Académique Documents
Professionnel Documents
Culture Documents
The VTY password must be identical with the enable secret password.
Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network
192.66.7.0 is received by Router A?
It will be discarded.
.
Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have
triggered this update? (Choose two.)
Router B received an error message indicating the last update was not received.
. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?
10
. Which of the following WAN connection services typically use synchronous communications? (Choose two.)
circuit-switched
leased line
packet-switched
Ethernet
. Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?
Router# c
c
c
c
Router#
Router#
c c
c
c
Router#
Router#
Router(config)#
c c
c
c
Router(config)#
Router#
Router#
Router(config)# c
c
c
c
Router(config)#
Router#
. What types of messages are sent periodically by devices configured for CDP?
probes
beacons
signals
advertisements
routing updates
unicast
. An administrator has made routing protocol changes to a router¶s configuration. To ensure that the changes are implemented,
the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays
"Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?
c. Which command is used to redirect debug information to a device that is connected though a Telnet session?
Router#
Router# !
cc. After issuing the command, a technician notices the line "Serial1 is down, line protocol is down" in the
output. Which of the following are possible reasons for this message output? (Choose three.)
Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New
York? (Choose two.)
by determining which interface has the least traffic and sending to it first
by first determining the speed of the links and then cycling packets through the fastest links first
by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time
c
. When would the ROM monitor mode be used? (Choose two.)
c. Which two statements are true about route metrics? (Choose two.)
The more factors that make up a metric, the greater the flexibility to tailor network operations.
Routing protocols use metrics to send routing updates to directly connected neighbors.
c.
Which of the following are valid static IP routes? (Choose three.)
c. Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user¶s PC has
successfully booted but can not see the network. What should be checked first?
c. What can be determined from the partial output of the command displayed below? (Choose two.)
# $ %c $c&!c c c '((c'" $
)c c c$
'" $
Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)
All routers ignore the change until the route becomes active again.
.
The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to
the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured
in order to enable this communication? (Choose three.)
Idaho(config)# c
cc c
c c
Idaho(config)#
Idaho(config)# c
c c
c
Utah(config)# c
c
c
c c
Utah(config)# c
c
c
Utah(config)#
Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet
is then returned to the source.
The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.
Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message
is sent to the source.
The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent
back to the source.
The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.
c
Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?
RouterA(config)# $
RouterA(config-if)#
RouterA(config)# $
RouterA(config-if)#
RouterA(config)# $
RouterA(config-if)#
RouterB(config)# $
RouterB(config-if)#
RouterB(config)# $
RouterB(config-if)#
RouterB(config)# $
RouterB(config-if)#
. A network administrator can establish a remote session to a host using the Router> c c cc command but is
unsuccessful when using the Router> * command to connect to the same interface. Which of the following could be
the problem? (Choose two.)
The command * was issued from the wrong router prompt.
packet switching
.
The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be
loaded?
.
A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the
commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing
between those networks. What is the cause?
The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.
The wrong port was configured for the ACL so Telnet traffic was still allowed.
The allowed all traffic to pass regardless of the other statements listed in this ACL.
.
Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing
protocol if the default metrics are used?
F, G, E, D, B, A
F, E, D, C, A
F, E, D, A
F, E, D, B, A
. Which of the following is the correct flow of routines for a router startup?
. In the configuration register value 0×2104, which value represents the boot field setting?
. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not
checked. If all of the ACL statements are unmatched, what happens to the packet?
The packets will be placed in a buffer and forwarded when the ACL is removed.
The packets will be sent to the source with an error notification message.
The implicit statement placed at the end of the list will allow the packets to flow through uninhibited.
The implicit statement placed at the end of the list will cause the packets to be dropped.
c. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)
The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on
router B to conserve bandwidth on port E0?
!+
!+
. What are the major characteristics of a wide area network? (Choose three.)
. If the config-register on a router is set to 0×2102, where is the first place the router will look for boot system commands?
RAM
ROM
Flash
NVRAM
. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)
It can be used to verify the operation of application layer software between the source and destination.
Telnet can use the ICMP protocol to verify a hardware connection and network layer address.
Time to Live values are used by Telnet to identify a failure of device between source and destination.
.
The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network
discovery process that will occur for this network? (Choose three.)
The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.
All of the routers will have direct knowledge of the exact topology of the entire network.
The Key West router will forward routing table information to the Miami and Palm Beach routers.
The Miami router will learn about network 192.168.1.0 from the Key West router.
If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.
. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)
calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)
12
20
30
120
.
Refer to the output from the command. What can be concluded from the output of this router command?
c. Which of the following are true statements about creating and applying access lists? (Choose three.)
Access list entries should filter in the order from general to specific.
One access list per port per protocol per direction is permitted.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.
Statements are processed sequentially from top to bottom until a match is found.
The keyword refers to traffic entering the network from the router interface where the ACL is applied.
. Which of the following are true regarding the setup configuration mode? (Choose three.)
A router that does not find a valid IOS during the boot process will start the system configuration dialog.
A router that does not find a valid configuration file during the boot process will start the system configuration dialog.
. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as
Telnet, web browsers, and e-mail? (Choose three.)
A default gateway must be configured for datagrams to travel outside of the LAN.
The hosts must be directly connected to a switch to travel outside of the LAN.
To ensure accurate delivery, a router must be configured and accessible by hosts on the network.
.
Given the above topology, which of the following statements are true? (Choose two.)
If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.
If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.
If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.
If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.
If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.
. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays
the correct configuration syntax for creating a host name.
c
c
!
c
!
"#$%
c
$
&'&'c
c
c
$&'&'c
!
!
(
)*
*
+
*
c& & & &',
-. c&& & &'c-
c(, c&/ & &'c-
c/( c- .& &'(.
c0( c-, c &'(.
c0( c-, ( &'(.
1
c
**
c0( c-, c 2
#
*
#
*
$
&'&'&
#
*
#
*
.
3
456
%6
$!6
2 *
%$)3
c/( c- & &'c0
&
c
"7*c/( c- & && & & (22&
c
"7*c/( c- & && & 1 (22&
c
"7*c/( c- & && & c2 (22&
c
"7*c/( c- & && & 1c (22&
-
#) !
c0( c-, c c*
$&'&'&
(
c0( c-, ( c*
#)
(
c
"
/
%$)38$*
#
8$9
#
:
%$)3
#
+
! !
#
*
;
,
<#=)
>
#
>
#*
>!98
<#=)
**
<#=)
0
9
+
c& c c &'(.c& c ( &'(.
:
;
)*
(3
<
+
*
*
c&
(
$&'&'&
c/( c- c &
*
c/( c- 1 &*
*
*
*c/( c- c &+
*
cc
*
c0( c-, ( &'(.
c
c0( c-, c &'(.
(
c& c c &'1&
c
c& c c &'1&
(
c0( c-, c &'(.
c
c0( c-, ( &'(.
(
c(
<#=)
#
<#=)
*
#
*
*"
:
#
+
:
#
#
c1
*
%$)3
4*
#!
6
*
#!
*
#)
3
<
%$)3
#)
c.
#=)
#)c
#)(
<#=)
c2
c
*c/( c- & &
!c2-c-&
4*c0( c-, & c-
3
<&'&
!<#=)
c
<#=)%$)3
4*c/( c/ & &
4
c- *
#)>#)?>*
*
#)c
#)(
<#=)
%$)3
c/
#
*
#
*
8
&
#
#)
*
#
6
#
#)*
c,
c1
*
*
)c)(
*
("c
*
("1
"
@
("c
("1
*
("1>
("c
*
c0
*"
*
*
*
*
*
+
(&
#)
#
>
c0( c-, &*
*
c0( c-, c &'(.>c0( c-, ( &'(.>c0( c-, 1 &'(.
*
(c
<#=)
2&
c
<
(( *
#)
#
"3
#
*
#
*
#
#
*
(1
(**
c0( c-, ( &
#
*
#
*
$&'&'&
#
*
3&'&
#
*c
(.
:
*
%$)3#!
#!
(2
"
*
8
>
#)#)
#)
#)#)
*
>
(-
>
>>!
#
*#$)
*
(/
c(
>
3
<
3
<
c
%
(,
"
>
c
c0( c-, c &'(.Ac(&'cB
c/( c- ( c>&&C&&C(.>$
&'&'c
c0( c-, c&& &'(.Ac(&'cB
c/( c- c c>&&C&&C(.>$
&'&'&
$c0( c-, c &'(.Ac'&B
3
<&'&
c0( c-, 0 &'(.Ac(&'cB
c/( c- ( c>&&C&&C(.>$
&'&'&
c0( c-, ( &'(.Ac(&'cB
c/( c- c (>&&C&&C(.>$
&'&'&
(0
!6D
6D
3
D
456D
%6D
*
)%$D
1&
>*
<
#*
#)>
+
#*
#)>
""<
#*
<#=)
>
"!"<
##)<#=)
>
#)
1c
(
c
E
c
#)
c
c
3&'&c
c
#)
$&'&'&(
c
#)
3&'&(
1(
c0( c-, - &*>
E>
>*
c0( c-, - &*
<#=)
#)
#)><#=)
<#=)>#)
#)><#=)
#)><#=)
11
*
(
(1
c1
$
*
81
1. E
4
*
3
*
8
12
+
$9'!$9
!<
!<
5 12
1-
c(
<#=)
c(
><#=)
:
*
<
<#=)
<#=)
#!
1/
;
#
#%$
#
#
*
#
>
#
*
*
1/
#)(
c
c0( c-, ( cc& c c (>
c0( c-, . c
(
c0( c-, . &*
#)
(
#)c
10
c(
:
$
(
$
(c
*
*
6
.&
*
#$"#$
<#=)
%$)3
#)c
#)(
.c
(
>
#
c
#
9
9
'
9
9
!><>3>=
>E> >
>!><>3
>!><>=
*
!<
!<
!<
3c0c,
#)
*
*
%$#
)'#)
*
*
6
8(
81
*
81
c
E
#)
c3
<&'c
E
*
*
c
*
c
c& c c &'(.*
c
*
> ( (
*
*c& c c &'(.
c
*
> ( (
*
*c& c c &'(.
c
*
> ( (
*
*c& c c &'(.
*
*
*
'
""
;
#*
:>*
.&
84
)'#)
*
*
>*
>
*
v E
c(, c&/ & &*
*(22 (22 (., &
1&
(2-
(&.-
(&.,
.&0.
.&0-
*
3)
!4$
!E)
+
*
#).
c& c c( /0'(,
c& c c( cc1'(,
c& c c( 1('(,
c& c cc 2'(/
c& c cc 0/'(/
c& c cc c(,'(/
+
"
<?<
!
6
!
456
#
3
&
"
"
*
#)
E
E
#)
Cc0( c-, c&& c0J$6
*C(22 (22 (22 (.,J!=Cc0( c- c (
#)
Cc0( c-, c&& (&J$6
*C(22 (22 (22 (.&J!=Cc0( c-, c&& c/
#)
Cc0( c-, c&& (cJ$6
*C(22 (22 (22 (.,J!=Cc0( c-, c&& c,
#)
Cc0( c-, c&& ((J$6
*C(22 (22 (22 (.&J!=Cc& c c 2
#)
Cc0( c-, c&& 1&J$6
*C(22 (22 (22 (.&J!=Cc0( c-, c c
#)
Cc0( c-, c&& 1cJ$6
*C(22 (22 (22 (.&J!=Cc0( c-, c&& c,
c
#%$
%6
"
+
+
7
7
7
"
7
"
7
7
"
7
"
7
*
v
81
*
*
)c
E68
+
%$#
#)
*
+
)c
)(
>
)c
c& & & (2.
c0( c-, & (.0
c0( c-, & (2&
c& & c (2.
#%$
+>
8#*
*
"!
"K
"
"L
v
""
vc
v
*
*
c.
!
Paris(config)# router eigrp 100
Paris(config)# router eigrp
Paris(config-router)# network 192.168.6.0
Paris(config-router)# network 192.168.7.0
Paris(config-router)# network 192.168.8.0
Paris(config-router)# network 192.168.9.0
".
#c$"c%c&
'
#
D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0
O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0
R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0
I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/0
(. '
IGRP
RIPv1
RIPv2
EIGRP
Ä.
c "
)'
!
Set a lower priority on R2.
Configure the routers in the same area.
Set a lower cost on R2 compared to R1.
Add a backup designated router to the network.
Match the hello and dead timers on both routers.
*. '
A metric is a value used by a particular routing protocol to compare paths to remote networks.
A common metric is used by all routing protocols.
The metric with the highest value is installed in the routing table.
The router may use only one parameter at a time to calculate the metric.
%.
+ " +
'
c
+ !
ip route 0.0.0.0 0.0.0.0 Fa0/0
ip route 0.0.0.0 0.0.0.0 Fa0/1
ip route 0.0.0.0 0.0.0.0 10.1.1.1
ip route 0.0.0.0 0.0.0.0 10.1.1.2
ip route 209.165.202.0 255.255.255.0 10.1.1.1
ip route 209.165.202.0 255.255.255.0 10.1.1.2
$.
,+
'
The IP address of host A is incorrect.
The default gateway of host A is incorrect.
The Fa0/1 interfaces of the two routers are configured for different subnets.
The subnet mask for the Fa0/0 interface of R1 is incorrect.
-.
.
)'
The two routers are connected on a multiaccess network.
The hello and dead intervals are different on the two routers.
They have different OSPF router IDs.
They have different process IDs.
/.
c#+0# ( c
+#c&"&&1c% 0#c&"&&1c%
' c
Both routes are installed and load balancing occurs across both paths.
The route via Path B is installed because the EIGRP route has the best metric to network 10.2.0.0/16.
The route via Path A is installed because the static route has the best metric to network 10.2.0.0/16.
The route via Path B is installed because the EIGRP route has the lowest administrative distance to network 10.2.0.0/16.
The route via Path A is installed because the static route has the lowest administrative distance to network 10.2.0.0/16.
c&.
+
c "
2 '
The FastEthernet interface of R1 is disabled.
One of the default routes is configured incorrectly.
A routing protocol is not configured on both routers.
The default gateway has not been configured on both routers.
cc. '
Flash
NVRAM
ROM
SDRAM
c".
0
"
c c/"c%-"cc&cc"
c/"c%-Äc
'
The serial interface between two routers is down.
R2 is not forwarding the routing updates.
The 192.168.4.0 network is not included in the RIP configuration of R2.
RIPv1 needs to be configured.
c(. ' # !
IS-IS
EIGRP
OSPF
RIPv1
RIPv2
cÄ.
c "
c "
)
'
#
Enable the serial interfaces of both routers.
Configure EIGRP to send periodic updates.
Configure the same hello interval between the routers.
Configure both routers with the same EIGRP process ID.
c*.
'
R1 is originating the route 172.30.200.32/28.
Automatic summarization is disabled.
The 172.30.200.16/28 network is one hop away from R1.
A classful routing protocol is being used.
c%.
+# 3
c'
c "
10.0.0.0/16 is subnetted, 1 subnets
D 10.5.0.0[90/205891] via 192.168.1.2, S0/0/0
10.0.0.0/24 is subnetted, 4 subnets
D 10.5.0.0[90/205198] via 192.168.1.2, S0/0/0
10.0.0.0/22 is subnetted, 1 subnets
D 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0
10.0.0.0/8 is subnetted, 4 subnets
D 10.5.0.0[90/205001] via 192.168.1.2, S0/0/0
c$.
+
c.#c&cc&1"/c&ccc%1"/
'
Because RIPv1 is a classless protocol, it does not support this access.
RIPv1 does not support discontiguous networks.
RIPv1 does not support load balancing.
RIPv1 does not support automatic summarization.
c-.
+#
0 #
'
+
/>A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
B(config)# router rip
B(config-router)# passive-interface S0/0
A(config)# no router rip
c/.
+# c
+ cc$"c%cc '
The serial interface on R1 is configured incorrectly.
The default route is configured incorrectly.
The default-information originate command must be issued on R1.
Autosummarization must be disabled on R1.
"&. +4#
0
' #
the path learned via EIGRP
the path learned via RIP
the path with the highest metric value
both paths with load balancing
"c.
'
"
It is the administrative distance of the routing protocol.
It is the number of hops between R2 and the 192.168.8.0/24 network.
It is the value used by the DUAL algorithm to determine the bandwidth for the link.
It is the convergence time measured in seconds.
"".
0 5
c !
R 192.168.1.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/1
R 192.168.100.0/24 [120/1] via 172.16.1.1, 00:00:24, Serial0/0/0
S 192.168.1.0/24 [1/0] via FastEthernet0/0
R 192.168.9.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/0
R 192.168.2.0/24 [120/1] via 172.16.1.2, 00:00:24, Serial0/0/0
"(.
c (
+
#
'
#
c "
The packets will travel via R2-R1.
The packets will travel via R2-R3.
The traffic will be load-balanced between two paths ² via R2-R1 and via R2-R3.
The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.
"Ä. ' !
It forwards data packets toward their destination.
It forwards the packet to the destination if the TTL value is 0.
It changes the destination IP address of data packets before forwarding them to an exit interface.
It determines the best path based on the destination MAC address.
It acts as an intersection between multiple IP networks.
"*.
.#6 c " (.
+
# #
'
from R1 to 172.16.1.1
from R1 to 192.168.3.1
from R2 to 192.168.1.1
from R2 to 192.168.3.1
"%. +#
c$""Ä%Ä&1c-#
7+8'
172.16.128.154/18
172.16.255.254/18
172.24.64.254/18
172.24.127.254/18
"$. '
!
It is saved in the topology table for use if the primary route fails.
It may be backed up by a feasible successor route.
It is used by EIGRP to forward traffic to the destination.
It is flagged as active in the routing table.
After the discovery process has occurred, the successor route is stored in the neighbor table.
"-.
+
*& ('
192.168.1.0/24
192.168.1.48 /28
192.168.1.32/27
192.168.1.64/26
"/.
'
Using dynamic routing instead of static routing would have required fewer configuration steps.
The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.
Packets routed to the R2 Fast Ethernet interface require two routing table lookups.
The static route will not work correctly.
(&.
'
"
The routing table content indicates that interface S0/0/0 is administratively down.
The route for 172.16.1.0 is a static route.
A packet that is destined for a host on the 172.16.3.0 network is forwarded without performing a routing table lookup.
The packets that are routed to network 172.16.1.0 require two routing table lookups.
(c. '# 9:2
c$"c%&&1c/ &
R1(config-router)# network 172.16.0.0 0.0.0.255 area 0
R1(config-router)# network 172.16.0.0 0.0.3.255 area 0
R1(config-router)# network 172.16.0.0 0.0.15.255 area 0
R1(config-router)# network 172.16.0.0 0.0.31.255 area 0
(". ,
New routing updates are ignored until the network has converged.
Failed routes are advertised with a metric of infinity.
A route is marked as unavailable when its Time to Live is exceeded.
The unreachable route is cleared from the routing table after the invalid timer expires.
((.
+c/"c%-%&#
,
#
c/"c%-%&#
'
Compared to RIP, EIGRP has a lower administrative distance.
Compared to EIGRP, RIP has a higher metric value for the route.
Compared to RIP, the EIGRP route has fewer hops.
Compared to RIP, EIGRP has a faster update timer.
(Ä.
# # 4
# !
10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
192.168.2.0/24
(*. '
c
It is a link-state routing proto
col.
It excludes subnet information from the routing updates.
It uses the DUAL algorithm to insert backup routes into the topology table.
It uses classless routing as the default method on the router.
(%. + # 9:2
8
#
'
;
The highest MAC address among the active interfaces of the network will be used.
There will be no router ID until a loopback interface is configured.
The highest IP address among the active FastEthernet interfaces that are running OSPF will be used.
The highest IP address among the active interfaces will be used.
($.
" c