Statements are processed sequentially from top to bottom until a match is found.

The  keyword refers to traffic entering the network from the router interface where the ACL is applied.

 . Which of the following are true regarding the setup configuration mode? (Choose three.)

To abort the setup mode, use the CTRL+SHIFT+6 keys.


To abort the setup mode, use the CTRL+C keys.

Setup mode allows a complete configuration of the router.

To enter setup mode, use the privileged mode  command.

A router that does not find a valid IOS during the boot process will start the system configuration dialog.

A router that does not find a valid configuration file during the boot process will start the system configuration dialog.


. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as
Telnet, web browsers, and e-mail? (Choose three.)

TCP/IP must be installed and properly configured on each device.

Multiple subnets must be configured on the router to ensure accurate delivery.

A default gateway must be configured for datagrams to travel outside of the LAN.

The hosts must be directly connected to a switch to travel outside of the LAN.

To ensure accurate delivery, a router must be configured and accessible by hosts on the network.

.

Given the above topology, which of the following statements are true? (Choose two.)

If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.

If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.

If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.

If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.

If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.

. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays
the correct configuration syntax for creating a host name.

Router#  - c

Router(config)#  - c

Router(config-if)#  - c

Router(config)#  - c$ 

c  

   
   c 
  
 

  
 !

c 
 !
"#$%

c 


$
&'&'c
c 
c
$&'&'c

 ! 
 !   



 

(  

 )*  

* 
+

*  
c& & & &',
-. c&& & &'c-
c(, c&/ & &'c-
c/( c- .& &'(.
c0( c-, c &'(.
c0( c-, ( &'(.

1  

   
c

 

**
 

c0( c-, c 2
#
* 
#
*
$
&'&'& 
#

*
 
#
* 
. 

  
 
3 
456
%6
$!6
2 *



%$)3

  

c/( c- & &'c0

&
c
"7*c/( c- & && & & (22&
c
"7*c/( c- & && & 1 (22&
c
"7*c/( c- & && & c2 (22&
c
"7*c/( c- & && & 1c (22&

-  

   
#) !
 c0( c-, c c*
$&'&'&
( 

 
c0( c-, ( c* 

 
 
 



 #) 
(


 
c

 
"  

     

/ 

%$)38$*
#
 

8$9 
#
   


:
%$)3 
#
  

 + 

 
! ! 
#
 *   
;
  

, 
   



<#=)  
 
  
>
 

   
#
   

   >
  
 
#* 



>!98  



 

 
 
  
<#=)

 **
   




 
 
 
<#=) 
 
 
  
 

0  

 
 





9



  

+


  
c& c c &'(.c& c ( &'(. : 
    
; 
)* (3 <
+

 * 
 

* 

c&  

 
 
 (

 

 
$&'&'&



 
c/( c- c &
 
 
*
 
 c/( c- 1 &*



 * 
* *c/( c- c &+

 * 

cc  

 
  

  *

   
 
  

  
c0( c-, ( &'(.



 c 
c0( c-, c &'(.



 ( 
c& c c &'1&



 c 
c& c c &'1&



 ( 
c0( c-, c &'(.



 c 
c0( c-, ( &'(.



 ( 

c(  <#=)
 
 #
<#=) 


   

*
  
 
#   *  
*"  

 :
 
#  +
 :
  
  
 
#

  
 

 
 
  
#
 




 

c1  
*


%$)3
 

 4 *
    


  
#!

 6 

 *
   

 #!
 *


 

 #) 
3 <
 
%$)3
   

 #) 

 
   
c. 



   
 
#=)
#)c
#)(
<#=)
c2  

 
  
 c  
*c/( c- & & !c2-c-& 
4*c0( c-, & c-   
3 <&'& 
!<#=)    
c

 <#=)%$)3
 
4*c/( c/ & & 
 
4  
 
c- *


#)>#)?> * 



*
#)c
#)(
<#=)
%$)3

c/ 
   
# * 
 

 
# * 


 8
& 
#  

#) *  


 
#
      

6 
#  
 
 
#)* 
c,  

  c1 

 




 
 

 

*

   


   
*  )c)(
* 

("c 
* 

("1 


 "   @
("c
("1 
* 

("1>
("c
 
  * 
c0 
  

*" 
   
* 


 
* 

   * 


 

 
   
*
* +
 



 
 


  


   

(&  

 
 

#) 
 #
  
 
>



 

 

c0( c-, &* 
 

  
 * c0( c-, c &'(.>c0( c-, ( &'(.>c0( c-, 1 &'(.
 

  

 
    
  
 



 

 

 * 

(c  

 
     

  




<#=)   2& 
    
 

  c 
 

  
 
< 
   
(( *

  #)




    

 

  
#   "3

   
#
 * 
# 

* 
#

  
  
 
#
 


 


* 
(1  

 

(**
 
c0( c-, ( &
#
* 
#
*
$&'&'&
 
#
*
3&'&
 
#
*c 
(.  

      
: 

 

 
 * 

 
 

%$)3#! 

 #! 
(2 
  
 
" 
* 
  


  8
>

  
  #)#)

 


    

#) 
  
 
 

 
  

#)#)

 
  *
 > 
 
 
(-  

  
 
    


 
 >
 

  >>! # 

*#$)
  
 
  
 

 *


 
(/  

 
  

 c(
  > 
 
3 <
 
 
 

 
3 <
c

  
% 


 



  
  
  
(,  

    
"
 

 > 

 c  
c0( c-, c &'(.Ac(&'cB
c/( c- ( c>&&C&&C(.>$
&'&'c
c0( c-, c&& &'(.Ac(&'cB
c/( c- c c>&&C&&C(.>$
&'&'&
$c0( c-, c &'(.Ac'&B
3 <&'&
c0( c-, 0 &'(.Ac(&'cB
c/( c- ( c>&&C&&C(.>$
&'&'&
c0( c-, ( &'(.Ac(&'cB
c/( c- c (>&&C&&C(.>$
&'&'&

(0 


 
  
!6D   
6D  
  
3 D  
 
  
456D  



%6D   *



)%$ D 
 
  
1&  

   




 
 >*
 


< 
 
 

#*  #)>

 +  
#*  #)>
""<

 
  
#*  <#=)
>

"!"<    
# #)<#=) 
>
 


 #)
 
1c  

 (


 
 c  
  E 
 
  

 
 

 
c
#)  

c 

c


3&'&c 

 
c
#) $&'&'&( 

c
#) 3&'&( 

1(  

  c0( c-, - &*>  
 

   E>

 
>*

   
 
c0( c-, - &*
<#=) 
  

#)
#)><#=) 



 
<#=)>#) 

 
#)><#=)  
#)><#=)  
 

11  

 
  

  
*
 
( 
 

 (1
 
c1
 
$

 
* 
81

  

 

1. E 


 
4
 

*  
3
 





 

* 
 
 
8

  
 

 


 
 

12  

 
 +


  
$9'!$9

! <

!<

  
5 12 

1-  

  c(


 

  
<#=)
 c(


 



 > <#=)
 : 

  * 
 
<  

   

<#=) 

 

 
  

  
 <#=) #! 
1/ 
    

;

 

  
#
  
#%$

 
#
   




 
#   *
 

 
 
#
    
 > 



 
#

   * * 


 

1/  

   
#)(
 
 
 c
c0( c-, ( cc& c c (> 
 

c0( c-, . c 

 


 

  
 
(


 
c0( c-, . &*


#)

( 
#)c  
 

10  

 c(   
: 

 
   
$

( 

 
  
$ (c 
 *
* 
6
   

.& 
  
*  
#$"#$
<#=)
%$)3
#)c
#)(

.c  

 (

> 
  # 
 
  
c 
#

   

& & & && & & &3&'&



& & & && & & &3&'c

& & & && & & &c& c c c

& & & && & & &c& c c (

(&0 c-2 (&( &(22 (22 (22 &c& c c c

(&0 c-2 (&( &(22 (22 (22 &c& c c (



.( #  
>  *c/( c- c &


  

  

*
!c/( c- c &'(.A0&'(c02.2-B
c0( c-, (&& c>&&C&&C&0>$
&'&'&
%c/( c- c &'(.Acc&'c&c(B
c0( c-, (&& c>&&C&&C((>$
&'&'&
c/( c- c &'(.Ac(&'cB
c0( c-, (&& c>&&C&&Cc/>$
&'&'&
#c/( c- c &'(.Ac&&'cc0(B
c0( c-, (&& c>&&C&&C&0>$
&'&'&

.1  

 



  c/( c- c 1('(,
c
(
1
.
..  

  *  Cc>(>1    
  


  *
* 





cc/( c- c c
cc0( c-, 1 c
(c0( c-, c c
(c0( c-, 1 c
.2  

  c& . & &*
 
 (

 


c& . & &*


;
"
 




 
.-  

 E 
 
1
.
2
/

./  +  *
<#=)#)   



 

*
 
 

 

<#=)

#)


 

 
 

.,  

 =
 
 

> 
<#=))
  
)

7
c&&
)

7

)

"7*c0( c-, - &
)

"7*c0( c-, / &
)

"7*c0( c-, , &
)

"7*c0( c-, 0 &

.0 
  
#!


%$)3
   
#) 
 3 <


 #) 



 #) 


#) 


c



2&  

 c*  >)) ><*1 c)*c& ( & &'c- 

) *c& ( & &'c-<#=) 

c
 

 
 
 
  
    

) 

   <#=)   
*c& ( & &'c- 

)

    
   
*c& ( & &'c- 

) 

   <#=)  



*c& ( & &'c- 

)

    
  



*c& ( & &'c- 

2c  

 


 
 
*>*

  

  




  
c0( c-, c ( 
 
 


#) 

 c0( c-, c &
$
&'&'c 




 c/( c- c & 

2(  

    ( 
  c E
   

#!  

(
 & 

 *
  

   * 
 

21  *      %$)3
 :  
  
 
  * 
    
 
   
* +  
      

* 

2. *

 
   #) 
c/( (. -. &'c,*
  
84 

#)  




c/( c- c(, c2.'c,
c/( c- (22 (2.'c,
c/( (. -. (2.'c,
c/( (. c(/ (2.'c,

22  

  *



#)
* 

   


   
#)  
 
#)  
 

2-  

 (

  *

 
c   
  


c  

c


  c0( c-, c&& &'1& 




   2&c 
c


  c0( c-, c&& . &'1& 
c
<=)  c& c& c& &'1& 
 
;
    

2/  

 
 
;
 c 

 * (
c0( c-, c &'(.
c0( c-, & &'(.
c0( c-, & &'((
c0( c-, c &'((

2,  

 *

  #)  
*
 

 
#)
  
 

7


"7
"
$&'&

7


"7*c0( c-, (2 .,

"7*c0( c-, (2 -.

7


"7*c0( c-, (2 1(

7


"7
"
$&'&

7


20  

 *

 
;
 c 


 
c  
(>




   
c& & & &'c-
  >c   
!c& 2 & &A0&'(&2,0cB
c0( c-, c (>$&'&'&
c& & & &'(.
  >.   
!c& 2 & &A0&'(&2c0,B
c0( c-, c (>$&'&'&
c& & & &'((
  >c   
!c& 2 & &A0&'(&20&cB
c0( c-, c (>$&'&'&
c& & & &',
  >.   
!c& 2 & &A0&'(&2&&cB
c0( c-, c (>$&'&'&

-&  

 



(
#





 
#
   (c0( c-, , &'(.* 
#
  !98

 

* 
#

 
  

-c 
 
 
   
 


  

 * 


  
 



 

 

  
 

 

-( 
  
*" 
   
 
*"   
* 
 


*
*"  
  
  


 
  
 

  
$

;
 

 

-1      
 

#%$

 

#%$


  






456 
)%$   
 

-.  

 

 



c



c/( 1& (&& 1('(, 

 
;


  
c/( 1& (&& c-'(,*
c 
 

 
  

-2   >

#%$

   
%6> 3 ) > 
 > 3 ) >%6
 >456> 3 ) 
456> 3 ) > 

--  

 E 
  # 
 

#)  

 
 

 
3&'c
  

   
   *3&'&
c

 

-/  

  
#)c  * c& c c &'(0c& c c c-'(0     

 
 #)c
  >
  
 
#)c  

 * 
#)c   
 
#)c  
 
;
 

-,  

  
 <#=)

 
 >*
 

 
 

 c& c c &'(.*c& c ( &'(.*
#
 "! 
#
 "!> ""!" "!
 
  * 
#
  +
"
 
 


 "  " "!""! 
-0 
 
 #)c
#

*" 
 
#    


 
#  !98

  * 
  
#    
  

/&  

 



  2&  1 
        
 
  
 


  
c0( c-, c &'(.
c0( c-, c .,'(,
c0( c-, c 1('(/
c0( c-, c -.'(-

/c  

 *



c  %


>
 


cF 

<?<

&&c

c(1

/,0

0&c

/( 
   <#=)    
#
 
  


 
#  * 
   
#
  <#=)
 

 
#
 


  

  >  
 

   

/1  

  
#)(>*

   
 E> 


 
 E

  


 *

#"



 
#"  
$
*
#)
    
##)(


* 

/.  

 *

 
c  >
 

 
cc/( c- c c
 
  
 
 

c


 



 
"



  
c 
 
;
  
 c 
c ! 


>     

 



   

7  

"
7
 c 

"
7 

  
 
  

  
 
  

     Gc1&G 
 
 
   



 
 
 
 
Gc1&G   

 

  * 
 




   
*
 
 
*
   *  
*
 
 
4
 
 
   
*
 

  



 

  *

  8# )c
 
 
 
 



   

)c 
%    
 
=< + 
 
 
$$E 

 )c 



 

 

    #)


   

   *
'(- 
*


 1&  

 

* 
 

  

 
#) 


 # 
#) 

 


  

v 

  
 




 )
 

   *

 

 

   *
  

 )   c& 1( 2 /.  
#)  
 

!4$  
  

 

 

 *

  8# )c
  
 
 




 
   

)c 


5 H 
 
=< +    


 
 

 
  
#)    
c& & & c
.- c c ,,
c/( 1c 1c c&
c/( 1( c- c&
c0( c-, , ,

 

 

 E 
 
c(/ & & c  > 
 

   

;
 

* 
 
E         
#)   

  
   * 


 
3 <
&'&c

 

c 
%$#

+
*  * 
8c
8(
81
8.

cc 

7
"
 "

 %6
 
 6
 
 456
 
  
 

c )
 >

 >




*  




 )'#) *



)
9 

' I  
9 
c(/ & & c 
9 


  
9 3 )*


 
!  
)I 
 

c 
   *
(&.&    #)*c& & & &
(22 (22 & &
(22 (22 (2. &
(22 (22 (2( &
(22 (22 (., &
(22 (22 (.& &
(22 (22 (22 c(,

c 

 

   !> 

!
!
 >>!
 

cv 

 

 


*>


2    
   
 
  
 
 
 
 
< 
 
 
 



 
 
 
    
 
 


 





 
 
 
""
4
* 

c 

 

 
*
 




#< 3
%$#
)'#)

c 

*  

  456  
>




 


       * 


  
9 
 
 
#   "
>  
#  
"
>  

c 

 

 E   

 
 

E 

* 
E  


  
E    
* 
  *  

c 

 

 *

   c


      






  

   * 

 3 )  
 


 


   3 ) 


  >
"
7

*
 




 
5




 

 
 

c 

 

 )
* 



)


 
9 
c(/ & & c 
9 

 
9 

' 
9 
c& & & (2. 

 

 

   

 

     




 
&'&'&  *

 
 

 


 
&'&'& 

#) 
 
&'&'& 
 
 
&'&'&
  

 


 * 

<?< 
 +

  
 +


 

  
 
 
  
5 H

   

   
  


; 

 



 


 

; 

    

v 

 

 )



)*  *   





   
9 

  
9 

' 

 
9   
9 
 

 

 

 

 

 
 
!><>3>=
>E> >
>!><>3
>!><>=

   

 

*




 ! <



  
! <

 




 !<


 
  
 3c0c,
#)  
* *


 

 

 
 %$# 
 
   
  )'#)  



 



 
*

*



    

 
 
 6 
 



8(



 81 
  




    
 * 


 
 
 
81


 

c 

 

 E 


#) c3 <&'c
 E
*

     
 *
c
*  c  



 
 c& c c &'(.* 
c
*
 > ( (
*
*c& c c &'(. 
c
*
 > ( (
*  
 *c& c c &'(. 
c
*
 > ( (
*  
 
 

*c& c c &'(. 

 *



 * 

*



' 
""

;

#*
:>*
  




 .&  84 

  

 






 
 )'#) 

*  * >*
> 




 



* 

v E    

c(, c&/ & &* 
   *(22 (22 (., &
1&
(2-
(&.-
(&.,
.&0.
.&0-

 
 

  *


3 )
!4$
!E)


 
 
   




  




+



*

 
#).   
       
c& c c( /0'(,
c& c c( cc1'(,
c& c c( 1('(,
c& c cc 2'(/
c& c cc 0/'(/
c& c cc c(,'(/

 
 +

  "



<?<

! 
6
  
! 
456
   
#

 
  
3 




  & 
 "

"

   

 

 

 *




#) 

E  



E 
#) Cc0( c-, c&& c0J$ 6 *C(22 (22 (22 (.,J!=Cc0( c- c (
#) Cc0( c-, c&& (&J$ 6 *C(22 (22 (22 (.&J!=Cc0( c-, c&& c/
#) Cc0( c-, c&& (cJ$ 6 *C(22 (22 (22 (.,J!=Cc0( c-, c&& c,
#) Cc0( c-, c&& ((J$ 6 *C(22 (22 (22 (.&J!=Cc& c c 2
#) Cc0( c-, c&& 1&J$ 6 *C(22 (22 (22 (.&J!=Cc0( c-, c c
#) Cc0( c-, c&& 1cJ$ 6 *C(22 (22 (22 (.&J!=Cc0( c-, c&& c,

c 

#%$
  

 
%6


 
"
 


 




  
  
 

 



+
 





   
  



 

 



 





 
 
+


 

 
 
7    
 
7 
 
 
 
7  
 
"
7
 
"
7
   
 
7   
 
"
7
 
"
7
   

 

 

* 


    



 

 
 




v 
 
 81  

  
 



 
 * 

*   

 

 

 

)c 
 E 68     






+   



 
%$# #)
*   +  





 



 

 

 

 )c
  )(    
 >

 
 


 

  


)c


c& & & (2.
c0( c-, & (.0
c0( c-, & (2&
c& & c (2.

 





 #%$  

 

  +>

 



 8#* *  



 

"!
"K
"
"L

v 

  
""





vc 


  









v 

  
* *

c.

   

     !
Paris(config)# router eigrp 100
Paris(config)# router eigrp
Paris(config-router)# network 192.168.6.0
Paris(config-router)# network 192.168.7.0
Paris(config-router)# network 192.168.8.0
Paris(config-router)# network 192.168.9.0
". 
 
#c$" c% c &  
  '  
 #
D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0
O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0
R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0
I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/0
(. '    
 

IGRP
RIPv1
RIPv2
EIGRP
Ä. 
  c "

 ) '   

  !
Set a lower priority on R2.
Configure the routers in the same area.
Set a lower cost on R2 compared to R1.
Add a backup designated router to the network.
Match the hello and dead timers on both routers.
*. '  
 
 
A metric is a value used by a particular routing protocol to compare paths to remote networks.
A common metric is used by all routing protocols.
The metric with the highest value is installed in the routing table.
The router may use only one parameter at a time to calculate the metric.
%. 
 + "  + 
 ' 
 
  c
 +  !
ip route 0.0.0.0 0.0.0.0 Fa0/0
ip route 0.0.0.0 0.0.0.0 Fa0/1
ip route 0.0.0.0 0.0.0.0 10.1.1.1
ip route 0.0.0.0 0.0.0.0 10.1.1.2
ip route 209.165.202.0 255.255.255.0 10.1.1.1
ip route 209.165.202.0 255.255.255.0 10.1.1.2
$. 
 ,+ 
 '  
The IP address of host A is incorrect.
The default gateway of host A is incorrect.
The Fa0/1 interfaces of the two routers are configured for different subnets.
The subnet mask for the Fa0/0 interface of R1 is incorrect.
-.

 .

 ) ' 
 
The two routers are connected on a multiaccess network.
The hello and dead intervals are different on the two routers.
They have different OSPF router IDs.
They have different process IDs.
/.

  c#+0# (  c
+#c& " & &1c% 0#c& " & &1c%  
'   c    

Both routes are installed and load balancing occurs across both paths.
The route via Path B is installed because the EIGRP route has the best metric to network 10.2.0.0/16.
The route via Path A is installed because the static route has the best metric to network 10.2.0.0/16.
The route via Path B is installed because the EIGRP route has the lowest administrative distance to network 10.2.0.0/16.
The route via Path A is installed because the static route has the lowest administrative distance to network 10.2.0.0/16.
c&. 
 + 
   c " 
 

 2   '  

The FastEthernet interface of R1 is disabled.
One of the default routes is configured incorrectly.
A routing protocol is not configured on both routers.
The default gateway has not been configured on both routers.
cc. '   

Flash
NVRAM
ROM
SDRAM
c". 
 0   "    
c c/" c%- " cc& c c "
 
 c/" c%- Ä c
'   
The serial interface between two routers is down.
R2 is not forwarding the routing updates.
The 192.168.4.0 network is not included in the RIP configuration of R2.
RIPv1 needs to be configured.
c(. '  #  !
IS-IS
EIGRP
OSPF
RIPv1
RIPv2
cÄ. 
   c "     

     c "     
 

  
)
' 
#  

Enable the serial interfaces of both routers.
Configure EIGRP to send periodic updates.
Configure the same hello interval between the routers.
Configure both routers with the same EIGRP process ID.
c*.

 '  
   
R1 is originating the route 172.30.200.32/28.
Automatic summarization is disabled.
The 172.30.200.16/28 network is one hop away from R1.
A classful routing protocol is being used.
c%. 
 +#   3 
 c ' 
  
  c "     


10.0.0.0/16 is subnetted, 1 subnets
D 10.5.0.0[90/205891] via 192.168.1.2, S0/0/0
10.0.0.0/24 is subnetted, 4 subnets
D 10.5.0.0[90/205198] via 192.168.1.2, S0/0/0
10.0.0.0/22 is subnetted, 1 subnets
D 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0
10.0.0.0/8 is subnetted, 4 subnets
D 10.5.0.0[90/205001] via 192.168.1.2, S0/0/0
c$.

 +   c .#c& c c &1"/c& c c c%1"/

 '
 

Because RIPv1 is a classless protocol, it does not support this access.
RIPv1 does not support discontiguous networks.
RIPv1 does not support load balancing.
RIPv1 does not support automatic summarization.
c-.

 +#  
 0  #  
'     
  +
/>A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
B(config)# router rip
B(config-router)# passive-interface S0/0
A(config)# no router rip
c/. 
 +#    c 
   +  cc$" c% c c  '
 

The serial interface on R1 is configured incorrectly.
The default route is configured incorrectly.
The default-information originate command must be issued on R1.
Autosummarization must be disabled on R1.
"&. +4#    0
     ' # 
  
 

the path learned via EIGRP
the path learned via RIP
the path with the highest metric value
both paths with load balancing
"c. 
 '     "
It is the administrative distance of the routing protocol.
It is the number of hops between R2 and the 192.168.8.0/24 network.
It is the value used by the DUAL algorithm to determine the bandwidth for the link.
It is the convergence time measured in seconds.
"".

 0 5 
  
 
 c  !
R 192.168.1.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/1
R 192.168.100.0/24 [120/1] via 172.16.1.1, 00:00:24, Serial0/0/0
S 192.168.1.0/24 [1/0] via FastEthernet0/0
R 192.168.9.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/0
R 192.168.2.0/24 [120/1] via 172.16.1.2, 00:00:24, Serial0/0/0
"(. 
   c (      
   +    #   



'  
 #
 c "
The packets will travel via R2-R1.
The packets will travel via R2-R3.
The traffic will be load-balanced between two paths ² via R2-R1 and via R2-R3.
The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.
"Ä. '   !
It forwards data packets toward their destination.
It forwards the packet to the destination if the TTL value is 0.
It changes the destination IP address of data packets before forwarding them to an exit interface.
It determines the best path based on the destination MAC address.
It acts as an intersection between multiple IP networks.
"*.

 .#6 c " ( .
  +  
# #
'    
from R1 to 172.16.1.1
from R1 to 192.168.3.1
from R2 to 192.168.1.1
from R2 to 192.168.3.1
"%. +#    
 c$" "Ä %Ä &1c-#
   7+8 '    
 
172.16.128.154/18
172.16.255.254/18
172.24.64.254/18
172.24.127.254/18
"$. ' 
   !
It is saved in the topology table for use if the primary route fails.
It may be backed up by a feasible successor route.
It is used by EIGRP to forward traffic to the destination.
It is flagged as active in the routing table.
After the discovery process has occurred, the successor route is stored in the neighbor table.
"-. 
 +    
*& ( ' 



     
192.168.1.0/24
192.168.1.48 /28
192.168.1.32/27
192.168.1.64/26
"/.

 '      
Using dynamic routing instead of static routing would have required fewer configuration steps.
The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.
Packets routed to the R2 Fast Ethernet interface require two routing table lookups.
The static route will not work correctly.
(&. 
 '  
 "
The routing table content indicates that interface S0/0/0 is administratively down.
The route for 172.16.1.0 is a static route.
A packet that is destined for a host on the 172.16.3.0 network is forwarded without performing a routing table lookup.
The packets that are routed to network 172.16.1.0 require two routing table lookups.
(c. '#    9:2  
   c$" c% & &1c/ &
R1(config-router)# network 172.16.0.0 0.0.0.255 area 0
R1(config-router)# network 172.16.0.0 0.0.3.255 area 0
R1(config-router)# network 172.16.0.0 0.0.15.255 area 0
R1(config-router)# network 172.16.0.0 0.0.31.255 area 0
(". ,    
New routing updates are ignored until the network has converged.
Failed routes are advertised with a metric of infinity.
A route is marked as unavailable when its Time to Live is exceeded.
The unreachable route is cleared from the routing table after the invalid timer expires.
((. 
 +c/" c%- % &# 
  
 ,   #
    c/" c%- % &# 
  '
   
Compared to RIP, EIGRP has a lower administrative distance.
Compared to EIGRP, RIP has a higher metric value for the route.
Compared to RIP, the EIGRP route has fewer hops.
Compared to RIP, EIGRP has a faster update timer.
(Ä. 
 #  # 4 
 #  !
10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
192.168.2.0/24
(*. '  
  c
It is a link-state routing proto
col.
It excludes subnet information from the routing updates.
It uses the DUAL algorithm to insert backup routes into the topology table.
It uses classless routing as the default method on the router.
(%. + #   9:2     8
#

 '    
;
The highest MAC address among the active interfaces of the network will be used.
There will be no router ID until a loopback interface is configured.
The highest IP address among the active FastEthernet interfaces that are running OSPF will be used.
The highest IP address among the active interfaces will be used.
($. 
   "       c

  ,+ 


 0 
'   

Configure a static route on R1 using the IP address of the serial interface on R1.
Configure a default route on R1 with the exit interface Fa0/0 on R1.
Configure a static route on R1 using the IP address of S0/0/0 on R2.
Configure a default route on R1 using the IP address of Fa0/0 on R2.
(-. ' 
      !
As new neighbors are discovered, entries are placed in a neighbor table.
If the feasible successor has a higher advertised cost than the current successor route, then it becomes the primary route.
If hello packets are not received within the hold time, DUAL must recalculate the topology.
The reported distance is the distance to a destination as advertised by a neighbor.
EIGRP maintains full knowledge of the network topology in the topology table and exchanges full routing information with
neighboring routers in every update.
EIGRP builds one routing table that contains routes for all configured routed protocols.
(/.

 .#     # '
  
  
+ 
the IP address of the server
the default gateway of host A
the IP address of host A
the default gateway of the server
Ä&.' 
  3    
    !
It is enabled by default on all Cisco IOS implementations.
It assigns a value that represents an infinite metric to the poisoned route.
It sends back the poisoned route update to the same interface from where it was received.
It instructs routers to hold all changes that might affect routes, for a specified period of time.
It limits the number of hops a packet can traverse through the network before it is discarded.
Äc. '#

9:2 

)  !
The routers must elect a designated router.
The routers must agree on the network type.
The routers must use the same dead interval.
The routers must exchange link state requests.
The routers must exchange database description packets.
Ä". '  ;   9:2 
  !
the IP address of the first FastEthernet interface
the highest IP address of any logical interface
the highest IP address of any physical interface
the default gateway IP address
the priority value of 1 on any physical interface
Ä(. '  9:27: #
It is used to confirm the receipt of LSUs.
It is used to establish and maintain adjacency with other OSPF routers.
It is used by the receiving routers to request more information about any entry in the DBD.
It is used to check the database synchronization between routers.
ÄÄ. 
 '  3  c   # "
192.168.1.0/24
192.168.0.0/24
192.168.0.0/22
192.168.1.0/22
Ä*. 
 . "
 
 c , 

 
Configure the router ID on both routers.
Configure the R2 router interfaces for area 0.
Configure a loopback interface on both routers.
Configure the proper subnet masks on the router interfaces.
Ä%.

 '     
c$" c% c ("1"-
Router1
Router2
Router3
Router4
Ä$.

 +     
      
   
+
All of the 192.168.x.0 networks will be in the routing table.
Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be in the routing table.
The routing table will be empty because routes and dynamic routes have not been configured.
A default route is automatically installed in the routing table to allow connectivity between the networks.
Ä-. '
  9:  


ROM, TFTP server, flash
flash, TFTP server, ROM
flash, NVRAM, TFTP server
NVRAM, TFTP server, flash
Ä/.'  #5   !
Routers that run a link-state protocol can establish a complete topology of the network.
Routers in a multipoint network that run a link-state protocol can exchange routing tables.
Routers use only hop count for routing decisions.
The shortest path first algorithm is used.
Split horizon is used to avoid routing loops.
*&. 
 '    
 ##
  
   '
  
The router will be unable to ping 192.168.1.2.
The router has two interfaces that participate in the RIP process.
The router will forward the updates for 192.168.1.0 on interface Serial0/0/1.
The router is not originating routes for 172.16.1.0.
*c. 
 '  
 c  !
The route to network 172.16.0.0 has an AD of 156160.
Network 192.168.0.16 can best be reached using FastEthernet0/0.
The AD of EIGRP routes has been manually changed to a value other than the default value.
Router1 is running both the EIGRP and OSPF routing process.
Network 172.17.0.0 can only be reached using a defaul
t route.
No default route has been configured.
*". 
 .c& Ä & &#  '   " 
   c& Ä & &#
split horizon
hold-down timers
route poisoning
triggered updates
*(. Which two statements are true regarding link-state routing protocols? (Choose two.)
They are aware of the complete network topology.
They offer rapid convergence times in large networks.
They do not include subnet masks in their routing updates.
They rely on decreasing hop counts to determine the best path.
They do not work well in networks that require special hierarchical designs.
They pass their entire routing tables to their directly connected neighbors only.
*Ä. 
 '   "##  c/" c%- " &
It will drop the packet.
It will forward the packet via the S0/0/0 interface.
It will forward the packet via the Fa0/0 interface.
It will forward the packet to R1.
**. '   5 #
    !
The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
The router maintains the same source and destination IP.
The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.
*%. +
 '  
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.
*$. 
 , 
3
4
5
7
*-. 
 ' 
    !
Three network devices are directly connected to Router2.
The serial interface between Router2 and Router3 is up.
Router1 and Router3 are directly connected.
Six devices are up and running on the network.
Layer 3 functionality between routers is configured properly.
*/. +#   <+.# '   
 #
RIPv1
RIPv2
EIGRP
OSPF
%&. 
 ' 

  !
The administrative distance of EIGRP has been set to 50.
All routes are stable.
The show ip eigrp topology command has been run on R1.
The serial interface between the two routers is down.
Each route has one feasible successor.
%c. 
 .   "#  
  ,     ,
   
   
# 
Include the default-information originate command.
Include the no auto-summary command.
Specify the network for which RIP routing has to be enabled.
Implement RIPv2 authentication in the network.
%".

 . 
 c ' 

 
   !
ABCD is a router that is connected to R1.
ABCD is a non-CISCO device that is connected to R1.
The device is connected at the Serial0/0/1 interface of R1.
R1 is connected at the S0/0/1 interface of device ABCD.
ABCD does not support switching capability.
%(. 
 .     
 #    +   '  

 
If the network uses the RIP protocol, router A will determine that all paths have equal cost.
If the network uses the RIP protocol, router A will update only the A-C-E path in its routing table.
If the network uses the EIGRP routing protocol, router A will determine that path A-D-E has the lowest cost.
If both RIP and EIGRP protocols are configured on router A, the router will use the route information that is learned by the
RIP routing protocol.
%Ä. 
 +    .#  
+ ' 

 
  !
The entry for 192.168.2.0/24 is missing from the routing table of R1.
The entry for 192.168.1.0/24 is missing from the routing table of R2.
The entry for 10.1.1.0/30 is missing from the routing table of R1.
The entry for 10.1.1.0/30 is missing from the routing table of R2.
The entry for 192.168.1.0/24 is missing from the routing table of R1.
The entry for 192.168.2.0/24 is missing from the routing table of R2.
%*.

 0   ; c/" c%- c c# 
:&1&1&  "
  c/" c%- " c# ' 

 

The routers are configured with different versions of RIP.
R2 is not forwarding the routing updates.
The R1 configuration should include the no auto-summary command.
The maximum path number has been exceeded.
%%. 
  "   .#    c 
' 
   c  !
R1 will forward the route information for subnet 192.168.100.0/30.
The administrative distance has been set to 50 on R1.
R1 will not forward route information for subnet 192.168.100.4.0/30.
R1 will forward the EGRP update for subnet 10.10.10.0/30.
Autosummarization must be enabled.
%$. 
 +    
 #   ' 
 
 c& c c &1"Ä#c& c " &1"Ä#
It will use the A-D path only.
It will use the path A-D, and the paths A-C-D and A-B-D will be retained as the backup paths.
It will use all the paths equally in a round-robin fashion.
The traffic will be load-balanced between A-B-D and A-C-D.
%-. '   
  !
DRAM ± loads the bo
otstrap
RAM ± stores the operating system
Flash ± executes diagnostics at bootup
NVRAM ± stores the configuration file
ROM ± stores the backup configuration file
POST ± runs diagnostics on hardware modules
%/. +#        
 '     !
It uses the Bellman-Ford algorithm to determine the best path.
It displays an actual map of the network topology.
It offers rapid convergence in large networks.
It periodically sends complete routing tables to all connected devices.
It is beneficial in complex and hierarchically designed networks.
$&. 
 ' 4     !
a CSU/DSU device
a DTE device
a DCE device
a crossover cable
a V.35 cable
$c. 
 .  c   ' 
 ##  c/" c%- c *
It will drop the packet.
It will forward the packet to interface Serial0/0/0.
It will determine the route for the packet through a routing protocol.
It will forward the packet to the default gateway.
$". 
 +   0
 
   
Routers B, C, and D have no access to the Internet.
The link to the ISP will be excluded from the routing protocol process.
A default route must be configured on every router.
The wildcard mask is incorrectly configured.
$(. 
 +#     c 9
       c=
 < 
Cisco001
Cisco123
Cisco789
Cisco901
$Ä. A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is no feasible
successor route to a destination network and the successor route fails?
It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.
It sends queries to adjacent neighbors until a new successor route is found.
It immediately sends its entire routing table to its neighbors.
It will set the metric for the failed route to infinity.


Vous aimerez peut-être aussi