Q1. - (Topic 3)
Which characteristics are representative of a link-state routing protocol? (Choose three.)
A. provides common view of entire topology
B. exchanges routing tables with neighbors C. calculates shortest path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates
Answer: A,C,D
Explanation:
Each of routers running link-state routing protocol learns paths to all the destinations in its
“area” so we can say although it is a bit unclear.
Link-state routing protocols generate routing updates only (not the whole routing table)
when a change occurs in the network topology so
Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> .
Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state
routing protocol utilizes event-triggered updates (only sends update when a change occurs)
->
Q2. - (Topic 1)
Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: B
Explanation:
The Source and Destination IP address is not going to change. Host 1 IP address will stay
as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another.
(Except switches... they don't change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of
Router 1.
Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address.
Q3. - (Topic 3)
Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.)
A. router#show version
B. router#show ip interface
C. router#show protocols
D. router#show controllers
E. router#show running-config
Answer: B,C
Explanation:
The outputs of “show protocols” and “show ip interface” are shown below:
Global values:Internet Protocol routing is enabledSerial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Serial0/1 is up, line protocol is downInternet address is 209.65.200.225/30Serial0/2 is up, line protocol is downSerial0/3 is up, line protocol is downNVI0 is up, line protocol is upInterface is unnumbered. Using address of NVI0 (0.0.0.0)Loopback0 is up, line protocol is upInternet address is 10.1.10.1/32Loopback1 is up, line protocol is upInternet address is 10.1.2.1/27Loopback6 is up, line protocol is up
Serial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Broadcast address is 255.255.255.255Address determined by non-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledMulticast reserved groups joined: 224.0.0.5Outgoing access list is not setInbound access list is not setProxy ARP is enabledLocal Proxy ARP is disabledSecurity level is defaultSplit horizon is disabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is enabledIP fast switching on the same interface is enabledIP Flow switching is disabledIP CEF switching is disabledIP Feature Fast switching turbo vectorIP multicast fast switching is enabledIP multicast distributed fast switching is disabledIP route-cache flags are FastRouter Discovery is disabledIP output packet accounting is disabledIP access violation accounting is disabledTCP/IP header compression is disabledRTP/IP header compression is disabledPolicy routing is disabledNetwork address translation is enabled, interface in domain insideBGP Policy Mapping is disabledWCCP Redirect outbound is disabledWCCP Redirect inbound is disabledWCCP Redirect exclude is disabled
Q4. - (Topic 3)
What is the subnet address of 172.16.159.159/22?
A. 172.16.0.0
B. 172.16.128.0
C. 172.16.156.0
D. 172.16.159.0
E. 172.16.159.128
F. 172.16.192.0
Answer: C
Explanation:
Converting to binary format it comes to 11111111.11111111.11111100.00000000 or
255.255.252.0 Starting with 172.16.0.0 and having increment of 4 we get.
Q5. - (Topic 5)
From which of the following attacks can Message Authentication Code (MAC) shield your network?
A. DoS
B. DDoS
C. spoofing
D. SYN floods
Answer: C
Explanation:
Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies.
Q6. - (Topic 1)
To what type of port would a cable with a DB-60 connector attach?
A. Serial port
B. Console port
C. Ethernet port
D. Fibre optic port
Answer: A
Explanation:
Serial Connection
cl_3_dte_male
cl_2_dce
The picture on the left shows a V.35 DTE cable with a male DB60 connector and a male standard 34-pin Winchester-type connector. The right picture shows a V.35 DCE serial cable with a male DB60 connector and a female 34-pin Winchester-type connector. As you probably guessed already, the male connector of the DTE cable is attached to the DCE cable's female connector, this is depicted in the picture below. This is known as a back-to-back connection, and 'simulates' a WAN link. In a real world setup, the DTE cable's male connector typically connects to a port on a CSU/DSU provided by a service provider (i.e. telco), which in turn connects to a CSU/DSU at another location, thru a T1 link for example.
The DB60 connector connects to a Serial interface on a router.
cl_4_malefemale Reference: http://www.techexams.net/techlabs/ccna/lab_hardware.shtml
Q7. - (Topic 3)
Which command enables IPv6 forwarding on a Cisco router?
A. ipv6 host
B. ipv6 unicast-routing
C. ipv6 local
D. ipv6 neighbor
Answer: B
Explanation:
Enabling IPv6 on Cisco IOS Software Technology http://www.ciscopress.com/articles/article.asp?p=31948&seqNum=4 The first step of enabling IPv6 on a Cisco router is the activation of IPv6 traffic forwarding to forward unicast IPv6 packets between network interfaces. By default, IPv6 traffic forwarding is disabled on Cisco routers. The ipv6 unicast-routing command is used to enable the forwarding of IPv6 packets between interfaces on the router. The syntax for this command is as follows: Router(config)#ipv6 unicast-routing The ipv6 unicast-routing command is enabled on a global basis.
Q8. - (Topic 3)
Refer to the exhibit.
Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this router?
A. 10.1.1.2
B. 10.154.154.1
C. 172.16.5.1
D. 192.168.5.3
Answer: C
Explanation:
The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID.
Q9. - (Topic 5)
Refer to the exhibit.
A user cannot reach any web sites on the Internet, but others in the department are not
having a problem.
What is the most likely cause of the problem?
A. IP routing is not enabled.
B. The default gateway is not in the same subnet.
C. A DNS server address is not reachable by the PC.
D. A DHCP server address is not reachable by the PC.
E. NAT has not been configured on the router that connects to the Internet.
Answer: C
Explanation:
Answer C is only answer that makes sense. IP routing does not need to be enabled on PC’s, this is a router function. We can see from the output that the PC and default gateway are on the same subnet. DHCP has not been enabled on this PC so it has been configured with a static address so reaching the DHCP server is not the issue. Finally, NAT must be configured correctly or the other users in the department would also be having issues.
Q10. - (Topic 1)
Refer to the exhibit.
Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request?
A. 192.168.0.1
B. 172.16.0.50
C. 00-17-94-61-18-b0
D. 00-19-d3-2d-c3-b2
E. ff-ff-ff-ff-ff-ff
F. 255.255.255.255
Answer: E Explanation:
For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correct address to use to reach the destination. ARP sends an Ethernet frame called an ARP request to every host on the shared link-layer legmen. The Ethernet header includes the source host MAC address and a destination address of all Fs representing a broadcast frame. The ARP request contains the sender's MAC and IP address and the target (destination) IP address. The target's MAC address is set to all 0s. ARP Request
Reference:
http://www.technicalhowto.com/protocols/arp/arp.html
Q11. - (Topic 1)
How does TCP differ from UDP? (Choose two.)
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
Answer: B,D
Explanation:
Because TCP is a connection-oriented protocol responsible for ensuring the transfer of a datagram from the source to destination machine (end-to-end communications), TCP must receive communications messages from the destination machine to acknowledge receipt of the datagram. The term virtual circuit is usually used to refer to the handshaking that goes on between the two end machines, most of which are simple acknowledgment messages (either confirmation of receipt or a failure code) and datagram sequence numbers. Rather than impose a state within the network to support the connection, TCP uses synchronized state between the two endpoints. This synchronized state is set up as part of an initial connection process, so TCP can be regarded as a connection-oriented protocol. Much of the protocol design is intended to ensure that each local state transition is communicated to, and acknowledged by, the remote party.
Reference: http://en.wikibooks.org/wiki/Communication_Networks/TCP_and_UDP_Protocols
Q12. - (Topic 3)
Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224?
A. 192.168.2.63
B. 192.168.2.62
C. 192.168.2.61
D. 192.168.2.60
E. 192.168.2.32
Answer: B
Explanation:
With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is broadcast so 62 is last valid host out of given choices.
Q13. - (Topic 1)
What are two common TCP applications? (Choose two.)
A. TFTP
B. SMTP
C. SNMP
D. FTP
E. DNS
Answer: B,D
Explanation:
SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21.
Reference: http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/
Q14. - (Topic 3)
Refer to the exhibit.
Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
A. It ensures that data will be forwarded by RouterB.
B. It provides stability for the OSPF process on RouterB.
C. It specifies that the router ID for RouterB should be 10.0.0.1.
D. It decreases the metric for routes that are advertised from RouterB.
E. It indicates that RouterB should be elected the DR for the LAN.
Answer: B,C
Explanation:
A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -The router-ID is chosen in the order below:
+
The highest IP address assigned to a loopback (logical) interface.
+
If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB -
Q15. - (Topic 7)
Which statement about static routes is true?
A. The source interface can be configured to make routing decisions.
B. A subnet mask is entered for the next-hop address.
C. The subnet mask is 255.255 255.0 by default
D. The exit interface can be specified to indicate where the packets will be routed.
Answer: D
Explanation:
Static routing can be used to define an exit point from a router when no other routes are available or necessary. This is called a default route.