Sie sind auf Seite 1von 27

Which two statements correctly describe RSTP? (Choose two.

It is a Cisco proprietary protocol.

It recalculates the spanning tree in less than 1 second.

It requires the PortFast and UplinkFast features on switch ports.

It supports four states: blocking, listening, learning, and forwarding.

It requires a full-duplex, point-to-point connection between switches to achieve the highest recalculation speed.

2 Which two statements correctly describe RIPv1 and RIPv2? (Choose two.)

Both broadcast their entire routing table from all participating interfaces to

Both advertise their routing updates out all active interfaces every 30 seconds.

Both have the same administrative distance value of 120.

Both can turn off automatic summarization.

Both support VLSM and CIDR.

Refer to the exhibit. What is the purpose of assigning the IP address to an access layer switch?

to assign a default gateway to the hosts that are connected to the switch

to allow hosts on the same LAN to connect to each other

to allow remote management of the switch

to allow inter-VLAN communication

4 A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Pri
the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales

Frame Relay

PPP with CHAP authentication

PPP with PAP authentication

Refer to the exhibit. If router RTA fails, which statement is true?

Hosts A and B can reach each other, but cannot reach hosts C and D or the server.

No host can reach any other host.

Hosts A, B, C, and D can reach each other, but cannot reach the server.

All hosts can reach each other.

Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The
hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem?

Configure a default route on R3 and propagate it via the use of RIPv2 to all routers.

Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3.

Configure a default route on the ISP, and it will be automatically propagated to all routers.

Configure a default route on R1, and it will be automatically propagated to all routers.

7 What are two benefits of implementing VLANs in an enterprise network? (Choose two.)

eliminates the need for a Layer 3 device

provides segmentation of broadcast domains

allows for the propagation of broadcasts from one local network to another

allows for the logical grouping of devices despite physical location

prevents issues such as broadcast storms by ensuring a loop free environment

Refer to the exhibit. R1 is using the default OSPF operation. Which IP address will be used as the router ID of R1?

9 In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain






Refer to the exhibit. Which VTP function will this switch perform?
It will create, change, and delete VLANs.

It will send VTP messages to other attached switches.

It will ignore information that is contained in the VTP message.

It will retain its original database when it receives updates from the server.

11 Which component of the Cisco Enterprise Architecture manages server farms?

service provider edge

enterprise campus

enterprise edge

edge device

12 Why is UDP preferred for transmission of video traffic?

It is a reliable protocol.

It retransmits lost packets.

It is a three-way handshake protocol.

It has low overhead.


Refer to the exhibit. All switches are configured with default bridge priority. Which two ports will be STP root ports if all links are oper
at the same bandwidth? (Choose two.)
Fa0/1 interface of switch A

Fa0/2 interface of switch A

Fa0/1 interface of switch B

Fa0/2 interface of switch B

Fa0/1 interface of switch C

Fa0/2 interface of switch C


Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between
them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the c
of this connectivity problem?

no set loopback

incorrect subnet mask on R2

incompatible bandwidth

incorrect IP address on R1

incompatible encapsulation

Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?

D is a summary, Null0

D is a summary, Null0

D [90/203010] via, 00:00:10, Serial0/0/0

D [90/203010] via, 00:00:10, Serial0/0/0


Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?

1=R, 2=O, 3=D, 4=C

1=R, 2=E, 3=O, 4=S

1=R, 2=D, 3=O, 4=S

1=O, 2=R, 3=D, 4=C

1=R, 2=O, 3=E, 4=C


Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed. How will this ACL affect
traffic at R1?
All traffic that exits the Fa0/1 interface will be denied.

All FTP traffic from the network will be denied.

All traffic except FTP will be allowed to exit the Fa0/1 interface.

All traffic except FTP will be allowed from the network.


Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP
network fails to converge?

The network commands have been incorrectly issued on both routers.

Both routers have been configured with the same autonomous number.

The wildcard masks have been incorrectly configured on both routers.

Autosummarization is enabled on both routers.

19 Which two STP states allow a switch to learn MAC addresses? (Choose two.)






20 While using the Class A addressing scheme, a network administrator decides to use the subnet mask in the network
configuration. How many host addresses can be created for each subnetwork in this addressing scheme?





Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses
(Choose two.)


Refer to the exhibit. Using the command ip route 150, the network administrator configures a n
route. Which statement describes how the router will use the new route?
The new route will be ignored and will never be added to the routing table.

The new route will be added to the routing table and will be the primary route to the network.

The previously existing dynamic route will be replaced with the new static route.

The new route will be displayed in the routing table if the dynamic routing information for this route is lost.

23 Which route will be excluded from the updates that are sent to the neighbor routers?

R [120/1] via, 00:00:12, FastEthernet0/1

R [120/15] via, 00:00:12, FastEthernet0/0

R [120/2] via, 00:00:12, FastEthernet0/0

R [120/7] via, 00:00:12, FastEthernet0/0


Refer to the exhibit. How many routers have established OSPF adjacencies with R1?


25 Which Frame Relay component provides connection status information about PVCs in the network?






Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be
most specific?


Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?

It will set the gateway of last resort for R1.

It will configure the IP address on one interface of R1.

It configures the router to forward traffic that is destined for the network through the interface with IP address
It configures a static route for all packets with the source network address

28 Which routing protocol is unable to support discontiguous networks?





29 Which EIGRP packet type is sent when DUAL places a route in the active state?






30 What is the difference between the passive and active route status as displayed in an EIGRP topology table?

Routes that are passive are never updated.

Routes that are active are used to forward data.

Routes that are active are being recalculated by DUAL.

Routes that are passive are waiting for the neighbor adjacency process to complete.

31 Which function does the access layer provide in a hierarchical internetworking model?

It provides a high-speed backbone layer between geographically dispersed networks.

It provides hierarchical design between the core layer and the distribution layer.

It provides an entry point for hosts into the network.

It provides data security and traffic management for the core layer.

Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trunk link that has been tested and is working properly.
is VTP unable to propagate VLANs from one switch to the other?

The revision number is different on both switches.

Both switches are in server mode.

The VTP domain name is different on both switches.

The VTP pruning mode is disabled.

33 What is a feature of PAP authentication?

It uses a three-way handshake with encryption.

It sends the username/password pair across the link in clear text.

It provides protection against playback attack through a variable challenge value.

It designates the called device to control the frequency and timing of the authentication.

Refer to the exhibit. What information can be determined from the exhibited command?

The command specifies how traffic will be routed to the host.

It will set the default route in the routing table.

This route has an administrative distance of 1.

If a dynamic routing protocol with default parameters is configured on this router, this route will not be installed in the routing ta

35 What are two characteristics of EIGRP? (Choose two.)

It supports a maximum hop count of 15.

It sends small hello packets to maintain knowledge of its neighbors.

It forwards complete routing tables in its updates to neighboring routers.

It supports equal and unequal cost load balancing.

It supports only one network layer protocol.

36 What are two reasons for assigning switch ports to different VLANs? (Choose two.)

They increase network security.

They facilitate VTP implementation.

They decrease the size of the collision domain.

They make more physical connections to the network possible.

They logically group hosts according to their function.

Refer to the exhibit. Users on the network are unable to access any of the servers located on the net
Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

There is a routing loop occurring between all three routers.

There is a network statement missing.

Network has an incorrect wildcard mask.

The OSPF area configuration is incorrect.

/23 is an invalid subnet mask for the network.

Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choos

Set the router ID of R2 to

Set the Loopback0 IP address of R3 to

Set the FastEthernet0/0 IP address of R1 to

Set the router ID of R1 to the highest IP address in the network.

Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface.

Set the OSPF priority to 255 on the R1 FastEthernet0/0 interface.

Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR,
the routers are booted at the same time? (Choose two.)

R1 will be the DR.

R4 will be the DR.

R5 will be the DR.

R2 will be the BDR.

R3 will be the BDR.

R4 will be the BDR.


Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routing
table? (Choose two.)


41 Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)

CHAP sends passwords in clear text.

CHAP uses repeated challenges for verification.

PPP encapsulation is configured in interface mode.

CHAP uses a 2-way handshake to establish a link.

PPP encapsulation is the default for serial interfaces on Cisco routers.

CHAP uses a challenge/response that is based on the MD5 hash algorithm.


Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a n
router. What is causing the interface to reject the address?

The IP address is already in use.

The technician is using a network address.

The technician is using the wrong subnet mask for /26.

The technician must enable VLSM on the interface.

43 Which two wildcard masks are required in an extended access list statement that blocks the traffic from host to network (Choose two.)

44 What are two benefits of using ACLs? (Choose two.)

They provide IP filtering.

They reduce the processing load on the router.

They simplify the configuration of inter-VLAN routing.

They prevent routing loops and facilitate convergence.

They identify traffic for multiple uses such as QoS and NAT.


Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet?

46 Which two statements are true about untagged frames on a switch? (Choose two.)

An untagged frame cannot pass through access ports.

An untagged frame cannot pass through trunk ports.

All frames that pass through trunk ports are untagged frames.

Untagged frames minimize the delays that are associated with inspection of the VLAN ID tag.

Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.


Refer to the exhibit. A network engineer at the BRANCH1 office wishes to use network summarization to announce the fewest netwo
possible to the MAIN office. If the summaries include only the networks that are shown and no others, how many networks will be

48 What are two features of a standard IP ACL? (Choose two.)

It permits or denies access based on the entire protocol.

It filters the packet based on the source IP address only.

It uses identification numbers between 100 and 199.

It can filter traffic based on port number.

It can only filter inbound traffic on an interface.

49 An organization is planning to expand by adding five new branches. After the expansion, it will require secured, full-time, and
simultaneous connectivity for its new branch offices with the central office. There is only one port available on the central office route
Which WAN technology can be used in this situation?



Frame Relay

analog dialup


Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved?

Configure dynamic NAT instead of PAT.

Configure the access list for the correct network.

Include the ip nat pool command in the configuration.

Configure the ip nat inside command on the correct interface.

51 Which statement describes a PVC?

A PVC provides a permanent logical connection to forward data between two points.

A PVC is dynamically established when a router requests a transmission.

A PVC prevents small messages from being held up behind larger messages.

A PVC requires call set-up information to be sent before transmitting any data.

52 What are three correct host addresses in the network? (Choose three.)


Refer to the exhibit. What is the correct description of the highlighted address?

It is the address of the destination network.

It is the routerID of the neighboring router.

It is the next hop address of the feasible successor.

It is the IP address of the serial0/0/0 interface of RouterC.

Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is
correct summary address?

Refer to the exhibit. R1 is configured for inter-VLAN communication as displayed. PC1 is able to ping PC2 but unable to ping PC3. W
is the cause of this problem?

PC3 and the FastEthernet0/0 interface of R1 are not on the same subnet.

Fa0/1 is configured for access mode.

Fa0/4 must be configured as a trunk.

PC1 and the switch are not on the same subnet.

Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?

the session from host A to host B

the session from host B to hosts C and D

the session from host B to hosts E and F

the session from host E and host F to host A and host B

Refer to the exhibit. R1 and R2 are connected to each other through their serial0/0/0 interfaces, but are unable to establish OSPF
adjacency. What are two reasons for this? (Choose two.)

The router IDs of the two routers do not match.

The process IDs of the two routers do not match.

The Hello and Dead timers of the routers do not match.

The OSPF backbone area is configured on both routers.

The serial interfaces of the two routers are in different subnets.

58 What are two advantages of using dynamic routing protocols in a network? (Choose two.)

They adapt to topological changes.

They are more secure than static routes.

They eliminate the need for default routes.

They have lower administrative distances than static routes.

They enable routers to share information about the reachability and status of remote networks.

Refer to the exhibit. What are two consequences of issuing the displayed commands? (Choose two.)

The routing update information is protected against being falsified.

The routing table of R2 will be secured.

The key is encrypted with the MD5 hashing algorithm.

OSPF routes will get priority over EIGRP routes going into the routing table.

The overhead of OSPF information exchange will reduce.