Showing posts with label CCNA Final v5. Show all posts
Showing posts with label CCNA Final v5. Show all posts

CCNA 1 Routing and Switching: Introduction to Networks Final Exam – 26 new questions

Sunday, March 22, 2015

1  Refer to the exhibit.

The network administrator enters these commands into the R1 router:

R1# copy running-config tftp
Address or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

192.168.9.254

192.168.10.1

192.168.10.2

192.168.11.254

192.168.11.252

 

2 Which three statements characterize the transport layer protocols? (Choose three.)

TCP uses port numbers to provide reliable transportation of IP packets.

TCP and UDP port numbers are used by application layer protocols.

TCP uses windowing and sequencing to provide reliable transfer of data.

TCP is a connection-oriented protocol. UDP is a connectionless protocol.

UDP uses windowing and acknowledgments for reliable transfer of data.

 

3 What is the purpose of ICMP messages?

to inform routers about network topology changes

to ensure the delivery of an IP packet

to monitor the process of a domain name to IP address resolution

to provide feedback of IP packet transmissions

 

4 A technician uses the ping 127.0.0.1 command. What is the technician testing?

connectivity between a PC and the default gateway

connectivity between two adjacent Cisco devices

physical connectivity of a particular PC and the network

the TCP/IP stack on a network host

connectivity between two PCs on the same network

 

5 What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It notifies the sending host that the frame cannot be delivered.

It initiates an ARP request.

It forwards the frame out of all ports except for the port at which the frame was received.

It broadcasts the frame out of all ports on the switch.

 

6 What is a characteristic of the LLC sublayer?

It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.

It provides delimitation of data according to the physical signaling requirements of the medium.

It defines software processes that provide services to the physical layer.

It provides the logical addressing required that identifies the device.

 

7
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

console 0

vty 0

FastEthernet0/1

 

8
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the reliability of the gigabit Ethernet infrastructure of the backbone

the amount of traffic that is currently crossing the network

the type of traffic that is crossing the network

the sophistication of the encapsulation method applied to the data

the bandwidth of the WAN connection to the Internet

the latency that is created by the number of network devices that the data is crossing

 

9
When applied to a router, which command would help mitigate brute-force password attacks against the router?

service password-encryption

login block-for 60 attempts 5 within 60

banner motd $Max failed logins = 5$

exec-timeout 30

 

10
Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is nonvolatile and contains basic diagnostic software.

FLASH is nonvolatile and contains a limited portion of the IOS​.

ROM is nonvolatile and stores the running IOS.

RAM is volatile and stores the IP routing table.

NVRAM is nonvolatile and stores other system files.

 

11
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

custom adapter

wireless bridge

media

wireless NIC

crossover cable

wireless client software

 

12  Launch PT –  Hide and Save PT

Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.

The Server0 message is .​ ”   winner   ”

 

13
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

applying security settings to control the flow of data

notifying other devices when errors occur

regenerating data signals

acting as a client or a server

serving as the source or destination of the messages

providing a channel over which messages travel

 

14

15

16
Which address on a PC does not change, even if the PC is moved to a different network?

IP address

logical address

MAC address

default gateway address

 

17
What will happen if the default gateway address is incorrectly configured on a host?

A ping from the host to 127.0.0.1 would not be successful.

The host will have to use ARP to determine the correct address of the default gateway.

The host cannot communicate with other hosts in the local network.

The host cannot communicate with hosts in other networks.

The switch will not forward packets initiated by the host.

 

18
A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

DHCPREQUEST

DHCPOFFER

DHCPDISCOVER

DHCPNACK

DHCPACK

 

19

Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?​

Switch#

My(config)#​

My Switch(config)#​

Switch(config)#​

MySwitch(config)#​

 

20
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?

The configuration changes will be removed and the original configuration will be restored.

The new configuration will be stored in flash memory.

The current IOS file will be replaced with the newly configured file.

The new configuration will be loaded if the switch is restarted.

 

21

Refer to the exhibit.A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

2921

250

2

306

21

 

22
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

ARP

DNS

SMB

DHCP

HTTP

NAT

 

  23 What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

to forward traffic on the basis of MAC addresses

 

  24 Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

audio conference, financial transactions, web page

financial transactions, audio conference, web page

audio conference, web page, financial transactions

financial transactions, web page, audio conference

 

25
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

cell modem

dial-up

cable modem

satellite

DSL

 

26
Which connection provides a secure CLI session with encryption to a Cisco switch?

a Telnet connection

an SSH connection

a console connection

an AUX connection

 

27 What is the purpose of the network security accounting function?

to provide challenge and response questions

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

 

28


Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

lineconin

linevtyin

letmein

secretin

 

29
Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

IEEE standards

Request for Comments

IRTF research papers

protocol models

 

  30 A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

This entry refers to the PC itself.

This entry maps to the default gateway.

This is a static map entry.

This is a dynamic map entry.

 

31 Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

192.168.1.32/28

192.168.1.32/27

192.168.1.64/29

 

32
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /all

ipconfig /displaydns

arp -a

nslookup

 

33 Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

WPA

PSK

WEP

EAP

 

34
A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

to compare the interface media type between the sending and receiving ends

to determine the physical address of the sending device

to verify that the frame destination matches the MAC address of the receiving device

to check the frame for possible transmission errors

to verify the network layer protocol information

 

35

Refer to the exhibit. Which IP addressing scheme should be changed?

Site 1

Site 3

Site 4

Site 2

 

36
What is the effect of configuring the ipv6 unicast-routing command on a router?

to assign the router to the all-nodes multicast group

to permit only unicast packets on the router

to enable the router as an IPv6 router

to prevent the router from joining the all-routers multicast group

 

37
Which three IP addresses are private ? (Choose three.)

10.1.1.1

172.16.4.4

224.6.6.6

192.168.5.5

172.32.5.2

192.167.10.10

 

38

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

It is the IP address of the Router1 interface that connects the company to the Internet.

It is the IP address of the ISP network device located in the cloud.

It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

 

39 During normal operation, from which location do most Cisco switches and routers run the IOS?

flash

RAM

NVRAM

disk drive

 

40
What is an important function of the physical layer of the OSI model?

It encodes frames into electrical, optical, or radio wave signals.

It accepts frames from the physical media.

It encapsulates upper layer data into frames.

It defines the media access method performed by the hardware interface.

 

41
Which procedure is used to reduce the effect of crosstalk in copper cables?

wrapping the bundle of wires with metallic shielding

avoiding sharp bends during installation

requiring proper grounding connections

designing a cable infrastructure to avoid crosstalk interference

twisting opposing circuit wire pairs together

 

42
What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

placement and removal of frames from the media

detection of errors through CRC calculations

conversion of bits into data signals

delimiting groups of bits into frames

data link layer addressing

error correction through a collision detection method

session control using port numbers

 

43
What method is used to manage contention-based access on a wireless network?

token passing

CSMA/CD

CSMA/CA

priority ordering

 

44
What happens when part of an Internet radio transmission is not delivered to the destination?

A delivery failure message is sent to the source host.

The part of the radio transmission that was lost is re-sent.

The transmission continues without the missing portion.

The entire transmission is re-sent.

 

45
What is the auto-MDIX feature on a switch?

the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

the ability to turn a switch interface on or off accordingly if an active connection is detected

the automatic configuration of an interface for 10/100/1000 Mb/s operation

 

46
Which function is provided by TCP?

detection of missing packets

communication session control

path determination for data packets

data encapsulation

 

47
How does a Layer 3 switch differ from a Layer 2 switch?

A Layer 3 switch learns the MAC addresses that are associated with each of its ports. However, a Layer 2 switch does not.

A Layer 3 switch maintains an IP address table instead of a MAC address table.

A Layer 3 switch supports VLANs, but a Layer 2 switch does not.

An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.

 

48
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

/68

/62

/66

/64

/70

 

49
What is the purpose of having a converged network?

to reduce the cost of deploying and maintaining the communication infrastructure

to provide high speed connectivity to all end devices

to make sure that all types of data packets will be treated equally

to achieve fault tolerance and high availability of data network infrastructure devices

 

50


Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

just the PC0 MAC address

PC0, PC1, and PC2 MAC addresses

just the PC2 MAC address​

just PC0 and PC1 MAC addresses

just the PC1 MAC address

 

51
Which field in an IPv4 packet header will typically stay the same during its transmission?

Packet Length

Destination Address

Flag

Time-to-Live

 

52
What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)

MAC filtering enabled

default administrator password

WEP encryption enabled

PSK authentication required

broadcast SSID

 

53
Which parameter does the router use to choose the path to the destination when there are multiple routes available?

the higher metric value that is associated with the destination network

the lower metric value that is associated with the destination network

the higher gateway IP address to get to the destination network

the lower gateway IP address to get to the destination network

 

54

Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?

An asterisk designates that the file system has at least one file that uses that file system.

The asterisk designates which file system is the default file system.

An asterisk indicates that the file system is bootable.

The asterisk shows which file system was used to boot the system.

 

55


56

Fill in the blank.

During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a    ”  multicast    ”    message.

 

57

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

to interrupt the ping process

to restart the ping process

to allow the user to complete the command

to exit to a different configuration mode

 

58


Refer to the exhibit. Which area would most likely be an extranet for the company network that is shown?

area A

area D

area C

area B

 

59

60

61
In which default order will a router search for startup configuration information?

setup mode, NVRAM, TFTP

NVRAM, TFTP, setup mode

NVRAM, RAM, TFTP

TFTP, ROM, NVRAM

flash, ROM, setup mode

 

62

Launch PT –  Hide and Save PT

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

2001:db8:abc:1::1

2001:db8:abc:5::1

2001:db8:abc:5::2

2001:db8:abc:10::15

 

63
What is contained in the trailer of a data-link frame?

physical address

data

error detection*

logical address

64

New Questions

1.
1
Refer to the exhibit. What is the maximum TIL value that is used to reach the destination www.cisco.com?

11
12
13*
14

2.
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?

192.168.1.1
0.0.0.0
0.0.1
255.255.255.255
127.0.0.1*

3.
A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

regenerating data signals*
acting as a client or a server
providing a channel over which messages travel
applying security settings to control the ftow of data*
notifying other devices when errors occur*
serving as the source or destination of the messages

4.
Which statement is true about DHCP operation?

When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the networK.*
A client must wait for lease expiration before it sends another DHCPREOUEST message.
The DHCPDISCOVER message contains the IP address and sub net masK to be assigned, the IP address of the DNS server, and the IP address of the default gateway.
If the client receives several DHCPOFFER messages from different servers, it sends a unicast DHCPREOUEST message to the server from which it chooses to obtain the IP information.

5.
Which type of wireless security is easily compromised?

EAP
PSK
WEP*
WPA

6.
What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?

multicast addresses
private addresses
public addresses*
experimental addresses

7.
Which protocol supports rapid delivery of streaming media?

Video over Internet Protocol
Real-Time Transport Protocol*
Transmission Control Protocol
Secure File Transfer Protocol

8.
A network administrator notices that the throughput on the network appears lower than expected when compared to the end-to-end network bandwidth. Which three factors can
explain this difference? (Choose three.)

the amount of traffic*
the type of data encapsulation in use
the type of traffic*
the number and type of network devices that the data is crossing*
the bandwidth of the connection to the ISP
the reliability of the network backbone

9.
Which group of IPv6 addresses cannot be allocated as a host source address?

FECO::/10
FEBF::/10
FF00::/8*
FDFF::/7

10.
A host PC is attempting to lease an address through DHCP. What message is sent by the server to the client know it is able to use the provided IP information?

DHCPDISCOVER
DHCPOFFER*
DHCPPREQUEST
DHCPACK
DHCPNACK

New Questions

1 What is the protocol that is used to discover a physical address from a known logical address and what message type does it use?

-ARP, broadcast*

2 Which group of IPv6 addresses cannot be allocated as a host source address??

-FF00::/8 (multicast)*

3 A network administrator is configuring access control to switch SW1. If the administrator uses console line to connect to the switch, which password is needed to access user EXEC mode?

-lineconin*

New Questions December  2014 By  Erian

1  A _________ topology influences the type of network framing and media access control that will be used. (logical*)

2  Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)
Fiber-optic cabling uses LEDs for single-mode cables and laser technology for multimode cables.
Fiber-optic cabling does not conduct electricity.*
Fiber-optic cabling has high signal loss.
Fiber-optic cabling is primarily used as backbone cabling.*
Multimode fiber-optic cabling carries signals from multiple sending devices.

3 Which two protocols function at the internet layer? (Choose two.)
ARP
ICMP*
BOOTP
PPP
IP*

4  Which firewall technique blocks incoming packets unless they are responses to internal requests?
URL filtering
port filtering
application filtering
stateful packet inspection*

5  Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::
…
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is ___. (/60*)

6  What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
FTP*
ARP
NAT
DHCP*
PPP
DNS*

7  Which communication tool allows real-time collaboration?
weblog
wiki
e-mail
instant messaging*

8  Which of the following are primary functions of a router? (Choose two.)
packet switching*
microsegmentation
flow control
path selection*
domain name resolution

9  __________ is a best-effort, connectionless application layer protocol that is used to transfer files. (TFTP*)

**************************************************************************

I can not give you the exact wording here, but I will give you the idea of what they were asking.

10

Can not connect to webpages, dns is ok. Issue is: Default Gateway.*

11

It will give 4 options about ping, the correct one is: The PC2 will be able to ping 192.168.1.1*

12

The question is from where is the system image being loaded. Answer: flash.*

13

It will ask what is the issue. Answer is: The user has to be in privileged EXEC mode to use that command.*

Thank you so much Erian  

New Questions By ALEX  

1 What are three characteristics of multicast transmission? (Choose three.)

A single packet can be sent to a group of hosts.*

Multicast messages map lower layer addresses to upper layer addresses.*

Multicast transmission can be used by routers to exchange routing information.*

Computers use multicast transmission to request IPv4 addresses.

The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.

2 At a minimum, which address is required on IPv6-enabled interfaces?

global unicast

link-local*

site local

unique local

3 Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

fragment-free switching

fast-forward switching

store-and-forward switching*

cut-through switching


Read more ...

CCNA 2 RSE Practice Skills Assessment – PT

Sunday, March 22, 2015

CCNA Routing and Switching
Routing and Switching Essentials

Practice Skills Assessment – Packet Tracer

A few things to keep in mind while completing this activity:

  1. Do not use the browser Back button or close or reload any exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button in the browser window to submit your work.

Introduction

In this practice skills assessment, you will configure the Our Town network with single-area OSPFv2. In addition, you will configure router-on-a-stick routing between VLANs. You will also implement NAT, DHCP and access lists.

All IOS device configurations should be completed from a direct terminal connection to the device console.

Some values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements. These values may include certain IP addresses, passwords, interface descriptions, banner text, and other values.

For the sake of time, many repetitive but important configuration tasks have been omitted from this activity. Many of these tasks, especially those related to device security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations.

You will practice and be assessed on the following skills:

  • Configuration of initial device settings
  • IPv4 address assignment
  • Configuration and addressing of router interfaces
  • Configuration of a router as a DHCP server
  • Implementation of static and dynamic NAT
  • Configuration of the single-area OSPFv2 routing protocol
  • Configuration of a default route and static summary routes
  • Configuration of VLANs and trunks
  • Configuration of routing between VLANs
  • Configuration of ACL to limit device access

You are required to configure the following:

Police:

  • Configuration of initial router settings
  • Interface configuration and IPv4 addressing
  • Configuration of DHCP
  • Configuration of multiarea OSPFv2
  • Configuration of routing between VLANs

Central:

  • Interface configuration and IPv4 addressing
  • Configuration of multiarea OSPFv2
  • Configuration of IPv4 route summarization
  • Configuration and propagation of a default route
  • Configuration of static summary routes
  • Configuration of static and dynamic NAT
  • Configuration of ACLs

Fire:

  • Interface configuration and IPv4 addressing
  • Configuration of multiarea OSPFv2
  • Configuration of a static summary route

Police-SW1:

  • Configuration of VLANs
  • Assignment of switch ports to VLANs
  • Configuration of trunking
  • Configuration of unused switch ports

Police-SW2:

  • Configuration of VLANs
  • Assignment of switch ports to VLANs
  • Configuration of trunking
  • Configuration of unused switch ports

Internal PC hosts:

  • Configuration as DHCP clients


Addressing Tables

Note: You are provided with the networks that interfaces should be configured on. Unless you are told to do differently in the detailed instructions below, you are free to choose the host addresses to assign.

Addressing Table:

Device

Interface

Network

Comments

Police

S0/0/0

192.168.10.104/30

any address in the network

Gi0/0.45

192.168.45.0/24

first address in the network

Gi0/0.47

192.168.47.0/24

first address in the network

Gi0/0.101

192.168.101.0/24

first address in the network

Central

S0/0/0

192.168.10.104/30

any address in the network

S0/0/1

192.168.10.112/30

any address in the network

S0/1/0

198.51.100.0/28

first address in the network

Gi0/0

192.168.18.40/29

first address in the network

Fire

S0/0/0

192.168.10.124/30

second address in the network

S0/0/1

192.168.10.112/30

any address in the network

Police-SW1

VLAN 101

192.168.101.0/24

any address in the network

Police-SW2

VLAN 101

192.168.101.0/24

any address in the network

Pre-configured addresses for reference:

Device

Address

Town Server

192.168.18.46/29

NetAdmin Host

203.0.113.18

Outside Host

203.0.113.128

Public Server

209.165.201.235

S3 Host

192.168.200.10/24

S6 Host

192.168.201.10/24

S5 Host

192.168.202.10/24

VLAN Table:

VLAN Number

VLAN Name

VLAN Network

Device:Port

45

HR

192.168.45.0/24

Police-SW1: Fa0/10
Police-SW2: Fa0/3

47

records

192.168.47.0/24

Police-SW1: Fa0/15
Police-SW2: Fa0/21

101

comm

192.168.101.0/24

SVI

Instructions

All configurations must be performed through a direct terminal connection to the device consoles.

Step 1: Determine the Addresses to Assign

Determine the IP addresses that you will use for the required interfaces on the three routers and two switches. Use the information in the Addressing Table and follow the guidelines below:

  • Assign the first IP addresses in the networks that are provided in the Addressing Table to the LAN interfaces.
  • Assign the first address in the Central subnet to the interface that is connected to the Internet.
  • Assign any valid host address in the networks that are provided in the Addressing Table to the serial interfaces.
  • The host PCs will receive IP addresses over DHCP.

Step 2: Configure Police

  • Configure Police with the following:
  • Configure the router host name:  PoliceDept  

Router(config)#  hostname  PoliceDept

  • Prevent the router from attempting to resolve command line entries to IP addresses.

PoliceDept(config)#  no ip domain-lookup  

  • Protect privileged EXEC mode from unauthorized access with the MD5 encrypted password.

PoliceDept(config)#  enable secret [password]

  • Prevent device status messages from interrupting command line entries at the device console.

PoliceDept(config)# line con 0

PoliceDept(config-line)# logging synchronous

  • Secure the router console and terminal lines.

PoliceDept(config)#  line console 0

password [password]

login

PoliceDept(config)#  line vty 0 4

password [password]

login

  • Prevent all passwords from being viewed in clear text in the device configuration file.

PoliceDept(config)# service password-encryption

  • Configure a message-of-the-day banner.

PoliceDept(config)# banner motd “message-of-the-day”

Step 3: Configure the Router Physical Interfaces

Configure the interfaces of the routers for full connectivity with the following:

  • IP addresses as shown in the addressing table.
  • Describe the operational Police serial interface. The Police Ethernet interfaces will be configured at the end of this assessment.
  • DCE settings where appropriate. Use a rate of  128000.

PoliceDept(config)# interface Serial0/0/0
PoliceDept(config-if)#bandwidth 128
PoliceDept(config-if)#ip address 192.168.10.105 255.255.255.252
PoliceDept(config-if)#description Police and Central
PoliceDept(config-if)#clock rate 128000
PoliceDept(config-if)#no shutdown

Central(config)# interface Serial0/0/0
Central(config-if)#bandwidth 128
Central(config-if)#ip address  192.168.10.106 255.255.255.252
Central(config-if)#no shutdown

Central(config)# interface Serial0/0/1
Central(config-if)#bandwidth 128
Central(config-if)#ip address  192.168.10.114 255.255.255.252
Central(config-if)#clock rate 128000
Central(config-if)#no shutdown

Central(config)# interface g0/0
Central(config-if)#ip address 192.168.18.41 255.255.255.248
Central(config-if)#no shutdown

Central(config)# interface Serial0/1/0
Central(config-if)#ip address 198.51.100.1 255.255.255.240
Central(config-if)#no shutdown

Fire(config)# interface Serial0/0/1
Fire(config-if)#bandwidth 128
Fire(config-if)#ip address 198.51.100.1 255.255.255.240
Fire(config-if)#no shutdown

Step 4: Configure static and default routing

Configure the following static routes:

  • Manually configure default routes to the Internet. Use the exit interface argument. All hosts on the internal LANs and School Network networks should be able to reach the Internet.

PoliceDept(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0

Central(config)#ip route 0.0.0.0 0.0.0.0 s0/1/0

Fire(config)#ip route 0.0.0.0 0.0.0.0 s0/0/1

  • It has been decided to use static routes to reach the branch networks that are connected to Fire. Use a single summary to represent the branch networks in the most efficient way possible. Configure the summary static route onCentral and Fire using the exit interface argument.

Central(config)#ip route 192.168.200.0 255.255.252.0 s0/0/1

Fire(config)#ip route 192.168.200.0 255.255.252.0 s0/0/0

 

Step 5: Configure OSPF Routing

Configure single-area OSPFv2 to route between all internal networks. The branch networks are not routed with OSPFv2.

  • Use a process ID of  10.The routers should be configured in area  0.
  • Use the correct inverse masks for all network statements. Do not use quad zero masks (0.0.0.0).

Step 6: Customize single-area OSPFv2

Customize single-area OSPFv2 by performing the following configuration tasks:

a. Set the bandwidth of the serial interfaces to  128 kb/s.

b. Configure OSPF router IDs as follows:

  • Police:  1.1.1.1
  • Central:  2.2.2.2
  • Fire:  3.3.3.3

c. Configure the OSPF cost of the link between Police and Central to  7500.

d. Prevent routing updates from being sent out of any of the LAN interfaces that are routed with OSPFv2. Do not use the default keyword in the commands you use to do this.

Configuration step 5 and step 6

PoliceDept(config)#router ospf 10

PoliceDept(config-router)#router-id 1.1.1.1

PoliceDept(config-router)#network 192.168.10.104 0.0.0.3 area 0
PoliceDept(config-router)#network 192.168.45.0 0.0.0.255 area 0
PoliceDept(config-router)#network 192.168.47.0 0.0.0.255 area 0
PoliceDept(config-router)#network 192.168.101.0 0.0.0.255 area 0

PoliceDept(config-router)#passive-interface g0/0.45
PoliceDept(config-router)#passive-interface g0/0.47
PoliceDept(config-router)#passive-interface g0/0.101

PoliceDept(config)#interface s0/0/0
PoliceDept(config-if)#bandwidth 128
PoliceDept(config-if)#ip ospf cost 7500

Central(config)#router ospf 10
Central(config-router)#router-id 2.2.2.2
Central(config-router)#network 192.168.10.104 0.0.0.3 area 0
Central(config-router)#network 192.168.10.112 0.0.0.3 area 0
Central(config-router)#network 192.168.18.40 0.0.0.7 area 0
Central(config-router)#passive-interface g0/0

Central(config)#interface s0/0/0
Central(config-if)#bandwidth 128
Central(config-if)#ip ospf cost 7500

Central(config)#interface s0/0/1
Central(config-if)#bandwidth 128

Fire(config)#router ospf 10
Fire(config-router)#router-id 3.3.3.3
Fire(config-router)#network 192.168.10.112 0.0.0.3 area 0

Fire(config)#interface s0/0/1
Fire(config-if)#bandwidth 128

Step 7: Configure VLANs and Trunking

Configure Police-SW1 and Police-SW2 with VLANs and trunk ports as follows:

  • Refer to the VLAN table above for the VLAN numbers and names that should be configured on both switches.
  • Configure names for the VLANs. The VLAN names must be configured to match the names in the VLAN Table exactly (case and spelling).

On  Police-SW1

Police-SW1(config)#vlan 45
Police-SW1(config-vlan)#name HR

Police-SW1(config)#vlan 47
Police-SW1(config-vlan)#name records

Police-SW1(config)#vlan 101
Police-SW1(config-vlan)#name comm

On  Police-SW2

Police-SW2(config)#vlan 45
Police-SW2(config-vlan)#name HR

Police-SW2(config)#vlan 47
Police-SW2(config-vlan)#name records

Police-SW2(config)#vlan 101
Police-SW2(config-vlan)#name comm

  • Configure the appropriate ports that link the switches and Police with the router as functioning trunk ports.

Police-SW1(config)#int g1/1
Police-SW1(config-if)#switchport mode trunk
Police-SW1(config-if)#no shutdown

Police-SW1(config)#int g1/2
Police-SW1(config-if)#switchport mode trunk
Police-SW1(config-if)#no shutdown

Police-SW2(config)#int g1/1
Police-SW2(config-if)#switchport mode trunk
Police-SW2(config-if)#no shutdown

  • Assign the switch ports shown in the table as access ports in the VLANs as indicated in the VLAN Table.

Police-SW1(config)#int fa0/10
Police-SW1(config-if)#switchport mode access
Police-SW1(config-if)#switchport access vlan 45
Police-SW1(config-if)#exit

Police-SW1(config)#int fa0/15
Police-SW1(config-if)#switchport mode access
Police-SW1(config-if)#switchport access vlan 47
Police-SW1(config-if)#exit

Police-SW2(config)#int fa0/3
Police-SW2(config-if)#switchport mode access
Police-SW2(config-if)#switchport access vlan 45
Police-SW2(config-if)#exit

Police-SW2(config)#int fa0/21
Police-SW2(config-if)#switchport mode access
Police-SW2(config-if)#switchport access vlan 47
Police-SW2(config-if)#exit

  • Address VLAN 101 on the network indicated in the VLAN Table. Note that the first address in this network will be assigned to the router in a later step in this assessment. The management interfaces of both switches should configured to be reachable by hosts on other networks.

Police-SW1(config)#ip default-gateway 192.168.101.1
Police-SW1(config)#interface vlan 101
Police-SW1(config-if)#ip address 192.168.101.2 255.255.255.0

Police-SW2(config)#ip default-gateway 192.168.101.1
Police-SW2(config)#interface vlan 101
Police-SW2(config-if)#ip address 192.168.101.3 255.255.255.0

 

  • Configure all unused switch ports as access ports, and shutdown the unused ports.

Police-SW1(config)#int range fa0/1-9, fa0/11-14, fa0/16-24
Police-SW1(config-if-range)#switchport mode access
Police-SW1(config-if-range)#shutdown

Police-SW2(config)#int range fa0/1-2, fa0/4-20, fa0/22-24
Police-SW2(config-if-range)#switchport mode access  
Police-SW2(config-if-range)#shutdown

Step 8: Configure DHCP

Police should be configured as a DHCP server that provides addressing to the hosts attached to Police-SW1 and Police-SW2. The requirements are as follows:

  • Use  VLAN45  and  VLAN47  as the pool names. Note that the pool names must match the names given here exactly, all capital letters and exact spelling.
  • Addresses  .1 to .20  should be reserved for static assignment from each pool.
  • The first address in each network will be assigned to the router interface attached to the networks as shown in the addressing table.
  • Use a DNS server address of  192.168.18.100. This server has not yet been added to the network, but the address must be configured.
  • Ensure that hosts in each LAN are able to communicate with hosts on remote networks.

PoliceDept(config)#ip dhcp excluded-address 192.168.45.1 192.168.45.20
PoliceDept(config)#ip dhcp excluded-address 192.168.47.1 192.168.47.20

PoliceDept(config)#ip dhcp pool VLAN45
PoliceDept(dhcp-config)#network 192.168.45.0 255.255.255.0
PoliceDept(dhcp-config)#default-router 192.168.45.1
PoliceDept(dhcp-config)#dns-server 192.168.18.100

PoliceDept(config)#ip dhcp pool VLAN47
PoliceDept(dhcp-config)#network 192.168.47.0 255.255.255.0
PoliceDept(dhcp-config)#default-router 192.168.47.1
PoliceDept(dhcp-config)#dns-server 192.168.18.100

*Set Clients to DHCP*

PC1, PC2, PC3, PC4

 

Step 9: Configure NAT

Configure NAT to translate internal private addresses into public addresses for the Internet. The requirements are:

a. Configure static NAT to the Town Server.

  • Translate the internal address of the server to the address  198.51.100.14.
  • Configure the correct interfaces to perform this NAT translation.

Central(config)#ip nat inside source static 192.168.18.46 198.51.100.14
Central(config)#interface g0/0
Central(config-if)#ip nat inside

Central(config)#interface s0/1/0
Central(config-if)#ip nat outside

b.Configure dynamic NAT (not NAT with overload, or PAT).

  • Use the addresses remaining in the public address subnet of  198.51.100.0/28. The first two addresses in the subnet have already been assigned to the Central and ISP serial interfaces. Also, another address has already been used in the static mapping in the step above.
  • Use a pool name of  INTERNET. Note that the pool name must match this name exactly, in spelling and capitalization.
  • Hosts on each of the internal LANs shown in the topology and on all of the branch networks should be permitted to use the NAT addresses to access the Internet.
  • Use a source list number of  1.
  • Your source list should consist of three entries, one each for the LANs and one for the branch networks.

BY  Boogie

ip nat pool INTERNET 198.51.100.3 198.51.100.13 netmask 255.255.255.240
ip nat inside source list 1 pool INTERNET
ip nat inside source static 192.168.18.46 198.51.100.14
ip access-list standard 1
permit 192.168.45.0 0.0.0.255
permit 192.168.47.0 0.0.0.255
permit 192.168.200.0 0.0.3.255

Step 10: Configure Access Control Lists

You will configure two access control lists to limit device access on Central. You should use the any and host keywords in the ACL statements as required.   The ACL requirements are:

a. Restrict access to the vty lines on Central:

  • Create a named standard ACL using the name  MANAGE. Be sure that you use this name exactly as it appears in these instructions (case and spelling).
  • Allow only the   NetAdmin Host to access the vty lines of Central.
  • No other Internet hosts (including Internet hosts not visible in the topology) should be able to access the vty lines of Central.
  • Your solution should consist of a single ACL statement.

b.Allow outside access to the Town Server while controlling other traffic from the outside. Create the ACL as directed below:

  • Use access list number  101.
  • First, allow NetAdmin Host full access to all network hosts and devices.
  • Then, allow outside hosts to access the Town Server over HTTP only.
  • Allow traffic that is in response to data requests from the internal and School Network hosts to enter the network.
  • Add a statement so that counts of all denied traffic will be shown in the  show access-lists  command output.
  • Your ACL should have only four statements.

Your ACL should be placed in the most efficient location possible to conserve network bandwidth and device processing resources.

Step 11: Configure Router-on-a-Stick Inter-VLAN Routing.

Configure Police to provide routing between the VLANs configured on the switches. As follows:

  • Use the VLAN numbers for the required interface numbers.
  • Use the first addresses in the VLAN networks for the interfaces.

PoliceDept(config)# interface g0/0
PoliceDept(config-if)#no sh

PoliceDept(config)# interface g0/0.45
PoliceDept(config-subif)#encapsulation dot1Q 45
PoliceDept(config-subif)#ip address 192.168.45.1 255.255.255.0

PoliceDept(config)# interface g0/0.47
PoliceDept(config-subif)#encapsulation dot1Q 47
PoliceDept(config-subif)#ip address 192.168.47.1 255.255.255.0

PoliceDept(config)# interface g0/0.101
PoliceDept(config-subif)#encapsulation dot1Q 101
PoliceDept(config-subif)#ip address 192.168.101.1 255.255.255.0

Step 12: Test and Troubleshoot Connectivity.

Ensure that the hosts attached to the VLANs can reach hosts on the School Network and the Internet.

Last Updated: November, 2013


Read more ...

CCNA 3 v5 Scaling Networks Final Exam Answers

Sunday, March 22, 2015

1.

What term is used to describe a hierarchical model in which three layers are not needed?

collapsed core
distribution-access model
three-tier model
dual-core model

2
A DHCPREQUEST message has been sent from the client to the DHCP server. What information is included in the message?

initial message to locate a DHCP server
confirmation that the IP address has been allocated to the client
denial message to reject the first offer from the DHCP server
formal request for the offered IP address

3
Users on an IEEE 801.11n network are complaining of slow speeds. The network administrator checks the AP and verifies it is operating properly. What can be done to improve the wireless performance in the network?
Switch to an 802.11g AP.
Set the AP to mixed mode.
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Change the authentication method on the AP.

4
Where in the Cisco Borderless Architecture is the forwarding rate crucial?

at all layers
at core layer only
at distribution layer only
at access layer only
at distribution and core layers only

5
While analyzing log files, a network administrator notices reoccurring native VLAN mismatches. What is the effect of these reoccurring errors?

Unexpected traffic on the error-occurring trunk port is being received.?
The control and management traffic on the error-occurring trunk port is being misdirected or dropped.
All traffic on the error-occurring trunk port is being misdirected or dropped.
All traffic on the error-occurring trunk port is being switched correctly regardless of the error.

6

7

8
A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?

Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport mode trunk

Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport access vlan 1

Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# spanning-tree vlan 1

Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# spanning-tree portfast

9
Which attack allows the attacker to see all frames on a broadcast network by causing a switch to flood all incoming traffic?

802.1q double tagging
STP manipulation
LAN storm
VLAN hopping
MAC table overflow

10

Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router for Internet connectivity. Which two configurations would be applied to the switch? (Choose two.)

(config)# interface gigabitethernet1/1
(config-if)# switchport mode trunk

(config)# interface fastethernet0/4
(config-if)# switchport mode trunk

(config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252

(config)# interface vlan 1
(config-if)# ip address 192.168.1.2 255.255.255.0
(config-if)# no shutdown
(config)# ip routing

11
Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol?

Ports must be blocked before they can be placed in the disabled state.
Ports are manually configured to be in the forwarding state.
It takes 15 seconds for a port to go from blocking to forwarding.
Ports listen and learn before going into the forwarding state.

12
Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)

on links that should dynamically attempt trunking
when a neighbor switch uses a DTP mode of dynamic desirable
on links that should not be trunking
when connecting a Cisco switch to a non-Cisco switch
when a neighbor switch uses a DTP mode of dynamic auto

13
When a fixed configuration switch is purchased for use on a new network infrastructure, which feature would be of most value if the network is characterized as having a large numbers of users but the users require little bandwidth?

PoE pass-through
PoE
wire speed
port density

14
Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash?

Load the bootstrap program from ROM.
Locate and load the startup-config file from NVRAM.
Search for a backup IOS in ROM.
Load the running-config file from RAM.
Perform the POST routine.

15
What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the configuration of a local router that has been configured as a DHCP server?

Traffic that is destined for 10.10.4.1 and 10.10.4.5 will be dropped by the router.
The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.4.5.
Traffic will not be routed from clients with addresses between 10.10.4.1 and 10.10.4.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 10.10.4.1 and 10.10.4.5.

16
What method of wireless authentication is dependent on a RADIUS authentication server?

WEP
WPA Personal
WPA2 Enterprise
WPA2 Personal

17
Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)?

They are not associated with a particular VLAN.
They support subinterfaces, like interfaces on the Cisco IOS routers.
The interface vlan <vlan number> command has to be entered to create a VLAN on routed ports.
They are used for point-to-multipoint links.
In a switched network, they are mostly configured between switches at the core and distribution layers.

18
In which link aggregation mode does an interface initiate EtherChannel negotiation by sending LACP packets?

desirable
auto
active
on

19
Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?

ip address dhcp
ip helper-address
ip dhcp pool
service dhcp

20
What is the purpose of the Spanning Tree Protocol (STP)?

creates smaller broadcast domains
creates smaller collision domains
prevents routing loops on a router
prevents Layer 2 loops
allows Cisco devices to exchange routing table updates

21

Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

The router is configured for SLAAC operation.
The DNS server address is not on the same network as the clients are on.
The GigabitEthernet interface is not activated.
The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0.

22
What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?

automatically detects interface speed
automatically detects duplex settings
automatically detects copper cable type
automatically assigns the first detected MAC address to an interface

23
What are two advantages of EtherChannel? (Choose two.)
Spanning Tree Protocol ensures redundancy by transitioning failed interfaces in an EtherChannel to a forwarding state.
Load balancing occurs between links configured as different EtherChannels.
Configuring the EtherChannel interface provides consistency in the configuration of the physical links.
Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.
EtherChannel uses upgraded physical links to provide increased bandwidth.

24
When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned?

to the SVI
to the VLAN
to the subinterface
to the interface

25
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

denial of service
cracking
spoofing
rogue access point

26

Refer to the exhibit. Devices on VLANs 5 and 6 cannot communicate. What could be the cause for the lack of inter-VLAN communication?

The GigabitEthernet 0/1 port has not been enabled on the switch.
R1 does not have a default gateway.
Routing has not been enabled on the multilayer switch.
SVIs have not been created.
The GigabitEthernet 0/1 port has not been made a routed port.

27
Which two statements are true about VLAN implementation? (Choose two.)

The network load increases significantly because of added trunking information.
The size of the collision domain is reduced.
The number of required switches in a network decreases.
VLANs logically group hosts, regardless of physical location.
Devices in one VLAN do not hear the broadcasts from devices in another VLAN.

28

Refer to the exhibit. Which statement shown in the output allows router R1 to respond to stateless DHCPv6 requests?
ipv6 nd other-config-flag?

ipv6 unicast-routing
prefix-delegation 2001:DB8:8::/48 00030001000E84244E70?
ipv6 dhcp server LAN1?
dns-server 2001:DB8:8::8?

29

Refer to the exhibit. What is the purpose of the configuration commands that are shown?

to make the port a member of VLAN 30
to add VLAN 30 to the trunk that is connected to port Fa0/10
to activate port Fa0/10
to activate port security on port Fa0/10

30

Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from this DHCP server. The output of the debug ip dhcp server command shows “DHCPD: there is no address pool for 192.168.1.1″. What is the problem?

The 192.168.1.1 address has not been excluded from the DHCP pool.
The default router for the 192Network pool is incorrect.
The 192.168.1.1 address is already configured on Fa0/0.
The pool of addresses for the 192Network pool is incorrect.

31
What is the PoE pass-through feature?

how the switch supplies electrical power to all of the line cards that are connected to it
the capability of powering the switch as well as any devices that are directly connected to the switch
how the power is supplied for a stack of switches
the capability of a wireless AP to supply electrical power to IP phones

32
What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.)

All the interfaces need to be working in the same duplex mode.
All the interfaces need to work at the same speed.
Different allowed ranges of VLANs must exist on each end.
All interfaces need to be assigned to different VLANs.
The interfaces that are involved need to be contiguous on the switch.

33
Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)

dynamic auto – dynamic auto
access – dynamic auto
dynamic desirable – trunk
dynamic desirable – dynamic auto
dynamic desirable – dynamic desirable
access – trunk

34
While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

open
mixed
passive
active
35

Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?

MAC address of the forwarding router
MAC address of the virtual router
MAC address of the standby router
MAC addresses of both the forwarding and standby routers

36
What two conditions have to be met in order to form a cluster that includes 5 access points? (Choose two.)

The APs have to be connected on the same network segment.
At least two controllers are needed to form the cluster.
The APs must use different cluster names.
The APs must all be configured to use different radio modes.
Clustering mode must be enabled on the APs.

37
An administrator needs management access to a switch from a remote offsite location. Which three configurations are required on the switch to allow the administrator to have remote access using either SSH or Telnet? (Choose three.)

console line password
VLAN IP address
default gateway
encrypted passwords
banner message
vty line password

38
When would a network designer be concerned with RUs?

when purchasing a specific number of switches for a network rack
when calculating maximum port speed
when considering port density
when determining the number of available line cards

39
Which impact does adding a Layer 2 switch have on a network?

an increase in the size of the broadcast domain
an increase in the number of network collisions
an increase in the size of the collision domain
an increase in the number of dropped frames

40
An STP instance has failed and frames are flooding the network. What action should be taken by the network administrator?

A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network.
Broadcast traffic should be investigated and eliminated from the network.
Redundant links should be physically removed until the STP instance is repaired.
Spanning tree should be disabled ?for that STP instance until the problem is located.

41
A network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?

The EtherChannel will remain functional.
The EtherChannel will transition to a down state.
Spanning Tree Protocol will recalculate the remaining trunk links.
Spanning Tree Protocol will transition the failed physical interface into forwarding mode.

42

Refer to the exhibit. Which two commands or groups of commands are needed to complete the switch configuration so that SSH can be used to telnet from host A to SW_1? (Choose two.)

SW_1(config)# login ssh
SW_1(config)# password class
SW_1(config)# line vty 0 15
SW_1(config-line)# login
SW_1(config-line)# password cisco
SW_1(config)# password encrypted cisco
SW_1(config)# line vty 0 15
SW_1(config-line)# login local
SW_1(config-line)# transport input ssh
SW_1(config)# login key rsa
SW_1(config)# password cisco
SW_1(config)# username david password class

43

Refer to the exhibit. A network administrator is verifying the bridge ID and the status of this switch in the STP election. Which statement is correct based on the command output?

The STP instance on Switch_2 is using the default STP priority and the election is based on Switch_2 MAC address.
The bridge priority of Switch_2 has been lowered to a predefined value to become the root bridge.
The bridge priority of Switch_2 has been lowered to a predefined value to become the backup root bridge.
The STP instance on Switch_2 is failing due to no ports being blocked and all switches believing they are the root.

44
When would a network engineer configure an access point with channel bonding?

when security is an issue
when trunking is enabled between the access point and switch
when older wireless NICs are being used
when more throughput is needed

45
What two STP features are incorporated into Rapid PVST+? (Choose two.)

BPDU filter
loop guard
UplinkFast
PortFast
BPDU guard
BackboneFast

46
Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth?

infrastructure mode
hotspot
ad hoc mode
mixed mode

47

Refer to the exhibit. Two VLANs have been configured on the switch and PCs have been assigned. PCs in the Sales VLAN can ping all PCs in their own VLAN, but cannot ping the PCs in the HR VLAN. What are two explanations for this problem? (Choose two.)

A router is required for communication between VLANs.
The management VLAN has not been assigned an IP address.
The PCs are in separate broadcast domains.
All PCs are in one collision domain.
All PCs are in one broadcast domain.

48

Refer to the exhibit. The partial configuration that is shown was used to configure router on a stick for VLANS 10, 30, and 50. However, testing shows that there are some connectivity problems between the VLANs. Which configuration error is causing this problem?

The VLAN IP addresses should belong to the same subnet.?
A configuration for the native VLAN is missing.
The wrong VLAN has been configured on subinterface Fa0/0.50.?
There is no IP address configured for the FastEthernet 0/0 interface.

49

Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
The router will broadcast the packet out every sub-interface except for the one that received the packet.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will drop the packet.

50
Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)

Configure SSH for remote management.
Configure all switch ports to a new VLAN that is not VLAN 1.
Configure the native VLAN to match the default VLAN.
Configure specific ports for management traffic on a specific VLAN.
Configure all unused ports to a “black hole.”

51
Which factor can limit the implementation of a converged network infrastructure?

QoS implementation
point-to-point video traffic
legacy equipment
software-based phones

52
When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)

blocked
designated
alternate
disabled
root

53
An administrator was troubleshooting a router-on-a-stick topology and concluded that the problem was related to the configuration of VLANs on the router subinterfaces. Which two commands can the administrator use in the router to identify the problem? (Choose two.)

show ip interface
show vlan
show ip protocols
show running-config
show controllers

54
What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

initiating a three-way handshake
delivering a broadcast frame
receiving a broadcast beacon frame
transmitting a probe request
sending an ARP request

55

Refer to the exhibit. An attacker on PC-A sends a frame with two 802.1Q tags on it, one for VLAN 10 and another for VLAN 20. What will happen to this frame?

ALS1 will leave both tags on the frame and send it to ALS2, which will forward it to hosts on VLAN 10.
ALS1 will remove both tags and forward the rest of the frame across the trunk link, where ALS2 will forward the frame to hosts on VLAN 10.
ALS1 will remove the outer tag and send the rest of the frame across the trunk link, where ALS2 will forward the frame to hosts on VLAN 20.
It will be dropped by ALS1 because it is invalid.

56
Which switching method results in the lowest latency when forwarding frames?

symmetric
fast forward
fragment free
store and forward

57
A set of switches is being connected in a LAN topology. Which STP bridge priority value will make it least likely for the switch to be selected as the root?

61440
32768
65535
4096

58
Which two commands should be implemented to return a Cisco 3560 trunk port to its default configuration? (Choose two.)

S1(config-if)# no switchport trunk native vlan
S1(config-if)# no switchport trunk allowed vlan
S1(config-if)# switchport access vlan 1
S1(config-if)# switchport mode dynamic desirable
S1(config-if)# switchport mode access

59
Error
This will open the PT activity. Any changes made will be saved for the duration of this exam session
This will close the PT activity, but any changes made will be saved for the duration of this exam session. To resume your work on this PT Activity, click “Launch PT” to reopen and resume your work in PT.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Why can PC0 not communicate with Server0 by using the IP address as the target?

The DHCP pool configuration is incorrect on Router1.
The ip helper-address command is missing on Router0.
The dns-server command is missing on Router1.
The ip helper-address command is missing on Router2.

60

Refer to the exhibit. A network administrator is configuring inter-VLAN routing. However, the communication between VLAN 10 and VLAN 20 fails. Based on the output of the show vlan command, what is the cause of the problem?

Gi1/1 and Gi1/2 are not configured as trunk mode.
The IP addresses on Gi0/0 and Gi0/1 are switched by mistake.
Gi1/1 and Gi1/2 are not assigned to their respective VLANs.
The IP addresses on Gi0/0 and Gi0/1 are not on the same network.

61

Refer to the exhibit. An administrator is troubleshooting an EtherChannel configuration that is causing the port channel to drop between switches S1 and S2. Based on the output that is shown, which action would allow switches S1 and S2 to automatically negotiate an EtherChannel with PAgP?

On S2, change the channel group number to “1.”
On S2, change the channel group mode to “on.”
On S1, change the channel group mode to “desirable.”
On S1, change the channel group mode to “active.”

62
Which technology is an open protocol standard that allows switches to automatically bundle physical ports into a single logical link?

Multilink PPP
DTP
PAgP
LACP


Read more ...