CCNA第二次考试
- 格式:doc
- 大小:3.10 MB
- 文档页数:22
CCNA 2 - Chapter 11What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?has a positive impact on bandwidth by dropping most of the invalid framesmakes a fast forwarding decision based on the source MAC address of the framehas a lower latency appropriate for high-performance computing applications*provides the flexibility to support any mix of Ethernet speeds2A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)reduced cost for equipment and user trainingless required equipment to provide the same performance levelssimpler deployment for additional switch equipment*easier to provide redundant links to ensure higher availability*lower bandwidth requirements3What are two advantages of modular switches over fixed-configuration switches? (Choose two.)availability of multiple ports for bandwidth aggregationlower forwarding ratesneed for fewer power outlets*lower cost per switchincreased scalability*4Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?to Fa0/1, Fa0/2, and Fa0/4 onlyto Fa0/1, Fa0/2, Fa0/3, and Fa0/4to Fa0/1 and Fa0/2 onlyto Fa0/1, Fa0/2, and Fa0/3 only*to Fa0/1 only5What is one function of a Layer 2 switch?forwards data based on logical addressinglearns the port assigned to a host by examining the destination MAC addressduplicates the electrical signal of each frame to every portdetermines which interface is used to forward a frame based on the destination MAC address*6Refer to the exhibit. Fill in the blank.There are ” 12” collision domains in the topology.7What is a collapsed core in a network design?a combination of the functionality of the access, distribution, and core layersa combination of the functionality of the access and core layersa combination of the functionality of the distribution and core layers*a combination of the functionality of the access and distribution layers 8What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)to enhance user bandwidth*to eliminate virtual circuitsto create more broadcast domainsto isolate traffic between segments*to isolate ARP request messages from the rest of the networkto create fewer collision domains9Refer to the exhibit.How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.*SW1 drops the frame because it does not know the destination MAC address.10Place the options in the following order:[+] appropriate for high performance computing applications[+] forwarding process can begin after receiving the destination address [+] may forward invalid frames[#] error checking before forwarding[#] forwarding process only begin after receiving the entire frame [#] only forward valid frames[+] Order does not matter within this group.[#] Order does not matter within this group.11What is a basic function of the Cisco Borderless Architecture distribution layer?aggregating Layer 3 routing boundaries*aggregating all the campus blocksacting as a backboneproviding access to the user12ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?hubhostNICswitch*13What does the term “port density” represent for an Ethernet switch?the numbers of hosts that are connected to each switch portthe speed of each portthe memory space that is allocated to each switch portthe number of available ports*14Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?anycastunicastbroadcast*multicast15What is a basic function of the Cisco Borderless Architecture access layer?aggregates Layer 3 routing boundariesprovides high availabilityaggregates Layer 2 broadcast domainsprovides access to the user*16What information is added to the switch table from incoming frames?source MAC address and incoming port number*destination MAC address and incoming port numberdestination IP address and incoming port numbersource IP address and incoming port number17Fill in the blank.A “converged” network is one that uses the same infrastructure to carry voice, data, and video signals.18An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?It enables many switches to be connected with a special fiber-optic power cable to provide higher bandwidth.It enables the sharing of power among multiple stackable switches.*It enables many switches to be connected to increase port density.It enables many switches to be physically stacked in an equipment rack.It enables AC power for a switch to be provided from a powered patch panel.19Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?fixed-configuration switchmodular switchstackable switch*rackable 1U switch20Refer to the exhibit. Fill in the blank.There are ” 5 ”CCNA 2 - Chapter 2Posted by beotron at 8:59 PM1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?• administrative distance of 0 and metric of 0• administrative distance of 0 and metric of 1• administrative distance of 1 and metric of 0• administrative distance of 1 and metric of 12. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?• 172.16.0.0/21• 172.16.1.0/22• 172.16.0.0 255.255.255.248• 172.16.0.0 255.255.252.03. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?• 192.1.1.0/26 and 192.1.1.64/27• 192.1.1.128/25• 192.1.1.0/23 and 192.1.1.64/23• 192.1.1.0/24• 192.1.1.0/25• 192.1.1.0/24 and 192.1.1.64/244. Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?• It indicates that there are 8 hops between this router and the 10.0.0.0 network.• It represents the time, in milliseconds, it takes for a ping to reply when sent to the 10.0.0.0 network.• It indicates that there are 8 subnets in the destination network to which the router can forward packets.• It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.5. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded?• Router1 will perform recursive lookup and packet will exit S0/0.• Router1 will perform recursive lookup and packet will exit S0/1.• There is no matching interface associated with network 172.16.0.0 so packets will be dropped.• There is no matching interface associated with network 172.16.0.0 so packets will take gateway of last resort and exit out S0/2.6. A network administrator enters the following command into Router1: ip route 192.168.0.0255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet? • drops the packet because the destination host is not listed in the routing table• looks up the MAC address of the S0/1/0 interface to determine the destination MAC address of the new frame• performs a recursive lookup for the IP address of the S0/1/0 interface before forwarding the packet• encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface7. Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link? • The rate would be negotiated by both routers.• A rate would not be selected due to the DCE/DTE connection mismatch.• The rate configured on the DTE determines the clock rate.• The rate configured on the DCE determines the clock rate.8. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet? • WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/09. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)• ping• show arp• traceroute• show ip route• show interface• show cdp neighbor d etail10. Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2• R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.2.1R2(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.111. Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.) • load• platform• reliability• holdtime• local interface12. Refer to the exhibit. What two commands are required to provide connectivity between the192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)• A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0• A(config)# ip route 10.0.0.0 255.0.0.0 172.16.40.2• A (config)# ip route 10.0.0.0 255.0.0.0 s 0/0/0• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0• B (config)# ip route 192.168.1.0 255.255.255.0 172.16.40.1• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/1/013. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)• A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2• A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0• A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.214. What happens to a static route entry in a routing table when the outgoing interface is not available? • The route is removed from the table.• The router polls neighbors for a replacement route.• The route remains in the table because it was defined as static.• The router redirects the static route to compensate for the loss of the next hop device.15. A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)• The destination network no longer exists.• The destination network is moved to a different interface on the same router.• The path between the source and destination is upgraded with a higher bandwidth link.• A topology change occurs where the exi sting next-hop address or exit interface is not accessible.• The remote destination network interface has to be down for 15 minutes of maintenance.16. Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?• Adding the next-hop address eliminates the need for the router to do any lookups in the routing table before forwarding a packet.• In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.• Using a next-hop address in a static route provides a route with a lower metric.• In multi-access networks, using a next-hop address in a static route makes that route a candidate default route.17. The output of the Router# show interfaces serial 0/1 command displays the following:• Serial0/1 is up, line protocol is down.• What is the most likely cause for the line protocol being down?• Serial0/1 is shutdown.• There is no cable connecting the routers.• The remote rout er is using serial 0/0.• No clock rate has been set.18. Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network?• ip route 192.168.0.0 172.16.0.0 255.255.0.0• ip rou te 172.16.0.0 255.255.0.0 192.168.0.1• ip route 172.16.0.0 255.255.0.0 S0/0/1• ip route 172.16.0.0 255.255.0.0 S0/0/019. What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).• the serial port of the router• a modem• a switch• the ethernet port of the router• a CSU/DSU device• a DTE device20. Which of the following is true regarding CDP and the graphic shown?• CDP running on Router D will gather information about routers A, B, C, and E.• By default, Router A will receive CDP advertisements from routers B and C.• If routers D and E are running different routing protocols, they will not exchange CDP information.• Router E can use CDP to identify the IOS running on Router B.21. Which two statements describe functions or characteristics of CDP? (Choose two.)• It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.• It operates at the network layer and allows two systems to learn about each other.• It creates a topology map of the entire network.• It allows systems to learn about each other even if different network layer protocols are configured.• It forwards advertisements about routes for faster convergence.22. Which piece of information is available from examining the output of the command show ip interface brief?• Interface speed and duplex• Interface MTU• Errors• Interface MAC address• Interface IP addressCCNA 2 - Chapter 31A network administrator is determining the best placement of VLAN trunklinks. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)between two switches that share a common VLANbetween a switch and a server that has an 802.1Q NIC*between a switch and a client PCbetween a switch and a network printerbetween two switches that utilize multiple VLANs*2What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?The port automatically associates itself with the native VLAN. The port creates the VLAN again.The port goes back to the default VLAN.The port becomes inactive.*3Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used f or anything on the network.Disable autonegotiation and set ports to either static access or static trunk.Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.*4Which command is used to remove only VLAN 20 from a switch?no switchport access vlan 20delete flash:vlan.datno vlan 20*delete vlan.dat5A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?Erase the startup configuration and reboot the switch.Erase the running configuration and reboot the switch.Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*Delete the IP address that is assigned to the management VLAN and reboot the switch.6What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?VLAN 20 will be created automatically.*The command will have no effect on the switch.Port Fa0/18 will be shut down.An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?show mac address-table interface Fa0/1show interfaces Fa0/1 switchport*show interfaces trunkshow vlan brief8Place the options in the following order:- not scored -dynamic autononegotiatedynamic desirabletrunk9Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?Port Fa0/11 will be returned to VLAN 1.*VLAN 30 will be deleted.An error message would be displayed.Port Fa0/11 will be shutdown.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.*Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.11Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)Disable DTP autonegotiation on end-user ports.*Change the management VLAN to a distinct VLAN that is not accessible by regular users.Statically configure all ports that connect to end-user host devices to be in trunk mode.Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*Use SSH for all remote management access.12In a basic VLAN hopping attack, which switch feature do attackers take advantage of?automatic encapsulation negotiationthe default automatic trunking configuration*an open Telnet connectionforwarding of broadcasts13A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?It allows only VLAN 30 on Fa0/5.*It allows a native VLAN of 30 to be implemented on Fa0/5.It allows VLANs 1 to 30 on Fa0/5.It allows VLANs 10, 20, and 30 on Fa0/5.14Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?No VLAN tag is added to the frame.*A VLAN tag is added when the frame is accepted by the switch.A VLAN tag is added when the frame is forwarded out the port to PC-B.A VLAN tag is added when the frame leaves PC-A.15Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?The native VLAN is being pruned from the link.The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*The trunk has been configured with the switchport nonegotiate command. The native VLAN should be VLAN 60.16What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?All VLANs will be allowed across the trunk.*Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk. Only VLAN 1 will be allowed across the trunk.17Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)on links that should not be trunking*when connecting a Cisco switch to a non-Cisco switch*on links that should dynamically attempt trunkingwhen a neighbor switch uses a DTP mode of dynamic autowhen a neighbor switch uses a DTP mode of dynamic desirable18Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which PCs will receive the broadcast sent by PC-C?PC-D, PC-E*PC-A, PC-B, PC-D, PC-EPC-A, PC-BPC-A, PC-B, PC-D, PC-E, PC-FPC-A, PC-B, PC-E19Which two statements are true about VLAN implementation? (Choose two.)The network load increases significantly because of added trunking information.Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*The size of the collision domain is reduced.VLANs logically group hosts, regardless of physical location.*The number of required switches in a network decreases.20Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?switchport trunk allowed vlan add 99switchport trunk native vlan 66*switchport mode dynamic autoswitchport nonegotiate21Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?switch port securityPVLAN protected port*ACLVLAN22Fill in the blank. Use the full command syntax.The ” show vlan brief” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.23Which three statements accurately describe VLAN types? (Choose three).An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*A management VLAN is any VLAN that is configured to access management features of the switch.*A data VLAN is used to carry VLAN management data and user-generated traffic.Voice VLANs are used to support user phone and e-mail traffic on a network. VLAN 1 is always used as the management VLAN.After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*24Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?S1(config-if)# switchport mode trunkS1(config-if)# switchport mode accessS1(config-if)# switchport nonegotiate*S1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport trunk allowed vlan noneCCNA 2 - Chapter 41What type of IPv6 address is required as a minimum on IPv6 enabled interfaces?staticglobal unicastlink-local*loopbackunique local2In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)default gateway*hostnameDNS server addressDHCP server addressIP address*subnet mask*3What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)MAC addressesLayer 1 statuses*IP addresses*next-hop addressesinterface descriptionsspeed and duplex settings4Place the options in the following order:next hopdestination networkmetric- not scored -administrative distanceroute timestamproute source protocol- not scored -5Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)destination MAC addressnetwork numberdestination IP address*source MAC addresssubnet mask*6Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)Packets that are destined for the network 2001:DB8:ACAD:2::/64 will be forwarded through Fa0/1.R1 does not know a route to any remote networks.*The interface Fa0/1 is configured with IPv6 address2001:DB8:ACAD:A::12.*Packets that are destined for the network 2001:DB8:ACAD:2::54/128 will be forwarded through Fa0/0.The network FF00::/8 is installed through a static route command.7Refer to the exhibit. What is the purpose of the highlighted field in the line that is displayed from the show ip route command?It indicates that this is a directly connected route.It indicates that this route has been deleted from the routing table. It indicates that this route was learned via EIGRP.*It indicates that this is a default route.8Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)The metric varies depending which Layer 3 protocol is being routed, such as IP.A router first installs routes with higher administrative distances. The value of the administrative distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.* Administrative distance refers to the trustworthiness of a particular route.*The metric is always determined based on hop count.9What are two functions of a router? (Choose two.)It manages the VLAN database.It increases the size of the broadcast domain.It controls the flow of data via the use of Layer 2 addresses.It determines the best path to send packets.*It connects multiple IP networks.*10A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination? (Choose two.)destination MAC addresssource ARP tablesource IP address*destination IP address*source MAC addressLayer 2 header11。
参加考试- ERouting Chapter 8 - CCNA Exploration: 路由协议和概念(版本 4.0) 1请参见图示。
下列哪项陈述能够正确描述该网络?错误!未找该网络使用EIGRP到引用源。
错误!未找至少包含一条父路由和一条子路由到引用源。
错误!未找192.168.2.0、192.168.3.0 和192.168.4.0 网络是子路由到引用源。
错误!未找发往172.16.3.0 的流量将被引导至s 0/0/1到引用源。
2请参见图示。
路由器 B 接收到目的地址为10.16.1.97 的数据包。
路由器 B 将会做什么?错误!未找丢弃数据包到引用源。
错误!未找使用默认路由到引用源。
错误!未找通过到10.16.1.0 的路由转发该数据包到引用源。
错误!未找通过到10.16.1.64 的路由转发该数据包到引用源。
3请参见图示。
Router1 将对172.16.0.0/24 网络的子路由应用什么子网掩码?错误!未找0.0.0.0到引用源。
错误!未找255.255.0.0到引用源。
错误!未找255.255.255.0到引用源。
错误!未找255.255.255.255到引用源。
4请参见图示。
Router1 正在运行IOS 第12.2 版。
网络管理员需要做什么工作才能确保发往172.16.0.0/24 未知子路由的数丢弃?错误!未找使用ip default-network命令到引用源。
错误!未找使用RIPv1 之类的有类路由协议到引用源。
错误!未找启用OSPF 或ISIS 作为路由协议到引用源。
错误!未找使用ip classless命令到引用源。
错误!未找什么都不用做,默认会启用ip classless到引用源。
5路由表中显示以下条目:R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1这是哪种类型的路由?错误!未找1 级父路由到引用源。
CCNA集训队综合试卷2 2010.12一、填空题(60*1=60分)1.WWW是____________________的缩写,默认情况下使用的端口号为_________。
2.要查看路由器的接口是DTE还是DCE的命令是:show ________________3.当用ICS双网卡共享上网的时候,共享外网卡时,会把内网卡默认设置成IP:4.路由环路解决方法:, ;毒性逆转/路由中毒; ;5.RIP中路由更新定时器:每隔默认秒,发送完整的路由表拷贝到邻居。
6.从网络拓扑发生变化到网络中所有路由器都知道这个变化的时间就叫7.OSPF中必须用到的主干区域用数字来表示。
8.路由器中不用激活就能使用的接口是______________9.SNMP翻译成中文:ARP翻译成中文:10.MAC地址有位;Ipv4地址位;IPV6地址位。
11.MAC地址翻译成IP地址用协议。
12.OSPF的五种数据包:hello包;;;;13.RIP的管理距离是:OSPF的管理距离:EIGRP的管理距离:14.查看vlan的信息可用命令show ;VLAN的信息保存在,可通过show 查看。
15.交换机工作在层;网桥工作在层;中继器工作在层。
路由器工作在层;Trunking技术是工作在层;16.PT中路由器和电脑相连用线。
(直连线还是交叉线)17.虚拟局域网(VLAN)可以给网络分段,提供灵活性,便于网络管理,最重要的是可以提高网络的性。
18.Trunk中封装VLAN的技术有:802.1Q和(思科特有)。
19.通过一个共有的管理域,维持VLAN配置信息的一致性用的是协议。
20.学校DNS的地址是:;本机回环测试地址是:无锡电信的DNS地址是:21.RG-WALL这是什么东西?22.C类地址的范围是:;B类地址的范围是23.在广播型拓扑结构中,OSPF发送HELLO包的目的地址是:24.OSPF将网络分为四种:PPP,点到多点,,25.OSPF路由器分类主干路由器;自治系统边界路由器(ASBR);26.OSPF中路由器的ID(RID)是如何选举的?先比较,如果就比较27.DR/BDR选举中优先级为0的路由器放弃选举,成为28.一个公司的网络运行的是OSPF,后来收购另一个运行RIP协议的公司,为了使两个公司网络互通,可以采用技术。
第二级别考试:要点:TCP/IP基础知识:OSI Model, Switch, Routers, Ethernet Network,IP addressing and subneting, TCP/UDP/ICMP.路由协议基础知识:Protocol Independent Routing Properties,Routing policy,BGP/OSPF/ISIS/RIP各种路由协议的基础配置参考文档:参照CCNA CCNP题库考试题目总结:1.Hub和Switch的区别:不隔离冲突域、隔离冲突域、隔离广播域2.什么情况下用Hub、Switch和Router。
(好几道类似的)3.关于子网掩码计算的有几道。
4.OSPF的各种网络类型?OSPF将网络划分为五种类型:广播多路访问型(Broadcast multiAccess)、非广播多路访问型(None Broadcast MultiAccess,NBMA)、点到点型(Point-to-Point)、点到多点型(Point-to-MultiPoint)、点到多点非广播(None Broadcast Point-to-MultiPoint)思科独有。
5.OSPF的DR/BDR选举?在多路访问(multiaccess)广播型网络中(比如以太网和Token Ring),需要进行DR/BDR 的选举,所有的非DR/BDR(即DROTHER)路由器和DR/BDR 形成完全邻接关系,即DROTHER 通过到达DR 的包使用多播地址224.0.0.6;经DR 转发给DROTHRT 的包使用多播地址224.0.0.5 选举DR/BDR 的时候要比较hello 包中的优先级(priority),优先级最高的为DR,次高的为BDR.默认优先级都为1.在优先级相同的情况下就比较RID,RID 等级最高的为DR,次高的为BDR.当你把优先级设置为0 以后,OSPF 路由器就不能成为DR/BDR,只能成为DROTHER当网络中新加入一个优先级更高的的路由器,不会影响现有的DR/BDR,除非DR 出故障,BDR 随即升级为DR,并重新选举BDR;如果是BDR 出故障了就重新选举BDR,BDR 对DR 是否出故障的判定是根据使用wait timer,如果BDR 在wait timer超时前确认DR仍然在转发LSA 的话,它就认为DR 出故障。
CCNA第二学期《Final Examinnation》英文A卷1 What are two functions of a router? (Choose two.)It forwards data packets toward their destination.It forwards the packet to the destination if the TTL value is 0.It changes the destination IP address of data packets before forwarding them to an exit interface.It determines the best path based on the destination MAC address.It acts as an intersection between multiple IP networks.2 Which router component contains a scaled-down version of the IOS that can be used to reload a complete version of the IOS in the event that the IOS becomes damaged or corrupted?ROMFlashSDRAMNVRAM3 Using default settings, what is the next step in the router boot sequence after the IOS loads from flash? Perform the POST routine.Search for a backup IOS in ROM.Load the bootstrap program from ROM.Load the running-config file from RAM.Locate and load the startup-config file from NVRAM.4Refer to the exhibit. How many routes are ultimate routes?34575ADCABCIt will load balance the traffic between ADC and ABCIt will send the traffic via ABC, and will use ADC as a backup path only when ABC fails.6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.Refer to the exhibit. The network is configured for OSPF routing with default settings. The bandwidths have been configured correctly for each link. If the T1 link between router A and router E fails, what path will a packet from router A take to reach the LAN attached to router F when the network has converged?A, B, C, FA, B, C, E, FA, D, G, E, FA, D, G, H, F8 In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network?D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/09 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.10with static routeswith a routed protocolwith a routing protocolwith directly connected routes11Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.12 Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route? RIPv1RIPv2OSPFEIGRP14 Which three routing metrics are correctly defined? (Choose three.)delay - the link speedreliability - the error rate on a linkload - the amount of traffic on a linkcost - the value to indicate preference for a routehop count - the path selected with the highest bandwidthbandwidth - the amount of time it takes a packet to travel a link15 Which two statements about routing protocols are accurate? (Choose two.)OSPF supports VLSM.RIPv1 supports VLSM.RIPv2 does not have a hop count limit.EIGRP supports discontiguous network designs.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicea modeman Ethernet switcha huba bridge17 When connecting two devices, which situation would normally require the use of a crossover cable? connecting a host to a switchconnecting a switch to a routerconnecting a switch to a switchconnecting a host to a router console port18Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required to make this interface operational?Switch the cable with a known working cable.Issue the no shutdown command on the interface.Configure the interface as a loopback interface.Set the encapsulation for the interface.19 Which port should a terminal emulator be connected to in order to access a router without network connectivity?T1serialconsoleFastEthernet20 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration21Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway?10.1.1.110.1.1.2172.16.1.122Refer to the exhibit. The show cdp neighbors command was run on one of the devices as shown. Based on this information, which two facts can be determined? (Choose two.)The command was run on the router.ABCD is a non- CISCO device.Layer 3 connectivity between two devices exists.ABCD supports routing capability.ABCD is connected to the Fa0/0 interface of the neighboring device.23Refer to the exhibit. Which statement is true about the Ethernet interfaces shown in the network?A frame leaves interface Fa0/0 of R1 with the source MAC address as 000C.3010.9260.A packet will not be forwarded between R1 and R2 until the no shutdown command is issued on the Fa0/0 interface of R1.24Refer to the exhibit. Which solution provides the most efficient use of router resources for forwarding traffic between BR and HQ?RIPRIPv2EIGRPstatic routes25Refer to the exhibit. Pings are failing between HostA and HostB. The network administrator discovers that Router1 does not have a route to the 172.16.0.0 network. Assuming Router2 is configured correctly, which two static routes could be configured on Router1 to enable Host A to reach network 172.16.0.0? (Choose two.)ip route 172.16.0.0 255.255.0.0 S0/0ip route 172.16.0.0 255.255.0.0 S0/1ip route 172.16.0.0 255.255.0.0 192.168.0.1ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/0ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/126Refer to the exhibit. How was the OSPF default gateway entry for R2 determined?Default routes are automatically injected by OSPF into all advertisements.A static default gateway route is defined in the configuration of R2.The default-information originate command is applied on R1.The ISP defines the gateway of last resort and automatically passes it to R1 and R2.The ip default-gateway command is applied on R2.27Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D28192.168.2.1192.135.250.129 Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a static route entry be altered to accommodate a topology change?Keep the existing static route and configure a new static route with the correct next hop IP address.Negate the existing static route and configure a new static route with the correct next hop IP address.Do nothing. The existing static route will automatically update the next hop entry with the new IP address. Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP address.30Refer to the exhibit. The entire 192.168.1.0 network has been allocated to address hosts in the diagram. Utilizing VLSM with contiguous address blocks, which set of addresses and prefixes could be used to create an addressing solution with a minimum waste of IP addresses?答案:D31Refer to the exhibit. Which host has a combination of IP address and subnet mask on the same network as Fa0/0 of Router1?host Ahost Bhost Chost D32Refer to the exhibit. If the EIGRP routing protocol is used throughout the network, which IP address and mask prefix should be sent by router R1 to the Edge router as a result of manual summarization of LANs A, B, C, and D?33Refer to the exhibit. Routers RTRA and RTRB are running OSPF. What entry does RTRA add in the routing table when Serial 0/0/0 receives an update about the network that is attached to RTRB?O 172.16.7.0/30 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.16/28 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.0/24 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.0.0/16 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/034Refer to the exhibit. If RIPv1 is used as the routing protocol throughout the network, what RIPv1 route will router R1 advertise to router R3?10.1.0.010.1.1.010.1.2.035 Which statement correctly describes a feature of RIP?RIP is a link-state routing protocol.RIP uses only one metric—hop count— for path selection.Advertised routes with hop counts greater than 10 are unreachable.Messages are broadcast every 10 seconds.36Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?triggered updatespoison reverseholddown timerssplit horizonroute poisoningsplit horizonhold-down timertriggered updates38Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)The missing information for Blank 1 is the command show ip route.The missing information for Blank 1 is the command debug ip route.The missing information for Blank 2 is the number 100.The missing information for Blank 2 is the number 120.The missing information for Blank 3 is the letter R.The missing information for Blank 3 is the letter C.39Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configured and operational. Both routers are configured to include all connected interfaces in routing updates. R2 is not showing any routes from R1 in the routing table. What is the likely cause?The adjacent interfaces are passive.The distance of 120 exceeds 15 hops.R2 will not accept version 1 updates from R1.Routes are being summarized by R1 but not by R2.40Refer to the exhibit. All routers are configured to use the EIGRP routing protocol with defaultIt will travel via A, B, and C.It will travel via A, F, E, D, and C.It will travel via A, G, H, and C.41 Which multicast address does EIGRP use to send hello and updates packets?224.0.0.5224.0.0.6224.0.0.942 A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is no feasible successor route to a destination network and the successor route fails?It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.It sends queries to adjacent neighbors until a new successor route is found.It immediately sends its entire routing table to its neighbors.It will set the metric for the failed route to infinity.43Refer to the exhibit. EIGRP 1 has been configured on R1. What is the effect of configuring the ip bandwidth-percent eigrp command?The EIGRP bandwidth routing metric will be reduced by 30%.EIGRP 1 protocol traffic will be restricted to 30% of the link bandwidth.Packets that are routed based on EIGRP routing table entries will be limited to 30% of the link bandwidth. EIGRP traffic will be permitted to burst for short periods to 30% above the configured link bandwidth.44Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)All routes are stable.Each route has one feasible successor.The administrative distance of EIGRP has been set to 50.The show ip eigrp topology command has been run on R1.45Refer to the exhibit. A network designer is testing a prototype of WAN connections. All of the routers in the exhibit are configured for OSPF routing. The design requires that the path between routers A and D through ISP-A is the primary and the path through ISP-B servers as a backup. The designer notices that router A has two equal-cost paths to the LAN on router D. How can the designer correct this problem?Issue a clock rate 2000000 interface command on S0/0/1 of router ISP-B.Change the default OSPF reference bandwidth on router A.Configure two static routes with administrative distances of 10.Use the bandwidth command to change the default bandwidth on the link to router B.46Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)Set a lower priority on R2.Configure the routers in the same area.Set a lower cost on R2 compared to R1.Add a backup designated router to the network.Match the hello and dead timers on both routers.47Refer to the exhibit. If the router loopback interfaces, FastEthernet interfaces, and OSPF priorities are configured as shown, which router would win an OSPF DR election?ABCD48 Two routers need to be configured within a single OSPF area. Which two components need to be configured on both routers to achieve this? (Choose two.)the same process IDthe same area IDnetwork addresses and wildcard masksthe same router IDthe same loop back address49Refer to the exhibit. What OSPF network statements are required for the router B to advertise the three networks that are attached?router ospf 1network 10.0.0.0 0.0.0.255 area 0router ospf 1network 10.1.1.0 0.3.255.255 area 0network 10.10.1.0 0.255.255.255 area 0network 10.20.1.0 0.255.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.255.255 area 0network 10.20.1.0 0.0.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.0.255 area 0network 10.20.1.0 0.0.0.255 area 050Refer to the exhibit. A network administrator is trying to determine why router JAX has no OSPF routes in its routing table. All routers are configured for OSPF area 0. From the JAX router, the administrator is able to ping its connected interfaces and the Fa0/1 interface of the ORL router but no other router interfaces. What is a logical step that the network administrator should take to troubleshoot the problem?Reboot the routers.Change the OSPF process ID on all of the routers to 0.Check to see if the cable is loose between ORL and JAX.Check to see if CDP packets are passing between the routers.Use show and debug commands to determine if hellos are propagating.CCNA第二学期《Final Examinnation》英文B卷1 A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a common connection to the Internet that can be shared?hubrouteraccess pointEthernet switch2 Which two router component and operation pair are correctly described? (Choose two.)DRAM - loads the bootstrapRAM - stores the operating systemFlash - executes diagnostics at bootupNVRAM - stores the configuration fileROM - stores the backup configuration filePOST - runs diagnostics on hardware modules3 A router boots and enters setup mode. What is the reason for this?The IOS image is corrupt.Cisco IOS is missing from flash memory.The configuration file is missing from NVRAM.The POST process has detected hardware failure.4Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)5 Which candidate route has the longest match for a packet with a destination address of 10.30.16.48?6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.R 192.168.1.0/24 [120/3] via 192.168.110.1, 00:00:17, Serial0/1/0R 192.168.1.0/24 [120/2] via 192.168.200.1, 00:00:17, Serial0/0/0R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial0/0/1R 192.168.1.0/24 [120/4] via 192.168.101.1, 00:00:17, Serial0/1/18Refer to the exhibit. The router receives a packet that is destined for 192.168.5.79. How will the router handle this packet?It will forward the packet via the FastEthernet0/0 interface.It will forward the packet via the Serial0/0/0 interface.It will forward the packet via the Serial0/0/1 interface.It will drop the packet.9 A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.)It uses the Bellman-Ford algorithm to determine the best path.It displays an actual map of the network topology.It offers rapid convergence in large networks.It periodically sends complete routing tables to all connected devices.It is beneficial in complex and hierarchically designed networks.10 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.11 Which two statements are true about classless routing protocols? (Choose two.)They can be used for discontiguous subnets.They can forward supernet routes in routing updates.They cannot implement classful routes in routing tables.They use only a hop count metric.They do not include the subnet mask in routing updates.12 Which statement is true regarding routing metrics?All routing protocols use the same metrics.EIGRP uses bandwidth as its only metric.Routers compare metrics to determine the best route.The larger metric generally represents the better path.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?RIPv2OSPFEIGRP14 You have been asked to explain converged networks to a trainee. How would you accurately describe a converged network?A network is converged when all routers have formed an adjacency.A network is converged immediately after a topology change has occurred.A network is converged when all routers flush the unreachable networks from their routing tables.A network is converged after all routers share the same information, calculate best paths, and update their routing tables.15Refer to the exhibit. All the routers are properly configured to use the RIP routing protocol with default settings, and the network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?Router A will send the data via the A-D-E path that is listed in the routing table.Router A will load-balance the traffic between A-B-E and A-C-E.Router A will determine that all paths have equal metric cost.Router A will send the data through A-D-E and keep A-B-E and A-C-E as the backup paths.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicean Ethernet switcha huba bridge17 Which component is typically used to connect the WIC interface of a router to a CSU/DSU?V.35 cableRJ-45 adaptercrossover cablestraight-through cable18 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration19Refer to the exhibit. What are the effects of the exhibited commands on the router?All passwords are encrypted.Only Telnet sessions are encrypted.Only the enable password is encrypted.Only the enable password and Telnet session are encrypted.Enable and console passwords are encrypted.20Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that interface FastEthernet0/1 is not functioning. Which action will most likely correct the problem with FastEthernet0/1?A clock rate should be added to the interface configuration.The subnet mask should be added to the interface configuration.An interface description needs to be added to the interface configuration.The no shutdown command needs to be added to the interface configuration.21Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)Three network devices are directly connected to Router2.The serial interface between Router2 and Router3 is up.Router1 and Router3 are directly connected.Six devices are up and running on the network.Layer 3 functionality between routers is configured properly.22Refer to the exhibit. Which route in the routing table of R1 will be discarded by its neighboring router? 192.168.2.0192.168.3.0192.168.9.0192.168.10.0192.168.11.023Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert command on host A. Which two facts could be responsible for the output of this command? (Choose two.)The gateway for Host A is missing or improperly configured.The gateway for Host B is missing or improperly configured.24 In which situation would a default static route be recommended?when connecting an edge router to the Internetwhen variable length subnet masking is in effectwhen there is more than one valid route for a destination networkwhen a destination network has a larger mask than any routes in the routing table25 What is the advantage of configuring a static route with an exit interface instead of a next-hop address?The router will perform a recursive lookup.This route will automatically be used as the gateway of last resort.The exit interface configuration consumes less router processing time.The exit interface configuration has an administrative distance value of 1.26Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D27 A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?Change the routing metric for that route.Nothing. The static route will go away on its own.Change the administrative distance for that route.Remove the route using the no ip route command.28Refer to the exhibit. Hosts on the 192.168.1.0 network cannot communicate with hosts on the 172.16.1.1 network. The network administrator has run the show ip route command on R1.What could be the cause of this problem?The FastEthernet interface on R1 is disabled.Autosummarization is enabled on R1.The serial interface S0/0/0 of R1 is administratively down.No static route or routing protocol is configured.29A new static route must be configured on R1 with the R3 serial interface as the next hop.A new default route must be configured on R1 with the R3 serial interface as the next hop.The default route on R2 should be configured with the R3 serial interface as the next hop.The default route on R2 must be replaced with a new static route and the next hop should be the R1 FastEthernet interface.31Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?32Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?The IP address of host A is incorrect.The default gateway of host A is incorrect.The Fa0/1 interfaces of the two routers are configured for different subnets.The subnet mask for the Fa0/0 interface of R1 is incorrect.33Automatic summarization is enabled on R1.The routing table of R2 contains only classful networks.R2 will reject this update.The routing protocol that is configured on both routers is RIPv1.34 Which additional piece of information is included in the updates of classless routing protocols to support the use of VLSM and discontiguous networks?metricnetwork maskneighbor router IDadministrative distance35Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is true regarding how the routers in this topology will respond to this event?Router4 will learn about the failed route 30 seconds later in the next periodic update.Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires.Router5 immediately flushes the unreachable route from its routing table.Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.clears an unreachable route from the routing table after the invalid timer expiresprevents regular update messages from inappropriately reinstating a route that may have gone badremoves an unreachable route from the routing table after the flush timer expireslimits the period of time or number of hops a packet can traverse through the network before it should be discardedused to mark the route as unreachable in a routing update that is sent to other routers37 Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)authenticationlink-state advertisementshold-down timersSpanning Tree Protocolsplit horizon38Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?An incorrect IP address is configured between the two routers.No static route is configured on Router2.A routing loop has occurred.No routing protocol is configured on either of the two routers.39。
1What will be the result of the following commands?ORL(config)# interface fastethernet 0/0ORL(config-if)# ip address 172.16.3.1 255.255.255.0ORL(config-if)# no shutdownThe 172.16.3.0 network will be routed by any dynamic routing protocol automatically.A routing table entry is made to the 172.16.3.0 network with a code of "C".A static route is required to route traffic to the 172.16.3.0 network.The commands will be saved to the startup-configuration automatically.2A n engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command . What can be concluded about this route?The administrative distance of this route is 1.192.168.1.2 is the address of an interface on this router.This route will display as a directly connected network in the routing table.Packets with a destination IP address of 192.168.1.2 will be forwarded to the 10.0.0.0/24 network first.3 A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the routerhandle packets to the destination network?The router will install the first route it learned into the routing table.The router will install both routes in the routing table and load balance between the two.The router will put the first route in the routing table, and denote the second route as a backup route.The router will pick the path with the higher bandwidth and will place it in the routing table.4T he following line of code is displayed in a routing table:R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0What can be concluded from this output?A packet destined for host 192.168.252.2 will be forwarded out the interface connected to network 209.165.201.0/24.The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network.This route was manually configured using the ip route command.192.168.252.2 is an interface on the router that produced this output.5Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)Administrative distance refers to the trustworthiness of a particular route.A router first installs routes with higher administrative distances.The value of the administarive distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.The metric is always determined based on hop count.The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.6W hat attribute is associated with link-state routing protocols?split horizonpoison reverselow processor overheadshortest-path first calculations7Which of the following conditions must be met in order for a network to have converged?The routers in the network are operating with dynamic routing protocols.The routers in the network are operating with compatible versions of IOS.The routers in the network are operating with the same routing tables.The routers in the network are operating with consistent routing knowledge.8W hich command would the network administrator issue to determine if load balancing is in effect on a router?show ip protocolsshow ip routeshow ip interface briefshow ip interface9Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient?(Choose two.)the network requires a special hierarchical designfast convergence of the network is crucialthe network is using a hub and spoke topologythe network is using a flat designthere are more than 15 hops between the most distant routers10W hat is the purpose of a routing protocol?It is used to build and maintain ARP tables.It provides a method for segmenting and reassembling data packets.It allows an administrator to devise an addressing scheme for the network.It allows a router to share information about known networks with other routers.It provides a procedure for encoding and decoding data into bits for packet forwarding.11Which two statements are true regarding metrics? (Choose two.)RIP uses bandwidth as a metric.OSPF uses delay as a metric.EIGRP uses bandwidth as a metric.OSPF uses cost based on bandwidth as a metric.RIP uses delay as a metric.EIGRP uses hop count only as a metric.12A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?Distance vector routing protocols, such as RIP, converge more quickly than do link-state routing protocols.EIGRP can be used on all of the routers in the company.OSPF can be used between the routers.An exterior routing protocol, such as BGP, is recommended for growing companies.13Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?345662472414Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?R1 will install a RIP route using network A in its routing table because the administrative distance of RIP is higher than EIGRP.R1 will install a RIP route using network A in its routing table because the path cost from RIP is lower than EIGRP.R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.R1 will install an EIGRP route using network B in its routing table because the path cost from EIGRP is lower than RIP.R1 will install an EIGRP route and a RIP route in its routing table and load balance between them.15Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can beforwarded between all networks. What information will be found in the routing table for Router1?Router1 will have 6 directly connected networks.The administrative distance of the route to network 172.16.0.0 will be 90.The metric for routes to 172.16.0.0 will be 1.The interface that is used to forward packets to 172.16.0.0 will always be the S0/1 interface.16Which two statements are true regarding the advantages of the use of static routes? (Choose two).increased securityreduced effort in configuring routesthe administrator maintains control over routingeasier to implement in a growing networkreduces the chance of routing errorsincreased router resource usage17W hy is fast convergence desirable in networks that use dynamic routing protocols?Routers will not allow packets to be forwarded until the network has converged.Hosts are unable to access their gateway until the network has converged.Routers may make incorrect forwarding decisions until the network has converged.Routers will not allow configuration changes to be made until the network has converged.18Which two statements are true regarding classless routing protocols? (Choose two.)sends subnet mask information in routing updatessends complete routing table update to all neighborsis supported by RIP version 1allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topologyreduces the amount of address space available in an organization19T he following line of code is present in the routing table:O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1What does the number 129 indicate in this output?The cost for this link has a value of 129.The clock rate on this serial interface is set to 129,000.The next-hop router is 129 hops away from this router.This route has been updated 129 times in this routing table.20Which of the following best describes the operation of distance vector routing protocols?They use hop count as their only metric.They only send out updates when a new network is added. They send their routing tables to directly connected neighbors. They flood the entire network with routing updates.。
CCNA第四学期《Final Examination》1 一名技术人员正在与竞争对手公司的一名同行聊天,比较两家公司的DSL 传输速率。
两家公司都处于同一个城市,使用同一家服务提供商的服务,且拥有相同的速率/服务计划。
为什么 A 公司报告的下载速度比 B 公司高?公司B 的POTS 语音流量比A 公司的高。
与A 公司相比,B 公司与更多客户共享通向DSLAM 的连接。
A公司在分支点仅使用微型过滤器。
A公司离服务提供商较近。
2请参见图示。
远程用户与服务器之间的SSH 连接发生了故障。
检验表明NAT 配置正确。
此问题最可能的原因是什么?S SH 无法通过NAT。
存在不正确的访问控制列表条目。
访问列表中的SSH 端口号不正确。
必须在S0/0/0 接口上使用ip helper 命令来允许入站连接。
3 CHAP 协议有哪三项特征?(选择三项。
)会在会话过程中交换一个随机的询问号以检验身份会发送身份验证密码以检验身份会防止以明文传输登录信息如果身份验证失败,则会断开PPP 会话连接会发起双向握手容易遭受回送攻击4 命令show frame-relay map 的输出如下:Serial 0 (up): ip 192.168.151.4 dlci 122, dynamic, broadcast, status defined, active下列哪三种说法正确描述了所示内容的意义?(选择三项。
)192.168.151.4 代表远程路由器的IP 地址192.168.151.4 代表本地串行接口的IP 地址D LCI 122 代表远程串行接口D LCI 122 代表用于连接远程地址的本地编号b roadcast 表示动态路由协议(例如RIP v1)可通过此PVC 发送数据包a ctive 表明ARP 进程正在工作5 路由器的SDM 主页会显示哪三点信息?(选择三项。
)A RP 缓存闪存的总容量和可用容量路由表已配置的LAN 接口的数量是否配置了DHCP 服务器该LAN 中路由器的数量6 从什么物理位置起,WAN 连接从由用户负责变为由服务提供商负责?非军事区(DMZ)分界点本地环路网云7请参见图示。
1.Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers?Router1(config-router)# no router rip Router1(config-router)# network 192.168.10.0Router1(config-router)# no network 192.168.10.0Router1(config-router)# passive-interface fastethernet 0/0Router1(config-router)# passive-interface serial 0/0/02.Refer to the output from the show ip route command. What can be concluded from the output of this router command?A preferred route to the destination has not been set.There are two equal cost paths to network 1.0.0.0.Both interfaces are being used equally to route traffic.A variance must be set to load-balance across multiple paths.3.Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator notices that the route is still in the Router1 routing table. How much longer will Router1 keep the down network in its routing table before marking it as possibly down?30 seconds90 seconds155 seconds180 seconds255 seconds4. What is the default update period in seconds for the RIP routing protocol?1012152030605. Which of the following is considered a limitation of RIP v1?RIP v1 does not send subnet mask information in its updates.RIP v1 is not widely supported by networking hardware vendors.RIP v1 consumes excessive bandwidth by multicasting routing updates using a Class D address.RIP v1 requires enhanced router processors and extra RAM to function effectively.RIP v1 does not support load balancing across equal-cost paths.RIP v1 authentication is complicated and time-consuming to configure.6. Which command will display RIP activity as it occurs on a router? debug ip ripshow ip routeshow ip interfaceshow ip protocolsdebug ip rip configshow ip rip database7. What are three characteristics of the RIPv1 routing protocol? (Choose three.)supports the use of VLSMuses hop count as a metricconsiders a metric of 16 as infinityhas an administrative distance of 110 by defaultincludes the destination IP address and subnet mask in routing updates calculates metrics using the Bellman Ford algorithm8.Which of the following would be the correct command sequence to enable RIP on Router B for all connected networks?RouterB# router ripRouterB(router)# network 210.36.7.0 RouterB(router)# network220.17.29.0 RouterB(router)# network 211.168.74.0RouterB(config)# router rip RouterB(config-router)# network 198.16.4.0 RouterB(config-router)# network 211.168.74.0 RouterB(config-router)# network 199.84.32.0RouterB(config)# configure router rip RouterB(config-router)# network 210.36.7.0 RouterB(config-router)# network 199.84.32.0RouterB(config-router)# network 211.168.74.0RouterB(config)# router rip RouterB(config-router)# network 198.16.4.0 RouterB(config-router)# network 210.36.7.0 RouterB(config-router)# network 211.168.74.0RouterB(config)# router rip RouterB(config-router)# network 198.16.4.0 RouterB(config-router)# network 210.36.7.0 RouterB(config-router)# network 220.17.29.09.Refer to the exhibit. All routers are configured with valid interface addresses in the indicated networks and are running RIPv1. The networkis converged. Which routes are present in the routing tables?All routers have all routes in their routing table.All routers have all /30 routes, but do not have /24 routes in their routing table.All routers have all /30 routes. Routers A and E also have some of the /24 routes in their routing table.All routers have all /30 routes. Routers B and D also have some of the /24 routes in their routing table.Routers A and E have all routes. Routers B and D have only /30 routes in their routing table.Routers A and E have only /24 routes. Routers B and D have only /30 routes in their routing table.10. What will happen if an interface IP address is entered for the address portion of the network command in a RIPv1 configuration instead of a network address?The router will reject the command.A route to the host address will be added to outgoing RIP updates.A route to the host address will be added to the routing table.All interfaces in the same classful network as the configured address will be included in the RIPv1 routing process.11.Refer to the exhibit. Router1 and Router2 are running the RIPv1 protocol. The network administrator configures the command network 10.1.0.0 on Router1. What network will Router1 advertise to Router2?10.1.0.0/1610.1.0.0/810.0.0.0/1610.0.0.0/812.Refer to the exhibit. All routers in the exhibit are running RIP v1. The network administrator issues the show ip route command on router A. What routes would appear in the routing table output if the network is converged? (Choose two).R 192.168.2.0/24 [120/1]C 192.168.2.0/24 [120/1]R 10.10.3.0/24 [120/0]C 10.10.3.0/24 [120/1]R 10.10.1.0/24 [120/2]R 10.10.1.0/24 [120/3]13.Refer to the exhibit. A network consists of multiple routers. What can be verified when the show ip protocols command is issued on one of the routers in the network?whether all routes in the network have been properly added to the routingtablerouting protocol configuration in use for IP on this routeroperational status of routing protocols in use on all routers in the networkrouting metric of each network that is listed in the routing table14.Refer to the exhibit. What can be concluded from the routing table output of router B?A static default route has been configured on B.The default-information originate command has been entered on A.All traffic that is destined for 192.168.1.1 will be sent to address 0.0.0.0.Hosts on the 10.16.1.0/27 network have 192.168.1.1 configured as the default gateway address.15. The following line was displayed in the output of the show ip route command. R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0 What is the value of the routing metric?312203012016.Refer to the exhibit. All routers that are shown are running the RIP routing protocol. All unknown IP traffic must be forwarded to the ISP. What router or set of routers are recommended to have both a default route and the default-information originatecommand issued to implement this forwarding policy?only Router1only the gateway routerall routers in the networkonly the routers with LANs needing Internet access17.Refer to the exhibit. Router1 is running RIPv1. What command was entered into Router1 to configure the gateway of last resort?no auto-summaryip default-network 0.0.0.0ip default-gateway 10.0.0.0ip route 0.0.0.0 0.0.0.0 S0/0/118. Which command or set of commands will stop the RIP routing process? RouterB(config)# router rip RouterB(config-router)# shutdownRouterB(config)# router rip RouterB(config-router)# network no192.168.2.0RouterB(config)# no router ripRouterB(config)# router no rip19. Which two statements are true regarding the characteristics of RIPv1? (Choose two).It is a distance vector routing protocol.It advertises the address and subnet mask for routes in routing updates. The data portion of a RIP message is encapsulated into a TCP segment. The data portion of a RIP message is encapsulated into a UDP segment. It broadcasts updates every 15 seconds.It allows a maximum of 15 routers in the routing domain.20.Refer to the exhibit. RIPv1 is running on all three routers. All interfaces have been correctly configured with addresses in the address ranges that are shown. Which route would you see in the routing table on router CHI if the routers are configured with the commands that are displayed in the exhibit?192.168.0.4/30192.168.0.0/24192.168.0.0/16192.168.0.32/2721. Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator notices that the route is still valid in the routing table of Router1. How much longer will it take for Router1 to mark the route invalid by setting the metric to 16?30 seconds90 seconds155 seconds180 seconds255 seconds。
CCNA 4 - Final Exam (B)Posted by beotron at 9:23 PM1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)• improper placement of enterprise level servers• addition of hosts to a physical segment• replacement of hubs with workgroup switches• increasing use of bandwidth intensive network applications• migration to full-duplex Ethernet within the LAN2. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)• a terminal emulation protocol that supports remote console connections with various network devices • a protocol created by IBM that makes it easier for mainframes to connect t o remote offices• a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet• a protocol that controls the rate at which data is sent to another computer• a protocol that exchanges network management information between a network device and a management console3. Which of the following eliminates switching loops?• hold-down timers• poison reverse• spanning tree protocol• time to live• split horizon protocol4. The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements that are true. (Choose two.)• CDP operates at the network layer of the OSI model.• The output of this command displays information about directly connected Cisco devices only.• The switch is attached to the SanJose1 FastEthernet0/21 interface.• SanJose1 is running CDP version 12.0.• SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.• SanJose2 is a 2600 series router running several routed protocols5. A network administrator can ping the Denver router, but gets a ‘Password Required but None Set’ message when trying to connect remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?• Router(c onfig)# line console 0Router(config-line)# loginRouter(config-line)# password cisco• Router(config)# line vty 0 4Router(config-line)# loginRouter(config-line)# password cisco• Router(config)# line virtual terminalRouter(config-line)# enable loginRouter(config-line)# password cisco• Router(config)# line vty 0 4Router(config-line)# enable secretRouter(config-line)# password ciscoRouter(config)# enable secret ciscoRouter(config)# enable cisco6. Which of the following is associated with link-state routing protocols?• low processor overhead• poison reverse• routing loops• split horizon• shortest-path first calculations7. A router does not load its configuration after a power failure. After running the showstartup-configuration command, the adminstrator finds that the original configuration is intact. What is the cause of this problem?• The configuration register is set for 0×2100.• The configuration register is set for 0×2101.• The configuration register is set for 0×2102.• The configurati on register is set for 0×2142.• Boot system commands are not configured.• Flash memory is empty causing the router to bypass the configuration in NVRAM• Nederst på formularen8. Which commands are used to verify the content and placement of access control lists? (Choose three.) • show ip interface• show ip route• show processes• show running-config• show cdp neighbor• show access-lists9. Which of the following are required when creating a standard access control list? (Choose two.)• destination ad dress and wildcard mask• source address and wildcard mask• subnet mask and wildcard mask• access list number between 100 and 199 or 2000 and 2699• access list number between 1 and 99 or 1300 to 199910. Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)• most• host• all• any• some• sum11. Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two).• 3 collision domains• 3 broadcast domains• 5 broadcast domains• 9 collision domains• 10 collision domains• 13 collision domains12. Refer to the graphic. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?• 192.168.16.63/27• 192.168.16.158/27• 192.168.16.192/27• 192.168.16.113/30• 192.168.16.145/30• 192.168.16.193/3013. What is the purpose of the Spanning Tree Protocol (STP)?• prevents Layer 2 loops• prevents routing loops on a router• creates smaller collision domains• creates smaller broadcast domains• allows Cisco devices to exchange routing table updates14. What is the purpose of a loopback address when using the OSPF routing protocol?• activates the OSPF neighboring process• ensures a persistent router ID for the OSPF process• provides a backdoor for connectivity during the convergence process• streamlines and speeds up the convergence pr ocess15. Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?• Ports are manually configured to be in the forwarding state.• Ports listen and learn before going into the forwarding state.• Ports must be blocked before the y can be placed in the disabled state.• It takes 15 seconds for a port to go from blocking to forwarding16. Which sequence of commands is used to configure a loopback address on a router?• Router1(config)# interface loopback 1Router1(config-if)# ip address 192.168.1.1Router1(config)# interface serial 0/0• Router1(config-if)# loopback 1Router1(config-if)# ip address 192.168.1.1Router1(config)# interface serial 0/0• Router1(config-if)# loopback 1Router1(config-if)# ip address 192.168.1.1 255.255.255.0• Router1(config)# interface loopback 1Router1(config-if)# ip address 192.168.1.1 255.255.255.25517. Which routing protocols are classful and do not support VLSM? (Choose two.)• EIGRP• OSPF• RIP v1• RIP v2• IGRP18. Refer to the graphic. Two switches are connected together through a trunk port. SW2 displays the message shown. Which of the following will solve the duplex mismatch?• SW1(config)# interface fastethernet 0/1SW1(config-if)# duplex full• SW1(config)# interface fastethernet 0/1SW1(config-if)# full-duplex• SW2(config)# interface fastethernet 0/1SW2(config-if)# duplex full• SW2(config)# interface fastethernet 0/1SW2(config-if)# full-duplex19. Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?• EIGRP does not support VLSM.• The routers were not configured to monitor neighbor adjacency changes.• The default bandwidth was used on the routers.• An incorrect IP address was configured on a router interface.20. According to the the provided router output, which of the following statements is true regarding PPP operation?• Only the link-establishment phase completed successfully.• Only the network-layer phase completed successfully.• Neither the link-establishment phase nor the the network-layer phase completed successfully.• Both the link-establishment and network-layer phase completed successfully21. Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvc command indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)• local router• local Frame Relay switch• remote router• remote Frame Relay switch• R3 has the following configuration:• R3# show running-config• –some output text omitted–• interface serial0/0• bandwidth 128• ip address 192.168.11.2 255.255.255.0• encapsulation frame-relay• frame-relay map ip 192.168.11.2 30 broadcast22. After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what might be problem?• No clock rate assigned.• There is an incorrect DLCI number in the map statement.• An incorrect IP address exists in the map statement.• The encapsulation command is missing the broadcast keywor d23. Which statements are true regarding the Frame Relay LMI? (Choose three.)• The LMI provides a virtual circuit (VC) status mechanism.• The LMI type must always be manually configured.• The available LMI types are NI1, DMS100 and 5ESS.• The LMI types supported by Cisco routers are CISCO and IETF.• The LMI type configured on the router must match the one used on the Frame Relay switch.• The LMI uses reserved DLCIs to exchange messages between the DTE and DCE24. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?• Multiple private IP addresses are mapped to one public IP address.• The number of usable addresses assigned to a company is divided into smaller manageable groups.• A pool of IP addres ses are mapped to one or more MAC addresses.• The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured25. Which two statements are true about the committed information rate on a Frame Relay link? (Choose two.)• The sum of the CIRs for all PVCs must be less than the port speed.• The sum of the CIRs for all PVCs must equal the port speed.• The sum of the CIRs for all PVCs can be greater than the port speed.• The DE bit will be set on frames that ar e transmitted in excess of the CIR.• Frames that are transmitted at greater than the CIR will be discarded at the source.• It is impossible to transmit frames at a rate in excess of the CIR26. Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup, signaling, and termination?• show interface bri0/0• show isdn active• debug isdn q921• debug isdn q931• debug ppp negotiation• debug ppp authentication27. Which of the following statements are true regarding PPP? (Choose three.)• PPP can use synchronous and asynchronous physical media.• PPP can only be used between two Cisco devices.• PPP carries packets from several network layer protocols in LCPs.• PPP uses LCPs to establish, config ure, and test the data link connection.• PPP uses LCPs to agree on format options such as authentication, compression, and error detection28. A network administrator is evaluating authentication protocols for a PPP link. Which of the following reasons might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.) • establishes identities with a two-way handshake• uses a three-way authentication periodically during the session to reconfirm identities• control by the remote h ost of the frequency and timing of login events• transmits login information in encrypted format• uses an unpredictable variable challenge value to prevent playback attacks• makes authorized network administrator intervention a requirement to establish each session29. Why are static routes often used with ISDN DDR?• They are more stable than dynamic routing protocols.• They are more accurate than dynamic routing protocols because they are put in by a network administrator.• They are easier to modify when a faster technology is installed.• They prevent the unnecessary activation of the link30. Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)• 192.168.14.8• 192.168.14.16• 192.168.14.24• 192.168.14.32• 192.168.14.148• 192.168.14.20831. A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?• 1) fast forward• 2) fragment free• 3) store-and-forward• 1) sto re-and-forward2) fragment free3) fast forward• 1) fragment free2) fast forward3) store-and-forward• 1) fast forward2) store-and-forward3) fragment free32. Which of the following commands will display a communication message on a router before the router prompt is shown?• banner motd * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *• message Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.• banner * Property of TLC. UNAU THORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *• hostname (Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.)• Øverst på formularen33. A router needs to be added to OSPF area 0. Which commands should be used to enable OSPF on the router? (Choose two.)• RouterA(config)# router ospf• RouterA(config)# router ospf 1• RouterA(config-router)# network 192.168.2.0 0.0.0.255 0• RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0• RouterA(config-router)# network 192.168.2.0 255.255.255.0 034. Refer to the graphic. Which of the following commands will configure router A for OSPF?• router ospf 1network 192.168.10.0• router ospf 1network 192.168.10.64 0.0.0.63 area 0network 192.168.10.192 0.0.0.3 area 0• router ospf 1network 192.168.10.64 255.255.255.192network 192.168.10.192 255.255.255.252• router ospf 1network 192.168.10.0 area 035. Which of the following protocols would exchange information between routers to share network addresses and their metrics?• TCP• RIP• CSMA/CD• Ethernet36. Which ISDN device can be directly connected to a two-wire local loop in a North American city?• a router with a serial interface• a router with an S/T interface• a router with a U interface• an ISDN terminal adapter37. The output of the show ip interfaces brief command indicates that Serial0 is up but the line protocol is down. Which of the following are possible causes for the line protocol being in the down state? (Choose two.)• The clock rate is not set on the DTE.• An incorrect default gateway is set on the router.• A network is missing from the routing protocol configuration.• The encapsulation on the Serial0 interface is incorrect.• Keepalives are not being sent by the remote device38. Which of the following is a characteristics of TCP? (Choose two.)• data transport reliability• best path determination• establishing, maintaining, and terminating virtual circuits• encapsulation of packets in a data frame with source and destination MAC addresses• best-effort datagram delivery39. Which statement is true regarding the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)• A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.• 192.168.7.9 i s the destination network for this route.• 192.168.7.24 is the next-hop router in this command.• This command is issued from the interface configuration mode.• This command is used to define a static route40. Which of the following application layer protocols use TCP? (Choose three.)• SMTP• FTP• SNMP• HTTP• TFTP• DHCP41. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)• BECN• DLCI• DE• FECN• LMI• Inverse ARP42. Which of the following router commands will verify that a path exists to a destination network?• Router# show ip interfaces brief• Router# show ip route• Router# show cdp neighbors• Router# show running-config• Router# show protocols43. When EIGRP is configured on a router, which table of DUAL information is used to calculate the best route to each destination router?• router table• topology table• DUAL table• CAM table• ARP table44. Refer to the graphic. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which of the following commands is used on router A to summarize the attached routes, and to which interface is this command applied? (Choose two)• ip summary-address eigrp 1 192.168.10.64 255.255.255.192• ip area-range eigrp 1 192.168.10.80 255.255.255.224• summary-address 192.168.10.80 0.0.0.31• ip summary-address eigrp 1 192.168.10.64 0.0.0.63• serial interface on router A• serial interface on router B45. A router with two LAN interfaces, two WAN interfaces, and two loopback interfaces configured is operating with OSPF as its routing protocol. What is used by the OSPF process to assign the router ID? • the IP address of the interface configured with priority 0• the OSPF area ID configured on the interface with the highest IP addres s• the loopback with the highest IP address configured• the highest IP address on the LAN interfaces• the highest IP address configured on the WAN interfaces46. Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?• 172.0.0.0• 172.16.134.0• 172.16.134.32• 172.16.134.48• 172.16.134.47• 172.16.134.6347. Which commands show when the last IGRP routing update was received? (Choose two.)• Router# show ip protocols• Router# show version• Router# show interfaces• Router# show ip updates• Router# show ip route48. When using access control lists to filter traffic, which of the following is used to track multiple sessions occurring between hosts?• IP addresses• subnet masks• port numbers• routed protocols• routing protocols• interfaces49. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?• This is a useable host address.• This is a broadcast address.• This is a network address.• This is not a valid address50. The company network shown in the drawing has to be subnetted. The company has leased the ClassC IP address of 200.1.2.0. Which of the following network addresses and masks would be appropriate for one of the subnetworks?• 200.1.2.96 255.255.255.192• 200.1.2.160 255.255.255.224• 200.1.2.80 255.255.255.224• 200.1.2.32 255.255.255.240。
CCNA 2 - Module 1If a router cannot find a valid configuration file during the startup sequence, what will occur?The router will prompt the user for a response to enter setup mode.Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?The interfaces must be enabled with the no shutdown command.Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.) The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface.Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.)The router will change the frame type to one supported by the WAN link before forwarding the frame.The frame was received on the Fa0/0 interface of the router and will be s witched to the S0/0/0 interface.Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)VTY interfaceconsole interfaceprivileged EX EC modeWhich two statements correctly describe the components of a router? (Choose two.)ROM contains diagnostics executed on hardware modules.Flash memory does not lose its contents during a reboot.Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?The subnet mask of host 2 is incorrect.Host 1 and host 2 are on different networks.The switch needs an IP address that is not configured.The router LA N interface and host 1 are on different networks.The IP address of host 1 is on a different network than is the LAN interface of the router.Which are functions of a router? (Choose three.)packet s witchingsegmentation of broadcast domainsselection of best path based on logical addressingRefer to the exhibit. A ll routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# clock rate 56000Refer to the exhibit. What can be concluded from the output of the running-configuration of a router? The commands that are dis played determine the current operation of the router.Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)destination IP address: 192.168.10.134destination MAC address: 9999.DADC.1234What is the outcome of entering these commands?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# loginsets the password to be used for connecting to this router via T elnetWhich of the following is the correct flow of routines for a router startup?load bootstrap, load IOS, apply configurationWhat three processes does a router execute when it receives a packet from one network that is destinedfor another network? (Choose three.)decapsulates the Layer 3 packet by stripping off the Layer 2 frame headeruses the destination IP Address in the IP header to look up the next-hop address in the routing tableencapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interfaceThe network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?cross-overWhich two statements describe characteristics of load balancing? (Choose two.)Load balancing allows a router to forward packets over multiple paths to the same destination network.Unequal cost load balancing is supported by EIGRP.What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)the last restart methodthe configuration register settingsthe location from where the IOS loadedWhich interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)14From what location can a router load the Cisco IOS during the boot process? (Choose two.)TFTP serverFlash memoryA network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?Router1# copy running-config startup-configWhat is the default sequence for loading the configuration file?NVRAM, TFTP, CONSOLEWhat header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?the Layer 2 source and destination addressCCNA 2 - Module 2Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.)platformholdtimelocal interfaceWhy is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.The output of the Router# show interfaces serial 0/1 command displays the following: Serial0/1 is up, line protocol is down.What is the most likely cause for the line protocol being down?No clock rate has been set.A static route that points to the next hop IP will have what administrative distance and metric in the routing table?administrative distance of 1 and metric of 0Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1Refer to the exhibit. Which static route should be configured on Router1 so that hostA will be able to reach hostB on the 172.16.0.0 network?ip route 172.16.0.0 255.255.0.0 S0/0/0Which address can be used to summarize networks 172.16.0.0/24 thru 172.16.7.0/24?172.16.0.0/21Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).a modema CSU/DSU deviceA network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet?encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interfaceWhich piece of information is available from examining the output of the command show ip interface brief?Interface IP addressWhich of the following is true regarding CDP and the graphic shown?By default, Router A will receive CDP advertisements from routers B and C.Which two statements describe functions or characteristics of CDP? (Choose two.)It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.It allows systems to learn about each other even if different network layer protocols are configured.Hosts on two separate subnets cannot communicate. The network administrator suspectsa missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)pingtracerouteshow ip routeWhat happens to a static route entry in a routing table when the outgoing interface is not available?The route is removed from the table.The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?192.1.1.0/25Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0.A router has one static route configured to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)The destination network no longer exists.A topology change occurs where the existing next-hop address or exit interface is not accessible.Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link?The rate configured on the DCE determines the clock rate.Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet?WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1Refer to the exhibit. What two commands are required to provide connectivity betw een the 192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0CCNA 2 - Module 3Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)Administrative distance refers to the trustworthiness of a particular route.Routes with the smallest metric to a destination indicate the best path.Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.Which two statements are true regarding classless routing protoc ols? (Choose two.) sends subnet mask information in routing updatesallows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topologyWhich command would the network administrator issue to determine if load balancing is in effect on a router?show ip routeWhich statement is true regarding routing protocols?EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing.Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.)the network is using a hub and spoke topologythe network is using a flat designWhat is the purpose of a routing protocol?It allows a router to share information about known networks with other rou ters.Which of the following best describes the operation of distance vector routing protocols? They send their routing tables to directly connected neighbors.Which of the following is associated with link-state routing protocols?shortest-path first calculationsWhy is fast convergence desirable in networks that use dynamic routing protocols? Routers may make incorrect forwarding decisions until the network has converged.Which of the following conditions must be met in order for a network to have con verged The routers in the network are operating with consistent routing knowledge.Which two statements are true regarding metrics? (Choose two.)EIGRP uses bandwidth as a metric.OSPF uses cost based on bandwidth as a metric.Which two statements are true regarding the advantages of the use of static routes? (Choose two).increased securitythe administrator maintains control over routingThe following line of code is displayed in a routing table:R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0What can be concluded from this output?The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network.What will be the result of the following commands?ORL(config)# interface fastethernet 0/0ORL(config-if)# ip address 172.16.3.1 255.255.255.0ORL(config-if)# no shutdownA routing table entry is made to the 172.16.3.0 network with a code of "C".An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route?The administrative distance of this route is 1.Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1?The administrative distance of the route to network 172.16.0.0 will be 90.The following line of code is present in the routing table:O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1What does the number 129 indicate in this output?The cost for this link has a value of 129.A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?OSPF can be used between the routers.Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?3A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network?The router will install both routes in the routing table and load balance between the two.CCNA 2 - Module 4Which event will cause a triggered update?a route is installed in the routing tableThree routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers reload, what will happen?They will send updates that include only directly connected routes to their directly connected neighbors.What does the RIP holddown timer do?instructs routers to ignore updates, for a specified time or event, about possible inaccessible routesWhich two statements are true regarding the function of the RIPv1 routing updates? (Choose two).updates are broadcast at regular intervalsbroadcasts are sent to 255.255.255.255Which of the following statements are correct about RIP?will send out an update if there is a failure of a linkWhich two statements describe EIGRP? (Choose two.)EIGRP sends triggered updates whenever there is a change in topology that influences the routing information.EIGRP sends a partial routing table update, which includes just routes that have been changed.Which statement is true regarding cisco’s RIP_JITTER variable?It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of the specified interval time from the next routing update interval.What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.Which of the following methods does split horizon use to reduce incorrect routing information?Information learned from one source is not distributed back to that source.The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?route poisoningWhat is the purpose of the TTL field in the IP header?limits the time or hops that a packet can traverse through the network before it should be discardedWhich of the following can exist in a distance vector network that has not converged? (Choose three.)routing loopsinconsistent traffic forwardinginconsistent routing table entriesRefer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A respond?The Invalid timer will mark the route as unusable if an update has not been received in 180 seconds.A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion and must respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (Choose two.)EIGRP only updates affected neighbors.EIGRP updates are partial.Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is the active routing protocol?The path will be router A -> router D -> router E.Which three routing protocols are distance vector routing proto cols? (Choose three).RIPv1EIGRPRIPv2What is a routing loop?a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destinationWhich two conditions are most likely to cause a routing loop? (Choose two.)inconsistent routing tablesincorrectly configured static routesWhat metric does the RIP routing protocol consider to be infinity?16What does a router running RIP do first with a new route that is received from an advertisement?adjusts the metric for the new route to show the added distance for the routeRefer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks?3CCNA 2 - Module 5Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers?Router1(config-router)# passive-interface fastethernet 0/0The following line was displayed in the output of the show ip route command.R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0What is the value of the routing metric?3Which of the following is considered a limitation of RIP v1?RIP v1 does not send subnet mask information in its updates.Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator notices that the route is still in the Router1 routing table. How much longer will Router1 keep the down network in its routing table before marking it as possibly down?155 secondsRefer to the exhibit. Router1 is running RIPv1. What command was entered into Router1 to configure the gateway of last resort?ip route 0.0.0.0 0.0.0.0 S0/0/1What are three characteristics of the RIPv1 routing protocol? (Choose three.)uses hop count as a metricconsiders a metric of 16 as infinitycalculates metrics using the Bellman Ford algorithmWhich of the following would be the correct command sequence to enable RIP on Router B for all connected networks?RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 220.17.29.0What is the default update period in seconds for the RIP routing protocol?30Refer to the exhibit. What can be concluded from the routing table output of router B? The default-information originate command has been entered on A.Refer to the exhibit. A network consists of multiple routers. What can be verified when the show ip protocols command is issued on one of the routers in the network? routing protocol configuration in use for IP on this routerRefer to the exhibit. All routers are configured with valid interface addresses in the indicated networks and are running RIPv1. The network is converged. Which routes are present in the routing tables?All routers have all /30 routes. Routers A and E also have some of the /24 routes in their routing table.Which two statements are true regarding the characteristics of RIPv1? (Choose two). It is a distance vector routing protocol.The data portion of a RIP message is encapsulated into a UDP segment.Which command or set of commands will stop the RIP routing process?RouterB(config)# no router ripRefer to the exhibit. All routers in the exhibit are running RIP v1. The network administrator issues the show ip route command on router A. What routes would ap pear in the routing table output if the network is converged? (Choose two).R 192.168.2.0/24 [120/1]R 10.10.1.0/24 [120/2]Which command will display RIP activity as it occurs on a router?debug ip ripRefer to the output from the show ip route command. What can be concluded from the output of this router command?There are two equal cost paths to network 1.0.0.0.Refer to the exhibit. Router1 and Router2 are running the RIPv1 protocol. The network administrator configures the command network 10.1.0.0 on Router1. What network will Router1 advertise to Router2?10.0.0.0/8Refer to the exhibit. Pings between the serial interfaces of the routers are successful. Hosts on each LAN can ping the Fa0/0 interface of the router to which they are directlyconnected through the switch. However, pings between hosts on the 10.1.1.0/24 and 10.1.2.0/24 networks are unsuccessful. What is a likely cause of this problem?RIP is configured incorrectly on R1.What will happen if an interface IP address is entered for the address portion of the network command in a RIPv1 configuration instead of a network address?All interfaces in the same classful network as the configured address will be included in the RIPv1 routing process.Refer to the exhibit. All routers that are shown are running the RIP routing protocol. All unknown IP traffic must be forwarded to the ISP. What router or set of routers are recommended to have both a default route and the default-information originate command issued to implement this forwarding policy?only the gateway routerCCNA 2 - Module 6What two advantages does CIDR provide to a network? (Choose two.)reduced routing table sizereduced routing update trafficRefer to the exhibit. The network administrator wants to create a subnet for the po int-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?255.255.255.252Refer to the exhibit. A network engineer is summarizing the two groups of routes on router R1 shown in the exhibit. Which summarization will work for all the subnets?192.168.0.0/21Which of the following are contained in the routing updates of classless routing protocols? (Choose two.)32-bit addresssubnet maskWhich of the following problems does VLSM help to alleviate?the shortage of IP addressesWhat does VLSM allow a network administrator to do?utilize multiple subnet masks in the same IP address spaceRefer to the exhibit. What subnet mask will be applied if Router A sends a RIPv1 update for the network 172.16.1.0 to Router B?24Refer to the exhibit. The network administrator wants to minimize the number of entries in Router1’s routing table. What should the administrator implement on the network?CIDRA router has a summary route to network 192.168.32.0/20 installed in its routing table. What range of networks are summarized by this route?192.168.32.0 – 192.168.47.0/24A network administrator is tasked with dividing up a class C network among the QA, Sales, and Administration departments. The QA department is made up of 10 people, the Sales is made up of 28 people, and the Administration has 6. Which two subnets masks adequately address the QA and Sales departments? (Choose two.)255.255.255.224 for Sales255.255.255.240 for QAIn the network shown in the graphic, three bits were borrowed from the host portion of a Class C address. How many valid host addresses will be unused on the three point-to-point links combined if VLSM is not used?84A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses?/27An additional subnet is required for a new Ethernet link between Router1 and Router2 as shown in the diagram. Which of the following subnet addresses can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses?192.1.1.224/28Which three interior routing protocols support VLSM? (Choose three.)OSPFRIP v2EIGRPRefer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address requirements for all router ports and hosts on that subnet. After all device and router port address assignments are determined, what will be the total number of unused host addresses available?29Refer to the exhibit. In the network that is shown, the router interfaces are assigned the first address ineach subnet. Which IP address would be usable for a host on one of the LANs in this network?192.168.2.130/25Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?192.168.4.15/29Refer to the exhibit. A network administrator needs to create two subnetworks from 10.0.0.0/8 for a router running RIPv2. The Admin subnet requires 120 hosts and the Sales subnet requires 58 hosts. The network administrator assigned 10.0.1.128/25 to the Admin subnet. The Sales subnet i s given 10.0.1.192/26. What will be the result of this addressing scheme?Because RIPv2 does not support VLSM, the subnet masks will not be allowed.The subnets overlap and will be rejected by the router.Refer to the exhibit. A network technician enters the static route in R1 needed to reach network 10.1.1.0/24. A ping from the S0/0/0 interface on R1 to host B fails. The technician begins testing the network and has the following results:1. pings from R1 to the S0/0/0 interface on R2....successful2. pings from R1 to the Fa0/0 interface on R2....successful3. pings from host B to hosts on the 10.1.1.0/24 network....successful4. pings from host B to the Fa0/0 interface on R2....successful5. pings from R2 to host B....successful.The default gateway on host B is not correctly set.What is a supernet?a summarization of classful addressesCCNA 2 - Module 7Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 will auto summarize routes by default.Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router2 will not install a route to 192.168.16.0/20Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router2(config-router)# version 2What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLS M.。
1.请参见图示。
对于发往192.168.2.0 的数据包,R2 会采取什么操作?A、它会丢弃数据包。
B、它会通过S0/0/0 接口转发数据包。
C、它会通过Fa0/0 接口转发数据包。
D、它会将数据包转发给R1。
2请参见图示。
R1 会使用哪一总结地址来向R2 通告其网络?A、192.168.1.0/24B、192.168.0.0/24C、192.168.0.0/22D、192.168.1.0/223请参见图示。
尽管R2 已配置正确,但主机A 还是无法访问Internet。
可以在R1 上配置哪两条可让主机A 访问Internet 的静态路由?(选择两项。
)A、ip route 0.0.0.0 0.0.0.0 Fa0/0B、ip route 0.0.0.0 0.0.0.0 Fa0/1C、ip route 0.0.0.0 0.0.0.0 10.1.1.1D、ip route 0.0.0.0 0.0.0.0 10.1.1.2E、ip route 209.165.202.0 255.255.255.0 10.1.1.14请参见图示。
网络管理员已按图示配置了R1,并且所有接口都运作正常。
但从R1 ping 172.16.1.1 时失败。
造成此问题的原因可能是什么?A、R1 上的串行接口配置有误。
B、默认路由配置有误。
C、必须在R1 上发出default-information originate 命令。
D、必须在R1 上禁用自动总结。
5请参见图示。
所有接口都已编址,并且运行正常。
网络管理员在主机A 上运行了tracert 命令。
得到这种输出的原因可能是什么?(选择两项。
)A、主机A 缺少网关或配置不正确。
B、主机B 缺少网关或配置不正确。
C、R1 的路由表中缺少192.168.1.0/24 的条目。
D、R2 的路由表中缺少192.168.1.0/24 的条目。
E、R1 的路由表中缺少192.168.2.0/24 的条目。
F、R2 的路由表中缺少192.168.2.0/24 的条目。
6请参见图示。
从主机A 到主机B 的ping 成功,但从主机A ping 在Internet 上正常运行的主机却失败了。
此问题的原因是什么?A、R1 的快速以太网接口被禁用。
B、其中一条默认路由配置有误。
C、未在这两台路由器上配置路由协议。
D、主机A 上尚未配置默认网关。
7网络管理员使用RIP 路由协议在一个自治系统内实施路由。
下列哪两项是该协议的特征?(选择两项。
)A、使用贝尔曼-福特算法确定最佳路径。
B、显示确切的网络拓扑图。
C、可以使大型网络快速收敛。
D、定期将完整的路由表发送给所有连接的设备。
E、在复杂网络和分层设计网络中很有用。
8请参见图示。
两台路由器无法建立相邻关系。
此问题的原因可能是什么?A、这两台路由器连接在多路访问网络中。
B、这两台路由器上的hello 间隔和dead 间隔不同。
C、它们的OSPF 路由器ID 不同。
D、它们的进程ID 不相同。
9在两台路由器能够使用OSPF 形成邻居邻接关系之前必须完成哪两项任务?(选择两项。
)A、路由器必须选举出指定路由器。
B、路由器必须在网络类型方面达成一致。
C、路由器必须使用相同的dead 时间间隔。
D、路由器必须交换链路状态请求。
E、路由器必须交换数据库描述数据包。
答案:BC10下列关于链路状态路由协议的陈述,哪两项是正确的?(选择两项。
)A、运行链路状态协议的路由器可以建立完整的网络拓扑。
B、多点网络中运行链路状态协议的路由器可以交换路由表。
C、路由器仅使用跳数来作出路由决定。
D、仅使用最短路径优先算法。
E、使用水平分割避免路由环路。
答案:AD11请参见图示。
下列关于Router1 路由表的陈述,哪三项是正确的?(选择三项。
)到网络172.16.0.0 的路由的AD 为156160。
A、FastEthernet0/0 具有到达网络192.168.0.16 的最佳路径。
B、EIGRP 路由的AD 已经手动更改为默认值以外的其它值。
C、Router1 正同时运行着EIGRP 和OSPF 路由过程。
D、仅能通过默认路由到达网络172.17.0.0。
E、尚未配置任何默认路由。
12请参见图示。
所有路由器都运行RIPv1。
10.1.1.0/29 和10.1.1.16/29 这两个网络无法互相访问。
此问题的原因可能是什么?A、因为RIPv1 是无类协议,不支持该访问。
B、RIPv1 不支持不连续网络。
C、RIPv1 不支持负载均衡。
D、RIPv1 不支持自动总结13请参见图示。
10.4.0.0 网络发生故障。
哪种机制可防止R2 接收有关10.4.0.0 网络的错误更新信息?A、水平分割B、抑制计时器C、路由毒化D、触发更新14请参见图示。
尝试诊断网络中的路由问题时,网络管理员运行了debug ip rip 命令。
根据此命令的输出,我们可以得出什么结论?A、路由器正在广播RIP 更新。
B、路由器将无法ping 通192.168.1.2。
C、路由器直接连接至网络172.16.1.0 /24。
D、路由器有两个接口参与RIP 过程。
E、路由器将从接口Serial0/0/1 转发192.168.1.0 的更新。
15请参见图示。
当数据包发往哪两个网络时需要路由器执行递归查找?(选择两项。
)A、10.0.0.0/8B、64.100.0.0/16C、128.107.0.0/16D、172.16.40.0/24E、192.168.1.0/24F、192.168.2.0/2416下列关于RIPv1 协议的叙述,哪一项是正确的?A、是一种链路状态路由协议。
B、路由更新中不包含子网信息。
C、使用DUAL 算法将备用路由插入拓扑表中。
D、在路由器上使用无类路由作为默认的路由方式。
17下列哪两项用于在配置OSPF 路由进程时确定路由器ID?(选择两项。
)A、第一个快速以太网接口的IP 地址B、任何逻辑接口的最大IP 地址C、任何物理接口的最大IP 地址D、默认网关的IP 地址E、优先级为1 的任何物理接口18请参见图示。
路由器R2 经过适当配置,并且所有接口均运行正常。
最近安装了路由器R1。
主机A 无法ping 通主机B。
下列哪个步骤可解决此问题?A、使用R1 串行接口的IP 地址在R1 上配置一条静态路由。
B、使用R1 上的送出接口Fa0/0 在R1 上配置一条默认路由。
C、使用R2 S0/0/0 的IP 地址在R1 上配置一条静态路由。
D、使用R2 Fa0/0 的IP 地址在R1 上配置一条默认路由。
19路由器通过EIGRP 和RIP 协议获知到两条通往远程网络的等价路径。
两个协议都采用其默认配置。
哪条通往远程网络的路径会被添加到路由表中?A、通过EIGRP 获知的路径B、通过RIP 获知的路径C、度量值最大的路径D、负载均衡的两条路径都会添加到路由表中20下列哪两项是路由器的功能?(选择两项。
)A、路由器会向目的地转发数据包。
B、如果TTL 值为0,则路由器会将数据包转发到目的地。
C、将数据包转发到送出接口前,路由器会更改数据包的目的IP 地址。
D、路由器会根据目的MAC 地址确定最佳路径。
E、路由器相当于多个IP 网络的汇合点。
21请参见图示。
在R1 上运行了show cdp neighbors 命令。
从输出中可以推断出新检测到的设备具有哪两项情况?(选择两项。
)A、ABCD 是连接到R1 的一台路由器。
B、ABCD 是连接到R1 的一台非CISCO 设备。
C、该设备连接到R1 的Serial0/0/1 接口。
D、R1 连接到设备ABCD 的S0/0/1 接口。
E、ABCD 不支持交换功能。
22请参见图示。
从此输出可以得到什么结论?(选择两项。
)A、三台网络设备直接连接到Router2。
B、Router2 和Router3 之间的串行接口为开启状态。
C、Router1 和Router3 直接相连。
D、六台设备处于工作状态且在网络中运作。
E、路由器之间的第3 层功能已正确配置。
23请参见图示。
R2 已正确配置。
网络管理员已配置了R1,如图所示。
下列有关R1 转发路由信息的陈述,哪两项是正确的?(选择两项。
)A、R1 会转发子网192.168.100.0/30 的路由信息。
B、R1 不会转发子网192.168.100.4.0/30 的路由信息。
C、R1 会转发管理距离设置为50 的路由信息。
D、R1 会转发网络192.168.100.0/24 的总结路由信息。
E、R1 会将子网10.10.10.0/30 的路由信息从串行接口转发出去。
24下列路由器组件和操作的配对中,哪两项是正确的?(选择两项。
)A、DRAM - 加载bootstrapB、RAM - 存储操作系统C、闪存- 启动时执行诊断D、NVRAM - 存储配置文件E、ROM - 存储备份配置文件F、POST - 运行硬件模块诊断25请参见图示。
要完成配置需要哪两个组件?(选择两项。
)A、交叉电缆B、DCE 设备C、DTE 设备D、调制解调器E、V.35 电缆26路由器重新启动并进入设置模式。
此问题的原因是什么?A、IOS 映像损坏。
B、闪存中缺少Cisco IOS。
C、NVRAM 中缺少配置文件。
D、POST 过程检测到硬件故障。
27请参见图示。
主机A 无法访问Internet。
此问题的原因是什么?A、主机A 的IP 地址不正确。
B、主机A 的默认网关不正确。
C、两台路由器的Fa0/1 接口配置了不同的子网。
D、R1 Fa0/0 的子网掩码不正确。
28请参见图示。
网络管理员想要减小R1 的路由表的大小。
哪项R1 路由表的部分信息可代表对R2 各子网进行的路由总结,且不包含任何多余子网?A、10.0.0.0/16 is subnetted, 1 subnetsD 10.5.0.0[90/205891] via 192.168.1.2, S0/0/0B、10.0.0.0/24 is subnetted, 4 subnetsD 10.5.0.0[90/205198] via 192.168.1.2, S0/0/0C、10.0.0.0/22 is subnetted, 1 subnetsD 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0D、10.0.0.0/8 is subnetted, 4 subnetsD 10.5.0.0[90/205001] via 192.168.1.2, S0/0/029请参见图示。
有多少条路由是最终路由?A、3B、4C、5D、730请参见图示。
两台路由器都使用RIPv2 路由协议,且未定义静态路由。
R1 可以ping 通192.168.2.1 和10.1.1.2,但无法ping 通192.168.4.1。