Sie sind auf Seite 1von 8

Take Assessment - ROUTE Chapter 2 - CCNP ROUTE (Version 6.

0)

1: Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip protocols command. What two facts can be determined from the output? (Choose two.)

The administrative distance is 100. This router will not accept routes that are more than 100 hops away. There are 10 Cisco devices in this prototype network. The auto-summary command was applied on this router. EIGRP is using two values for the calculation of the composite metric. EIGRP on this router will display up to four unequal cost routes to the same destination.

2: Which event must take place to transition an EIGRP route that is in the active state back to the passive state?

expiration of the RTO timer an update packet that is received from every EIGRP neighbor an acknowledgment that is received from every EIGRP neighbor a reply that is received from each neighbor for every generated query a feasible successor route that is moved from the topology table to the routing table

3: Refer to the exhibit. Which statement is true about the EIGRP hello packets that are received by router R2?

They are encrypted. They are authenticated. They are sent confidentially. They must be acknowledged.

4: Which two solutions are used in an EIGRP network to reduce DUAL computations? (Choose two.)

authentication load balancing partial updates summarization EIGRP stub routing

5: Which action is effective in preventing EIGRP routes from becoming SIA?

Use multiple EIGRP autonomous systems to bound the query range. Modify keepalive timers on point-to-point connections. Maintain a hierarchical network design. Keep K-values at default settings.

6: When does an EIGRP router place a route in the active state?

when there is no successor route in the routing table when the feasible distance is greater than the reported distance of the route when an update packet containing information about the route is not acknowledged when the current successor is no longer valid and there is no feasible successor in the topology table

7: Refer to the exhibit. All three routers are exchanging EIGRP routes. What value represents the advertised distance of the feasible successor for the 10.1.2.0/24 network?

256 532 768 1280

8: Which three technologies are used in EIGRP? (Choose three.)

Dijkstra algorithm DUAL finite-state machine reliable transport protocol link-state advertisements protocol-specific modules Bellman-Ford algorithm

9: Which two statements are true of EIGRP topology depth? (Choose two.)

Topology depth should be limited to 15 routers. Redundant links and alternative paths can be used to reduce topology depth. Topology depth is the maximum hop count between any two EIGRP routers in the topology. Route summarization can reduce the convergence time in networks with large depth. Topology depth is the number of router hops necessary for traffic to reach from access layer to core layer. Topology depth refers to the total number of hops that information must travel to reach all EIGRP routers in the network.

10: The network administrator wants RTA to send only the summarized route of 10.10.0.0/16 to RTB. Which configuration will accomplish this? RTA(config)# interface s0/0 RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0 RTA(config-if)# exit RTA(config)# router eigrp 101 RTA(config-router)# no auto-summary

RTA(config)# interface s0/1 RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0 RTA(config-if)# exit RTA(config)# router eigrp 101 RTA(config-router)# no auto-summary

RTA(config)# interface s0/0

RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0

RTA(config)# interface s0/1 RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0

11: Refer to the exhibit. Which statement is true of the EIGRP keys that are used by router R2?

R2 is encrypting EIGRP packets with only key 1. R2 is encrypting EIGRP packets with both key 1 and key 2. R2 is using only key 2 to authenticate received EIGRP packets. R2 is authenticating received EIGRP packets with both key 1 and key 2.

12: Which EIGRP algorithm tracks all the routes that are advertised by neighbors and uses the composite metric of each route to compare the routes?

STP Dijkstra DUAL SPF

13: What are two advantages to deploying a hierarchical IP addressing scheme in an EIGRP network? (Choose two.)

greater redundancy improved scalability ability to use network route summarization better route optimization creating shorter paths fewer network addresses that need to be allocated for the network

14: Refer to the exhibit. Based on the output of show ip eigrp neighbors, what are two possible problems with adjacencies between Router1 and Router2? (Choose two.)

The routers are configured with different EIGRP AS numbers. Automatic summarization was disabled. The hello timer for R1 was altered. The serial interfaces for both routers are in different networks. No feasible successors were found.

15: Which statement is a requirement for the EIGRP AS number?

It is the EIGRP router ID and must be the same on each router in the EIGRP domain. It is only locally significant, and as a result it can be different on each router in the EIGRP domain. It is selected by the network administrator and must be the same on each router in the EIGRP domain. It is assigned by IANA and must be the same on each router in the EIGRP domain.

16: A router in a fully converged EIGRP network detects that a remote route is unreachable. Which two events may occur next? (Choose two.)

EIGRP will look for a feasible successor in the routing table. DUAL will calculate the highest cost routes to each network. EIGRP will send a bounded update to alert neighbors about the failure. The router will forward the complete routing table to the neighboring routers. DUAL will look for a feasible successor route in the topology table and, if one is found, it will add this route to the routing table.

17: Refer to the exhibit. A network administrator has configured R1 and R2 for EIGRP authentication with multiple keys and activation times. After functioning normally for a month, R1 and R2 are now no longer forming an EIGRP adjacency. Which configuration change to the key lifetimes will correct the EIGRP adjacency problem?

Change the key 1 accept life to an end time of Feb 1 on both routers. Change key 2 send lifetime to a start time of Jan 1 on both routers. Change the key 1 send lifetime to an end time of Feb 1 on both routers. Change the key 2 accept lifetime to a start time of infinite on both routers.

18:Which EIGRP packet type can quickly propagate through a network and result in excessive DUAL computations and high CPU loads?

acknowledgment hello reply update query

19: Which design plan or diagram would govern how well EIGRP will scale?

IP addressing plan STP topology diagram Layer 2 addressing plan detailed cabling plan EIGRP traffic engineering plan

20: What are two advantages of modifying the interface metrics when deploying EIGRP in a network? (Choose two.)

improved bandwidth utilization less likely to have routing loops faster convergence better control over traffic patterns more efficient troubleshooting

Das könnte Ihnen auch gefallen