Saturday, January 9, 2010

CCNA Discovery 4 Final Module Exam Answers Version 4.0

Refer to the exhibit. A pre-sales system engineer receives a diagram of the
current network WAN connectivity from a customer. EIGRP is the routing protocol
used on the WAN. Based on the default operation of EIGRP, which statement is true
about the routing table on router R1?
There is a single route to the LAN via the use of the T1
There is a single route to the LAN via the use of the DSL
There is a single route to the LAN via the use of the Metro
Ethernet connection.*****

EIGRP installs all three routes to the LAN and load balances the

A new host needs to be connected to VLAN 1. Router RA is attached to the VTP trunk
and configured as shown in the output contained in the graphic. Which of the
following IP addresses should be assigned to this new host? /26 /28 /28**** /28 /28 /28


Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a
customer network. What two risks or issues can be identified in the topology that
is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.****
A failure of the switch that connects the Cisco Call Manager to the network will
cause the entire IP telephony system to fail.****

Using Layer 3 switches to interconnect the data center servers to the IP phones
introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single
points of failure at the access layer.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
An engineer who is part of a sales team has been asked to select technologies and
equipment capabilities to meet the network requirements of the prospective client.
The engineer is also responsible for diagramming the placement and interconnection
of various network devices and services. Which role is this engineer performing?
post-sales field engineer
account manager
pre-sales engineer****
network designer

Refer to the exhibit. Two network engineers are setting up a prototype network to
test a new Frame Relay network design. One of the engineers connects the cables
and powers up all of the devices per the test plan. The second engineer uses a
console cable to connect to the BR1 router, configures the Frame Relay connection
and issues a show interfaces serial 2/0 command. What does the output of this
command indicate to the engineers?
A no shutdown command must be entered on the interface.
The IP address has not yet been configured on the interface.
The WAN encapsulation method is incorrect on the interface.
The cable that connects BR1 to FR2 may not be correct or is not connected

After an administrator installs a WIC into a two-slot router and issues the show
version command, the newly installed interfaces in the WIC cannot be seen in the
router output. What is a possible reason why the newly installed interfaces are
not displayed in the router output?
The interface is not configured properly.
The WIC was put into slot 0 instead of slot 1.
The WIC was not physically installed in the slot properly.
The show version command cannot be used to validate the presence of installed
Refer to the exhibit. What can be concluded from the output that is shown?
MDF_2811 has a MAC address of 2294:300F:0000.
A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.
MDF_2811 is installed in the main distribution facility on floor 28 of building

Device 3750-24_IDF2 is running Cisco IOS Software Release 12.2(25)SEE2.***

Refer to the exhibit. A network technician is performing an initial installation
of a new switch in the east wing. The technician removes the switch from the box,
connects the switch to a router that supports the network, and
adds the configuration that is shown. The technician notifies the network
administrator that the switch has been installed. The network administrator then
attempts to telnet to the switch from host to complete the switch
configuration. What are the results of this attempt to telnet?
The switch refuses the connection.
The connection to the switch times out.
The network administrator is prompted to login.****
The connection is established at the user EXEC prompt.
A NetworkingCompany customer is interested in creating an e-commerce business,
which includes a network upgrade and the addition of a new server farm. By
offering their products on the web, the company expects to increase revenue and
reduce wait times to process orders. The network designer proposes to implement
the server farm in a new data center and to add a new T1 circuit to handle the
expected traffic. What are two business goals of the NetworkingCompany customer?
(Choose two.)
install a new T1 circuit
increase revenue***
implement a new server farm
reduce wait times to process orders***
install a new data center
10.JPG (19.7 KiB) Viewed 1274 times
Refer to the exhibit. To demonstrate the importance of using contiguous IP
addressing in a hierarchical network design, a network designer configures a
prototype network with the use of a network simulator. Which EIGRP configuration
commands should the designer enter on router R1 to correctly advertise a single
summary route to router BR1 for the campus LAN?

What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN
It allows a greater variety of network devices to be used for VPN connections.
A local car dealership recently purchased an automobile financing company. The
owner of the dealership issues a contract to NetworkingCompany to integrate the
finance company network into the car dealership network. A router in the existing
finance company network requires a password for both Telnet and console access,
but no one remembers the passwords. What can the NetworkingCompany network
technician do to obtain or change the passwords and gain access to the router?
Use a TFTP server to download a new configuration file to the router that contains
the passwords used on the car dealership network and then reload the router.
Connect a rollover cable to the serial0/0 port of the router in order to bypass
the password security, and use the show running-config command to obtain the
Connect a console cable to the router, power cycle the router, issue a Ctrl-Break
to enter ROM monitor mode, and change the configuration register to bypass the
startup configuration.***
Connect the router to another Cisco router at the car dealership, use the show cdp
neighbors command to obtain an IP address of the router, and use SSH to gain
secure access in order to view the passwords.
A network administrator is troubleshooting connectivity problems on a small IPv6
network that consists of two network segments that are connected by a single
router. The administrator can ping the IP addresses of local hosts on each segment
from the router. Hosts on one network segment cannot successfully ping the IP
addresses of hosts on the other network segment. What is the most likely cause of
the connectivity problem between the segments?
incorrect VLAN assignments on each segment
broadcast storm that is caused by a malfunctioning NIC on a host
incorrect DNS mappings of host names to IPv6 addresses
IPv6 traffic forwarding not configured on the router***
At the distribution layer of a hierarchical network, what are two advantages of
using Layer 3 devices instead of Layer 2 switches? (Choose two.)
enables the creation of large multisite VLANs
creates fewer IP subnets to configure and manage
reduces the number of redundant links required
reduces the complexity of STP configurations***
enables traffic filtering based on subnet addresses***

A NetworkingCompany engineer is on a support call resolving technical problems for
a client network. After the issue is resolved, the engineer also provides a
training session for the client's network support staff. Which position on the
networking company team is this engineer performing?
post-sales field engineer***
pre-sales engineer
network designer
account manager
What is the main purpose of the access layer in a hierarchically designed network?
perform routing and packet manipulation
supply redundancy and failover protection
provide a high-speed, low-latency backbone
serve as a network connection point for end-user devices***
A router has been removed from the network for maintenance. A new Cisco IOS
software image has been successfully downloaded to a server and copied into the
flash of the router. What should be done before placing the router back into
Back up the new image.
Copy the running configuration to NVRAM.
Delete the previous version of the Cisco IOS software from flash.
Restart the router and verify that the new image starts successfully.***
A NetworkingCompany customer requires VPN connectivity for workers who must travel
frequently. To support the VPN server, the customer router must be upgraded to a
new Cisco IOS software version with the Advanced IP Services feature set. What
should the field engineer do before copying the new IOS to the router?
Set the router to load the new IOS image file directly from the TFTP server on the
next reboot.
Delete the currently installed IOS by using the erase flash: command, and reload
the router
Issue the show running-configuration command to determine the features of the
currently installed IOS image file.
Issue the show version and the show flash commands to ensure that the router has
enough memory and file space to support the new IOS image.***
The main office of a NetworkingCompany customer currently connects to three branch
offices via three separate point-to-point T1 circuits. The customer network uses
RIPv2 as the routing protocol within both the LAN and the WAN. The account manager
proposes a change to a Frame Relay network because the costs are lower. A single
local loop connection can be installed at the main office with three separate PVCs
to connect the branch offices. How can the main office edge router be configured
to enable the customer to continue to use RIP as the WAN routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP
addresses of the remote routers.
To prevent the Frame Relay network from causing a routing loop, disable split
horizon on the serial interface.
Create three separate point-to-point subinterfaces on the serial interface and
assign a different subnet IP address to each one.***
Configure the serial interface with a single interface DLCI number and create
frame-relay map statements for each remote site address.
A high school uses a fractional T1 for Internet access. Wireless network access is
provided in approximately 30 percent of the physical campus. Tests performed
recently by the IT administrators indicate that the T1 circuit is operating at
full capacity. The school district IT design team is asked to propose a network
upgrade plan to address two business goals:
1. Provide wireless network connectivity for students in 90 percent of the
physical campus.
2. Improve Internet access for all students and faculty.
The design team proposes to upgrade the memory of the core router that is
connected to the ISP and to purchase additional wireless access points.
What can be concluded about the proposal that is presented by the design team?
The proposal addresses only the goal to increase the wireless coverage.***
The proposal addresses only the goal to improve Internet access.
The proposal addresses both business goals.
The proposal addresses neither business goal.

Refer to the exhibit. The network administrator is configuring the port security
feature on switch SWC. The administrator issued the command show port-security
interface fa 0/2 to verify the configuration. What can be concluded from the
output that is shown? (Choose three.)
This port is currently up.
The port is configured as a trunk link.
There is no device currently connected to this port.***
Three security violations have been detected on this interface.
Switchport mode for this interface is access-mode.
Security violations will cause this port to shut down immediately.***
What are two advantages of using a simulation tool to test an IP addressing
scheme? (Choose two.)
Address configuration errors can be addressed using out-of-band connections.
Placement of subnets and route summarization can be verified.
An engineer can test physical security without leaving the office or lab.***
The addressing scheme can be tested for scalability.***
The effects of combining new with existing infrastructure can be measured.
It provides real-time monitoring of a production network.

Refer to the exhibit. A field engineer is called into a customer's office to
determine a problem with connectivity in the network. Based on the customer's IP
addressing scheme, what is causing the problem?
The VLSM scheme is correct as shown.
The WAN that connects R1 to R3 has an incorrect mask.
The WAN that connects R1 to R2 overlaps with the R3 LAN.***
The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
A new WIC is installed in an available router slot. At what point during the
router startup process does the router test the card for hardware problems?
after the configuration from NVRAM is loaded into RAM
when the bootstrap program is loaded into RAM
after the configuration from NVRAM is loaded into ROM
during the power-on self-test (POST)***

Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing
network for a new customer. The engineer issues a show run command on the branch
router to gather configuration information. What is the engineer able to determine
as a result of viewing the output of this command?
The branch office router has two routes to the main office LAN in the routing
The default route for the branch office traffic is the router that is located at
the main office.
A connection through ISP-A will be used to reach the main office LAN if the Frame
Relay network is unavailable.
By using both the DSL and the Frame Relay connection, the branch office router
will load balance traffic that is destined for the main office LAN.
A configuration file needs to be loaded into the RAM of a router from a TFTP
server. What should an administrator know before accomplishing this task?
the router IP address and the operating system that is used by the TFTP server
the TFTP server IP address and the name of the configuration file on the server***
the router IP address and the name of the router configuration file in NVRAM
the TFTP server IP address and the router interface through which the file will be
A network designer must select a routing protocol for the network of a customer.
The currently installed network contains both Cisco and non-Cisco routers, and
there is no budget to replace them. The designer plans on implementing both VLSM
and route summarization in the new network design. Which two protocols can provide
the necessary functionality for this LAN? (Choose two.)
Which two weaknesses in a proposed network design can be identified by setting up
a prototype network and performing tests on it? (Choose two.)
congestion and inadequate bandwidth in the provider Frame Relay network
costs of the proposed equipment exceed the customer budget***
potential points of failure that are critical to the network***
limited scalability that can present problems if the network grows faster than
poor documentation of existing network topology and design
A user in a large office calls tech support to complain that the PC no longer
connects to the Internet or to any network resources, but seems otherwise normal.
The help desk technician asks the caller to talk to nearby users to see if other
machines are affected. After a few minutes, the caller reports that several
immediate neighbors have the same problem, but those seated further away do not.
Assuming that the description is accurate, what should be checked next?
power outlet to the PC that is used by the caller
workgroup switch in the telecommunications room****
cable between any network outlet and the telecommunications room
cable between the PC that is used by the caller and the network outlet it connects
cable between the PC that is used by a neighbor and the network outlet the
neighbor PC it connects to
Which of the following are characteristics of the core layer of the hierarchical
network design model? (Choose three.)
redundant paths***
high-level policy enforcement
packet manipulation
media transitions
rapid forwarding of traffic
no packet filtering
A network designer needs to perform prototype testing on a multisite network
design to verify that failure domains are not larger than specified in the
proposal. What would be the most efficient way to conduct this test?
Use simulation software to check the IP addressing scheme for errors.
Power down lab equipment and ping from one host to all other hosts.
Disconnect links between lab equipment and ping end-to-end across the network.
Delete devices or links in simulation software and ping from each host to all
other hosts.***
A customer has asked a network engineer to prototype the new IP addressing and
summarization strategy for a large, multisite network implementation. Which tool
is appropriate for testing the complete addressing scheme?
Cisco SDM
network simulation tool***
actual network equipment in a lab
current network of the customer
During a review of the proposed bill of materials, the NetworkingCompany account
manager realizes that the systems engineer included a lower cost, less capable
switch model for the access layer connectivity than was specified by the network
designer. When questioned, the systems engineer responds that the switches
recommended by the designer cannot be purchased within the budget limitations of
the customer. Which action should the account manager take?
Inform the customer that the project cannot be completed given the unreasonable
budget constraints.
Communicate any risks associated with the equipment substitution and obtain
customer approval to proceed.***
Because the customer is probably aware that the budget limitations will require
lower cost, less capable equipment, the account manager should do nothing.
Because the customer is probably aware that the budget limitations will require
lower cost, less capable equipment, the account manager should do nothing.
Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces
of SW11?
After performing a password recovery operation on a router, the network field
engineer copies the running configuration to the startup configuration and then
reloads the router. The router boots successfully but immediately enters the setup
mode. The engineer manually loads the startup configuration using the copy start
run command and verifies that the configuration is correct and the passwords are
reset. What can cause the router to enter setup mode rather than load the correct
startup configuration file?
The field engineer configured the incorrect passwords in the startup configuration
The configuration register setting was not changed back to the correct value
before the router was reloaded.***
The running configuration was not successfully saved to the startup configuration
before the router was reloaded.
During the password recovery process, the engineer should have copied the startup
configuration to the running configuration before reloading the router.
An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router
that currently has a WIC-2T module in slot 0. What should the network technician
do first?
Turn off power to the router before installing the new module.***
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module
installation is complete.
Configure the router Cisco IOS software to support an internal trunk link between
the switch and router module.

Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the
field engineer conclude about the EIGRP authentication between RouterA and
Authentication will fail because only one key is configured.
Authentication will fail because the key chain names do not match.
Authentication will succeed and EIGRP updates can be exchanged.***
Authentication will fail because the key chain names must match the router names.

Refer to the exhibit. Following a test plan, the network systems engineer
completes the configuration of an access layer switch and connects three PCs to
test the configuration. The engineer attempts to ping from each PC to the other
connected PCs. Which three statements describe the expected results of pinging
from one host to another? (Choose three.)
Host1 can ping Host2.
Host1 cannot ping Host2.***
Host1 can ping Host3.***
Host1 cannot ping Host3.
Host2 can ping Host3.
Host2 cannot ping Host3.***

Refer to the exhibit. The two switches that are shown will not form a trunk. What
is the most likely cause of this problem?
The native VLANs are improperly configured.
All the hosts are on the same VLAN and a trunk is not needed.
Both ports are set to dynamic auto.***
The trunk should be configured using the switchport mode access command.
During prototype testing, the network designer performs a test to determine the
ability of the network to recover from a link or device failure. Which design goal
is validated if the test is a success?
What are two suggested best practices to implement when securing network devices?
(Choose two.)
Configure VLAN 1 as the native VLAN.
Disable unused ports on switches.***
Enable SSH and disable Telnet.***
Consolidate guest traffic and internal employee traffic.
Ensure that logs are stored locally on routers.

Refer to the exhibit. What does the JAX router do with traffic that is destined
for a web server with an IP address of
The traffic is sent out Serial 0/0/0.***
The router sends the traffic out all interfaces other than the one it came in on.
A request is sent to neighboring routers for paths to the network.
The packets are placed into a queue until a better route is discovered via RIP.
When should a network designer specify that a dedicated firewall appliance be used
at the perimeter of the network rather than a router with a Cisco IOS softwarebased
firewall feature set?
There are multiple servers in the DMZ.
The network is large in size and network traffic can overload the device.***
Traffic filtering is needed on the internal network.
Multiple levels of access to the network are needed.
Which two events occur when the command RTA(config)# frame-relay map ip
22 is issued on a router? (Choose two.)
DLCI 22 replaces the MAC address in the ARP table for entry
The remote router that is connected to network enters 22 the DLCI for
Inverse-ARP is used to add an entry for into the Frame Relay map table
using DLCI 22.
A Layer 2 address is statically mapped to a Layer 3 address.***
RTA uses DLCI 22 to forward data to***
45.JPG (37.57 KiB) Viewed 1250 times
Refer to the exhibit. When creating an extended ACL to deny traffic from the network destined for the Web server, where is the best
location for applying the ACL?
R3 Fa0/0 inbound***
R3 S0/0/1 outbound
R2 S0/0/1 inbound
ISP Fa0/0 outbound
Why would a designer choose a flat network over a hierarchical network design?
to make it easier to filter unwanted traffic
to be able to implement QoS
to keep costs low in small networks***
to reduce the size of failure domains

Refer to the exhibit. What does the status in the output indicate about the DLCI?
The switch has the DLCI configured but it is not usable by this router.***
The DLCI was previously configured in the switch but is no longer there.
It is usable but has little activity.
The DLCI has been renamed for that PVC.
The network designer recommends using RSTP in the design of a new data center.
There are multiple redundant Layer 2 switches and links contained in the new
design. What is the benefit of using RSTP in this situation over standard STP?
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.***
Fewer redundant links are required to maintain connectivity.
A network administrator wants to load a configuration file from a TFTP server into
NVRAM on a router. How should the administrator create a startup-config file in
NVRAM that matches the contents of the configuration file on the TFTP server?
Copy the configuration file from a TFTP server by using the command copy tftp
Copy the configuration file from a TFTP server by using the command copyfilename
Copy the file to RAM from a console connection by using the copy tftp runningconfig
command. Then reload the router to use the new configuration.
Paste the configuration file to the command line of the router while in global
configuration mode. Then issue the copy startup-config running-config command.***
What can be broadcast over the wireless network to help a guest user conveniently
log in to the network and use wireless services?
VPN authentication
WPA encryption
VLAN parameters
WEP keys
Which two options are true about discontiguous networks? (Choose two.)
The routing problems of discontiguous subnetworks can be resolved easily by using
the RIPv2 default configuration.
The default configuration of all classless routing protocols can prevent
problems that are caused by discontiguous networks.
Automatic route summarization can cause problems in a network with discontiguous
A network that runs a classful routing protocol will have problems if
discontiguous subnets exist in the network.***
Automatic route summarization helps resolve problems with a network with
discontiguous subnetworks.

Refer to the exhibit. A network associate is configuring a new router to provide
routing between VLANs. The associate removes the router from the box and connects
the Fa0/0 interface to a trunking port on the switch. After the configuration is
applied to the router, the traffic between VLANs still fails. What is causing this
to occur?
The NWRnStick router needs a routing protocol configured.
The NWRnStick router needs additional Fast Ethernet interfaces installed.
The subinterfaces of the NWRnStick router should have IP addresses applied.***
All the subinterfaces of the NWRnStick router should be configured in the same

A company has an IT staff that is not highly trained. What two features or
technologies must the network designer identify as training needs in order for the
staff to understand the basic operation of VPNs? (Choose two.)
access control lists
encryption algorithms***
Frame Relay configuration
QoS operation
tunneling protocols***
VLAN configuration
Which statement is true about implementing QoS in a network?
Voice traffic automatically receives the highest priority.
QoS guarantees enough bandwidth to every application.
QoS increases actual bandwidth on a link to ensure voice quality.
Voice traffic requires priority over other data traffic because it is sensitive to
Which three enhancements does IPv6 offer over IPv4? (Choose three.)
easier implementation and configuration
more effective IP security
integrated IP mobility support***
simplified header information***
fewer reserved IP addresses
eliminates the need to implement DHCP***

Refer to the exhibit. What happens if the network administrator issues the
commands shown when an ACL called Managers already exists on the router?
The commands overwrite the Managers ACL that is already on the router.
The commands are added at the end of the Managers ACL that is already on the
The commands are added at the beginning of the Managers ACL that is already on the
The network administrator receives an error stating that the ACL already exists.
A technician is configuring a router for routing using EIGRP. The technician
enters the EIGRP router configuration mode command:
Router(config-router)# variance 3
What is the effect of entering this command?
It enables unequal cost load balancing.***
It adjusts the cost of all EIGRP routes to 3.
It restricts the number of EIGRP feasible successor routes to 3.
It enables EIGRP equal cost load balancing over a maximum of 3 routes.
A small bookstore would like to offer wireless connectivity for customers with
laptops. Which wireless components or devices will provide connectivity to the
customers with the least possible cost to the bookstore?
standalone access points
wireless LAN controllers
standalone lightweight access points***
lightweight access point and wireless LAN controller

CCNA Discovery 3 Final Module Exam Answers Version 4.0

Q.1 In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?


Q.2 What are two characteristics of an extended ACL? (Choose two.)

IP is used to specify TCP traffic only.
IP is used to specify TCP and UDP traffic only.
IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols.
Traffic can be filtered on source address only.
Traffic can be filtered on source and destination address only.
Traffic can be filtered on source and destination address, protocol, and specific port number.

Q.3 Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)

LCP tests the quality of the link.
LCP manages compression on the link
Only a single NCP is allowed between the two routers.
NCP terminates the link when data exchange is complete.
With CHAP authentication, the routers exchange plain text passwords.

Q.4 Assuming VLSM is not being used, what impact will adding the command ip route serial0/0 have on a router that is already operational in a network?

All packets with a destination address between and will be forwarded out serial0/0.
All packets with a destination address between and will be forwarded out serial0/0.
All packets with a destination address between and will be forwarded out serial0/0.
All packets with a destination address between and will be forwarded out serial0/0.

Q.5 Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?

RB has the lowest priority value.
RC and RD have the lowest router IDs on the network.
RA has established adjacencies with all neighbor routers.
RA and RB cannot form an adjacency because they are stuck in the 2-way state.

Q.6 A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?

Frame Relay
PPP with CHAP authentication
PPP with PAP authentication

Q.7 Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem?

VTP V2 mode is disabled.
SW3 is configured as transparent mode.
The number of existing VLANs does not match.
The configuration revision number does not match.

Q.8 Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.)

Traffic intended for destinations across unstable serial links will be forwarded by ASBR even when the links are down
A summary route of will be advertised to the ISP router.
Serial links in range will be forced into a passive state.
Networks connected to the unstable serial links will be placed in an unreachable state.
Negative effects of route flapping will be reduced.

Q.9 Which two criteria are used by STP to select a root bridge? (Choose two.)

memory size
bridge priority
number of ports
switch location
switching speed
base MAC address

Q.10 A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?

Q.11 What is the term for the value 2172416 that is highlighted in the output of the show ip eigrp topology command?

feasible distance of the successor
reported distance of the successor
feasible distance of the feasible successor
reported distance of the feasible successor

Q.12 Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?


Q.13 What do companies gain from the services performed at the enterprise edge?

faster communication with server farms
stronger security against malicious attacks
faster communication with Internet destinations
enhanced performance and reliability through VLANs and redundant trunk links

Q.14 Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where the ACL shown in the exhibit should be placed to meet these requirements?

R2: Fa0/0 inbound
R1: S0/1/0 outbound
R1: S0/0/1 inbound
R2: S0/0/1 outbound
R2: Fa0/0 outbound

Q.15 Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?

C, B, A, D
D, C, B, A
A, B, C, D
A, C, B, D
B, C, A, D

Q.16 What two statements are true regarding EIGRP tables? (Choose two.)

A feasible successor route can be found in the topology table.
A successor route can only be found in the routing table.
The topology table shows whether a route is in the passive or active state.
The routing table shows the amount of time elapsed since a router adjacency was formed.
The neighbor table shows all adjacent Cisco devices.
Administrative distance is shown as a column in the neighbor table.

Q.17 Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?

Router B has EIGRP adjacencies with both router A and C.
Router B has a fully converged topology table.
Router B has not formed an adjacency with router A.
Router B has not formed an adjacency with router C.

Q.18 Which three statements are true about RSTP? (Choose three.)

RSTP can fall back to STP to provide support for legacy equipment.
RSTP and STP have the same number of port states.
Like PortFast and UplinkFast, RSTP is a proprietary protocol.
RSTP takes up to 50 seconds to converge.
RSTP requires a point-to-point, full-duplex connection.
RSTP views all ports that are not discarding as part of an active topology.

Q.19 Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?

The IP address is already in use.
The technician is using a network address.
The technician is using the wrong subnet mask for /26
The technician must enable VLSM on the interface.

Q.20 Refer to the exhibit. A network administrator enters the command ip route s0/0/1 into the router. What will be the result of this configuration?

A static route pointing to is placed into the routing table.
A static route to is placed into the routing table if interface FastEthernet0/1 goes down.
A static route pointing to is only placed into the routing table if the route to is removed.
A static route is not placed into the routing table because a RIP route that includes the destination network already exists.

Q.21 Refer to the exhibit. R1 is connected to the Internet through its serial 0/0/0 interface. Hosts on the LAN on R1 cannot communicate with hosts on the Internet. What two NAT configuration issues might explain this failure? (Choose two.)

The ip nat pool command has not been applied correctly.
The inside interface has not been defined on R1.
The access list does not include the group of IP addresses that are supported by the inside network.
The ip address that is assigned to the serial 0/0/0 interface is incorrect
The outside interface has not been defined on R1.

Q.22 Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?

no set loopback
incorrect subnet mask on R2
incompatible bandwidth
incorrect IP address on R1
incompatible encapsulation

Q.23 Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)

to set the duplex mode of a redundant link
to activate looped paths throughout the network
to determine the root bridge
to prevent loops by sharing routing tables between connected switches
to determine which ports are placed in forwarding mode

Q.24 When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.)

The key passes between routers in plain text.
The key is used to help generate an encrypted number for authentication.
The key passes between routers in encrypted form.
The key is never transmitted.
The key can be captured by using a packet sniffer.

Q.25 Refer to the exhibit. If router RTA fails, which statement is true?

Hosts A and B can reach each other, but cannot reach hosts C and D or the server.
No host can reach any other host.
Hosts A, B, C, and D can reach each other, but cannot reach the server.
All hosts can reach each other.

Q.26 Which command should a network administrator issue to disable default summarization in an EIGRP network?

Router(config-router)# null 0 route
Router(config-if)# no ip summary-address
Router(config-router)# no ip summary-address
Router(config-if)# no auto-summary
Router(config-router)# no auto-summary

Q.27 Refer to the exhibit. Users on the network are unable to access any of the servers located on the network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

There is a routing loop occurring between all three routers.
There is a network statement missing.
Network has an incorrect wildcard mask.
The OSPF Area configuration is incorrect.
/23 is an invalid subnet mask for the network.

Q.28 Refer to the exhibit. Which IP addressing scheme would be correct for the network?


Q.29 Refer to the exhibit. An administrator is adding a new router to the network. The IP address has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router?

Q.30 After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)

define an ACL at the distribution layer to isolate packets
add an ACL at the router in the enterprise edge to block the traffic
deploy a Layer 3 switch to contain broadcasts
connect remote locations directly to the intranet
configure all hosts with the same default gateway to eliminate unnecessary broadcasts
deploy one core ISP router to reduce the delay in path determination

Q.31 Which statement is accurate about the CIR in Frame Relay?

It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.
The CIR can be no lower than the port speed of the local loop.
The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit
It is possible to burst over the CIR if bandwidth is available.

Q.32 A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?


Q.33 A network administrator wants to deny responses to ping requests. Which ACL statement denies ping responses while not affecting other traffic?

access-list 123 deny tcp any any eq 80
access-list 123 deny tcp any any eq 20
access-list 123 deny tcp any any eq 21
access-list 123 deny icmp any any echo-reply
access-list 101 deny tcp any any established

Q.34 Why would a network administrator want to limit the size of failure domains when designing a network?

to eliminate the effects of Ethernet collisions
to reduce the impact of a key device or service failure
to reduce the impact of Internet congestion on critical traffic
to eliminate the need to block broadcast packets at the edge of the local network

Q.35 What are two benefits of implementing VLANs in an enterprise network? (Choose two.)

eliminates the need for a Layer 3 device
provides segmentation of broadcast domains
allows for the propagation of broadcasts from one local network to another
allows for the logical grouping of devices despite physical location
prevents issues such as broadcast storms by ensuring a loop free environment

Q.36 Which three IP addresses are valid host addresses in the network? (Choose three.)

Q.37 Refer to the exhibit. Assuming that the RIPv1 routing protocol is enabled and that all networks are being advertised, which statement is true?

All packets from H1 that are destined to H2 will arrive at H2.
None of the packets from H1 that are destined to H2 will arrive at H2.
Approximately half the traffic from H1 that is destined to H2 will reach R3.
Some of the packets from H1 that are destined to H2 will be sent to the switch that is connected to network

Q.38 Refer to the exhibit. Which route will appear in the routing table?

R [120/1] via, 00:00:12, FastEthernet0/1
R [120/1] via, 00:00:12, FastEthernet0/0
R [120/2] via, 00:00:12, FastEthernet0/0
R [120/3] via, 00:00:12, FastEthernet1/0
R [120/1] via, 00:00:12, FastEthernet1/0

Q.39 Refer to the exhibit. Server7 has been added to the server farm network. The hosts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7 cannot ping the other servers connected to the switch. What is the cause of this problem?

The Fa0/1 port on the switch should be in access mode.
The switch IP address is not on the same subnet as Server7.
The switch port used for Server7 is not in the same VLAN as Server2 and Server3.
The Fa0/0 interface of the router has not been configured for subinterfaces to support inter-VLAN routing.

Q.40 What will be the two wildcard masks required in an extended access list statement that blocks traffic to host from the network? (Choose two.)

Q.41 If a modem is being used to connect to an ISP, which WAN connection type is being used?

leased line
cell switched
circuit switched
packet switched

Q.42 Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address?

Q.43 Refer to the exhibit. OSPF is enabled and the network has completely converged. Which two routers will be designated as DROTHER routers? (Choose two.)


Q.44 Refer to the exhibit. What two conclusions can be drawn from the displayed output? (Choose two.)

A packet with a destination IP address of will exit the router via the Serial 0/1/0n interface.
The default administrative distance for EIGRP has been changed.
Network can be reached through two possible routes of equal cost.
The addresses on this network were created using VLSM.
The router connected to Serial 0/1/1 is advertising four separate routes through EIGRP to this router.

Q.45 Refer to the exhibit. What two pieces of information can be gathered from the output of this command? (Choose two.) is a manually summarized route.
All subnets are being advertised because default summarization was disabled.
The output verifies that EIGRP is advertising only the networks in the same AS.
The network is directly attached to the router that produced this output.
The Null0 interface indicates that this is not an actual path, but a summary for advertising purposes.

Q.46 Refer to the exhibit. What three facts represent the result of DR and BDR elections in this OSPF network? (Choose three.)

RTC will be the DR of
RTD will be the BDR of
RTD will be the DR of
RTB will be the BDR of
RTB will be the DR of
RTA will be the BDR of

Q.47 Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes:
BorderR(config)# ip route 200
BorderR(config)# ip route
However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing?

The first configuration command overwrites the second command.
The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the network.
This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table.
The first default route cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route command.

Q.48 Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific?

Q.49 Which two statements are true about the native VLAN on a switch? (Choose two.)

It requires a special VLAN ID tag.
It is unable to be changed to a different VLAN.
Untagged traffic slows the switching process down
The native VLAN defaults to VLAN 1 on Cisco Catalyst switches.
Untagged frames that are received on a trunk become members of this VLAN

Q.50 Refer to the exhibit. A company has recently installed a new switch (S2) into their network.After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch?

VTP version mismatch
VTP domain name mismatch
VTP revision number mismatch
Time synchronization problems

Q.51 Refer to the exhibit. All routes in the exhibit are available to a router. Which two routes will be placed into the routing table? (Choose two.)


Q.52 Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit

It identifies traffic on all inside interfaces to be translated and given access to the ISP router.
It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.
It allows traffic from the ISP to reach all of the inside interfaces.
It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router
It allows traffic from the ISP router to the fa0/1 interface.

Q.53 The headquarters of a corporation uses static routes to connect to three branch offices. What are two advantages of using static routes for the WAN connections? (Choose two.)

Static routes are more secure.
Static routes converge faster.
Static routes have higher administrative distances than dynamic routing protocols.
The metrics of a static route need adjusting only if the bandwidth of the WAN connection changes.
They are more stable and less susceptible to network changes in the interior gateway protocol.

Q.54 What are two ways VLAN memberships can be created in an enterprise network? (Choose two.)

manually configuring the switch ports to be part of a VLAN
allowing the user to choose a specific VLAN through a GUI menu
configuring the switch to allow VLAN membership based on NetBIOS association
implementing an access list that specifies which devices are placed into specific VLANs.
associating MAC addresses to specific VLANs in a VLAN management policy server database
manually configuring the host devices to be part of a VLAN

Q.55 Which two statements are true about RIPv1 and RIPv2? (Choose two.)

Both versions broadcast updates on port 520.
Both versions send the subnet mask as part of the update.
By default, both versions will receive RIPv1 and RIPv2 updates.
Both versions support the features of split horizon and poison reverse
By default, both versions automatically summarize routes.
RIPv1 has a higher AD than RIPv2 has.

Q.56 Which bandwidth allocation technique minimizes bandwidth waste by reallocating unused time slices to communicating users?


Q.57 Refer to the exhibit. What is represented by the Null0 route for the network?

a child route that is defined
a parent route that is defined and sourced from a physical interface
a summary route for advertising purposes, not an actual path
the result of the no auto-summary command on a router

Q.58 If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?

prior to link establishment
during the link establishment phase
before the network layer protocol configuration begins
after the network layer protocol configuration has ended

Friday, January 8, 2010

CCNA Discovery 2 Final Module Exam Answers Version 4.0

Q.1 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server ?


Q.2. Refer to the exhibit. A new branch office has been added to the corporate network and anew router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router ?

branch_23(config-if)# ip address
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
     branch_23(config-if)# ip address
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# ip address
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# ip address
     branch_23(config-if)# no shutdown

Q.3 Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed ? (Choose two.)

Router(config)# enable secret cisco
Router(config)# enable cisco
Router(config)# encryption-password all
Router(config)# enable login encrypted
Router(config)# enable password encryption
Router(config)# service password-encryption

Q.4 A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)

Select the routing protocol to be configured.
Assign an IP address and subnet mask to the interface
Update the ip host configuration information with the device name and new interface IP address.
Configure the routing protocol with the new network IP address.
Configure the routing protocol with the new interface IP address and subnet mask.
Configure the routing protocol in use on all other enterprise routers with the new network information.

Q.5 How does TCP ensure the reliable transfer of data ?

If data segments are not received from the source, the destination requests that the segments be resent.
If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.
TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received
The TCP Protocol Interpreter process verifies the transmitted data at source and destination.

Q.6 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task ?

routable translation
dynamic translation
static translation
port address translation

Q.7 What is the most commonly used exterior routing protocol ?


Q.8 Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name ?

Router# ip hostname Boise
Router# enable hostname Boise
Router(config-line)# name Boise
Router(config)# hostname Boise
Router(config)# ip hostname Boise

Q.9 Why are port numbers included in the TCP header of a segment ?

to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order

Q.10 What is the purpose of the routing process ?

to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

Q.11 Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)

The debug ip rip command displays RIP routing activity in real time.
The debug ip rip command can be issued at the user EXEC configuration mode.
The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands.
Because of router processor usage, the debug ip rip command should be used only when necessary.
The debug ip rip command should be used instead of the show ip route command whenever possible.

Q.12 What minimum configurations must be set on a host to allow a request to be sent to (Choose four.)

DNS server
WINS server
IP address
subnet mask
default gateway

Q.13 A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED ?

The switch has no configuration file in NVRAM.
The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.

Q.14 Refer to the exhibit. Which combination of cables and symbols is correct ?

A - crossover, B - straight-through, C - straight-through
A - crossover, B - rollover, C - straight-through
A - straight-through, B - crossover, C - straight-through
A - straight-through, B - straight-through, C - straight-through
A - straight-through, B - straight-through, C - crossover
A - rollover, B - straight-through, C - straight-through

Q.15 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring ?

data link

Q.16 What are three characteristics of the TCP protocol ? (Choose three.)

exchanges datagrams unreliably
is used to send IP error messages
forces the retransmission of unacknowledged packets
creates a virtual session between end-user applications
carries the IP address of the destination host in the TCP header
is responsible for breaking messages into segments and reassembling them at their destination

Q.17 Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the,, and subnetworks ?

with BGP
with a static route
with a directly connected route
with an interior routing protocol

Q.18 Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1 ?


Q.19 When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use ?

leased line
packet switched
circuit switched

Q.20 A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next ?

Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.

Q.21 A ping command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful ? (Choose two.)

The router will block the ping request message.
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
Workstation B will send a UDP ping reply message to workstation A.
Workstation A will send an ICMP echo request message to workstation B.
Workstation B will send an ICMP echo reply message to workstation A.

Q.22 How does a router know of paths to destination networks? (Choose two.)

inspection of the destination IP address in data packets
ARP requests from connected routers
manual configuration of routes
updates from other routers
DHCP information broadcasts
updates from the SMTP management information base

Q.23 Refer to the exhibit. Which two statements describe the data conversation shown ? (Choose two.)

The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is
The Internet server will send data to port 8547 on the client.

Q.24 What is one purpose of the TCP three-way handshake ?

sending echo requests from the source to the destination host to establish the presence of the destination
determining the IP address of the destination host in preparation for data transfer
requesting the destination to transfer a binary file to the source
synchronizing sequence numbers between source and destination in preparation for data transfer

Q.25 Which type of address is ?

host address
network address
broadcast address
multicast address

Q.26 A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem ?

misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation

Q.27 The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed :

C is directly connected, Serial0/0
R [120/1] via, 00:00:19, Serial0/0
R [120/2] via, 00:00:20, Serial0/1
R[120/2] via, 00:00:20, Serial0/1
C is directly connected, Serial0/1

From which router was this command executed ?

Q.28 Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch ? (Choose two.)

ALSwitch(config)# interface vlan 1
     ALSwitch(config-if)# password cisco
     ALSwitch(config-if)# login
ALSwitch(config)# line vty 0 4
     ALSwitch(config-line)# password cisco
     ALSwitch(config-line)# login
ALSwitch(config)# line vty 0 15
     ALSwitch(config-line)# password cisco
     ALSwitch(config-line)# login
ALSwitch(config)# enable secret class
     ALSwitch(config)# enable password cisco
ALSwitch(config)# interface fa0/1
     ALSwitch(config-if)# password cisco
     ALSwitch(config-if)# no shutdown
ALSwitch(config)# line cons 0
     ALSwitch(config-line)# password cisco
     ALSwitch(config-line)# login

Q.29 A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation ?

the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers

Q.30 Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C ?

RouterA(config)# ip route
RouterA(config)# ip route
RouterA(config)# ip route
RouterA(config)# ip route
RouterA(config)# ip route

Q.31 Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)

Q.32 Refer to the exhibit. The network administrator has configured the RTA and RTB interfaces. In order to allow hosts that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the server LAN and a default route from RTB back to RTA need to be configured. Which two commands will the administrator use to accomplish these tasks on the two routers? (Choose two.)

RTA(config)# ip route
RTA(config)# ip route
RTA(config)# ip route
RTB(config)# ip route
RTB(config)# ip route S0/0/1
RTB(config)# ip route

Q.33 How do port filtering and access lists help provide network security ?

They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.

Q.34 Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice ?

fiber optic

Q.35 What is used by a routing protocol to determine the best path to include in the routing table ?

Convergence time
Default distance
Type of router

Q.36 Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram ? (Choose two.)

Q.37 Given the network shown in the graphic, which subnet mask would accommodate the number of hosts in each subnet ?

Q.38 Which two protocols allow network devices to report their status and events to a centralized network management device ? (Choose two.)


Q.39 What is true regarding the differences between NAT and PAT ?

PAT uses the word "overload" at the end of the access-list statement to share a single registered address.
Static NAT allows an unregistered address to map to multiple registered addresses.
Dynamic NAT allows hosts to receive the same global address each time external access is required.
PAT uses unique source port numbers to distinguish between translations.

Q.40 Refer to the exhibit. The graphic shows the output of a command issued on router RTB. According to the output, what two statements are true of router RTB ? (Choose two.)

The router is connected to a router named Boise.
Router RTB is connected to a Cisco 1841 router.
Router RTB is directly connected to two other routers.
The IP address of the router interface connected to router RTB is
The RTB router is connected to two Cisco devices by Fast Ethernet links.

Q.41 Refer to the exhibit. The network administrator uses the command below to configure a default route to the ISP network :
RTB(config)# ip route
A ping issued from the ISP is successful to router RTB. However, ping echo request packets arrive at a host that is attached to the Fa0/0 interface of RTB, and the replies do not make it back to the ISP router. What will fix this problem ?

The ISP must be configured to forward packets from the network.
The ip route command needs to be edited so that the next hop address is
The ip route command needs to be edited so that the address is the next hop address.
The ip route command should be removed from the RTB router configuration.

Q.42 A network technician is using anetwork management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible ?


Q.43 What are two purposes of DNS ? (Choose two.)

to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system

Q.44 A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network ?

an IDS
an IPS
a host-based firewall
Anti-X software

Q.45 How many host addresses may be assigned on each subnetwork when using the network address with a subnet mask of ?


Q.46 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another ?

destination network address
source network address
source MAC address
well known port destination address

Q.47 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs ?

leased line

Q.48 The command copy tftp running-config has been entered on the router. What will this command do ?
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM

Q.49 Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task ? (Choose two.)

RTB# ipaddress
RTB(config-if)# ip address
RTB(config)# ip address
RTB(config)# no shutdown
RTB(config-if)# no shutdown
RTB(config-if)# ip address

Q.50 Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command ? (Choose two.)

to map the path to
to test reachability to
to locate connectivity problems along the route to
to identify the ISPs that interconnect the NOC with the remote host with the address
to measure the time that packets take to reach and return to the technician's workstation