You are on page 1of 36


What are two characteristics of TCP? (Choose two.)

data transport reliability

best path determination

establishing, maintaining, and terminating virtual circuits

encapsulation of packets in a data frame with source and destination MAC addresses

best-effort datagram delivery


Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router:

RtrA(config)# interface serial0/0/0 RtrA(config-if)# ip address RtrA(config-if)# no shutdown

Ethernet Frame Relay HDLC PPP


What are three examples of TCP/IP application layer protocols? (Choose three.)

a terminal emulation protocol that supports remote console connections with various network devices a protocol created by IBM that makes it easier for mainframes to connect to remote offices a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet a protocol that controls the rate at which data is sent to another computer a protocol that exchanges network management information between a network device and a management console a protocol that conducts a test of the path through which a packet travels from source to destination .

1. Which three statements are true about the PDUs and the encapsulation process? (Choose three.) PDU #1 is a frame. 4. The order in which these PDUs are created during the encapsulation process is 2. 2.4) Refer to the exhibit.) . 3. 1. 4. The exhibit shows simplified protocol data units from different OSI model layers. PDU #4 is a transport layer PDU. PDU #2 is an application layer PDU PDU #3 is a segment. 5) Which three factors contribute to congestion on an Ethernet LAN? (Choose three. The order in which these PDUs are created during the encapsulation process is 3.

improper placement of enterprise level servers addition of hosts to a physical segment replacement of hubs with workgroup switches increasing use of bandwidth intensive network applications creation of new collision domains without first adding network hosts migration to full-duplex Ethernet within the LAN .

) one broadcast domain three broadcast domains three collision domains five broadcast domains nine collision domains ten collision domains .6) Refer to the exhibit. All ports on switch fl-1 are in the Production VLAN and all ports on switch fl-2 are in the Development VLAN. How many broadcast domains and how many collision domains are in the network? (Choose two.

VTP is not working properly between SW_1 and SW_2. Workstations in VLAN 10 can ping workstations in VLAN 10 that connect to either switch. Interfaces FA0/1 on SW_1 and SW_2 need to be configured as trunk ports. what is most likely the problem? FA 0/1 on SW_1 needs to be assigned to VLAN 20. Based on the output. VLAN10 and VLAN20 have been created on SW_1 and SW_2 and switch ports have been assigned to the appropriate VLAN. FA 0/1 on SW_2 needs to be assigned to VLAN 20. . Interfaces FA0/3 on both switches need to be configured as access ports. but workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite switch.7) Refer to the exhibit.

8) A Catalyst switch must be in which VTP mode in order to delete or add VLANs to a management domain? client server domain transparent designated 9) What creates a loop-free path through a switch network? hold-down timers poison reverse Spanning Tree Protocol Time to Live Split Horizon Protocol Routing Information Protocol .

10) Refer to the exhibit. assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three. Which three hosts will receive ARP requests from host A.) host B host C host D host E host F host G .

The management VLAN has not been assigned an IP address. . Hosts in the Sales VLAN can ping all hosts in their own VLAN.) All hosts are in one collision domain. Ports must be blocked before they can be placed in the disabled state.1D Spanning Tree Protocol? Ports are manually configured to be in the forwarding state. Two VLANs have been configured on the switch and hosts have been assigned. A router is required for communication between VLANs.11) What is the purpose of the Spanning Tree Protocol (STP)? prevents Layer 2 loops prevents routing loops on a router creates smaller collision domains creates smaller broadcast domains allows Cisco devices to exchange routing table updates 12) Which statement is true regarding states of the IEEE 802. What are two explanations for this problem? (Choose two. Ports listen and learn before going into the forwarding state. 13) Refer to the exhibit. All hosts are in one broadcast domain. The hosts are in separate broadcast domains. but cannot ping the hosts in the HR VLAN. It takes 15 seconds for a port to go from blocking to forwarding.

Which command needs to be used on router interface Fa 0/1 to complete the VLAN configuration? RT_1(config)# trunk encapsulation dot1q RT_1(config-subif)# encapsulation dot1q 10 RT_1(config-subif)# encapsulation negotiate RT_1(config-subif)# encapsulation 802.14) Refer to the exhibit.1q RT_1(config)# vlan encapsulation dot1q .

The RT_1 FastEthernet 0/1. .168. The management VLAN does not have an IP address assigned to the same VLAN. The FastEthernet port 0/1 on SW_1 is configured for VLAN 20.5 and cannot ping RT_1. Computer A is configured with an IP address of 192. The IP address of computer A is incorrect.10 is not configured for VLANs.15) Refer to the exhibit. 16)Refer to the exhibit and the following error message from the SwB switch. What is most likely the problem? SW_1 FastEthernet interface 0/24 is not a trunk port.20.

The SwA port has IEEE 802. what could cause this error message? The Spanning Tree Protocol has been disabled on one switch. Considering that the link between the two switches is good and the correct type. The SwA port is configured as a trunk port and the SwB port is configured as an access port.1Q trunking port has a speed mismatch on one of the switches. The IEEE 802. 00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001.00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q trunking enabled and the SwB port has ISL trunking enabled.1Q . 17) Which industry-wide specification was developed to decrease the time that is needed to move to the forwarding state by switch ports that are operating in a redundantly switched topology? VLSM PVST 802. The Spanning Tree Protocol has been disabled on both switches.1Q BPDU on non trunk FastEthernet0/1 VLAN1. Inconsistent port type.

SW3 will become the root bridge. SW2 will get a port blocked.) SW1 will become the root bridge. . SW4 will get a port blocked. Which switch will be elected the root bridge and which switch will place a port in blocking mode? (Choose two.RSTP VTP 18) Refer to the exhibit. SW4 will become the root bridge. SW2 will become the root bridge.

Based on the exhibited configuration and output.19) Refer to the exhibit. why is VLAN 99 missing? because there is a cabling problem on VLAN 99 because VLAN 99 is not a valid management VLAN because VLAN 1 is up and there can only be one management VLAN on the switch because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command .

The only VLAN that can be applied to switch ports is VLAN 99. . The switch will only be able to forward frames for hosts on the 10.20) Refer to the exhibit.0 network.0.99. The only VLANs that can be applied to switch ports are VLANs 1 and 99. What can be concluded from the output that is shown? The management VLAN is VLAN 99.

168.0 10.0 172.32.48/27? a useable host address a broadcast address . 172.103.) 10.32 192.208 22)Assuming a subnet mask of 255.0 10.8 192.134.0 23) What type of IP address is 172.21) Four bits have been borrowed to create subnets.16.14. which three addresses would be valid host addresses? (Choose three.14.14.16 192.24 10.100.168. Which three addresses are subnet addresses? (Choose three.148 255.255.128 255.0 255.) 255.0 .500 hosts Network 2 .0 255.a network address a multicast address a public address 24)A network administrator needs to configure three local networks.255.100 hosts Network 3 .252.1000 hosts Which three subnet masks will be needed to fulfill these requirements? (Choose three.255. The networks have these requirements: Network 1 .

25) Refer to the exhibit. What type of header is shown? IPv4 IPv6 TCP UDP 26) Which address is a valid IPv6 unicast address? FE90::1::FFFF FD80::1::1234 FE80::1:4545:6578:ABC1 FEA0::100::7788:998F FC90::::5678:4251:FFFF .

Which command can be used on router B to prevent RIP from sending these updates? passive-interface fastethernet 0/0 passive-interface serial 0/0/0 access-class 12 out access-class 12 in .27) Refer to the exhibit. Router B should not send routing updates to router A.

The clock rate is missing from the configuration of one of the routers.0 in its routing configuration. and one configured loopback interface is operating with OSPF as its routing protocol.168. The Ethernet1 interface of the Popcorn router is shutdown. 29) A router with two LAN interfaces. two WAN interfaces. The Popcorn router is not forwarding RIP updates.28) Refer to the exhibit. What does the router OSPF process use to assign the . The Popcorn router did not include network 192. What are two possible causes for this problem? (Choose two.12. An administrator who is connected to the console of the Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router but unable to ping its Ethernet1 interface.) The serial interface of the Popcorn router is shutdown.

router ID? the IP address of the interface that is configured with priority 0 the OSPF area ID that is configured on the interface with the highest IP address the loopback interface IP address the highest IP address on the LAN interfaces the highest IP address that is configured on the WAN interfaces 30) What table does the EIGRP DUAL algorithm use to calculate the best route to each destination router? routing table topology table DUAL table CAM table ARP table .

200.168.31) What two measures are used to prevent routing loops in networks that use distance vector routing protocols? (Choose two. Which route will appear in the routing table for this network if the router has learned multiple routes? D 192. 00:00:17.200. FastEthernet0/0 R 192.1.168. FastEthernet0/0 O 192. 33) A router has learned about network 192. They flood the entire network with routing updates. through static and dynamic routing processes.0/24 [120/1] via 192.0/24 [90/2195456] via 192. They send their routing tables to directly connected neighbors. They only send out updates when a new network is added.168. Which two commands are required to .168. FastEthernet0/0 S 192.0/24 [110/1012] via 192.200.) link-state advertisements (LSA) Spanning Tree Protocol shortest path first tree split horizon hold-down timers 32) What best describes the operation of distance vector routing protocols? They use hop count as their only metric. 00:00: 00:00: [1/0] via 192.1 34) A router needs to be configured to route within OSPF area 0.

accomplish this? (Choose two.2.168.0 0 .0.0 0.255.0 255.2.255 0 RouterA(config-router)# network area 0 RouterA(config-router)# network RouterA(config)# router ospf 0 RouterA(config)# router ospf 1 RouterA(config-router)# network 192.

However.35)Refer to the exhibit. no output is shown.16. all interfaces are showing up and up. When the show ip ospf neighbor command is given from the R1# prompt. when the show ip interface brief command is given. R1 or R2 does not have a network statement for the 172.0 network. R1 has not sent a default route down to R2 by using the default-information originate command. . R1 or R2 does not have a loopback interface that is configured yet. The ISP has not configured a static route for the ABC Company yet. What is the most likely problem? R2 has not brought the S0/0/1 interface up yet.100.

255.255. SW2 displayed the status message as shown in the exhibit.252 router ospf 1 network 192. After the connection was made. What . Two switches have been connected with ports that are configured as trunks.168.64 area 0 37) Refer to the exhibit. area 0 router ospf 1 network 192.10.64 Refer to the exhibit.10.192 network 192.0 network 192. Which sequence of commands will configure router A for OSPF? router ospf 0 network 0.192 255.255.192 router ospf 0 network 192.10.0 router ospf 1 network 192.63 area 0 network

but cannot ping from serial interface to serial interface. Which layer of the OSI model is the most likely cause of the . A network administrator has configured routers RTA and RTB.will solve this problem? SW1(config)# interface fastethernet 0/1 SW1(config-if)# duplex full SW1(config)# interface fastethernet 0/1 SW1(config-if)# full-duplex SW2(config)# interface fastethernet 0/1 SW2(config-if)# duplex full SW2(config)# interface fastethernet 0/1 SW2(config-if)# full-duplex 38) Refer to the exhibit. application transport network data link physical 39) Refer to the exhibit.0.0 s/0/0/0 .0 0.0 0.0.0. The XYZ Company hosts web pages for small companies. Based on the exhibited information.0 s0/0/1 ISP(config)# ip route 0.0. what would be an appropriate route for the ISP to configure for the XYZ network? ISP(config)# ip route 0.

4 GHz range and provides speeds up to 54 Mb/s? 802.250.135.0 255.135.ISP(config)# ip route 192.11b 802.240 s0/0/1 ISP(config)# ip route 192.255.248 s0/0/1 40) When is a WLAN a better solution than a LAN? when security is an issue when user mobility is needed when more than one laptop is used in a cubicle when electrical interference from surrounding machinery is an issue 41) Which wireless standard works only in the 2.0 255.135.0 s0/0/1 ISP(config)# ip route 802.11n .11g 802.255.250.0 255.0 s0/0/0 ISP(config)# ip route 192.0 802.250.

What is the problem? The enable secret command has not been issued yet. An initial configuration is being performed on a new router. 44) Which two pieces of information are required when creating a standard access control list? (Choose two. The enable password command has not been issued yet. The service password-encryption command has not been issued yet. They should be placed on the fastest interface available. 43) What guideline is generally followed about the placement of extended access control lists? They should be placed as close as possible to the source of the traffic to be denied. The password command has not been set for the console port. The network administrator encounters the error message that is shown in the exhibit. They should be placed as close as possible to the destination of the traffic to be denied.42) Refer to the exhibit.) destination address and wildcard mask source address and wildcard mask subnet mask and wildcard mask . They should be placed on the destination WAN link.

) most host all any some gt 46)Refer to the exhibit. All other users within the school should have access to this server. A named access list called chemistry_block has been written to prevent users on the Chemistry Network and public Internet from access to the Records Server.access list number between 100 and 199 access list number between 1 and 99 45) Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two. The list contains the following statements: .

0 Which command sequence will place this list to meet these requirements? Hera(config)# interface fa0/0 Hera(config-if)# ip access-group chemistry_block in Hera(config)# interface s0/0/0 Hera(config-if)# ip access-group chemistry_block out Apollo(config)# interface s0/0/0 Apollo(config-if)# ip access-group chemistry_block out Apollo(config)# interface s0/0/1 Apollo(config-if)# ip access-group chemistry_block in Athena(config)# interface s0/0/1 Athena(config-if)# ip access-group chemistry_block in Athena(config)# interface fa0/0 Athena(config-if)# ip access-group chemistry_block out 47) Which statement describes the process that occurs in Network Address Translation (NAT) overloading? Multiple private IP addresses are mapped to one public IP address.255 0.deny 172.252 172.0 0.16.0. The number of usable addresses that is assigned to a company is divided into smaller manageable .0.0 permit

groups.) BECN DLCI DE FECN LMI Inverse ARP 49) What is the default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router? PPP HDLC Frame Relay CHAP IEEE 802.1Q . The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured. 48) What are three Frame Relay congestion management mechanisms? (Choose three. A pool of IP addresses are mapped to one or more MAC addresses.

0 encapsulation frame-relay frame-relay map ip 255.50)Refer to the exhibit. Based on the output of the debug command shown in the graphic and the router .168. R3 has the following configuration: R3# show running-config --some output text omitted-interface serial0 bandwidth 128 ip address 192.2 30 broadcast After the command R3# debug frame-relay packet is executed.255. a ping is issued from R3 to R1 but is unsuccessful.11.255.

what is the problem? No clock rate has been configured on interface s0. 51) Which network device is commonly used to allow multiple VPN connections into a corporate network? ACL IDS firewall concentrator . The encapsulation frame-relay command is missing the broadcast keyword. An incorrect IP address exists in the map statement. There is an incorrect DLCI number in the map statement.configuration.