Q1. - (Topic 1)
Refer to the topology and switching table shown in the graphic.
Host B sends a frame to Host C. What will the switch do with the frame?
A. Drop the frame
B. Send the frame out all ports except port 0/2
C. Return the frame to Host B
D. Send an ARP request for Host C
E. Send an ICMP Host Unreachable message to Host B
F. Record the destination MAC address in the switching table and send the frame directly to Host C
Answer: B
Q2. - (Topic 1)
Refer to the exhibit.
What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A?
A. VLAN 1 on RT-A
B. IP routing on SW-A
C. default gateway on SW-A
D. crossover cable connecting SW-A and RT-A
Answer: C
Explanation:
In order for the switch to reach networks that are not local, such as networks attached to different interfaces of the router, it will need to set its default gateway to be the IP address of the attached router.
Q3. - (Topic 3)
What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.)
A. hello packets
B. SAP messages sent by other routers
C. LSAs from other routers
D. beacons received on point-to-point links
E. routing tables received from other link-state routers
F. TTL packets from designated routers
Answer: A,C
Explanation:
Reference 1: http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4
Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all:
1.
Each router establishes a relationship—an adjacency—with each of its neighbors.
2.
Each router sends link state advertisements (LSAs), some
3.
Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical.
4.
The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table. OSPF Tutorial
Q4. - (Topic 2)
Refer to the exhibit.
The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at
the switch.
What two operations will the switch perform when it receives this frame? (Choose two.)
A. The switch will not forward a frame with this destination MAC address.
B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.
C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.
D. The frame will be forwarded out of all the active switch ports except for port fa0/0.
E. The frame will be forwarded out of fa0/0 and fa0/1 only.
F. The frame will be forwarded out of all the ports on the switch.
Answer: B,D
Explanation:
If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.
Q5. - (Topic 3)
Which IOS command is used to initiate a login into a VTY port on a remote router?
A. router# login
B. router# telnet
C. router# trace
D. router# ping
E. router(config)# line vty 0 5
F. router(config-line)# login
Answer: B
Explanation:
VTY ports are telnet ports hence command B will initiate login to the telnet port.
Q6. - (Topic 5)
What is the bandwidth on the WAN interface of Router 1?
A. 16 Kbit/sec
B. 32 Kbit/sec
C. 64 Kbit/sec
D. 128 Kbit/sec
E. 512 Kbit/sec
F. 1544 Kbit/sec
Answer: A
Explanation:
Use the “show interface s0/0” to see the bandwidth set at 16 Kbit/sec. The show interface s0/0 command results will look something like this and the bandwidth will be represented by the "BW" on the fourth line as seen below where BW equals 1544 Kbits/sec. R2#show interface serial 0/0 Serial0/0 is up, line protocol is down Hardware is GT96K Serial Internet address is 10.1.1.5/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 uses.
Q7. - (Topic 3)
Which router command will configure an interface with the IP address 10.10.80.1/19?
A. router(config-if)# ip address 10.10.80.1/19
B. router(config-if)# ip address 10.10.80.1 255.255.0.0
C. router(config-if)# ip address 10.10.80.1 255.255.255.0
D. router(config-if)# ip address 10.10.80.1 255.255.224.0
E. router(config-if)# ip address 10.10.80.1 255.255.240.0
F. router(config-if)# ip address 10.10.80.1 255.255.255.240
Answer: D
Explanation:
255.255.224 equal /19 in CIDR format hence the answer
Q8. - (Topic 3)
How many bits are contained in each field of an IPv6 address?
A. 24
B. 4
C. 8
D. 16
Answer: D
Explanation:
One of the key advantages IPv6 brings is the exponentially larger address space. The
following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf
Q9. - (Topic 5)
Select two options which are security Issues which need to be modified before RouterA is used? (Choose two.)
A. unencrypted weak password is configured to protect privilege mode
B. inappropriate wording in banner message
C. the virtual terminal lines have a weak password configured
D. virtual terminal lines have a password, but it will not be used
E. configuration supports un-secure web server access
Answer: B,D
Q10. - (Topic 1)
Refer to the exhibit.
What kind of cable should be used to make each connection that is identified by the numbers shown?
A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable
B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable
C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable
D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable
E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable
Answer: B
Explanation:
When connecting a PC to a switch, a standard Ethernet straight through cable should be used. This same cable should also be used for switch to router connections. Generally
speaking, crossover cables are only needed when connecting two like devices (PC-PC,
switch-switch, router-router, etc).
Routers connect to frame relay and other WAN networks using serial cables.
Rollover cables are special cables used for connecting to the console ports of Cisco
devices.
Q11. - (Topic 1)
Which protocol uses a connection-oriented service to deliver files between end systems?
A. TFTP
B. DNS
C. FTP
D. SNMP
E. RIP
Answer: C
Explanation:
TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp.
Q12. - (Topic 1)
At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate?
A. application
B. transport
C. network
D. physical
E. data link
Answer: E
Explanation:
CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces. CDP is a Datalink Protocol occurring at Layer 2 of the OSI model. CDP is not routable and can only go over to directly connected devices. CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every 60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices. Adding the detail parameter will display the layer-3 addressing configured on the neighbor.
Reference: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/cisco-discoveryprotocol.html
Q13. - (Topic 1)
Refer to the exhibit.
The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. What will the switch do when it receives the frame from host A?
A. The switch will add the source address and port to the MAC address table and forward the frame to host D.
B. The switch will discard the frame and send an error message back to host A.
C. The switch will flood the frame out of all ports except for port Fa0/3.
D. The switch will add the destination address of the frame to the MAC address table and forward the frame to host D.
Answer: A
Explanation:
When switch receives the data frame from the host not having the MAC address already on the MAC table, it will add the MAC address to source port on MAC address table and sends the data frame.
Q14. - (Topic 2)
Refer to the exhibit.
The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.
What two operations will the switch perform when it receives this frame? (Choose two.)
A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table.
B. The MAC address of 0000.00dd.dddd will be added to the MAC address table.
C. The frame will be forwarded out of port fa0/3 only.
D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3.
E. The frame will be forwarded out of all the active ports.
Answer: A,D
Explanation:
If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table
Q15. - (Topic 3)
What is the subnet address of 172.16.159.159/22?
A. 172.16.0.0
B. 172.16.128.0
C. 172.16.156.0
D. 172.16.159.0
E. 172.16.159.128
F. 172.16.192.0
Answer: C
Explanation:
Converting to binary format it comes to 11111111.11111111.11111100.00000000 or
255.255.252.0 Starting with 172.16.0.0 and having increment of 4 we get.