640-802 ccna question review.pdf

77

Click here to load reader

Upload: kdwillson

Post on 21-Apr-2015

1.492 views

Category:

Documents


19 download

TRANSCRIPT

Page 1: 640-802 CCNA Question Review.pdf

CCNA 640-802Cisco Certified Network Associate

The following questions exhibit the types of questions that exist on the Cisco 640-802 exam. The exam expands 90 minutes which contains approximately 60 questions that are randomly selected from a pool of 631 available questions in total.

Exam TopicsThe following topics are general guidelines for the content likely to be included on the Cisco Certified Network Associate exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe how a network works

• Describe the purpose and functions of various network devices • Select the components required to meet a network specification • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network

• Describe common networked applications including web applications • Describe the purpose and basic operation of the protocols in the OSI and TCP models • Describe the impact of applications (Voice Over IP and Video Over IP) on a network • Interpret network diagrams • Determine the path between two hosts across a network

• Describe the components required for network and Internet communications • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach

• Differentiate between LAN/WAN operation and features

Configure, verify and troubleshoot a switch with VLANs and interswitch communications

• Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts

• Explain the technology and media access control method for Ethernet networks • Explain network segmentation and basic traffic management concepts

• Explain basic switching concepts and the operation of Cisco switches • Perform and verify initial switch configuration tasks including remote access management

• Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands

• Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures

• Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)

Page 2: 640-802 CCNA Question Review.pdf

• Describe how VLANs create logically separate networks and the need for routing between them

• Configure, verify, and troubleshoot VLANs • Configure, verify, and troubleshoot trunking on Cisco switches

• Configure, verify, and troubleshoot interVLAN routing

• Configure, verify, and troubleshoot VTP • Configure, verify, and troubleshoot RSTP operation

• Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.

• Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

Implement an IP addressing scheme and IP Services to meet network requirements in a

medium-size Enterprise branch office network.

• Describe the operation and benefits of using private and public IP addressing • Explain the operation and benefits of using DHCP and DNS

• Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)

• Implement static and dynamic addressing services for hosts in a LAN environment • Calculate and apply an addressing scheme including VLSM IP addressing design to a network

• Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment

• Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).

• Describe IPv6 addresses • Identify and correct common problems associated with IP addressing and host configurations

Configure, verify, and troubleshoot basic router operation and routing on Cisco devices

• Describe basic routing concepts (including: packet forwarding, router lookup process) • Describe the operation of Cisco routers (including: router bootup process, POST, router components)

• Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts • Configure, verify, and troubleshoot RIPv2 • Access and utilize the router to set basic parameters.(including: CLI/SDM) • Connect, configure, and verify operation status of a device interface • Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities

• Perform and verify routing configuration tasks for a static or default route given specific routing requirements • Manage IOS configuration files. (including: save, edit, upgrade, restore)

• Manage Cisco IOS.

• Compare and contrast methods of routing and routing protocols • Configure, verify, and troubleshoot OSPF

• Configure, verify, and troubleshoot EIGRP • Verify network connectivity (including: using ping, traceroute, and telnet or SSH)

• Troubleshoot routing issues

• Verify router hardware and software operation using SHOW & DEBUG commands. • Implement basic router security

Explain and select the appropriate administrative tasks required for a WLAN

• Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)

• Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS) • Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct

access point

• Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)

Page 3: 640-802 CCNA Question Review.pdf

• Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)

Identify security threats to a network and describe general methods to mitigate those

threats

• Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats

• Explain general methods to mitigate common security threats to network devices, hosts, and applications

• Describe the functions of common security appliances and applications • Describe security recommended practices including initial steps to secure network devices

Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch

office network.

• Describe the purpose and types of ACLs • Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)

• Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI) • Verify and monitor ACLs in a network environment • Troubleshoot ACL issues

• Explain the basic operation of NAT • Configure NAT for given network requirements using (including: CLI/SDM) • Troubleshoot NAT issues

Implement and verify WAN links

• Describe different methods for connecting to a WAN • Configure and verify a basic WAN serial connection • Configure and verify Frame Relay on Cisco routers

• Troubleshoot WAN implementation issues • Describe VPN technology (including: importance, benefits, role, impact, components) • Configure and verify a PPP connection between Cisco routers

Page 4: 640-802 CCNA Question Review.pdf

CCNA 640-802

Closest router (extended acl – nearest to source), http, and IN direction.

Show ip ospf database

1. in VTP client mode, a switch is unable to update its local VLAN datase2. Configure a trunk between the switches to forward VTP updates and 3. in VTP transparent mode, a switch will forward the received updates to other switches, but does

not apply update to itself.

Switch1 will add MAC ending E612 to switching table

1. to confine network instability2. to speed up convergence3. to reduce routing overhead

an additional broadcast domain will be created

which three variables (router, protocol port#, acl direction) apply to an extended ACL

that will prevent student02 from securely browsing the internet?

which command is used to display the collection of OSPF link States?

if you are a network admin, how ill you explain VTP configuration to a new technician?

Switch 1 has been restarted and has passed the POST. Host A sends its initial frame

to Host C. What is the first thing the switch will do as regards populating the switching

table? Pict. Below

why do large OSPF networks use a hierarchical design? (choose three)

a switch is configured with all ports assigned to VLAN 2. In addition, all ports are

configured as full-duplex. What is the effect of adding switch ports to a new VLAN on

this switch?

Page 5: 640-802 CCNA Question Review.pdf

DLCI 17 is the layer 2 address used by R2 to describe a PVC to R3

on router 1, configure NAT to translate an address on the 209.165.100.0 /24 network to 192.168.1.10

continued next page!!!

Page 6: 640-802 CCNA Question Review.pdf

router# show cdp neighbor...Device ID Local Interface Platform PortIDBirminham Fas 0//0 2514 E1Relmap Fas 0/1 2621 Fa0/0Boaz S0/0 2501 S0Atlanta S0/1 2620 S0/1

router# show running-configuration!interface FastEthernet0/0ip add 192.168.237.1 /24!interface FastEthernet0/1ip add 192.168.107.1 /24!interface Serial0/0ip add 192.168.66.1 /24!interface Serial0/1ip add 192.168.220.1 /24

The internetwork at company XYZ consists of a single OSPF area as shown. There is a concern that a lack of router resources is impeding network performance. The OSPF DR's need to be known. All the router OSPF priorities are at the default and the router ID are shown with each router. Which routers are likely to have been elected as DR? (choose two)

*** There are two segments, separated by Corp-3 router. Routers Corp-4 and Branch 2 may be elected as DR's. ***Remember, Highest IP assigned to a loopback. If no loopback, highest IP of interfaces. No loopback in this photo.

A network engineer wants to allow a temporary entry for a remote user with specific username and password so that the user can access the entire network over the internet. Which ACL can be used?

Dynamic ACL can be used

Router# config trouter(config)# line vty 0 4router(config-line)# password c1sc0 which user-mode password has just been set????router(config-line)# login (auxiliary, ssh, telnet, console)

Telnet

Page 7: 640-802 CCNA Question Review.pdf

The Ethernet network connected to router R1 has been summarized for router R2 as 192.1.144.0 /20. Which packet destination address will R2 forward to R1, according to this summary? (choose two) of A. 192.1.159.2 B. 192.1.160.11 C 192.1.138.41 D. 192.1.151.254 E. 192.1.143.145 6. F. 192.1.1.144

192.1.159.2 and 192.1.151.254 – A & D (192.1.144.0 to 192.1.159.255)

When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL?

Show ip interface

Total RAM size is 65536 KB “53428 + 12288” for total of (64 MB) and Flash size is 16 MB (16384 bytes)

Page 8: 640-802 CCNA Question Review.pdf

If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5 because Link SpeedsIf RIPv2 is the routing protocol, the path will be from R1 to R5 because of Hop Counts

Abcd.abcd.b002 MAC of R2 and 10.2.0.15 IP of Host A

Page 9: 640-802 CCNA Question Review.pdf

Only use “static route” to send packets with a remote destination network not in the routing table to the “next hop router”. Generally, only use default routing where there exists only one path out of the network.Syntax is “ip route <remote_network> <netmask> <next_hop_address>.In this case, “ip route 0.0.0.0 0.0.0.0 172.16.100.2 “

Which statements describe two of the benefits of VLAN Trunking Protocol? (choose two)

VTP simplifies administration by allowing switches to automatically share VLAN configuration information and...VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.

Switch 1 will flood (broadcast) the data out all of its ports except the port from which the data originated

Page 10: 640-802 CCNA Question Review.pdf

A catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (choose three)

Delete vlan database and... Erase startup configuration and... Restart the switch

“network 172.26.0.0”

For what two purposes does the Ethernet protocol use physically addresses? (choose two)

To uniquely identify devices at layer 2 and... to allow communication between different devices on the same network

Match attributes to Protocol... Drag and Drop.

What are two security appliances that can be installed in a network? (choose two)

DS intrusion detection system and … IPS intrusion protection system

Page 11: 640-802 CCNA Question Review.pdf

/30 ( *.252 subnet) as it will provide a subnet with 2 hosts which is used between two routers on WAN link.

OSPF routing uses AREAS. What are the characteristics of OSPF Areas? (choose three)

Areas may be assigned any number from 0 to 65535 and... Area 0 is called the backbone and... Multiple OSPF Areas must connect to Area 0.

Core_Router is connected to more than one multi-access network. An OSPF router will not form adjacencies to just any router. Instead, a client / server design is implemented in OSPF on each broadcast segment. For EACH multi-access segment, there is a DR and a BDR and DROTHERs If you have 10 VLANs, there are 10 DR's and 10 BDR's. *** Except for WAN links like two routers – Point to Point.

When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host it wants to “talk to” ?

ARP request

A Layer 1 physical problem exists and an incorrect cable is being used

Page 12: 640-802 CCNA Question Review.pdf

What are three advantages of VLANS?

VLANs establish broadcast domains in switched networks and... VLANs allow access to network services based on departments / physical locations and... VLANs can greatly simplify adding, removing, or changing hosts on the networks.

The mapping between DLCI 100 and the end station IP address 172.16.3.1 were learned through inverse ARP.

The IP Address of Host 1 and the MAC address of the Fa0/1 interface on R1

Which two are features of Ipv6?

Multicast and anycast

Which command is used to see the path taken by packets across an IP network?

Trace route

Page 13: 640-802 CCNA Question Review.pdf

Access Control Lists (ACL's) and VLANs

Which protocol provides a method of sharing VLAN configuration between two Cisco switches?

Virtual Trunking Protocol - VTP

Which three of these statements regarding 802.1q trunking are correct?

802.1Q native VLAN frames are untagged by default and... 802.1Q trunks can use 10 MB/s Ethernet interfaces and... 802.1Q trunks should have native VLAN's that are the same at both ends

Which name describes an Ipv6 host-enabled tunneling technique that uses Ipv4 UDP, does not require dedicated gateway tunnels, and can pass through existing Ipv4 NAT gateways?

Teredo …. NOT dual stack, manual 6to4 or dynamic

Which of the following describes the roles of devices in a WAN? (choose three)

A CSU / DSU terminates a digital local loop, a modem terminates an analog loop, and... a router is commonly considered a DTE device

In which solution is a router ACL used?

Filtering packets that are passing through a router

What will happen if a private IP address is assigned to a public interface connected to an ISP?

Addresses in a private range will not be routed on the internet backbone

Which Cisco router IOS commands can be used to troubleshoot LAN connectivity problems?

Ping and... show ip route and... show interfaces

What is the effect of using the service password-encryption command on Cisco switches?

It will encrypt all current and future passwords

Page 14: 640-802 CCNA Question Review.pdf

Switch A is not the root bridge, becaue not all of the interface roles are identified

When a DHCP server is configured, which two IP addresses should never be assignable to hosts?

Network or subnet IP address and... a broadcast address on the network

The Hello and Dead Interval timers are not set to same on all devices. *** the values of these needs to match on all OSPF routers – area #, Hello and Dead intervals, OSPF passwords, Area Stub Flag, and MTU size

Which two security appliances will you use in a network?

IDS and IPS

Page 15: 640-802 CCNA Question Review.pdf

Incorrect IP Address assignment. Must have been statically assigned, incorrectly.

Which command can you use to determine the Cisco IOS feature set on a Cisco router?

Show version

Devices will be able to use SSH but not Telnet

Page 16: 640-802 CCNA Question Review.pdf

What is the OSPF default frequency, in seconds, at which a cisco router sends HELLO packets on a multi-access network?

10 seconds

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets?

Neighbor table and Topology table

Which two benefits are provided by using a hierarchical addressing network addressing scheme? (choose two)

It reduces routing table entries and... ease of management / troubleshooting

The number of broadcast domains would remain the same and... the number of collision domains would increase

What value is primarily used to determine which port becomes the ROOT port on each Non-Root switch in a Spanning

Page 17: 640-802 CCNA Question Review.pdf

Tree topology?

Path Cost

Domain Names are different

Which of the following correctly describe steps in the OSI data encapsulation process? (choose two)

Transport Layer divides a data stream into segments and may add reliability and flow control informationPackets are created when the network layer adds Layer 3 addresses and control information to a segment

London# show vtp status Madrid# show vtp status

vtp version 2 2

configuration revision 0 0

max vlan support 64 64

number of existing vlans 5 5

vtp mode server server

vtp domain name london madrid

vtp pruning mode disabled disabled

vtp v2 mode disabled disabled

vtp traps disabled disabled

A network administrator has configured two switches, named London and

Madrid, to use VTP. However, the switches are not sharing VTP messages.

Given the command output. Why are the switches not sharing VTP

messages?

Page 18: 640-802 CCNA Question Review.pdf

When running OSPF, What would cause router A not to form an adjacency with router B?

The Dead Interval timers are different … NOT Because of --- loopback address are on different subnets, or router summarization is enabled, or the process identifier is different between the routers.

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over Fast Ethernet?

802.1 Q

Page 19: 640-802 CCNA Question Review.pdf

What is the maximum data rate specified for IEEE 802.11b WLANs?

11 Mbps

An administrator issues the command ping 127.0.0.1. If a reply is received, what does this confirm – from a PC?

The PC has the TCP/IP protocol stack installed correctly

Which two protocols are used by bridges and / or switches to prevent loops in a layer 2 network?

802.1d (STP) and STP

The subnet mask used is 255.255.255.128 (172.16.1.0, 172.16.1.128, 172.16.2.0, 172.16.2.128...)The IP address 172.16.1.125 can be assigned to hosts in VLAN 1The LAN interface of the router is configured with multiple addresses

If IP Routing is enabled, which two commands sets the gateway of last resort to the default gateway? (choose two)

Ip default-gateway 0.0.0.0ip route 0.0.0.0 0.0.0.0 172.16.2.1

Which Cisco IOS command can disrupt the operation of a router under high-load conditions?

Debug All

On the network 131.1.123.0 /27, what is the last IP address that can be assigned to a host?

131.1.123.30 (subnets are blocks of 32... subnets are 131.1.123.0, *.32, *.64, *.96, *.128...)

Page 20: 640-802 CCNA Question Review.pdf

Which command will create a default route on Router B to reach all networks beyond Router A?

Ip route 0.0.0.0 0.0.0.0 192.168.2.2

The network default gateway applying to a host by DHCP is 192.168.5.33 /28. Which option is the valid IP address of this host? 192.168.5.55 or 192.168.5.47 or 192.168.5.40 or 192.168.5.32 or 192.168.5.14

192.168.5.40

SwtichA, Fa0/2 is designatedSwitchA, Fa0/1, is rootSwitchD, Gi0/2 is root

Which command can be used from a PC to verify connectivity between hosts that connect through a switch in the same LAN?

Ping address

Page 21: 640-802 CCNA Question Review.pdf

If Fa0/0 is down on R1, Host A cannot access Server 1

QoS policies are applied on the switches of a LAN. Which type of command will show the effects of the policy in real time?

Debug command

Which two link protocols are used to carry multiple VLANs over a single link? (choose two)

802.1q and ISL. Trunking protocols... ISL is Cisco's

Any packet destined for a network that is not referenced in the routing table of R2 will be directed to R1. R1 will then send packet back to R2, and is a LOOP!!! a big problem! Default route should reference Serial 0/1 and not Serial 0/0 interface on R1.

Page 22: 640-802 CCNA Question Review.pdf

LMI protocol, a datalink protocol, is used in this network with Frame Relay. Answer is FRAME RELAY protocol.

What should be done prior to backing up an IOS image to a TFTP server? (choose three)

Make sure the server can be reached across networkAssure network server has space requiredVerify the file name and path requirements

Which two statments are true of Ipv6 address representation? (choose two)

A single interface may be assigned multiple Ipv6 addresses of any typeEvery Ipv6 interface contains at least one loopback address

An administrator attempts a traceroute but receives “Destination Unreadable” message. Which protocol is responsible for that message?

ICMP

An administrator cannot establish a Telnet session with the indicated router.Why?

hostname routerenable secret $1223baserreeinterface fastethernet0/0ip address 192.168.1.1 255.255.255.0ip access-group 101 in!access-list 101 deny tcp any any eq 22access-list 101 permit ip any any!line con 0password 749849494loginline vty 0 4loginline vty 5 14login!

A VTY password is missing

Page 23: 640-802 CCNA Question Review.pdf

How do you determine what switch sent VLAN information?

On switch in question, perform “show vtp status” to identify “last modified by”Perform “show cdp neighbor detail” command to map IP to switch name

Which three statements about VTP features are true? (choose three)

VTP minimizes misconfigurations and configuration inconsistenciesClient, Server, and Transparent are valid VTP modesVTP pruning is used to increase available bandwidth in trunk links

Only Host A will be allowed to transmit frames on fa0/1All frames arriving on 2950Switch with destination address of 0000.00aa.aaaa will be forwarded out fa0/1

The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely cause of the problem?

Page 24: 640-802 CCNA Question Review.pdf

Username / password is incorrectly configured

How many paths can EIGRP routing process use to forward packets from HQ_Router to a neighbor router?

HQ_Router# show ip protocolsRouting Protocol is "eigrp 109"

Outgoing update filter list for all interfaces is not setIncoming update filter list for all interfaces is not setDefault network flagged in outgoing updatesDefault network accepted from incoming updatesEIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0EIGRP maximum hopcount 100EIGRP maximum metric variance 3Redistributing: eigrp 109EIGRP NSF-aware route hold timer is 240sAutomatic netowrk summarization is not in effectMaximum path: 4Routing for Networks:20.10.10.0 /24172.30.10.0 /24Routing Information Sources:Gateway Distance Update192.168.1.190 00:13:12172.16.10.290 01:13:06

HQ_Router#

4 unequal cost paths

Page 25: 640-802 CCNA Question Review.pdf

If a Cisco router has learned about network 10.1.1.0 from multiple sources, the router will select and install only one route. What is the preferences, in order 1st, 2nd, 3rd, 4th, and 5th?

What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?

Router# show access-listsExtended IP access list 110 10 deny tcp 172.16.0.0 0.0.255.255 any eq telnet 20 deny tcp 172.16.0.0 0.0.255.255 any eq smtp 30 deny tcp 172.16.0.0 0.0.255.255 any eq http 40 permit tcp 172.16.0.0 0.0.255.255 any

Traffic will be dropped, because of the “implicit deny” at end of ACL. Line 30 only denies HTTP traffic originating from 172.16.0.0

Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?

Data Link Layer (2)

Because of Split Horizon rule, R2 will be prevented from sending erroneous information to R1 about connectivity to 192.168.1.0 networkWhen R2 learns from R1 that the link is down, R2 will respond by sending a route back to R1 with an infinite metric to 192.168.1.0 network. *** RIP doesnt advertise routes back out the interface in which they came.

Page 26: 640-802 CCNA Question Review.pdf

Router 3, HTTP and IN direction for ACL

Which three elements must be used when you configure a router interface for VLAN trunking? (choose three)

Subinterface encapsulation identifiers that match VLAN tagsOne IP Network or Subnet for each subinterfaceOne subinterface Per VLAN

After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table?

Router_1# show ip protocolsrouting protocol is "rip" sending updates every 30 seconds, next due in 8 seconds invalid after 180 seconds, hold down 180, flushed after 240 outgoing update filter list for all interfaces is not set incoming update filter list for all interfaces is not setRouter_1#

60 seconds

What is the principle reason to use a private IP address on an internal network?

Conserve public IP addresses so that we do not run out of them

Page 27: 640-802 CCNA Question Review.pdf

Which of the following are true regarding the debug output? (choose two)

Router1#1d05h RIP sending v1 update to 255.255.255.255 via FA0/0 (172.16.1.1)1d05h RIP building update entries1d05h network 10.0.0.0 metric 1 (<-------- DIRECTLY CONNECTED)1d05h network 192.168.1.0 metric 21d05h RIP sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1)1d05h RIP building update entries1d05h network 172.16.0.0 metric1 (<-------- DIRECTLY CONNECTED)1d05h RIP received v1 update from 10.0.15.2 on Serial0/01d05h 192.168.1.0 1 hops1d05h 192.168.0 in 16 hops (inaccessible)

This router was configured with commandsrouter ripnetwork 172.16.0.0network 10.0.0.0and...Network 10.0.0.0 will be displayed in the routing table

SwX was removed. It will be reconnected to the FA0/16 port of Sw-AC3. What happens to the network when it is reconnected and a trunk exists between the two switches?

The pre-existing VLANs (servers, management, production, and no-where)on Sw-AC3 will be removed because Sw-AC3 is configured as a VTP client. Connecting SwX (a VTP server) into Sw-AC3 Fa0/16 will override VLAN configuration.

Which two statements best describe the wireless security standard that is defined by WPA ((not WEP))(choose two)?

It specifies the use of dynamic encryption keys that change each time a client establishes a connectionIt includes authentication by PSK

Compare OSPF and EIGRP

EIGRP: is vendor specific & default admin distance of 90OSPF: elects a DR on each multiaccess network & uses COST as its metric

What command is used to configure a default route?

Ip route 0.0.0.0 0.0.0.0 Gateway_IP example, ip route 0.0.0.0 0.0.0.0 192.168.1.1

How are VTP advertisements delivered to switches across the network?

Multicast frames every 5 minutes as a multicast in 224.x.x.x range

In an Ethernet network, under what two scenarios can devices transmit? (choose two)

When they detect no other devices are sending (CSMA/CD)when the medium is idle

How does a DHCP server dynamically assign IP addresses to hosts?

Addresses are leased to hosts and kept by a lease assignment time period.

Page 28: 640-802 CCNA Question Review.pdf

** NEED TO LEARN MORE ABOUT THIS **

Ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 19

Match OSPF LSA's on left to area types on right

Stub = lsa 1,2,3NSSA = lsa 1,2,3, 7Backbone of Transit = lsa 1,2,3,4,5Totally NSSA = lsa 1,2,7Totally Stubby = lsa 1,2

Which parameter can be tuned to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

Administrative Distance

What are three Ipv6 transition mechanisms?

6to4 tunneling, ISATAP tunneling, Teredo Tunneling

What information can be used by a router running a link-state protocol to build and maintain its topological database?

Hello Packets and Link State Advertisements from other routers

Page 29: 640-802 CCNA Question Review.pdf

The IP Address of Host B and the MAC address of Router 1 Fa0/0

The IP Subnet Zero command is not configured. What would be the IP Address of Ethernet0/0 using the 1st available address from the 6th subnet of the network 192.168.8.0 /29

Subnets are: *.0, *.8, *.16, *. 24, *.32, *.40, *.48, *.56... do not count the 1st subnet as its not configured to be used.192.168.8.49 is the 1st usable address in the 6th subnet1

What is one benefit of PVST+

PVST+ allows the Root switch location to be optimized per VLAN

What does the “Frame-Relay interface-dlci command configure?”

Local DLCI on the SubInterface

Page 30: 640-802 CCNA Question Review.pdf

Which command is used to copy the configuration from RAM into NVRAM

Copy running-config startup-config

R1 will strip off source MAC and replace it with MAC on forwarding FastEthernet interface Fa0/2R1 will strip off destination MAC and replace it with MAC of Host BR1 will forward data frame out interface Fa0/2

WAN Link Types (advantages & disadvantages)

P2P Advantage = qualityP2P Disadvantage = limited flexabilityCircuit Switched Advantage = CostCircuit Switched Disadvantage = low speed

Show interfaces ethernet 0. what is meaning of MTU 1500 bytes?

The maximum packet size (not frame size, or segment size) that can traverse the interface is 1500 bytes

Page 31: 640-802 CCNA Question Review.pdf

a network associate is adding security to the configuration on Corp 1 router. The user on Host C should be able to use a web browser to access financial data from finance web server.

No other hosts from the LAN nor Core should be able to use a web browser to access this server. Since there are multiple resources, ALL other traffic is allowed.

Task is to create and apply an access-list with no more than three lines that allows only Host C web access to finance server.

password= ciscoCore 192.18.196.65A 192.168.33.1B 192.168.33.2C 192.168.33.3D 192.168.33.4Servers 172.22.242.17 to 172.22.242.30 Computers 192.168.33.1 to 192.168.33.254Finance Server 172.22.242.23

Corp1 Routerenableconfigure terminalaccess-list 100 permit host 192.168.33.3 host 172.22.242.23 eq 80access-list 100 deny tcp any host 172.22.242.23 eq 80access-list permit ip any anyshow ip interface brief (to identify type & number)interface fa0/1no ip address 192.168.x.x 255.x.x.xip address 172.22.242.30 255.255.255.240ip access-group 100 outendcopy running-configuration startup-configurationshow ip interface brief

Page 32: 640-802 CCNA Question Review.pdf

The diagram shows a topology using static routes. If we change from static routing and use RIP v2, what will need to be done to use RIP v2.?

Configure the S0/0 on R1 as two SubInterfaces, and... configure Point-to-Point links to R2 and R3

A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 10, 15 on Sw11 cannot communicate with hosts in same VLAN on Sw12. Hosts in the Admin VLAN are able to communicate. What is the problem?

The link connecting the switches has not been configured as a Trunk...

Which term describes the process of encapsulating Ipv6 packets inside of Ipv4 packets?

tunneling

Which command shows your active telnet connections?

Show session

Page 33: 640-802 CCNA Question Review.pdf

Serial0/1 is up, line protocol is up = port is operationalSerial0/1 is up, line protocol is down = layer 2 problemSerial0/1 is down, line protocol is down = layer 1 problemSerial0/1 is administrator down, line protocol is down = port is disabled with “shutdown” command

A network admin must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?

Switchport port-security mac address sticky command on all ports that have end devices connected on them

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing. OSPF has been configured on the router. Which statement about this network is true?

Direct inter-vlan communication does not require OSPF

What are three characteristics of the OSPF routing protocol?

It converges quicklyit uses Cost to determine best routeOSPF routers discover neighbors before exchanging routing information

What command is used to display the collection of OSPF link states?

Show ip ospf database

Which PPP sub-protocol negotiates authentication options?

LCP

Which command reveals the last method used to power cycle a router?

Show version

Which command allows hosts on Branch to communicate with hosts on HQ LAN?

HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6

A switch is configured with all ports assigned to VLAN 2, full duplex. What is the effect of adding switch ports to a new VLAN on the switch?

An additional broadcast domain will be created

What two statements describes the Cisco implementation of VLANs?

VLAN 1 is the default VLANVLANs 1002 – 1005 are automatically created and cannot be deleted

Page 34: 640-802 CCNA Question Review.pdf

What is the function of the command “switchport trunk native vlan 999” on a Cisco Catalyst switch?

It designates VLAN 999 for untagged traffic (all NON-TAGGED traffic is sent through native vlan)

Running both Ipv4 and Ipv6 on a router is known as what?

Dual-stack routing

Which command is used to enable CHAP authentication with PAP as the fallback on a serial interface?

router(config)# ppp authentication chap pap

A new subnet with 60 hosts has been added. Which subnet address should this network use to provide enough usable addresses while wasting the fewest?

192.168.1.64 /26

Which of the following are true regarding bridges and switches? (choose two)

A switch is a multiport bridgeBridges and Switches learn MAC by examining the Source MAC of each frame recieved

Which ports will STP designate if all the links are operating at same bandwidth? (choose three)

Switch A – Fa0/1...SwitchB – Fa0/0...Switch B – Fa0/1

Page 35: 640-802 CCNA Question Review.pdf

What is most likely the reason that interface Fa0/10 is not the root port for VLAN2?

The switch interface has a higher path cost to the root bridge than another in the topology

During the data transmission between hosts over a network, which process does the data experience?

Encapsulation

Which of the following are types of flow control? (choose three)

Buffering...windowing...congestion avoidance

Host A cannot ping Host B. What could be the cause of the problem?

The serial interface on the routers are not in same subnet

What can be determined from the line of “show ip route”R 10.10.10.8 [120 / 2] via 10.10.10.6, 00:00:25, Serial0/1

The route is using default administrative distance... and 10.10.10.8 network is two hops away from this router

Two switches are connected through a trunk link. Which two commands show that there is a native vlan mismatch?

Show interface switchport and … show interface trunk

Which three layer 2 encapsulation types would be used on a WAN rather than a LAN?

HDLC, PPP, and Frame Relay

Page 36: 640-802 CCNA Question Review.pdf

Which command is used to create a Static Map to S-AMER router?

Frame-relay map ip 172.30.0.3 196 Broadcast

Allows access to high level testing commands such as debug - enableAllows access to configuration commands that affect system – config tSets the system name - hostnameActivates the interface configuration mode for VLAN – interface vlan 1Enables the switch management interface – no shutdownSets the switch management IP address – ip address Allows the switch to be managed from remote networks – ip default-gateway

Which two states are the port states when RSTP has converged?

Learning and... forwarding

Which statements about vlan operation on cisco switch is true?

Unknown unicast frames are retransmitted only to the ports that belong to the same vlan

What is the effect of the configuration below?Line vty 0 4password 7 030875400logintransport input ssh

It configures the use of SSH on incoming virtual terminals

Page 37: 640-802 CCNA Question Review.pdf

Which component of VPN technology ensures data can be read only by its intended recipient?

authentication

Assuming the default configuration which vlan can be added, modified and removed from a cisco switch?

2 through 1001

router(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1

MAC 0000.00aa.aaaa does not need to be learned by the switchMAC 0000.00aa.aaaa will be listed in the MAC table for interface fa0/1

What are two characteristics of telnet?

It sends data in clear text... and... it requires destination device to support a telnet session

Which term describes a spanning-tree network that has all switch ports in either blocking or a forwarding state?

converged

How can you erase the VTP database of VLANs on a Cisco IOS switch running in VTP server mode?

SwitchA# erase vlan dat ...and then reboot

A newly created network needs 300 subnetworks and a maximum of 50 hosts per subnet for a Class B addressing scheme. Which m subnet mask is appropriate to accommodate the need?

255.255.255.128 or 255.255.255.192

At which layer of the OSI model do WANs operate?

Layer 2 the Data Link and layer 1 the physical layer

An inbound access list is applied to a serial interface to deny packet entry for TCP and UDP ports 21, 23, and 25. What types of packets wil be permitted by this ACL?

HTTP, POP3, and DNS

The output shown below. Which three statements are true?

keith
Page 38: 640-802 CCNA Question Review.pdf

The Bridge priority is lower than the default value of 32768... All deisgnated ports are in a forwarding state This switch must be the root bridge for all vlans on this switch

Which two data integrity algorithms are commonly used in VPN solutions?

HMAC-SHA-1 … and HMAC-MD5

Which of the following are associated with the application layer of the OSI model?

Telnet and FTP

Which of the following describe the process identifier that is used to run OSPF on a router? (choose two)

It is locally significatntIt is needed to identify a unique instance of an OSPF database

A network admin wants to know every hop the packets take when accessing cisco.com. Which command is the most appropriate?

Traceroute cisco.com

Which Cisco feature automatically disables the port in an operational PortFast upon a receipt of a BPDU?

BPDU Guard

What commands are used to configure RIP v2 on router B?

Page 39: 640-802 CCNA Question Review.pdf

RouterB(config)# router ripRouterB(config)# version 2RouterB(config)# network 172.16.0.0RouterB(config)# network 10.0.0.0

Host 1 cannot receive packets from Host 2. Assuming RIP v1 is the routing protocol, what is wrong with the IP communication?

The fa0/1 network on R2 overlaps with LAN attached to R1Host 2 has been assigned the incorrect subnet mask

Which address and subnet mask represents a summary of the routes learned by EIGRP?

Gateway of last resort is not set 192.168.25.0 /30 is subnetted, 4 subnetsD 192.168.25.20 [90/2681856] via 192.168.15.5, Serial0/1D 192.168.25.16 [90/1823638] via 192.168.15.5, Serial0/1D 192.168.25.14 [90/3838223] via 192.168.15.5, Serial0/1C 192.168.15.4 /30 is directly connected Serial0/1C 192.168.2.0 /24 is directly connected, FastEthernet0/0

192.168.25.16 255.255.255.240

Page 40: 640-802 CCNA Question Review.pdf

What will happen if Host 1 sends a broadcast?

Host 2 and the Fa0/0 on R1 will receive the broadcast. Routers break up broadcasts domains and do not forward broadcasts, by default. However, routers can forward them if configured to do so.

What can be determined about the router from the console output?

1 FastEthernet / IEEE 802.3 interfaces125K bytes of non-volatile configuration memory65536K bytes of ATA PCMCIA at slot 08192K of Flash internal SIMM---- system configuration dialog ----Would you like to enter initial configuration dialog [yes / no]

No configuration was found in NVRAM

What are possible reasons why “destination host unreachable” reply when attempting to ping?

A link is down / missing between the two end devices

If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt?[0] go to IOS command prompt without saving this config.[1] return back to setup without saving this config.[2] save this configuration to nvram and exit.

Setup is addidtive and any changes will be added to the configuration script.

Which command sets and automatically encrypts the privileged enable mode password?

Enable secret C1sc0

As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?

The WAN encapsulation type has changed at layer 2 (for WAN services) and...The Source & Destination MAC address have changed

Which IP address can be assigned to an internet interface?

9.255.255.10 a public IP. IP address in private range cannot be assigned; 10.0.0.0 – 10.255.255.255, 172.16.0.0 to 172.131.255.255, and 192.168.1.0 to 192.168.255.255...

Page 41: 640-802 CCNA Question Review.pdf

Why do pings fail between hosts on 172.16.2.0 /25 and 172.16.2.128 /25 network?

Split Horizion is preventing R2 from learning about the R3 networks, and R3 from learning about R2 networks.

Which two statements apply to dynamic access lists?

You can set a time-based security poligy... and... they are used to authenticate individual users

How many address for hosts will the network 124.12.4.0 /22 provide?

1022 usable host address exists... (physically there is 1024 but 2 are not used; subnet & broadcasts)

What would be the effect of issuing the command IP Access-Group 115 on a Serial0/0/1 interface?

No host could connect to Router through S0/0/1

What is the most efficient route summarization that R1 can use to advertise its network to R2?

172.1.4.0 /22 (172.1.4.0 255.255.252.0)

Which routing protocols will support the following ip addressing scheme?

192.168.10.0 /26192.168.10.64 /27192.168.10.96 /27192.168.10.128 /30192.168.10.132 /30

RIPv2, EIGRP, and OSPF all support “classless” IP schemes... RIP v1, IGRP do not as they are “classfull”

keith
Page 42: 640-802 CCNA Question Review.pdf

What information will Router E contain in its routing table for subnets 208.149.23.64 and 208.149.23.96?

208.149.23.64 [110/13] via 190.173.23.10 FastEthernet0/0 *** router E is 1 more hop away from A, which has 12.208.149.23.96 [110/13] via 192.173.23.10 FastEthernet0/0

Page 43: 640-802 CCNA Question Review.pdf

Inverse ARP *** local DLCI must be mapped to destination routers IP address. In this case, there are two options; one being Inverse ARP or two, being a static mapping. By default, inverse arp runs on Frame Relay when its enabled.

To enable a static mapping:R1(config)# interface serial0R1(config-if)# no frame-relay inverse-arpR1(config-if)# frame-relay map ip 200.1.1.2 122 broadcastR1(config-if)# frame map ip 200.1.1.3 123 broadcast

Which pairing reflects a correct protocol and metric relationship?

RIPv2 and number of hop counts

A “request timeout” displays when attempting to ping form a PC. At which layer of the OSI model does the problem most likely exist?

Network Layer, Layer 3

Matching...

a router is this type of device = DTEthe most common type of virtual circuit = PVCprovides status messages between DTE and DCE device = LMIIdentifies the virtual connection between the DTE and the Switch = DLCI (a frame relay switch from carrier)

router(config)# line vty 0 4router(config-line)# password c1sc0router(config-line)# no loginWhat is the result of setting no login command?

Telnet access is denied

What is the alternative notation for the Ipv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72 ?

B514:82C3::0029:EC7A:0:EC72 (a double colon :: represents a string of 0's)

When you are troubleshooting an ACL issue, which command can help you verify which interfaces are affected by ACL?

Command “show ip interface” whereas “show ip access-lists” does not show interfaces that are affected.

How many subnets can be gained by subnetting 172.17.32.0 /23 into a subnetmask of /27, and how many are usable per subnet?

16 subnets with 30 hosts on each subnet

Page 44: 640-802 CCNA Question Review.pdf

Which type of attack is characterized by flood of packets that are requesting a TCP connection to a server?

Denial of Service “DoS”

Which subnet mask will place ALL hosts on Network B in same subnet with the least amount of wasted addresses?

255.255.254.0 will accommodate serial links between the two routers; each having 1 ip for that link.

router# show frame-relay lmi

LMI Statistics for interface S0/0 (frame relay DTE) LMI Type= ANSIinvalid unnumbered info 0 invalid Prot Disc 0invalid dummy call ref 0invalid Msg Type 0invalid status message 0 invalid Lock Shif 0invalid information ID 0 invalid Report IE 0invalid Report Request 0 invalid Keep IE 0Num Status Enq. Sent 61 Num Status msg Rec 0Num update Status Rcvd 0 Num Status Timeout 60

Which two statements are true based on this output?

LMI messages are being sent on DLCI 0 …. and Frame Relay switch is not responding to LMI requests from the routerif Cisco's LMI was used, the TYPE is 1023 and not ANSI

What are two characteristics of Frame-Relay Point-to-Point subinterfaces? (choose two)

They require a unique subnet within a routing domain... and... they emulate leased lines

Which two statements are true about the command “ip route 172.16.3.0 255.255.255.0 192.168.2.4? (choose two)

It establishes a static route to the 172.16.3.0 network... and … it uses default administrative distance even though its omitted in the command.

Which two values are used by Spanning-Tree Protocol to elect a root bridge?

Bridge priority... and … MAC address (switches having lowest Bridge ID become Root bridge) determine by 32768 and MAC.

A company has a small network of a single router and switch. There are two VLANs, and "router-on-a-stick" is being configured for inter-vlan routing. A trunk is configured between switch and router.What is the minimum number of router subinterfaces that are required for all the vlans to communicate?

Two (2)... a interface / subinterface for each vlan is needed!!!

Which device might be installed at a branch office to enable and manage an IPSec site-to-site VPN?

Cisco Adaptive Security Appliance “ASA”

Matching...

Blocks unknown MAC address from accessing a WLAN = IDSDetects software designed to capture sensitive information & removes it from computer = AntiSpywarePrevents known malicious programs from being installed on PCs = AntivirusIdentifies malicious network traffic and alerts network personnel = Firewall

Page 45: 640-802 CCNA Question Review.pdf

Which two statements are true?

There are 7 interfaces with differing VLANs on Fa0/1. This means it must be a Trunk Port to accommodate VLANsInt Fa0/5 has two entries in MAC table, yet doesnt show in cdp neighbor command. It must be connected via Hub.

Which rule does the DHCP server use when there is an IP address conflict?

The address is removed from the pool until the conflict is resolved

What is the default routing update for RIPv2?

30 seconds

Page 46: 640-802 CCNA Question Review.pdf

Switch A does not have an IP Address

Which two statistics appear in “show frame-relay map”? (choose two)

Status of PVC that is configured on the router... and … the value of the local DLCI#

Given the address 192.168.20.19 /28, which of the following are valid host addresses on this subnet?

192.168.20.29... and … 192.168.20.17

What IP address would you ping to ping a loopback address on a PC?

127.0.0.1

Which protocols are found in the network layer of the OSI model, and are responsible for path determination and traffic switching?

routing

Page 47: 640-802 CCNA Question Review.pdf

3

199.99.9.57

A router interface is configured for Frame Relay. The router will not accept the command to configure LMI type. What is the problem?router(config-if)# frame-relay lmi-type cisco ^% unrecognized command

The interface requires the “encapsulation frame-relay” command be entered 1st.

Page 48: 640-802 CCNA Question Review.pdf

The LakeSide Co. admin wants to reduce the routing table on Central router. Which partial table entry represents a route summary for the LAN in Phoenix but no additional subnets?

10.0.0.0 /22 is subnetted, 1 subnetD 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

The IP's between routers is incorrectly assigned on Brevard

How many bits are contained in each field of an Ipv6 address?

16

What is the result of issuing the “frame-relay map ip 192.168.1.2 202 broadcast” command?

Defines the DLCI# that is used for all packets that are sent to the 192.168.1.2 address

What are two benefits of using NAT?

NAT protects network security because private networks are not advertisedNAT eliminates the need to re-address all hosts that require external access

Page 49: 640-802 CCNA Question Review.pdf

Which command enhances the 802.1d convergence time on ports that are connected to hosts?

Spanning-tree portfast

How should a router that is being used in Frame-relay be configured to avoid split-horizon issues from preventing routing updates?

Configure a separate sub-interface for each PVC with unique DLCI and subnet assigned to the sub-interface

#231

The web server uses 209.165.200.225 as DA and 3648 as destination port when sending packets to host A

Which two statements describe the advantages to the use of RIP over the use of OSPF?

RIP is less complex to configure … and … RIP demands fewer router resources; cpu & memory

A network admin is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meets the requirements with fewest subnets and host ip addresses?

10.10.0.0 /25 subnetted with 255.255.255.252

Which command would correctly configure a serial port on a router with the LAST usable host address in 192.216.32.32 /29 subnet?

router(config-if)# ip address 192.168.32.38 255.255.255.248

What two reasons has the router loaded its IOS from the location that is shown... 0x2102

Router 1 has specified boot system commands that instruct it to load IOS from TFTP server

Page 50: 640-802 CCNA Question Review.pdf

Router 1 cannot locate a valid IOS image in flash memory

How should the Fa0/1 ports on 2950 switches be configured to allow connectivity between all devices?

SwitchX(config)# interface fa0/1 SwitchX(config-if)# switchport mode trunk a trunk port needs to be made

Dubai# show frame-relay map

int fa0/0no ip add!int s1/0ip add 172.30.0.1 255.255.255.240encapsulation frame-relayno fair-queue!int S1/1ip add 192.168.0.1 255.255.255.252!int S1/2ip add 192.168.0.5 255.255.255.252

The serial connection to the MidEast branch office is using “default” serial encapsulation

The command “frame-relay map ip 10.121.16.8 102 broadcast” was entered on a router. Which of the following statement is true?

Page 51: 640-802 CCNA Question Review.pdf

The broadcast option, allows packets such as RIP updates, to be forwarded across the PVC.

ACL 102access-list 102 deny tcp 172.21.1.1 0.0.0.255 any eq 80access-list 102 deny ip any any

an attempt to block www traffic prevented all traffic from the subnet to be blocked. How do you remove the 102 ACL?

“no ip access-group 102 out”

Which two are advantages of static routing when compared to dynamic routing?

Routing traffic load is reduced in stub network linksSecurity increases because only the admin may change the routing table

Communication between host 1 and host 2 over the ppp wan, which protocol is represented by dashed line A?

IP

Which command would you configure globally on a router to allow you to view directly connected Cisco devices?

Cdp run

Page 52: 640-802 CCNA Question Review.pdf

A network admin designed a redundant network. All devices in same VLAN. What conclusion can be made?

The router will not accept the addressing scheme

What three statements are true about how router Jax will choose a path to 10.1.3.0 /24 when differing routing protocols are configured?

By default, if RIPv2 is the routing protocol, only the path JAX – ORL will be installed in routing tableWhen EIGRP is routing protocol, the equal cost paths JAX-CHI-ORL and JAX-NY-ORL will be installed into tableWith EIGRP and OSPF, EIGRP paths will be installed into routing table

How do you ensure a particular switch will become the root bridge in STP environment?

Lower the bridge priority on switch 1 from 32768 to some number lower.

A network interface port has collision detection an carrier sensing enabled on a shared twisted pair network. What is known about the network interface?

This is an Ethernet port operating at half duplex. *** remember, Full Duplex has noCSMA/CD because it doesn't need it.

Page 53: 640-802 CCNA Question Review.pdf

Which command shows system hardware and software version information?

Show version

You are working in a data center and are assigned the address range 10.188.31.0 /23. You are asked to develop an IP address plan to allow the maximum number of subnets with 30 hosts each. What IP address assignment is this?

10.188.31.0 /27 (255.255.255.224)

How many interfaces on R1 should be configured as “ip nat inside” to grant external access to the entire network?

3

Which approach should you use to configure the extended VLAN range (1006 to 4094) on Cisco Catalyst 3750 Switch?

Conifgure the switch to be in the VTP transparent mode

What are two results of entering the Switch(config)# “vtp mode client” command on a switch?

The switch will forward vtp summary advertisementsThe switch will process vtp summary advertisements

What command sequence will enable PAT from the inside to outside network?

Ip nat pool MICH-NET 1.2.4.10 1.2.4.240 netmask 255.255.255.0!interface ethernet 1 description ISP connection ip address 1.2.4.2 255.255.255.0 ip nat outside!interface ethernet 0 description Ethernet to Firewall eth0 ip address 10.10.0.1 255.255.252.0 ip nat inside! access-list 1 permit 10.0.0.0 0.255.255.255

(config)# ip nat inside source list 1 interface ethernet 1 overload

Page 54: 640-802 CCNA Question Review.pdf

R1(config)# int eth0 R1(config)# in serial 0 R1(config) router rip

Ip add 192.1.1.129 255.255.255.192 Ip add 192.1.1.6 255.255.255.252 Version 2

No shutdown No shutdown Network 192.1.1.0

What is the purpose of the Cisco VLAN trunking protocol?

To allow for managing the additions, deletetions, and changes of VLANs between switches

If the router ID has not been manually set, what router ID will OSPF use for the router?

Highest IP Address of a loopback. If not loopback, then highest IP of all other interfaces

Why would the administration configure RA in this manner?

To prevent students from accessing the command prompt on router RA

A Cisco router is booting and has completed POST. It is now ready to find and load an IOS image. What function does the router perform next?

It checks the configuration register

What two things will a router do when running a distance vector routing protocol?

Send periodic updates regardless of topology changesUpdate the routing table based on updates from their neighbors

Page 55: 640-802 CCNA Question Review.pdf

By default, all ports on a Cisco switch are assigned to VLAN 1. Which two recommendations are key to avoid unauthorized management access?

Move the management VLAN to something else other than VLAN 1Shutdown all unused ports in the switch

Select the action that results from executing these commands:switch(config)# switchport port-securityswitch(config)# switchport port-security mac-address-sticky

A dynamically learned MAC address is saved in the running configuration file. It is removed upon a reload.

Why do large OSPF networks use a hierarchical design? (choose three)

To confine network instability to a single area of the networkTo speed up convergenceTo reduce routing overhead

Use network 192.168.124.0 for creating the needed subnets and hosts. IP Subnet Zero is used with RIP v2. Complete the IP Address assignments.

Which statement is correct regarding the operation of DHCP?

If an address conflict is detected, the address is removed from the pool for an amount of time configured by the admin.

The network admin has discovered a power supply has failed. A new switch has been installed. What must be done to ensure this new switch becomes the root bridge on the network?

Lower the bridge priority number from 32768 to a lower number

Which command is used to debug a ping command?

Debug ip icmp

Page 56: 640-802 CCNA Question Review.pdf

Which three are characteristics of an Ipv6 anycast address?

Delivery of packets to the group interface that is closest to the sending deviceThe same address for multiple devices in the groupOne to Nearest communications model

Hostname Gateway

int fa0/0ip add 198.133.219.14 /29int fa0/1ip add 192.168.10.254 /24int s0/0ip add 64.100.0.2 /30ip route 0.0.0.0 0.0.0.0 64.100.0.1

The addressing scheme allows useres on the internet to access the WWW serverHosts on the LAN connected to Fa0/1 will NOT be able to access the internet without NAT

Which two data link protocols are supported by Cisco IOS software for Ipv6?

PPP … and … Frame Relay PVC

What are three valid IP addresses an admin can use from the 255.255.255.224 subnet mask?

172.22.243.190 … and … 10.16.33.98 … and 10.17.64.34

Page 57: 640-802 CCNA Question Review.pdf

Configure gateway on Host B as 10.1.2.254 (currently using VLAN 1 gateway)Configure the IP Address of Host B as 10.1.2.2

How is an EUI-64 format interface ID created from a 48bit MAC address?

By inserting 0xFFFE between the upper three bytes and lower three bytes of MAC address

If a router has a packet with a destination address of 192.168.1.255, what describes the operation of the network?

The router will drop the packet because this is not a valid ip address.

The network admin has been given reasons for moving from Ipv4 to Ipv6. What are two valid reasons for adapting?

No Broadcasts … and … Autoconfiguration

What should be part of a comprehensive network security plan?

Physically secure network equipment from potential access by unauthorized personnel

What is the highest protocol stack that the network admin is using when establishing a FTP session?

Application Layer

What action can take place to prevent hubs (multiple PC's) from using a single switch port?

Implement port security on all interfaces and use “port-security maximum 1” to limit port access

In order to resolve the LAN problem, which router IOS command can you use?

Ping, show ip route, and show interfaces

Which network protocol does DNS use?

UDP

Which switch would STP choose to become the root bridge in the selection process?

32768 11:22:33:44:55:66, 327368 22:33:44:55:66:77, 32768 11:22:33:44:55:65, or 32768 22:33:44:55:66:78

The switch with lowest ID, if all priority # are same. so... 11.22.33.44.55.66 is the root bridge

Page 58: 640-802 CCNA Question Review.pdf

What is the purpose of ARP?

Map an IP to a MAC

What is the purpose of Inverse ARP?

Map a known DLCI to an IP

Which three statements are typical characteristics of VLAN arrangements?

Connectivity between VLANS require a Layer 3 device – router Each VLAN uses a separate address spaceA switch maintains a separate bridging table for each VLAN

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0 /24 to OSPF Area 0?

Router ospf 1... and … network 192.168.16.0 0.0.0.255 area 0

With a mask of 255.255.255.128, each interface requires an IP Add on a subnetWith a mask of 255.255.255.0, must be a layer 3 device for PCs to communicateWith a mask of 255.255.254.0, each interface does NOT require an IP address

Host A pings interface S0/0/0 on R3. What is the TTL value for the ping?

253

Which three IP Add can be assigned to hosts if the subnet mask is /27, and subnet zero is usable?

10.15.32.17...and... 66.55.128.1...and...135.1.64.34

Page 59: 640-802 CCNA Question Review.pdf

A medium sized company has a Class C address. It has two Cisco routers and one non-Cisco router. All three routers are using RIPv1. The company network is using 198.133.219.0 /24. The company wants to split the network into three subnets using VLSM. What is the best course of action if the company wants to have 40 hosts on each subnet?

Cannot use RIPv1 as it is classful. So...use Rip v2, a classless, and use 198.133.219.64 /26, 198.133.219.128 /26, and 198.133.219.192 /26

Which Ipv6 add is the equivalent for the Ipv4 interface loopback address of 127.0.0.1

::1

Which of the following describe private IP addresses? (choose two)

Addresses cannot be routed through the public internet...and... a scheme to conserve public addresses

What are three basic parameters to configure on a wireless access point?

SSID, RF Channel, and Authentication method

Which commands must be configured on Core 2 to allow it to be managed remotely?

(config)# int vlan 1(config-if) ip add 192.168.1.11 255.255.255.248line vty 0 4password c1sc0ip default-gateway

Which two benefits are provided by creating VLANS?

Added security...and... provides segmentation

Page 60: 640-802 CCNA Question Review.pdf

Problem is... fa0/1 and fa0/2 are setup as “switchport mode access” instead of “switchport mode trunk”

Which entry will be in the ARP cache of Host A to support this transmission of a ping to Host B?

Interface Address Physical Address Type 192.168.4.7 000f.2480.8916 dynamic

Which command will show the MAC add of a station connected to switch port?

Show mac-address

Which two passwords must be supplied in order to connect to telnet to a secured switch?

Enable secret password...and... vty password

What can a network admin utilize by using PPP Layer 2 encapsulation?

Compression, authentication, and multi-link support

Fyi...

Page 61: 640-802 CCNA Question Review.pdf

Half-Duplex and Full Duplex mismatch errors...

What are three features of the Ipv6 protocol?

Autoconfiguration, plug-n-play, and no broadcasts

A router ha learned of three possible routes that could be used to reach a destination. One form EIGRP with metric of20514560. Another OSPF, metric of 782. and Ripv2 with a metric of 4. Which route will router install in the routing table?0 connected interface route “serial” 1 static route 90 eigrp 110 ospf 120 ripv1 ripv2 170 external eigrp

The EIGRP route. Uses bandwidth ^ delay. Also K1 K3 values

What must be set correctly when configuring a serial interface so that higher level protocols calculate the best route?

bandwidth

Cross Over Cable Straight Rollover Rollover PC to Router Router to Hub PC serial to consoleSwitch to Switch PC to Switch

VLAN Name Status Port HOW MANY BROADCAST DOMAINS ARE CONFIGURED ON SW2?1 default active 10 sales active 11 market active20 hr active

4. one for each vlan

Which switch provides the spanning-tree designated port for segment with printers?

The switch with lower Priority#. If a tie, then switch with lowest mac address is selected.

hostname Tampa TAMPA CONNECTS TO ORLAND ROUTER.username orland password 0 c1sc0 WHICH TWO STATEMENTS ARE TRUE?ip subnet zeroint fa0/0ip add 192.168.1.1 255.255.255.0int s0/0ip add 10.0.1.1 255.255.255.0router eigrp 10network 10.0.0.0network 192.168.1.0no auto summary

The link uses a 3-way handshake for authentication... and... only Tamp will negotiate a data link with Orlando router

Page 62: 640-802 CCNA Question Review.pdf

Before installing a new IOS, what should be check on the router, and which command should be used to gather info?

Amount of flash and RAM memory... and … show version

How to determine what switch is a ROOT SWITCH.

1. show spanning-tree vlan # if results shows a ROOT under "Role" then that switch isn't a root switch. identify the "interface" having a "root" status.

then

2. show cdp neighbors locate "interface#" from above in this output. identify it with the Device ID - switch it is connected too

This shows which switch is the ROOT SWITCH!* remember, root switches do NOT have root ports!

If show spanning-tree vlan # output shows all ports as DESG, then it may be the root switch, itself.

Show ip eigrp neighbors... shows the other eigrp router neighbors. If a router in questions doesn't exist in output, that router is not configured properly, completely to participate in eigrp.

Which layer of the OSI model is responsible for determining availability of the receiving program and checking to see if enough resources exist for that communication?

Application... identify and establish availability of intended communications and resources.

What is one reason that WPA encryption is preferred over WEP?

Values of the WPA keys can change dynamically while in use

A router boots to the RMON prompt. What does this signify, how should the admin respond?rommon1>

This prompt signifies IOS image in flash is invalid / corrupt. Admin should use TFTP to transfer IOS to router.

Which two privileged mode commands can be used to determine router's serial number?

Show inventory … and … show diag

Which type of EIGRP route entry describes a feasible successor?

A backup route, stored in the topology table. A neighbor table lists adjacent neighbors. A topology table lists all the learned routers and the best routes to them.

Which two subnetworks would be included in the summarized address of 172.31.80.0?

172.31.80.0 /22 … and … 172.31.92.0 /22

Which commands helps an admin to mange memory by displaying flash memory and nvram utilization?

Show file systems

How do you determine what model a router is? Remotely.

Show cdp neighbors will show this.

You've been instructed to prevent All traffic originating on the Router 1 LAN from entering the router 2. Which command will implement the access list on router 2? 1-------2

Ip access-group 101 in

Page 63: 640-802 CCNA Question Review.pdf

Create 3 networks from 192.168.164.0 using “ip subnet zero” with RIPv2.

Describe the state of the switch once the boot process has been completed.?00:00:39 %lineproto-5-updown: line protocol on interface vlan 1, changed to down00:00:40 %spanningtree-5-extended: extended sysld enabled for type vlan00:00:42 %sysconfig_i: configured from memory00:00:44 %link-5-changed: interface vlan 1, changed state to administratively down

Remote access management is not possible without configuration change, “no shutdown” command for vlan 1 interface

In addition to assigning an IP address, which of the following correctly describe TCP/IP stack configuration can DHCP provide?

Default gateway, DNS servers and Subnet mask

Where will the router send a packet destined for 10.1.5.65?

10.1.3.3

A new VLAN needs to be created on a router. There are no more open interfaces to do so. How can this be completed?

Configure a single VLAN trunk between R1 and SW1 and configure a subinterface on R1 for each VLAN.

Page 64: 640-802 CCNA Question Review.pdf

Show flash directory3803056 bytes used, 4585552 available, 8388608 total. WHAT IS MAX. SIZE A NEW IOS CAN BE STORED?

4MB as there is 4 ½ mb of free space

“show ip eigrp topology”. Determine the feasible successor.

1st, verify the FD value in output. 2Nd, compare Composite Metric values among other interface values. Lowest Composite wins, is feasible successor.

Which two statements are characteristics of a distance vector routing protocol?

RIP … and … updates are periodic and include entire routing table

The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP address can be assigned to hosts in the third subnet if the “ip subnet zero” is configured on the router?

172.25.0.0 to 172.25.31.255, 172.25.32.0 to 172.25.63.255, 172.25.64.0 to 172.25.95.255

Access Port Trunk Portcarries traffice for single vlan uses 802.1q to identify traffic from different vlansconnects a PC to switch carries traffic from a multiple vlanuses straight-through facilitates Inter-Vlan when connected to layer 3 device

What are valid modes for a switch port used as a VLAN trunk? (choose three)

Auto, On, Desireable

Which three options are valid WAN connectivity methods? (choose three)

PPP, HDLC, and ATM

What is the purpose using traceroute command?

To see the path a packet will take when traveling to a destination

What is the summarization for these routers: 10.0.0.0, 10.0.1.0, 10.0.2.0, 10.0.3.0

10.0.0.0 /22

Which two statements are true regarding EIGRP?

- EIGRP supports VLSM, Route Summarization, and Routing Update authentication- A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information

Which two commands correctly verify whether port security has been configured on fa0/12 of a switch?

– show running configuration– show port-security interface fa0/12

“show int s0/0” which three reasons for this interface status?S0/0 is up, line protocol is down192.168.100.1/24encapsulation HDLC, loopback not set Keep Alive set (10sec)

No Keep-alive messages are receivedthe clock rate is not setthere is a mismatch in the encapsulation type

Remote access to console = vty password MATCHING....access to con 0 line = consoole password access to connected networks or resources = access-groupviewing of passwords = service password-encryptionaccess to privileged mode = enable secret

Page 65: 640-802 CCNA Question Review.pdf

Networks connected to R2 have been summarized 192.168.176.0 /21 route and sent to R1. Which two packet destination addresses will R1 forward to R2? (choose two)

192.168.183.41 and … 192.168.179.4

What are two characteristics of the 802.1Q protocol?

It modifies the 802.3 frame header and requires FCS to be recomputedIt is a trunking protocol capable of carrying untagged frames

What speeds must be disabled in a mixed 802.11b/g WLAN to allow only 802.11g clients to connect?

1, 2, 5.5 and 11 Mbps

What are two recommended ways of protecting network device configuration files from outside network security threats?

Use a firewall to restrict access from outsideuse SSH or another encryption and authenticated transport to access device configurations

Access List... “access-list 114 permit ip 10.4.4.0 0.0.0.255” What would be the effect of issuing the command “ip access-group 114” on a Fast Ethernet port?

It would allow all traffic from 10.4.4.0 network

What is the operational status of interfaces R2 as indicated by the output shown?

The interfaces are functioning correctly.

The output “show frame-relay pvc” shows “PVC STATUS=INACTIVE”. What does this mean?

The PVC is configured correctly, but there is a problem on remote end of PVC.

Which command is necessary to permit SSH or Telnet access to a switch that is otherwise configured for these vty line protocols?

“transport input all”

Page 66: 640-802 CCNA Question Review.pdf

Hosts in 192.168.2.0 cannot reach hosts in 192.168.3.0. Based on the output from RouterA, what are two reasons why?

Interface S0/0 on Router A is not receiving a clock signal from the CSU/DSUThe encapsulation on S0/0 of Router B does not match that of S0/0 on Router A

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which are true?(1)--A----B---C--(2)

Router C will send a destination unreachable messageRouter C will use ICMP to inform Host 1 that Host 2 cannot be reached

Which of the following data network would you implement if you wanted wireless network that had high data rate, but was limited to very short distances? Broadband, broadband circuit, infrared, spread spectrum or cable?

Infrared

What are three benefits of implementing vlans?

- A higher level of network security by separating sensitive data from other traffic- A more efficient use of bandwidth can be achieved allowing many logical networks to use same infrastructure- Broadcast storms can be mitigated by increasing number of broadcast domains

Which two Ethernet fiber-optic modes support distances greater than 550 meters?

1000Base-LX...and...1000BaseZx

On Point-to-Point networks, OSPF hello packets are addressed to which address?

224.0.0.5

Which two devices could you configure as a source for the IOS image in the boot system command for IOS?

Flash memory...and...TFTP

In the Frame-Relay network, which IP would be assigned to the Point-to-Point PVC?

DLCI 16: 192.168.10.1 /24 DLCI 99: 192.168.10.2 /24 DLCI 17: 192.168.11.1 /24 and DLCI 28 192.168.11.2 /24

Page 67: 640-802 CCNA Question Review.pdf

Three wireless access points are installed in a small office. What term identifies the wireless topology?

A ESS... BSS supports one or multiple users. A set of two or more wireless AP's in same wired network is a ESS.

The enable “secret” command is used to secure access to which CLI mode?

Privileged Exec

Which address range efficienctly summarizes a routing table for 172.16.1.0 to 172.16.12.0?

172.16.0.0 /20 NOT /18, /16, /21

A network admin needs to allow only ONE telnet session to a router. Which command will encrypt the telnet password?

Service password-encryptionline vty 1login password cisco

Which routing protocol, by default, uses bandwidth and delay as metrics?

EIGRP

A admin installed a new switch, B. He can ping it but cannot Telnet to it. How do you resolve this problem?

Telnet into a Router. From router, telnet into switch B to correct configuration mistakes.

A receiving host computes the Checksum on a frame and determines it is damaged. The frame is discarded. At which OSI layer did this take place?

Layer 2, data link layer.

Matching Wan Device – Label each device

The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must a network admin configure on a switch to meet this policy? (choose two)

(config-if)# switchport port-security violation shutdown(config-if)# switchport port-security maximum 1 (switchport port-security violation shutdown | restrict | protect)

Which command is used to load a configuration from a TFTP server and merge the configuration into RAM?

Copy Tftp: running-config

Which statements are true regarding classful or classless routing?

Automatic summarization at classful boundaries can cause problems on discontinuous subnets

Which of the following protocols use both TCP and UDP ports?

DNS port 53

Which command displays CPU utilization?

Show process

What are two reasons a network administrator would use CDP?

Verify layer 2 connectivity between two devices obtain ip address of connected devices

Page 68: 640-802 CCNA Question Review.pdf

Which item represents the standard IP ACL?

Recall, standard acl is 0 – 99. So, access-list 50 deny 192.168.1.1 0.0.0.255 is a good example

What occurs on a Frame Relay network when the CIR is exceeded?

All traffic exceeding the CIR is marked discard elgible

A static route to the 10.5.6.0 /24 network is to be configured on HFD router. Which commands accomplish this?

(config)# ip route 10.5.6.0. 0.0.0.255 10.5.4.6(config)# ip route 10.5.6.0 0.255.255.255 10.5.4.6

192.168.3.1 is local to the router

Which two statements are true about Inter VLAN routing?

R1 Fa0/0 must be configured with sub-interfacesR1 Fa0/0 and Switch2 trunk ports must be configured using the same encapsulation type

An admin pings a gateway 10.10.10.1 and sees a reply of “request timed out”. At which OSI layer is the problem?

Layer 3, network

What does * represent in the output below?02:16:29: NAT: s=10.10.0.202:16:43: NAT: s=1.2.4.1

02:16:50: NAT*: s=10.10.0.2

A Packet was translated and fast switched to the destination

Page 69: 640-802 CCNA Question Review.pdf

Arrange the ACL lines in order to prevent all hosts (except those addresses that are 1st and last in subnet 172.21.1.128 / 28) from accessing the network.A. permit anyB. deny 172.21.1.128 0.0.0.15C. permit 172.21.1.129 0.0.0.0D. permit 172.21.1.142 0.0.0.0

Permit 172.21.1.129 0.0.0.0 (C)Permit 172.21.1.142 0.0.0.0 (D)Deny 172.21.1.128 0.0.0.15 (B)Permit any (A)

What is true about the network shown?

There are two broadcast domains...and... there are seven collision domains

A company implements video conferencing over IP. Users notice the network slows down, video stutters. What is a reason?

QoS will attempt to prevent this when the network is overloaded. Recall, QoS doesn't take affect until triggered to do so

Matching...

User Exec - limited to basic monitoringPriv Exec - provide access to all other router commandsGlobal Config - commands that affect the entire system Specific Config – commands that affect interfaces / processesSetup - interactive configuration dialog

The router address 192.168.1.250 is the gateway. What is the correct subnet mask for this network?

255.255.255.0

Data transfer is slow between source and destination. QoS requested by the transport layer is not being maintained. To fix this issue, at which layer should the troubleshooting begin?

Layer 3, Network

Page 70: 640-802 CCNA Question Review.pdf

Using VoIP, if UDP datagrams arrive out of sequence, what will happen?

UDP will pass the information in the datagram up to the next OSI layer, in order that they arrived. UDP is connectionless and does not provide any flow control – wood chipper as it just passes data.

Which command can be used to verify DLCI destination address in a Frame Relay static configuration?

“show frame-relay map”

In the implementation of VLSM in a Class C network, which subnet mask is the most efficient for Point-to-Point?

255.255.255.252

Address range 10.10.10.0 /24 are not being translated to the 1.1.128.0 /16 range. Which command shows if 10.10.10.0 /24 are allowed inside addresses?

“show access-list”

Which two statements about static NAT translations are true?

They are always present in the NAT tableThey allow connection to be initiated from the outside

Which IPSec protocol should be used when confidentiality is required?

ESP

How do you determine Frame Relay congestion problem. Which output value from “show frame-relay pvc” indicates the local router traffic sent to corporate site is congested?

The “In BECN Pkts” field will be incrementing

Which switch is root bridge for VLAN 1?

Show spanning-tree vlan 1. identify Cost#(19 is FE directly connected), Port#, and Role Sts. If Root Fwd, then …Show cdp neighbors to map port above to switch.

What two facts can be determined from the WLAN diagram?

The two access points generally are configured with common SSID to allow roamingThe network diagram represents an extended service set – ESS

Page 71: 640-802 CCNA Question Review.pdf

PC 1 is sending packets to FTP server. Consider the packets as they leave Router A at Fa0/0 toward Router B.

Source Mac= Router A 999 Destination MAC= Router B 3333 Source IP= *.21.7 Destination IP = ftp server ip

What is needed to allow hosts in VLAN A to communicate with hosts in VLAN B?

A router with subinterfaces configured on the physical interface that is connected to the switch.

What are some advantages of using a router to segment the network?

Filtering can occur based on layer 3 information... and... broadcasts are not forwarded

How do you identify a router ID?

The highest IP of loopback. Use “show ip int brief” to display

Which command displays the CHAP authentication process as it occurs between two routers?

Debug PPP authentication

What is the difference between a CSU/DSU and a modem?

A CSU/DSU converts digital signals, a modem converts a digital signal from a router to a phone line

Which of the following IP addresses fall into the CIDR block of 115.64.4.0 /22 (choose three)

115.64 .7.64, .6.255, 5.128

Host A and Host B are on different networks. Host A is trying to communicate with Host B. What step will Host A take?

Send the data frames to the “default gateway”

What are some benefits of a VLAN?

Logical group of users by function, enhance network security, and increase the number of broadcast domain

An admin receives an error while attempting to assign 10.24.24.24 /29. Why?

It is a network address.... /29 leaves 3 bits ( 2^3 = 8). so subnets are .0, .8, .16, .24, .30...

Inter-VLAN Routing. VLAN 2 hosts wants to communicate with a new VLAN 3 host but cannot. Why?

On router, “show ip route” if needed, add a sub-interface for the new VLAN.“int fa0/1.3”encapsulation dot1q 3ip address 192.168.3.1 255.255.255.0

Page 72: 640-802 CCNA Question Review.pdf

Which command encrypts all clear text passwords?

“service password-encryption

Which two devices can interfere with wireless networks because they operate on similar frequencies?

Cordless phone and microwave ovens

Which two commands can be used to verify a trunk link configuration status on Cisco switch?

“show interface trunk” … and … “show interface switchport:”

A packet with a source IP address of 192.168.2.4 and a destination IP address of 10.1.1.4 arrives at the HokesB router. What action does the router take?

Forwards a packet containing an ICMP message out the Fa0/0 interface

A network administrator needs to configure port security on a switch. What two statements are true?

When dynamic address learning is enabled, the switch can learn new addressesThe sticky learning feature allows the addition of dynamically learned addresses to be the running configuration

Determine which of the following is correct?

John# will receive updates on S0/0...and... send updates out S0/0

Page 73: 640-802 CCNA Question Review.pdf

When troubleshooting a Frame Relay connection, what is the first step when performing a loopback test?

Set encapsulation of the interface to HDLC

At what OSI layer is RSTP used to prevent loops?

Layer 2, data link

Drag items to proper location – Next Hop

Whar are the possible trunking modes for a switch port?

Auto, On, Desirable

At which layer of OSI model does PP perform?

Layer 2, data link

What are two reasons an admin would use access lists?

To control vty access into a router...and... to filter traffic as it passes through a router

Which command allows you to verify the encryption type (Cisco or IETF) for a Frame Relay link?

“show frame-relay map”

What command enables Ipv6 forwarding on a router?

Ipv6 unicast-routing

What is the default maximum number of “equal-cost” paths that can be placed into a routing table with OSPF router?

4

WAN's operate at what layers of OSI model?

Physical and Data Link layers

Which two statements about using CHAP authentication mechanism in a PPP link are true?

CHAP authentication occurs after link establishment...and... CHAP uses a three-way handshake

Which VTP mode is capable of creating only local VLANS and does not synchronize with other switches?

transparent

What function do routers perform in a network? (choose two)

Page 74: 640-802 CCNA Question Review.pdf

Packet switching...and... path determination

A router has two Fast Ethernet interfaces and needs t connect to four VLANS. How can you accomplish this?

Implement a “router-on-a-stick” configuration is a router with a single trunk connection to a switch and routes between VLANS.

Interface fe0/0.1encapsulation dot1q 10 (encapsulation dot1q or ISL)ip add x.x.x.x y.y.y.y

Which spread spectrum technology does the 802.11b standard define for operation?

DSSS

What are two commands, used in troubleshooting, can enable debug output to a remote location?

“logging host ip-address...and... terminal monitor

Which statemetns about RIPng is true?

RIPng is enabled on each interface seperately

A host 192.168.125.34 /27 needs to be denied access to all hosts outside its subnet.

“access-list 100 deny ip 192.168.125.34 any 0.0.0.0

All hosts in subnet 172.16.5.118 /26 must be denied Telnet access to hosts outside the LAN.

Access-list 128 deny tcp 172.16.5.64 0.0.0.63 any eq 23

What can be done to secure the virtual terminal on a router?

Configure virtual terminal password...and... enter ACL and apply it to vty interface using “access-class” command

Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security?

PPP

What are three reasons to implement VPN instead of Point-to-Point?

Reduced costs, increased security, and scalability

What can be said about this configuration?

No further configuration is required. There exists 1 router for all vlans to route between – one trunk link.

Switch A cannot form a trunk with Switch B. Why?

The port needs to be configured as a “trunk” and not as an “access” port. Switchport mode trunkswitchport trunk access vlan #...

Routers are not sharing their routing tables. What is the problem?

Page 75: 640-802 CCNA Question Review.pdf

R1 is using RIPv2 and R2 is using RIPv1

Identify three statements about this topology – router, switch and ports.

R1 connected to SW 1 using subinterfaces (router on a stick – one trunk for multiple vlans)SW 1 port to R1 port is a trunkSW 1 port connected to Host B is an access port

Which three statements about RSTP are true?

RSTP expands STP port roles by ADDING alternate and backup rolesRSTP reduces reconvergence after a link failureRSTP provides faster transition to forwarding state on Point-to-Point links than STP

Page 76: 640-802 CCNA Question Review.pdf

Switch 4, port Fa0/11

Ipv6.... broadcasts have been eliminated and replaced with multicasts

What commands must be configured to allow communications between host 1 and host 2?

Int fa0/0no shutdownint fa0/0.1encapsulation dot1q 10ip add 192.168.10.1 255.255.255.0int fa0/0.2encapsulation dot1q 20ip add 192.168.20.1 255.255.255.0

What is required to configure a switch from outside of the LAN using virtual terminal?

Switch must be configured with IP Address, subnet mask, and a default-gatewaySwitch must be reachable through a port connected to its management VLAN

What are some characteristics of Link State Routing Protocols?

Provides common view of entire topolotycalculates shortest path utilizes triggered updates “when topology changes occur”

Page 77: 640-802 CCNA Question Review.pdf

Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?

Layer 4, transport layer

Which two locations can be configured as a source for the Cisco IOS image in the boot system command?

Flash memory and TFTP server

Which command allows you to see output from the OSPF debug command?

“terminal monitor”

What benefits can be obtained using VTP?

Maintain vlan consistency... and... allow vlan information to be propagated

What is the 1st 24 bits in a MAC address called?

Organizational Unique Identifier “OUI”

Matching...

Refers to the bit error rate of each network link = reliabilitythe number of points in a transmission path = hop counta configurable value based by default of bandwidth on interface = costamount of activity on a network = loadamount of time required to move a packet = delaythe data capacity of a link = bandwidth

What are Standard ACL's based on?

Source Address and Wildcard Mask

A router receives information about network 192.168.10.0 /24 from multiple sources. What will the router consider the most reliable information about the path to that network?

A directly connected interface with address of 192.168.10.1 “gateway”

Identify four invalid Ipv6 addresses

::::192:168:0:12002:c0a8:101::422003:dead:beef:4dad:23:46:bb: 101

Which command shows if an access list is assigned to an interface?

:”show ip interface Type_Slot” example, show ip interface S0/0/1