640-801
Cisco® Certified Network Associate (CCNA®)
Version 26.1
640 - 801
Important Note
Please Read Carefully
Study Tips
This product will provide you questions and answers along with detailed explanations carefully compiled and
written by our experts. Try to understand the concepts behind the questions instead of cramming the questions.
Go through the entire document at least twice so that you make sure that you are not missing anything.
Further Material
For this test TestKing provides:
* Online Testing. Practice the questions in an exam environment.
Try a demo: http://www.testking.com/index.cfm?pageid=724
For this test TestKing plans to provide:
* Study Guide. Concepts and labs. Provides a foundation of knowledge.
Latest Version
We are constantly reviewing our products. New material is added and old material is revised. Free updates are
available for 90 days after the purchase. You should check your member zone at TestKing an update 3-4 days
before the scheduled exam date.
Here is the procedure to get the latest version:
1. Go to www.testking.com
2. Click on Member zone/Log in
3. The latest versions of all purchased products are downloadable from here. Just click the links.
For most updates, it is enough just to print the new questions at the end of the new version, not the whole
document.
Feedback
Feedback on specific questions should be send to feedback@testking.com. You should state: Exam number and
version, question number, and login ID.
Our experts will answer your mail promptly.
Copyright
Each pdf file contains a unique serial number associated with your particular name and contact information for
security purposes. So if we find out that a particular pdf file is being distributed by you, TestKing reserves the
right to take legal action against you according to the International Copyright Laws.
Leading the way in IT testing and certification tools, www.testking.com
-2-
640 - 801
Note:
Section A contains 313 questions.
Section B contains 42 questions.
The total number of questions is 355.
Each section starts with QUESTION NO: 1. There are no missing questions.
Section A
QUESTION NO: 1
You work as network administrator at TestKing.
Your trainee is configuring a router with both physical and logical interfaces.
He asks you what factor determines the OSPF router ID.
What should you tell him?
A.
B.
C.
D.
E.
F.
The lowest network number of any interface.
The lowest IP address of any logical interface.
The lowest IP address of any physical interface.
The highest network number of any interface.
The highest IP address of any logical interface.
The highest IP address of any physical interface.
Answer: F
Explanation:
The OSPF topology database includes information about routers and the subnets, or links, to which they are
attached. To identify the routers in the neighbor table’s topology database, OSPF uses a router ID (RID) for
each router. A router’s OSPF RID is that router’s highest IP address on a physical interface when OSPF starts
running.
Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. The highest IP
address configured on the router is the router ID. If a loopback address is configured, then it is the router ID. In
case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID is elected
it doesn't change unless the IP address is removed or OSPF restarts.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 208
Leading the way in IT testing and certification tools, www.testking.com
-3-
640 - 801
QUESTION NO: 2
Your TestKing trainee is configuring a router. In particular, he is examining a routing table that contains
static, RIP, and IGRP routes for the same destination network with each set to its default administrative
distance.
He asks you which route will be used to forward data?
A.
B.
C.
D.
The IGRP route
The static route
The RIP route
All three will load balance.
Answer: B
Explanation:
To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a
number that denotes how believable an entire routing protocol is on a single router. The lower the number, the
better, or more believable the routing protocol.
Route Type
Administrative Distance
x Static
1
x IGRP
100
x RIP
120
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 177
QUESTION NO: 3
Three bicycle stores in the TestKing Pro chain have decided to establish network connectivity to maintain
their repair business in a centralized manner. The stores contracted a local technician, non-Cisco
certified, to configure the routers. However, the local MCP certified technician was not able to finish the
configuration in an appropriate manner. No network connectivity has been established among the
routers. The routers are named TestKing1, TestKing2, and TestKing3.
TestKing Pro has contracted you to fix the problems. Identify the fault(s) and make the necessary
change(s) to establish connectivity. The routers have been configured with the following specifications:
x
x
x
x
x
x
The routers are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol
Clocking is provided on the serial 0 interfaces
The password on each router is "testking"
The subnet mask on all interfaces is the default mask.
The IP addresses are listed in chart below.
Leading the way in IT testing and certification tools, www.testking.com
-4-
640 - 801
TestKing1
E0 192.168.27.1
E1 192.168.29.1
S0 192.168.31.1
Secret password: testking
TestKing2
E0 192.168.35.1
S0 192.168.33.1
S1 192.168.31.2
Secret password: testking
TestKing3
E0 192.168.37.1
S1 192.168.33.2
Secret password: testking
To configure the router click on the host icon that is connected to the router by a serial cable.
Answer:
Click on Host 2:
Router TestKing1:
TestKing1> enable
Password: testking
TestKing1 # config terminal
TestKing1 (config) # interface ethernet 0
Leading the way in IT testing and certification tools, www.testking.com
-5-
640 - 801
TestKing1 (config-if) # ip address 192.168.27.1 255.255.255.0
TestKing1 (config-if) # no shutdown
TestKing1 (config-if) # exit
TestKing1 (config) # interface ethernet 1
TestKing1 (config-if) # ip address 192.168.29.1 255.255.255.0
TestKing1 (config-if) # no shutdown
TestKing1 (config-if) # exit
TestKing1 (config) # interface serial 0
TestKing1 (config-if) # ip address 192.168.31.1 255.255.255.0
TestKing3 (config-if) # clock rate 64000
TestKing1 (config-if) # no shutdown
TestKing1 (config-if) # exit
TestKing1 (config) # router rip
TestKing1 (config-router) # network 192.168.27.0
TestKing1 (config-router) # network 192.168.29.0
TestKing1 (config-router) # network 192.168-31.0
TestKing1 (config-router) # Ctrl-Z
TestKing1 # copy running-config startup-config
Click on Host 4
Router TestKing2:
TestKing2> enable
Password: testking
TestKing2 # config t
TestKing2 (config) # interface ethernet 0
TestKing2 (config-if) # ip address 192.168.35.1 255.255.255.0
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # interface serial 0
TestKing2 (config-if) # ip address 192.168.33.1 255.255.255.0
TestKing2 (config-if) # clock rate 64000
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # interface serial 1
TestKing2 (config-if) # ip address 192.168.31.2 255.255.255.0
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # router rip
TestKing2 (config-router) # network 192.168.35.0
TestKing2 (config-router) # network 192.168.33.0
TestKing2 (config-router) # network 192.168.31.0
Leading the way in IT testing and certification tools, www.testking.com
-6-
640 - 801
TestKing2 (config-router) # Ctrl-Z
TestKing2 # copy running-config startup-config
Router TestKing3:
Click on Host6
TestKing3> enable
Password: testking
TestKing3 # config t
TestKing3 (config) # interface ethernet 0
TestKing3 (config-if) # ip address 192.168.37.1 255.255.255.0
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # exit
TestKing3 (config) # interface serial 1
TestKing3 (config-if) # ip address 192.168.33.2 255.255.255.0
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # exit
TestKing3 (config) # router rip
TestKing3 (config-router) # network 192.168.33.0
TestKing3 (config-router) # network 192.168.37.0
TestKing3 (config-router) # Ctrl-Z
TestKing3 # copy running-config startup-config
QUESTION NO: 4
Exhibit:
The exhibit above shows the TestKing.com network.
Leading the way in IT testing and certification tools, www.testking.com
-7-
640 - 801
Your trainee David asks you which broadcast addresses of the subnets are shown in the exhibit?(Choose
three)
A.
B.
C.
D.
E.
F.
172.16.32.255
172.16.47.255
172.16.64.255
172.16.82.255
172.16.79.255
172.16.95.255
Answer: B E F
Explanation:
172.16.32.0/20 has 16 increments and the broad cast address will always be 1 before the actual number.
172.16.32.0 next increment will be 172.16.48.0 so then the broadcast address is 1 less than 172.16.48.0 =
172.16.47.255 (Broadcast address).
QUESTION NO: 5
Exhibit:
Two routers named TestKing1 and TestKing2 are connected via their serial interfaces as illustrated, but
they are unable to communicate. The TestKing1 router is known to have the correct configuration. Given
the partial configurations, identify the fault on the TestKing2 router that is causing the lack of
connectivity.
A.
B.
C.
D.
E.
F.
Incomplete IP address
Insufficient bandwidth
Incorrect subnet mask
Incompatible encapsulation
Link reliability too low
IPCP closed
Leading the way in IT testing and certification tools, www.testking.com
-8-
640 - 801
Answer: D
Explanation:
HDLC and PPP Configuration
HDLC and PPP configuration is straightforward. You just need to be sure to configure the same WAN data-link
protocol on each end of the serial link. Otherwise, the routers will misinterpret the incoming frames, because
each WAN data-link protocol uses a different frame format. Other than configuring some optional features,
that’s all you need to do.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310
QUESTION NO: 6
Exhibit:
You work as a network administrator at TestKing.com. A named access list called research_block has
been written to prevent users on the research network and public Internet form access to the TestKing
Support server. All other users within the TestKing company should have access to this server. The list
contains the following statements.
deny 172.16.102.0 0.0.0.255 172.16.104.255 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0
Which of the following commands sequences will place this list to meet these requirements?
Leading the way in IT testing and certification tools, www.testking.com
-9-
640 - 801
A. TestKing1(config)# interface e0
TestKing1(config-if)# ip access-group research_block in
B. TestKing1(config)# interface s0
TestKing1(config-if)# ip access-group research_block out
C. TestKing2(config)# interface s0
TestKing2(config-if)# ip access-group research_block out
D. TestKing2(config)# interface s1
TestKing2(config-if)# ip access-group research_block in
E. TestKing3(config)# interface s1
TestKing3(config-if)# ip access-group research_block in
F. TestKing3(config)# interface e0
TestKing3(config-if)# ip access-group research_block out
Answer: C
Explanation:
To enable the ACL on an interface and define the direction of packets to which the ACL is applied, the ip
access-group command is used.
When referring to a router, these terms have the following meanings.
x Out - Traffic that has already been through the router and is leaving the interface; the source would be
where it's been (on the other side of the router) and the destination is where it's going.
x In - Traffic that is arriving on the interface and which will go through the router; the source would be
where it's been and the destination is where it's going (on the other side of the router).
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 433
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml
QUESTION NO: 7
Exhibit:
Leading the way in IT testing and certification tools, www.testking.com
- 10 -
640 - 801
Based on the display of the command output, what does [120/3] represent?
A.
B.
C.
D.
120 is the UDP port for forwarding traffic and 3 is the number of hops.
120 is the administrative distance and 3 is the metric for that route.
120 is the bandwidth of the link and 3 is the routing process number.
120 is the value of the update timer and 3 is the number of updates received for that route.
Answer: B
Explanation:
To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a
number that denotes how believable an entire routing protocol is on a single router. The lower the number, the
better, or more believable the routing protocol.
Route Type
Administrative Distance
x Connected
0
x IGRP
100
x RIP
120
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 177
QUESTION NO: 8
David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network
connectivity. What should you tell him?
A.
B.
C.
D.
E.
Switches take less time to process frames than hubs take.
Switches do not forward broadcasts.
Hubs can filter frames.
Using hubs can increase the amount of bandwidth available to hosts.
Switches increase the number of collision domains in the network.
Answer: E
Explanation: Switches increases the number of collisions domains in the network.
Note:
Switches use a couple of different types of internal processing variations. Almost of the more recently released
switches use store-and-forward processing, but all three types of switching are supported in at least one type of
currently available Cisco Switch.
x Store-and-forward –The switch fully receives all bits in the frame (store) before forwarding the frame
(forward).
x Cut-through – The switch performs the address table lookup as soon as the destination address field in
the header is received.
Leading the way in IT testing and certification tools, www.testking.com
- 11 -
640 - 801
x Fragment-free – This performs like cut-through switching, but the switch waits for 64 bytes to be
received before forwarding the first bytes of the outgoing frame.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 243
QUESTION NO: 9
Your boss at TestKing asks you about half-duplex and full-duplex Ethernet. What are unique for halfduplex Ethernet? (Choose two)
A.
B.
C.
D.
E.
Half-duplex Ethernet operates in a shared collision domain.
Half-duplex Ethernet operates in a private collision domain.
Half-duplex Ethernet has higher effective throughput.
Half-duplex Ethernet has lower effective throughput.
Half-duplex Ethernet operates in a private broadcast domain.
Answer: A D
Explanation:
A single device could not be sending a frame and receiving a frame at the same time because it would mean that
a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is
called half-duplex logic.
Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only
one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN
switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full
duplex means that an Ethernet card can send and receive concurrently.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 62-63
QUESTION NO: 10
You work as a technician at TestKing. You are required to configure PPP on an interface on a Cisco
router. A technician is configuring PPP on an interface.
Which PPP authentication methods can you use? (Choose two)
A.
B.
C.
D.
E.
F.
SSL
VPN
PAP
LAPB
CHAP
SLIP
Leading the way in IT testing and certification tools, www.testking.com
- 12 -
640 - 801
Answer: C E
Explanation:
Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)
authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method today
because the identifying codes flowing over the link are created using a MD5 one-way hash, which is more
secure that the clear-text passwords sent by PAP.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 314
QUESTION NO: 11
Exhibit:
What function does the Frame Relay DLCI provide with respect to TestKingA?
A.
B.
C.
D.
E.
Defines the signaling standard between TestKingA and the frame switch.
Identifies the circuit between TestKingA and the frame switch.
Identifies the circuit between TestKingB and the frame switch.
Identifies the encapsulation used between TestKingA and TestKingB.
Defines the signaling standard between TestKingB and the frame switch,
Answer: C
Explanation:
TestKingA sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and
forwards the frame through the Frame Relay network until it reaches the switch connected to TestKingB. The
TestKingB’s local switch forwards the frame out of the access link to TestKingB.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 386
QUESTION NO: 12
A technician are configuring a router named TestKing2.
Why does she use passive-interface command?
Leading the way in IT testing and certification tools, www.testking.com
- 13 -
640 - 801
A.
B.
C.
D.
E.
Allows a routing protocol to forward updates out an interface that is missing its IP address.
Allows a router to send routing updates on an interface but not receive updates via that interface.
Allows an interface to remain up without receiving keepalives.
Allows interfaces to share IP addresses.
Allows a router to receive routing updates on an interface but not send updates via that interface.
Answer: E
Explanation:
The passive-interface command is used to control the advertisement of routing information. The command
enables the suppression of routing updates over some interfaces while allowing updates to be exchanged
normally over other interfaces.
With most routing protocols, the passive-interface command restricts outgoing advertisements only. However,
when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This
document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello
packets between two routers, resulting in the loss of their neighbor relationship. This stops not only routing
updates from being advertised, but it also suppresses incoming routing updates. This document also discusses
the configuration required in order to allow the suppression of outgoing routing updates, while allowing
incoming routing updates to be learnt normally from the neighbor.
Reference:
http://www.cisco.com/en/US/tech/tk365/tk207/technologies_tech_note09186a0080093f0a.shtml
QUESTION NO: 13
Exhibit:
A new network is being designed for your company TestKing. Using a Class C IP network. which subnet
mask will provide one useable subnet per department while allowing enough usable host addresses for
each department specified in the graphic?
A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.224
Leading the way in IT testing and certification tools, www.testking.com
- 14 -
640 - 801
D. 255.255.255.240
E. 255.255.255.248
F. 255.255.255.252
Answer: C
QUESTION NO: 14
Exhibit:
As a network technician at TestKing you are required to troubleshoot the network shown in the exhibit.
The host, TK1, is connected to the TestKing1 LAN is unable to connect to resources on other networks.
Assuming that host is configured as follows:
host address: 192.168.5.45
subnet mask: 255.255.255.240
default gateway: 192.168.5.32
Which of the following is the cause of this problem?
A.
B.
C.
D.
The default gateway is a subnetwork address.
The default gateway is on a different subnet form the host.
The host subnet mask does not match the subnet mask of the attached router interface.
The IP address of the host is on a different subnet than the default gateway.
Answer: A
Leading the way in IT testing and certification tools, www.testking.com
- 15 -
640 - 801
QUESTION NO: 15
Your boss at TestKing asks you why you are using a router to segment the network at the main office.
What are the benefits? What should you tell her? (Choose two)
A.
B.
C.
D.
E.
Filtering can occur based on Layer 3 information.
Broadcasts are eliminated.
Routers generally cost less than switches.
Broadcasts are not forwarded across the router.
Adding a router to the network decreases latency.
Answer: A, D
QUESTION NO: 16
You work as a network technician at TestKing. You are required to divide the 172.12.0.0 network into
subnets. Each submit must have the capacity of 458 IP addresses.
Furthermore, according to the requirement you must provide the maximum number of subnets.
Which network mask should you use?
Answer: 255.255.254.0
Explanation:
To obtain 459 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned. Keep
9 bits for host means 4th octet and last bit is 3rd will be 0. This gives 255.255.254.0 is subnet mask.
QUESTION NO: 17
Your new Junior TestKing trainee Rutger has a problem with basic binary math. He must convert the
binary number 10011101 into its decimal and hexadecimal equivalent.
Which two numbers must Rutger provide? (Choose two)
A.
B.
C.
D.
E.
F.
159
157
185
0x9D
0xD9
0x159
Answer: B D
Explanation:
Leading the way in IT testing and certification tools, www.testking.com
- 16 -
640 - 801
10011101 = 157
0x9D is ASCII Hexadecimal = 157
Reference:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_command_reference_chapter09186a00800
7fc95.html
QUESTION NO: 18
Exhibit:
Note: SPIDs are not required for this switch.
You work as a network consultant. Your customer TestKing wants you to bring up the ISDN link (refer
to the exhibit).
Which command should you use? (Select three)
A.
B.
C.
D.
E.
F.
Router(config-if)# encapsulation ppp
Router(config)# isdn switch-type type
Router(config)# dialer-list 1 protocol ip permit
Router(config)# dialer map ip address name name connection number
Router(config-if)# ip address address subnet mask
Router(config-if)# dialer-group 1
Answer: A E F
Explanation:
x Proper encapsulation to be defined on both routers.
x IP address to be assigned for interface with subnet mask
x Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal
configuration command.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310+337
QUESTION NO: 19
You are required to troubleshoot LAN connectivity on the TestKing main site in Toronto.
Leading the way in IT testing and certification tools, www.testking.com
- 17 -
640 - 801
Which router IOS commands would be useful for you? (Choose three)
A.
B.
C.
D.
E.
F.
ping
tracert
ipconfig
show ip route
winipcfg
show interfaces
Answer: A D F
QUESTION NO: 20
As a network technician at TestKing you are required to configure an ISDN BRI interface. Specifically,
you must configure dial-on-demand routing (DDR).
Which sequence of parameters should you use to achieve this goal?
Answer:
Place 1st
Place 2nd
Place 3rd
Place 4th
Place 5th
- next hop address
- Dialer-list
- protocol
- Dialer-String
- group
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 342
Leading the way in IT testing and certification tools, www.testking.com
- 18 -
640 - 801
QUESTION NO: 21
Your TestKing trainee Tess wants to display the configuration register setting on her router.
Which command should she use?
A.
B.
C.
D.
show register
show flash
show boot
show version
Answer: D
Explanation:
show version
To display the configuration of the system hardware, the software version, the names and sources of
configuration files, and the boot images, use the show version command in EXEC mode.
Examples
The following is sample output from the show version command:
Router1> show version
Cisco Internetwork Operating System Software
IOS (tm) 7200 Software (C7200-J-M), Experimental Version 11.3(19970915:164752) [
hampton-nitro-baseline 249]
Copyright (c) 1986-1997 by cisco Systems, Inc.
Compiled Wed 08-Oct-97 06:39 by hampton
Image text-base: 0x60008900, data-base: 0x60B98000
ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE
BOOTFLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fc
1)
Router1 uptime is 23 hours, 33 minutes
System restarted by abort at PC 0x6022322C at 10:50:55 PDT Tue Oct 21 1997
System image file is "tftp://171.69.1.129/hampton/nitro/c7200-j-mz"
cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory.
R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache)
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
8 Ethernet/IEEE 802.3 interface(s)
2 FastEthernet/IEEE 802.3 interface(s)
4 Token Ring/IEEE 802.5 interface(s)
4 Serial network interface(s)
1 FDDI network interface(s)
125K bytes of non-volatile configuration memory.
1024K bytes of packet SRAM memory.
20480K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).
20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).
4096K bytes of Flash internal SIMM (Sector size 256K).
Leading the way in IT testing and certification tools, www.testking.com
- 19 -
640 - 801
Configuration register is 0x0
Reference:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/fun_r/cfr_1g10.htm#1033030
QUESTION NO: 22
You are configuring a subnet on the TestKing branch office in Berlin.
You need to assign IP addresses to hosts in this subnet.
You have been given the subnet mask of 255.255.255.224.
Which IP address would be valid? (Choose three)
A.
B.
C.
D.
E.
F.
15.234.118.63
92.11.178.93
134.178.18.56
192.168.16.87
201.45.116.159
217.63.12.192
Answer: B, C, D
Explanation:
B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)
C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)
D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95
QUESTION NO: 23
You work as network administrator/technician at TestKing. You are configuring Frame Relay on a Cisco
router.
What is the default LMI (Local Management Interface) frame type transmitted by the Cisco router on a
Frame Relay circuit?
A.
B.
C.
D.
E.
Q933a
B8ZS
IETF
Cisco
ANSI
Answer: D
Explanation:
Name
Document
IOS LMI-Type Parameter
Leading the way in IT testing and certification tools, www.testking.com
- 20 -
640 - 801
x Cisco
x ANSI
x ITU
Proprietary
T1.617 Annex D
Q.933. Annex A
cisco
ansi
q.933a
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 382
QUESTION NO: 24
You have subnetted the 210.106.14.0 network with a /24 mask.
Your boss at TestKing wants to know how many usable subnetworks and usable host addresses per
subnet this would provide.
What should you tell her?
A.
B.
C.
D.
1 network with 254 hosts
2 networks with 128 hosts
4 networks with 64 hosts
6 networks with 30 hosts
Answer: A
QUESTION NO: 25
TestKing , a fast growing company with one central headquarters site and 3 regional offices, is looking
for a scalable WAN technology. Current plans include adding an additional 7 regional offices with all
sites requiring continuous connectivity. The current HQ router has no free ports.
Which of the following WAN technologies would meet TestKing's requirements?
A.
B.
C.
D.
E.
Dedicated PPP/HDLC links
Frame Relay
ISDN-BRI
ADSL
Broadband cable service
Answer: D
Explanation:
ADSL work by using a modem and is always on. The question tells you that the HQ router has no free ports, so
by using a ADSL modem, it will be the best choice for this question. The cable modem would also be a good
choice, but without much security, the ADSL is the better answer.
Leading the way in IT testing and certification tools, www.testking.com
- 21 -
640 - 801
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 465
QUESTION NO: 26
You work as a network technician at TestKing. You are configuring a E0 interface connected to the
192.168.1.8/29 LAN on a Cisco router.
You apply the following access list to the interface.
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any
What consequence will this access list have?
A.
B.
C.
D.
E.
All traffic will be allowed to exit E0 except FTP traffic.
FTP traffic from 192.168.1.22 to any host will be denied.
FTP traffic from 192.168.1.9 to any host will be denied.
All traffic exiting E0 will be denied.
All FTP traffic to network 192.168.1.8/29 from any host will be denied.
Answer: D
Explanation:
By default access list is having implicit deny statement at the end. In this example there is no permit statement,
so it will deny all traffic exiting E0 Interface.
Incorrect answers
A: It will deny FTP and Telnet Traffic
B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit
statement at the end.
QUESTION NO: 27
Your TestKing trainee Charles is curios about characteristics of link-state routing protocols.
What should you tell him? (Choose three)
A.
B.
C.
D.
E.
F.
Packets are routed based upon the shortest path to the destination.
Paths are chosen based upon the cost factor to the destination.
The exchange of advertisement is triggered by a change in the network.
In a multipoint network, all routers exchange routing tables directly with all other routers.
Every router in an OSPF area is capable of representing the entire network topology.
Only the designated router in an OSPF area is capable of representing the entire network topology.
Leading the way in IT testing and certification tools, www.testking.com
- 22 -
640 - 801
Answer: A C F
Explanation:
Open Shortest Path First
x Each router discovers its neighbors on each interface. The list of neighbors is kept in a neighbor table.
x Each router uses a reliable protocol to exchange topology information with its neighbors.
x Each router places the learned topology information into its topology database.
x Each router runs the SPF algorithm against its own topology database.
x Each router runs the SPF algorithm against its own topology database to calculate the best routes to each
subnet in the database.
x Each router places the best roué to each subnet into the IP routing table.
The following list points out some of the key features of OSPF:
x Converges very quickly – from the point of recognizing a failure, it often can converge in less than 10
seconds.
x Supports VLSM.
x Uses short Hello messages on a short regular interval, with the absence of hello messages indicating that
a neighbor is no longer reachable.
x Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding,
however, does not happened all at once, so the overhead s minimal.
x Uses cost for the metric.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 417
QUESTION NO: 28
As a network technician at TestKing you are configuring access lists on an interface of a Cisco router.
You use multiple access lists.
Which of the following statements are valid? (Select one)
A. There is no limit to the number of access lists that can be applied to an interface, as long as they are
applied in order from most specific to most general.
B. Cisco IOS allows only one access list to be applied to an interface.
C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.
D. Up to three access lists per protocol can be applied to a single interface.
E. No more than two access lists can be applied to a single interface.
F. The maximum number allowed varies depending on the amount of RAM installed in the router.
Answer: C
Leading the way in IT testing and certification tools, www.testking.com
- 23 -
640 - 801
QUESTION NO: 29
You work as a network technician at TestKing. You are configuring a WAN link.
Which are typical Layer 2 encapsulations for this link? (Choose three)
A.
B.
C.
D.
E.
F.
Ethernet
Frame Relay
POTS
HDLC
PPP
Token Ring
Answer: B, D E,
Explanation:
WAN data-link protocols used on point-to-point serial links provide the basic function of data delivery across
that one link. The two most popular WAN data-link protocols are High-Level Data Link Control (HDLC) and
PPP.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page
QUESTION NO: 30
Roger is setting up WAN connectivity between the TestKing New York and the TestKing Tokyo offices.
He uses a uses two data link layer encapsulations, one for data and one for signaling.
Which WAN Service does he use?
A.
B.
C.
D.
ISDN
Frame Relay
ATM
FDDI
Answer: A
Explanation:
ISDN Q.931 messages are used for signaling.
ISDN B channels are used to transport data.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 327
Leading the way in IT testing and certification tools, www.testking.com
- 24 -
640 - 801
QUESTION NO: 31
You have segmented a network into two separate segments, segment 1 and segment2, with a Cisco router.
Your boss at TestKing is concerned about the cost, and wants to what the purpose of your action is.
What should you tell him?
A.
B.
C.
D.
It increases the number of collisions.
It decreases the number of broadcast domains.
It connects segment 1’s broadcasts to segment 2.
It prevents segment 1’s broadcasts from getting to segment 2.
Answer: D
QUESTION NO: 32
Your TestKing trainee Ellen is studying the basic of distance vector and link state routing protocols.
As her mentor, what could you tell her? (Choose two)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Link state protocols send the entire routing table to all routers in the network.
C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the
routing table.
D. Link state protocols send updates containing the state of their own links to all other routers on the
network.
Answer: A D
Explanation:
Distance Vector Protocols:
Distance Vector Protocols advertise routing information by sending messages, called routing updates, out the
interfaces on a router. These updates contain a series of entries, with each entry representing a subnet and a
metric.
Link-State Protocols:
Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding,
however, does not happen all at once, so the overhead is minimal.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 413 + 419
QUESTION NO: 33
Your TestKing trainee Bob wants some information regarding the split horizon rule.
What should you tell him?
Leading the way in IT testing and certification tools, www.testking.com
- 25 -
640 - 801
A. Only routers can split boundaries (horizons) between concentric networks.
B. All distance vector protocols require fall back routes that may cause momentary loops as the topology
changes.
C. Networks can only remain fully converged if all information about routes is sent out all active interfaces.
D. Information about a route should not be sent back in the direction from which the original update came.
E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS
boundary.
Answer: D
Explanation:
Split horizon blocks information about routes from being advertised by a router out of any interface from which
that information originated.
Reference:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1826/products_configuration_guide_chapter09186a00800
877c6.html
QUESTION NO: 34
Your boss at TestKing want you to brief him on differences and similarities between bridges and
switches.
What should you tell her? (Choose two)
A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame
received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
Answer: B C
Explanation:
Bridges build the bridge table by listening to incoming frames and examining the source MAC address in the
frame.
Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is
like a distinct virtual bridge within a switch.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 239
Leading the way in IT testing and certification tools, www.testking.com
- 26 -
640 - 801
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a00801
86a3e.html
QUESTION NO: 35
Exhibit:
o/r 0x2142
You are working with a 2500 series Cisco router. You are performing the password recovery procedure.
You have just typed the command shown in the exhibit.
Your TestKing trainee Mahmoud is curious on the purpose of this command.
What should you tell him?
A.
B.
C.
D.
E.
To restart the router.
To bypass the configuration in NVRAM.
To view the lost password.
To save the changes to the configuration.
To enter ROM Monitor mode.
Answer: B
Explanation:
o/r 0x2142
!--- Changes the value of config-register to 2142, so that the Router boots,
!---ignoring the NVRAM contents.
Reference:
http://www.cisco.com/en/US/products/hw/routers/ps233/products_password_recovery09186a0080094795.shtml
QUESTION NO: 36
You have told your boss at TestKing that the OSI model has 7 layers. He is curious which protocol is on
the application layer. He asks you to give him two examples of items associated with the layer.
What should you tell him? (Select two)
A.
B.
C.
D.
E.
ping
Telnet
FTP
TCP
IP
Leading the way in IT testing and certification tools, www.testking.com
- 27 -
640 - 801
Answer: B C
Explanation:
Layer Name
Application (layer 7)
Examples
Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 34
QUESTION NO: 37
You are working as a network technician at TestKing.
You are required to troubleshooting the WAN link between the TestKing main office at Boston and the
TestKing remote office at Rio De Janeiro.
A Cisco router that was providing Frame Relay connectivity at the Rio de Janeiro site as replaced with a
different vendor’s frame relay router. Connectivity is now down between the Boston and Rio De Janeiro
site.
What is the most likely cause of the problem?
A.
B.
C.
D.
Mismatched LMI types.
Incorrect DLCI.
Mismatched encapsulation types.
Incorrect IP address mapping.
Answer: A
Explanation:
Three LMI protocol options are available in Cisco IOS software: Cisco, ITU, and ANSI. Each LMI option is
slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each
end of an access link use the same LMI standard, LMI works fine.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 381
QUESTION NO: 38
Exhibit:
Leading the way in IT testing and certification tools, www.testking.com
- 28 -
640 - 801
Five new routes need to be configured quickly for testing. While connected to a router by console, the
administrator copies and pastes a configuration from a text file, a part of which is shown in the graphic,
into the HyperTerminal window.
Why would host 192.168.10.10/29 be unable to ping the Ethernet interface of the router as a result of this
procedure?
A.
B.
C.
D.
E.
The new configuration needs to be saved to the NVRAM before the changes take effect.
The router needs to be reloaded before the changes are implemented.
The Ethernet network does not show up in the routing table because the RIP configuration is incomplete.
The copied configuration did not overwrite the shutdown command on the Ethernet interface.
The subnet mask on the router prevents the host from communicating with it.
Answer: D
Explanation:
Default configuration of any interface is always shutdown and always needs the command "no shutdown" in the
interface command mode in order to enable the interface.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 379
Leading the way in IT testing and certification tools, www.testking.com
- 29 -
640 - 801
QUESTION NO: 39
Exhibit:
The network administrator at TestKing has found the following problem. The remote networks
172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the testking1 router’s serial 0/0 interface.
No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what
is the most likely cause of the problem?
A.
B.
C.
D.
No gateway of last resort on testking1.
testking1router’s not receiving 172.16.20.0 update.
Incorrect static route for 172.16.20.0.
172.16.20.0 not located in testking1’s routing table.
Answer: C
QUESTION NO: 40
Leading the way in IT testing and certification tools, www.testking.com
- 30 -
640 - 801
You work as a network technician at TestKing. You have subnetted the 213.105.72.0 network with a /28
mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will
provide. What should you tell her?
A.
B.
C.
D.
E.
62 networks and 2 hosts
6 networks and 30 hosts
8 networks and 32 hosts
16 networks and 16 hosts
14 networks and 14 hosts
Answer: E
QUESTION NO: 41
Exhibit:
You are troubleshooting a Cisco router at the main office of TestKing in Toronto.
You enter the show ip route command. The output is displayed in the exhibit.
Which route will not be entered into the routing table of a neighboring router?
A.
B.
C.
D.
R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
C 192.168.1.0/24 is directly connected, Ethernet0
R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
Answer: D
Leading the way in IT testing and certification tools, www.testking.com
- 31 -
640 - 801
Explanation: RIP has the maximum hop count of 15. This route already has a hop count of 15 and adding one
would make it unreachable (see below). This route will be discarded.
R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0
QUESTION NO: 42
You work as a network technician at TestKing. You have subnetted the 201.105.13.0 network with a /26
mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will
provide. What should you tell her?
A.
B.
C.
D.
64 networks and 4 hosts
4 networks and 64 hosts
2 networks and 62 hosts
62 networks and 2 hosts
Answer: C
QUESTION NO: 43
Your TestKing trainee Fernanda is studying the spanning three algorithm. She asks you how the
spanning-tree path cost is determined by default.
What should you tell her?
A.
B.
C.
D.
Total hop count.
Sum of the costs based on bandwidth.
Dynamically determined based on load.
Individual link cost based on latency.
Answer: D
QUESTION NO: 44
You are giving a lecture on the Spanning-Tree algorithm for your TestKing trainees.
You need to connect the Spanning-Tree Protocol states with the correct functions.
(Not all options are used.)
Leading the way in IT testing and certification tools, www.testking.com
- 32 -
640 - 801
Answer:
Explanation:
x Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward
traffic or learn MAC addresses on the interface.
x Learning –learns MAC addresses and builds a filter table but does not forward frames.
x Forwarding – Sends and receives all data on the bridged port.
x Blocking – are used to prevent network loops.
Leading the way in IT testing and certification tools, www.testking.com
- 33 -
640 - 801
Reference:
CCNA Study guide Second Edition (Sybex, Todd Lammle) page 82
QUESTION NO: 45
You work as a network technician at TestKing. You are required to establish a Telnet session with a cisco
router. Which commands should you use?
A. testking1(config)# line console 0
testking1(config-if)# enable password testking
B. testking1(config)# line console 0
testking1(config-line)# enable secret testking
testking1(config-line)# login
C. testking1(config)# line console 0
testking1(config-line)# password testking
testking1(config-line)# login
D. testking1(config)# line vty 0
testking1(config-line)# enable password testking
E. testking1(config)# line vty 0
testking1(config-line)# enable secret testking
testking1(config-line)# login
F. testking1(config)# line vty 0
testking1(config-line)# password testking
testking1(config-line)# login
Answer: F
Explanation:
Access from
Telnet
Password Type
vty password
Configuration
line vty 0 4
login
password cisco
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 177
QUESTION NO: 46
A Law firm has offices in three different countries. Two of the offices have network connectivity to each
other. The third office has recently received a router and is to be connected to the other two. The names
of the routers are TestKing1, TestKing2, and TestKing3. Configure the TestKing3's router's IP addresses
on the E0 and S1 interfaces so that the E0 interface receives the first usable subnet while the S1 interface
Leading the way in IT testing and certification tools, www.testking.com
- 34 -
640 - 801
receives the second usable subnet from the network 192.168.101.0/28. Both interfaces should receive the
first available IP of the subnet. The zero subnet should not be used. The routers have been configured
with the following specifications.
The routers are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol.
Clocking is provided on the serial 0 interfaces
The secret password on the TestKing3 router is "testking"
The subnet mask of all networks other than 192.168.101.0 is the default mask.
The IP addresses are listed in the chart below.
TestKing1
E0 192.168.93.1
S0 192.168.95.1
TestKing2
E0: 192.168.97.1
S0: 192.168.101.42
S1: 192.168.95.2
TestKing3
E0 to be determined
S1 to be determined
Secret password: testking
To configure the router click on the host icon that is connect to a router by a serial console cable.
Answer:
TestKing3> enable
Password: testking
TestKing3 # config terminal
Leading the way in IT testing and certification tools, www.testking.com
- 35 -
640 - 801
TestKing3 (config) # interface ethernet 0
(Shorthand: int e 0)
TestKing3 (config-if) # ip address 192.168.101.17 255.255.255.240
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # exit
TestKing3 (config-) # interface serial 1 (Shorthand: int s 1)
TestKing3 (config-if) # ip address 192.168.101.33 255.255.255.240
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # CTRL+Z
TestKing3 # copy running-config startup-config
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 165
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 486
QUESTION NO: 47
You work as a network consultant. You are planning a network installation for a large organization
named TestKing. The design requires 100 separate subnetworks, so TestKing has acquired a Class B
network address.
What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required
per subnet?
A.
B.
C.
D.
E.
F.
255.255.240.0
255.255.246.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.192
Answer: D
QUESTION NO: 48
Your TestKing trainee Jose are interested in ACLs (access control lists).
He asks you want they can be used for.
What should you tell him? (Choose three)
A. Protect hosts from viruses.
B. Classify network traffic.
Leading the way in IT testing and certification tools, www.testking.com
- 36 -
640 - 801
C.
D.
E.
F.
Provide high network availability.
Identify interesting traffic for DDR.
IP route filtering.
Monitor the number of bytes and packets.
Answer: C, D, E
Explanation:
IP access control lists (ACLs) cause a router to discard some packets based on criteria defined by the network
engineer. The goal of these filters is to prevent unwanted traffic in the network – whether to prevent hackers
from penetrating the network or just to prevent employees from using systems they should not be using.
IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for
prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service
features.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 427
QUESTION NO: 49
You are configuring a network at TestKing main site in Toronto. You use a distance vector routing
protocol.
What could you use to prevent rooting loops in the network? (Choose two)
A.
B.
C.
D.
E.
Link-state advertisements (LSA)
Spanning Tree Protocol
Shortest path first tree
Split horizon
Hold-down timers
Answer: D E
Explanation:
x Split horizon – the routing protocol advertises routes out an interface only if they were not learned from
updates entering that interface.
x Hold-down timer – After finding out that a router to a subnet has failed, a router waits a certain period
of time before believing any other routing information about that subnet.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 154
QUESTION NO: 50
Leading the way in IT testing and certification tools, www.testking.com
- 37 -
640 - 801
Exhibit:
Refer to the router topology shown in the exhibit. Assuming that all routers are running RIP, which
statements describe how the routers exchange their routing tables? (Choose two)
A.
B.
C.
D.
E.
F.
TestKing1 exchanges with TestKing3.
TestKing1 exchanges with TestKing4.
TestKing1 exchanges with TestKing2.
TestKing4 exchanges with TestKing3.
TestKing4 exchanges with TestKing1.
TestKing4 exchanges with TestKing2.
Answer: A, D
QUESTION NO: 51
Your TestKing trainee Boris is configuring a serial interface on a Cisco router.
He asks you which encapsulations he can use on the interface.
What should you tell him? (Choose three)
A.
B.
C.
D.
E.
Ethernet
Token Ring
HDLC
Frame Relay
PPP
Answer: C, D, E
QUESTION NO: 52
Leading the way in IT testing and certification tools, www.testking.com
- 38 -
640 - 801
You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing
requires 5 usable subnets, each capable of accommodating at least 18 hosts.
Which subnet mask should you use?
Answer: 255.255.255.224
Explanation:
Default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets , then 3 bits are
required . With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts
using 5 bits in host field. This matches with requirement.
QUESTION NO: 53
Exhibit:
Refer to the topology shown in the graphic. Each host is connected through its own 10Mbps half-duplex
switch port to the e0 interface of the router TestKing1.
What is the bandwidth available to each host?
A.
B.
C.
D.
1 Mbps
10 Mbps
20 Mbps
100 Mbps
Answer: B
QUESTION NO: 54
Leading the way in IT testing and certification tools, www.testking.com
- 39 -
640 - 801
Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router
provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are
configured, and the network is functional. Configure and apply an access list will prevent telnet access to
the TestKing1 router while allowing all other traffic to pass. The access list should not contain more than
three (3) statements and should be applied to the TestKing1 router. The routers have been previously
configured with the following specifications:
The routers are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol.
The clocking signal is provided on the serial 0 interfaces.
All passwords on all routers are "testking".
The subnet mask on all the interfaces is the default mask.
IP addresses are listed in the chart below.
TestKing1
E0 192.168.149.1
S0 192.168.199.1
Secret password: testking
TestKing2
E0 192.168.155.1
S0 192.168.11.1
S1 192.168.199.2
Secret password: testking
TestKing3
E0 192.168.165.1
S1 192.168.11.2
To configure the router click on the host icon that is connected to a router by a serial console cable.
Leading the way in IT testing and certification tools, www.testking.com
- 40 -
640 - 801
Answer:
TestKing1>enable
Password:
TestKing1#show access-lists
TestKing1#config t
Enter configuration commands, one per line. End with END.
TestKing1(config)#access-list 101 deny tcp any 192.168.149.1 0.0.0.0 eq 23
TestKing1(config)#access-list 101 deny tcp any 192.168.199.1 0.0.0.0 eq 23
TestKing1(config)#access-list 101 permit ip any any
TestKing1(config)#interface Ethernet 0
TestKing1(config-if)#ip access-group 101 in
TestKing1(config-if)#exit
TestKing1(config)#interface serial 0
TestKing1(config-if)#ip access-group 101 in
TestKing1(config-if)# <CTRL-Z>
..
TestKing1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration….
[OK]
TestKing1#
QUESTION NO: 55
You work as a network technician at TestKing. You have completed the password recovery procedure on
a Cisco router. The process is successful and the router returns to normal operation.
What is configuration register value at this point of time?
A.
B.
C.
D.
E.
0x2100
0x2101
0x2102
0x2124
0x2142
Answer: C
Explanation: It is default factory setting. Router should attempt to load an IOS from flash memory and load
startup configuration file. Flash memory also called NVRAM
Incorrect answers
A: It is ROM Monitor mode. A low level problem determination
Leading the way in IT testing and certification tools, www.testking.com
- 41 -
640 - 801
B: Router to boot from ROM
E: The value 0x2142 to be set for configuration register in case of password recovery procedure
QUESTION NO: 56
What feature of a networks switch allows an administrative to create separate broadcast domains?
A.
B.
C.
D.
E.
F.
Store-and-forward switching
Microsegmentation
Transparent bridging
Fragment-free switching
Virtual LANs
Cut-through switching
Answer: E
Explanation: Creation of VLAN in a switch provide separate Broadcast domain . If VLAN is not there all ports
as members of one Broadcast domain.
Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 172
Incorrect Answers
A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast
domains
B: Not related to the question
C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the
bridges exists. It will not play any role for creating separate broadcast domain
D,F: Both are switching methods in a switch.
QUESTION NO: 57
New switches have been purchased for a network upgrade. The objective for the network design
emphasizes efficient, error-free transport instead of fast transport.
Which switching mode should be configured on the new switches to provide error-free transport to the
network?
A.
B.
C.
D.
E.
F.
cut-through
fragment-free
frame-filtering
store-and-forward
802.1q forwarding
VTP transparent mode
Leading the way in IT testing and certification tools, www.testking.com
- 42 -
640 - 801
Answer: D
Explanation:
The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check
the FCS before forwarding the frame. FCS is Ethernet Trailer.
Incorrect answers:
A. The Switch performs the address table lookup as soon as the destination address field in the header is
received. The first bits in the frame can be sent out to out port before the final bits in the incoming
frame are received. This does not allow the switch to discard frames that fail the FCS check.
B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the
outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision
will not be forwarded. The FCS still cannot be checked.
C,E,F : They are not related to Switch mode transport.
QUESTION NO: 58
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network
hosts? (Select three.)
A.
B.
C.
D.
E.
F.
15.234.118.63
92.11.178.93
134.178.18.56
192.168.16.87
201.45.116.159
217.63.12.192
Answer: B, C, D
Explanation:
B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)
C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)
D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95
Incorrect answers:
A. is a broadcast
E. is a broadcast
F. is a network id
QUESTION NO: 59
A technician at TestKing needs to update the network documentation. One of the tasks includes
documenting the name of the IOS image file of each router in the network.
Which commands could be used to find this information?
Leading the way in IT testing and certification tools, www.testking.com
- 43 -
640 - 801
A.
B.
C.
D.
E.
Router#
Router#
Router#
Router#
Router#
show
show
show
show
show
protocols
version
image
IOS
flash
Answer: B
"Show flash" displays all the image files in it. There could be more than one file. However, "show version"
displays the one that is currently in use by the router.)
Incorrect answers:
A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address
if configured.
C,D. There are no such commands.
QUESTION NO: 60
Which statement describes the rule of split horizon?
A. Only routers can split boundaries (horizons) between concentric networks.
B. All distance vector protocols require fall back routers that may cause momentary loops as the topology
changes.
C. Networks can only remain fully converged if all information about routers is sent out all active
interfaces.
D. Information about a route should not be sent back in the direction from which the original update come.
E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS
boundary.
Answer: D
Explanation:
Split horizon includes two related concepts that affect what routes are included in a routing update:
An update does not include the subnet of the interface out which the update is sent
All routes with outgoing interface of interface x are not included in updates sent out that same interface x.
Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 369
Incorrect Answers
A: There is no such requirement
B: Distance vector protocols updates routing table at regular intervals instead of Topology changes
C: This is not a feature of split horizon
E: This is not a related feature for split horizon
Leading the way in IT testing and certification tools, www.testking.com
- 44 -
640 - 801
QUESTION NO: 61
Exhibit:
Which of the following is the minimum configuration commands required to bring up the ISDN link
shown in graphic.
Note : SPIDs are not required for this switch. (Choose three)
A.
B.
C.
D.
E.
F.
Router(Config-if)#
Router(Config-if)#
Router(Config-if)#
Router(Config-if)#
Router(Config-if)#
Router(Config-if)#
encapsulation ppp
isdn switch-type type
dialer-list, protocol ip permit
dialer map ip address name name connection number.
ip address subnet mask
dialer group 1
Answer: A, E, F
Explanation:
A: Proper encapsulation to be defined on both routers.
E: IP address to be assigned for interface with subnet mask
F: Dialer group number enables dialer-list on this interface. Dialer-list to be defined on gloabal configuration
command.
Incorrect Answers:
B, C:The commands are executed on global configuration command.
D: Syntax is wrong. Proper syntax is dialer map ip ip address/subnet mask name connection name number.
QUESTION NO: 62
Which of the following are characteristics of PPP? (Choose three)
A.
B.
C.
D.
E.
Can be used over analog circuits.
Maps Layer 2 to Layer 3 address.
Encapsulates several routed protocols.
Supports IP only.
Provides error correction.
Answer: A C E
Leading the way in IT testing and certification tools, www.testking.com
- 45 -
640 - 801
Explanation:
x PPP can be used on either type of line (dial or switched lines), because data-link protocols are designed
for point-to-point environment.
x PPP uses one LCP per link and one Control Protocol for each Layer 3 protocol defined on the link. If a
router is configured for IPX, Apple Talk, and IP on a PPP serial link, the router configured for PPP
encapsulation automatically tries to bring I the appropriate control protocols for each layer 3 protocol.
x Error recovery can be performed by the data-link protocol or a higher-layer protocol, or it might not be
performed at all. Supported but not enabled by default.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 309
QUESTION NO: 63
A user types the command ping 204.211.38.52 during a router console session.
What does this command use to test connectivity between the two devices?
A.
B.
C.
D.
E.
ICMP echo request
Information request
Timestamp reply
Redirect
Source quench
Answer: A
Explanation:
The ping command sends an ICMP echo request packet to the stated destination address. The TCP/IP software
at the destination then replies to the ping echo request packet with a similar packet, called ICMP echo reply.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 146
QUESTION NO: 64
An administrator must assign static IP addresses to the servers in the network. For network
192.168.20.24/29 the router is assigned the first usable host address while the sales server is given the last
usable host address.
Which of the following should be entered into the IP properties box for the sales server?
A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9
B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1
Leading the way in IT testing and certification tools, www.testking.com
- 46 -
640 - 801
C. IP address: 192.168.20.30 Subnet Mask 255.255.255.248 Default Gateway: 192.168.20.25
D. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.17
E. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.25
Answer: C
QUESTION NO: 65
Which two statements about the store and forward switching method are true? (Choose two)
A.
B.
C.
D.
Latency remains constant regardless of frame size.
Latency through the switch varies with frame length.
The switch receives the complete frame before beginning to forward it.
The switch checks the destination address as soon as it receives the header and begins forwarding the
frame immediately.
Answer: B D
Explanation:
With store-and-forward, the entire frame is received by the switch before the first bit of the frame is forwarded.
As soon as the incoming switch port receives enough of the frame to see the destination MAC address, the
forwarding decision is made and the frame is transmitted out the appropriate outgoing port to the destination
device. So, each frame might experience slightly less latency.
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Ciscopress, ISBN 1-58720-094-5) Page 243
QUESTION NO: 66
Match the hex and decimal numbers listed on the left with the corresponding binary number listed on the
right. Not all options apply.
Leading the way in IT testing and certification tools, www.testking.com
- 47 -
640 - 801
Answer:
Explanation:
170 (Decimal)
192 (Decimal)
F1 (241 = Decimal)
9F (159 = Decimal)
= 10101010
= 11000000
= 11110001
= 10011111
Leading the way in IT testing and certification tools, www.testking.com
- 48 -
640 - 801
Reference:
http://www.cisco.com/en/US/products/hw/switches/ps2246/products_programming_reference_guide_chapter09
186a00800c33e4.html
QUESTION NO: 67
A group of bakeries wants to provide network connectivity for 3 factories in the group. Each factory is to
have one LAN. The TestKing1 and TestKing2 routers are completely configured. The TestKing3 router
has been configured except the routing protocol. Configure the routing protocol to allow a host on the
LAN of the TestKing3 router to communicate with a host on the TestKing2 router. The routers have been
configured with the following specifications:
Leading the way in IT testing and certification tools, www.testking.com
- 49 -
640 - 801
x
x
x
x
x
x
The routers are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol
The clocking is provided on the serial 0 interfaces.
The secret password on the TestKing3 router is "testking"
The subnet masks on all interfaces is the default mask.
The IP addresses are listed in the chart
TestKing1
E0 192.168.149.1
S0 192.168.179.1
TestKing2
E0 192.164.155.1
S0 192.168.111.1
S1 192.168.179.2
TestKing3
E0 192.168.165.1
S1 192.111.2
To configure the router click on a host icon that is connected to a router by a serial cable.
Answer:
TestKing3>enable
Password:
TestKing3#config t
Testking3(config)#router rip
Testking3(config-router)#network 192.168.165.0
Testking3(config-router)#network 192.168.111.0
Leading the way in IT testing and certification tools, www.testking.com
- 50 -
640 - 801
Testking3(config)# Ctrl-Z
**Output omitted**
TestKing3#copy running-config startup-config
**Output omitted**
[OK]
TestKing3#_
QUESTION NO: 68
Which of the following statements are characteristic of a typical VLAN arrangement? (Choose three)
A.
B.
C.
D.
E.
VLANs logically divide a switch into multiple, independent switches at Layer 2.
A VLAN can span multiple switches.
VLANs typically decrease the number of broadcast domains.
Trunk links can carry traffic for multiple VLANs.
VLAN implementation significantly increases traffic on a network because trunking information must
be added to each packet.
F. VLANs extend the collision domain to include multiple switches.
Answer: A, B, E
QUESTION NO: 69
Which of the following options can be negotiated using LCP during the PPP link establishment? (Choose
three)
A.
B.
C.
D.
E.
F.
callback
IPCP
CHAP
multilink
TCP
Q.931
Answer: B C D
Explanation:
x The NCP phase is used for establishing and configuring different network-layer protocols.
x The most common layer 3 protocol negotiated is IP. The routers exchange IP Control Protocol (IPCP)
messages negotiating options specific to the protocol.
x Point-to-Point Protocol (PPP) currently supports two authentication protocols: Password Authentication
Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Both are specified in RFC
1334 and are supported on synchronous and asynchronous interfaces.
Leading the way in IT testing and certification tools, www.testking.com
- 51 -
640 - 801
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 310+311
QUESTION NO: 70
Match the ISDN term to the appropriate description. Not all options on the left apply.
Answer:
Explanation:
x LAPD – provides the data link protocol that allows delivery of messages across that D-channel to the
local switch.
x LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. It
is defined by ITU-T Recommendations Q.920 and Q.921.
x TE1 – ISDN –capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point.
x ITU.T.430 – Defines connectors, encoding, framing, and reference points.
x TE2 – Equipment that does not understand ISDN protocols and specifications (no ISDN awareness).
Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA.
x NT1 – CPE equipment in North America. Connects with a U reference point (two-wire) to the telco.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page Chapter 10
Leading the way in IT testing and certification tools, www.testking.com
- 52 -
640 - 801
QUESTION NO: 71
Exhibit:
An employee Tess of TestKing company has moved to an office on a different floor. Although the
administrator is able to telnet to all of the routers, the address of Switch TestKing5 is needed in order to
verify that Tess remains in the same VLAN.
Which action could be used by the administrator to find the IP address of TestKing5?
A.
B.
C.
D.
E.
F.
Issue the show ip route command on Router TestKing1.
Issue the show ip route command on Router TestKing3.
Issue the show cdp neighbors command on Router TestKing2.
Issue the show cdp neighbors detail command on Router TestKing3.
Issue the show arp command on Router TestKing1.
Issue the show arp command on Router TestKing2.
Answer: D
Explanation:
To display detailed information about neighboring devices discovered using Cisco Discovery Protocol (CDP),
use the show cdp neighbors privileged EXEC command.
Detail - (Optional) Displays detailed information about a neighbor (or neighbors) including network address,
enabled protocols, hold time, and software version.
Reference:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_command_reference_chapter09186a00800
d983f.html#1019534
QUESTION NO: 72
Exhibit:
Leading the way in IT testing and certification tools, www.testking.com
- 53 -
640 - 801
Which of the following commands can be used to configure the address on the TestKing2 serial interface?
A.
B.
C.
D.
TESTKING2(config-if)# ip address 172.16.17.1 255.255.255.0
TESTKING2(config-if)# ip address 172.16.18.2 255 255.255.252.0
TESTKING2(config-if)# ip address 172.16.17.2 255.255.255.252
TESTKING2(config-if)# ip address 172.16.16.0 255.255.255.0
Answer: B
Explanation: The subnet mask must be 255.255.252.0 to work with the network address 172.16.17.0 / 22 on
the S0/0 interface on TestKing1.
QUESTION NO: 73
Leading the way in IT testing and certification tools, www.testking.com
- 54 -
640 - 801
Users on the TestKing2 site Ethernet are unable to access the TestKing1 site network. After reviewing the
command output, what is the most likely cause of the problem?
A.
B.
C.
D.
Incorrect IP addressing
Frame relay is incorrectly configured.
IGRP is incorrectly configured.
Link state routing protocol is needed.
Answer: C
Explanation:
router igrp
To configure the Interior Gateway Routing Protocol (IGRP) routing process, use the router igrp global
configuration command. To shut down an IGRP routing process, use the no form of this command.
router igrp autonomous-system
autonomous-system- Autonomous system number that identifies the routes to the other IGRP routers. It is also
used to tag the routing information.
Reference:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_command_summary_chapter09186a00800
f0ab0.html#3674
QUESTION NO: 74
Exhibit:
Company TestKing has just added an employee workstation to its network. The employee is unable to
connect to the server TestKingA at IP address 192.168.10.98/27. Identify the incorrectly configured
network parameter in the workstation configuration.
A. Workstation IP address
Leading the way in IT testing and certification tools, www.testking.com
- 55 -
640 - 801
B. Workstation subnet mask
C. Workstation default gateway
D. IP address of the Ethernet 0 router interface
Answer: C
QUESTION NO: 75
Your TestKing trainee Bob asks you what 11111000 binary is in decimal. What should you tell him?
A.
B.
C.
D.
E.
5
192
224
240
248
Answer: E
Explanation:
128 + 64+32+16+8 = 248
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 559
QUESTION NO: 76
Exhibit:
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network. The network
administrator connected to router TestKing1 via the console port, issued the show ip route command,
and was able to ping the server. Based on the output of the show ip route command and the topology
shown in the graphic, what is the cause of the failure?
Leading the way in IT testing and certification tools, www.testking.com
- 56 -
640 - 801
A.
B.
C.
D.
E.
F.
The network has not fully converged.
IP routing is not enabled.
A static route is configured incorrectly.
The FastEthernet interface on TestKing1 is disabled.
The neighbor relationship table is not correctly updated.
The routing table on TestKing1 has not updated.
Answer: C
QUESTION NO: 77
Exhibit:
Refer to the displayed graphic. TestKing2 and TestKing3 are configured for RIPv1 and have complete
connectivity. TestKing1 is added to the network.
What is the most appropriate TestKing1 configuration for full connectivity?
A. TestKing1(config)# router rip
TestKing1(config-router)# network 10.0.0.0
TestKing1(config-router)# network 172.16.0.0
TestKing1(config-router)# network 192.168.1.0
B. TestKing1(config)# router rip
TestKing1(config-router)# network 10.0.0.0
C. TestKing1(config)# router rip
TestKing1(config-router)# network 10.0.0.0
TestKing1(config-router)# network 172.16.0.0
D. TestKing1(config)# router rip
TestKing1(config-router)# network 10.0.0.0
TestKing1(config-router)# network 192.168.1.0
Answer: C
Explanation: When configuring RIP you configure DIRECTLY CONNECTED NETWORKS TO THE
ROUTER.
Leading the way in IT testing and certification tools, www.testking.com
- 57 -
640 - 801
Not A: A insinuates when configuring rip on a router every possible network should be configured in the
interface. This is not the case.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 167
QUESTION NO: 78
You are working as network administrator/technician at TestKing Inc.
While troubleshooting a network connectivity problem, you observe steady link lights on both the
workstation NIC and the switch port to which the workstation is connected. However, when the ping
command is issued from the workstation, the output message “Request timed out” is displayed.
At which layer of the OSI model does the problem most likely exist?
A.
B.
C.
D.
E.
F.
The session layer
The protocol layer
The data link layer
The access layer
The network layer
The application layer
Answer: E
Explanation:
TCP/IP includes ICMP, a protocol designed to help manage and control the operation of a TCP/IP network. The
ICMP protocol provides a wide variety of information about a network’s health and operational status. Control
message is the most descriptive part of a name. ICMP helps control and manage IP’s work and therefore is
considered part of TCP/IP’s network layer.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 277
QUESTION NO: 79
Exhibit:
Leading the way in IT testing and certification tools, www.testking.com
- 58 -
640 - 801
Your boss Dr King studies the network diagram shown in the exhibit. She asks you which function the
Frame Relay DLCI provides with respect to TestKing1. What should you tell her?
A.
B.
C.
D.
E.
Defines the signaling standard between TestKing1 and the frame switch.
Identifies the circuit between TestKing1 and the frame switch.
Identifies the circuit between TestKing2 and the frame switch.
Identifies the encapsulation used between TestKing1 and TestKing2.
Defines the signaling standard between TestKing2 and the frame switch.
Answer: C
Explanation:
TestKing1 sends frames with DLCI, and they reach the local switch. The local switch sees the DLCI field and
forwards the frame through the Frame Relay network until it reaches the switch connected to TestKing2. The
TestKing2’s local switch forwards the frame out of the access link to TestKing2.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) Page 386
QUESTION NO: 80
Exhibit:
Refer to the graphic. TestKingA is communicating with the server.
What will be the source MAC address of the frames received by TestKingA from the server?
A.
B.
C.
D.
The MAC address of router interface e0.
The MAC address of router interface e1.
The MAC address of the server network interface.
The MAC address of TestKingA.
Leading the way in IT testing and certification tools, www.testking.com
- 59 -
640 - 801
Answer: A
QUESTION NO: 81
You work as network administrator at TestKing Ltd. TestKing has three different sites with one router
at each site. The routers are named TestKing1, TestKing2, and TestKing3. A non-certified technician has
configured all the routers, but no connectivity exists between the routers. You task is to identify all
error(s) and make the necessary adjustment(s) to establish network connectivity.
The routers have been configured with the following configuration:
x
x
x
x
x
x
They are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol
Clocking is provided on the serial 0 interface.
The password on each router is "testking"
The subnet mask on all interfaces is the default subnet mask.
The IP addresses are listed in the chart below.
TestKing1
E0 192.168.3.1
S0 192.168.5.1
TestKing2
E0 192.168.8.1
S0 192.168.11.1
S1 192.168.5.2
TestKing3
E0 192.168.13.2
S1 192.168.11.2
Leading the way in IT testing and certification tools, www.testking.com
- 60 -
640 - 801
To configure the router click on a host icon that is connected to the router by a serial console cable.
Answer:
Explanation:
Click on Host 2:
Router TestKing1:
TestKing1> enable
Password: testking
TestKing1 # config terminal
TestKing1 (config) # interface ethernet 0
TestKing1 (config-if) # ip address 192.168.3.1 255.255.255.0
TestKing1 (config-if) # no shutdown
TestKing1 (config-if) # exit
TestKing1 (config) # interface serial 0
TestKing1 (config-if) # ip address 192.168.5.1 255.255.255.0
TestKing1 (config-if) # clock rate 64000
TestKing1 (config-if) # no shutdown
TestKing1 (config-if) # exit
TestKing1 (config) # router rip
TestKing1 (config-router) # network 192.168.3.0
TestKing1 (config-router) # network 192.168.5.0
TestKing1 (config-router) # Ctrl-Z
TestKing1 # copy running-config startup-config
Click on Host 4
Router TestKing2:
Leading the way in IT testing and certification tools, www.testking.com
- 61 -
640 - 801
TestKing2> enable
Password: testking
TestKing2 # config t
TestKing2 (config) # interface ethernet 0
TestKing2 (config-if) # ip address 192.168.8.1 255.255.255.0
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # interface serial 0
TestKing2 (config-if) # ip address 192.168.11.1 255.255.255.0
TestKing2 (config-if) # clock rate 64000
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # interface serial 1
TestKing2 (config-if) # ip address 192.168.5.2 255.255.255.0
TestKing2 (config-if) # no shutdown
TestKing2 (config-if) # exit
TestKing2 (config) # router rip
TestKing2 (config-router) # network 192.168.8.0
TestKing2 (config-router) # network 192.168.11.0
TestKing2 (config-router) # network 192.168.5.0
TestKing2 (config-router) # Ctrl-Z
TestKing2 # copy running-config startup-config
Router TestKing3:
Click on Host F
TestKing3> enable
Password: testking
TestKing3 # config t
TestKing3 (config) # interface ethernet 0
TestKing3 (config-if) # ip address 192.168.13.2 255.255.255.0
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # exit
TestKing3 (config) # interface serial 1
TestKing3 (config-if) # ip address 192.168.11.2 255.255.255.0
TestKing3 (config-if) # no shutdown
TestKing3 (config-if) # exit
TestKing3 (config) # router rip
TestKing3 (config-router) # network 192.168.13.0
TestKing3 (config-router) # network 192.168.11.0
TestKing3 (config-router) # Ctrl-Z
TestKing3 # copy running-config startup-config
Leading the way in IT testing and certification tools, www.testking.com
- 62 -
640 - 801
QUESTION NO: 82
An OSPF interface has been configured with the bandwidth 64 command.
What will be the calculated OSPF cost of this link?
A.
B.
C.
D.
E.
1
10
1562
64000
128000
Answer: C
cost = 10^8 / bandwidth in bps
= 1562
QUESTION NO: 83
What is the purpose of DLCIs in Frame Relay?
A.
B.
C.
D.
The determine the Frame Relay encapsulation type.
They identify the logical circuit between a local router and a Frame Relay WAN switch.
They represent the keepalives used to maintain the PVC in an active state.
They represent the physical address of the router attached to a Frame Relay network.
Answer: B
Explanation:
Routers use the data-link connection identifier (DLCI) as the Frame Replay address, which identifies the VC
over which the frame should travel.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Ciscopress, ISBN 1-58720-083-X) page 377
QUESTION NO: 84
Which statements is true regarding the command sequence shown below? (Choose three)
RouterA(config)# interface loopback 0
RouterA(config-if)# ip address 192.168.31.33 255.255.255.255
Leading the way in IT testing and certification tools, www.testking.com
- 63 -
640 - 801
A.
B.
C.
D.
E.
F.
It creates a virtual, software only, interface.
It uses a wildcard mask of 255.255.255.255.
It ensures that an interface is always active for OSPF processes.
It provides a way to test the convergence of OSPF routing updates.
The mask of 255.255.255.255 is called a host mask.
These commands can only be issued to configure serial interfaces.
Answer: A, B, D
QUESTION NO: 85
TestKing wants to implement 1000mbps Ethernet. Which IEEE standards apply in this scenario? (chose 2)?
A.
B.
C.
D.
E.
F.
802.3ae
802.3u
802.3z
802.3i
802.3ab
802.3e
Answer: C. E
IEEE 802.3z 1000BASE-SX.
The 1000BaseT standard was released in June 1999, defined by IEEE 802.3ab.
Incorrect Answer:
On June 17, 2002 the IEEE 802.3ae specification for 10 Gigabit Ethernet was approved as an IEEE standard
by the IEEE Standards Association (IEEE-SA) Standards Board.
IEEE 802.3u 100BASE-TX
QUESTION NO: 86
Which statement describes the routing protocol OSPF( Choose 3)?
A.
B.
C.
D.
E.
F.
it supports VLSM
it is used to router between Autonomous System.
It confines network instability to one area of network.
It increases routing overhead over the network
It allows extensive control of the routing update
It is simpler to configure than RIPv2
Leading the way in IT testing and certification tools, www.testking.com
- 64 -
640 - 801
Answer: A, C, E
QUESTION NO: 87
Error detection schemes use which field of frame to detect error?
A. .MTU
B. MAC
C. FCS
D. PDU
E. ERR
F. Flag
Answer: C
Explanation: The FCS is used for error checking.
Reference: Todd Lammle's 4th edition study guide, Chapter 5 ip routing pages.
QUESTION NO: 88
Your TestKing trainee Tess asks you to list options for Frame LMI types. (Choose three)
A.
B.
C.
D.
E.
F.
IETF
Q.931
Q933a
IEEE
Cisco
ANSI
Answer: C, E, F
QUESTION NO: 89
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network
hosts? (Choose three)
A.
B.
C.
D.
E.
15.234.118.63
82.11.178.93
134.178.18.56
192.168.16.87
201.45.116.159
Leading the way in IT testing and certification tools, www.testking.com
- 65 -
640 - 801
F. 217.63.12.192
Answer: B, C, D
QUESTION NO: 90
Which command will provide you with information regarding the Layer 3 configuration of directly
connected router interfaces?
A.
B.
C.
D.
E.
F.
show ip interface
show cdp neighbors
show cdp neighbors detail
show ip route
show ip link status
telnet
Answer: C
QUESTION NO: 91
Exhibit:
Leading the way in IT testing and certification tools, www.testking.com
- 66 -
640 - 801
You work as a network administrator at TestKing Inc. Hosts in the TestKing sales department are
unable to access a new server at the Branch Office. Consider the IP addressing scheme in the
accompanying graphic to determine the problem.
A.
B.
C.
D.
E.
The default gateway of the workstations in the sales department is incorrect.
The subnet mask of the workstations in the sales department is incorrect.
The default gateway of the server at the Branch Office is incorrect.
The host address of the server at the Branch Office is invalid.
The serial 0 interface on the Main Office router and the serial 1 interface on the Branch Office router are
not on the same subnetwork.
Answer: D
Explanation: The host address is incorrectly a network address.
Incorrect Answers:
A. The default gateway in the sales department is correct.
B. The subnet mask is correct.
C. The default gateway in the branch office is correct.
E. This is no problem here.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 234.
QUESTION NO: 92
You have a Class B network address with a subnet mask of 255.255.255.0.
Which of the following statements are true regarding the resulting network? (Choose two)
A.
B.
C.
D.
E.
F.
There are 254 usable hosts per subnet.
There is one usable network.
There are 255 usable hosts per subnet.
There are 254 usable subnets.
There are 30 usable subnets.
There are 64 usable hosts per subnet.
Answer: A, D
QUESTION NO: 93
When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be
configured?
Leading the way in IT testing and certification tools, www.testking.com
- 67 -
640 - 801
A.
B.
C.
D.
The Frame Relay encapsulation on the physical interface.
The local DLCI on each subinterface.
An IP address on the physical interface.
The subinterface type as point-to-point.
Answer: C
QUESTION NO: 94
The following access list was applied outbound on the E0 interface connected to the 192.168.1.8/29 LAN:
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any
What effect will this access list have?
A.
B.
C.
D.
E.
All traffic will be allowed to exit E0 except FTP traffic.
FTP traffic from 192.168.1.22 to any host will be denied.
FTP traffic from 192.168.1.9 to any host will be denied.
All traffic exiting E0 will be denied.
All FTP traffic to network 192.168.1.9/29 from any host will be denied.
Answer: D
QUESTION NO: 95
Which command is used to display the placement and direction of an IP access control list on a router?
A.
B.
C.
D.
E.
F.
show access-list
show ip route
show ip interface
show interface
show interface list
show ip interface brief
Answer: C
QUESTION NO: 96
Leading the way in IT testing and certification tools, www.testking.com
- 68 -
640 - 801
Which of the following are characteristics of microsegmentation? (Choose two)
A.
B.
C.
D.
E.
F.
Dedicated paths between sending and receiving hosts are established.
The number of collision domains is decreased.
Broadcast domains are enlarged.
Multiple subnetwork broadcast addresses are created.
Multiple ARP tables are required on the connected hosts.
Bandwidth is dedicated to connect hosts.
Answer: A, F
QUESTION NO: 97
You are the network administrator of the TestKing company and receive a call from a user who is unable
to reach a server at a remote site. After further review your discover the following information.
local PC 10.0.3.35/24
default gateway 10.0.3.1
remote server 10.0.5.250/24
You then conduct the following tests from the offending local PC.
ping 127.0.0.1 – unsuccessful
ping 10.0.3.35 – unsuccessful
ping 10.0.3.1 – unsuccessful
ping 10.0.5.250 – unsuccessful
Which of the following problems would create the test results listed above?
A.
B.
C.
D.
TCP/IP not correctly installed.
Local physical layer problem.
Default gateway down.
Remote physical layer problem.
Answer: D
QUESTION NO: 98
Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN?
A. To provide a mechanism for network monitoring in switched environments.
B. To prevent routing loops in networks with redundant paths.
Leading the way in IT testing and certification tools, www.testking.com
- 69 -
640 - 801
C. To prevent switching loops in networks with redundant switched paths.
D. To manage, the addition, deletion, and naming of VLANs across multiple switches.
E. To segment a network into multiple collision domains.
Answer: C
QUESTION NO: 99
You TestKing trainee Tess ask you which parameter must be supplied when initializing the IGRP routing
process. What should you tell her?
A.
B.
C.
D.
E.
Connected network numbers
IP address mask
Metric weights
Autonomous system number
Register administrative id
Answer: D
QUESTION NO: 100
You work as a network technician at TestKing. You need to add a new VLAN, named ACCOUNTS, to
your switched network.
Which of the following are true regarding configuration of this VLAN? (Choose three)
A.
B.
C.
D.
E.
The VLAN must be created.
The VLAN must be named.
An IP address must be configured for the ACCOUNTS VLAN.
The desired ports must be added to the new VLAN.
The VLAN must be added to the STP domain.
Answer: A, B, D
QUESTION NO: 101
Bob, your TestKing trainee, want to segment a network. What devices could he use?
(Choose three)
A. hub
Leading the way in IT testing and certification tools, www.testking.com
- 70 -
640 - 801
B.
C.
D.
E.
F.
repeater
switch
bridge
router
media converter
Answer: C, D, E
QUESTION NO: 102
The junior TestKing trainee Ellen asks you to describe what is specific for a global command.
What should you tell her?
A.
B.
C.
D.
E.
A command that is available in every release of IOS, regardless of the version or deployment status.
A command that can be entered in any configuration mode.
A command that is universal in application that supports all protocols.
A command that is implemented in all foreign and domestic IOS versions.
A command that is set once and affects the entire router.
Answer: A
Explanation:
Global command is available an all releases of IOS .In every router one has to define minimum hostname . This
will be available in Global config mode in all versions of images.
Reference: Wendell Odom. CISCO CCNA Certification Guide ( 2000 Press) Page 36
Incorrect Answers
B: It can be entered from usermode or exit from interface mode mainly
C: It is not mandatory to support all protocols
D: Not clear about foreign and Domestic IOS version
E: An interface config may overwrite global config parameter
QUESTION NO: 103
What is the range of binary values for the first octet in Class B addresses?
A.
B.
C.
D.
E.
10000000-11111111
00000000-10111111
10000000-10111111
10000000-11011111
11000000-11101111
Leading the way in IT testing and certification tools, www.testking.com
- 71 -
640 - 801
Answer: C
QUESTION NO: 104
Which of the following access list statements will deny all telnet connections to subnet 10.0.1.0/24?
A.
B.
C.
D.
E.
access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet
access-list 115 deny tcp any 10.0.1.0 eq telnet
access-list 115 deny udp any 10.0.10 eq 23
access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23
access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23
Answer: D
QUESTION NO: 105
Your boss at TestKing wants to know why the Spanning-Tree algorithm is used in a switched LAN?
A.
B.
C.
D.
E.
To provide a mechanism for network monitoring in switched environments.
To prevent routing loops in networks with redundant paths.
To prevent switching loops in networks with redundant switched paths.
To manage, the addition, deletion, and naming of VLANs across multiple switches.
To segment a network into multiple collision domains.
Answer: C
QUESTION NO: 106
Which wireless data command type has a high data rate but is limited to very short distances?
A.
B.
C.
D.
narrowband
spread spectrum
infrared
broadband personal comm. Service (PCS)
Answer: C
Leading the way in IT testing and certification tools, www.testking.com
- 72 -
640 - 801
QUESTION NO: 107
Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be
distributed to all the switches in a domain?
A.
B.
C.
D.
E.
STP
VTP
GVRP
SNMP
DHCP
Answer: B
Explanation :
Sybex CCNA Study Guide 4th Edition (Page 359)
” The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched
internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete,
and rename VLANs—information that is then propagated to all other switches in the VTP domain.”
QUESTION NO: 108
Which of the following are types of crosstalk? (Select all that apply)
A.
B.
C.
D.
E.
near-end crosstalk(NEXT)
jitter crosstalk(JEXT)
far end crosstalk(FEXT)
middle closed-end crosstalk(MCEXT)
power sum near-end crosstalk(PSNEXT)
Answer: A, C, E
Explanation: Near End Crosstalk (NEXT) is crosstalk measured at the transmitting end of the cable. Far
End Crosstalk (FEXT) is measured at the far end from where the signal was injected into the
cable.
Power Sum NEXT (PSNEXT) is basically a mathematical calculation that simulates all
four pairs being energized at the same time. PSNEXT calculations are used to ensure that a cable
will not exceed crosstalk noise performance requirements when all pairs are operating simultaneously.
PSNEXT is typically used in Gigabit Ethernet, rather than 10BaseT or 100BaseT.
Reference: Sybex CCNA 4.0 - P. 30
Leading the way in IT testing and certification tools, www.testking.com
- 73 -
640 - 801
QUESTION NO: 109
Which of the following are VLAN frame encapsulation types that may be configured on a catalyst
switch? (Choose 2)
A.
B.
C.
D.
E.
VTP
ISL
CDP
802.1Q
LLC
Answer: B, D
ISL and 802.1Q are the two trunking encapsulations.
QUESTION NO: 110
What command will configure an interface on a Catalyst 2900 series switch to carry traffic from all
VLANs to another directly connected switch? (Choose two)
A. Switch(config-if)# vlan all
B. Switch(config-if)# switchport access clan 30
C. Switch(config-if)# switchport access vlan all
D. Switch(config-if)# switchport mode trunk
E. Switch(config-if)# switchport trunk encapsulation dot1q
Answer: C, D
The trunk encapsulation for the catalyst 2900 by default is dot1q
QUESTION NO: 111
Why do large OSPF networks use a hierarchical design? (Choose three)
A.
B.
C.
D.
E.
F.
To decrease latency by increasing bandwidth
To reduce routing overhead
To speed up convergence
To confine network instability to single areas of the network
To reduce the complexity of router configuration
To lower costs by replacing routers with distribution layer switches
Answer: B, C, D
Leading the way in IT testing and certification tools, www.testking.com
- 74 -
640 - 801
QUESTION NO: 112
A network administrator is trying to add a new router into a established OSPF network. The networks
attached to the new router do not appear in the routing tables of the other OSPF routers. Given the
information in the partial configuration shown below, what configuration error is causing this problem?
Router(config)# router ospf 1
Router(config-router)# network 10.0.0.0 255.0.0.0 area 0
A.
B.
C.
D.
E.
F.
The process id is configured improperly
The OSPF area is configured improperly
The network wildcard mask is configured improperly
The network number is configured improperly
The AS is configured improperly
The network subnet mask is configured improperly
Answer: E
QUESTION NO: 113
Which commands are required to properly configure a router to run OSPF and to add network
192.168.16.0/24 to OSPF area 0? (Choose two)
A.
B.
C.
D.
E.
F.
Router(config)# router ospf 0
Router(config)# router ospf 1
Router(config)# router ospf area 0
Router(config-router)# network 192.168.16.0 0.0.0.255 0
Router(config-router)# network 192.168.16.0 0.0.0.255 area 0
Router(config-router)# network 192.168.0 255.255.255.0 area 0
Answer: B, E
QUESTION NO: 114
Network broadcast traffic from the Business Department is needlessly reaching the Engineering
Department LAN.
What can be done to contain this traffic within the Business Department network while maintaining
connectivity with enterprise servers and the Internet? (Choose two)
Leading the way in IT testing and certification tools, www.testking.com
- 75 -
640 - 801
A.
B.
C.
D.
E.
F.
Establish a VTP domain to contain the extraneous traffic
Provide greater bandwidth to the Engineering Department LAN
Utilize full-duplex Ethernet on the Engineering Department LAN
Place the business department on a separate subnet and route between networks
Change the switch IP address to an address on the Engineering Department LAN
Create separate VLANs and subnets for the two departments and route between the two
Answer: D, F
QUESTION NO: 115
OSPF routing uses the concept of areas.
What are the characteristics of OSPF areas? (Choose three)
A.
B.
C.
D.
E.
F.
Each OSPF area requires a loopback interface to be configured
Areas may be assigned any number from 0 to 65535
Area 0 is called the backbone area
Hierarchical OSPF networks do not require multiple areas
Multiple OSPF areas must connect to area 0
Single area OSPF networks must be configured in area 1
Answer: B, C, E
QUESTION NO: 116
How is spanning-tree path cost determined by default?
A.
B.
C.
D.
Total hop count
Sum of the costs based on bandwidth
Dynamically determined based on load
Individual link cost based on latency
Answer: B
Explanation: Sybex CCNA Study Guide 4th Edition (Page 323)
“The STP cost is an accumulated total path cost based on the available bandwidth of each of the links.”
QUESTION NO: 117
Leading the way in IT testing and certification tools, www.testking.com
- 76 -
640 - 801
Refer to the graphic.
What should be the IP address of the host?
A.
B.
C.
D.
E.
192.168.5.14
192.168.5.32
192.168.5.40
192.168.5.47
192.168.5.55
Answer: C
QUESTION NO: 118
Which mode can be used to quickly configure a router for basic operations?
A.
B.
C.
D.
RXBOOT mode
SETUP mode
ROM Monitor mode
Autoflash mode
Answer: B
QUESTION NO: 119
Acknowledgements, sequencing, and flow control are characteristics of which OSI layer?
A. Layer 2
B. Layer 3
Leading the way in IT testing and certification tools, www.testking.com
- 77 -
640 - 801
C.
D.
E.
F.
Layer 4
Layer 5
Layer 6
Layer 7
Answer: C
QUESTION NO: 120
On which types of network will OSPF elect a backup designated router?
A.
B.
C.
D.
E.
Point-to-point and multiaccess
Point-to-multipoint and multiaccess
Point-to-point and point-to-multipoint
Nonbroadcast and broadcast multipoint
Nonbroadcast and broadcast multiaccess
Answer: E
Explanation:
Sybex CCNA Study Guide 4th Edition (Page 283)
” DR and BDR are elected on broadcast and nonbroadcast multi-access networks.”
QUESTION NO: 121
Popcorn# show ip protocols
Routing Protocol is “rip”
Sending updates every 30 seconds, next due in 13 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is
Incoming update filter list for all interfaces is
Redistribution: rip
Default version control: send version 1, receive any version
Leading the way in IT testing and certification tools, www.testking.com
- 78 -
640 - 801
Interface
Send Recv Triggered RIP
Ethernet0 1 12
Ethernet1 1 12
Serial
1 12
Routing for Networks:
222.8.4.0
10.1.1.0
Routing Information Sources:
Gateway
Distance Last Update
222.8.4.1
120
00:00:04
Key-chain
An administrator who is consoled into the Peanut router is able to ping the Serial0 and Ethernet0 ports of
the Popcorn router but unable to ping its Ethernet1 interface.
Use the graphic and command output to identify possible causes for this problem. (Choose two)
A.
B.
C.
D.
E.
The Serial interface of the Popcorn router is shutdown.
The Ethernet1 interface of the Popcorn router is shutdown.
The Popcorn router did not include network 192.168.12.0 in its routing configuration.
The Popcorn router is not forwarding RIP updates.
The clockrate is missing from the configuration of one of the routers.
Answer: B, E
QUESTION NO: 122
RtrA#debug ip rip
Rip protocol debugging is on
RtrA#
1d05h: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1)
1d05h: RIP: build update entries
1d05h: network 10.0.0.0 metric 1
1d05h: network 192.168.1.0 metric 2
1d05h: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1)
1d05h: RIP: build update entries
1d05h: network 172.16.0.0 metric 1
RtrA#
1d05h: RIP: received v1 update from 10.0.15.2 on Serial0/0
1d05h:
192.168.1.0 in 1 hops
1d05h:
192.168.0 in 16 hops (inaccessible)
Which of the following are true regarding the command output shown in the display? (Choose two)
A. There are at least two routers participating in the RIP process.
Leading the way in IT testing and certification tools, www.testking.com
- 79 -
640 - 801
B. A ping to 192.168.168.2 will be successful.
C. A ping to 10.0.15.2 will be successful.
D. RtrA has three interfaces participating in the RIP process.
Answer: A, C
QUESTION NO: 123
What is the binary equivalent of the decimal number 231?
A.
B.
C.
D.
E.
11010011
11011011
11100111
11101011
11110011
Answer: C
QUESTION NO: 124
Which type of EIGRP route entry describes a feasible successor?
A.
B.
C.
D.
A backup route, stored in the routing table
A primary route, stored in the routing table
A backup route, stored in the topology table
A primary route, stored in the topology table
Answer: C
QUESTION NO: 125
What are the advantages of using full-duplex Ethernet instead of single-duplex? (Choose two)
A.
B.
C.
D.
E.
Uses inexpensive hubs
Provides faster data transfer
Utilizes fewer pairs of wires
Operates without collisions
Operates on coaxial cable
Leading the way in IT testing and certification tools, www.testking.com
- 80 -
640 - 801
Answer: B, D
QUESTION NO: 126
While troubleshooting a network problem, a technician discovers that the current copy of the Cisco IOS
is outdated and needs to be updated.
Which of the following commands would the technician issue to replace the Cisco router IOS with the
newer version?
A.
B.
C.
D.
E.
F.
Router# copy tftp flash
Router(config)# restore flash
Router(config)# repair flash
Router# copy flash run
Router> copy start flash
Router# copy start flash
Answer: A
QUESTION NO: 127
Which of the following is a Layer 2 protocol used to maintain a loop-free network?
A.
B.
C.
D.
VTP
STP
RIP
CDP
Answer: B
QUESTION NO: 128
Which WAN protocol is used for out-of-band signaling?
A.
B.
C.
D.
NCP
HDLC
LAPB
LAPD
Leading the way in IT testing and certification tools, www.testking.com
- 81 -
640 - 801
Answer: D
QUESTION NO: 129
A Cisco router and a router from another manufacturer are directly connected via a serial link.
Which command can be used on the Cisco router to form a WAN connection between the routers?
A.
B.
C.
D.
Lab(config-if)# encapsulation hdlc ansi
Lab(config-if)# encapsulation ppp
Lab(config-if)# encapsulation frame-relay default
Lab(config-if)# encapsulation isdn
Answer: B
QUESTION NO: 130
Which address represents a unicast address?
A.
B.
C.
D.
E.
224.1.5.2
FFFF.FFFF.FFFF
192.168.24.59/30
255.255.255.255
172.31.128.255./18
Answer: C
QUESTION NO: 131
Which characteristics describe the routing protocol EIGRP? (Choose two)
A.
B.
C.
D.
E.
F.
Has a maximum hop count of 255
Uses a 32-bit metric
Can differentiate between internal and external routes
Supports a single routed protocol
Can maintain only a single routing table
Required all networks within an AS to use the same subnet mask
Answer: B, C
Leading the way in IT testing and certification tools, www.testking.com
- 82 -
640 - 801
QUESTION NO: 132
What type of packets do routers running OSPF send to maintain connectivity with neighboring routers?
A.
B.
C.
D.
E.
dead interval packets
hello packets
LSU packets
OSP packets
keepalive packets
Answer: B
QUESTION NO: 133
What information does a router running a link-state protocol use to build and maintain its topological
database? (Choose two)
A.
B.
C.
D.
E.
F.
hello packets
SAP messages sent by other routers
LSAs from other routers
Beacons received on point-to-point links
Routing tables received from other link-state routers
TTL packets from designated routers
Answer: A, C
QUESTION NO: 134
Which form of NAT maps multiple private IP addresses to a single registered IP address by using
different ports?
A.
B.
C.
D.
E.
static NAT
dynamic NAT
overloading
overlapping
port loading
Answer: C
Leading the way in IT testing and certification tools, www.testking.com
- 83 -
640 - 801
QUESTION NO: 135
A catalyst switch must be in which VTP mode in order to delete and add VLANs to a management
domain?
A.
B.
C.
D.
E.
Client
Server
Domains
Transparent
Designated.
Answer: B
Explanation:
VTP Modes
If you intend to make a switch part of a VTP management domain, each switch must be configured in one of
three possible VTP modes. The VTP mode assigned to a switch will determine how the switch interacts with
other VTP switches in the management domain. The three VTP modes that can be assigned to a Cisco switch
include server mode, client mode, and transparent mode. Each of these roles is outlined below:
Server Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any
given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a
switch can be used to add, delete, and modify VLANs, and this information will be passed to all other
switches in the VTP management domain.
Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any
VLANs added, deleted, or modified by a switch in Server Mode within the same management domain.
A switch in VTP client mode cannot make any changes to VLAN information.
Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in
Server Mode to other switches in the VTP management domain, but will not actually process the
contents of these messages. When individual VLANs are added, deleted, or modified on a switch
running in transparent mode, the changes are local to that particular switch only, and are not passed to
other switches in the VTP management domain.
Based on the roles of each VTP mode, the use of each should be more or less obvious. For example, if you had
15 Cisco switches on your network, you could configure each of them to be in the same VTP management
domain. Although each could theoretically be left in the default Server Mode, it would probably be easier to
leave only one switch in this configuration, and then configure all remaining switches for VTP Client Mode.
Then, when you need to add, delete, or modify a VLAN, that change can be carried out on the VTP Server
Mode switch and passed to all Client Mode switches automatically. In cases where you need a switch to act in a
relatively standalone manner, or dont want it to propagate information about its configured VLANs, use
Transparent Mode.
Leading the way in IT testing and certification tools, www.testking.com
- 84 -
640 - 801
Define flow control and describe the three basic methods used in networking.
Flow control is a function that prevents network congestion by ensuring that transmitting devices do not overwhelm
receiving devices with data. Flow control is used to ensure data reliability. There are a number of possible causes of
network congestion. In basic terms, flow control is used to control the flow of a message from the sender to the receiver
by starting and stopping the message transmission as necessary based on the receivers buffer. It is a protocol
mechanism that allows the receiver to control the rate at which the sender can transmit data. It makes it possible for a
receiver running on a low speed computer to accept data from high speed sender, without being overrun. Usually it is
because a high-speed computer generates data faster than the network can transfer it, or faster than the destination
device can receive and process it.
There are three commonly used methods for handling network congestion:
x
Buffering
Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be
processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data
continues at high speeds
x
Source Quench Messages
Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The
receiving device sends a source quench message to request that the source reduce its current rate of data
transmission.
x
Windowing
Windowing is a flow-control method in which the source device requires an acknowledgement from the
destination after a certain number of packets have been transmitted.
1. The source device sends a few packets to the destination device.
2. After receiving the packets, the destination device sends an acknowledgment to the source.
3. The source receives the acknowledgment and sends the same amount of packets.
4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it
does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate.
Windowing is reliable because it uses positive acknowledgement which requires the recipient device to
communicate with the sending device, sending back an acknowledgement when it receives data. If the sending
device does not receive an acknowledgement it knows to retransmit the packets at a reduced transmission rate. If
the receiving device sends a packet with a zero window size, it means it’s buffers are full and it cannot receive
any more data. Transmission is resumed when the receiving device sends a packet with a window size higher
than zero.
TCP at the Transport layer uses Windowing as a method flow control. Two mechanisms used with windowing
ensure the delivery of segments with no duplication or data loss. These include Acknowledgements and Negative
Acknowledgements and also sequencing and necessary retransmission. All these technologies work together to
provide data reliability and optimal performance.
Incorrect Answers:
A: CLIENT mode merely accepts changes made by the switch that is connected and in SERVER mode.
Leading the way in IT testing and certification tools, www.testking.com
- 85 -
640 - 801
QUESTION NO: 136
Which of the following are types of flow control? (Choose 3)
A.
B.
C.
D.
E.
Buffering.
Cut-Through.
Windowing.
Congestion Avoidance.
Load Balancing.
Answer: A, C, D
Explanation:
There are three commonly used methods for handling network congestion:
x
Buffering
Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be
processed. Occasional data bursts are easily handled by buffering. However, buffers can overflow if data
continues at high speeds
x
Source Quench Messages
Source quench messages are used by receiving devices to help prevent their buffers from overflowing. The
receiving device sends a source quench message to request that the source reduce its current rate of data
transmission.
x
Windowing
Windowing is a flow-control method in which the source device requires an acknowledgement from the
destination after a certain number of packets have been transmitted.
1. The source device sends a few packets to the destination device.
2. After receiving the packets, the destination device sends an acknowledgment to the source.
3. The source receives the acknowledgment and sends the same amount of packets.
4. If the destination does not receive one or more of the packets for some reason (such as overflowing buffers), it
does not send an acknowledgment. The source will then retransmits the packets at a reduced transmission rate.
QUESTION NO: 137
A training company called TestKing has three production facilities. Two of the facilities have network
connectivity to each other. The third facility has recently received a router and is to be connected to the
other two. The names of routers are QA, StudyGuide, and Examinator. Configure the Examinator
router's IP addresses on the E0 and S1 interfaces so that the E0 resolves the first usable subnet while S1
receives the second usable subnet from the network 192.168.81.0/27. Both interfaces should receive the
first available IP of the subnet. The zero subnet should not be used. The routers have been configured
with the following specifications:
The routers are named QA, StudyGuide, and Examinator
RIP is the routing protocol
Clocking is provided on the serial 0 interfaces.
The secret password on the Examinator router is "testking"
Leading the way in IT testing and certification tools, www.testking.com
- 86 -
640 - 801
The IP address are listed in the chart below.
Name: QA
E0
: 192.168.83.1
S0
: 192.168.85.1
Name: StudyGuide
E0
: 192.168.88.1
S0
: 192.168.81.89
S1
: 192.168.85.2
Name: Examinator
E0
: to be determined
S1
: to be determined
Secret Password: testking
Task: To configure the router click on the host icon that is connected to the router by a serial cable.
Answer:
Examinator#config t
Enter configuration commands, one per line. End with END.
Examinator(config)#int e 0
Examinator(config-if)#ip add 192.168.81.33 255.255.255.224
Examinator(config-if)#no shut
Examinator(config-if)#exit
Examinator(config)#int s 1
Examinator(config-if)#ip add 192.168.81.65 255.255.255.224
Leading the way in IT testing and certification tools, www.testking.com
- 87 -
640 - 801
Examinator(config-if)#no shut
Examinator(config-if)#CTRL+Z
Examinator#copy ru st
..
..
[OK]
Examinator#
QUESTION NO: 138
Three sites, TestKing1, TestKing2, and TestKing3 are connected via a WAN. At each site a router
provides serial connectivity to the Wan and an Ethernet connection to a LAN. All three routers are
configured, and the network is functional. Configure and apply an access list will prevent telnet access to
the TestKing1 router while allowing all other traffic to pass. The access list should not contain more than
three (3) statements and should be applied to the TestKing3 router. The routers have been previously
configured with the following specifications:
The routers are named TestKing1, TestKing2, and TestKing3.
RIP is the routing protocol.
The clocking signal is provided on the serial 0 interfaces.
All passwords on all routers are "testking".
The subnet mask on all the interfaces is the default mask.
IP addresses are listed in the chart below.
TestKing1
E0 192.168.1.1
S0 192.168.118.1
Secret password: testking
TestKing2
E0 192.168.121.1
S0 192.168.5.1
S1 192.168.118.2
Secret password: testking
TestKing3
E0 192.168.134.1
S1 192.168.5.2
Leading the way in IT testing and certification tools, www.testking.com
- 88 -
640 - 801
To configure the router click on the host icon that is connected to a router by a serial console cable.
Answer:
TestKing3>enable
:password
TestKing3#show access-lists (** redundant **)
TestKing3#config t
.Enter configuration commands, one per line. End with END
TestKing3(config)#access-list 101 deny tcp any 192.168.134.1 0.0.0.0 eq 23
TestKing3(config)#access-list 101 deny tcp any 192.168.5.2 0.0.0.0 eq 23
TestKing3(config)#access-list 101 permit ip any any
TestKing3(config)#interface Ethernet 0
TestKing3(config-if)#ip access-group 101 in
TestKing3(config-if)#exit
TestKing3(config)#interface serial 0
TestKing3(config-if)#ip access-group 101 in
TestKing3(config-if)#<CTRL-Z
..
TestKing3#copy running-config startup-config
Explanation: You should deny access to telnet to the tesking1 router and the access list should be applied in
testking3 router (if the wording is correct) this mean that tesking1 and tesking2 they won’t be affected that all
only testking3 LAN interface of testking3 will be restricted and that access list is not necessary to be applied to
the serial 1 interface because to the Ethernet0 in the testking3 will be enough.
Note: Compare to Question 54.
QUESTION NO: 139
Leading the way in IT testing and certification tools, www.testking.com
- 89 -
640 - 801
On point-to-point networks, OSPF hello packets are addresses to which address?
A.
B.
C.
D.
E.
F.
127.0.0.1
172.16.0.1
192.168.0.5
223.0.0.1
224.0.0.5
254.255.255.255.255
Answer: E
QUESTION NO: 140
Exhibit:
An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching
the HR server attached to the Eastfield router.
Which of the following access lists will accomplish this task when grouped with the e0 interface in the
inbound direction on the Westfield router?
Leading the way in IT testing and certification tools, www.testking.com
- 90 -
640 - 801
A. deny tcp 192.168.16.0 0.0.0.255 192.168.17.252 0.0.0.0 eq 23
permit ip any any
B. deny tcp 192.168.18.262 0.0.0.0 192.168.16.0 0.0.0.255 eq 23
permit ip any any
C. permit ip any any
deny tcp 192.168.16.0 0.0.0.255 192.172.252 0.0.0.0 eq 23
D. permit ip any any
deny tcp 192.168.17.252 0.0.0.0 192.168.0 0.0.0.255 eq 23
Answer: A
Explanation: The syntax for an access list is the source address first then the destination address. In this case
the source address is 192.168.16.0/24 and the destination address 192.168.17.252
QUESTION NO: 141
Camden#show running-config
<some output text omitted>
enable password cisco
!
username Central password 0 cisco
!
interface BRI0/0
ip address 192.168.0.1 255.255.255.0
encapsulation ppp
dialer idle-timeout 180
dialer map ip 192.168.0.2 name Remote 5552000
dialer-group 1
isdn switch-type basic-ni
no fair-queue
ppp authentication chap
!
ip route 192.168.20.0 255.255.255.0 192.168.0.2
!
router rip
network 192.168.0.0
!
access-list 129 deny tcp 192.168.0.0 0.0.0 255 host 192.168.20.5 eq www
access-list 128 permit ip any any
dialer-list 1 protocol ip list 128
Leading the way in IT testing and certification tools, www.testking.com
- 91 -
640 - 801
In an effort to minimize traffic, an administrator decided to keep web traffic from causing the ISDN link
to come up by denying WWW traffic to the 192.168.20.5 remote server. Two minutes after making
changes to the configuration as shown in the graphic, the administrator notices that web traffic is still
passing over the link.
What is the most likely cause of the problem?
A.
B.
C.
D.
The dialer-group has not been applied to outbound traffic.
The access-list is incorrectly configured.
Broadcasts are creating "interesting" traffic and keeping the link active.
The command ip access-group 128 out is missing from the bri0/0 interface.
Answer: B
Explanation:
The access list is incorrectly configured! The extended list for the deny is 129! The other is 128 and the dialer
list is referencing the 128 access-list.
QUESTION NO: 142
Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet?
(Choose two)
A.
B.
C.
D.
E.
192.168.20.29
192.168.20.16
192.168.20.17
192.168.20.31
192.168.20.0
Answer: A, C
QUESTION NO: 143
Which fields are common to the TCP and the UDP segments? (Choose two)
A.
B.
C.
D.
E.
F.
source address
sequence number
acknowledgement number
options
checksum
destination port
Leading the way in IT testing and certification tools, www.testking.com
- 92 -
640 - 801
Answer: E, F
QUESTION NO: 144
Which of the following can cause congestion on an Ethernet network?
A.
B.
C.
D.
E.
Implementing VLANs.
Adding switches for connectivity to the network.
Adding hubs for connectivity to the network.
Microsegmenting the network.
Increasing the number of collision domains.
Answer: C
QUESTION NO: 145
RtrB#show interface serial0/0
Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 10.0.15.2/21
MTU 1500 bytes, BW 128 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10 sec)
LCP Open
Closed: IPXCP
Listen: CCP
Open: IPCP, CDPCP
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of "show interface" counters 00:52:02
Input queue: 0/75/0/0 (size/max/drops/flushes): total output drops: 0
Queuing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
After reviewing the command output, which of the following are operational on the serial link? (Choose
two)
A.
B.
C.
D.
E.
IPX
IP
Compression
CDP
Multilink
Leading the way in IT testing and certification tools, www.testking.com
- 93 -
640 - 801
Answer: C, E
QUESTION NO: 146
Exhibit:
Refer to the graphic. Users on the Holyoke router are unable to access the intranet server attached to
interface E0 of the Chicopee router. Inspection of the routing table of the Holyoke router shows that an
entry for the Chicopee E0 network is missing.
Which command will configure the Holyoke router with a path to the intranet server network?
A.
B.
C.
D.
E.
F.
Holyoke(config)# ip host Chicopee 201.73.127.2
Holyoke(config)# ip host Chicopee 201.73.127.0 255.255.255.0
Holyoke(config)# ip network 202.18.38.0
Holyoke(config)# ip network 202.18.18.0 255.255.255.0
Holyoke(config)# ip route 202.18.18.0 255.255.255.0 201.73.127.2
Holyoke(config)# ip route 201.73.127.2 266.255.255.0 202.18.18.0
Answer: F
QUESTION NO: 147
Tampa#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 32768, address 0002.fd29.c505
Leading the way in IT testing and certification tools, www.testking.com
- 94 -
640 - 801
Configured hello time 2, max age 20. forward delay 15
-----------------------------------------------------------------------Miami#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 16384, address 0002.fd29.c504
Configured hello time 2, max age 20, forward delay 15
------------------------------------------------------------------------London#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 8192, address 0002.fd29.c503
Configured hello time 2, maxage 20, forward delay 15
------------------------------------------------------------------------Cairo#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 4096, address 0002.fd29.c502
Configured hello time 2, maxage 20, forward delay 15
Given the partial outputs displayed in the graphic, which switch device would be the spanning tree root
bridge for a network of only these four devices?
A.
B.
C.
D.
Tampa
Miami
London
Cairo
Answer: D
Explanation: Cairo is the correct answer because it got the lower BID
$UURRWEULGJHLVFKRVHQEDVHGRQWKHUHVXOWVRIWKH%3'8SURFHVVEHWZHHQWKHVZLWFKHV,QLWLDOO\
HYHU\VZLWFKFRQVLGHUVLWVHOIWKHURRWEULGJH:KHQDVZLWFKILUVWSRZHUVXSRQWKHQHWZRUNLWVHQGV
RXWD%3'8ZLWKLWVRZQ%,'DVWKHURRW%,':KHQWKHRWKHUVZLWFKHVUHFHLYHWKH%3'8WKH\
FRPSDUHWKH%,'WRWKHRQHWKH\DOUHDG\KDYHVWRUHGDVWKHURRW%,',IWKHQHZURRW%,'KDVDORZHU
YDOXHWKH\UHSODFHWKHVDYHGRQH%XWLIWKHVDYHGURRW%,'LVORZHUD%3'8LVVHQWWRWKHQHZ
VZLWFKZLWKWKLV%,'DVWKHURRW%,':KHQWKHQHZVZLWFKUHFHLYHVWKH%3'8LWUHDOL]HVWKDWLWLVQRW
7KHUHVXOWLVWKDWWKH
WKHURRWEULGJHDQGUHSODFHVWKHURRW%,'LQLWVWDEOHZLWKWKHRQHLWMXVWUHFHLYHG7
VZLWFKWKDWKDVWKHORZHVW%,'LVHOHFWHGE\WKHRWKHUVZLWFKHVDVWKHURRWEULGJH
KWWSFRPSXWHUKRZVWXIIZRUNVFRPODQVZLWFKKWP
Leading the way in IT testing and certification tools, www.testking.com
- 95 -
640 - 801
QUESTION NO: 148
A graphics art company located in Miami, Florida noticed that their windows size was changed from
3000 to 4000 during the data transfer stage of a TCP session, what can a sending host do?
A.
B.
C.
D.
E.
F.
Transmit 3000 bytes before waiting for an acknowledgement.
Transmit 4000 packets before waiting for an acknowledgement.
Transmit 4000 bytes before waiting for an acknowledgement.
Transmit 4000 segments before waiting for an acknowledgement.
Transmit 3000 frames before waiting for an acknowledgement.
Transmit 3000 packets before waiting for an acknowledgement.
Answer: C
Explanation: For TCP a window size is in bytes. When a window size increases the sending device can
increase transmission to the new size. In this case the new size 4000 bytes.
Incorrect Answers:
A: Prior to the increase in bytes the old window size was 3000 bytes.
B: Window size is bytes not packets.
D: Window size is bytes not segments
E: Window size is bytes not frames.
F: Window size is bytes not packets.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 213-214.
QUESTION NO: 149
You need to issue the command show startup-config from privileged mode. How can you tell you are in
privileged mode?
A.
B.
C.
D.
>
!
#
:
Answer: C
Explanation: On a router the privileged mode is indicated by a # prompt.
Incorrect Answers:
A: The user mode is indicated by a > prompt.
B and D: These are not valid router prompts.
Leading the way in IT testing and certification tools, www.testking.com
- 96-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 69-70.
QUESTION NO: 150
You are unable to connect to the company’s local tftp server using the IP address 10.0.0.20 from your
personal computer. You would to test your personal computer to make sure the TCP/IP has been
corrected installed. Which one of the following actions will allow you to test the protocol stack on your
personal computer?
A.
B.
C.
D.
E.
Ping 127.0.0.0
Ping 203.125.12.1
Telnet 127.0.0.1
Ping 127.0.0.1
Tracert 203.125.12.1
Answer: D
Explanation: Pinging the loopback address is good method to test if the TCP/IP protocol stack is loaded. On
clients the loopback address is always 127.0.0.1.
Incorrect Answers:
A. The command ping 127.0.0.0 will not test the local protocol stack.
B. This command will ping that remote host.
C. You cannot telnet to 127.0.0.1.
E. This tracert command will trace the route to 203.125.12.1.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 123 – 124.
QUESTION NO: 151
Users on your network 10.1.0.0/16 are complaining that they cannot access the company’s intranet server
using the FQDN www.snowball.com. You are able to ping the IP address but you cannot ping
www.snowball.com.
What is the likely cause of this problem?
A.
B.
C.
D.
TCP/IP failure.
DNS failure.
FTP failure.
SNMP failure.
Answer: B
Leading the way in IT testing and certification tools, www.testking.com
- 97-
640 - 801
Explanation: When you combined the fact that user cannot connect to the intranet with its domain but you can
ping to it using the IP address, there must be a problem with the DNS. DNS translates names into addresses.
Incorrect Answers:
A: If there was a problem with TCP/IP then you would not have been able to Telnet to web server.
C: A problem with FTP would not cause this problem.
D: A SNMP failure would not cause this problem.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 239-240.
QUESTION NO: 152
Given the network 192.141.27.0/28, identify the valid host addresses. (Choose three.)
A.
B.
C.
D.
E.
F.
192.141.27.33
192.141.27.112
192.141.27.119
192.141.27.126
192.141.27.175
192.141.27.208
Answer: A, C, D
Explanation: When you base your calculations on the network address and the provided subnet mask the valid
host addresses are 192.141.27.33, 192.141.27.119, and 192.141.27.126.
Incorrect Answers:
B, E and F: These are not valid host addresses.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233-236.
QUESTION NO: 153
To perform proper and efficient routing what must a router have?
A.
B.
C.
D.
Destination application of an incoming packet.
Number of other packets in a single flow of data.
Destination network address of an incoming packet.
Number of routers that know a path to the destination.
Answer: C
Leading the way in IT testing and certification tools, www.testking.com
- 98-
640 - 801
Explanation: A router needs the following information to route packets: destination address, information
sources, possible routes, best routes and routing information maintenance and verification.
Incorrect Answers:
A: A router does not route based on application.
B: The number of packet has no relevance to routing decisions.
D: The number of routers has no relevance to routing decisions.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 250-251.
Q.154
Exhibit:
I 154.128.16.0 [100/1100] via 30.100.192.4, 00:00: Ethernet 0
Your trainee studies the routing table on your Catalyst 5000 Switch. One specific entry draws the
attention of the trainee (see Exhibit). He is curious about the number 1100 and asks you how it is
calculated. You need to tell the trainee what is used in the calculation. (Select two.)
A.
B.
C.
D.
E.
F.
MTU
bandwidth
administrative distance
hop count
metric
delay
Answer: B, F
Explanation: The I indicates that this is an IGRP learned route. The 1100 is the metric of the route. IGRP
calculates the metric by adding together weighted values of different characteristics of the link to the network in
question. By default IGRP only use bandwidth and delay. IGRP can be configured to use reliability and
bandwidth divided by load as well.
Reference: IGRP Metric
http://www.cisco.com/warp/public/103/3.html
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 283 – 284.
Leading the way in IT testing and certification tools, www.testking.com
- 99-
640 - 801
QUESTION NO: 155
The network 131.107.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP
addresses. What would be the correct subnet mask to accomplish this division keeping the number of
subnets at the maximum?
Type the correct value in each box below.
Leading the way in IT testing and certification tools, www.testking.com
- 100-
640 - 801
Answer:
Explanation: In order for a Class B IP, such as 172.12.0.0, to have 458 IP available on each subnet then a
subnet mask of 255.255.254.0. This subnet mask provides for 126 subnets and 510 IPs.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 234.
QUESTION NO: 156
To configure a console password you type the following command what would normally follow this
command?
routers(config) #line console 0
Which operation is most likely to follow?
A.
B.
C.
D.
E.
Configure terminal type.
Enter protocol parameters for a serial line.
Create a password on the console terminal line.
Establish a terminal type 4 connection to a remote host.
Change from configuration mode to console privilege mode.
Answer: C
Explanation: If you want to prevent unauthorized people from logging into your router then you should use the
line console command. After this you will need to enter a password.
Incorrect Answers:
A: Line console 0 command is for configuring the console password not its type.
B: This command is used for console and not a serial line.
D: This command is not used to establish connection to a remote host.
E: To change from configuration mode to console privilege mode you would use CNTL+Z.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102-103.
QUESTION NO: 157
For what purpose does Frame Relay use DLCIs?
Leading the way in IT testing and certification tools, www.testking.com
- 101-
640 - 801
A.
B.
C.
D.
They determine the Frame Relay encapsulation type.
They identify the logical circuit between a local router and a Frame Relay WAN switch.
The represent the keepalives used to maintain the PVC in an active state.
They represent the physical address of the router attached to a Frame Relay network.
Answer: B
Explanation: DLCIs (Data Link Connection Identifiers) are used to identify permanent virtual connections.
DLCI is have number values ranging from 0 to 1023. Each PVC will have its own unique DLCI
Incorrect Answers:
A. DLCI does not determine the Frame Relay encapsulation type.
C. DLCI has nothing to do with keepalives.
D. The physical address is represented by the MAC address.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 412 – 414.
QUESTION NO: 158
Exhibit:
RouterTK#show ip route
Codes: C-connected,s-static,I-IGRP,R-RIP,M-Mobile,B-BGP
D-EIGRP,EIGRP external, O-OSPF,IA-OSPF inter area,
EI-OSPF external type 1,E2-OSPF external type 2, E-EGP,
i-IS-IS,L1-IS-IS level-1,L2-IS-IS level-2,*-candidate default,
U-per-user static route
Gateway of last resort is not set
R
C
R
R
C
C
R
R
R
R
R
192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
192.168.9.0/24 is directly connected, Serial 1
192.168.10.0/24 [120/7] via 192.168.9.1, 00:00:02, Serial1
192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
192.168.1.0/24 is directly connected, Ethernet0
192.168.2.0/24 is directly connected, Serial0
192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
192.168.4.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
192.168.6.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
192.168.7.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
Leading the way in IT testing and certification tools, www.testking.com
- 102-
640 - 801
Based on the output of the show ip route command which route will not be entered into a neighbor RIP
router?
A.
B.
C.
D.
R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
C 192.168.1.0/24 is directly connected, Ethernet0
R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
Answer: D
Explanation: This route has the lowest metric of those listed and as such will not be shared with the neighbor.
Incorrect Answers:
A: This has the best metric thus it will be shared.
B: This route has a better metric therefore it will be shared.
C: This is a directly connected network thus it will be shared.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 258-260.
QUESTION NO: 159
Which one of the following commands will allow you to configure a login password of “Cisco” that will be
used when you connect to the routers console port using the roll-over from your notebook?
A. Line vty 0
Log in
Password Cisco
B. Line console
Login
Password Cisco
C. Line login terminal
Password Cisco
D. Line console 0
Login
Password CISCO
E. Line console 0
Login
Password Cisco
Answer: E
Explanation: This is the proper procedure.
Leading the way in IT testing and certification tools, www.testking.com
- 103-
640 - 801
Incorrect Answers:
A: This set of commands are used to establish a login password for incoming Telnet sessions.
B: The first command is incomplete. The command should be line console 0.
C: There is no such command.
D: Whenever you are entry a password great care must be taken, as passwords are case sensitive. In this case
the password is supposed to be Cisco and not CISCO.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 101-103.
QUESTION NO: 160
Which WAN technology uses two Bearer (B) channels for data plus one Delta (D) channel for signaling
information?
A.
B.
C.
D.
ISDN
Frame Relay
ATM
FDDI
Answer: A
Explanation: ISDN BRI use two B channels and one D channel.
Incorrect Answers:
B, C. Frame Relay and ATM are both WAN encapsulation types.
D. FDDI is not a WAN technology.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387 and 373.
QUESTION NO: 161
You have issued the show ip route command and looking at the routing table entry, which of the
following are used by default in the calculation of the number 8675309? (Choose two.)
I 131.107.0.0 [100/8675309] via 192.168.16.3, 00:00:55, Ethernet0
A.
B.
C.
D.
E.
MTU
Bandwidth
Administrative distance
Hop count
Metric
Leading the way in IT testing and certification tools, www.testking.com
- 104-
640 - 801
F.
Delay
Answer: B, F
Explanation: By default, only bandwidth and delay are used by the IGRP metric. In this case the metric is
8675309.
Incorrect Answers:
A: MTU can be used but it is not a default.
C: Administrative distance is not used by IGRP.
D: Hop count is not used by IGRP.
E: 1200 is the metric value.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 283-284.
QUESTION NO: 162
You have typed the command clock on a Cisco router and pressed enter/return you received “%
INCOMPLETE COMMAND” response from a Cisco CLI. How can you receive help on this command?
A.
B.
C.
D.
Type “history” to review the prompt before the error.
Enter a question mark to display all console commands.
Type “help” followed by the command to see the command parameter.
Re enter the command followed by question mark to view key words.
Answer: D
Explanation: Whenever you have a problem with a command on a switch the quickest way to get help with the
command is to reenter the command and follow it with ?. When one gets the incomplete error there should be
no space in between the reentered command and the question mark
Incorrect Answers:
A: The history command will display the commands that were most recently entered. This will not provide
help with completing the command.
B: The ? will provide you with a listing of commands but not the parameters to complete the command.
C: A help command is not provided in IOS.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 76-78.
QUESTION NO: 163
Leading the way in IT testing and certification tools, www.testking.com
- 105-
640 - 801
Using a class C network address your company needs 5 subnets with at least 18 hosts per subnet. What
would the subnet mask be for this network?
Answer: 255.255.255.224
Explanation: We need 5 bits for the hosts (2^5-2=30 > 18). A 27 bit (32-5) network mask translates the 4th
octet to 224 (=11100000 binary). The network mask used should be 255.255.255.224.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 225 and 236.
QUESTION NO: 164
What does ISL trunking protocol use to identify the VLAN membership of a frame over trunked links?
A.
B.
C.
D.
E.
Frame filtering with VLAN ID
Frame tagging with VLAN ID
Frame filtering with trunk ID
Frame tagging with trunk ID
Frame filtering with VTP port ID
Answer: B
Explanation: One form of frame tagging that VLANs use is ISL tagging. The ISL tag includes the VLAN ID.
Incorrect Answers:
A, C and E: Frame filtering will not achieve the desired result.
D: Frame tagging does not include the trunk ID.
Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) page 175.
QUESTION NO: 165
To configure information into RAM on a router which three commands can be used? (Choose three)
A.
B.
C.
D.
E.
F.
Configure memory.
Configure terminal.
Configure overwrite.
Copy TFTP startup-Config.
Copy running-Config startup-Config.
Copy startup-Config running-Config.
Answer: A, B, F
Explanation: There are a number of commands that can be used to ensure information is configured into the
RAM of routers. The one that is used most commonly is the copy startup-config running-config command.
This command copies the configuration in the NVRAM into the RAM. The other two commands are configure
Leading the way in IT testing and certification tools, www.testking.com
- 106-
640 - 801
memory (an older command that can most often still be used) and configure terminal command. The configure
terminal command will open the command line from which changes to the RAM can be made.
Incorrect Answers:
C: This is not a valid command.
D and E: Both of these commands will make changes to the NVRAM and not the RAM directly.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 132-136.
QUESTION NO: 166
Using the address 192.64.10.0/28 how many subnets and hosts are available?
A.
B.
C.
D.
E.
62 networks and 2 hosts
6 networks and 30 hosts
8 networks and 32 hosts
16 networks and 16 hosts
14 networks and 14 hosts
Answer: E
Explanation: The 192.64.10.0/28 address is a Class C network. Class C network use a 24 bit subnet mask. We
have subnetted this network into 192.64.10.0/28. We use 4 bits for the network and 4 bits for the hosts.
We calculate the available subnets and the available hosts.
Number of networks: 2^4-2=14
Number of networks: 2^4-2=14
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 225 – 226.
QUESTION NO: 167
The network 131.107.4.0/24 was advertised by a neighbor router from RIP and IGRP. You also added a
static route to 131.107.4.0/24 manually. Which route would be used to forward traffic?
A.
B.
C.
D.
The IGRP route.
The static route.
The RIP route.
All three will load balance.
Answer: B
Leading the way in IT testing and certification tools, www.testking.com
- 107-
640 - 801
Explanation: If there are several routing sources providing common routing information, an administrative
distance value is used to rate the trustworthiness of each routing source. The lower the administrative distance
the more trustworthy it is. Static routes have a default distance of 1, IGRP has a default distance of 100, and
RIP has a default distance of 120.
Incorrect Answers:
A: IGRP does not have the lowest administrative distance.
C: RIP does not have the lowest administrative distance in fact it has the highest.
D: As the administrative distance differs there can be no load balancing.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 256-258.
QUESTION NO: 168
You just purchased a new router from Cisco and now are in the process of installing it. Upon boot up the
router enters the setup mode. You are prompted to enter the enable password and the enable secret
password. What is the difference between the two passwords?
A.
B.
C.
D.
The enable password is encrypted.
The enable secret password uses IPSec password authentication.
The enable secret password cannot be seen as clear text when viewing the configuration.
The enable secret password acts as a backup in case the enable password is compromised.
Answer: C
Explanation: The enable secret password is always encrypted and can’t be reverse decrypted for display.
Incorrect Answers:
A: The enable secret password is Always encrypted, the enable password is optionally encrypted.
B: IPSEC is not used for the password.
D: Enable secret password would act as a backup if the secret password was lost and forgotten, or for some
reason failed to be recognized.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 86
QUESTION NO: 169
What is the broadcast address for this network 192.57.78.0/27?
A.
B.
C.
192.57.78.33
192.57.78.64
192.57.78.87
Leading the way in IT testing and certification tools, www.testking.com
- 108-
640 - 801
D.
E.
F.
192.57.78.97
192.57.78.159
192.57.78.254
Answer: E
Explanation: We must decide which of the IP address is a valid broadcast address for any of the
192.57.78.0/27 subnets. We know that a broadcast address has all host bits set to 1. We simply convert the 4th
octet to binary and check if all five rightmost bits are 1.
159 decimal equals 10011111. This is a broadcast address for the 192.57.78.0/27 network.
Incorrect Answers
A: 33 decimal equals 00100001 binary. This is not a broadcast address in the 192.57.78.0/27 network.
B: 64 decimal equals 01000000 binary. This is not a broadcast address in the 192.57.78.0/27 network.
C: 87 decimal equals 01010111 binary. This is not a broadcast address in the 192.57.78.0/27 network.
D: 97 decimal equals 01100001 binary. This is not a broadcast address in the 192.57.78.0/27 network.
F: 254 decimal equals 11111110 binary. This is not a broadcast address in the 192.57.78.0/27 network.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 234.
QUESTION NO: 170
When installing the IGRP routing protocol which of the following is also required?
A.
B.
C.
D.
E.
Connected network numbers.
IP address mask.
Metric weights.
Autonomous system number.
Registered administrative id.
Answer: D
Explanation: IGRP requires an autonomous system number. The autonomous system number must be entered
directly after the router igrp command and before the network command.
Incorrect Answers:
A: The network command is used to identify the directly connected networks but this is done after the
autonomous system number.
B: The IP address mask is not required.
C: Metric weights are not required.
E: Registered administrative id is not required.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 285.
Leading the way in IT testing and certification tools, www.testking.com
- 109-
640 - 801
QUESTION NO: 171
Cisco has just released a new version of Cisco IOS and you would like to use this new version. You have
downloaded this IOS from Cisco’s web site and stored it on your TFTP server. Which of the following
commands should you use to copy this IOS to your router?
A.
B.
C.
D.
Copy flash ftp.
Copy ftp flash.
Copy flash tftp.
Copy tftp flash.
Answer: D
Explanation: Whenever you need to load a new copy of the IOS onto the router (because the old one is
damaged or you are upgrading you can download a copy of the new image from the tftp server. The proper
command is copy tftp flash.
Incorrect Answers:
A: IOS images are stored on a tftp server and not a ftp server. This is not a valid command.
B: IOS images are stored on a tftp server and not a ftp server. This is not a valid command.
C: The copy flash tftp command actually copies the IOS from the router to the tftp server. This is the exact
opposite of what the question asked.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138-140.
QUESTION NO: 172
What is the decimal and hexadecimal equivalent of the binary number 01010101?
Answer: Decimal
Hexadecimal
: 85
: 55
Explanation:
01010101 binary equals 85 (64+16+4+1) decimal.
0101 (leftmost 4 bits) equals 5 hexadecimal.
0101 (rightmost 4 bits) equals 5 hexadecimal.
01010101 binary equals 55 hexadecimal.
Note:
Other examples:
10101010 binary, equals 170 decimal and AA hexadecimal
Leading the way in IT testing and certification tools, www.testking.com
- 110-
640 - 801
10100101 binary, equals 165 decimal and A5 hexadecimal
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 227 – 231.
QUESTION NO: 173
Exhibit
#debug ppp authentication
ppp serial1:
ppp serial1:
ppp serial1:
ppp serial1:
ppp serial1:
ppp serial1:
ppp serial1:
ppp serial1:
send CHAP challenge id-47 t remote
CHAP challenge from TestK
CHAP response received from TestK
CHAP response id=47 received from TestK
Send CHAP success id=47 to remote
Remote passed CHAP authentication
Passed CHAP authentication
Passed CHAP authentication with remote
You issued the command debug ppp authentication what type of handshaking was used for this PPP
session?
A.
B.
C.
D.
One-way
Two-way
Three-way
No handshake required during authentication.
Answer: C
Explanation: We see that CHAP authentication is used. CHAP use three-way handshaking. We can also see the
three-way handshake if we examine the exhibit carefully (challenge, challenge, response, response, success).
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 378 – 383.
QUESTION NO: 174
Which of the following protocols is referred to as a hybrid routing protocol because it has features of
both distance-vector and link-state?
A.
B.
RIP
OSPF
Leading the way in IT testing and certification tools, www.testking.com
- 111-
640 - 801
C.
D.
EIGRP
IGRP
Answer: C
Explanation: EIGRP is an example of a balanced hybrid routing protocol. It uses distance vectors with more
accurate metrics to determine the best paths to destination networks. However, it differs from most distance
vector protocols as it also has some features of link-state protocols.
Incorrect Answers:
A and D: These are examples of distance vector routing protocol.
B: OSPF is an example of a link-state routing protocol.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 275-276 and 259.
QUESTION NO: 175
You would like to be able to make a backup copy of your IOS that is stored on your router. Which of the
following commands can you use so that the router will become a TFTP host so that it can save the IOS to
a TFTP server?
A.
B.
C.
D.
E.
Copy flash tftp
Config tftp server
Write network <router name>
Tftp-server system <filename>
Setup server tftp <systemname>
Answer: A
Explanation:. To copy a system image to a TFTP network server you use copy flash tftp command.
Note: Syntax
copy flash-url
tftp:[[[//location]/directory]/filename]
Copies the system image from Flash memory to a TFTP server. Specify the file location and filename as the
flash-url argument.
Reference: Cisco, Loading and Maintaining System Images
B: This is not a valid command.
C: This is not a valid command.
D: This is not a valid command.
Leading the way in IT testing and certification tools, www.testking.com
- 112-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138 – 139.
QUESTION NO: 176
Your access list has one statement;
access-list 131 permit ip any 131.107.7.0 0.0.0.255 eq tcp
What does the word “any” mean in the following extended access list statement?
A.
B.
C.
D.
E.
F.
Check any of the bits in the source address.
Permit any wildcard mask for the address.
Accept any source address.
Check any bit in the destination address.
Permit 255.255.255 0.0.0.0.
Accept any destination address.
Answer: C
Explanation: The permit keyword permits traffic. The any keyword implies that any address is allowed. Here
any is used as the source and source-wildcard parameter (see note below). Therefore the access-list permits any
source address.
Note: Syntax for an extended access list
access-list access-list-number {deny | permit} protocol source source-wildcard destination destinationwildcard [precedence precedence] [tos tos]
The access-list-number must be in the 100 to 199 or the 2000 to 2699 range.
Reference: Cisco, Command Reference
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 308 – 309.
QUESTION NO: 177
Routing Protocols use which OSI layer to determine the best path to a network?
A.
B.
C.
D.
E.
Data Link
Network
Physical
Presentation
Session
Leading the way in IT testing and certification tools, www.testking.com
- 113-
640 - 801
F. Transport
Answer: B
Explanation: Routing protocol work at the network layer (layer 3) in the OSI model.
Incorrect Answers:
A. Data Link layer is concern with a number of things (error detection for example) but not for route
determination.
C. Physical layer has nothing to do with route determination. It puts the bits onto the physical wire.
D. Presentation layer deals with how the data is presented and not how it is routed.
E. Session layer is responsible for establishing, managing, and ending communication.
F. Transport layer is responsible for the connection type and error correction.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 11 – 12.
QUESTION NO: 178
If we are using IPX as our routed protocol and our network has an existing Novell Server with an IPX
network address of 4ad1 and we are connecting a Cisco routers Ethernet port to the same segment. The
MAC address of the Ethernet port is 021f.2cfe.8322. What will the complete IPX address be for the
Ethernet port.
Enter the IPX address for the port.
Answer:
Explanation:
An IPX address is composed of two parts: the network number and the node number. For IPX the node number
is usually obtain from MAC address of the network interface. In this case the network number is 4ad1 and the
node number/MAC address is 021f.2cfe.8322. Thus the ipx address is 4ad1.021f.2cfe.8322.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332-333.
Leading the way in IT testing and certification tools, www.testking.com
- 114-
640 - 801
QUESTION NO: 179
Which two of the following were created to avoid routing loops with distance vector routing protocols?
(Choose two)
A.
B.
C.
D.
Split horizon.
Route Poison.
Area Hierarchies.
Link State Algorithms.
Answer: A, B
Explanation: There are a number of ways of reducing the chance of routing loops. One way is split horizon.
The split horizon rule is that it is not useful to send information about a route back in the direction from which
the original update came. Another way is route poisoning. Route poisoning attempts to eliminate routing loops
caused by inconsistent updates. With this technique, the router sets a table entry that keeps the network state
consistent while other routers gradually converge correctly on the topology change.
Incorrect Answers:
C: Hierarchical areas make for a more efficient use of address but will not prevent loops.
D: Link State is a different method than Vector Routing, they are not combined for loop elimination.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 266-270.
QUESTION NO: 180
The Defense Advanced Research Projects Agency (DAPRA) developed the TCP/IP suite of protocols.
Which layer in that TCP/IP model corresponds to the OSI model’s network layer?
A.
B.
C.
D.
E.
Application
Transport
Internet
Network
Physical
Answer: C
Explanation: The ARPA model Internet layer corresponds to the network layer of the OSI model.
Reference: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ap1.htm
QUESTION NO: 181
Exhibit
Leading the way in IT testing and certification tools, www.testking.com
- 115-
640 - 801
RouterTK1(config)#router igrp 200
RouterTK1(config-router)#network
192.168.3.0
RouterTK1(config-router)#network
192.168.4.0
RouterTK1(config-router)#network
192.168.5.0
RouterTK1(config-router)#network
172.16.0.0
RouterTK2(config)#router igrp 300
RouterTK2(config-router)#network
192.168.3.0
RouterTK2(config-router)#network
192.168.6.0
RouterTK2(config-router)#network
192.168.7.0
Examine the Routing tables of RouterTK1 and RouterTK2 above after the next IGRP update is sent
from RouterTK1 to RouterTK2 what networks will show up in RouterTK2’s route table.
A.
B.
C.
D.
E.
192.168.3.0
192.168.4.0
192.168.5.0
192.168.6.0
192.168.7.0
172.16.0.0
192.168.3.0
192.168.6.0
192.168.7.0
192.168.3.0
192.168.4.0
192.168.5.0
192.168.6.0
192.168.7.0
172.16.0.0
192.168.3.0
192.168.4.0
192.168.5.0
Answer: B
Explanation: Routers must have same AS number. Only the networks defined at RouterTK2 will be shown. No
networks will be copied from RouterTK1.
Leading the way in IT testing and certification tools, www.testking.com
- 116-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 282 – 286.
QUESTION NO: 182
Your router stores routing tables, ARP cache, and packet buffers where are these stored?
A.
B.
C.
D.
ROM
RAM
NVRAM
Flash memory
Answer: B
Explanation: RAM (random access memory) is used by all computers to store information. Cisco routers use
RAM to store packet buffers, routing tables and ARP cache.
Incorrect Answers:
A: ROM are chips that are used to help boot a system, and are changed only be replacing the chips themselves.
B: NVRAM is used to save long-term items that don’t change much, such as the startup configuration.
D: Flash is used to save copies of the IOS code.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 125-126.
QUESTION NO: 183
You are the network administrator of the Sonic Water Company. One of your users is unable to reach
the company’s web site that is hosted at a remote site. Looking at the personal computer you discover the
following information:
Local PC – 10.0.3.35/24
Default gateway – 10.0.3.1
Remote server – 10.0.5.250/240
You then conduct the following tests from the offending local PC:
ping 127.0.0.1 – successful
ping 10.0.3.35 – successful
ping 10.0.3.1 – unsuccessful
ping 10.0.5.250 – unsuccessful
Which of the following problems would create the test results listed above?
A.
B.
TCP/IP not correctly installed.
Local physical layer problem.
Leading the way in IT testing and certification tools, www.testking.com
- 117-
640 - 801
C.
D.
Local NIC not functioning.
Remote physical layer problem.
Answer: B
Explanation: The client was only able to ping itself, not the default gateway or the remote server. A local
physical layer problem, for example a faulty patch cable, could explain the results above.
Incorrect Answers:
A: You would not be able to ping anything if TCP/IP was not correctly installed.
C: You would not be able to ping anything of the local NIC was not functioning.
D: A remote physical layer problem would not prevent the local PC from pinging the gateway.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 124 – 125.
QUESTION NO: 184
Which are the following are considered ISDN benefits? (Choose four)
A. Full time connectivity across the ISDN supported by Cisco IOS routing using dial on demand routing
DDR.
B. Small office and home office sites can be economically supported with ISDN basic rate interface BRI
services.
C. ISDN replaces signaling system ss7 in the public switch telephone network PSTN backbone.
D. ISDN can be used as a backup service for a lease line connection between the remote and central
offices.
E. Modem racking and cabling can be eliminated by integration with digital modem cards on Cisco IOS
network access servers NAS.
Answer: A, B, D, E
Explanation: When ISDN is implemented there are great deals of benefits. Among these benefits are higher
speeds, ability to use DDR, reduce need for equipment, economic to deploy in medium size companies, and the
ability to use other mediums as backup
Incorrect Answers:
C: ISDN can be used on the existing telephone network without the need of signaling changes.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387-400.
Leading the way in IT testing and certification tools, www.testking.com
- 118-
640 - 801
QUESTION NO: 185
You are the network administrator of the ABC Tire Company. You receive a call from a user who is
unable to reach a server at a remote server 10.0.5.250/240. Using VNC (Virtual Network Computing)
you connect to the user’s computer and discover the following information:
Local PC – 10.0.3.35/24
Default gateway – 10.0.3.1
Remote server – 10.0.5.250/24
You then conduct the following tests from the user’s PC:
ping 127.0.0.1 – successful
ping 10.0.3.35 – successful
ping 10.0.3.1 – successful
ping 10.0.5.250 – unsuccessful
Which of the following problems would create the test results listed above?
A.
B.
C.
D.
TCP/IP not correctly installed.
Local physical layer problem.
Local NIC not functioning.
Remote physical layer problem.
Answer: D
Explanation: As the ping of the remote server was unsuccessful there is a problem with the remote physical
layer problem.
Incorrect Answers:
A: You would not be able to ping anything if TCP/IP was not correctly installed.
B: You would not be able to ping the local IPs if there was a problem with the local physical layer.
C: You would not be able to ping anything of the local NIC was not functioning.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 124.
QUESTION NO: 186
Gail was working on your Cisco router while you were at lunch. Which command will display the last
commands Gail entered?
A. Control header.
B. Show buffer.
C. Show history.
Leading the way in IT testing and certification tools, www.testking.com
- 119-
640 - 801
D. Show history buffer.
Answer: C
Explanation: The show history command will show of the commands that are stored in the buffer.
Incorrect Answers:
A, B, D: Are not valid IOS commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 94.
QUESTION NO: 187
What is the bit pattern for the first octet of a class B network address 129.107.0.0?
A.
B.
C.
D.
E.
0xxxxxxx
10xxxxxx
110xxxxx
1110xxxx
11110xxx
Answer: B
Explanation: Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet.
129 binary is 10000001 and 191 binary is 10111111.
Incorrect Answers:
A. Require a 1 in the first space of the octet to be a Class B address.
B, C, D, E. Are to large to be a Class B addresses.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 221 – 223.
QUESTION NO: 188
Which command will provide you with information regarding the Layer 3 IP address of a directly
connected neighbor?
A.
B.
C.
Show ip interface
Show cdb neighbors
Show cdp neighbors detail
Leading the way in IT testing and certification tools, www.testking.com
- 120-
640 - 801
D.
E.
F.
Show ip route
Show ip link status
Telnet
Answer: C
Explanation: The show cdp neighbors detail command displays information about neighboring devices. The
information displayed includes Layer 3 protocol information and Neighbor Device ID. The show cdp entry
command also results in the same information as the show cdp neighbors detail command.
Incorrect Answers:
A: The show ip interface command display IP interface information and indicates whether any access list are
set for a specific interface.
B: The show cdp neighbors command displays such information as Neighbor Device ID and Local Interface
but nothing on Layer 3 protocols.
D: The show ip route command displays the contents of the ip routing table.
E: This is not a valid command.
F: The telnet command is used to establish a telnet command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 116-119, 324-324, 280,
and 120.
QUESTION NO: 189
How many bits are used for a MAC address and how is number expressed?
A.
B.
C.
D.
E.
24 bits expression as a decimal number.
24 bits expression as a hexadecimal number.
36 bits expression as a binary number.
48 bits expression as a decimal number.
48 bits expression as a hexadecimal number.
Answer: E
Explanation:
The MAC address is a 48 bit address expressed as 12 hexadecimal digits. The first 24 bits or 6 hexadecimal
digits of the MAC address contain a manufactures identification or vendor code (also known as the
Organizationally Unique Identifier – OUI). To ensure uniqueness, the IEEE administers OUIs. The last 24 bits
or 6 hexadecimal digits are administered by each vendor and often represent the interface serial number.
Incorrect Answers:
A, B, and C: MAC addresses are 48 bits that are expressed as a hexadecimal number.
D: MAC addresses are expressed as hexadecimal, not decimal.
Leading the way in IT testing and certification tools, www.testking.com
- 121-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 19-20.
QUESTION NO: 190
User Datagram Protocol is a Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is
defined in RFC 768. Which of the following are generally considered to be characteristics of UDP? (Choose
two.)
A.
B.
C.
D.
Non-reliable.
Reliable.
Less bandwidth-intensive.
Handshaking.
Answer: A, C:
Explanation: Connectionless protocols, for example UDP, do not establish a connection between the
communicating partners and do not use acknowledgements. This makes connectionless protocols non-reliable.
However, this also makes them less bandwidth intensive since they carry very little overhead data.
Incorrect Answers
B: Connection-oriented protocols are reliable.
D: Connectionless protocols do not establish a connection so they have no use of handshaking.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 206 – 208.
QUESTION NO: 191
You have been called in to fix a router that is having security issues. The router has an access list
configured on it but the list does not seem to be working. What command can you use to see if the access
list has been applied to an interface?
A.
B.
C.
D.
E.
Show access-list.
Show ip route.
Show ip interface.
Show interface.
Show interface list.
Answer: C
Leading the way in IT testing and certification tools, www.testking.com
- 122-
640 - 801
Explanation: The show ip interface command display IP interface information and indicates whether any
access list are set for a specific interface and it also indicates if the access list is inbound or outbound.
Incorrect Answers:
A: This is not a valid command.
B: The show ip route command displays the contents of the ip routing table.
D: The show interface command displays the serial interface configuration.
F: This is not a valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325, 280, and 106
QUESTION NO: 192
Exhibit:
You are configuring an IP printer that is connected to your network. You would like to use the last IP
address that is on your subnet for this printer. You run ipconfig on your personal computer and the
exhibit shows your IP address and its subnet mask. Based on your IP address and subnet mask what
would the last possible address be on your subnet?
A.
B.
C.
D.
E.
172.20.7.255
172.20.7.197
172.20.7.190
172.20.7.129
172.20.255.255
Answer: C
Explanation: In order to determine the last available host you will need to draw a vertical line just after the last
contiguous subnet mask 1 bit. On the next line write the address that it to the left of the line and then to the
Leading the way in IT testing and certification tools, www.testking.com
- 123-
640 - 801
right of the line place all 1s in the remaining spaces until the last free space. Place a 0 in this place. Convert the
binary to dotted-decimal and this will be the last available host.
In this case the binary would be:
10101100
00010100
00000111
10 111110
This converts to
172.20.7.190
Incorrect Answers:
A: This is the IP that would be used to send a broadcast to all host of the 172.20.7 subnet.
B: With the facts of this question this is not a valid IP.
D: This is the IP address used to send a message to all hosts on the 172.20 network.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 232-234.
QUESTION NO: 193
Which of the following devices operate at Data Link layer of the OSI model? (Choose two)
A.
B.
C.
D.
E.
F.
Router
SMTP server
Transceiver
Switch
Bridge
Hub
Answer: D, E
Explanation: Switches and bridges operate the Data Link layer, layer 2, of the OSI model.
Incorrect Answers
A: A router operates at the network layer, layer 3.
B: An SMTP server operates at the upper layers of the OSI model.
C: A transceiver works at the physical layer, layer 1.
F: A hub operates at the physical layer, layer 1.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 14 – 25.
Leading the way in IT testing and certification tools, www.testking.com
- 124-
640 - 801
QUESTION NO: 194
You have just created an IP extended access list and now wish to apply this to an interface. Which
command will allow you to apply the list to an interface?
A.
B.
C.
D.
E.
Permit access-list 101 out
Ip access-group 101 out
Apply access-list 101 out
Access-class 101 out
Ip access-list e0 out
Answer: B
Explanation: In order for an access list to be activated the ip-access group command must be used. This
command activates the ip access list on an interface. Before you use the ip-access group command you must
take care to ensure that you have configured an access list. If you do not the result will be permit any.
Incorrect Answers:
A, C-E: Are not valid commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 305.
QUESTION NO: 195
A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal
and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a
password for the first 5 virtual lines, password for console, and an encrypted password for privileged
mode.
Configure the passwords on the Patton router according to the table below.
Type
Telnet
Console
Privileged
x
x
x
x
x
Password
apple
pear
peach
The routers are named Marshal, Sherman, and Patton.
The network is subnetted with a mask 255.255.255.224
The routing protocol is RIP
The serial 0 interface is provided with clocking.
The chart below includes the IP addresses.
Leading the way in IT testing and certification tools, www.testking.com
- 125-
640 - 801
Lab 1
Name : Marshal
E0 : 192.168.12.33
S0 : 192.168.12.65
Lab 2
Name : Patton
E0 : 192.168.12.97
S0 : 192.168.12.129
S1 : 192.168.12.68
Lab 3
Name : Sherman
E0 : 192.168.12.97
S0 : 192.168.12.129
S1 : 192.168.12.68
Start by clicking on host that is connected to the router you want to configure.
Leading the way in IT testing and certification tools, www.testking.com
- 126-
640 - 801
Answer Lab 2:
<Click Host4, which is connected to Router Lab 2>
enable
config terminal
hostname Patton
enable secret peach
line con 0
login
password pear
line vty 0 4
login
password apple
^Z
copy running-config startup-config
Explanation:
We should configure the passwords, not any IP configuration on the interfaces.
First we click on the Lab2 router.
Router Con0 is now available
Press RETURN to get started.
! We press enter.
Router>enable
! We enter enable mode
! We enter terminal configuration mode
Router#config terminal
Enter configuration commands, one per line.
Router(config)#hostname Patton
Patton(config)#enable secret peach
Patton(config)#line con 0
Patton(config-line)#login
Patton(config-line)#password pear
Patton(config-line)#line vty 0 4
Patton(config-line)#login
Patton(config-line)#password apple
End with CNTL/Z.
! We change the host name. This is however not required.
! Set the secret password.
! Configure the terminal connection
! Specify the terminal connection password
! Configure the telnet connections. Numbered 0, 1, 2, 3, 4.
! Specify password
Patton(config)#^Z
! Exit from
%SYS-5-CONFIG_I: Configured from console by console
Patton#copy running-config startup-config
configuration mode.
! Save the running config to NVRAM.
Destination filename [startup-config]?
! Confirm default selections
Warning: Attempting to overwrite an NVRAM configuration
previously written by a different version of the system image.
Overwrite the previous NVRAM configuration?[confirm]
Leading the way in IT testing and certification tools, www.testking.com
- 127-
640 - 801
Building configuration...
[OK]
Patton#
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102 – 103.
QUESTION NO: 196
Which one of the following characteristics about Ethernet Switches is true?
A. Symmetric switching allows connection between ports of unlike bandwidth and does not require
memory buffering.
B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected on a
symmetric switch.
C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store and
forward is better for error detection.
D. The cut-trough method of switching is faster because the switch forwards the packet to the destination
as soon as it reads the destination address.
Answer: D
Explanation: In cut-through mode, the switch checks the destination address (DA) as soon as the header is
received and immediately begins forwarding the frame. Depending on the network transport protocol being
used (connection or connectionless orientate), there is a significant decrease in latency from input port to output
port. The delay in cut-through switching remains constant regardless of the size of the frame , because this
switching mode starts to forward the frame as soon as the switch reads the DA.
Incorrect Answers:
A: Symmetric switching provides evenly distributed bandwidth to each port, while asymmetric switching
provides unlike, or unequal, bandwidth between some ports.
B: This is not a true statement.
C: Store-and-forward switching increases latency.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163.
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/lanswtch.htm
QUESTION NO: 197
To configure RouterTK for operation in a Frame Relay environment, one of the recommended items to
configure is the IGRP metric for the speed of the link. What command should you use?
A. RouterTK(config)# IGRP metric 36k
Leading the way in IT testing and certification tools, www.testking.com
- 128-
640 - 801
B. RouterTK(config)# bandwidth 36
C. RouterTK(config-if)# metric 36k
D. RouterTK(config-if)# bandwidth 36
Answer: D
Explanation: The bandwidth command overrides the default bandwidth. The bandwidth has no effect on the
actual speed of the line. Instead, it is used to compute routing metrics ad the load of the link. Bandwidth is
expressed in Kilobits. It is specified during interface configuration.
Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 104-106.
Incorrect Answers
A: You cannot use 36k in this statement. You have to supply a numerical value. Furthermore, you have to be in
interface configuration mode.
B: You must be in interface configuration mode to define the bandwidth. The prompt must be
RouterTK(config-if)#.
C: You cannot use 36k in this statement. You have to supply a numerical value.
QUESTION NO: 198
Exhibit
TestK#show access-list
Extended IP access list 135
deny
tcp any 131.107.0.0 0.0.255.255
eq 53
deny
tcp any any eq telnet
TestK#show ip interface e0
Ethernet0 is up, line protocol is up
Internet address is 172.17.9.60/24
Broad address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is enabled
Outgoing access list is 135
Inbound access list is not set
Proxy ARP is enabled
Security level is default
Split horizon is enabled
Rest of configuration omitted.
Leading the way in IT testing and certification tools, www.testking.com
- 129-
640 - 801
You have created an Extended IP access list. Now you apply the access list to Ethernet 0.
What is the result of this action?
A.
B.
C.
D.
E.
Only e-mail and telnet access will be permitted out of Ethernet 0.
All hosts on the 172.30.24.64 network will be permitted e-mail and telnet access.
All TCP protocols will be permitted out of Ethernet 0 except e-mail and telnet.
All IP traffic out of Ethernet 0 will be denied.
The access-list is numbered incorrectly and will fail.
Answer: D
Explanation: The exhibit is showing an extended IP access-list configuration. For this access list to have the
desired effect it will require a permit statement at the end as there is an implicit deny statement otherwise. The
statement should be: access-list 105 permit ip any any.
Incorrect Answers:
A, B and C: All traffic out will be denied without a permit statement.
E: The access-list is correctly numbered.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 310-320.
QUESTION NO: 199
Which of the following ranges are used for IPX standard access lists?
A.
B.
C.
D.
100 - 199
600 - 699
800 - 899
1000 - 1099
Answer: C
Explanation:
Access list exist for IPX traffic, just like they do with IP traffic. Like IP there are ranges for IPX access list.
The IPX access list ranges are: 800 to 899 – standard access lists, 900 to 999 – extended access lists, and 1000
to 1099 – SAP filter access lists.
Incorrect Answers:
A: 100-199 is the range for an extended ip access address.
Leading the way in IT testing and certification tools, www.testking.com
- 130-
640 - 801
C: This is not a defined access list range.
D: The range 1000-1099 is for SAP filter access list.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 350-351 and 305.
QUESTION NO: 200
There are three major groups of routing protocols: distance-vector protocols, link-state protocols, and
hybrid protocols. Select two valid statements regarding routing protocols? (Choose two)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Link state protocols send the entire routing table to all routers in the network.
C. Distance vector protocols send updates about directory connected neighbors to all networks listed in
the routing table.
D. Link state protocols send updates containing the state of their own links to all other routers on the
network.
Answer: A, D
Explanation: Distance vector protocols send their entire routing table to adjacent routers.
Link-state protocols only send link-state updates to all routers on their network (or autonomous system).
Incorrect Answers:
B. Link state protocols do not send their entire routing table rather only updates on their own links.
C. Distance vector protocols in fact send their entire routing tables.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 259 – 260 and 274 – 275.
QUESTION NO: 201
Consider a standard half- duplex Ethernet circuitry. What is true concerning this circuitry?
A.
B.
C.
D.
E.
It is alternate one-way communication.
The receive (RX) is wired directly to the transmit (TX) of the remote station.
The receive (TX) is wired directly to the receive (RX) of the remote station.
Collisions are not possible.
Both stations can transmit simultaneously.
Answer: A
Leading the way in IT testing and certification tools, www.testking.com
- 131-
640 - 801
Explanation: Half-duplex is a form of one-way communication. Traffic can flow in both directions, but only
alteringing, not simultaneously in both directions..
Incorrect Answers:
B, C: This describes a possibly wiring of full-duplex circuitry.
D: Collisions are possible on Half-duplex circuitry. CSMA/CD must be used to detect collisions.
Collisions are not possibly on Full-duplex circuitry.
E: Full-duplex stations are required for simultaneous transmission.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 163-165.
QUESTION NO: 202
You are configuring R3 so that it can communicate with R2 on Ethernet port e1. What encapsulation
should you use on e1 to setup this IPX network?
A.
B.
C.
D.
SAP
HDLC
ARPA
Novell-Ether
Answer: D
Leading the way in IT testing and certification tools, www.testking.com
- 132-
640 - 801
Explanation: In order for both routers to communicate they must be using the same type of encapsulation.
Therefore e1 of router R3 must have novell-ether encapsulation.
Incorrect Answers:
A, B, and C: The two routers must have the same encapsulation type to communicate properly thus these
encapsulation types could not be used.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 334-337.
QUESTION NO: 203
A Web consulting business has three routers in their systems. These router, Venus, Afrodite, and Zeus,
are placed in separate local area networks. The Venus and Afrodite routers need no further
configuration. The configuration of Zeus is also complete, except the password for the first 5 virtual lines,
the password for the console, and the password for the privileged mode. The CIO has told you that the
privileged password must be encrypted to achieve highest possible security.
Your task is to configure the passwords on the Zeus router. The passwords to configured are:
Type
Password
Telnet
Testking
Console andorra
Lab 1
Name: Zeus
E0 : 213.197.14.189
SO : 213.197.14.211
Lab 2
Name: Venus
E0 : 213.197.14.23
SO : 213.197.14.37
Lab 3
Name: Afrodite
E0 : 213.197.14.73
SO : 213.197.14.113
S1 : 213.197.14.120
Leading the way in IT testing and certification tools, www.testking.com
- 133-
640 - 801
Start by clicking on host that is connected to the router you want to configure.
Simulation answer:
Lab 1
<Click on Host2, which is connected to the Lab 1 router>
enable
config terminal
enable secret whatsoever
line vty 0 4
login
password Testking
line console 0
login
password andorra
^z
copy running-config startup-config
Explanation:
For the task you don't need to change anything but passwords and we only have to perform Lab 1.
Router Con0 is now available
Press RETURN to get started.
! We press enter.
Zeus>enable
! Enter enable mode for configuration.
Leading the way in IT testing and certification tools, www.testking.com
- 134-
640 - 801
Zeus#config terminal
Enter configuration commands, one per line.
Zeus(config)#enable secret whatsoever
Zeus(config)#line vty 0 4
End with CNTL/Z.
! Define an enable password (choose something).
! Make sure that you use the secret keyword.
! We configure the telnet keyword on all 5 telnet
! connections: 0, 1, 2, 3, 4
Zeus(config-line)#login
Zeus(config-line)#password Testking
Zeus(config-line)#line console 0
Zeus(config-line)#login
Zeus(config-line)#password Andorra
! Specify the telnet password.
! We configure the console password
! We specify the console password.
exit configuration mode with Ctrl-Z.
Zeus(config-line)#^Z
! We
%SYS-5-CONFIG_I: Configured from console by console
Zeus#copy running-config startup-config
! We copy the running configuration to NVRAM.
! We accept the default target location (press enter)
Destination filename [startup-config]?
Warning: Attempting to overwrite an NVRAM configuration
previously written by a different version of the system image.
Overwrite the previous NVRAM configuration?[confirm]
Building configuration...
! We confirm the overwrite (press enter)
[OK]
Zeus#
Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 28-30.
QUESTION NO: 204
You just purchased a brand new Cisco 2621 Router and now would like to configure password protection
on this router. Which of the following are true regarding passwords on this router?
A.
B.
C.
D.
E.
All passwords can be encrypted.
All passwords can be entered using the set-up dialogue.
A password can be set before a user can enter the privileged mode.
A password can be set for individual lines.
TACACS or Radius password authentication can be used.
Answer: A, C, D, E
Explanation: In general enabled passwords are not encrypted but with the service password-encryption
command all passwords are encrypted. Passwords are entered in the privileged mode and they can be set for
individual lines. In addition TACAS or Radius password authentication can also be used.
Incorrect Answers:
B: The set-up dialogue box can only be used to enter some passwords.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 102-103.
Leading the way in IT testing and certification tools, www.testking.com
- 135-
640 - 801
QUESTION NO: 205
You want to make sure that access-list you just created does not conflict with an existing access-list.
Which router command allows you to view all of the access-lists created and the contents of all access
lists?
A.
B.
C.
D.
Router# show interface.
Router> show IP interface.
Router# show access-lists.
Router> show all access list.
Answer: C
Explanation: The show access-lists command will display the contents of all access lists. C is the closest to this
command.
Incorrect Answers:
A: Only access lists bound to that interface would be displayed
B: Show ip interface command must be given in the privilege EXEC mode.
D: This is not a valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325.
QUESTION NO: 206
Which one of the following statements about an Ethernet LAN is true?
A.
B.
C.
D.
The advantage of a full duplex is the ability to transmit data over Mbase2 cable.
Full duplex Ethernet requires a point-to-point connection when only two nodes are present.
Ethernet switches can use full duplex mode to connect multiple nodes to a single port of a switch.
Half duplex is a cut through packet processing method that is very fast with little error correction, full
duplex is store and forward method that is slower but has better error correction.
Answer: B
Explanation: Full duplex always requires there to be a point to point connection.
Incorrect Answers:
A: Full duplex is done over CAT 5 cable.
C: Full duplex can only be done if one node is attached to a particular port.
D: Half/Full duplex is independent of cut-through and/or store and forward.
Leading the way in IT testing and certification tools, www.testking.com
- 136-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 165.
QUESTION NO: 207
Assuming that our network is using an older version of UNIX what is the maximum number of subnets
that can be assigned to networks when using the address 131.107.0.0 with a subnet mask of
255.255.240.0?
A.
B.
C.
D.
E.
16
32
30
14
It is an invalid subnet mask for the Network
Answer: D
Explanation: 131.107.0.0 is a Class B IP address. With a subnet mask of 255.255.240.0 they maximum
number of subnets are 14 and 4094 hosts.
Incorrect Answers:
A: 16 is not a valid maximum number of subnets for a Class B IP address.
B: 32 is not a valid maximum number of subnets for a Class B IP address.
D: For a maximum number of subnets to be 30 the subnet mask would need to be 255.255.248.0.
E: 255.255.240.0 is a valid subnet mask.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233 – 235.
QUESTION NO: 208
AJ has just created an IP access-list and you will like to see if he has applied this access-list to an
interface. Which one of following commands will allow you to see if an access-list has been applied to an
interface?
A.
B.
C.
D.
Router# show ip interface
Router> show access-list
Router# show ip access-list
Router> show interface ip access-list
Answer: A
Explanation: The show ip interface command displays IP interface information and indicates whether any
access lists are set for a specific interface.
Leading the way in IT testing and certification tools, www.testking.com
- 137-
640 - 801
Incorrect Answers:
B: The show access-lists command must be given in the privileged EXEC mode.
C: Even if the proper command was used the end result would the displaying of all IP access lists running in
the router, not for a particular interface.
D: This is not a valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325.
QUESTION NO: 209
You have just been hired to setup a new company network. This company will be using an accounting
package that requires multiple hosts. These hosts are the accountants and they must be able to support
data transfer between each other at a rate of 10 Mbps. The company will also have a file server that is
used for the other employees of the company who just use word processing applications that use less than
3 Mbps to transfer files to server.
What is your economical recommendation?
A. That the existing 10BaseT hub be replaced with 100BaseT hub to improve overall performance.
B. That a router can separate the testing application from the rest of the network thus allowing the testing
application more bandwidth.
C. That the switch be installed so that enterprise server can be provided a 100 Mbps port and each of the
testing application hosts can be given dedicated 10 Mbps ports.
D. That a bridge be placed between the enterprise server and all other users with the exception of the
testing application.
Answer: C
Explanation: With buffering in the switch, the enterprise server can serve multiple hosts at almost full capacity,
since the 100Mbps port will be faster than the rest of the users totaled as a whole.
Incorrect Answers:
A: This would require all NICs to be upgraded, and result in a large collision domain with possible poor
performance.
B: A router would become a bottleneck, and not allow efficient performance.
D: A bridge would be a bottleneck, and not be able to provide the necessary performance and throughput.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 31-38.
QUESTION NO: 210
You would like to use Ethernet 100BaseTx in your network. What is the maximum cable length?
Leading the way in IT testing and certification tools, www.testking.com
- 138-
640 - 801
A.
B.
C.
D.
10 m
50 m
100 m
1000 m
Answer: C
Explanation: The 100BaseTx maximum cable length is 100 m.
Incorrect Answers:
A and B: Neither 10 m nor 50 m are maximum cable lengths.
F: This is the maximum length of fiber optic.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 45-46.
QUESTION NO: 211
One of the security mechanisms used in securing a router is access-lists. You have decided to use
Standard IP access lists in your company which of the following is an example of a Standard IP access
lists?
A.
B.
C.
D.
Access-list standard 172.16.4.13
Access-list 2 deny 172.16.4.13 0.0.0.0
Access-list 101 deny 172.16.4.13 0.0.0.0
Access-list 199 deny 172.16.4.13 255.255.255.255
Answer: B
Explanation: A standard access list is in the range of 1-99 and the proper command syntax is access-list
{access-list number} {permit or deny} {test conditions}. In this case the test condition is an ip address.
Incorrect Answers:
A: The access command must contain a number and whether the action is to be permitted or denied.
C: Is an extended access-list number and not a standard number.
D: 199 is also an extended access-list number and not a standard number.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304-305.
QUESTION NO: 212
Using your protocol analyzer you have determined your network is very congested. Currently all the
devices are connected through a hub. Which solution would best decrease congestion on the network?
Leading the way in IT testing and certification tools, www.testking.com
- 139-
640 - 801
A.
B.
C.
D.
Add a second hub.
Replace the hub with a router.
Replace the hub with a switch.
Replace the hub with a repeater.
Answer: C
Explanation: A switch would eliminate the collision domains and thus increasing speed.
A router would break each segment into their own collision domains and broadcast domains. This would
reduce network congestion the most.
Incorrect Answers:
A: There will still be one collision domain which would mean that the network would still be congested.
B: A router can be used to segment the network into subnets. However, this would require further adjustments:
the subnets must be created. Furthermore, a switch is faster than a router and a single hub needs to be replaced.
D: A repeater does not affect congestion.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 20-27.
QUESTION NO: 213
What is the maximum cable distance for 100BaseT?
A.
B.
C.
D.
E.
607 ft
25 meters
1000 ft
100 meters
185 meters
Answer: D
Explanation: A 100BaseT cable cannot be any longer than 100 meters.
Incorrect Answers:
A, B, C, & E: Are wrong.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 45.
QUESTION NO: 214
Which of the following are true about debug output?
Leading the way in IT testing and certification tools, www.testking.com
- 140-
640 - 801
A.
B.
C.
D.
E.
The default is to send debug output to the console screen.
To view debug output from a telnet session, the "terminal monitor" command must be used.
If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed
with the "show log" command.
If the "no logging console" command were configured, output would not be sent to the console.
All of the above.
Answer: E
Explanation: Debug is one of the most powerful diagnostics tools to troubleshoot a router. By default the
output goes to the console screen. User might or might not be interested in seeing the messages as they occur.
The console port always receives syslog messages. When a user telnets to the router, however, no syslog
messages are seen unless the user issues the terminal monitor command. Another alternative for viewing syslog
messages is to have the IOS record the syslog messages in a buffer in RAM, and then use the show logging
command to display the messages. For telnet users, having the messages buffered using the global config
command logging buffered is particularly useful. The no console logging command were configured, output
would be sent to a telnet session.
Incorrect Answers:
A, B, C and D: Are partially correct individually.
Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 33.
QUESTION NO: 215
Your company has decided to pay for one ISDN B channel to your to house so that you can do some
technical support from home. What is the bandwidth capacity of a single ISDN B channel?
A.
B.
C.
D.
E.
16 Kbps
64 Kbps
128 Kbps
512 Kbps
1.54 Mbps
Answer: B
Explanation:
The Bearer (B) channel transfer rate is 64 kbps.
Incorrect Answers:
A: Is the Delta (D) channel that has a transfer rate of 16 kbps.
C, D and E: The ISDN B channel only operates at a maximum of 64 kbps.
Leading the way in IT testing and certification tools, www.testking.com
- 141-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387-388.
QUESTION NO: 216
You are using two back-to-back serial cables in your test lab between two Cisco routers. You have
determined that one of these routers is the DCE by using the show controllers command. You now need
to configure the clock rate to 64 Kbps on serial0 which one of the following commands will allow you to
do this?
A.
B.
C.
D.
E.
F.
G.
Clockrate 64
Clock rate 64
Clockrate 64000
Clock rate 64000
Set clockrate 64
Serial 10 clockrate 64
Clock rate 64000 serial 10
Answer: D
Explanation: The proper syntax to set the clock rate is clock rate {speed}. Please remember the speed cannot
be abbreviated.
Incorrect Answers:
A and C: Clock rate must be separated.
B: The speed cannot be abbreviated and must be 64000.
E, F and G: This are not valid commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 105-106.
QUESTION NO: 217
You have just purchase a brand new router and need to configure this router after the router boots up
you exit the setup mode by pressing Ctrl-C and you are now in user mode which command do you use to
enter the privileged mode so that you can configure the router?
A.
B.
C.
D.
Set
Enable
Configure
Privileges
Answer: B
Explanation: To change from the user EXEC mode to the privileged EXEC mode the command is enable.
Leading the way in IT testing and certification tools, www.testking.com
- 142-
640 - 801
Incorrect Answers:
A: The command set must be followed by another parameter such as user and the set command cannot be used
to get into the privileged mode
C: Configure is used in privileged mode, but does not ENTER that mode.
D: This in not valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 69-70.
QUESTION NO: 218
Which of the following are considered VLAN benefits?
A.
B.
C.
D.
E.
It increases the number of broadcast domains.
It decreases the number of broadcast domains.
It increases the number of collision domains.
It decreases the number of collision domains.
Since it is a virtual interface, it never shuts down.
Answer: A
Explanation: A VLAN is a logical broadcast domain that can span multiple physical LAN segments. A VLAN
can be designed to provide independent broadcast domains for stations logically segmented by function, project
teams, or application without regard to the physical location of the users. Due to this the number of broadcast
domains increase.
Incorrect Answers:
B: The broadcast domains actually increase not decrease.
C: There is no direct effect on collision domains.
D: There is no direct effect on collision domains.
E: Virtual interfaces can be shut down.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 179-184.
QUESTION NO: 219
Gail is having trouble configuring Frame Relay subinterfaces. You decide to send Gail an email
explaining some of the installation procedures. Which of the following should you include in your email?
(Choose three)
A. Each subinterface is configured either multi point or point to point.
B. Any network address must be removed from the physical interface.
Leading the way in IT testing and certification tools, www.testking.com
- 143-
640 - 801
C. The configuration of subinterfaces is done in router Config-(if)# mode.
D. Frame relay encapsulation must be configured on each sub interface.
Answer: A, B, C
Explanation: When configuring Frame Relay at the sub interface there are a number of points that you be kept
in mind. To configure subinterfaces on a physical interface, do the following:
1. Select the interface you want to create subinterfaces on, enter interface configuration mode, (config-if)#.
2. It is recommended that you remove any network layer address assigned to the physical interface and
assign the network layer address to the subinterface.
3. Configure Frame Relay encapsulation on the physical interface.
4. Identify the subinterface as either multipoint or point-to-point.
Incorrect Answers:
D: The encapsulation type must be done on the physical interface.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 428-429.
QUESTION NO: 220
You are using setup mode to configure your router for the first time. What does the square bracket
indicate in setup mode?
A.
B.
C.
D.
Current or default settings.
Hard coded values that cannot be modified.
Values entered by the administrator but not saved.
Values that must be returned to NVRAM before becoming enabled.
Answer: A
Explanation: When in the setup dialog box the default/current settings are in the square brackets.
Incorrect Answers:
B, C, and D: The square brackets represent current or default settings.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 85.
QUESTION NO: 221
You have just purchased a router from an online auction and this router had an existing IOS installed on
it. You would like to make a backup copy of this IOS. Which one of the following commands will allow
you to do this?
Leading the way in IT testing and certification tools, www.testking.com
- 144-
640 - 801
A.
B.
C.
D.
E.
Copy Flash TFTP
Save Copy TFTP
Write Backup TFTP
Write Backup (server-name)
Copy backup 2 (server-name)
Answer: A
Explanation: The proper command to save the IOS image is copy flash tftp. This will copy the IOS onto a tftp
server.
Incorrect Answers:
B: There is no save command. With Cisco to save something you most often copy it.
C and D: There is no Write command.
E: This is not a valid command combination.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138-139.
QUESTION NO: 222
You are concerned about security on your network. You have a router that is connected to the Internet
and do not want your RIP updates being sent out this interface that is connected to the Internet. Which
command will prevent these updates from going out the interface without using access-lists?
A.
B.
C.
D.
Passive route.
Default routes.
Passive interface.
Route update filtering.
Answer: C
Explanation: The passive interface command will prevent the sending of RIP updates.
Incorrect Answers:
A: Passive routes as used with IGRP and not RIP.
B: Default/static routes will not prevent RIP updates.
D: Filtering is most often achieved on a router with an access list.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 254-282.
Leading the way in IT testing and certification tools, www.testking.com
- 145-
640 - 801
QUESTION NO: 223
Which of the following correctly describe IP addressing? (Choose Two)
A.
B.
C.
D.
IP multicast addresses start with 240.
A host portion of all 1’s indicates a network broadcast.
The value of zero (0) in the host portion means “all hosts” on the network.
IP addresses are four octets long and contain a network portion and a host portion.
Answer: B, D
Explanation: IP addresses contain 4 octets. IP addresses contain two parts: one to identify the network and the
other to determine the host. Which octet identifies what is dependant on the class of the IP address. When a
message is to be flooded the IP address contains all 1s.
Incorrect Answers:
A: Multicast broadcasts of range of IPs is 224-239t. 240 begins the range of reserved (Class E) addresses.
C: To flood a message to all host of a network, the IP address would contain the network identification and
then all 1s (represented by 255) in the host portion of an IP.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 222-232.
QUESTION NO: 224
You are performing password recovery on a router and you have already adjusted the configuration
register and are now in the router that appears to have no configuration. You notice the old
configuration is still saved in NVRAM and you now want to copy the old configuration that is in NVRAM
to the current configuration that is in RAM. Which command retrieves the configuration file from
NVRAM?
A.
B.
C.
D.
Config NVRAM.
Copy NVRAM running-config.
Copy startup-config running-config.
Copy running-config startup-config.
Answer: C
Explanation: To copy the IOS image in the NVRAM to the RAM the copy startup-config running-config
command is used.
Incorrect Answers:
A: This is not a valid command combination.
B: This is not a valid command combination.
D: This actually copies the IOS image from the RAM to the NVRAM which is the exact opposite of what the
question asked.
Leading the way in IT testing and certification tools, www.testking.com
- 146-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 133.
QUESTION NO: 225
Which of the following are facts about Reverse Address Resolution Protocol? (Choose two.)
A.
B.
C.
D.
It generates parameter problem messages.
It maps IP addresses to Ethernet addresses.
It maps Ethernet addresses to IP addresses.
It is implemented directly on top of the data link layer.
Answer: C, D
Explanation: Reverse Address Resolution Protocol (RARP) is another protocol defined at the IP layer. RARP
is used by workstations that do not know their own IP address when they come up. RARP allows workstations
to send out a request for its own IP by sending its own Layer 2 MAC address to a waiting RARP server. ARP
and RARP are implemented directly on top of the data link layer.
Incorrect Answers:
A: RARP determine IPs based on MAC addresses.
B: ARP maps IP addresses to MAC addresses.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 218-220.
QUESTION NO: 226
Your company has decided to use a (BRI) connection between the Florida office and the Georgia office.
You would like to configure dial on demand routing (DDR) on this connection. Which of the following
commands are required to setup DDR? (Choose three)
A.
B.
C.
D.
Define static routes.
Configure the dialer information.
Specify interesting traffic that can enable the link.
Define DDR password to exchange when the link comes up.
Answer: A, B, C
Explanation:
To configure standard DDR, the following steps are required:
1. Define static routes – What route do I take to get to the destination?
2. Specify interesting traffic – What traffic type should enable the link?
Leading the way in IT testing and certification tools, www.testking.com
- 147-
640 - 801
3. Configure the dialer information – What number do I call to get to the next hop router, and what service
parameters do I use to call?
Incorrect Answers:
D: Defining a DDR password is not required.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 400-403.
QUESTION NO: 227
For security reasons you would like a system message displayed when logging into a router. Which of the
following allows you to create this message?
A.
B.
C.
D.
Banner MOTD
Message MOTD
Banner Message
Message Banner
Answer: A
Explanation: In order for a user to see a message when the log into a router a message of the day will need to
be employed. The command to do this is banner motd.
Incorrect Answers:
B: The command is banner not message.
C: The proper parameter is motd not message.
D: This is an invalid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 101-102.
QUESTION NO: 228
You have just configured DDR (Dial on Demand Routing) and would like to test the link. What can you
use to bring up the connection?
A.
B.
C.
D.
Increase the idle timeout parameter.
Send interesting traffic across the link.
Reboot one of the Integrated Services Digital Network (ISDN) routers.
Reset the DDR Integrated Services Digital Network (ISDN) router statistics to zero.
Answer: B
Explanation:
Leading the way in IT testing and certification tools, www.testking.com
- 148-
640 - 801
Of the options provided above the best way to determine if there is connectivity on a dial-on-demand routing
link is to send interesting across the link. If there is connectivity a link will be initiated and established to send
the interesting traffic. If there is no connectivity then the link will not be established.
Incorrect Answers:
A: Increasing the idle time parameter will only result in increasing the idle time.
C: Rebooting the router will only result in the router going through its post.
D: This action will not confirm whether a DDR has connectivity or not.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 397-407.
QUESTION NO: 229
You need to create a subinterface so that you can support different Frame-Relay encapsulations. Which
command specifies a second subinterface on serial interface zero?
A.
B.
C.
D.
E.
Interface s 0.2 point - to point.
Interface 2 s 0 point to point.
Sub interface 2 s 0 point to point.
Interface 0 sub 2 point to point.
Interface s 0.1 point to point sub 2.
Answer: A
Explanation: The proper syntax for configuring a second subinterface is interface 0.2 point-to-point. Option A
is the closest to this command. The syntax after the command interface is serial interface number (0 in this
case).subinterface number (2 in this case) and this followed by the either multipoint or point-to-point.
Incorrect Answers:
B: Remember that the syntax is suppose to be number.subinterface number and that there is suppose to be two
hyphens in point -to-point.
C: The command is interface not subinterface.
D: The two numbers are broken by a period and not the word sub.
E: This is not the proper syntax. Remember the interface and subinterface are identified by
number.subintreface number.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 428-429.
QUESTION NO: 230
You issued the show spantree e0/1 command which part of the output indicates that virtual LAN1
(VLAN1) is functioning properly?
Leading the way in IT testing and certification tools, www.testking.com
- 149-
640 - 801
A.
B.
C.
D.
E.
Root port is fast Ethernet 0/26.
Port Ethernet 0/1 of VLAN is forwarding.
Designated port is Ethernet 0/1, path cost 10.
Designated root has priority 0 address 00D0.588F.B600.
VLAN is executing the IEEE compatible spanning tree protocol.
Answer: E
Explanation: To determine if the VLAN is functioning properly on will need to examine the first line of the
output. That is, VLAN is executing the IEEE compatible spanning tree protocol.
Incorrect Answers:
A: This line indicates what the switch thinks is the root port.
B: This line indicates which port is forwarding.
C: This line indicates the designated port and its associated cost.
D: This line indicated the MAC address of the designated root.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 199-200.
Q.231
Frame Relay uses ___________ to define the rate, in bits per second , that the Frame Relay switch agrees
to transfer data?
A.
B.
C.
D.
E.
Clock rate (CR).
Committed Information Rate (CIR)
Local management interface (LMI)
Data-link connection identifier (DLCI)
Committed Rate Measurement Interval (CRMI)
Answer: B
Explanation: CIR is the rate, in bits per second, at which the service provider states that data will be
transferred.
Incorrect Answers:
A: Clock rate is the transmission medium speed, which is determined by modem clocking.
C: LMI is a signaling standard between the router device and the Frame Rekay switch that is responsible for
managing the connection and maintaining the status between the devices.
D: DLCI is addressing used to identify virtual circuits.
E: This is the sampling period used in controlling CIR, but is not the rate itself.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 413-414.
Leading the way in IT testing and certification tools, www.testking.com
- 150-
640 - 801
QUESTION NO: 232
You are trying to determine if the connection between your Router and the Frame-Relay switch is good.
Which show command should you use to view Frame Relay local management interface (LMI) traffic
statistics?
A.
B.
C.
D.
E.
Show lmi.
Show ip route.
Show interface.
Show statistics.
Show frame-relay lmi.
Answer: E
Explanation: The show frame-relay lmi command displays lmi statistics. An example of one of these statistics
is the number of status messages sent between the local router and the Frame Relay switch.
Incorrect Answers:
A: Show lmi is not a valid command.
B: Show ip route command displays the contents of the IP routing table.
C: Show interface command displays a serial interface configuration
D: Show statistics is not a valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 422-423, 280, and 106.
QUESTION NO: 233
Which of the following is a Layer 2 device?
A.
B.
C.
D.
Hub
Router
Switch
Repeater
Answer: C
Explanation: Switches and Bridges run on Layer 2.
Incorrect Answers:
A and D: They are Layer 1 – Physical Layer devices
B: Routers are layer 3 device.
Leading the way in IT testing and certification tools, www.testking.com
- 151-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 14-24.
QUESTION NO: 234
You are configuring the IPX encapsulation between RouterA and RouterB. This connection will be using
the S0/0 port on RouterA to S0/0 on RouterB. Which encapsulation type should be used for the S0/0 port
of RouterB?
A.
B.
C.
D.
SAP
HDLC
ARP
NOVELLETHER
Answer: B
Explanation: RouterA S0/0 connects to RouterB S0/0. RouterA S0/0 uses HDLC, and BOTH sides must run
the same protocol in order to communicate (it is like talking the same language; you can’t have one side English
and the other Side French).
So the correct answer is HDLC.
Incorrect answers:
A, B and C: The two routers must have the same encapsulation type to communicate properly thus these
encapsulation types could not be used.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 368-373.
QUESTION NO: 235
Our network uses both IPX and IP addressing and we have a direct connection to the Internet using IP.
We would like to allow our IPX traffic to also be able to go across this internet to a remote router on the
other side. Which term below will allow us to encapsulation IPX inside of IP so that we can send it across
the Internet?
A.
B.
C.
Bridging.
Tunneling.
Data-link control.
Leading the way in IT testing and certification tools, www.testking.com
- 152-
640 - 801
D.
E.
Generic routing.
Packet switching.
Answer: B
Explanation: Tunneling is the process whereby a router encapsulates one Layer 3 protocol inside another
protocol (typically IP) for transport across a network to another router. The receiving router de-encapsulates the
packet, leaving the original packet.
Incorrect Answers:
A: Bridging occurs within the same collision domain.
C: Data link control has nothing to do within communication between networks.
D: Generic routing is not the Cisco term
used for communication between networks.
E: Packet switching refers to WAN communication.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 12-14.
QUESTION NO: 236
You have decided to remove RIP routing on your router and install IGRP. You have issued the
command no router rip on all of your routers. You now need to install IGRP on your routers. Which
commands should you use to enable IGRP routing?
A. router igrp 100
network 192.168.1.0
network 10.0.0.0
B. router igrp 100
network 192.168.1.0
network 10.2.0.0
C. router igrp 100
network 192.168.1.0 192.168.1.1
network 10.2.0.0 10.2.1.1
D. router igrp 100
network 192.168.1.0 255.255.255.0
network 10.2.0.0 255.255.0.0
Answer: A
Explanation: To enable IGRP you use the router igrp and network commands. Please note an autonomous
system number must follow the router igrp command and a valid network number must follow the network
command. For RIP and IGRP network numbers must be a major class network number and does include
neither subnet numbers nor individual addresses.
Leading the way in IT testing and certification tools, www.testking.com
- 153-
640 - 801
Incorrect Answers:
B: The number 10.2.0.0 is the problem for this option
C: Each network identified must have its own network command.
D: This is not correct, as there is no need to use the subnet mask for the networks.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277, 285-286.
QUESTION NO: 237
Exhibit
You want to create a sub interface on serial 0 on Router R2. Which of the following is the correct syntax
to create this sub interface 2?
A.
B.
C.
D.
E.
Interface s0.2 point-to-point.
Interface 2s0 point-to-point.
Subinterface 2s 0 point-to-point.
Interface s0 sub2 point-to-point.
Interface s0.1 point-to-point sub2.
Answer: A
Explanation: The proper syntax for configuring a second subinterface is interface 0.2 point-to-point. Option A
is the closest to this command. The syntax after the command interface is serial interface number (0 in this
case).subinterface number (2 in this case) and this followed by the either multipoint or point-to-point.
Leading the way in IT testing and certification tools, www.testking.com
- 154-
640 - 801
Incorrect Answers:
B: Remember that the syntax is suppose to be number.subinterface number and that there is suppose to be two
hyphens in point -to-point.
C: The command is interface not subinterface.
D: The two numbers are broken by a period and not the word sub.
E: This is not the proper syntax. Remember the interface and subinterface are identified by
number.subintreface number.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 428-429.
QUESTION NO: 238
Using a Packet analyzer you discover the following address 238.255.255.255. What is the protocol and
what is the purpose of the address?
A.
B.
C.
D.
E.
IPX; a SAP broadcast.
IP; a multicast address.
IP; a reserved address.
IP; a directed broadcast.
IPX; a flooded broadcast.
Answer: B
Explanation: Class D addresses (multicast addresses) include the following range of network numbers:
224.0.0.0 to 239.255.255.255. 238.255.255.255 is within this range.
Incorrect Answers:
A: This is not an IPX address.
C: Class E addresses (research addresses and sometimes called reserved) include the following range of
network numbers: 240.0.0.0 to 247.255.255.255.
D: An IP directed broadcast would include the first 3 octets of the IP address and 255 would replace the fourth
octet.
F: This is not an IPX address.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 222 – 224.
QUESTION NO: 239
Your company is using Novell v4.1. You need to display the Novel IPX address on a router. Which one
of the following commands will allow you to display this address?
Leading the way in IT testing and certification tools, www.testking.com
- 155-
640 - 801
A.
B.
C.
D.
E.
Show IPX addresses.
Show IPX interface.
IPX network <number>
Display IPX addresses
Show IPX routing details
Answer: B
Explanation:
The show ipx interface command shows the status of the IPS interface and IPS parameters configured on each
interface. This includes the IPX address.
Incorrect Answers:
A: There is no such command as show ipx addresses.
C: The ipx network command is used to enable IPX routing on a particular interface. The <number>
parameter is used to identify the network that IPX is enabled on.
D: Whenever you want to display something on a Cisco interface you use a show command. There is no such
command as display ipx addresses.
E: There is no such command as show ipx routing details. To show the contents of a routing table you would
use the show ipx route command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 345-347.
QUESTION NO: 240
Which statement should you use to deny telnet access only from Network 210.93.105.0 to Network
223.8.151.0?
A. Access-list one deny 210.93.105.0.0.0.0.0.0 any eq 23 access-list one permit any.
B. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq 23
C. Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq 23
Access-list 100 permit ip any any
D. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq telnet
Access-list 100 permit ip any any
Answer: D
Explanation: Great care must be taken whenever an access list is configure as there is an assumption of deny
all when they do not match the access list. The proper command for configuring an extended access to deny
telnet traffic is: access-list 100 deny tcp source address destination address eq telnet. When configured this way
the access list will deny ftp traffic and permit all other.
Incorrect Answers:
Leading the way in IT testing and certification tools, www.testking.com
- 156-
640 - 801
A: The entire statement has syntax problems. You use a number, not a word (one) for the access list, and the
access list for this problem needs to be an extended address list in the range of 100-199.
B: This access list will deny access, but then any non-match falls through and will be denied.
C: This access list denies access from 223.8.151.0 to anywhere else – this is not what the problem asked.
223.8.151.0 is supposed to be the destination, not the source.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 318-320.
QUESTION NO: 241
Given the configuration example:
interface ethernet0
ipx network 100
ipx access-group 800 out
interface ethernet1
ipx network 200
interface ethernet2
ipx network 300
access-list 800 permit 200 100
Which two actions result from implementing this configuration? (Choose two.)
A.
B.
C.
D.
E.
IPX network 400 will not receive any traffic.
Traffic from network 200 for network 100 will be forwarded out e0.
Traffic from network 200 for network 200 will be forwarded out e0.
Traffic from network 200, destined for network 100, will be forwarded out e2.
The access list is applied to an outgoing interface and filters outbound traffic.
Answer: B, E
Explanation:
The key commands for this question are “ipx access-group 800 out” and “access-list 800 permit 200 100”. The
first command identifies the access list as an outbound access list. In the command “access-list 800 permit 200
100” the first network, 200, is source network number and the second network, 100, is the destination network.
Incorrect Answers:
A: There is no reference to network 400 in this question.
C: Network 200 would not need the access list to send traffic within itself.
D: This traffic will be forwarded to interface e0, not enterface e2..
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 353-354.
Leading the way in IT testing and certification tools, www.testking.com
- 157-
640 - 801
QUESTION NO: 242
You are trying to convince your boss to switch from a hub to a Cisco switch. You have explained to your
boss that you will have fewer collisions with the Cisco switch because you will be using full-duplex. Your
boss responds with how many collisions are caused by transmitting and receiving frames simultaneously
in full-duplex mode. What should your response be?
A.
B.
C.
D.
One
Two
None
Several
Answer: C
Explanation: Full Duplex requires one and only one device to be hooked up to a switch port, and each switch
port is a separate collision domain. Since there is no contention (the node has exclusive control of the segment)
there are no collisions.
A, B and D: It is impossible for collision to occur within a full duplex network.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 163-165.
QUESTION NO: 243
Using a class C address 192.168.10.X what would the subnet mask be if we needed two subnets with a
maximum of 35 hosts on each subnet?
A.
B.
C.
D.
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
Answer: A
Explanation: For the networks, we need 2 bits. We must really accommodate for networks, because when we
subnet the formula is 2**n –2. For 35 hosts, we need a minimum of 37 hosts for the same reason, 2**n –2. We
round 37 up to the next power of 2, which is 64, and we need 6 bits for the host. We use 2+6=8 bits.
When we look at the bit locations, the first two bits of the fourth octet will be 128+64=192. Thus the subnet
mask will be 255.255.255.192. Since there is no room to adjust the allocation, everything fits fully into 8 bits,
none of the other subnet masks will provide this combination.
Leading the way in IT testing and certification tools, www.testking.com
- 158-
640 - 801
Incorrect Answers:
B, C and D: These subnet masks provide too many networks and not enough host addresses.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 225-228 and 236.
QUESTION NO: 244
You as the administrator issue the shutdown command on Serial 1. You later view this interface using
the show interface Serial 1 command. How will this interface be displayed?
A.
B.
C.
D.
Serial 1 is up, line protocol is up.
Serial 1 is up, line protocol is down.
Serial 1 is down, line protocol is down.
Serial 1 is administratively down, the line protocol is down.
Answer: D
Explanation: The shutdown command administratively disables an interface. The result is the interface will be
down as will the line protocol. It will end calls in progress.
Incorrect Answers:
A: The statement shows that the interface and the protocols are both up. This would not be the case if the
shutdown command were used.
B: This statement shows that the line is up but the line protocol is down.
C: The line would be administratively down if the shutdown command had been used.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 107, 406-407.
QUESTION NO: 245
Company ABC was supplied the following Class C IP address 195.20.10.0. You have been hired as the
network administrator of Company ABC. Your first task is two split of the address for the different
buildings that Company ABC owns and operates. Which of the following are the most important factors
when subnetting the addresses? (Choose two)
A.
B.
C.
D.
E.
Determine the number of separate networks required.
Determine how many devices will require DHCP addressing.
Determine the maximum number of host that will be on each subnet.
Determine the minimum number of host that will be on each subnet.
Determine which router will be the IP default gateway for each subnet.
Leading the way in IT testing and certification tools, www.testking.com
- 159-
640 - 801
Answer: A, C
Explanation: Whenever a network is going to be divided by a router a number of factors needs to be
considered when selecting a subnet mask. Two factors that need to be considered is the number of networks
that you require and the maximum number of host each subnet will require.
Incorrect Answers:
B: DHCP addressing is not relevant in the subnet mask design.
D: Since the number of hosts has to satisfy ALL of the subnets, we must accommodate the subnet with the
highest number of hosts, so we need the maximums of each, and then take the largest of all the maximums.
E: This task may need to be done but this task has nothing to do with designing the new subnet mask.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 235-237.
QUESTION NO: 246
What are two benefits of segmenting a network with a later 2 bridge? (Choose two)
A.
B.
C.
D.
E.
To reduce collisions.
To increase collisions.
To add collision domains.
To reduce collision domains.
To have more broadcast domains.
Answer: A, C
Explanation: When you segment a network with a bridge you are reducing the number of collisions by creating
another collision domain.
Incorrect Answers:
B: A bridge decreases collisions, not increases collisions.
D: Collision domains are increased, not decreased.
E: There is still one and only one broadcast domain.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 21-24.
QUESTION NO: 247
Which of the following can reset a hold-down timer? (Choose three.)
A.
B.
C.
D.
When the hold-down timer expires.
When infinity is finally defined as some maximum number.
When the router exchanges update summaries at area borders.
When the router detect faulty LSPs propagating through the internetwork.
Leading the way in IT testing and certification tools, www.testking.com
- 160-
640 - 801
E.
F.
G.
When another update is received indicating a new route with a better metric.
When another update is received indicating the original route to the network has been restored.
When the router receives a processing task proportional to the number of links in the internetwork.
Answer: A, E, F
Explanation: Holddown timers work as follows:
1. When a router receives an update from a neighbor indicating that a previously accessible network is now
in accessible, the router marks the route as inaccessible and starts the holddown timer.
2. If an update arrives from the neighboring router with a better metric than originally recorded for the
network, the router marks the network as accessible and removes the holddown timer.
3. If at any time before the holddown timer expires an update is received from a different neighboring
router with a poorer metric, the update is ignored. Ignoring an update with a poorer metric when the
holddown is in effect allows more time for the knowledge to change to propagate through the network.
4. During the holddown period, routes appear in the routing table as “possible down”.
Routers remain in holddown until one of the following events occurs: the holddown expires; another update is
received indicating a new route with a better metric; and a flush timer, which is the time a route would be held
before being removed, removes the route from the routing table.
Incorrect answers:
B, C, D and G: None of these situations will remove a holddown timer.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 269-273.
QUESTION NO: 248
You are troubleshooting a problem between RouterA and RouterB from RouterA. Which command will
successfully ping the ip address of RouterB?
A.
B.
C.
D.
RouterA>ping 131.5.5.0
RouterA# ping 131.5.5.30
RouterA> ping 131.5.5.256
RouterA# ping 131.5.5.255
Answer: B
Explanation: In order to ping an individual IP address you must be in the privileged EXEC mode.
Incorrect Answers:
A: To ping you must be in the privileged EXEC mode not the user EXEC mode.
C: To ping you must be in the privileged EXEC mode not the user EXEC mode.
D: This is not a valid host IP individual IP address.
Leading the way in IT testing and certification tools, www.testking.com
- 161-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 69 and 123-124.
QUESTION NO: 249
In comparing TCP with UDP what is an advantage of using a connectionless protocol such as UDP?
A.
B.
C.
D.
Packet acknowledgement may reduce overhead traffic.
Loss or duplication of data packets is less likely to occur.
Packets are not acknowledged which reduces overhead traffic.
The application relies on the transport layer for sequencing of the data packets.
Answer: C
Explanation: Connectionless protocols have many advantages. One of the main advantages is that there is a
reduction in overhead traffic, as acknowledgments are not sent. This does, though, increase the likelihood of a
lost packet.
Incorrect Answers:
A: There is no packet acknowledgement in UDP.
B: This is the opposite, UDP does not guarantee against packet loss.
D: UDP does not expect packet ordering.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.
QUESTION NO: 250
You are suggesting that your company uses IP RIP as its routing protocol. Your boss would like you to
list some facts about IP RIP before he approves your request. Which of the following statements about
IP RIP are true? (Choose two.)
A.
B.
C.
D.
E.
F.
It limits hop counts to 31.
It is a link-state routing protocol.
It uses autonomous system numbers.
It is capable of load sharing over multiple paths.
It uses bandwidth as the metric for path selection.
It broadcasts updates every 30 seconds by defaults
Answer: D, F
Explanation: Key characteristics of RIP include the following: it is a distance vector protocol, hop count is
used as the metric for path selection, maximum allowable hop count is 15, broadcast routing updates every 30
seconds, RIP can be load balanced over as many as 6 equal cost paths, RIP 1 requires a major classful network
number to advertise and RIP 2 use VLSMs.
Leading the way in IT testing and certification tools, www.testking.com
- 162-
640 - 801
Incorrect answers:
A: RIP’s maximum allowable hop count is 15.
B: RIP is a distance vector protocol.
C: It uses network numbers/VLSMs.
E: Hop count is used as the metric for path selection.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 278.
QUESTION NO: 251
Which of the following troubleshooting tools use the protocol ICMP? (Choose two)
A.
B.
C.
D.
E.
F.
Ping
Telnet
Configure
Trace route
Show commands
Standard access list
Answer: A, D
Explanation: The two protocol tools that use ICMP messaged to perform their function are ping and trace
route.
Incorrect Answers:
B: Telnet uses TCP.
C: Configure is not a protocol tool.
E: They are not part of ICMP, nor do they use ICMP.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-218.
QUESTION NO: 252
Which one of the following is a layer two broadcast?
A.
B.
C.
D.
The IP subnet used is 255.255.255.0
The IP address used is 255.255.255.255
The MAC address used is 00-00-00-00-00-00
The MAC address used is FF-FF-FF-FF-FF-FF.
Leading the way in IT testing and certification tools, www.testking.com
- 163-
640 - 801
Answer: D
Explanation: The MAC address for a broadcast is FF-FF-FF-FF-FF-FF.
Incorrect Answers:
A and B: These are IP addresses and 802.3 uses MAC addresses.
C: This is the address used for a multicast.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 149-152.
QUESTION NO: 253
If I have VLAN 3, and VLAN 4 configured on a Cisco Switch, and I would like to have pc’s on VLAN 3
communicate with pc’s on VLAN 4. Which of the following will allow this inter-VLAN communication to
take place?
A.
B.
C.
D.
E.
It takes place through any Cisco router.
It takes place through a Cisco router than can run ISL.
It takes place through a router, but this disables all the router's Security and filtering functionality for
the VLANs.
For nonroutable protocols, (e.g., NetBEUI) the router provides communications between VLAN
domains.
Inter-VLAN communications is not possible because each VLAN is a separate broadcast domain.
Answer: B
Explanation: In a switched environment, packets are switched only between ports designated to be within the
same “broadcast domain”. VLANs perform network portioning and traffic separation at Layer 2. So, interVLAN communication cannot occur without a Layer 3 device such as a router, because network layer (Layer 3)
devices are responsible for communicating between multiple broadcast domains. Note that, at Layer 2, an
interface uses ISL to communicate with a switch.
Incorrect Answers:
A: The router requires ISL.
C: The router does not change the security settings.
D: The router will not route a nonroutable protocol into the VLAN.
E: Without a router inter-VLAN communication is impossible.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 241-244.
Leading the way in IT testing and certification tools, www.testking.com
- 164-
640 - 801
QUESTION NO: 254
John was having problems connecting to the company’s game server by the FQDN. John then used the
ping command and was successful in pinging the game server. If a packet analyzer were used while John
was using the ping command what would the two most common request/reply pair with ICMP messages
be? (Choose two)
A.
B.
C.
D.
E.
F.
G.
Echo reply
Echo request
Source quench
Fragment offset
Information redirect
Destination reachable
Echo control message
Answer: A and B.
Explanation: The most common form of these messages are pings, ICMP echo request, and ICMP echo replies.
Incorrect Answers:
C, D, E, F, and G: These are not types of ICMP messages.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-219.
QUESTION NO: 255
An IPX address consists of which of the following?
A.
B.
C.
D.
Network number; IP address.
MAC address; node number.
Network number; MAC address.
Network number; subnet number.
Answer: C
Explanation:
An IPX address is composed of two parts: the network number and the node number. For IPX the node number
is usually obtain from MAC address of the network interface.
Incorrect Answers:
A: An ipx address does contain the network number but it does not contain an IP address.
B: The MAC address and node number are most often the same thing.
D: The ipx address does not contain the subnet number.
Leading the way in IT testing and certification tools, www.testking.com
- 165-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332-333.
QUESTION NO: 256
Which of the following correctly compares Fast Ethernet to Ethernet? (Choose four.)
A.
B.
C.
D.
E.
Fast Ethernet uses the Same Maximum Transmission Unit (MTU).
Fast Ethernet is based on an extension to the IEEE 802.3 specification.
Fast Ethernet uses the same Media Access control (MAC mechanisms).
Fast Ethernet preserves the frame format that is used by Ethernet.
Fast Ethernet offers a speed increase one hundred times that of the Ethernet.
Answer: A, B, C, and D.
Explanation: Fast Ethernet shares a great deal of similarities with Ethernet. These similarities are the same
MTU, same MAC mechanism and frame format. Fast Ethernet is based on IEEE 802.3u, which is an extension
to IEEE 802.3.
Incorrect Answers:
E: Its speed is10 times faster, not 100 times.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 44-45.
QUESTION NO: 257
Which two are facts about integrated services digital network (ISDN)?
(Choose two)
A.
B.
C.
D.
ISDN provides only data only capability.
ISDN provides an integrated voice/data capability.
The ISDN standards define the hardware and call setup schemes for end-to-end digital connectivity.
Users receive more bandwidth on WANs with a leased line of 56kbps than with multiple b channels.
Answer: B, C
Explanation:
ISDN stands for Integrated Services Digital Network. ISDN refers to a collection of standards that define a
digital architecture that provides an intergraded voice/data capability to customers’ premises facility. The ISDN
standards define the hardware and call setup schemes for end-to-end digital connectivity.
Incorrect Answers:
A: ISDN provides for voice and data capability.
Leading the way in IT testing and certification tools, www.testking.com
- 166-
640 - 801
D: BRI offers a total of 144 kbps and ISDN PRI offers even more.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 390.
QUESTION NO: 258
You need to install RIP as the routing protocol of your network. Which of the following shows the
correct prompt and command to install RIP as the routing protocol? (Choose one)
A.
B.
C.
D.
Router# rip.
Router rip.
Router (Config)# rip.
Router (Config)# router rip.
Answer: D
Explanation: In order to configure RIP as the routing protocol you need to ensure that you are in the route
configuration mode and that you use the command router rip.
A: This is both the wrong mode and command.
B: This is both the wrong mode and command.
C: This is the proper mode but the wrong command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277-279.
QUESTION NO: 259
The TCP/IP model was created to provide standards used in internetworking. Which of the following
statements are true about this model? (Choose three)
A.
B.
C.
D.
E.
IP provides connection less service and routing capabilities.
ARP enables devices to locate the IP address of local devices.
UDP provides simple connection less service without windowing or acknowledgements.
ICMP provides connection oriented management data to routers and layer three switches.
TCP enables devices to send large quantities of data using switching in a connection-oriented manner.
Answer: A, C, E
Explanation: The TCP/IP protocol stack is very similar to the OSI model protocol stack. With TCP/IP
connection orientated and connection less communication is possible. Both IP and UDP are both
connectionless. TCP is a connection-orientated protocol.
Incorrect Answers:
Leading the way in IT testing and certification tools, www.testking.com
- 167-
640 - 801
B: RARP and not ARP provide this functionality.
D: ICMP is connection less.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 215-218.
QUESTION NO: 260
Which command is used to set the bandwidth metric of a Frame Relay connection?
A.
B.
C.
D.
Router(Config)# clock rate 56
Router(Config-if)# bandwidth 56
Router(Config)# bandwidth 56000
Router(Config-if)# clock rate 56000
Answer: B
Explanation: The bandwidth command overrides the default bandwidth. The bandwidth has no effect on the
actual speed of the line. Instead, it is used to compute routing metrics ad the load of the link. Bandwidth is
expressed in Kilobits. It is specified during interface configuration.
Incorrect Answers:
A: The clock rate command is used to set the bandwidth on DCE cable not a Frame Relay connection that must
not be abbreviated plus it must be used in the interface configuration mode.
C: To change bandwidth of an interface you must be in the interface configuration mode and the rate must be
expressed kilobits per second.
D: The clock rate command is used to set the bandwidth on DCE cable not a Frame Relay connection.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 104-106.
QUESTION NO: 261
Computer A is trying to ping Computer B on the same Ethernet LAN using the IP address. A request is
sent out of Computer A as a broadcast looking for the MAC address of Computer B. What is the
protocol that sent out this broadcast to find Computer B’s MAC address?
A.
B.
C.
D.
It uses a Proxy ARP.
It uses ARP requests.
It uses RARP requests.
It uses router look up table.
Answer: B
Explanation: Address Resolution Protocol is used to resolve or map a known destination IP address to a MAC
sublayer address to allow communication.
Leading the way in IT testing and certification tools, www.testking.com
- 168-
640 - 801
Incorrect Answers:
A: Proxy ARP is most often used with hosts on separate subnets.
C: Reverse ARP is used to resolve an IP address on a given MAC address.
D: A router’s table is not used for this.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 218-220.
QUESTION NO: 262
Which of the following can be used as methods that can be used to simplified network management by
implementing (VLANs)? (Choose four)
A.
B.
C.
D.
E.
F.
VLANs allow you to implement multiple layers switching easily.
VLAN can group several broadcasts domains into multiple logical subnets.
It is no longer necessary to install cables to move a user from a new network to another.
Network adds, moves and changes are achieved by configuring a port into a VLAN.
A group of users needing high security can be put into a VLAN so that no users outside the VLANs
can communicate with them.
As a logical grouping of users, VLANs can be considered independent from their physical or
geographic locations.
Answer: B, D, E, F
Explanation: The introduction of VLANs into a network has a number of benefits. The benefits include:
security, segmentation and flexibility. VLANs allow you to group users into a common broadcast domain
regardless or their physical location in the internetwork. VLANs greater flexibility allows user to moved easily,
changes to the network can be as simple as configuring a port and security can be increased.
B: VLAN can group several broadcast domains into multiple logical subnets is a correct choice.
Incorrect Answers:
A: VLANs add complexity to the switch configurations.
C: You still need to run cables to connect users to network.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 179-184.
Cisco Guide by Todd Lammle:
QUESTION NO: 263
Which of the following are modes used for frame switching on Cisco switches? (Choose two)
A. Full duplex
B. Half duplex
C. CSMA/CD
Leading the way in IT testing and certification tools, www.testking.com
- 169-
640 - 801
D. Cut through
E. Fragmentation
F. Store and forward
Answer: D, F
Explanation: There are 3 primary operating modes that are used for frame switching. These modes are soreand-forward, cut-through and fragment free. When store-and-forward is used the switch must receive the whole
frame before it can be forwarded. During a cut-through operation, the switch forwards the frame once it
receives the Destination Address. Finally, the fragment-free mode reads the first 64 bytes before forwarding the
frame.
Incorrect Answers:
A and B: These are transmission modes of whether the transmission is done one way at at time (half Duplex) or
simultaneous two-way (Full Duplex).
C: This is a physical transmission medium, typically used in Ethernet LANs.
E: There is a fragment-free mode not a fragment mode.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163.
QUESTION NO: 264
When troubleshooting Frame Relay peer problems between two routers which two commands should you
use to show the routers that are reachable? (Choose two)
A.
B.
C.
D.
Show IP map.
Show IP route.
Show frame-relay map.
Debug frame-relay map.
Answer: B, C
Explanation: The show ip route command displays the contents of the IP routing table. The routing table
includes entries for all known networks and subnetworks plus it displays how the information was learned.
The show frame-relay map command show the Frame Relay DLCI-to-IP address mappings. When the results
of these two commands are considered together will provide the data needed to determine routing information.
Incorrect Answers:
A and D: Neither are valid commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 280-281, 431-432.
Leading the way in IT testing and certification tools, www.testking.com
- 170-
640 - 801
QUESTION NO: 265
ISDN is sometimes used in locations that do not offer support for DSL or Cable Modems connections.
Your choices may be Analog modems or an ISDN connection in those remote locations. ISDN has
benefits over regular dial up modem connections. Which of the following are examples of these benefits?
(Choose three)
A.
B.
C.
D.
E.
PVCs are faster and more reliable.
No specialized equipment is required.
Data transfer is faster than typical modems.
Call setup is faster than with standard telephone service.
It carries many types of data traffic such as voice, video, and data.
Answer: C, D, E
Explanation:
Brining digital connectivity via ISDN to a site has many benefits. These benefits include:
- The capability to carry a variety of user-traffic feeds. ISDN provides access to all-digital facilities for videos,
voice, packet-switched data, and enriched telephone network services.
- Much faster call setup than modem connections. ISDN can be set up in less than a second.
- Much faster data transfer for ISDN (64 kbps) than modems (28.8 to 56 kbps).
Incorrect Answers:
A: PVCs are used in Frame Relay connections and not in ISDN.
B: ISDN does need specialized equipment such as TE1, NT2, NT1, TE2, and TAs.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387-393.
QUESTION NO: 266
You would like to configure IP RIP on your Cisco Router. Which of the following steps below are
required to install IP RIP? (Choose two)
A.
B.
C.
D.
Specify the routing protocol.
Configure static Rip routes.
Specify directly connected subnets.
Specify directly connected networks.
Answer: A, D
Explanation: In enable a router with RIP it takes two basic steps: select the routing protocol and identify the
networks that the router is directly connected to. These steps are achieved with the commands router rip and
network.
Leading the way in IT testing and certification tools, www.testking.com
- 171-
640 - 801
Incorrect Answers:
B: There is no such thing as a static RIP route.
C: With RIP you specify the directly connected networks, not the directly subnets.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-279.
QUESTION NO: 267
Billy was hired to setup Frame Relay subinterfaces on a point-point connection between two routers.
Which of the following should Billy take into consideration when setting up this connection? (Choose
Two)
A.
B.
C.
D.
Configure the router to forward all broadcast packets.
Remove any network address assigned to the physical interface.
Configure the local data-link connection identifier for the subinterfaces.
Partition the total committed information rate available among the subinterfaces.
Answer: B, C
Explanation: There are a number of things that must be done to configure a subinterface. Two of these steps
are: the removal of the network address from the physical interface and assign that address to the subinterface
and configure the DLCI for the subinterface.
Incorrect Answers:
A: This is not a frame-relay task and in fact if it was done loops would most likely occur.
D: This is not done during frame-relay subinterface creation.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 428-429.
QUESTION NO: 268
The Internet Control Message Protocol (ICMP) is implemented by all TCP/IP hosts. Which of the
following demonstrate the functions of the ICMP Protocol? (Choose Two)
A.
B.
C.
D.
E.
To map IP addresses to Ethernet addresses.
To map common names to network addresses.
To forward SNMP alerts to management consoles.
To generate an echo reply in response to a ping test.
To send a host or post unreachable message from a router to the source of an undeliverable packet.
Answer: D, E
Explanation: ICMP has a great many functions that it can perform. Two of these functions are: destination
unreachable messages and echo reply messages.
Leading the way in IT testing and certification tools, www.testking.com
- 172-
640 - 801
Incorrect Answers:
A: This is done by ARP & RARP protocols.
B: This is done by Domain Name Services (DNS).
C: A SNMP agent does this.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-218.
QUESTION NO: 269
In today’s networks which encapsulation methods are most commonly used (ISDN)?
A.
B.
C.
D.
IP and IPX
IP and PPP
PPP and SDLC
PPP and HDLC
Answer: D
Explanation: There are a number of WAN encapsulation types available. The two most commonly used are
Point-to-Point Protocol (PPP) and Cisco High-Level Data Link Control (HDLC). The reason HDLC is
employed so much is that it is the default encapsulation type on point-to-point dedicated links and circuit
switched connections. PPP is a non-proprietary encapsulation and this is while it is used to communicate
between devices from different vendors.
Incorrect Answers:
A: IP and IPX are not encapsulation types. They are routing protocols.
B: Only PPP is an encapsulation type.
C: SDLC is a protocol used in IBM SNA systems.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages
372-376.
QUESTION NO: 270
You are configuring a PPP CHAP connection between two routers. The hostnames are SNOWBALL1
and SNOWBALL2. The SNOWBALL1 router has already been configured. You are responsible for
configuring SNOWBALL2. The password configured on SNOWBALL1 is cisco. Which of the following
is the correct username syntax that you will need to configure on SNOWBALL2?
A. Username SNOWBALL2 password cisco
B. Username SNOWBALL1 password cisco
C. Username SNOWBALL2 password SNOWBALL1
Leading the way in IT testing and certification tools, www.testking.com
- 173-
640 - 801
D. Username SNOWBALL1 password SNOWBALL2
Answer: B
Explanation: We must allow SNOWBALL2 access to SNOWBALL1. We should therefore specify the
username and the password of the hosting router: the peer router. The username of the peer router is
SNOWBALL1) and the password is cisco.
Incorrect Answers:
A: We should use the peer username, not the local username
C, D: We must use the password of the peer, not the local password..
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 380-382.
QUESTION NO: 271
Point-to-Point protocol (PPP) is used as a WAN encapsulation between two routers. Which one of the
following is true regarding PPP?
A.
B.
C.
D.
PPP supports TCP/IP, but not Novell IPX.
PPP is being phased out of existence by the Serial Line Internet protocol.
PPP provides router-to-router and host-to-network connections over both synchronous and
asynchronous circuits.
PPP is an ITU-T and ANSI standard that defines the process for sending data over a packet-switched
data network.
Answer: C
Explanation: PPP provide router-to-router and host-to-network connections over synchronous and
asynchronous circuits.
Incorrect Answers:
A: PPP supports both IP and IPX.
B: PPP is causing SLIP to be phased out.
D: PPP was not designed as a standard for packet-switched data networks.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 373.
QUESTION NO: 272
A Novell IPX address has 80 bits. 32 bits for the network number and 48 bits for the node number.
How is the node number determined?
Leading the way in IT testing and certification tools, www.testking.com
- 174-
640 - 801
A.
B.
C.
D.
E.
It is the serial number of the given device.
It is assigned as a lease by Novell DHCP.
It is also set by the network administrator.
It is usually the MAC address of one interface.
It is downloaded by NetWare Core Protocol (NCP).
Answer: D
Explanation: It is determined by the MAC address, so all other options are wrong.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 335-336.
QUESTION NO: 273
Which two statements about a Layer 2 bridge are true? (Choose two)
A.
B.
C.
D.
A bridge floods multicasts.
A bridge floods broadcasts.
A bridge does not flood multicasts.
A bridge does not flood broadcasts.
Answer: A, B
Explanation: A bridge must send all multicasts and broadcast to all ports, since there is only one broadcast
domain.
Incorrect Answers:
C and D: Because a bridge DOES flood broadcasts and multicasts.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 22.
QUESTION NO: 274
What are two commands that you can use to view your access lists? (Choose two)
A.
B.
C.
D.
Show filters.
Show access-lists.
Show IP access-list.
Show running-Config.
Answer: B, D
Explanation:
Leading the way in IT testing and certification tools, www.testking.com
- 175-
640 - 801
B. The show access-list command is used to display all access lists’ contents. Furthermore, if you only want to
display IP access lists then you would issue the show ip access-lists command.
D. The ‘show running-config’ command will show you which access lists are configured on each port.
Incorrect Answers:
A. There is no show filters command.
C. The show IP access-list command only shows the IP access lists.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324 – 325 and 98 – 99.
QUESTION NO: 275
Which IP address range is allowable given an IP address of 131.107.2.56 and 28-bits of subnetting?
A.
B.
C.
D.
E.
131.107.2.48 to 131.107.2.63
131.107.2.48 to 131.107.2.6.2
131.107.2.49 to 131.107.2.62
131.107.2.49 to 131.107.2.63
131.107.2.55 to 131.107.2.126
Answer: C
Explanation: When we say 28 bits of subnetting, this is similar to a CIDR question. We have a subnet mask of
28 bits of ones followed by 4 bits of zeros, or 255.255.255.240, and gives subnets with a stride of 16, or 14
hosts per subnet (16-2 because we subtract out the two broadcast ranges of all zeros and all ones)
This will yield subnets, some networks are as follows:
131.107.2.0.
131.107.2.16
131.107.2.32
131.107.2.48
131.107.2.64
etc…
So, we can fit a network of 131.107.2.48-131.107.2.63
131.107.2.48 is the network, and the all zeros broadcast range.
131.107.2.63 is the broadcast, and is the all ones broadcast range.
So, we can’t user 48 or 63, and the valid host address range would be 49-62.
C is correct; this is the only range that fits.
Incorrect Answers:
A, B, D, and E: These are not the proper ranges with the information provided in the question.
Leading the way in IT testing and certification tools, www.testking.com
- 176-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233-237.
QUESTION NO: 276
Which of the following are true about 172.16.0.254/16?
A.
B.
C.
D.
E.
IPX:MAC addresses.
IP:classC directed broadcast.
Private IP address:node number
Public IP addresses:directed broadcast.
Private IP addresses directed broadcast.
Answer: C
Explanation: The Class B network of 172.16 is a Class B Private Address Range, and the second part (0.254)
is the host address, or node number/address.
Incorrect Answers:
A: The address is an IP address format.
B: The question is a Class B address, if it were Class C, the mask would be 255.255.255.0
D: 172.16 is not a public IP address.
E: 0.254 is not a broadcast address.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 234-236.
QUESTION NO: 277
If you issued the command show access-list 101 list what would be displayed?
A.
B.
C.
D.
All extended access lists.
All access lists within the router.
The contents of standard access list 101
The contents of extended access list 101
Answer: D
Explanation: As the command is directing that the contents of access list 101 be displayed and as 101 is a
number for an extended IP access list D is correct.
Incorrect Answers:
A and B: Only access list 101 will be displayed.
C: Standard IP address lists are in the range of 1-99, IP extended address lists are in the range of 100-199.
Leading the way in IT testing and certification tools, www.testking.com
- 177-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 303, 324-325.
QUESTION NO: 278
You are troubleshooting a router that you believe it configured with an incorrect IP address. You issue
the show configuration command from privileged mode. Which part of the output shows the specific
configured IP addresses and subnet masks?
A.
B.
C.
D.
E.
F.
The IP host table.
The interfaces output.
Each section of the output.
Each section of the output.
The global configuration statements.
The section under the autonomous system number.
Answer: B
Explanation: Each interface that has the IP protocol, will show all IP addresses that were configured on that
interface, with subnet masks.
Incorrect Answers:
A: This only shows the IP to host mappings, like the mapping of a HOSTS table.
C, D, E, and F: These options do not provide this information.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 106-110.
QUESTION NO: 279
Which one of the following protocols used in the TCP/IP protocol stack is considered a reliable
connection-oriented protocol?
A.
B.
C.
D.
E.
IP
UDP
TCP
DNS
OSPF
Answer: C
Explanation: TCP is a connection-oriented, reliable protocol. In connection-orientated environment, a
connection is established between both ends before transfer of information can begin.
Incorrect Answers:
Leading the way in IT testing and certification tools, www.testking.com
- 178-
640 - 801
A:
B:
D:
E:
IP is a connectionless protocol.
UDP is a connectionless protocol.
DNS is a service, not a protocol.
OSPF is a routing protocol.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 206-215.
QUESTION NO: 280
Most modern IP networks today use a variety of different equipment. Which statements are true about
IP networks?
A.
B.
C.
D.
A broadcast source MAC contains all zeros.
A MAC address is part of the physical layer of the OSI model.
Bridges to make forwarding decisions use MAC addresses: routers use IP addresses.
IP addresses are now a flat addressing scheme: MAC addresses use a hierarchical addressing scheme.
Answer: C
Explanation: A bridge uses MAC addresses to make routing decisions whereas a routers uses IP addresses to
makes its routing decisions.
Incorrect Answers:
A: For Broadcasts MAC uses the address is all ones, or X’FF’ for each octet.
B: The MAC address is part of the Data Link Layer.
D: It is reversed. MAC is Flat Addressing, and IP is hierarchical.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 170-173.
QUESTION NO: 281
Which of the following WAN encapsulations support multiple upper layer protocols? (Choose Two)
A.
B.
C.
D.
PPP
LAPD
ISDN
HDLC
Answer: A, D
Explanation: Cisco has a proprietary HDLC. This Cisco HDLC frame uses a proprietary type field that acts as
protocol field, which makes it possible for multiple network later protocols to share the same serial link.
Leading the way in IT testing and certification tools, www.testking.com
- 179-
640 - 801
PPP is not a proprietary protocol. As result, it is most often used to connect devices of different vendors. In
addition, it encapsulates network layer protocol information that makes it possible to support multiple upper
layer protocols.
Incorrect Answers:
B: LAPB is a layer 2 protocol but LAPD is not
C: ISDN is a Layer 1 (Physical) layer protocol, not Layer 2(data link).
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 373-376.
QUESTION NO: 282
You need to install RIP on your router.
131.107.10.0 to be used by RIP?
A.
B.
C.
D.
Which command enables directly connected network
Router(Config)# rip 131.107.10.0
Router(Config-router)# rip 131.107.10.0
Router(Config-router)# network 131.107.10.0
Router(Config-router)# network 131.107.0.0
Answer: D
Explanation: The network command allows the routing process to identify the interfaces will participate in the
sending and receiving of messages.
Incorrect Answers:
A and B: These are not valid commands. In addition, A is in the wrong mode.
C: This is the wrong network number. The 131.107.10.0 is a Class B subnet, using a default mask of
255.255.0.0.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 276-277.
QUESTION NO: 283
In 100BaseT Ethernet cabling 100 is the speed in Mbps, and T is the Type of Media in this case TwistedPair. What does the term ‘Base’ refer to?
A.
B.
C.
D.
E.
Cabling type.
Signaling type.
100 mode type.
Spectrum used.
Speed category.
Leading the way in IT testing and certification tools, www.testking.com
- 180-
640 - 801
Answer: B
Explanation: There are two main signaling types: Baseband and Broadband.
Incorrect Answers:
B: T is the cabling type, in this case Twisted Pair.
C: 100 is the speed, in this case 100mbps.
D: Spectrum, such as fiber, would be part of the cabling type.
E: is the speed category, in this case 100mbps.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 44-45.
QUESTION NO: 284
When using Frame Relay which statement about the Committed Information Rate (CIR) is true?
A. It is the rate, in bits per second, at which the Frame Relay switch agrees to transfer data
B. It is the clock speed (port speed) of the connection (local loop) to the Frame Relay cloud
C. It is the maximum number of bits that the switch can transfer during any Committed Rate
Measurement Interval
D. It is a signaling standard between the CPE device and the FR switch. It is responsible for managing the
connection and maintaining status between the devices.
Answer: A
Explanation: CIR is the rate in bits per second at which the service provided guarantees that data will be
transferred.
Incorrect Answers:
B: Clock rate defines the clock speed.
C: CIR can be exceeded.
D: CIR is not a signaling standard.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 414.
QUESTION NO: 285
Which key do I press to have the IOS finish typing a known command for me?
A.
B.
C.
D.
<Tab>
<Ctrl R>
<Spacebar>
<Right Arrow>
Leading the way in IT testing and certification tools, www.testking.com
- 181-
640 - 801
Answer: A
Explanation: Tab completes a partially entered command if enough characters have been entered to make it
unambiguous.
Incorrect Answers:
B: The key combination will refresh the command line and everything typed up to this point.
C: This just produces a space.
D: This will not produce the desired result.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 97-98.
QUESTION NO: 286
Ten personal computers are connected to separate 10Mbps ports on a switch. How much bandwidth will
be available for each pc?
A.
B.
C.
D.
E.
1.25
4
16
10
60
Answer: D
Explanation: Using switching technology, each port can provide full bandwidth, in this case 10mbps, so each
station can get a full 10mbps.
Incorrect Answers:
A, B, C and E: Due to the fact that each workstation is connected to it’s own 10 Mbps port, each port can
provided it full 10 mbps.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 170-175.
QUESTION NO: 287
In which order takes the data encapsulation place.
Click the task button & Place the encapsulation.
Leading the way in IT testing and certification tools, www.testking.com
- 182-
640 - 801
Leading the way in IT testing and certification tools, www.testking.com
- 183-
640 - 801
Answer:
Explanation:
We can also look at this as layer functions, then sort:
Step One: Physical Layer
Step Two: Transport Layer
Step Three: Application Layer
Step Four: Data Link Layer
Step Five: Network Layer
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10-14.
Leading the way in IT testing and certification tools, www.testking.com
- 184-
640 - 801
QUESTION NO: 288
You are configuring NAT (Network Address Translation) on a Cisco Router. The instructions that you
found on Cisco’s web site recommend that on your inside network the following IP addresses shown in
the EXHIBIT are used. Why are these addresses recommended?
EXHIBIT:
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
A.
B.
C.
D.
E.
They are private IP addresses.
They cannot be leased with DHCP.
They are allocated for VOIP.
They represent IP classless addresses.
They are used by the inter NIC for administration.
Answer: A
Explanation: RFC 1918 defines networks and addresses 10.0.0.0 through 10.255.255.255, 172.16.0.0 through
172.31.255.255, and 192.168.0.0 through 192.168.25.255 as reserved addresses to be used as internal private
addresses and not to connect directly to the public Internet.
Incorrect Answers:
B: They can be leased by DHCP.
C: They are not allocated for VOIP.
D: These range of addresses still retain their implied class.
E: Inter NIC does not use these IPs for administration.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 224.
QUESTION NO: 289
Which of the following can be using to determine the best path to reach a remote destination on a Cisco
router? (Choose two)
A.
B.
C.
D.
E.
Static route entry.
Default route entry.
Dynamic route entry.
Temporary route entry.
Permanent route entry.
Answer: A, C
Leading the way in IT testing and certification tools, www.testking.com
- 185-
640 - 801
Explanation: When a router must send packets that are not directly connected it must have either a static route
or a dynamic router entry.
Incorrect Answers:
B: A default gateway does not always determine the appropriate path.
D and E: Routes can be temporary or permanent, but this is an attribute of the route entry itself. This does not
determine path information.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 250-252.
QUESTION NO: 290
IGRP is Cisco propriety routing protocols that as all routing protocols use metrics to determine the best
path to a destination. Which are the default metrics for this routing protocol?
A.
B.
C.
D.
E.
F.
Maximum Transmission Unit
cumulative interface delay
path bandwidth value
reliability from source to destination
link loading in bits-per-second
hold-down timers for updates
Answer: B, C
Explanation: By default the IGRP metric is a function of bandwidth and delay.
Note: IGRP uses a composite metric that is calculated by factoring weighted mathematical values for
internetwork delay, bandwidth, reliability, and load. Reliability and load, can take on any value between 1 and
255; bandwidth can take on values reflecting speeds from 1200 bps to 10 Gbps, while delay can take on any
value from 1 to 224.
Incorrect Answers
A: Maximum Transmission Unit (MTU) can be included in the IGRP metric, but it isn’t included by default.
D: Reliable of the path can be used as a metric, however it is not included in the metric by default.
E: Bandwidth, not link loading, is including the metric. Furthermore, the bandwidth is scaled by 10,000,000 in
kilobits per second.
F: Hold down timers cannot be used to calculate the metrics for IGRP.
Cisco CCNA exam #640-607 Certification Guide, Cisco Press, RIP and IGRP Feature Comparison, page 429
QUESTION NO: 291
Which of the following are true about layer 3 of the OSI model? (Choose four)
Leading the way in IT testing and certification tools, www.testking.com
- 186-
640 - 801
A.
B.
C.
D.
E.
F.
G.
It uses a two-part address.
It maintains routing tables.
It uses broadcast addresses.
It establishes network addresses.
It provides access to the LAN media.
It provides media independence for upper layers.
It provides path selection for Internet work communication.
Answer: A, B, C, G
Explanation:
The network layer defined how to transport traffic between devices that are not locally attached in the same
broadcast domain. For the communication the device will require two pieces of information: a logical address
associated with the source and destination stations and a path through the network to reach the desired
destination. Both of the required information is stored in the devices routing table. The addresses within the
routing table are considered to be a logical network address that contains two parts: one part that identifies the
network and another part that uniquely identifies the host on each of those networks. If the address of the
destination device is unknown to the device it will broadcast the packet to the remaining interfaces.
Incorrect Answers:
D: The network layer does not establish addresses rather it uses the addresses to route information.
E: The physical layer provides access to media.
F: The data link layer provides media independence for upper layers.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 24-6.
QUESTION NO: 292
The data link layer of the OSI model was broken down into two sublayers. What are the names of these
sublayers? (Choose two)
A.
B.
C.
D.
E.
MAC
LLC
SAP
LCP
NetWare Core Protocol (NCP)
Answer: A, B
Explanation: The data link layer has two sublayers. These sublayers are: MAC and LLC.
Incorrect Answers:
C: The Service Access Point is used by Netware to advertise servers, and runs at a higher layer.
Leading the way in IT testing and certification tools, www.testking.com
- 187-
640 - 801
D: This protocol is used in PPP, but is not part of the data link layer itself.
E: NCP is used by Netware, and runs at a higher layer.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages18-19.
QUESTION NO: 293
In troubleshooting a Frame Relay Link on serial 0/2 which command displays the LMI, DLCI, and
bandwidth for that link?
A.
B.
C.
D.
Show interface serial 0/2
Show frame-relay serial 0/2.
Show protocol frame-relay serial 0/2
Show serial 0/2 encapsulation frame-relay.
Answer: A
Explanation: The show interfaces command displays statistics for all interfaces configured on the switch.
Incorrect Answers:
B, C and D: These are not valid commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 81-81.
QUESTION NO: 294
What is the benefit of segmenting a network with a router into two different segments called segment one
and segment two?
A.
B.
C.
D.
It increases the number of collisions.
It decreases the number of broadcast domains.
It connects segment one’s broadcast to segment two.
It prevents segment one’s broadcast from getting to segment two.
Answer: D
Explanation: The broadcast domains are broken up and separated.
Incorrect Answers:
A: The number of collisions is decreased.
B: The number of broadcast domains is increased.
C: The broadcast domains are broken up and separated.
Leading the way in IT testing and certification tools, www.testking.com
- 188-
640 - 801
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 26-27.
QUESTION NO: 295
Which one of the following is true about User Datagram Protocol?
A.
B.
C.
D.
It is reliable and acknowledged.
It is unreliable and acknowledged.
It is reliable and unacknowledged.
It is unreliable and unacknowledged.
Answer: D
Explanation: UDP is connectionless and unacknowledged protocol. Although UDP is responsible for
transmitting messages, no checking for segment delivery is provided at this layer. UDP depends on upper-layer
protocols for reliability.
Incorrect Answers:
A: UDP is neither reliable nor acknowledged.
B: UDP is not acknowledged.
C: UDP is not reliable.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 207.
QUESTION NO: 296
Which one of the following commands will start the IP processing on interface e0?
A.
B.
C.
D.
E.
IP-Space enable.
Network IP-Address.
IP address IP-address subnet mask.
The exit command from the enable configuration.
Copy running-configuration to startup-configuration.
Answer: C
Explanation: The ip address command is used to start IP processing on a router (in fact the same command is
also used to do the same on a switch.
Incorrect Answers:
A: This is not a valid command.
B: The network command is most often used to identify directly connected networks.
D: This is not a valid command.
Leading the way in IT testing and certification tools, www.testking.com
- 189-
640 - 801
E: This command will copy the running config to the NVRAM.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 245, 133, 277.
QUESTION NO: 297
Ethernet switches operate at the Data Link layer of the OSI model. These Layer 2 devices have three
major functions which of the following describe these functions? (Choose three)
A.
B.
C.
D.
E.
Loop avoidance.
Address learning
Hop count limiting
Broadcast filtering
Packet forward/filtering.
Answer: A, B, E
Explanation: A switch has three basic functions, which increase the available bandwidth on a network. These
functions are address learning, forward/filter decision, and loop avoidance,
Incorrect Answers:
C: Although a switch functions a lot like a multi-port bridge, a switch does not affect – nor is affected by – the
hop count.
D: By their very design Broadcasts are meant to be seen by everyone.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 146-152.
QUESTION NO: 298
The network administrator has just make changes to a router. You have been hired to make sure those
changes are correct and that they have been saved in NVRAM. In Cisco IOS software, which command
displays the backup configuration to see if the changes have been saved to NVRAM?
A.
B.
C.
D.
E.
Show flash.
Show version.
Show tftp-config.
Show backup-config.
Show startup-config .
Answer: E
Explanation: This shows the startup configuration in NVRAM, which is the backup for the running
configuration that runs in RAM.
Leading the way in IT testing and certification tools, www.testking.com
- 190-
640 - 801
Incorrect Answers:
A: Show flash command lists the contents of the flash showing the IOS images that are stored. Remember, the
backup configuration is in the NVRAM, not Flash nor RAM.
B: This command shows information on the running configuration.
C: This is not a valid command.
C: This is not a valid command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 98-99, 131.
QUESTION NO: 299
When you issue the command show version, your router returns:
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IS-M), Version 12.2(4)T, RELEASE SOFTWARE (fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2001 by cisco Systems, Inc.
Compiled Fri 28-Sep-01 06:59 by ccai
Image text-base: 0x80008088, data-base: 0x812E7ADC
ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
DSL uptime is 2 days, 17 hours, 30 minutes
System returned to ROM by power-on
System image file is "flash:c2600-is-mz.122-4.T.bin"
cisco 2621 (MPC860) processor (revision 0x102) with 60416K/5120K bytes of memory.
Processor board ID JAB041306DU (1285222064)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 FastEthernet/IEEE 802.3 interface(s)
2 Serial(sync/async) network interface(s)
1 ATM network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)
Configuration register is 0x0101
From where does the router boot?
A.
B.
ROM
NVRAM
Leading the way in IT testing and certification tools, www.testking.com
- 191-
640 - 801
C.
D.
FLASH
A TFTP server
Answer: A
Explanation: If you want your router to boot automatically from ROM you need to set the boot field to 1 (0x1).
Incorrect Answers:
B: To boot from the NVRAM the boot field must be set from the range of 2 to F (0x2 to 0xF).
C: To boot from FLASH the boot system flash command would need to be used.
D: To boot from a TFTP server the boot system tftp command would need to be used.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 127-130.
QUESTION NO: 300
Which statement is true about Layer 2 bridges?
A. While bridges are used to segment networks they will not isolate broadcast or multicast packets.
B. A bridge looks at every packet with in its network segment and works like a hub, re-broadcasting the
packet if the destination is with in its network segment.
C. A bridge maintains a table of the IP addresses of the hosts with in its network segment and forwards
the packet directly to the destination based upon the IP address.
D. Bridge resets the hop count by keeping all packets within the network segment only packets addressed
to its specific destination host outside the network segment are allowed to pass through the bridge.
Answer: A
Explanation: Bridges (and switches) maintain only one broadcast domain.
Incorrect Answers:
B: If the data does not need to be transferred by the bridge, then it does not need to be rebroadcasted.
C: A bridge operates on layer 2 using MAC addresses, and IP addresses are Layer 3.
D: The hop count is not reset.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 21-24.
QUESTION NO: 301
Given the following IP address from the Class B address range:
131.107.21.12
Leading the way in IT testing and certification tools, www.testking.com
- 192-
640 - 801
Your network plan requires no more than 126 hosts on a subnet that includes this address. When you
configure the IP address in Cisco IOS software, which value should you use as the subnet mask?
A.
B.
C.
D.
255.255.0.0
255.255.128.0
255.255.255.128
255.255.255.252
Answer: C
Explanation:
Since we have to reserve the all ones and all zeros broadcast addresses, we take 126, add 2, and round up to the
next power of 2. We get 126+2=128, and 128 is a power of 2, and takes 7 bits of the subnet mask to represent
the host address.
In the fourth octet of the subnet mask, we have 1 bit for the network, and 7 bits for the host. This high order
NETWORK bit is the 128 bit. Based on the definition of the subnet mask, all network bits before this bit MUST
BE one, so we get:
255.255.255.128
Incorrect Answers:
A, B, and D: They do not provide a maximum of 126 hosts.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233-236.
QUESTION NO: 302
You want to configure the IP address on the interface of your router.
Which of the following commands achieves this goal?
A.
B.
C.
D.
E.
F.
router(config-if)#ip address 163.63.56.5 subnet mask 255.255.240.0
router(config-if)# 163.63.56.5 255.255.240.0
router(config-if)#ip address 163.63.56.5 255.255.240.0
router(config-if)# 163.63.56.5 subnet mask 255.255.240.00
router(config-if)#ip address 163.63.56.5 /29
router(config-if)#ip address 163.63.56.5 subnet mask /20
Answer: C
Explanation: The syntax of command is:
ip address ip-address mask [secondary]
The command must be issued in Interface mode.
Incorrect Answers
Leading the way in IT testing and certification tools, www.testking.com
- 193-
640 - 801
A, B, D, E; F: Incorrect syntax.
Cisco CCNA exam #640-607 Certification Guide, Cisco Press, page 343
QUESTION NO: 303
Which one of the following is not a characteristic of a network segment on a transparent switch?
A.
B.
C.
D.
The segment has its own collision domain.
The segment can translate from one media to a different media.
All devices in the segment are part of the same broadcast domain.
One device per segment can currently send frames to the switch.
Answer: B
Explanation: A switch is usually only handle one media type at a time.
Incorrect Answers:
A, C and D: The statements are characteristics of a network segment on a switch.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 78-80.
QUESTION NO: 304
Which of the following are two ways Cisco supports multiple IPX logical networks on an individual
interface? (Choose two)
A.
B.
C.
D.
Network number.
Routing protocol.
Encapsulation type.
Autonomous system number.
Answer: A, C
Explanation:
Multiple encapsulations can be specified on an interface, but only if multiple network numbers have also been
assigned, where each network number belongs to only one encapsulation type and each encapsulation type has
only one network number. Although several encapsulation types can share the same interface, clients and
servers with different encapsulation types cannot communicate directly with each other.
Incorrect Answers:
B: Routing protocol does not enable multiple logical networks.
Leading the way in IT testing and certification tools, www.testking.com
- 194-
640 - 801
D: Autonomous System Number is used with certain routing protocols, and do not provide support of logical
networks.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 335.
QUESTION NO: 305
When configuring a Frame Relay network your provider assigns you a DLCI number between 16 and
1007 which one of the following statements about this data-link connection identifier (DLCI) is true?
A.
B.
C.
D.
It is a number that identifies a local virtual circuit in Frame Relay network.
It is a signaling standard between the CPE device and the Frame Relay switch.
It is check speed port speed of the connection (local loop) to the Frame Relay cloud.
It is maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer
beyond the committed information rate (CIR).
Answer: A
Explanation: The DLCI (Data-Link Connection Identifier) is a number that identifies the logical circuit
between the router and the Frame Relay switch. The Frame Relay switch maps the DLCIs between each pair of
routers to create a PVC. DLCIs have local significance in that the identifier references the point between the
local router and the Frame Relay switch, which it is connected.
Incorrect Answers:
B: DLCI is not a signaling standard.
C: This is the local access rate.
D: This is not a function of DLCI.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 413-414.
QUESTION NO: 306
Which of the following describes the basic steps a connection oriented uses for communication? (Choose
three)
A.
B.
C.
D.
E.
F.
G.
Call setup
Data transfer
Load Balancing
Call termination
Call prioritization
Data segmentation
Data link identification
Leading the way in IT testing and certification tools, www.testking.com
- 195-
640 - 801
Answer: A, B, D
Explanation:
In connection oriented services, the three steps are: Call Setup, Data Transfer, Call Termination.
Incorrect Options
C, E, F and G: These options may occur but are not required.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.
QUESTION NO: 307
Given an IP address of 131.107.2.160 and a subnet mask of 255.255.255.192, to which subnet does the
host belong?
A.
B.
C.
D.
E.
131.107.2.32
131.107.2.64
131.107.2.96
131.107.2.128
131.107.2.192
Answer: D
Explanation: When we look at the last octet of the subnet mask, we have 192=128+64, which is the two high
order mask bits, leaving 6 bits for host addressing. Each subnet strides 64 addresses, including broadcast,
leaving the following networks:
131.107.2.0
131.107.2.64
131.107.2.128
131.107.2.192
We now look at the host address, which is 160, and find that it fits between 128 and 192, so the network is
131.107.2.128.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 227-234.
QUESTION NO: 308
The OSI model has 7 layers. The physical layer is numbered as the first.
Which devices operate at the level above the physical layer? (Choose two.)
A. router
Leading the way in IT testing and certification tools, www.testking.com
- 196-
640 - 801
B.
C.
D.
E.
F.
SMTP server
transceiver
switch
bridge
hub
Answer: D, E
Explanation:
Switches and bridges work at layer 2, the Data Link layer, of the OSI model.
Incorrect Answers
A: A router works at layer 3, the Network layer, of the OSI model.
B: A SMTP server works at layer 7, the Appliation layer, of the OSI model.
C: A transceiver works at layer 1, the Physical layer, of the OSI model.
F: A hub works at layer 1, the Physical layer, of the OSI model.
QUESTION NO: 309
You telnet into Router B from Router A and now would like to be able to telnet to Router C but keep the
connection open to Router B. What key sequence is used to suspend your telnet session and return you to
Router A so that you can telnet to Router C?
A.
B.
C.
D.
E.
Suspend.
The command exit.
CTRL – ESC followed by x.
CTRL – ALT – DEL followed b ESC.
CTRL- Shift-6 followed by x.
Answer: E
Explanation: To suspend a Telnet session and escape from the remote target system back to your local switch
or router, press the keys Ctrl-Shift-6 at the same time, release the key sequence, and then press the character x.
Incorrect Answers:
A, B, C, and D: These are not the proper key combinations to suspend a Telnet session.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 122-123.
QUESTION NO: 310
TCP is considered a reliable protocol. Which one of the following is used to insure reliability?
Leading the way in IT testing and certification tools, www.testking.com
- 197-
640 - 801
A.
B.
C.
D.
Route selection
Acknowledgement
Session checkpoints
System authentication
Answer: B
Explanation: Acknowledgement is required to insure packets were not loss and this is how a reliable transport
layer connection is maintained.
Incorrect Answers:
A: Route selection is performed by the network layer.
C: These are not transport layer functions.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 28-30.
QUESTION NO: 311
Which layer of the 7 layer OSI model does the ping command operate?
A.
B.
C.
D.
Session
Network
Transport
Maintenance
Answer: B
Explanation:
As the ping command is used to test network connectivity it resides on the network layer of the OSI model.
Incorrect Answers:
A: The session layer is responsible for establishing, managing, and terminating communications sessions
between presentation layer entities. This layer is not responsible for the ping command.
C: The transport layer of the OSI model is responsible for the delivery of information in either a reliable or
unreliable manner. Ping does not reside at this layer of the OSI model.
D: There is no maintenance layer in the OSI model.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 124, 10-13.
QUESTION NO: 312
You have opened up a TAC case for one of your routers that is not working correctly. One of the fields
of the TAC case is what is your software version? Which show command can be issue to display system
Leading the way in IT testing and certification tools, www.testking.com
- 198-
640 - 801
configuration information, software version and the names and sources of configuration files and boot
images on a router?
A.
B.
C.
D.
Show boot.
Show flash.
Show Config.
Show version.
Answer: D
Explanation: The show version command displays information about the system hardware, the software
version the names and sources of the configuration files and the boot images.
Incorrect Answers:
A: Is not a valid command.
B: The show flash command displays the contents of the Flash memory, which includes the image filenames
and sizes.
C: The show config command displays the configuration profile from which the command is entered.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 78, 131 and 466.
QUESTION NO: 313
You would like to see if a host table has been created on a router. Which command displays the IP
addresses assigned to specific host names?
A.
B.
C.
D.
E.
F.
G.
Show hosts.
Show interface.
Ping host name.
Config host name.
Show host mapping.
Show host name IP address.
Trace IP addresses host name.
Answer: A
Explanation: The show hosts command displays a cached list of host names and addresses.
Incorrect Answers:
B: The show interface command is used to display the configuration of an interface.
C – G: These are not valid commands.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 106, 240-241.
Leading the way in IT testing and certification tools, www.testking.com
- 199-
640 - 801
Section B – extra practice questions
QUESTION NO: 1
You are a technician at TestKing. Your newly appointed TestKing trainee wants to know which
command will show the LMI traffic statistics.
What would your reply be?
A. Show interface lmi
B. Show frame-relay lmi
C. Show interface frame-relay
D. Debug frame-relay interface.
Answer: B
Explanation:
To view Frame-Relay LMI statistics, enter the command Show frame-relay lmi
Chapter: 6
QUESTION NO: 2
You are a technician at TestKing. Your newly appointed TestKing trainee wants to know which
command will set the bandwidth of serial 0 to 56kbps.
What would your reply be?
A. Bandwidth 56000
B. Bandwidth 56000000
C. Bandwidth 56
D. Bandwidth 56kbps
Answer: C
Explanation:
Use bandwidth 56 to set the bandwidth to 56kbps. Chapter: 6
QUESTION NO: 3
You are a technician at TestKing. Your newly appointed TestKing trainee wants to know which LAN
switch method holds the packet in memory until the data portion of the packet reaches the
switch.
What would your reply be?
Leading the way in IT testing and certification tools, www.testking.com
- 200-
640 - 801
A. Cut-through
B. Store and forward
C. Frag-free
D. None of the above
Answer: C
Explanation:
The method for switching that reads into the data portion is frag-free. This prevents the switch from forwarding
runt packets (collisions.) Chapter: 6
QUESTION NO: 4
What is the most common layer 2 device?
A. Hub
B. Bridge
C. Switch
D. Router
Answer: C
Explanation:
A switch segments the network and uses an ASIC for fast switching. It has become the most common layer two
device. Chapter: 6
QUESTION NO: 5
What is used to find the hardware address of a device on a LAN?
A. Inverse-ARP
B. Reverse-ARP
C. Interior-ARP
D. ARP
Answer: D
Explanation:
When a device needs to resolve a logical address to the physical Ethernet address (MAC), it uses the Address
Resolution Protocol (ARP.) Chapter: 6
Leading the way in IT testing and certification tools, www.testking.com
- 201-
640 - 801
QUESTION NO: 6
What are the two most common request/reply pair with ICMP messages when using the ping
command?
A. Echo request and Echo reply
B. ICMP hold and ICMP send
C. ICMP request and ICMP reply
D. Echo off and Echo on
Answer: A
Explanation:
The ICMP protocol uses Echo request and Echo reply with the Ping command
Chapter: 6
QUESTION NO: 7
What do you call it when a frame is placed into another type of frame?
A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing
Answer: C
Explanation:
When a frame is placed inside another frame it is know as encapsulation. To restore the frame to its original
state is De-Encapsulation. Chapter: 6
QUESTION NO: 8
Which technology is used by Catalyst switches to resolve topology loops and ensure data flows
properly though a single network path?
A. VTP
B. ISL
C. 802.1Q
D. STP
Answer: D
Leading the way in IT testing and certification tools, www.testking.com
- 202-
640 - 801
Explanation:
Catalyst switches use the STP (spanning tree protocol) to prevent loops and to ensure data flows through a
single network path. Chapter: 6
QUESTION NO: 9
Which command displays all the commands in the history buffer?
A. Show history
B. Show buffers
C. Show typed commands
D. Show terminal buffer
Answer: A
Explanation:
The router will buffer previously entered commands, To see the contents of the buffer you enter the show
history command. Chapter: 6
QUESTION NO: 10
What does IP standard access lists filter on?
A. The source and destination addresses
B. The destination port number
C. The destination address
D. The source address
Answer: D
Explanation:
The standard IP access-list will only filter on the source address contained in the packet.
Chapter: 6
QUESTION NO: 11
When enabling EIGRP routing, what parameters must you apply?
A. broadcast address, and AS number
B. network number and AS number
C. igrp routing, network number, and passive interface
D. igrp routing, network number, and AS
Leading the way in IT testing and certification tools, www.testking.com
- 203-
640 - 801
Answer: D
Explanation:
To enable EIGRP on your router, you must specify EGRP routing, the network number, and the AS system
number. Chapter: 6
QUESTION NO: 12
What is a connection protocol at the Host to Host layer?
A. ARP
B. RARP
C. TCP
D. UDP
E. IP
F. ICMP
G. BootP
Answer: C
Explanation:
Transport Protocol is a connection protocol that resides at the Host to Host layer of the DOD stack and handles
connection oriented communication. Chapter: 6
QUESTION NO: 13
IGRP sends a complete routing table to its neighbors how often by default?
A. every 5 minutes
B. every 90 seconds
C. every 60 seconds
D. every 30 seconds
Answer: B
Explanation:
IGRP enabled routers send their complete routing table to all their neighbors every 90 seconds. Chapter: 6
QUESTION NO: 14
Leading the way in IT testing and certification tools, www.testking.com
- 204-
640 - 801
Which network mask should you place on a Class C network to accommodate a user requirement of ten
,subnetworks?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer: C
Explanation:
With a requirement of ten sub-networks how many bits of subnetting will give you at least ten subnets. Using 4
bits for subnetting gives you 14 subnets. Chapter: 6
QUESTION NO: 15
What is the maximum distance of 10BaseT?
A. 100 meters
B. 100 yards
C. 200 meters
D. 200 yards
Answer: A
Explanation:
The distance standards are in meters and 10BaseT has a distance restriction of 100 meters. Chapter: 6
QUESTION NO: 16
Which of the following is not a distance-vector routing protocol?
A. RIP
B. IPX RIP
C. IGRP
D. OSPF
Answer: D
Explanation:
Only OSPF is a true link-state protocol. The others are distance-vector protocols.
Chapter: 6
Leading the way in IT testing and certification tools, www.testking.com
- 205-
640 - 801
QUESTION NO: 17
Which of the following layers from the TCP/IP model corresponds to the network layer in the OSI
Model?
A. Application
B. Internet
C. Transport
D. Network
E. Data Link
Answer: B
Explanation:
The DOD model consists of the Application/Process, Host to Host, Internet and Network Access layers. The
only answer with a DoD model layer (also called the TCP/IP model), is the Internet layer Chapter: 7
QUESTION NO: 18
You are a technician at TestKing. You are considering the pros and cons of a connectionless service.
Which of the following are characteristics of a connectionless service? (Select Two)
A. Reliable
B. Non-reliable
C. Less bandwidth-intensive
D. Handshaking
Answer: B, C
Explanation:
The Transport layer is a good example of how both a connectionless and connection oriented service works.
UDP is a connectionless services and is considred unonreliable, but uses less bandwidth then a connection
oriented service.
TCP is a connection oriented service and is considered reliable because it uses handshaking to create the service
and acknowledgments. Chapter: 7
QUESTION NO: 19
Which of the following OSI layers is used to determine the best path to a network?
A. Data Link
B. Session
Leading the way in IT testing and certification tools, www.testking.com
- 206-
640 - 801
C. Physical
D. Presentation
E. Network
F. Transport
Answer: E
Explanation:
The Network layer (Internet layer in the DOD model) provides logical addressing and routing through an
internetwork. Chapter: 7
QUESTION NO: 20
You are a technician at TestKing. You are working within the Cisco IOS. Which of the following
functions does the up arrow key provide?
A. Recalls the previous command line
B. Moves the cursor one line up
C. Redisplays the current command line
D. Capitalizes the command line
Answer: A
Explanation:
The up arrow key is used to recall the previous command line entry.
Chapter: 7
QUESTION NO: 21
Which command must be entered when connecting two routers WITHOUT external DCE devices?
A. serial up
B. clockrate
C. clock rate
D. dce rate
E. dte rate
Answer: C
Explanation:
The clock rate command (two words), is used to provide clocking on a line where no DCE device is located.
Chapter: 7
Leading the way in IT testing and certification tools, www.testking.com
- 207-
640 - 801
QUESTION NO: 22
Which of the following statements regarding routed and routing protocols are true?
(Select 2 choices)
A. A routed protocol is assigned to an interface and determines the method of packet delivery
B. A routing protocol determines the path of the packet through a network
C. A routed protocol determines the path of the packet through a network
D. A routing protocol operates at the transport layer of the OSI model
E. A routed protocol updates the routing table of a router
Answer: A, B
Explanation:
Routed protocols (example, IP and IPX) is used to provide logical network address and provides framing of a
packet on a LAN.
Routing protocols (example RIP and OSPF) are used to determine the path of a packet through the network by
updating the routing table on a router. Chapter: 7
QUESTION NO: 23
When powering up a router, which of the following types of memory normally stores the start-up
configuration?
A. RAM
B. ROM
C. FLASH
D. NVRAM
Answer: D
Explanation:
The startup-config, if placed there by an administrator, is stored in the Non-Volatile RAM. Chapter: 7
QUESTION NO: 24
Based on the debug output shown, what type of handshake occurred for PPP authentication?
#debug ppp authentication
ppp serial1: Send CHAP challenge id=34 to remote
ppp serial1: CHAP challenge from P1R2
ppp serial1: CHAP response received from P1R2
ppp serial1: CHAP response id=34 received from P1R2
Leading the way in IT testing and certification tools, www.testking.com
- 208-
640 - 801
ppp serial1: Send CHAP success id=34 to remote
ppp serial1: Remote passed CHAP authentication
ppp serial1: Passed CHAP authentication
ppp serial1: Passed CHAP authentication with remote
A. one-way
B. two-way
C. three-way
D. no handshakes required during authentication
Answer: C
Explanation:
CHAP uses a three-way handshake. After the PPP link is established, the host sends a "challenge" message to
the remote node. The remote node responds with a value calculated using a on-way hash function. The host
checks the response against its own calculation of the expexted hash value. If the hash value match, the
authentication is acknowledged; otherwise, the conenction is terminated. Chapter: 7
QUESTION NO: 25
Which of the following commands will send and receive ICMP echo messages to verify connectivity from
host to host?
A. ping
B. tracert
C. netstat
D. show cdp neighbors detail
E. show ip route
F. traceroute
Answer: A
Explanation:
Packet Internet Groper uses ICMP echo requests and replies to verify network connectivity Chapter: 7
QUESTION NO: 26
You are the network administrator at TestKing Co. You receive a call from a TestKing user who is
unable to reach a server at a remote site. After further review you discover the following information
about the user's computer.
Local PC 190.0.3.35/24
Default Gateway 190.0.3.1
Leading the way in IT testing and certification tools, www.testking.com
- 209-
640 - 801
Remote Server 190.0.5.250/24
You then conduct the following tests from the offending local PC
Ping 127.0.0.1 - Unsuccessful
Ping 190.0.3.35 - Successful
Ping 190.0.3.1 - Unsuccessful
Ping 190.0.5.250 - Unsuccessful
Which of the following problems would create the test results listed above?
A. TCP/IP not correctly installed
B. Local physical layer problem
C. NIC not functioning
D. Remote physical layer problem
Answer: A
Explanation:
If you cannot ping the loopback address of 127.0.0.1, then something is wrong with the TCP/IP protocol stack.
Chapter: 7
QUESTION NO: 27
You are a network technician at TestKing. You have just finished configuring a router on the TestKing
network. The changes have been successfully entered and everything is working properly.
You then save your changes and reboot the router. None of your changes are active after the reboot.
However, when you look at the contents of the startup config, your changes are there.
Which of the following indicates the source of the problem?
A. Hardware failure in NVRAM prevents the router from loading the config
B. Startup-config in flash is corrupt and cannot be analyzed
C. Router configuration-register set to bypass startup configuration
D. Startup-config in NVRAM is corrupt and cannot be analyzed
Answer: C
Explanation:
The default configuration-register setting of 0x2102 loads the IOS from flash and the configuration from
NVRAM.
However, for password recovery, you can set the register to 0x2142 and the startup-config file in NVRAM will
be bypassed. Chapter: 7
QUESTION NO: 28
Leading the way in IT testing and certification tools, www.testking.com
- 210-
640 - 801
You are a technician at TestKing. Your newly appointed TestKing trainee wants to know what the word
“any” mean in the following extended access list statement:
Access-list 101 permit tcp any 192.168.10.0 0.0.0.255 eq tcp
What would your reply be?
A. check any of the bits in the source address
B. permit any wildcard mask for the address
C. accept any source address
D. check any bit in the destination address
E. permit 255.255.255.255 0.0.0.0
F. accept any destination
Answer: C
Explanation:
The "any" in this list is the source address to filter. If it is set to any or "0.0.0.0 255.255.255.255", then any
source address will be filtered. Chapter: 7
QUESTION NO: 29
By looking at the following configuration, Which additional command must be issued on the Branch
router before interesting traffic will be sent to the Remote router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 32055512360001
isdn spid2 32055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
A. (config-if)# dialer-group 1
B. (config-if)# dialer-list 1
C. (config-if)# dialer map 1
D. (config-if)# dialer-route 1
Leading the way in IT testing and certification tools, www.testking.com
- 211-
640 - 801
Answer: A
Explanation:
The "dialer-group #" command tells the access-list (used with the dialer-list # command), which interface to
activate when it finds interesting traffic. The numbers at end of each command must match. Chapter: 7
QUESTION NO: 30
In Frame Relay, what are DLCIs used for?
A. They determine the Frame Relay encapsulation type
B. They indentify the logical circuit between a local router and a Frame Relay WAN switch
C. They represent the keepalives used to maintain the PVC in an active state
D. They represent the physical address of the router attached to a Frame Relay network
Answer: B
Explanation:
Data Link Connection Identifiers are the "hardware address" on a Frame Relay network. They identify a routers
PVC to the Frame Relay switch. Chapter: 7
QUESTION NO: 31
Which of the following WAN services uses two data link layer encapsulations, one for data and one for
signaling?
A. ISDN
B. Frame Relay
C. ATM
D. FDDI
Answer: A
Explanation:
ISDN uses "out-of-band" signaling, which means that the clocking is done on the "D" (data) channel and not the
same channels as the actual data. Chapter: 7
QUESTION NO: 32
Which of the following statements is true in regards to Frame Relay Multipoint subinterfaces?
A. An ip address is required on the physical interface
Leading the way in IT testing and certification tools, www.testking.com
- 212-
640 - 801
B. All routers are required to be fully meshed
C. All routers must be in the same subnet to forward routing updates and broadcasts
D. Multipoint is the default configuration for Frame Relay subinterfaces
Answer: C
Explanation:
Unlike Frame Relay point-to-point connections, multipoint Frame Relay router interfaces must all be in the
same subnet. Chapter: 7
QUESTION NO: 33
You are a technician at TestKing. You have just connected a new host to a workgroup switch on the
TestKing network. The new host's Layer 3 configuration is
correct. However, the host is unable to access the server resources in its network segment. Which of the
following is most likely causing the problem?
A. The router lacks a routing table entry for the new host
B. The host switch port is assigned to the incorrect VLAN
C. The host MAC address is incorrectly configured
D. A VIP instance for the new host has not been initialized
Answer: B
Explanation:
Virtual LANs break up broadcast domains in a layer-two switched internetwork. If a host is in a different
VLAN then the network services it needs to use, the packets must go through a router. Answer B is the best
answer for this question. Chapter: 7
QUESTION NO: 34
Which of the following is the decimal and hexadecimal equivalent of this binary number 10101010?
A. Decimal=160, hexidecimal=00
B. Decimal=170, hexidecimal=AA
C. Decimal=180, hexidecimal=BB
D. Decimal=190, hexidecinal=CC
Answer: B
Explanation:
For the binary equivalent of 10101010 to Decimal, the answer is 128+32+8+2=170.
Leading the way in IT testing and certification tools, www.testking.com
- 213-
640 - 801
For Hexadecimal, break up the binary number into two bytes of 1010 and 1010. Each one in binary is then 10
and 10, which is A and A in hexadecimal. Chapter: 7
QUESTION NO: 35
Given the the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and
ports 4 through 6 are assigned to VLAN 2 on each switch. Click on the Exhibit button to view the
network.
The switches are interconnected over a trunked link. Which of the following conditions would verify
VLAN and trunk operation? (choose 3)
A. Host 1-1 can ping Host 1-2
B. Host 1-1 can ping Host 4-2
C. Host 1-1 can not ping Host 1-2
D. Host 4-1 can not ping Host 1-2
E. Host 4-1 can ping Host 4-2
Answer: A, D, E
Explanation:
If you do not have a router, then only hosts in the same VLAN will be able to ping each other. Chapter: 7
QUESTION NO: 36
You are the network administrator at TestKing.com. TestKing.com has a switched network. You need to
add a new VLAN, named Debits, to the network. Which of the following are true regarding configuration
of this vlan? (Choose 3)
A. The VLAN must be created
B. The VLAN must named
C. An IP address must be configured for the ACCOUNTS VLAN
D. The desired ports must be added to the new VLAN
E. The VLAN must be added to the STP Domain
Answer: A, B, D
Explanation:
The best answers are A, B, D. You must create the VLAN, name it, then assign ports. An IP address is not
necessary, although, it is typically performed. Chapter: 7
QUESTION NO: 37
Leading the way in IT testing and certification tools, www.testking.com
- 214-
640 - 801
Which of the following commands should be used to display RIP routing updates as they are sent and
received by the router?
A. Show ip protocols
B. Show ip route rip
C. Debug ip rip
D. Debug ip updates
E. Debug ip transactions
Answer: C
Explanation:
The command debug ip rip will display routing updates as they as sent and received by a router. Chapter: 7
QUESTION NO: 38
You are the network administrator at TestKing.com. You have just configured a new router that you
attached to the TestKing network. You ping the directly connected serial port of the directly neighboring
router. The ping is unsuccessful.
The show running-config output displays the word “shutdown” for the serial interface.
Which of the following lines will be displayed in the show interface s0 output?
A. Serial 0 is up, line protocol is down
B. Serial 0 is down, line protocol is down
C. Serial 0 is down, line protocol is up
D. Serial 0 is administratively down, line protocol is down
E. Serial 0 is administratively down, line protocol is up
F. Serial 0 is administratively up, line protocol is down
Answer: D
Explanation:
If an interface is shutdown, it will show "administratively down and line protocol down"
Chapter: 7
QUESTION NO: 39
Hosts in the TestKing sales department are unable to access a new server at the Remote Office. The
servers IP address is 192.168.40.96/28. Why can’t the server be reached?
Click on the exhibit button to view the network configuration.
Which of the following is most likely causing the problem?
A. The default gateway of the workstations in the sales department is incorrect
Leading the way in IT testing and certification tools, www.testking.com
- 215-
640 - 801
B. The subnet mask of the workstations in the sales department is incorrect
C. The default gateway of the server at the Remote Office is invalid
D. The host address of the server at the Remote Office is invalid
E. The serial 0 interface on the Home Office router and the serial 1 interface are not on the same
subnetwork
Answer: D
Explanation:
The IP address of the server is 192.168.40.96/28. This is an invalid host address.
Chapter: 7
QUESTION NO: 40
Which of the following bit patterns is for a Class B address?
A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx
Answer: B
Explanation:
Class A addresses start with 0, class B with 10 and class C with 110. Chapter: 7
QUESTION NO: 41
You are a technician at TestKing. You add a new workstation to the Testking network. The workstation
is to be used by a new employee.
The employee is unable to connect to the server at IP address 192.168.10.98/27.
Identify the incorrectly configured network parameter.
Examine the exhibit.
A. Workstation IP address
B. Workstation subnet mask
C. Workstation default gateway
D. Router interface E0 ip address
Answer: C
Explanation:
Leading the way in IT testing and certification tools, www.testking.com
- 216-
640 - 801
The default gateway should be set to .65 Chapter: 7
QUESTION NO: 42
Which symbol in the router prompt indicates you are in the privileged mode?
A. >
B. #
C. ?
D. *
Answer: B
Explanation:
When you enter the privileged mode by typing enable the router prompt will change to a # character. Chapter: 6
Note:
Section A contains 313 questions.
Section B contains 42 questions.
The total number of questions is 355.
Each section starts with QUESTION NO :1. There are no missing questions.
Leading the way in IT testing and certification tools, www.testking.com
- 217-