Beruflich Dokumente
Kultur Dokumente
The OSPF routing protocol is enabled on a network. The administrator would like to ena
a floating static route to be used as a backup. Which is the correct setting for the
administrative distance of the floating static route?
0
1
50
100
120*
The following line was displayed in the output of the show ip route command:
192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0
Which routing protocol is the source for this route?
BGP
EIGRP
ODR
OSPF
RIP*
What is the administrative distance of EIGRP-learned routes that have been injected int
EIGRP via redistribution?
1
90
100
110
170*
180
For ODR learned routes, what is the default administrative distance and metric that
displayed by the show ip route command?
[160/0]
[160/1]*
[170/0]
[170/1]
Which feature best defines the function of the IEEE 802.1x standard in the enterprise
architecture?
port level access control*
priority to real-time traffic
minimizing delay and jitter
provision for server load balancing
Which type of network traffic requires high reliability and security but can sustain a low
bandwidth connection in a converged network?
FTP traffic
IP telephony traffic
transactional traffic*
voice application traffic
video conferencing traffic
What are two Intelligent Information Network phases that involve sharing resources and
making the network "application aware"? (Choose two.)
integrated applications*
integrated standards
integrated services*
integrated security
integrated devices
11 Which feature defines functionality that is found in the integrated services phase of IIN?
making the network application-aware
pooling and sharing IT resources through virtualization*
consolidating voice, video, and data into the IP network
content caching, load balancing, and application-level security
12 In which PPDIOO phase do key decision makers identify the initial business and technic
requirements?
Design Phase
Implement Phase
Operate Phase
Optimize Phase
Plan Phase
Prepare Phase*
Which two statements are true about an implementation plan approach? (Choose two.)
In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a task.
In an ad hoc approach, the network engineer identifies the need for a change and implements the solution without planning any o
tasks*.
In an ad hoc approach, the network engineer identifies the need for a change and starts with planning as the first step.
In a structured approach, it is more likely that scalability issues, suboptimal routing, and security issues will occur.
In a structured approach, the Fault, Configuration, Accounting, Performance, and Security (FCAPS) model could be used to com
a task.*
In a structured approach, the network engineer identifies the need for an upgrade and starts with configuring as the first step.
15 Which two statements are true about the structured approach model? (Choose two.)
The Cisco Lifecycle Services approach defines six phases including the prepare, plan, design, implement, operate, and optimi
phases.*
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan in the Fau
management category.
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan and the
implementation as part of FCAPS best practices.
The IT Infrastructure Library (ITIL) model is defined by the International Organization for Standardization (ISO).
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies the implementation plan as part of t
Design phase and the actual implementation as part of the Implement phase.*
The Telecommunications Management Network (TMN) model is similar to the PPDIOO model.
16 Which three steps are completed in the first three phases of the Prepare, Plan, Design,
Implement, Operate, and Optimize (PPDIOO) model? (Choose three.)
Archive the documentation for future use.
Characterize the existing network and sites.*
Design the network topology and solutions.*
Identify customer requirements.*
Implement and verify the design.
Monitor and optionally redesign.
17 Which two steps are completed in the last three phases of the Prepare, Plan, Design,
Implement, Operate, and Optimize (PPDIOO) model? (Choose two.)
Characterize the existing network and sites.
Configure and verify the design.*
Design the network topology and solutions.
Document the existing network information.
Identify customer requirements.
Monitor and optionally redesign.*
18 The ABC Corporation implements the network for its new headquarters via the use of the
Cisco Enterprise Architecture. The network administrator wants to filter the traffic from an
the outside world. Where should the administrator deploy a firewall device?
server farm
enterprise edge*
enterprise campus
service provider edge
19 When designing a network infrastructure, a network engineer will use the hierarchical
network model. What two factors must be taken into account when designing the core lay
(Choose two.)
packet manipulation to prioritize the flow of core data
redundant links to ensure fault tolerance*
routing protocols that are chosen for the speed of network convergence*
access control lists to curtail core layer traffic
star network topologies to reduce core layer latency
20 Which two functions are performed at the distribution layer of the hierarchical network
model? (Choose two.)
summarizing routes from the access layer*
providing high-speed backbone switching services
allowing end users to access the local network
providing the gateway of last resort for core layer devices
isolating network problems to prevent them from affecting the core layer*
CHAPTER 2
Refer to the exhibit. A network administrator has configured R1 and R2 for EIGRP authenti
multiple keys and activation times. After functioning normally for a month, R1 and R2 are n
forming an EIGRP adjacency. Which configuration change to the key lifetimes will correct th
adjacency problem?
Change the key 1 accept life to an end time of Feb 1 on both routers.
Change key 2 send lifetime to a start time of Jan 1 on both routers.
Change the key 1 send lifetime to an end time of Feb 1 on both routers.*
2 Which event must take place to transition an EIGRP route that is in the active state
the passive state?
expiration of the RTO timer
an update packet that is received from every EIGRP neighbor
an acknowledgment that is received from every EIGRP neighbor
a reply that is received from each neighbor for every generated query *
a feasible successor route that is moved from the topology table to the routing table
Which EIGRP packet type can quickly propagate through a network and result in exces
computations and high CPU loads?
acknowledgment
hello
reply
update
Query *
5 Which two solutions are used in an EIGRP network to reduce DUAL computations? (Cho
authentication
load balancing
partial updates
Summarization *
EIGRP stub routing *
6 Which two statements are true of EIGRP topology depth? (Choose two.)
Topology depth should be limited to 15 routers.
Redundant links and alternative paths can be used to reduce topology depth.
Topology depth is the maximum hop count between any two EIGRP routers in the topology.
Route summarization can reduce the convergence time in networks with large depth. *
Topology depth is the number of router hops necessary for traffic to reach from access layer to core layer.
Topology depth refers to the total number of hops that information must travel to reach all EIGRP routers in the network. *
7 Which EIGRP algorithm tracks all the routes that are advertised by neighbors and uses th
metric of each route to compare the routes?
STP
Dijkstra
DUAL *
SPF
Refer to the exhibit. Based on the output of show ip eigrp neighbors, what are two poss
problems with adjacencies between Router1 and Router2? (Choose two.)
The routers are configured with different EIGRP AS numbers. *
Automatic summarization was disabled.
The hello timer for R1 was altered.
The serial interfaces for both routers are in different networks.
10
Refer to the exhibit. During a test of an EIGRP prototype network, a network administrato
show ip protocols command. What two facts can be determined from the output? (Choo
11 A router in a fully converged EIGRP network detects that a remote route is unreachable.
events may occur next? (Choose two.)
EIGRP will look for a feasible successor in the routing table.
DUAL will calculate the highest cost routes to each network.
EIGRP will send a bounded update to alert neighbors about the failure. *
The router will forward the complete routing table to the neighboring routers.
*DUAL will look for a feasible successor route in the topology table and, if one is found, it will add this route to the routing tabl
12
Refer to the exhibit. All three routers are exchanging EIGRP routes. What value represen
advertised distance of the feasible successor for the 10.1.2.0/24 network?
256
532 *
768
1280
13
Refer to the exhibit. Which statement is true of the EIGRP keys that are used by router R
R2 is encrypting EIGRP packets with only key 1.
R2 is encrypting EIGRP packets with both key 1 and key 2.
R2 is using only key 2 to authenticate received EIGRP packets. *
R2 is authenticating received EIGRP packets with both key 1 and key 2.
It is only locally significant, and as a result it can be different on each router in the EIGRP domain.
It is selected by the network administrator and must be the same on each router in the EIGRP domain.
It is assigned by IANA and must be the same on each router in the EIGRP domain.
17 What are two advantages of modifying the interface metrics when deploying EIGRP in a
(Choose two.)
improved bandwidth utilization *
less likely to have routing loops
faster convergence
better control over traffic patterns *
more efficient troubleshooting
18 Which design plan or diagram would govern how well EIGRP will scale?
IP addressing plan *
STP topology diagram
Layer 2 addressing plan
detailed cabling plan
EIGRP traffic engineering plan
19
The network administrator wants RTA to send only the summarized route of 10.10.0.0/16
Which configuration will accomplish this?
RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0 *
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
20
Refer to the exhibit. Which statement is true about the EIGRP hello packets that are rece
router R2?
They are encrypted.
They are authenticated. *
They are sent confidentially.
They must be acknowledged.
point-to-multipoint nonbroadcast
6. What are
two reasons for creating an OSPF network with multiple areas?
(Choose two.)
to protect against the fact that not all routers support the OSPF backbone area
to ensure that an area is used to connect the network to the Internet
to reduce SPF calculations *
to reduce use of memory and processor resources *
to simplify configuration
10. A fully converged five router OSPF network has been running s
uccessfully for several weeks. All configurations have been saved
and no static routes are used. If one router loses power and reboo
ts, what information will be in its routing table after the configurat
ion file is loaded but before OSPF has converged?
All routes for the entire network will be present.
Directly connected networks that are operational will be in the routing table. *
Because the SPF algorithm has not completed all calculations, no routes
will be in the table.
A summary route for all previously learned routes will automatically
appear in the routing table until all LSPs have been received by the
router.
11. What are two effects of using multiple OSPF areas that reduce
bandwidth and router overhead? (Choose two.)
prevention of a flood of queries
13.
Refer to the exhibit. How does the router treat the authentication
of OSPF packets that enter and leave FastEthernet interface 0/0?
OSPF packets are sent with authentication key 10 only.
OSPF packets are sent with authentication key 20 only.
Two copies of every OSPF packet are sent, one with key 10 and one with key 20. *
Key 10 is used to authenticate incoming packets and key 20 is used to authenticate
outgoing packets.
14.
Refer to the exhibit. Which type of OSPF packets are represented
by the debug command output?
link-state request packets sent with plain-text authentication
hello packets sent with a MD5 hashed authentication key id of 100 *
hello packets sent in simple authentication with a password of youngest
link-state update packets sent encrypted with a 100 bit authentication key
15.
Refer to the exhibit. What destination address will RTB use to adv
ertise LSAs?
224.0.0.5
224.0.0.6 *
10.1.7.17
172.16.1.1
172.16.2.1
255.255.255.255
16. Which two statements are correct about OSPF route summariz
ation? (Choose two.)
Automatic OSPF route summarization is performed by the ABR.
The metric of the summary route is equal to the lowest cost network within the sum
mary address range. *
The area 51 range 172.0.0.0 255.0.0.0 command identifies area 51 as the area t
hat contains the range of networks to be summarized. *
OSPF can perform automatic summarization on major classful network boundaries e
ven if no summarization commands are entered from the CLI.
1.
2.
Refer to the exhibit. RTA
has two paths to network 10.0.0.0/8 via two serial links, Serial
0/0/0 to RTB and Serial 0/0/1 to RTC. RTA is not running any
dynamic routing protocol and its preferred route to network
10.0.0.0/8 is via RTC. Which commands on RTA would configure it
to use RTB to reach network 10.0.0.0/8 only if the serial link to
RTC fails?
ip route 10.0.0.0 255.0.0.0 Serial 0/0/0
ip route 10.0.0.0 255.0.0.0 Serial 0/0/1 130
ip route 10.0.0.0 255.0.0.0 Serial 0/0/1 *
ip route 10.0.0.0 255.0.0.0 Serial 0/0/0 130 *
ip routing
ip default-network 10.0.0.0
ip route 10.0.0.0 255.0.0.0 Serial 0/0/0
no ip routing
ip default-gateway 10.0.0.0
ip route 0.0.0.0 0.0.0.0 Serial 0/0/1
6.
Re
fer to the exhibit. A network engineer was called to investigate so
me intermittent delay and jitter issues with the corporate network
that is shown. The engineer determined that the root cause is that
the routing tables in the district routers are so large that the route
rs cannot maintain the tables efficiently. What can be done to miti
gate this issue?
7.
ip
ip
ip
ip
route
route
route
route
metrics
131.119.0.0 *
metric 131.119.0.0
metric-mtu
192.168.0.0/0 le 16
192.168.0.0/16 *
192.168.0.0/16 ge 16
192.168.0.0/16 eq 16
9.
Refer t
o the exhibit. The network that is shown is operating normally wit
h the routing protocols configured with the default settings. What
path will packets from PC1 take to the file server?
AR2-DR1
AR3-DR1
AR2-AR3-DR1
AR3-AR2-DR1 *
10. Which is the default seed metric for an OSPF route that is redi
stributed into an EIGRP autonomous system?
Infinity *
1
20
90
110
170
12.
Refer to the exhibit. The EIGRP subnets such as 10.10.0.0/16 and
10.20.0.0/16 are not being seen inside the OSPF domain. What is
a possible reason for this?
The redistribute command is missing the subnets keyword in the OSPF configuration
.*
The network statement for EIGRP is missing the network mask configuration.
The metric configuration for OSPF is set too high.
A seed metric for EIGRP has not been set.
15.
Re
fer to the exhibit. A network engineer was called to investigate so
me
intermittent delay and jitter issues with the corporate network tha
t is exhibited. The engineer determined that the root cause of the
issue is excessive routing updates. What solution would mitigate t
his issue?
Re-address the corporate network to allow summarization. *
Implement RIPv1 classful route summarization.
Use OSPF as the routing protocol between the regional routers.
Migrate the routing protocol to multiarea OSPF to summarize networks.
16.
Re
fer to the exhibit. You have been asked to investigate why users in
17. Which statement best describes the route tag in a RIPv2 pack
et?
The route tag contains a 32-bit mask that identifies the network and subnet portion
of the IP address.
It contains the IP address of the next hop that is listed in the IP Address field.
It indicates how many internetwork hops or routers have been traversed in the trip t
o the destination.
It differentiates between a request for a full routing table or a
partial routing update due to a topology
change.
It differentiates between routes that are learned within the autonomous system and
those that were
redistributed into the routing process. *
18.
Refer to the exhibit. After configuring two-way redistribution, an
administrator notices that none of the EIGRP routes are being adv
ertised in the OSPF network. What is a possible reason that the ro
utes are not being advertised?
The
The
The
The
19.
Re
fer to the exhibit. A network engineer was called to investigate so
me intermittent delay and jitter issues with the corporate network
that is exhibited. The engineer determined that the root cause of t
he issue is excessive routing updates. What solution would mitigat
e this problem?
Enable OSPF autosummarization on all the routers.
Implement RIPv1 classful route summarization.
Create an OSPF area from each interface on the regional routers to
summarize advertisements. *
20.
Re
fer to the exhibit. How will router RTA redistribute routes between
the two autonomous systems?
Route redistribution will not be successful in either direction.
One-way redistribution will occur with EIGRP routes being redistributed
into RIP.
One-way redistribution will occur with RIP routes being redistributed
into EIGRP. *
Two-way redistribution will occur with RIP routes being redistributed
into EIGRP and then back into RIP.
resiliency
2. A BGP routing policy has been created using route maps. The command
route-map TEST permit 10 is part of the configuration. What does the
argument 10 indicate?
It identifies the access list number to be used by the route map statement.
It identifies the position of the route map in relation to other instances. *
It indicates the local preference to be set for routes that match the route map.
It indicates the metric to be set for routes that match the route map.
It specifies the route map to be used on autonomous system 10.
3.
Refer to
the exhibit. What would be the RIP routing metric for the subnets of the 72.16.0.0/16 network on
the R2 router after the configuration in the exhibit was applied to the R1 router?
1
2
3
4*
5
4.
Refer to
the exhibit. The routing policy for router R1 states that traffic from the 192.168.1.0
LAN network is to be routed to ISP-1 and traffic from the 172.16.1.0 LAN
network is to be routed to ISP-2. However, the network administrator notices that a
host at IP address 172.16.1.10 is being routed out Serial0/0/0. What is the cause of
the problem?
The route map ISP-1 should be applied to Serial0/0/0.
The route map ISP-2 should be applied to FastEthernet0/1. *
The route maps are applied to opposite interfaces.
There is an incorrect access list 1 statement.
There is an incorrect access list 2 statement.
5. What are three accurate descriptors of the functionality of the Cisco IOS IP SLA
feature? (Choose three.)
the sending of simulated data *
applies only to distance vector protocols
6.
Refer to the exhibit. Based on the information that is presented, w
hich statement is true?
Access list 1 specifies that packets with a destination address of 192.168.1.0 will be
policy routed.
Access list 2 specifies that packets with a source address of 172.16.1.0 will be policy
routed. *
Packets that match access list 1 will be sent to the next-hop address 172.17.1.2.
Packets that match access list 2 will be denied access.
Both match statements must be true for the ISP1 route map to be true.
8.
Quality of Service (QoS) and Cisco Wide Area Application Service
s (WAAS) are two examples of which path control consideration?
resiliency
availability
adaptability
performance
support for network and application services *
9.
Refer to the exhibit. On the basis of the information presented, wh
ich two IP SLA related statements are true? (Choose two.)
IP
IP
IP
IP
IP
IP
SLA
SLA
SLA
SLA
SLA
SLA
99
99
99
99
99
99
is measuring jitter.
is scheduled to begin in 2 hours.
is sending echo requests every 10 seconds. *
is sending echo requests from IP address 192.168.2.1.
was configured with the type dns target-addr 192.168.2.1 command.
will run forever unless explicitly disabled. *
10. Which two descriptions are accurate about the path control
functionality of offset lists? (Choose two.)
used to increase metrics *
used to increase administrative distance
provides a mechanism to mark packets with ToS
can be applied to only the inbound direction on an interface
can be applied to routes that are learned via dynamic routing protocols
can be applied only to routes that are learned via distance vector protocols *
11. Which two IP SLA path control statements are true? (Choose t
wo.)
An IP SLA operation is a measurement that includes protocol, frequency, traps, and t
hresholds. *
IOS IP SLA is a mechanism for increasing incoming and outgoing metrics to routes t
hat are learned via RIP or EIGRP.
The IOS IP SLA feature allows performance measurements between a Cisco device a
nd another Cisco device or a host. *
The IOS IP SLA feature can only measure performance statistics between a Cisco de
vice and a host.
The IOS IP SLA feature can only measure performance statistics between Cisco devi
ces.
The IOS IP SLA feature is only configurable using the command-line interface (CLI).
12.
0.0.0.255
0.0.0.255 *
0.0.0.255
0.0.0.255
0.0.0.3
13. Which two commands can be used to verify that an offset list
has
altered the path taken by traffic? (Choose two.)
traceroute *
telnet
ping
show ip route *
show ip protocols
show running-config
14.
ip next-hop
ip precedence
default interface
ip default next-hop
16.
Refer to the exhibit. Assuming all FastEthernet interfaces have been configured with
the ip policy route-map LOAD_BALANCE command and are up, how will router R1 tre
at packets that are received from network 10.2.0.0 and destined for the Internet?
will
will
will
will
will
be
be
be
be
be
dropped by R1
forwarded out interface S0/0/0
forwarded out interface S0/1/0
routed normally based on the routing table *
load balanced through each serial interface
availability
adaptability
performance
predictability
asymmetric routing *
CHAPTER 6
2
Which statement is true?
Refer to the exhibit. Which two configurations will allow router R1 to establis
h a neighbor relationship with router R2? (Choose two.)
R1(config)# router bgp 100 *
R1(config-router)# network 192.168.10.0 *
R1(config-router)# neighbor 209.165.200.226 remote-as 200 *
R2(config)# router bgp 200 *
R2(config-router)# network 192.168.20.0 *
R2(config-router)# neighbor 209.165.200.225 remote-as 100 *
4 How can static routes be dynamically injected into BGP?
Create the static routes with an administrative distance equal to BGP.
Apply the redistribute static command to the BGP configuration. *
Create a prefix list that covers the scope of the networks that are specified b
y the static routes.
Use route maps instead of static routes to dynamically update the convergen
ce.
Refer to the exhibit. BGP sessions are established between all routers. RTC re
ceives route updates for network 209.165.200.224/27 from autonomous syst
em 300 with the weight attribute set to 3000. RTB also learns about network
209.165.200.224/27 from autonomous system 200 with a weight of 2000. W
hich router will be used by RTA as a next hop to reach this network?
RTB because of the lowest weight
RTB because of the slow 64 kb/s link
RTB because of the shortest AS_Path *
RTC because of the highest weight
RTC because of the longest AS_Path
RTC because of the T1 link
7.
Refer to the exhibit. Based on the show ip bgp summary and debug ip bgp ou
tput, which two statements must be true?
(Choose two.)
The router at 10.255.2.2 is an EBGP peer.
The ebgp multi-hop command is missing from the BGP configuration.
R1 has established an EBGP peering relationship. *
R1 is directly connected to an IBGP peer.
R1 cannot route BGP packets to 10.255.2.2. *
8
Refer to the exhibit. Router R1 is receiving the prefix 10.22.0.0/16 from an IB
GP peer. The prefix appears in the BGP table of R1, but not in the IP routing t
able. What could be preventing R1 from installing 10.22.0.0/16 in the routing
table?
automatic summarization disabled
EBGP multihop misconfiguration
incorrect use of the update-source command
route dampening
synchronization *
only routes that are learned from IBGP peers in the same autonomous syste
m
any route in either the IP routing table or BGP forwarding database
11
Ref
er to the exhibit. An organization has configured a multihomed solution using
EBGP between two edge routers and two ISPs. The edge routers are receiving
only default routes from each ISP EBGP peer. Which two statements are true
of this solution? (Choose two.)
EIGRP will choose the best route to exit the autonomous system. *
Traffic between the ISPs will be routed through autonomous system 65500.
All routers in autonomous system 65500 must have complete knowledge of e
xternal routes.
A TCP session must be established between the edge routers and the ISP rout
ers. *
14 Which two options best describe an exterior routing protocol (EGP)? (Choo
se two.)
an interdomain routing protocol *
an intradomain routing protocol
a routing protocol that is used for intradomain routing such as IS-IS and OSPF
v3
a routing protocol that exchanges routing information within an autonomous
system
a routing protocol that exchanges routing information between different auto
nomous systems*
18
Refer to the exhibit. BGP sessions are established between all routers. Router
RTC has the local preference for network 209.165.200.224/27 set to 200 and
router RTB has a local
preference set to 150 for the same network. Which router will be used by RTA
as a next hop to reach network 209.165.200.224/27?
RTB because of the lowest local preference
RTB because of the slow 64 kb/s link
RTC because of the highest local preference *
BGP
BGP
ult.
BGP
BGP
CHAPTER 7
1.
Refer to the exhibit. A network administrator has configured a GRE tunnel bet
ween R1 and R2 as shown. After completing the tunnel configurations, the ad
ministrator notices that the tunnel interfaces on both routers are down. All o
ther interfaces are up and the pings through the ISP to the serial interface of
each router are successful. What is the cause of the problem?
Tunnel source configurations are incorrect.
Tunnel destination configurations are incorrect. *
The MTU size has not been increased to 1492.
GRE IP encapsulation has not been configured.
3.
Refer to the exhibit. Based on the partial configuration that is shown, which s
tatic route would be the primary default path?
ip route 0.0.0.0 0.0.0.0 172.16.20.2 40 *
ip route 0.0.0.0 0.0.0.0 192.68.6.1 50
ip route 0.0.0.0 0.0.0.0 202.16.20.2 60
ip route 0.0.0.0 0.0.0.0 212.68.6.1 70
4. Which is a clientless VPN solution for mobile workers?
GRE
IPsec
SSH
SSL *
5. Which two statements are correct about IPsec crypto maps? (Choose two.)
The crypto map defines the IPsec tunnel endpoint or peer. *
Packets that do not meet the criteria as specified in the crypto map
are dropped.
The crypto map is applied to the outbound interface that the router is
peering with. *
6. What is a limitation of IPsec by design?
IPsec only forwards unicast traffic.*
7.
Refer to the exhibit. Which two statements are true about the exhibited stat
ic routes? (Choose two.)
If a route to 10.0.0.0/8 is received via
IP, R1 will prefer the dynamic route over both configured
static routes. *
The static route to 10.0.0.0/8 via 1.1.1.1 will be preferred to the route via 2.2.
2.2. *
8.
R
efer to the exhibit. A network administrator is configuring NAT on router Re
mote. The configuration should allow users on network 172.16.16.0/21 to acc
ess Internet sites as well as resources on the HQ LAN network 172.16.0.0/21
through the VPN tunnel. How should the administrator configure access list 1
01 to accomplish this task?
Remote(config)# access-list 101 deny 172.16.16.0 0.0.7.255 172.16.0.0 0.0.
7.255 *
Remote(config)# access-list 101 permit ip 172.16.16.0 0.0.7.255 any *
Remote(config)#
Remote(config)#
7.255
Remote(config)#
Remote(config)#
Remote(config)#
9 0.0.0.3
Remote(config)#
Remote(config)#
Remote(config)#
0.0.7.255
9. How is NAT tuned to handle traffic that is sent through a VPN tunnel
between a mobile worker and internal corporate resources?
Translation is allowed by a permit access list statement or route map.
Translation is allowed by a deny access list statement or route map.
Traffic should bypass translation with a deny access list statement or routemap. *
10. Branch office network design
faces several challenges. Which of these challenges
has the goal of obtaining centralized control of network security and manag
ement?
bandwidth and network requirements
consolidated data centers *
deployment plan
management costs
mobility
11. Which three statements would help an end user develop a better
understanding of DSL technology? (Choose three.)
ADSL typically has a higher download bandwidth than available upload band
width. *
All varieties of DSL provide the same bandwidth, although they use different
technologies to achieve upload and download.
DSL is available in any location that has a telephone.
DSL speeds can exceed the speeds available with a typical T1 line. *
Transfer rates vary by the length of the local loop. *
14.
Refer to the exh
ibit. A network administrator is tuning IPsec to encapsulate the GRE tunnel
between R1 and R2. Assuming all other IPsec configurations are correct, whic
h two crypto map
20. Which two UDP ports must be permitted inbound through the Internetfacing interface on
a firewall to establish an IPsec tunnel and NAT-T? (Choose two.)
22
50
51
500
4500
Chapter 8
1
Refer to the
exhibit. An administrator has configured routers R1 and R2 for EIGRP
After completing the configurations and verifying that the interfaces are up, t
he adm
that the routers have not formed an EIGRP adjacency. What needs to be done
to
neighboring routers to establish adjacency?
IPv6 multicast routing must be enabled.
The EIGRP routing process must be started. *
The router ID for IPv6 EIGRP must be a 128 bit number.
2.
4.
R
efer to the exhibit. The network is using OSPFv3 as the routing
protocol. Servers A, B, and C
offer the same application services. Which type of IPv6 address would be us
ed so that the router will send the packet to the server with the lowest cost O
SPF route?
anycast *
multicast
link local
unique local
5 Which two statements are correct about solicited-node multicasts? (Choose
two.)
They are used for address resolution of an IPv4 address to an IPv6 address.
They are used for address resolution of an IPv6 address to a MAC address on
a LAN segment. *
They are used for address resolution of an IPv4 address to an IPv6 address on
a LAN segment.
They resolve the problem of two or more devices having the same MAC addr
ess.
They resolve the problem of two or more devices having the same link-local a
ddress.
They are used in Duplicate Address Detection (DAD) to detect duplicate IPv6
addresses. *
6
Refer to the exhibit. Hos
t 1 sends a router solicitation ICMP message that requests
auto configuration from router R1. Which destination IPv6 address will be use
d by R1 to send the ICMP router advertisement message that contains the IP
v6 configuration options?
multicast address FF02::2 for all routers
router R1 link-local address FE80::2/10
DHCP servers/relay agent address FF02::C
host 1 link-local address FE80::1 or multicast address FF02::1 for all nodes *
7 Stateless autoconfiguration enables which IPv6 feature?
Capability of devices to connect to the network without any configuration or
without the use of a DHCP server *
8. How do IPv6 enabled routers handle packet fragmentation?
IPv6 routers do not perform packet fragmentation. OSPFv3 has a mechanism
for determining the optimal packet size and dynamically adjusting the packet
size.
IPv6 routers do not perform packet fragmentation. CDP is used to discover th
e
correct packet size for any given traffic flow. The correct packet size is unique
for
each traffic flow.
IPv6 routers perform packet fragmentation. CDP is used to determine which
packets need to be fragmented for any given traffic flow.
Refer to the exhibit. Which two statements are true of the NAT-PT configurati
ons
on router R1? (Choose two.)
Router R1 will advertise the 1144::/96 prefix to router R2. *
The ip nat outside command is required on interface Fa0/0.
Router R3 will learn about the 14::/64 network from router R1.
NAT-PT is enabled on both Fast Ethernet interfaces of router R1. *
To reach the App_Server, packets from host A should be forwarded to router
R1
with a destination IP of 172.16.23.100.
10.
Refer to the exhibit. An administrator configured router R1 with two instances
of RIPng.
Based on the information in the exhibit, what must the administrator do next
in order to exchange routes between both RIPng instances?
The redistribute rip R1R2 command must be issued under the R1R3 RIPng ins
tance and the
redistribute rip R1R3 command must be issued under the R1R2 RIPng instanc
e. *
11 Which two IPv6-specific extensions are incorporated into MBGP? (Choose t
wo.)
an identifier for the IPv6 address family *
all routers IPv6 multicast address
a global IPv6 address with the NEXT_HOP attribute *
a 128-bit router ID
MPLS as a passenger protocol
12 Which two IPv4 to IPv6 transition techniques manage the interconnection
of IPv6 domains? (Choose two.)
trunking
dual stack *
encapsulation
tunneling *
translation
13 What is an advantage of the NAT-PT technique for transitioning between I
Pv4 and IPv6?
All mappings are static.
Globally routable IPv4 addressing is not required.
DNS is not required.
No configuration is required on end nodes *
14.
Refer to the exhibit. What is the purpose of this configuration?
to protect the IPv6 traffic from being corrupted by the IPv4 traffic
to transport IPv6 traffic through an IPv4 network *
to allow the IPv6 traffic to use IPv4 addresses
15
Refer to th
e exhibit. A network administrator wishes to apply a routing policy on router
WestR1 that will forward web traffic to the ISP while preserving the normal ro
uting to the district office. However, when the configuration displayed in the
exhibit is applied, the web traffic is still flowing to the district office. What
configuration change should be made to the WestR1 router?
The access list must be rewritten to properly match web traffic.
The route map should be applied to Gi 0/0 interface. *
The access group should be applied to S0/0/0 outbound.
The route map name should match the access list name.
18.
Refer to the exhibit. Which statement is true about the command ipv6 ospf c
ost 20?
The Virtual Router Redundancy Protocol (VRRP) will not use this interface unl
ess all other interfaces go down.
The cost number is used in the designated router election.
OSPFv3 will prefer this link over links with a lower cost.
The IPv6 priority must be configured before this command is entered.
The cost of sending a packet on this interface, expressed in the link state me
tric, is 20. *
20.
Refer to the exhibit. Which type of IPv6 static route is configured in the exhibi
t?