You are on page 1of 9

Which of the following about Routing Protocols is correct?

(choose all that apply) RIP 2 is a Distance Vector Protocol The RIP 1 uses bandwidth and delay as the metric RIP 1 uses subnet mask The holdown timer value for RIP is 240 sec The Update timer value of IGRP is 90 sec Answer :A & E What command is used to delete the configuration stored in NVRAM? erase startup-config erase running-config delete nvram erase nvram Answer :A What is the maximum number of hops that OSPF allows before marking a network as unreachable? 15 16 255 Unlimited 99 Answer :D Which routing protocol would allow a network administrator scalability, VLSM support and minimize overhead if the network administrator wants to merge different networks all using routers from multiple vendors? VTP RIP IGRP EIGRP OSPF Answer :E Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table? The update information will replace the existing routing table entry. The update information will be added to the existing routing table. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The update will be ignored and no further action will be taken. Answer :E Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table? The update information will replace the existing routing table entry. The update information will be added to the existing routing table. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The update will be ignored and no further action will be taken. Answer :E What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame? Modified Cut Through Store and Forward

Cut Through Fragment Free Answer :C Which of the following belong to the ISDN TE2 function group? (Choose two) a router serial interface an ISDN phone a router ISDN BRI "U" interface a standard pc an ISDN terminal adapter Answer :A & D Which protocol is used to look up an IP address from a known Ethernet address? TCP RARP ARP IP Answer :B You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses its configuration each time it is rebooted. You study the output displayed in the exhibit. What is the cause of the problem? Exhibit: ----- output omitted ---Cisco 2620 (MPC860) processor (revision 0x200) with 16384/2048K bytes of memory. Processor board ID JAD05076EF6 (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. 2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 2 Low speed serial(sync/async) network interface(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write) Configuration register is 0x2142 There is insufficient RAM for the IOS image The configuration register is misconfigured There is insufficient flash memory NVRAM failed POST There is insufficient NVRAM B If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? 2046 8190 4094 4096 1024 Answer :C The Frame Relay circuit between router A and router B is experiencing congestion. Which type of notification are used to alleviate the congestion? (Choose three)

DE BECN DLCI 100 is Down CIR FECN Answer :D, B & A At which OSI layer does data translation and code formatting occur? Network Physical Data link Transport Session Presentation Answer :F Which one of the following is a reason to use a hardware address? To transmit a packet from one local device to another local device. To transmit a frame from one interface to another interface. To obtain a vendor code/serial number from the user. To transmit data from one local device to remote device across Internet. To contain logical information about a device to use an end-to-end transmission. Answer :B Which wireless data communication type has a high data rate but is limited to very short distances? Infrared Broadband Personal Communication Service (PCS) Narrowband Spread spectrum Answer :A Ethernet networks are broadcast domains and collision domains. How the hosts on an Ethernet network will know when to resume transmissions after a collision has occurred? (Choose all that apply) The router on the segment will signal that the collision has cleared. The jam signal indicates that the collision has been cleared. The hosts will attempt to resume transmission after a time delay has expired. The destination host sends a request to the source for retransmission. An electrical pulse indicates that the collision has cleared. Answer :C Which command must be entered when connecting two routers without external DCE devices via a serial link? Serial up. Dte rate. Dce rate. Clock rate. Line protocol up. Answer :D How2Pass Router Simulation. Please read the instructions and problem statement carefully. Complete your configuration and press the Done button when finished.

Answer : Troubleshooting In the simulation, click Host D, a dialog box will appear, select the Cisco Terminal option and press the OK button, to establish a terminal session to the router Kenan. Press Enter key to enter the User EXEC mode. Enter the privileged EXEC mode by typing enable at the Kenan> prompt and then the password how2pass at the Password: prompt. The privileged EXEC mode prompt, Kenan#, will be displayed. Issue the command show running-config (abbreviated as sh runn), read the output carefully to find any missing or wrong configuration. Whenever you see the prompt --More-- at the bottom of a page, you can press spacebar to see the next output page. Notice the running-config entries for interface serial1. It has wrong IP address and subnet mask. Notice the word shutdown below Serial1. To confirm this, issue show interface serial 1 command. The output confirms that the interface is shutdown. This simulation also supports ping, show ip protocol and show ip route commands for effective debugging. Do the configuration shown below and ping to a remote ip address. Save your configuration using copy running-config startup-config (abbreviated as copy runn start) command. Now press the Done button. Configuration Required Kenan#config t Enter configuration commands, one per line. End with CNTL/Z. Kenan(config)#int s1 Kenan(config-if)#ip address 192.168.69.2 255.255.255.0 Kenan(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1 changed state to up Kenan(config-if)#^z %SYS-5-CONFIG_I: Configured from console by console Kenan#ping 192.168.59.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.69.1, timeout is 2 seconds: ! ! ! ! ! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms Kenan#copy runn start Destination filename [startup-config]? Building configuration... Which of the following will configure a static route on Router A to network 180.18.30.0/24 with an administrative distance of 90? Router(config)# ip route 90 180.18.30.0 255.255.255.0 182.18.20.2 Router(config)# ip route 180.18.30.0 255.255.255.0 182.18.20.2 90 Router(config)# ip route 180.18.30.1 255.255.255.0 182.18.20.1 90 Router(config)# ip route 180.18.20.1 255.255.255.0 182.18.30.0 90 Router(config)# ip route 90 180.18.20.1 255.255.255.0 182.18.20.2 Answer :B What is a trunk link? A link that is only part of one VLAN and is referred to as the native VLAN of the port A link that can carry multiple VLANs A switch port connected to the Internet Data and voice capability on the same interface

Answer :B What does the concept route aggregation mean when one talks about using variable subnet masking? Combining routes to multiple networks into one supernet. Deleting unusable addresses through the creation of many subnets. Calculating the available host addresses in the AS. Reclaiming unused space by means of changing the subnet size. Answer :A What PPP protocol provides dynamic addressing, authentication, and multilink? HDLC LCP NCP X.25 Answer :B Study the network topology exhibit carefully, in particular the two switches SW1, SW2, and the router RT3. Which statements are true in this scenario? (Select two) The hosts on the 192.168.1.0 network form one collision domain, and the hosts on the 192.168.2.0 network form a second collision domain. Each host is in a separate collision domain. All the devices in both networks will receive a broadcast to 255.255.255.255 sent by host A. Only the devices in network 192.168.1.0 will receive a broadcast to 255.255.255.255 sent by host A. All the devices on both networks are members of the same collision domain. Answer :D & B What is the purpose of Inverse ARP? It is used to map a known DLCI to an IP address It is used to map a known DLCI to a MAC address It is used to map a known IP address to a MAC address It is used to map a known MAC address to an IP address It is used to map a known MAC address to DLCI Answer :A You want to configure a router for load balancing across 4 unequal cost paths on your network. Which of the following routing protocols can you use? (Choose two) RIP v1 RIP v2 OSPF IGRP EIGRP VLSM Answer :D & E At what layer data is split into segments Transport LAN Session

Data Link Answer :A Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server? The MAC address of Host A. The MAC address of the server network interface. The MAC address of router interface E1. The MAC address of router interface E0. Answer :D What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame? Fragment Free Store and Forward Modified Cut Through Cut Through Answer :D The exhibit displays the partial contents of an encapsulation header. Which of the following are true of the network traffic represented in this diagram? (Select three) This is traffic from an FTP server. This is a UDP header. The last PDU received in this session had a sequence number of 292735. This is an OSI layer 4 header. This is traffic from a Telnet client. Answer :D, A &C What does the concept route aggregation mean when one talks about using variable subnet masking? Reclaiming unused space by means of changing the subnet size. Combining routes to multiple networks into one supernet. Calculating the available host addresses in the AS. Deleting unusable addresses through the creation of many subnets. Answer :B What OSI layer is FRAME-RELAY mapped to? Network Transport Data Link Physical Answer :C Please drag the appropriate options to the correct targets. After completing the question press the push button below the question to save your response. Answer: 1:E,2:A,3:F Explanation: LAPD - provides the data link protocol that allows delivery of messages across that D-channel to the local switch. LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic

access. It is defined by ITU-T Recommendations Q.920 and Q.921. TE1 - ISDN -capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point. ITU.T.430 - Defines connectors, encoding, framing, and reference points. TE2 - Equipment that does not understand ISDN protocols and specifications (no ISDN awareness). Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA. NT1 - CPE equipment in North America. Connects with a U reference point (two-wire) to the telco. Which routing protocol would allow a network administrator scalability, VLSM support and minimize overhead if the network administrator wants to merge different networks all using routers from multiple vendors? OSPF VTP EIGRP RIP IGRP Answer :A What Channel is provided by ISDN BRI? 2B+1D 30B+1D 23B+1D 2D+1B Answer :A Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two) It is globally significant. It is an optional parameter required only if multiple OSPF processes are running on the router. All routers in the same OSPF area must have the same process ID if they are to exchange routing information. It is needed to identify a unique instance of an OSPF database. It is locally significant. Answer :D & E Given the the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are interconnected over a trunked link. Which of the following conditions would verify VLAN and trunk operation? (choose 3) A. Host 1-1 can ping Host 1-2 B. Host 1-1 can ping Host 4-2 C. Host 1-1 can not ping Host 1-2 D. Host 4-1 can not ping Host 1-2 E. Host 4-1 can ping Host 4-2 Answer :A, D, E By looking at the configuration, Which additional command must be issued on the Branch router before interesting traffic will be sent to the Remote router? Hostname: Branch Hostname: Remote PH# 123-6000, 123-6001 PH# 123-8000, 123-8001 SPID1: 32055512360001 SPID1: 32055512380001 SPID2: 32055512360002 SPID2: 32055512380002 isdn switch-type basic ni

username Remote password cisco interface bri0 ip address 10.1.1.1 255.255.255.0 encapsulation ppp ppp authentication chap isdn spid1 41055512360001 isdn spid2 41055512360002 dialer map ip 10.1.1.2 name Remote 1238001 dialer-list 1 protocol ip permit (config-if)# dialer-group 1 (config-if)# dialer-list 1 (config-if)# dialer map 1 (config-if)# dialer-route 1 Answer : A Explanation :The "dialer-group #" command tells the access-list (used with the dialer-list # command), which interface to activate when it finds interesting traffic. The numbers at end of each command must match. You are the network administrator of the RouterSim global software Company. You receive a call from a user who is unable to reach a server at a remote site. After further review you discover the following info: Local PC 190.0.3.35/24 Default Gateway 190.0.3.1 Remote Server 190.0.5.250/24 You then conduct the following tests from the offending local PC: Ping 127.0.0.1 - Unsuccessful Ping 190.0.3.35 - Successful Ping 190.0.3.1 - Unsuccessful Ping 190.0.5.250 - Unsuccessful Which of the following problems would create the test results listed above? TCP/IP not correctly installed Local physical layer problem NIC not functioning Remote physical layer problem Answer : A Explanation :If you cannot ping the loopback address of 127.0.0.1, then something is wrong with the IP configuration of the host. Choose three reasons why the networking industry uses a layered model. (Choose 3) Allow changes in one layer to occur without changing other layers To get Gigabit speeds on LANs Clarify what general functions is to be done rather than how to do it To create filter tables on LANs Order network troubleshooting steps Answer :A, C, E Explanation : The reasons to use a layer model are:

Clarify what general function is to be done rather than how to do it. Reduce the complexity of networking into more manageable sublayers. Enable interoperability using standard interfaces. Allow changes in one layer to occur without changing other layers. Speed up network industry progress by allowing specialization. Allow for shortcut explanations to facilitate protocol comparisons. Order network troubleshooting steps. Facilitate systematic troubleshooting. What is a disadvantage to using bridges in your network? Filters by MAC address Stops broadcast storms Doesn't stop broadcast storms Can only use up to 4 bridges in any LAN Answer : C Explanation : Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really a disadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames.

You might also like