5
QUESTION 161
Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?
Answer: D
Section: Chapter 2: TCP/IP
Explanation/Reference:
QUESTION 162
Which two topologies are using the correct type of twisted-pair cables? (Choose two.)
Answer: DE
Section: Chapter 1: Introduction
Explanation/Reference:
QUESTION 163
Which of the following are true regarding bridges and switches? (Choose two.)
A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge.
C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
Answer: BC
Section: Chapter 9: Switching
Explanation/Reference:
QUESTION 164
What are some of the advantages of using a router to segment the network? (Choose two.)
A. Filtering can occur based on Layer 3 information. B. Broadcasts are eliminated.
C. Routers generally cost less than switches.
D. Broadcasts are not forwarded across the router.
E. Adding a router to the network decreases latency.
Answer: AD
Section: Chapter 1: Introduction
Explanation/Reference:
QUESTION 165
Which of the following statements are true regarding bridges and switches? (Choose 3.)
A. Switches are primarily software based while bridges are hardware based. B. Both bridges and switches forward Layer 2 broadcasts.
C. Bridges are frequently faster than switches.
D. Switches have a higher number of ports than most bridges.
E. Bridges define broadcast domains while switches define collision domains.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Answer: BDF
Section: Chapter 9: Switching
Explanation/Reference:
QUESTION 166
Which characteristics are representative of a link-state routing protocol? (Choose three.)
A. provides common view of entire topology B. exchanges routing tables with neighbors C. calculates shortest path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates
Answer: ACD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 167
Which of the following statements describe the network shown in the graphic? (Choose two.)
A. There are two broadcast domains in the network. B. There are four broadcast domains in the network. C. There are six broadcast domains in the network. D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.
Answer: AF
Section: Chapter 1: Introduction
Explanation/Reference:
QUESTION 168
Use the output from the router shown in the graphic above to determine which of the following are correct. (Choose two.)
A. Router John uses a link-state routing protocol.
B. Router John will receive routing updates on the Serial0/0 interface. C. Router John will receive routing updates on the Serial0/1 interface. D. Router John will send routing updates out the Serial0/0 interface.
E. Router John will send routing updates out the FastEthernet0/0 interface. F. Router John will send routing updates out the Serial0/1 interface.
Answer: BD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 169
A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only
one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two.)
A. | 255.255.255.0 |
B. | 255.255.255.128 |
C. | 255.255.252.0 |
D. | 255.255.255.224 |
E. | 255.255.255.192 |
F. | 255.255.248.0 |
Answer: BE
Section: Chapter 3: IP Addressing and VLSM
Explanation/Reference:
QUESTION 170
Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet? (Choose two.)
A. | 192.168.20.29 |
B. | 192.168.20.16 |
C. | 192.168.20.17 |
D. | 192.168.20.31 |
E. | 192.168.20.0 |
Answer: AC
Section: Chapter 3: IP Addressing and VLSM
Explanation/Reference:
QUESTION 171
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports
21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)
A. FTP
B. Telnet C. SMTP D. DNS E. HTTP F. POP3
Answer: DEF
Section: Chapter 2: TCP/IP
Explanation/Reference:
QUESTION 172
Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)
A. transparent
B. auto
C. on
D. desirable
E. blocking
F. forwarding
Answer: BCD
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 173
OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? (Choose three.)
A. Each OSPF area requires a loopback interface to be configured. B. Areas may be assigned any number from 0 to 65535.
C. Area 0 is called the backbone area.
D. Hierarchical OSPF networks do not require multiple areas. E. Multiple OSPF areas must connect to area 0.
F. Single area OSPF networks must be configured in area 1.
Answer: BCE
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 174
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)
A. hello packets
B. SAP messages sent by other routers
C. LSAs from other routers
D. beacons received on point-to-point links
E. routing tables received from other link-state routers
F. TTL packets from designated routers
Answer: AC
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 175
Which statements describe the routing protocol OSPF? (Choose three.)
A. It supports VLSM.
B. It is used to route between autonomous systems.
C. It confines network instability to one area of the network. D. It increases routing overhead on the network.
E. It allows extensive control of routing updates. F. It is simpler to configure than RIP v2.
Answer: ACE
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 176
The switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows:
Router Ethernet port - 1st usable address
Core - 2nd usable address
Core2 - 3rd usable address
For this network, which of the following commands must be configured on Core2 to allow it to be managed remotely from any subnet on the network? (Choose three.)
A. Core2(config)# interface f0/0
Core2(config-if)# ip address 192.168.1.10 255.255.255.248
B. Core2(config)# interface vlan 1
Core2(config-if)# ip address 192.168.1.11 255.255.255.248
C. Core2(config)# line con 0
Core2(config-line)# password cisco
D. Core2(config)# line vty 0 4
Core2(config-line)# password cisco
E. Core2(config)# ip default-gateway 192.168.1.9
F. Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8
Answer: BDE
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 177
An administrator is unsuccessful in adding VLAN 50 to a switch. While troubleshooting the problem, the administrator views the output of the show vtp status command, which is displayed in the graphic. What commands must be issued on this switch to add VLAN 50 to the database? (Choose two.)
A. Switch(config-if)# switchport access vlan 50
B. Switch(vlan)# vtp server
C. Switch(config)# config-revision 20
D. Switch(config)# vlan 50 name Tech
E. Switch(vlan)# vlan 50
F. Switch(vlan)# switchport trunk vlan 50
Answer: BE
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 178
Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
A. | 115.64.8.32 |
B. | 115.64.7.64 |
C. | 115.64.6.255 |
D. | 115.64.3.255 |
E. | 115.64.5.128 |
F. | 115.64.12.128 |
Answer: BCE
Section: Chapter 3: IP Addressing and VLSM
Explanation/Reference:
QUESTION 179
Which of the following are types of flow control? (Choose three.)
A. buffering
B. cut-through
C. windowing
D. congestion avoidance
E. load balancing
Answer: ACD
Section: Chapter 2: TCP/IP
Explanation/Reference:
QUESTION 180
Which destination addresses will be used by Host A to send data to Host C? (Choose two.)
A. the IP address of Switch 1
B. the MAC address of Switch 1
C. the IP address of Host C
D. the MAC address of Host C
E. the IP address of the router's E0 interface
F. the MAC address of the router's E0 interface
Answer: CF
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 181
Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two.)
A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached. D. Router C will send a Destination Unreachable message type.
E. Router C will send a Router Selection message type. F. Router C will send a Source Quench message type.
Answer: AD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 182
To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met? (Choose two.)
A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B. The VTP management domain name of both switches must be set the same. C. All ports on both the switches must be set as access ports.
D. One of the two switches must be configured as a VTP server.
E. A rollover cable is required to connect the two switches together. F. A router must be used to forward VTP traffic between VLANs.
Answer: BD
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 183
Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)
A. It is locally significant. B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF database.
D. It is an optional parameter required only if multiple OSPF processes are running on the router.
E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
Answer: AC
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 184
What functions do routers perform in a network? (Choose two.)
A. packet switching
B. access layer security
C. path selection
D. VLAN membership assignment
E. bridging between LAN segments
F. microsegmentation of broadcast domains
Answer: AC
Section: Chapter 4: Introduction to Cisco IOS
Explanation/Reference:
QUESTION 185
Which series of commands will configure router R1 for LAN-to-LAN communication with router R2? The enterprise network address is 192.1.1.0/24 and the routing protocol in use is RIP. (Choose three.)
A. R1(config)# interface ethernet 0
R1(config-if)# ip address 192.1.1.129 255.255.255.192
R1(config-if)# no shutdown
B. R1(config)# interface ethernet 0
R1(config-if)# ip address 192.1.1.97 255.255.255.192
R1(config-if)# no shutdown
C. R1(config)# interface serial 0
R1(config-if)# ip address 192.1.1.4 255.255.255.252
R1(config-if)# clock rate 56000
D. R1(config)# interface serial 0
R1(config-if)# ip address 192.1.1.6 255.255.255.252
R1(config-if)# no shutdown
E. R1(config)# router rip
R1(config-router)# network 192.1.1.4
R1(config-router)# network 192.1.1.128
F. R1(config)# router rip
R1(config-router)# version 2
R1(config-router)# network 192.1.1.0
Answer: ADF
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 186
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors. C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server. F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
Answer: CE
Section: Chapter 9: Switching
Explanation/Reference:
QUESTION 187
The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. Which routers are likely to have been elected as DR? (Choose two.)
A. Corp-1
B. Corp-2
C. Corp-3
D. Corp-4
E. Branch-1
F. Branch-2
Answer: DF
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 188
At which layers of the OSI model do WANs operate? (Choose two.)
A. application layer
B. session layer C. transport layer D. network layer E. datalink layer F. physical layer
Answer: EF
Section: Chapter 14: Wide Area Network (WAN)
Explanation/Reference:
QUESTION 189
Which routing protocols can be used within the enterprise network shown in the diagram? (Choose three.)
A. RIP v1
B. RIP v2
C. IGRP D. OSPF E. BGP
F. EIGRP
Answer: BDF
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 190
Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two.)
A. All of the routers need to be configured for backbone Area 1.
B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.
C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established.
D. The hello and dead interval timers are not set to the same values on R1 and R3. E. EIGRP is also configured on these routers with a lower administrative distance. F. R1 and R3 are configured in different areas.
Answer: DF
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 191
Which statements are true about EIGRP successor routes? (Choose two.)
A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails. C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
Answer: AD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 192
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.)
A. The subnet mask in use is 255.255.255.192. B. The subnet mask in use is 255.255.255.128.
C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D. The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E. The LAN interface of the router is configured with one IP address.
F. The LAN interface of the router is configured with multiple IP addresses.
Answer: BCF
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 193
Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? (Choose three.)
A. The Router1 WAN port is configured as a trunking port.
B. The Router1 port connected to Switch1 is configured using subinterfaces. C. The Router1 port connected to Switch1 is configured as 10 Mbps.
D. The Switch1 port connected to Router1 is configured as a trunking port. E. The Switch1 port connected to Host B is configured as an access port. F. The Switch1 port connected to Hub1 is configured as full duplex.
Answer: BDE
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 194
Which routing protocols will support the following IP addressing scheme? (Choose three.) Network 1 - 192.168.10.0 /26
Network 2 - 192.168.10.64 /27
Network 3 - 192.168.10.96 /27
Network 4 - 192.168.10.128 /30
Network 5 - 192.168.10.132 /30
A. RIP version 1
B. RIP version 2
C. IGRP D. EIGRP E. OSPF
Answer: BDE
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 195
Refer to the partial command output shown. Which two statements are correct regarding the router hardware? (Choose two.)
A. Total RAM size is 32 KB.
B. Total RAM size is 16384 KB (16 MB). C. Total RAM size is 65536 KB (64 MB). D. Flash size is 32 KB.
E. Flash size is 16384 KB (16 MB). F. Flash size is 65536 KB (64 MB).
Answer: CE
Section: Chapter 4: Introduction to Cisco IOS
Explanation/Reference:
QUESTION 196
The Ethernet networks connected to router R1 in the graphic have been summarized for router R2 as
192.1.144.0/20. Which of the following packet destination addresses will R2 forward to R1, according to this summary? (Choose two.)
A. | 192.1.159.2 |
B. | 192.1.160.11 |
C. | 192.1.138.41 |
D. | 192.1.151.254 |
E. | 192.1.143.145 |
F. | 192.1.1.144 |
Answer: AD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 197
The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possible causes for this interface status? (Choose three.)
A. The interface is shut down.
B. No keepalive messages are received. C. The clockrate is not set.
D. No loopback address is set.
E. No cable is attached to the interface.
F. There is a mismatch in the encapsulation type.
Answer: BCF
Section: Chapter 4: Introduction to Cisco IOS
Explanation/Reference:
QUESTION 198
Which of the following describe private IP addresses? (Choose two.)
A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization
Answer: BD
Section: Chapter 3: IP Addressing and VLSM
Explanation/Reference:
QUESTION 199
Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)
A. Configure the gateway on Host A as 10.1.1.1.
B. Configure the gateway on Host B as 10.1.2.254. C. Configure the IP address of Host A as 10.1.2.2. D. Configure the IP address of Host B as 10.1.2.2.
E. Configure the masks on both hosts to be 255.255.255.224. F. Configure the masks on both hosts to be 255.255.255.240.
Answer: BD
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 200
A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which
interfaces are access ports? (Choose three.)
A. Switch1 - Fa 0/2
B. Switch1 - Fa 0/9
C. Switch2 - Fa 0/3
D. Switch2 - Fa 0/4
E. Switch2 - Fa 0/8
F. Router - Fa 1/0
Answer: ACD
Section: Chapter 10: VLAN
Explanation/Reference:
QUESTION 201
Refer to the exhibit. Which destination addresses will Host A use to send data to Host B? (Choose two.)
A. the IP address of Switch1
B. the IP address of Router1 Fa0/0
C. the IP address of HostB
D. the MAC address of Switch1
E. the MAC address of Router1 Fa0/0
F. the MAC address of HostB
Answer: CE
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 202
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)
A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport port-security violation shutdown
E. Switch1(config-if)# ip access-group 10
Answer: AD
Section: Chapter 9: Switching
Explanation/Reference:
QUESTION 203
Refer to the graphic. A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Which commands will accomplish this? (Choose two.)
A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0
B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6
C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0
D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6
E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0
F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0
Answer: CD
Section: Chapter 6: IP Routing
Explanation/Reference:
QUESTION 204
What should be done prior to backing up an IOS image to a TFTP server? (Choose three.)
A. Make sure that the server can be reached across the network. B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image. D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.
Answer: ACD
Section: Chapter 5: Managing Cisco IOS
Explanation/Reference:
QUESTION 205
What are the possible trunking modes for a switch port? (Choose three.)
A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding
Answer: BCD
Section: Chapter 9: Switching
Explanation/Reference:
QUESTION 206
The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router? (Choose three.)
A. | 172.25.78.243 |
B. | 172.25.98.16 |
C. | 172.25.72.0 |
D. | 172.25.94.255 |
E. | 172.25.96.17 |
F. | 172.25.100.16 |
Answer: ACD
Section: Chapter 3: IP Addressing and VLSM
Explanation/Reference:
QUESTION 207
Refer to the graphic. Host 1 cannot receive packets from Host 2. Assuming that RIP v1 is the routing protocol in use, what is wrong with the IP configuration information shown? (Choose two.)
0 Response to "5"
Post a Comment