Sie sind auf Seite 1von 56

9tut ICND1 Practice Questions (v2.

00)
EXAM: 640-822 File Version: 2.0 Formatted Version By: S Qaisar Shah My Blog : sqaisars.blogspot.com

Interconnecting Cisco Networking Devices Part 1 (640-822) (9tut.net Latest Questions)

Content: Exam Exam Exam Exam Exam Exam Exam Exam

A: B: C: D: E: F: G: H:

LabSim LabSim ARP Testlet Hotspot Operations Subnetting Drag & Drop questions Wireless Questions

The author of these questions is the owner of 9tut.net/9tut.com Visit www.9tut.net for ICND1 and ICND2 questions, sims and feedback. Visit www.9tut.com for CCNA questions, sims and feedback. Good luck studying, practicing and on the exam.

Sections 1. LabSim 2. ARP Testlet 3. Hotspot 4. Operations 5. Subnetting 6. Drag & Drop questions 7. Wireless Questions

Exam A QUESTION 1 Q A1 This topology contains 3 routers and 1 switch. Complete the topology. Drag the appropriate device icons to the labeled Device. Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address. (Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. Use information gathered from the Main router to complete the configuration of any additional routers. No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. Configure each additional router with the following: Configure the interfaces with the correct IP address and enable the interfaces. Set the password to allow console access to consolepw Set the password to allow telnet access to telnetpw Set the password to allow privilege mode access to privpw Note: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. All devices have cable autosensing capabilities disabled. All hosts are PCs Click on Exhibit for further information.
Formatted Version By: S Qaisar Shah.

Answer:

Section: LabSim Explanation/Reference: For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch. The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers Place them on appropriate locations as following:

(Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers) Specify appropriate connections between these devices: The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable The router on the right is connected with the Main router through Serial interfaces: use a serial cable The router on the right and the Switch: use a straight-through cable The router on the left and the computer: use a crossover cable (To remember which type of cable you should use, follow these tips: To connect two serial interfaces of 2 routers we use serial cable To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cable For example: we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host )

Assign appropriate IP addresses for interfaces: From Main router, use show running-config command:

(Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration) From the output we learned that the ip address of Fa0/0 interface of the Main router is 192.168.152.177/28. This address belongs to a subnetwork which has: Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177) Broadcast address: 192.168.152.191 (because 191 = 176 + 16 1) And we can pick up an ip address from the list that belongs to this subnetwork: 192.168.152.190 and assign it to the Fa0/0 interface the router on the left Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16 Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161) Broadcast address: 192.168.152.175 (because 176 = 160 + 16 1) -> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left IP (of the computer on the left) : 192.168.152.129/28 Increment: 16 Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129) Broadcast address: 192.168.152.143 (because 143 = 128 + 16 1) -> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right IP (of the computer on the left) : 192.168.152.225/28 Increment: 16 Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225) Broadcast address: 192.168.152.239 (because 239 = 224 + 16 1) -> we choose 192.168.152.238 from the list Lets have a look at the picture below to summarize:

Configure two routers on the left and right with these commands: Router1 = router on the left Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1> enable Router1# configure terminal Router1(config)# interface fa0/0 Router1(config-if)# ip address 192.168.152.190 Router1(config-if)# no shutdown Router1(config-if)# interface fa0/1 Router1(config-if)# ip address 192.168.152.142 Router1(config-if)# no shutdown Set passwords (configure on two routers) 1. Console password: Router1(config-if)# exit Router1(config)# line console 0 Router1(config-line)# password consolepw

255.255.255.240

255.255.255.240

Router1(config-line)# login Router1(config-line)# exit 2. Telnet password: Router1(config)# line Router1(config-line)# Router1(config-line)# Router1(config-line)# 3. Privilege mode password: Router1(config)# enable password privpw 4. Save the configuration: Router1(config)# exit Router1# copy running-config startup-config vty 0 4 password telnetpw login exit

Configure IP addresses of Router2 (router on the right) Router2> enable Router2# configure terminal Router2(config)# interface fa0/0 Router2(config-if)# ip address 192.168.152.238 Router2(config-if)# no shutdown Router2(config-if)# interface serial0/0 Router2(config-if)# ip address 192.168.152.174 Router2(config-if)# no shutdown 1. Console password: Router2(config-if)# exit Router2(config)# line console 0 Router2(config-line)# password consolepw Router2(config-line)# login Router2(config-line)# exit 2. Telnet password: Router2(config)# line Router2(config-line)# Router2(config-line)# Router2(config-line)# 3. Privilege mode password: Router2(config)# enable password privpw 4. Save the configuration: Router2(config)# exit Router2# copy running-config startup-config vty 0 4 password telnetpw login exit

255.255.255.240

255.255.255.240

QUESTION 2 Q A2 You have been hired by PC Consultants Incorporated to document the layout of the network. Complete the network topology shown in the graphic by dragging the labels below with the appropriate router types, interface types and IP addresses to the graphic.

Find the information you need by using the router console attached to the Home router. Click on Exhibit for further information.

Answer:

Section: LabSim Explanation/Reference: First we have to find out the types of these routers to place them in correct positions by using show cdp neighbors command on HOME router:

There are 3 columns we should pay more attention to: + Local Intrfce (Local Interface): the interface on the device you are using show cdp neighbors command. In this case it is the interface of HOME router + Platform: the platform of neighbor device + Port ID: the neighbor devices port or interface which links to the HOME router From the exhibit, the Local Interface, Platform and Port ID columns, we can identify where these four routers should be placed and their corresponding associated ports

Finally, we need to identify the IP addresses of four interfaces on neighboring routers using show runningconfig command: Home# show running-config ! interface FastEthernet0/0 ip address 192.168.47.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet0/1 ip address 192.168.238.1 255.255.255.0 duplex auto speed auto ! interface Serial0/0 ip address 192.168.235.1 255.255.255.0 duplex auto ! interface Serial0/1

ip address 192.168.39.1

255.255.255.0 duplex auto

And we can easily assign corresponding ip addresses to four neighbor routers, which are on the same network with HOME routers interfaces>

QUESTION 3 Q A3

Central Florida Widgets recently installed a new router in their Apopka office. Complete the network installation by performing the initial router configurations and configuring RIPv2 routing using the router command line interface (CLI) on the Apopka router. Configure the router per the following requirements: Name of the router is Apopka Enable-secret password is cisco10 The password to access user EXEC mode using the console is RouterPass The password to allow telnet access to the router is scan90 IPv4 addresses must be configured as follows: Ethernet network 209.165.201.0/27 router has second assignable host address in subnet. Serial network is 192.0.2.128/28 router has last assignable host address in the subnet. Interfaces should be enabled. Routing protocol is RIPv2. (Notice: In the real exam the name, passwords, IP addresses and the positions of the assignable host addresses might be different) Case Study Title (Case Study):

1) Name the router: Router> enable Router# config terminal Router(config)# hostname Apopka 2) Enable-secret password (cisco10): Apopka(config)# enable secret cisco10 3) Set the console password to RouterPass: Apopka(config)# line console 0 Apopka(config-line)# password RouterPass Apopka(config-line)# login Apopka(config-line)# exit 4) Set the Telnet password to scan90: Apopka(config)# line vty 0 4 Apopka(config-line)# password scan90 Apopka(config-line)# login Apopka(config-line)# exit 5) Configure Ethernet interface (on the right) of router Apopka: The subnet mask of the Ethernet network 209.165.201.0 is 27. From this subnet mask, we can find out the increment by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Pay more attention to the last bit 1 because it tells us the increment, using the formula: Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 = 32. Therefore: Increment: 32 Network address: 209.165.201.0 Broadcast address: 209.165.201.31 (because 209.165.201.32 is the second subnetwork, so the previous IP 209.165.201.31 is the broadcast address of the first subnet). -> The second assignable host address of this subnetwork is 209.165.201.2/27 Assign the second assignable host address to Fa0/0 interface of Apopka router: Apopka(config)# interface Fa0/0 Apopka(config-if)# ip address 209.165.201.2 255.255.255.224 Apopka(config-if)# no shutdown Apopka(config-if)# exit 6) Configure Serial interface (on the left) of router Apopka: Using the same method to find out the increment of the Serial network: Serial network 192.0.2.128/28: Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of this subnet) Broadcast address: 192.0.2.143 -> The last assignable host address in this subnet is 192.0.2.142/28. Assign the last assignable host address to S0/0/0 interface of Apopka router: Apopka(config)# interface S0/0/0 (or use interface S0/0 if not successful) Apopka(config-if)# ip address 192.0.2.142 255.255.255.240 Apopka(config-if)# no shutdown Apopka(config-if)# exit 7) Configure RIP v2 routing protocol: Apopka(config)# router rip Apopka(config-router)# version 2 Apopka(config-router)# network 209.165.201.0 Apopka(config-router)# network 192.0.2.128 Apopka(config-router)# end Save the configuration:

Apopka# copy running-config startup-config Finally, you should use the ping command to verify all are working properly! A. The command Apopka(config-line)# login was issued to save the user password in the file password.txt B. The command Apopka(config-line)# login was issued to prompt the user for a password when connected C. The last assignable host address on the 192.168.0.128/28 network is 192.168.0.143 D. The command: Apopka(config-router)# network 192.0.2.128 is equal to the command: Apopka(config-router)# network 192.0.2.0

Answer: BD Section: LabSim Explanation/Reference: Visit http://www.9tut.net/icnd1/labsim/ripv2-sim for further explanation.

Exam B QUESTION 1 Q B1

What is the subnet broadcast address of the LAN connected to Router1? Click on Exhibit for further information.

Exhibit:

A. 192.168.136.15 B. 192.168.136.31

C. 192.168.136.63 D. 192.168.136.127 E. 255.255.255.255

Answer: A Section: LabSim Explanation/Reference:

QUESTION 2 Q B2

What is the bandwidth on the WAN interface of Router1? Click on Exhibit for further information.

Exhibit:

A. 16 Kbit/sec B. 32 Kbit/sec C. 64 Kbit/sec D. 128 Kbit/sec E. 512 Kbit/sec F. 1544 Kbit/sec

Answer: E Section: LabSim Explanation/Reference:

QUESTION 3 Q B3

What interfaces on Router1 have not had any configurations applied? (Choose two) Click on Exhibit for further information.

Exhibit:

A. Ethernet 0 B. FastEthenet 0/0

C. FastEthernet 0/1 D. Serial 0 E. Serial 0/0 F. Serial 0/1

Answer: CF Section: LabSim Explanation/Reference:

QUESTION 4 Q B4

Including the address on the Router1 FastEthernet interface, how many hosts can have IP addresses on the LAN to which Router1 is connected? Click on Exhibit for further information.

Exhibit:

A. 6 B. 14 C. 62 D. 128

Answer: B Section: LabSim Explanation/Reference:

QUESTION 5 Q B5

The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue? Click on Exhibit for further information.

Exhibit:

A. Router1(conf)# interface fa0/0 Router1(conf-if)# no shutdown

B. Router1(conf)# interface fa0/1 Router1(conf-if)# no shutdown C. Router1(conf)# interface s0/0 Router1(conf-if)# no shutdown D. Router1(conf)# interface s0/1 Router1(conf-if)# no shutdown E. Router1(conf)# interface s0/0 Router1(conf-if)# ip address 10.11.12.13 F. Router1(conf)# interface s0/1 Routerl(conf-if)# ip address 10.11.12.13

255.255.255.252

255.255.255.252

Answer: C Section: LabSim Explanation/Reference:

Exam C QUESTION 1 Q C1

In order to begin communicating with the server, host F sends out an ARP request. How will the devices exhibited in the topology respond to this request?

A. Switch West _1 will reply with the MAC address of the server. B. Hosts D and E will respond that the destination is not on the local LAN. C. Router SFX will forward the ARP request to the ILM router. D. Switch West _1 will block the request since the server is not on the LAN. E. The ILM router will respond with the IP address of the WWW server. F. Router SFX will respond with the MAC address of its Fa0/0 interface.

Answer: F Section: ARP Testlet Explanation/Reference: Because the server WWW is on another LAN of host F, host F knows that it has to send its packets to the default gateway. Therefore, for the first time, it will send out an ARP broadcast message asking for the MAC address of router SFX. Router SFX receives this message and replies with the MAC address of Fa0/0 interface. Later, when host F wants to send packets to WWW server, it will include the IP address of WWW server and the MAC address of Fa0/0 interface of SFX router in the destination IP address and destination MAC address fields, respectively.

QUESTION 2 Q C2

The ARP reply has been received by host F, which needs to build the packet. What information will be placed in the header of the packet that leaves host F if host F is to communicate with the WWW server? (Choose two)

A. The destination address will be the IP address of interface Fa0/0 of the ILM router. B. The destination address will be the IP address of the WWW server. C. The destination address will be the IP address of interface Fa0/0 of router SFX. D. The source address will be the IP address of host F. E. The source address will be the IP address of interface Fa0/0 of router SFX. F. The destination address will be the IP address of interface Fa0/0 of router SFX.

Answer: BD Section: ARP Testlet Explanation/Reference: After receiving ARP reply from SFX router, host F will place these fields in the header of the packets: Source addresses: the IP address of host F and the MAC address of host F Destination addresses: the IP address of WWW server and the MAC address of SFX router

QUESTION 3 Q C3

The frame has been received by the ILM router and is to be delivered on the local LAN. Which two statements describe the addressing of the Ethernet frame that has been created by the ILM router? (Choose two)

A. The destination address will the be the MAC address of the switch A port attached to the Fa0/0 interface of the ILM router . B. The destination address will be the MAC address of the WWW server. C. The destination address will be the MAC address of the A switch port attached to the WWW server. D. The source address will be the MAC address of host F. E. The source address will be the MAC address of interface Fa0/0 of the ILM router.

Answer: BE Section: ARP Testlet Explanation/Reference:

QUESTION 4 Q C4

Host F is displaying two World Wide Web documents from the WWW server in two browser windows at the same time. How did the data find its way to the correct browser windows?

A. The IP source addresses of the packets will be used to direct the data to the correct browser window. B. The browsers track the data by the URL. C. TCP port numbers are used to direct the data to the correct application window. D. The OSI application layer tracks the conversations and directs them to the correct browser.

Answer: C Section: ARP Testlet Explanation/Reference: TCP and UDP protocol port numbers are designed to distinguish multiple applications running on a single device from one another. In the TCP and UDP header, there are Source Port and Destination Port fields which are used to indicate the message sending process and receiving process identities defined. The combination of the IP address and the port number is called socket.

Exam D QUESTION 1 Q D1

On which router should a default route be configured?

A. on the ISP router B. on R1 C. on R2 D. on R3

Answer: B Section: Hotspot Explanation/Reference:

QUESTION 2 Q D2

With all links operational and all routers converged, which of the following describes the messaging between routers?

A. Hellos are sent every five seconds. B. Multicasts are sent every 60 seconds. C. Broadcasts are sent every 30 seconds. D. No messaging unless the topology changes.

Answer: C Section: Hotspot Explanation/Reference:

QUESTION 3 Q D3

Which of the following describes the route update process if the interface from R4 connected to LAN 4 goes down?

A. No updates occur B. R4 tells both R1 and R3 the network not accessible. Both R3 and R1 update R2. C. R4 tells only R1 the network is not accessible. R1 updates R2 and R2 updates R3. D. R4 tells only R3 the network is not accessible. R3 updates R2 and R2 updates R1.

Answer: B Section: Hotspot Explanation/Reference:

QUESTION 4 Q D4

Why would RIP be used rather than static routes on R1, R2, R3, and R4?

A. RIP creates more accurate than static routes. B. RIP uses less network resources than do static routes. C. RIP is supported by more different vendors equipment than static routes. D. RIP requires less configuration to automatically adjust when links go down than static routes.

Answer: D Section: Hotspot Explanation/Reference:

QUESTION 5 Q D5

On which router should a static route be configured?

A. on the ISP router B. on R1 C. on R2 D. on R3 E. on R4

Answer: A Section: Hotspot Explanation/Reference: Usually, a static route would be needed on the router which is connected to the ISP router to route to the Internet. The ISP router only needs a static route to reach the LANs network.

Exam E QUESTION 1 Q E1

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space: 192.168.1.1 through 192.168.5.255 192.168.100.1 through 198.168.100.255 What are three problems with this design? (Choose three)

A. The AREA 1 IP address space is inadequate for the number of users. B. The AREA 3 IP address space is inadequate for the number of users. C. AREA 2 could use a mask of /25 to conserve IP address space. D. The network address space that is provided requires a single network-wide mask. E. The router-to-router connection is wasting address space. F. The broadcast domain in AREA 1 is too large for IP to function.

Answer: ACE Section: Operations Explanation/Reference:

QUESTION 2 Q E2

A technician is testing connection problems in the internetwork. What is the problem indicated by the output from HostA?

A. The routing on Router2 is not functioning properly. B. An access list is applied to an interface of Router3. C. The Fa0/24 interface of Switch1 is down. D. The gateway address of HostA is incorrect or not configured.

Answer: D Section: Operations Explanation/Reference: When trying to ping the IP 192.168.3.254, you received the replies from that IP. It means that you can reach the Fa0/0 interface of Router1. But notice that the IP of host A (192.168.3.1/24) and the IP of the Fa0/0 interface of Router 1 (192.168.3.254/24) are on the same network. So you dont need a gateway address configured on HostA. Therefore you cant conclude the gateway address of HostA was configured correctly. Lately, you tried to use the tracert command to reach another network (192.168.4.7). In this case, a gateway address was required for reaching the network of hostB. But the result told that Destination host unreachable means that Host A can not find a route to Host B -> The gateway address of Host A was incorrect (something other than 192.168.3.254) or not configured is a possibility. A and B are incorrect because if there is a mis-configuration on Router 2 or Router 3 (while Router 1 is

configurated correctly), you will see at least one successful line when using tracert command likes the bold line below: PC> tracert 192.168.4.7 Tracing route to 192.168.4.7 over a maximum of 30 hops: 1 62 ms 62 ms 46 ms 192.168.3.254 2 * * * Request timed out. C is incorrect because we can ping Router 1 -> port Fa0/24 on Switch 1 was turned on and running correctly.

QUESTION 3 Q E3

The internetwork is using subnets of the address 192.168.1.0 with a subset mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA?

A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190 E. 192.168.1.192

Answer: D Section: Operations Explanation/Reference: 255.255.255.224 = 1111 1111.1111 1111.1111 1111.1110 0000 (binary form) Increment: 32 First subnetwork: 192.168.1.0 -> 192.168.1.31 (A is incorrect because 192.168.1.31 is a broadcast address) Second subnetwork: 192.168.1.32 -> 192.168.1.63 Third subnetwork: 192.168.1.64 -> 192.168.1.95 (B is incorrect because 192.168.1.64 is a network address) Fourth subnetwork: 192.168.1.96 -> 192.168.1.127 (C is incorrect because 192.168.1.127 is a

broadcast address) Fifth subnetwork: 192.168.1.128 -> 192.168.1.159 Sixth subnetwork: 192.168.1.160 -> 192.168.1.191 (D is correct because 192.168.1.190 is the last assignable host address of this subnetwork) Seventh subnetwork: 192.168.1.192 -> 192.168.1.224 (E is incorrect because 192.168.1.192 is a network address)

QUESTION 4 Q E4

For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. Which command or series of commands will accomplish these objectives?

A. RTA(config)# no cdp run B. RTA(config)# no cdp enable C. RTA(config)# interface s0/0 RTA(config-if)# no cdp run D. RTA(config)# interface s0/0 RTA(config-if)# no cdp enable

Answer: D Section: Operations Explanation/Reference:

QUESTION 5 Q E5

What three things will CORE router do with the data that is received from PC1? (Choose three)

A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router. B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router. C. CORE router will replace the destination IP address of the packets with the IP address of PC2. D. CORE router will place the MAC address of PC2 in the destination MAC address of the frames. E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address.

Answer: BDF Section: Operations Explanation/Reference:

Exam F QUESTION 1 Q F1

The goal of this network design is to provide the most efficient use of IP address space in a network expansion. Each circle defines a network segment and the number of users required on that segment. An IP subnetwork number and default gateway address are shown for each segment. What are three problems with the network design as shown? (Choose three)

A. Interface fa0/3 has an IP address that overlaps with network 10.1.3.0/30. B. Interface fa0/1 has an invalid IP address for the subnet on which it resides. C. Interface fa0/2 has an invalid IP address for the subnet on which it resides. D. Network 10.1.2.0/25 requires more user address space. E. Network 10.1.3.128/25 requires more user address space. F. The IP subnet 10.1.1.0/30 is invalid for a segment with a single server.

Answer: ABD Section: Subnetting

Explanation/Reference:

QUESTION 2 Q F2 If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?

A. 1024 B. 2046 C. 4094 D. 4096 E. 8190

Answer: C Section: Subnetting Explanation/Reference:

QUESTION 3 Q F3

The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224. The routing protocol in use is RIP version 2. Which address could be assigned to the FastEthernet interface on RouterA?

A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190

E. 192.168.1.192

Answer: D Section: Subnetting Explanation/Reference:

QUESTION 4 Q F4

HostA cannot ping HostB. Assuming routing is properly configured, what could be the cause of this problem?

A. HostA is not on the same subnet as its default gateway. B. The address of SwitchA is a subnet address. C. The Fa0/0 interface on RouterA is on a subnet that cant be used. D. The serial interfaces of the routers are not on the same subnet. E. The Fa0/0 interface on RouterB is using a broadcast address.

Answer: D Section: Subnetting Explanation/Reference:

Exam G QUESTION 1 Q G1

Answer:

Section: Drag & Drop questions Explanation/Reference:

QUESTION 2 Q G2

Answer:

Section: Drag & Drop questions Explanation/Reference:

QUESTION 3 Q G3

Answer:

Section: Drag & Drop questions Explanation/Reference:

QUESTION 4 Q G4

Answer:

Section: Drag & Drop questions Explanation/Reference: First please notice that by saying replace we often mean changes to NVRAM and TFTP while saying merge or add we mean changes to RAM. Next we should review the syntax of copy command: Syntax: copy <source> <base config filename> <destination> <destination filename.txt> 1. By default, the flash memory in a router is used to store the Cisco IOS image so the requirement replace the IOS image means that moving file somewhere to the flash memory. In the left columns we only have one choice which has the flash as the destination ->copy tftp flash. 2. Same explanation as above, when saying backup the current IOS image the flash takes the role as the source ->copy flash tftp.

And backup means we should copy it to somewhere like tftp server, CDROM 3. The running-config is stored in the RAM so make a backup copy of configuration in RAM means copy running configuration from RAM to backup server (tftp) -> copy running-config tftp 4. copy running-config startup-config is a very common command so no more explanation needed. 5. After solving 4 boxes above, we only have two choices left: copy tftp running-config & copy flash running-config. The bottom-right box says merge a backup configuration so it should be the tftp server and the command here is copy tftp running-config.

Q#5 : As a CCNA candidate, you should master the functions of various commands. Look at the
following items, some commands are listed on the left. The related roles are listed on the right in a wrong sequence. Please match them together. (Not all options are used)

Answer: 1) Router#copy tftp flash: replace the IOS image 2) Router#copy flash tftp: backup the current IOS image 3) Router#copy running-config tftp: make a backup copy of configuration in RAM 4) Router#copy running-config startup-config: make the configuration in RAM the configuration the router will use on startup 5) Router#copy tftp running-config: merge a backup configuration with the configuration in RAM Explanation First please notice that by saying replace we often mean changes to NVRAM and TFTP while saying merge or add we mean changes to RAM. Next we should review the syntax of copy command: Syntax: copy <source> <base config filename> <destination> <destination filename.txt> 1) By default, the flash memory in a router is used to store the Cisco IOS image so the requirement replace the IOS image means that moving file somewhere to the flash memory. In the left columns we only have one choice which has the flash as the destination ->copy tftp flash. 2) Same explanation as above, when saying backup the current IOS image the flash takes the role as the source ->copy flash tftp. And backup means we should copy it to somewhere like tftp server, CDROM 3) The running-config is stored in the RAM so make a backup copy of configuration in RAM means copy running configuration from RAM so backup server (tftp) -> copy running-config tftp

4) copy running-config startup-config is a very common command so no more explanation needed. 5) After solving 4 boxes above, we only have two choices left: copy tftp running-config & copy flash running-config. The bottom-right box says merge a backup configuration so it should be the tftp server and the command here is copy tftp running-config.

Exam H QUESTION 1 Q H1 Which wireless LAN design ensures that a mobile wireless user will not lose connectivity when moving from one access point to another on the WLAN?

A. Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs B. Using adapters and access points manufactured by the same company C. Overlapping the wireless cell coverage by at least 10% D. Configuring all access points to use the same channel

Answer: C Section: Wireless Questions Explanation/Reference: By using more than one Access Point (AP) we can create overlapping cells to allow roaming in a larger area. But we have to ensure that two APs must have at least 10% coverage overlap and they use nonoverlapping channels.

QUESTION 2 Q H2 You need to troubleshoot an interference issue with the wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar frequencies? (Choose two)

A. Microwave oven B. AM radio C. Toaster D. Copier E. Cordless phone F. IP phone G. Ipod


Formatted Version By: S Qaisar Shah.

Answer: AE Section: Wireless Questions Explanation/Reference: Microwave oven and cordless phone radiate energy in the 2.4 GHz unlicensed band so they can interfere

with some WLAN standards. As the result of that, you cant hear clearly on the phone or cant surf web. Q H3

QUESTION 3 Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?

A. Broadband personal comm. Service (PCS) B. Broadband circuit C. Infrared D. Spread spectrum E. Cable

Answer: C Section: Wireless Questions Explanation/Reference: Infrared typically requires a line-of-sight (your TV remote control, for example) which means that it is limited to very short distances. I am not sure if it is considered relative high data rate but infrared can transfer up to 4Mpbs.

QUESTION 4 Q H4 You need to add a wireless access point to a new office. Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?

A. Configure open authentication on the AP and the client B. Set the SSID value in the client software to public C. Set the SSID value on the client to the SSID configured on the AP D. Configure MAC address filtering to permit the client to connect to the AP

Answer: C Section: Wireless Questions Explanation/Reference: Service Set Identifier (SSID) is the term to identify a WLAN. In most cases SSID is broadcast by the AP, the user only needs to select that SSID and provides a correct password to access it. But in some cases for security reason, the SSID can be disabled. Users can only access to that network if they type both SSID and password correctly.

QUESTION 5 Q H5 You need to secure a new access point on the a wireless network. Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two)

A. Changing the default SSID value B. Configuring traffic filtering C. Changing the mixed mode setting to single mode D. Configuring a new administrator password E. Assigning a private IP address to the AP

Answer: AD Section: Wireless Questions Explanation/Reference: To improve security, you should change the default SSID value on your AP. For example, Linksys routers (which are produced by Cisco) typically have an SSID of linksys -> A is correct. In an AP we can configure traffic filtering but it is mainly used for filtering which services clients can use, IP ranges, ports, websites, time access It has no effect on securing your AP -> B is not correct. Mixed mode here means we can configure AP to allow clients to use different standard like 802.11b, g or n. But setting it to single mode doesnt have any security protection on it -> C is not correct. We should also change the administrator password because everyone can access to the admin page of an AP by open a web browser and type the IP address of that AP (for example: http://192.168.1.1). Typically, Linksys Wireless routers have a default username/password of admin/admin or admin/[blank] which are easily guessed or found out -> D is correct. We can access the AP by using a private IP address (in the same private network of the AP 192.168.1.1, for example) -> E is not correct.

QUESTION 6 Q H6 You need to determine the proper security settings on a new WLAN-capable office. Which encryption type would WPA2 use in this office?

A. PSK B. AES-CCMP

C. PPK via IV D. TKIP/MIC E. None of the other alternatives apply

Answer: B Section: Wireless Questions Explanation/Reference: Advanced Encryption Standard (AES) is the cipher system used by RSN. It is the equivalent of the RC4 algorithm used by WPA. However the encryption mechanism is much more complex and does not suffer from the problems associated with WEP. AES is a block cipher, operating on blocks of data 128bits long. CCMP is the security protocol used by AES. It is the equivalent of TKIP in WPA. CCMP computes a Message Integrity Check (MIC) using the well known, and proven, Cipher Block Chaining Message Authentication Code (CBC-MAC) method. Changing even one bit in a message produces a totally different result. The AES-CCMP encryption algorithm used in the 802.11i (WPA2) security protocol. It uses the AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates two sophisticated cryptographic techniques (counter mode and CBC-MAC) and adapts them to Ethernet frames to provide a robust security protocol between the mobile client and the access point.

QUESTION 7 Q H7 What is one reason why WPA encryption is preferred over WEP in this network?

A. The WPA key values remain the same until the client configuration is changed. B. The values of WPA keys can change dynamically while the system is used. C. The access point and the client are manually configured with different WPA key values. D. A WPA key is longer and requires more special characters than the WEP key. E. None of the other alternatives apply

Answer: B Section: Wireless Questions Explanation/Reference: Wireless Encryption Protocol (WEP) uses RC4 encryption and a static 64-bit key so it can be easily broken as only 40-bits are encrypted and 24 bits are clear-text IV(Initialization Vector). It was later upgraded to 128-bit, but the IV was still clear text meaning it took slightly longer (minutes) to break-in. WPA was introduced in 2003 as a replacement for WEP. WPA uses Temporal Key Integrity Protocol (TKIP) to automatically change the keys. TKIP still uses RC4; it just improves how its done.

QUESTION 8 Q H8 In an effort to increase security within the wireless network, WPA is being utilized. Which two statements shown below best describe the wireless security standard that is defined by WPA? ( Choose two)

A. It requires use of an open authentication method B. It specifies use of a static encryption key that must be changed frequently to enhance security C. It includes authentication by PSK D. It specifies the use of dynamic encryption keys that change each time a client establishes a connection E. It requires that all access points and wireless devices use the same encryption key F. WPA works only with Cisco access points

Answer: CD Section: Wireless Questions Explanation/Reference:

Formatted Version By: S Qaisar Shah.

QUESTION 9 Q H9 You need to configure a new wireless access point for your network. What are three basic parameters to configure an AP? (Choose three)

A. Authentication method B. RTS/CTS C. RF channel D. SSID

Answer: ACD Section: Wireless Questions Explanation/Reference:

QUESTION 10 Q H10 You have finished physically installing an access point on the ceiling at a newly opened office. At a minimum, which parameter must you configure on the access point in order to allow wireless clients to operate on it?

A. SSID B. AES C. TKIP D. PSK E. None of the other alternatives apply

Answer: A Section: Wireless Questions Explanation/Reference:

QUESTION 11 Q H11

What two facts can be determined from the diagram of the WLAN shown above? (Choose two)

A. Access points in each cell must be configured to use channel 1 B. The network diagram represents an extended service set (ESS) C. The two APs should be configured to operate on different channels D. The area of overlap of the two cells represents a basic service set (BSS) E. The area of overlap must be less than 10% of the area to ensure connectivity F. There are too many hosts on this WLAN

Answer: BC Section: Wireless Questions Explanation/Reference:

QUESTION 12 Q H12 A single 802.11g access point has been configured and installed in the center of a square shaped office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. From the list below, what are three likely causes of this problem? (Choose three)

A. Null SSID

B. Mismatched TKIP encryption C. Cordless phones D. Antenna type or direction E. Mismatched SSID F. Metal file cabinets

Answer: CDF Section: Wireless Questions Explanation/Reference: 802.11g operates in 2.4 GHz ISM band. Some popular devices and technologies can interfere 802.11g signal: Newer cordless phones Bluetooth Microwaves Metal surface (can cause interference) Antenna (can reduce wireless signal)

QUESTION 13 Q H13 Three access points have been installed and configured to cover a small remote office. What term defines the wireless topology?

A. SSID B. BSS C. ESS D. IBSS E. ASS

Answer: C Section: Wireless Questions Explanation/Reference:

QUESTION 14 Q H14 Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?

A.

ESS

B. IBSS C. SSID D. BSS

Answer: B Section: Wireless Questions Explanation/Reference: Independent Basic Service Set IBSS (ad hoc mode) does not use an AP. It allows two devices to communicate directly. Basic Service Set (BSS) is a single wireless LAN created with an AP and all devices that associate with that AP. Extended Service Set (ESS) consists of multiple APs, allowing roaming in a larger coverage area.

QUESTION 15 Q H15 802.1b is being utilized in the wireless network. Which spread spectrum technology does the 802.1b standard define for operation in this network?

A. FHSS B. IR C. DSSS and FHSS D. DSSS E. IR, FHSS and DSSS

Answer: D Section: Wireless Questions Explanation/Reference: Frequency Hopping Spread Spectrum (FHSS) uses all frequencies in the band, hopping to different ones. By using slightly different frequencies for consecutive transmissions, a device can hopefully avoid interference from other devices that use the same unlicensed band, succeeding at sending data at some frequencies. Direct Sequence Spread Spectrum (DSSS) followed as the next general class of encoding type for WLANs. Designed for use in the 2.4 GHz unlicensed band, DSSS uses one of several separate channels or frequencies. The original 802.11 WLAN standards used FHSS, but the current standards (802.11a, 802.11b, and 802.11g) do not. 802.1b uses DSSS while 802.1a & 802.1g use Orthogonal Frequency Division Multiplexing (OFDM).

(Reference: ICND1 Official Exam Certification Guide)

QUESTION 16 Q H16 Which IEEE standard is used to define Wi-Fi?

A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11

Answer: E Section: Wireless Questions Explanation/Reference:

QUESTION 17 Q H17 An office is using an IEEE 802.11b wireless LAN. What is the maximum data rate specified for this WLAN?

A. 11 mbps B. 100 mbps C. 54 mbps D. 10 mbps E. 1000 mbps


Formatted Version By: S Qaisar Shah.

F. 16 mbps

Answer: A Section: Wireless Questions Explanation/Reference: The maximum data rate for popular WLAN standards are listed below: IEEE 802.11a: 54 Mbps in the 5.7 GHz ISM band IEEE 802.11b: 11 Mbps in the 2.4 GHz ISM band IEEE 802.11g: 54 Mbps in the 2.4 GHz ISM band

Das könnte Ihnen auch gefallen