Senior Acquisitions Editor: Kenyon Brown Development Editor: Kim Wimpsett


Table I.15 10% 5.0 Infrastructure Services Objective



Yüklə 22,5 Mb.
Pdf görüntüsü
səhifə5/69
tarix26.10.2019
ölçüsü22,5 Mb.
#29436
1   2   3   4   5   6   7   8   9   ...   69
Todd Lammle CCNA Routing and Switching


Table I.15 10% 5.0 Infrastructure Services

Objective

Chapter(s)

5.1 Describe DNS lookup operation

7

5.2 Troubleshoot client connectivity issues involving DNS



7

5.3 Configure and verify DHCP on a router (excluding

static reservations)

7

5.3.a Server



7

5.3.b Relay

7

5.3.c Client



7

5.3.d TFTP, DNS, and gateway options

7

5.4 Troubleshoot client- and router-based DHCP



connectivity issues

7

5.5 Configure, verify, and troubleshoot basic HSRP



16

5.5.a Priority

16

5.5.b Preemption



16

5.5.c Version

16

5.6 Configure, verify, and troubleshoot inside source NAT



13

5.6.a Static

13

5.6.b Pool



13

5.6.c PAT

13

5.7 Configure and verify NTP operating in a client/server



mode

7

Table I.16 11% 6.0 Infrastructure Security



Objective

Chapter(s)

6.1 Configure, verify, and troubleshoot port security

10

6.1.a Static



10

6.1.b Dynamic

10

6.1.c Sticky



10

6.1.d Max MAC addresses

10

6.1.e Violation actions



10

6.1.f Err-disable recovery

10

6.2 Describe common access layer threat mitigation



techniques

15

,



16

,

20



6.2.a 802.1x

16


6.2.b DHCP snooping

16

6.2.c Nondefault native VLAN



15

,

20



6.3 Configure, verify, and troubleshoot IPv4 and IPv6

access list for traffic filtering

20

6.3.a Standard



20

6.3.b Extended

20

6.3.c Named



20

6.4 Verify ACLs using the APIC-EM Path Trace ACL

Analysis tool

22

6.5 Configure, verify, and troubleshoot basic device



hardening

6

6.5.a Local authentication



6

6.5.b Secure password

6

6.5.c Access to device



6

6.5.c. (i) Source address

6

6.5.c. (ii) Telnet/SSH



6

6.5.d Login banner

6

6.6 Describe device security using AAA with TACACS+ and



RADIUS

16

Table I.17 10% 7.0 Infrastructure Management



Objective

Chapter(s)

7.1 Configure and verify device-monitoring protocols

16

7.1.a SNMPv2



16

7.1.b SNMPv3

16

7.1.c Syslog



7

,

16



7.2 Troubleshoot network connectivity issues using ICMP

echo-based IP SLA

20

7.3 Configure and verify device management



7

,

8



7.3.a Backup and restore device configuration

7

7.3.b Using Cisco Discovery Protocol or LLDP for device



discovery

7


7.3.c Licensing

8

7.3.d Logging



7

7.3.e Timezone

7

7.3.f Loopback



7

7.4 Configure and verify initial device configuration

6

7.5 Perform device maintenance



6

,

8



7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP,

and MD5 verify)

8

7.5.b Password recovery and configuration register



8

7.5.c File system management

8

7.6 Use Cisco IOS tools to troubleshoot and resolve



problems

6

7.6.a Ping and traceroute with extended option



6

7.6.b Terminal monitor

6

7.6.c Log events



6

7.6.d Local SPAN

6

,

20



7.7 Describe network programmability in enterprise

network architecture

22

7.7.a Function of a controller



22

7.7.b Separation of control plane and data plane

22

7.7.c Northbound and southbound APIs



22

*******************



Assessment Test

1.  What is the

sys-id-ext

field in a BPDU used for?

A.  It is a 4-bit field inserted into an Ethernet frame to define trunking

information between switches.

B.  It is a 12-bit field inserted into an Ethernet frame to define VLANs

in an STP instance.

C.  It is a 4-bit field inserted into an non-Ethernet frame to define

EtherChannel options.

D.  It is a 12-bit field inserted into an Ethernet frame to define STP

root bridges.

2.  You have four RSTP PVST+ links between switches and want to

aggregate the bandwidth. What solution will you use?

A.  EtherChannel

B.  PortFast

C.  BPDU Channel

D.  VLANs

E.  EtherBundle

3.  What configuration parameters must be configured the same between

switches for LACP to form a channel? (Choose three.)

A.  Virtual MAC address

B.  Port speeds

C.  Duplex

D.  PortFast enabled

E.  Allowed VLAN information

4.  You reload a router with a configuration register setting of 0x2101.

What will the router do when it reloads?

A.  The router enters setup mode.

B.  The router enters ROM monitor mode.



C.  The router boots the mini-IOS in ROM.

D.  The router expands the first IOS in flash memory into RAM.

5.  Which of the following commands provides the product ID and serial

number of a router?

A.

show license



B.

show license feature

C.

show version



D.

show license udi

6.  Which command allows you to view the technology options and

licenses that are supported on your router along with several status

variables?

A.


show license

B.


show license feature

C.


show license udi

D.


show version

7.  Which of the following services provide the operating system and the

network?

A.  IaaS


B.  PaaS

C.  SaaS


D.  none of the above

8.  You want to send a console message to a syslog server, but you only

want to send status messages of 3 and lower. Which of the following

commands will you use?

A.

logging trap emergencies



B.

logging trap errors

C.

logging trap debugging



D.

logging trap notifications

E.

logging trap critical



F.

logging trap warnings

G.

logging trap alerts



9.  When stacking switches, which is true? (Choose 2)

A.  The stack is managed as multiple objects, and has a single

management IP address

B.  The stack is managed as a single object, and has a single

management IP address

C.  The master switch is chosen when you configure the first switches

master algorithm to on

D.  The master switch is elected form one of the stack member

switches

10.  You need to connect to a remote IPv6 server in your virtual server

farm. You can connect to the IPv4 servers, but not the critical IPv6

server you desperately need. Based on the following output, what

could your problem be?

C:\>


ipconfig

Connection-specific DNS Suffix . : localdomain

IPv6 Address. . . . . . . . . . . :

2001:db8:3c4d:3:ac3b:2ef:1823:8938

Temporary IPv6 Address. . . . . . :

2001:db8:3c4d:3:2f33:44dd:211:1c3d

Link-local IPv6 Address . . . . . : fe80::ac3b:2ef:1823:8938%11

IPv4 Address. . . . . . . . . . . : 10.1.1.10

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 10.1.1.1

A.  The global address is in the wrong subnet.

B.  The IPv6 default gateway has not been configured or received from

the router.

C.  The link-local address has not been resolved so the host cannot

communicate to the router.

D.  There are two IPv6 global addresses configured. One must be

removed from the configuration.

11.  What command is used to view the IPv6-to-MAC-address resolution

table on a Cisco router?



A.

show ip arp

B.

show ipv6 arp



C.

show ip neighbors

D.

show ipv6 neighbors



E.

show arp


12.  An IPv6 ARP entry is listed as with a status of REACH. What can you

conclude about the IPv6-to-MAC-address mapping?

A.  The interface has communicated with the neighbor address and

the mapping is current.

B.  The interface has not communicated within the neighbor

reachable time frame.

C.  The ARP entry has timed out.

D.  IPv6 can reach the neighbor address but the addresses has not yet

been resolved.

13.  Serial0/1 goes down. How will EIGRP send packets to the 10.1.1.0

network?

Corp#show ip eigrp topology

[output cut]

P 10.1.1.0/24, 2 successors, FD is 2681842

via 10.1.2.2 (2681842/2169856), Serial0/0

via 10.1.3.1 (2973467/2579243), Serial0/2

via 10.1.3.3 (2681842/2169856), Serial0/1

A.  EIGRP will put the 10.1.1.0 network into active mode.

B.  EIGRP will drop all packets destined for 10.1.1.0.

C.  EIGRP will just keep sending packets out s0/0.

D.  EIGRP will use s0/2 as the successor and keep routing to 10.1.1.0.

14.  What command produced the following output?

via FE80::201:C9FF:FED0:3301 (29110112/33316), Serial0/0/0

via FE80::209:7CFF:FE51:B401 (4470112/42216), Serial0/0/1

via FE80::209:7CFF:FE51:B401 (2170112/2816), Serial0/0/2

A.


show ip protocols

B.

show ipv6 protocols

C.

show ip eigrp neighbors



D.

show ipv6 eigrp neighbors

E.

show ip eigrp topology



F.

show ipv6 eigrp topology

15.  You need to troubleshoot an adjacency between two EIGRP

configured routers? What should you look for? (Choose four.)

A.  Verify the AS numbers.

B.  Verify that you have the proper interfaces enabled for EIGRP.

C.  Make sure there are no mismatched K-values.

D.  Check your passive interface settings.

E.  Make sure your remote routers are not connected to the Internet.

F.  If authentication is configured, make sure all routers use different

passwords.

16.  You have two OSPF directly configured routers that are not forming

an adjacency. What should you check? (Choose three.)

A.  Process ID

B.  Hello and dead timers

C.  Link cost

D.  Area

E.  IP address/subnet mask

17.  When do two adjacent routers-enter the 2WAY state?

A.  After both routers have received Hello information

B.  After they have exchanged topology databases

C.  When they connect only to a DR or BDR

D.  When they need to exchange RID information

18.  Which type of LSAs are generated by ABRs and referred to summary

link advertisements (SLAs)?


A.  Type 1

B.  Type 2

C.  Type 3

D.  Type 4

E.  Type 5

19.  Which of the following is not provided by the AH portion of IPsec?

A.  Integrity

B.  Confidentiality

C.  Authenticity

D.  Anti-reply

20.  Which statement about GRE is not true?

A.  GRE is stateless and has no flow control.

B.  GRE has security.

C.  GRE has additional overhead for tunneled packets, at least 24

bytes.

D.  GRE uses a protocol-type field in the GRE header so any layer 3



protocol can be used through the tunnel.

21.  Which QoS mechanism will drop traffic if a session uses more than

the allotted bandwidth?

A.  Congestion management

B.  Shaping

C.  Policing

D.  Marking

22.  IPv6 unicast routing is running on the Corp router. Which of the

following addresses would show up with the show ipv6 int brief

command?


Corp#

sh int f0/0

FastEthernet0/0 is up, line protocol is up

Hardware is AmdFE, address is 000d.bd3b.0d80 (bia

000d.bd3b.0d80)



[output cut]

A.


FF02::3c3d:0d:bdff:fe3b:0d80

B.


FE80::3c3d:2d:bdff:fe3b:0d80

C.


FE80::3c3d:0d:bdff:fe3b:0d80

D.


FE80::3c3d:2d:ffbd:3bfe:0d80

23.  A host sends a type of NDP message providing the MAC address that

was requested. Which type of NDP was sent?

A.  NA


B.  RS

C.  RA


D.  NS

24.  Each field in an IPv6 address is how many bits long?

A.  4

B.  16


C.  32

D.  128


25.  To enable OSPFv3, which of the following would you use?

A.  Router(config-if)#ipv6 ospf 10 area 0.0.0.0

B.  Router(config-if)#ipv6 router rip 1

C.  Router(config)#ipv6 router eigrp 10

D.  Router(config-rtr)#no shutdown

E.  Router(config-if)#ospf ipv6 10 area 0

26.  What does the command

routerA(config)#



line cons 0

allow you to

perform next?

A.  Set the Telnet password.

B.  Shut down the router.

C.  Set your console password.

D.  Disable console connections.


27.  Which two statements describe the IP address 10.16.3.65/23? (Choose

two.)


A.  The subnet address is 10.16.3.0 255.255.254.0.

B.  The lowest host address in the subnet is 10.16.2.1 255.255.254.0.

C.  The last valid host address in the subnet is 10.16.2.254

255.255.254.0.

D.  The broadcast address of the subnet is 10.16.3.255 255.255.254.0.

E.  The network is not subnetted.

28.  On which interface do you configure an IP address for a switch?

A.


int fa0/0

B.


int vty 0 15

C.


int vlan 1

D.


int s/0/0

29.  Which of the following is the valid host range for the subnet on which

the IP address 192.168.168.188 255.255.255.192 resides?

A.  192.168.168.129–190

B.  192.168.168.129–191

C.  192.168.168.128–190

D.  192.168.168.128–192

30.  Which of the following is considered to be the inside host's address

after translation?

A.  Inside local

B.  Outside local

C.  Inside global

D.  Outside global

31.  Your inside locals are not being translated to the inside global

addresses. Which of the following commands will show you if your

inside globals are allowed to use the NAT pool?

ip nat pool Corp 198.18.41.129 198.18.41.134 netmask


255.255.255.248

ip nat inside source list 100 int pool Corp overload

A.

debug ip nat



B.

show access-list

C.

show ip nat translation



D.

show ip nat statistics

32.  How many collision domains are created when you segment a network

with a 12-port switch?

A.  1

B.  2


C.  5

D.  12


33.  Which of the following commands will allow you to set your Telnet

password on a Cisco router?

A.

line telnet 0 4



B.

line aux 0 4

C.

line vty 0 4



D.

line con 0

34.  Which router command allows you to view the entire contents of all

access lists?

A.

show all access-lists



B.

show access-lists

C.

show ip interface



D.

show interface

35.  What does a VLAN do?

A.  Acts as the fastest port to all servers

B.  Provides multiple collision domains on one switch port

C.  Breaks up broadcast domains in a layer 2 switch internetwork



D.  Provides multiple broadcast domains within a single collision

domain


36.  If you wanted to delete the configuration stored in NVRAM, choose

the best answer for the Cisco objectives.

A.

erase startup



B.

delete running

C.

erase flash



D.

erase running

37.  Which protocol is used to send a destination network unknown

message back to originating hosts?

A.  TCP

B.  ARP


C.  ICMP

D.  BootP

38.  Which class of IP address provides 15 bits for subnetting?

A.  A


B.  B

C.  C


D.  D

39.  There are three possible routes for a router to reach a destination

network. The first route is from OSPF with a metric of 782. The

second route is from RIPv2 with a metric of 4. The third is from

EIGRP with a composite metric of 20514560. Which route will be

installed by the router in its routing table?

A.  RIPv2

B.  EIGRP

C.  OSPF

D.  All three

40.  Which one of the following is true regarding VLANs?


A.  Two VLANs are configured by default on all Cisco switches.

B.  VLANs only work if you have a complete Cisco switched

internetwork. No off-brand switches are allowed.

C.  You should not have more than 10 switches in the same VTP

domain.

D.  You need to have a trunk link configured between switches in



order to send information about more than one VLAN down the

link.


41.  Which two of the following commands will place network 10.2.3.0/24

into area 0? (Choose two.)

A.

router eigrp 10



B.

router ospf 10

C.

router rip



D.

network 10.0.0.0

E.

network 10.2.3.0 255.255.255.0 area 0



F.

network 10.2.3.0 0.0.0.255 area0

G.

network 10.2.3.0 0.0.0.255 area 0



42.  How many broadcast domains are created when you segment a

network with a 12-port switch?

A.  1

B.  2


C.  5

D.  12


43.  If routers in a single area are configured with the same priority value,

what value does a router use for the OSPF router ID in the absence of

a loopback interface?

A.  The lowest IP address of any physical interface

B.  The highest IP address of any physical interface

C.  The lowest IP address of any logical interface

D.  The highest IP address of any logical interface


44.  What protocols are used to configure trunking on a switch? (Choose

two.)


A.  VLAN Trunking Protocol

B.  VLAN


C.  802.1q

D.  ISL


45.  What is a stub network?

A.  A network with more than one exit point

B.  A network with more than one exit and entry point

C.  A network with only one entry and no exit point

D.  A network that has only one entry and exit point

46.  Where is a hub specified in the OSI model?

A.  Session layer

B.  Physical layer

C.  Data Link layer

D.  Application layer

47.  What are the two main types of access control lists (ACLs)? (Choose

two.)


A.  Standard

B.  IEEE


C.  Extended

D.  Specialized

48.  Which of the following is the best summarization of the following

networks: 192.168.128.0 through 192.168.159.0?

A.  192.168.0.0/24

B.  192.168.128.0/16

C.  192.168.128.0/19

D.  192.168.128.0/20



49.  What command is used to create a backup configuration?

A.


copy running backup

B.


copy running-config startup-config

C.


config mem

D.


wr net

50.  1000Base-T is which IEEE standard?

A.  802.3f

B.  802.3z

C.  802.3ab

D.  802.3ae

51.  Which protocol does DHCP use at the Transport layer?

A.  IP


B.  TCP

C.  UDP


D.  ARP

52.  If your router is facilitating a CSU/DSU, which of the following

commands do you need to use to provide the router with a 64000 bps

serial link?

A.

RouterA(config)#bandwidth 64



B.

RouterA(config-if)#bandwidth 64000

C.

RouterA(config)#clockrate 64000



D.

RouterA(config-if)#clock rate 64

E.

RouterA(config-if)#clock rate 64000



53.  Which command is used to determine if an access list is enabled on a

particular interface?

A.

show access-lists



B.

show interface

C.

show ip interface



D.

show interface access-lists

54.  Which of the following statements is true with regard to ISL and

802.1q?


A.  802.1q encapsulates the frame with control information; ISL

inserts an ISL field along with tag control information.

B.  802.1q is Cisco proprietary.

C.  ISL encapsulates the frame with control information; 802.1q

inserts an 802.1q field along with tag control information.

D.  ISL is a standard.

55.  The protocol data unit (PDU) encapsulation is completed in which

order?


A.  Bits, frames, packets, segments, data

B.  Data, bits, segments, frames, packets

C.  Data, segments, packets, frames, bits

D.  Packets, frames, bits, segments, data

56.  Based on the configuration shown below, what statement is true?

S1(config)#



ip routing

S1(config)#



int vlan 10

S1(config-if)#



ip address 192.168.10.1 255.255.255.0

S1(config-if)#



int vlan 20

S1(config-if)#



ip address 192.168.20.1 255.255.255.0

A.  This is a multilayer switch.

B.  The two VLANs are in the same subnet.

C.  Encapsulation must be configured.

D.  VLAN 10 is the management VLAN.

******************



Answers to Assessment Test

1.  B. To allow for the PVST+ to operate, there's a field inserted into the

BPDU to accommodate the extended system ID so that PVST+ can


have a root bridge configured on a per-STP instance. The extended

system ID (VLAN ID) is a 12-bit field, and we can even see what this

field is carrying via show spanning-tree command output. See Chapter

15 for more information.

2.  A. Cisco's EtherChannel can bundle up to eight ports between

switches to provide resiliency and more bandwidth between switches.

See Chapter 15 for more information.

3.  B, C, E. All the ports on both sides of every link must be configured

exactly the same between switches or it will not work. Speed, duplex,

and allowed VLANs must match. See Chapter 15 for more

information.

4.  C. 2100 boots the router into ROM monitor mode, 2101 loads the

mini-IOS from ROM, and 2102 is the default and loads the IOS from

flash. See Chapter 8 for more information.

5.  D. The

show license udi

command displays the unique device

identifier (UDI) of the router, which comprises the product ID (PID)

and serial number of the router. See Chapter 8 for more information.

6.  B. The

show license

feature command allows you to view the

technology package licenses and feature licenses that are supported

on your router along with several status variables related to software

activation and licensing, both licensed and unlicensed features. See

Chapter 8 for more information.

7.  C, D, F. The SDN architecture slightly differs from the architecture of

traditional networks. It comprises three stacked layers: Data, Control

and Application. See Chapter 8 for more information.

8.  B. There are eight different trap levels. If you choose, for example

level 3, level 0 through level 3 messages will be displayed. See Chapter

8 for more information.

9.  B, D. Each stack of switches has a single IP address and is managed as

a single object. This single IP management applies to activities such as

fault detection, VLAN creation and modification, security, and QoS

controls. Each stack has only one configuration file, which is

distributed to each member in the stack. When you add a new switch

to the stack, the master switch automatically configures the unit with

the currently running IOS image and the configuration of the stack.


You do not have to do anything to bring up the switch before it is

ready to operate. See chapter 22 for more information.

10.  B. There is no IPv6 default gateway listed in the output, which will be

the link-local address of the router interface, sent to the host as a

router advertisement. Until this host receives the router address, the

host will communicate with IPv6 only on the local subnet. See Chapter

20 for more information.

11.  D. The command

show ipv6 neighbors

provides the ARP cache for on

a router. See Chapter 20 for more information.

12.  A. If the state is STALE when the interface has not communicated

within the neighbor reachable time frame. The next time the neighbor

communicates, the state will be REACH. See Chapter 20 for more

information.

13.  C. There are two successor routes, so by default, EIGRP was load-

balancing out s0/0 and s0/1. When s0/1 goes down, EIGRP will just

keep forwarding traffic out the second link s0/0. s0/1 will be removed

from the routing table. See Chapter 17 for more information.

14.  F. There isn't a lot to go on from with the output, but the only

commands that provide the FD and AD are

show ip eigrp

topology

and


show ipv6 eigrp topology

. The addresses in the output are link-

local IPv6 addresses, so our answer is the latter. See Chapter 17 for

more information.

15.  A, B, C, D. Cisco has documented steps, according to the objectives,

that you must go through when troubleshooting an adjacency. See

Chapter 18 for more information.

16.  B, D, E. In order for two OSPF routers to create an adjacency, the

Hello and dead timers must match, and they must both be configured

into the same area, as well as being in the same subnet. See Chapter

18 for more information.

17.  A. The process starts by sending out Hello packets. Every listening

router will then add the originating router to the neighbor database.

The responding routers will reply with all of their Hello information

so that the originating router can add them to its own neighbor table.

At this point, we will have reached the 2WAY state—only certain

routers will advance beyond to this. See Chapter 19 for more


information.

18.  C. Referred to as summary link advertisements (SLAs), Type 3 LSAs

are generated by area border routers. These ABRs send Type 3 LSAs

toward the area external to the one where they were generated. See

Chapter 19 for more information.

19.  B. Authentication Header (AH) provides authentication of either all or

part of the IP packet through the addition of a header that is

calculated based on the values in the packet, but it doesn't offer any

encryption services. See Chapter 21 for more information.

20.  B. Generic Routing Encapsulation (GRE) has no built-in security

mechanisms. See Chapter 21 for more information.

21.  C. When traffic exceeds the allocated rate, the policer can take one of

two actions. It can either drop traffic or re-mark it to another class of

service. The new class usually has a higher drop probability. See

Chapter 21 for more information.

22.  B. This can be a hard question if you don't remember to invert the 7th

bit of the first octet in the MAC address! Always look for the 7th bit

when studying for the Cisco R/S, and when using eui-64, invert it. The

eui-64 autoconfiguration then inserts an FF:FE in the middle of the

48-bit MAC address to create a unique IPv6 address. See Chapter 14

for more information.

23.  A. The NDP neighbor advertisement (NA) contains the MAC address.

A neighbor solicitation (NS) was initially sent asking for the MAC

address. See Chapter 14 for more information.

24.  B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a

total of 128 bits. See Chapter 14 for more information.

25.  A. To enable OSPFv3, you enable the protocol at the interface level, as

with RIPng. The command string is area-id. It's important to

understand that area

0

and area



0.0.0.0

both describe area

0

. See


Chapter 19 for more information.

26.  C. The command line console

0

places you at a prompt where you can



then set your console user-mode password. See Chapter 6 for more

information.

27.  B, D. The mask 255.255.254.0 (/23) used with a Class A address


means that there are 15 subnet bits and 9 host bits. The block size in

the third octet is 2 (256–254). So this makes the subnets in the

interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65

is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address

for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through

3.254. See Chapter 4 for more information.

28.  C. The IP address is configured under a logical interface, called a

management domain or VLAN 1, by default. See Chapter 10 for more

information.

29.  A. 256 – 192 = 64, so 64 is our block size. Just count in increments of

64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is

128, the broadcast address is 191, and the valid host range is the

numbers in between, or 129–190. See Chapter 4 for more information.

30.  C. An inside global address is considered to be the IP address of the

host on the private network after translation. See Chapter 13 for more

information.

31.  B. Once you create your pool, the command ip nat inside source must

be used to say which inside locals are allowed to use the pool. In this

question, we need to see if access list 100 is configured correctly, if at

all, so


show access-list

is the best answer. See Chapter 13 for more

information.

32.  D. Layer 2 switching creates individual collision domains per port. See

Chapter 1 for more information.

33.  C. The command line vty 0 4 places you in a prompt that will allow

you to set or change your Telnet password. See Chapter 6 for more

information.

34.  B. To see the contents of all access lists, use the

show access-lists

command. See Chapter 12 for more information.

35.  C. VLANs break up broadcast domains at layer 2. See Chapter 11 for

more information.

36.  A. The command

erase startup-config

deletes the configuration

stored in NVRAM. See Chapter 6 for more information.

37.  C. ICMP is the protocol at the Network layer that is used to send

messages back to an originating router. See Chapter 3 for more


information.

38.  A. Class A addressing provides 22 bits for host subnetting. Class B

provides 16 bits, but only 14 are available for subnetting. Class C

provides only 6 bits for subnetting. See Chapter 3 for more

information.

39.  B. Only the EIGRP route will be placed in the routing table because

EIGRP has the lowest administrative distance (AD), and that is always

used before metrics. See Chapter 8 for more information.

40.  D. Switches send information about only one VLAN down a link

unless it is configured as a trunk link. See Chapter 11 for more

information.

41.  B, G. To enable OSPF, you must first start OSPF using a process ID.

The number is irrelevant; just choose a number from 1 to 65,535 and

you're good to go. After you start the OSPF process, you must

configure interfaces on which to activate OSPF using the network

command with wildcards and specification of an area. Option F is

wrong because there must be a space after the parameter area and

before you list the area number. See Chapter 9 for more information.

42.  A. By default, switches break up collision domains on a per-port basis

but are one large broadcast domain. See Chapter 1 for more

information.

43.  B. At the moment of OSPF process startup, the highest IP address on

any active interface will be the router ID (RID) of the router. If you

have a loopback interface configured (logical interface), then that will

override the interface IP address and become the RID of the router

automatically. See Chapter 18 for more information.

44.  C, D. VLAN Trunking Protocol (VTP) is not right because it has

nothing to do with trunking except that it sends VLAN information

across a trunk link. 802.1q and ISL encapsulations are used to

configure trunking on a port. See Chapter 11 for more information.

45.  D. Stub networks have only one connection to an internetwork.

Default routes should be set on a stub network or network loops may

occur; however, there are exceptions to this rule. See Chapter 9 for

more information.

46.  B. Hubs regenerate electrical signals, which are specified at the


Physical layer. See Chapter 1 for more information.

47.  A, C. Standard and extended access control lists (ACLs) are used to

configure security on a router. See Chapter 12 for more information.

48.  C. If you start at 192.168.128.0 and go through 192.168.159.0, you can

see that this is a block of 32 in the third octet. Since the network

address is always the first one in the range, the summary address is

192.168.128.0. What mask provides a block of 32 in the third octet?

The answer is 255.255.224.0, or /19. See Chapter 5 for more

information.

49.  B. The command to back up the configuration on a router is

copy

running-config startup-config



. See Chapter 7 for more information.

50.  C. IEEE 802.3ab is the standard for 1 Gbps on twisted-pair. See

Chapter 2 for more information.

51.  C. User Datagram Protocol is a connection network service at the

Transport layer, and DHCP uses this connectionless service. See

Chapter 3 for more information

52.  E. The clock rate command is two words, and the speed of the line is

in bits per second (bps). See Chapter 6 for more information.

53.  C. The

show ip interface

command will

show


you if any interfaces

have an outbound or inbound access list set. See Chapter 12 for more

information.

54.  C. Unlike ISL, which encapsulates the frame with control information,

802.1q inserts an 802.1q field along with tag control information. See

Chapter 11 for more information.

55.  C. The PDU encapsulation method defines how data is encoded as it

goes through each layer of the TCP/IP model. Data is segmented at

the Transport later, packets created at the Network layer, frames at

the Data Link layer, and finally, the Physical layer encodes the 1s and

0s into a digital signal. See Chapter 2 for more information.

56.  A. With a multilayer switch, enable IP routing and create one logical

interface for each VLAN using the interface vlan number command

and you're now doing inter-VLAN routing on the backplane of the

switch! See Chapter 11 for more information.


Yüklə 22,5 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   69




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin