Answer:A & E
Answer:A & E
Answer:A & E
Answer :A & E
Answer :A
3. What is the maximum number of hops that OSPF allows before marking a network as unreachable?
A. 15
B. 16
C. 255
D. Unlimited
E. 99
Answer :D
4. Which routing protocol would allow a network administrator scalability, VLSM support and minimize
overhead if the network administrator wants to merge different networks all using routers from multiple
vendors?
A. VTP
B. RIP
C. IGRP
D. EIGRP
E. OSPF
Answer :E
5. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a
routing update that contains a higher cost path to a network already in its routing table?
A. The update information will replace the existing routing table entry.
B. The update information will be added to the existing routing table.
C. The existing routing table entry will be deleted from the routing table and all routers will exchange
routing updates to reach convergence.
D. The update will be ignored and no further action will be taken.
Answer :E
6. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a
routing update that contains a higher cost path to a network already in its routing table?
A. The update information will replace the existing routing table entry.
B. The update information will be added to the existing routing table.
C. The existing routing table entry will be deleted from the routing table and all routers will exchange
routing updates to reach convergence.
D. The update will be ignored and no further action will be taken.
Answer :E
7. What switching method examines the destination MAC address as the frame is being received and then
begins forwarding the frame prior to receiving the entire frame?
A. Modified Cut Through
B. Store and Forward
C. Cut Through
D. Fragment Free
Answer :C
8. Which of the following belong to the ISDN TE2 function group? (Choose two)
A. a router serial interface
B. an ISDN phone
C. a router ISDN BRI "U" interface
D. a standard pc
E. an ISDN terminal adapter
Answer :A & D
Answer :B
10. You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses its
configuration each time it is rebooted. You study the output displayed in the exhibit. What is the cause of the
problem?
Exhibit:
----- output omitted ----
Cisco 2620 (MPC860) processor (revision 0x200) with 16384/2048K bytes of
memory.
Processor board ID JAD05076EF6 (3878188963)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 Ethernet/IEEE 802.3 interface(s)
2 Serial(sync/async) network interface(s)
2 Low speed serial(sync/async) network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)
11. If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number
of hosts allowed on this subnet?
A. 2046
B. 8190
C. 4094
D. 4096
E. 1024
Answer :C
12. The Frame Relay circuit between router A and router B is experiencing congestion. Which type of
notification are used to alleviate the congestion? (Choose three)
A. DE
B. BECN
C. DLCI 100 is Down
D. CIR
E. FECN
13. At which OSI layer does data translation and code formatting occur?
A. Network
B. Physical
C. Data link
D. Transport
E. Session
F. Presentation
Answer :F
Answer :B
15. Which wireless data communication type has a high data rate but is limited to very short distances?
A. Infrared
B. Broadband Personal Communication Service (PCS)
C. Narrowband
D. Spread spectrum
Answer :A
16. Ethernet networks are broadcast domains and collision domains. How the hosts on an Ethernet network will
know when to resume transmissions after a collision has occurred? (Choose all that apply)
A. The router on the segment will signal that the collision has cleared.
B. The jam signal indicates that the collision has been cleared.
C. The hosts will attempt to resume transmission after a time delay has expired.
D. The destination host sends a request to the source for retransmission.
E. An electrical pulse indicates that the collision has cleared.
Answer :C
17. Which command must be entered when connecting two routers without external DCE devices via a serial
link?
A. Serial up.
B. Dte rate.
C. Dce rate.
D. Clock rate.
E. Line protocol up.
Answer :D
18. How2Pass Router Simulation. Please read the instructions and problem statement carefully. Complete your
configuration and press the Done button when finished.
Answer :
Troubleshooting
In the simulation, click Host D, a dialog box will appear, select the Cisco Terminal option and press the OK
button, to establish a terminal session to the router Kenan.
Enter the privileged EXEC mode by typing enable at the Kenan> prompt and then the password how2pass
at the Password: prompt. The privileged EXEC mode prompt, Kenan#, will be displayed.
Issue the command show running-config (abbreviated as sh runn), read the output carefully to find any
missing or wrong configuration. Whenever you see the prompt --More-- at the bottom of a page, you can
press spacebar to see the next output page.
Notice the running-config entries for interface serial1. It has wrong IP address and subnet mask. Notice the
word shutdown below Serial1.
To confirm this, issue show interface serial 1 command. The output confirms that the interface is shutdown.
This simulation also supports ping, show ip protocol and show ip route commands for effective debugging.
Do the configuration shown below and ping to a remote ip address.
Save your configuration using copy running-config startup-config (abbreviated as copy runn start) command.
Kenan#config t
Enter configuration commands, one per line. End with CNTL/Z.
Kenan(config)#int s1
Kenan(config-if)#ip address 192.168.69.2 255.255.255.0
Kenan(config-if)#no shutdown
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
%LINK-3-UPDOWN: Interface Serial1 changed state to up
Kenan(config-if)#^z
Answer :B
Answer :B
21. What does the concept route aggregation mean when one talks about using variable subnet masking?
A. Combining routes to multiple networks into one supernet.
B. Deleting unusable addresses through the creation of many subnets.
C. Calculating the available host addresses in the AS.
D. Reclaiming unused space by means of changing the subnet size.
Answer :A
22. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. HDLC
B. LCP
C. NCP
D. X.25
Answer :B
23. Study the network topology exhibit carefully, in particular the two switches SW1, SW2, and the router RT3.
Which statements are true in this scenario? (Select two)
A. The hosts on the 192.168.1.0 network form one collision domain, and the hosts on the 192.168.2.0
network form a second collision domain.
B. Each host is in a separate collision domain.
C. All the devices in both networks will receive a broadcast to 255.255.255.255 sent by host A.
D. Only the devices in network 192.168.1.0 will receive a broadcast to 255.255.255.255 sent by host
A.
E. All the devices on both networks are members of the same collision domain.
Answer :D & B
Answer :A
25. You want to configure a router for load balancing across 4 unequal cost paths on your network. Which of the
following routing protocols can you use? (Choose two)
A. RIP v1
B. RIP v2
C. OSPF
D. IGRP
E. EIGRP
F. VLSM
Answer :D & E
Answer :A
27. Host A is communicating with the server. What will be the source MAC address of the frames received by
Host A from the server?
A. The MAC address of Host A.
B. The MAC address of the server network interface.
C. The MAC address of router interface E1.
D. The MAC address of router interface E0.
Answer :D
28. What switching method examines the destination MAC address as the frame is being received and then
begins forwarding the frame prior to receiving the entire frame?
A. Fragment Free
B. Store and Forward
C. Modified Cut Through
D. Cut Through
Answer :D
29. The exhibit displays the partial contents of an encapsulation header. Which of the following are true of the
network traffic represented in this diagram? (Select three)
30. What does the concept route aggregation mean when one talks about using variable subnet masking?
A. Reclaiming unused space by means of changing the subnet size.
B. Combining routes to multiple networks into one supernet.
C. Calculating the available host addresses in the AS.
D. Deleting unusable addresses through the creation of many subnets.
Answer :B
Answer :C
32. Please drag the appropriate options to the correct targets. After completing the question press the push
button below the question to save your response.
Answer: 1:E,2:A,3:F
Explanation:
LAPD - provides the data link protocol that allows delivery of messages across that D-channel to the local
switch.
LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. It is
defined by ITU-T Recommendations Q.920 and Q.921.
TE1 - ISDN -capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point.
ITU.T.430 - Defines connectors, encoding, framing, and reference points.
TE2 - Equipment that does not understand ISDN protocols and specifications (no ISDN awareness).
Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA.
NT1 - CPE equipment in North America. Connects with a U reference point (two-wire) to the telco.
33. Which routing protocol would allow a network administrator scalability, VLSM support and minimize
overhead if the network administrator wants to merge different networks all using routers from multiple
vendors?
A. OSPF
B. VTP
C. EIGRP
D. RIP
E. IGRP
Answer :A
Answer :A
35. Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)
A. It is globally significant.
B. It is an optional parameter required only if multiple OSPF processes are running on the router.
C. All routers in the same OSPF area must have the same process ID if they are to exchange routing
information.
D. It is needed to identify a unique instance of an OSPF database.
E. It is locally significant.
Answer :D & E
36. Given the the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and ports 4
through 6 are assigned to VLAN 2 on each switch. The switches are interconnected over a trunked link.
Which of the following conditions would verify VLAN and trunk operation? (choose 3)
Answer :A, D, E
37. By looking at the configuration, Which additional command must be issued on the Branch router before
interesting traffic will be sent to the Remote router?
A. (config-if)# dialer-group 1
B. (config-if)# dialer-list 1
C. (config-if)# dialer map 1
D. (config-if)# dialer-route 1
Answer : A
Explanation :The "dialer-group #" command tells the access-list (used with the dialer-list # command),
which interface to activate when it finds interesting traffic. The numbers at end of each command must
match.
38. You are the network administrator of the RouterSim global software Company. You receive a call from a
user who is unable to reach a server at a remote site. After further review you discover the following info:
Local PC 190.0.3.35/24
Default Gateway 190.0.3.1
Remote Server 190.0.5.250/24
You then conduct the following tests from the offending local PC: Ping 127.0.0.1 - Unsuccessful
Ping 190.0.3.35 - Successful
Ping 190.0.3.1 - Unsuccessful
Ping 190.0.5.250 - Unsuccessful
Which of the following problems would create the test results listed above?
Answer : A
Explanation :If you cannot ping the loopback address of 127.0.0.1, then something is wrong with the IP
configuration of the host.
39. Choose three reasons why the networking industry uses a layered model. (Choose 3)
A. Allow changes in one layer to occur without changing other layers
B. To get Gigabit speeds on LANs
C. Clarify what general functions is to be done rather than how to do it
D. To create filter tables on LANs
E. Order network troubleshooting steps
Answer :A, C, E
Explanation :
The reasons to use a layer model are:
Answer : C
Explanation :
Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really a
disadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate
networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the
frames.
41. You work as network administrator at Brain dump. Your trainee is configuring a router with both physical and
logical interfaces. He asks you what factor determines the OSPF router ID. What should you tell him?
A. The lowest IP address of any interface.
B. The highest IP address of any interface.
C. The highest IP address of any logical interface.
D. The middle IP address of any logical interface.
E. The lowest IP address of any physical interface.
F. The highest IP address of any physical interface.
G. The lowest IP address of any logical interface.
Answer :F
Explanation: The OSPF topology database includes information about routers and the subnets, or links, to
which they are attached. To identify the routers in the neighbor table’s topology database, OSPF uses a
router ID (RID) for each router. A router’s OSPF RID is that router’s highest IP address on a
physical interface when OSPF starts running.
Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. Thehighest
IP address configured on the router is the router ID. If a loopback address is configured, then it is the router
ID. In case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID
is elected it doesn't change unless the IP address is removed or OSPF restarts.
42. Which of the following routes will be used to forward data in a situation where a routing table contains static,
RIP, and IGRP routes destined to the same network with each set to its default administrative distance?
A. The IGRP route
B. The static route
C. The RIP route
D. All three will load balance.
Answer :B
Explanation:To decide which route to use, IOS uses a concept called Administrative Distance.
Administrative distance is a number that denotes how believable an entire routing protocol is on a single
router. The lower the number, the better, or more believable the routing protocol.
Route Type Administrative Distance
A. Static 1
B. IGRP 100
C. RIP 120
o What is the basic characteristic of switches and hubs?
Answer :E
Explanation:Switches increases the number of collisions domains in the network. Switches that are
configured with VLANs will reduce the size of the collision domains by increasing the number of collision
domains in a network, but making them smaller than that of one big, flat network.
PP. When you consider half-duplex and full-duplex Ethernet, what are unique for half-duplex Ethernet?
(Select two options.)
A. Half-duplex Ethernet operates in a shared collision domain.
B. Half-duplex Ethernet operates in an exclusive broadcast domain.
C. Half-duplex Ethernet has efficient throughput.
D. Half-duplex Ethernet has lower effective throughput.
E. Half-duplex Ethernet operates in an exclusive collision domain.
Answer :A, D
Explanation:A single device could not be sending a frame and receiving a frame at the same time because
it would mean that a collision was occurring. So, devices simply chose not to send a frame while receiving a
frame. That logic is called half-duplex logic. Ethernet switches allow multiple frames to be sent over different
ports at the same time. Additionally, if only one device is connected to a switch port, there is never a
possibility that a collision could occur. So, LAN switches with only one device cabled to each port of the
switch allow the use of full-duplex operation. Full duplex means that an Ethernet card can send and receive
concurrently.
45. The MCP technician configured the routers with the specification that follows:
o The routers are named Brain dump1, Brain dump2, and Brain dump3.
o RIP is the routing protocol
o Clocking is provided on the serial 0 interfaces
o The password on each router is "Brain dump"
o The subnet mask on all interfaces is the default mask.
o The IP addresses are listed in chart below.
46. The following exhibit shows the Braindumps.biz WAN. Study it carefully:
What are the broadcast addresses of the subnets in the Braindumps network? (Select three options).
A. 172.16.82.255
B. 172.16.95.255
C. 172.16.64.255
D. 172.16.32.255
E. 172.16.47.255
F. 172.16.79.255
Answer :B, E, F
Explanation:The subnets in the network are subnetted Class B addresses. A /20 subnet mask means that
the subnet addresses increment by 16.
For example: 172.16.16.0, 172.16.32.0, 172.16.48.0, 172.16.64.0 etc. The broadcast address is the last IP
address before the next subnet address.
B: The switch IP address (172.16.82.90) is in the 172.16.80.0 subnet. 172.16.95.255 is the broadcast
address for the 172.16.80.0 subnet.
E: 172.16.47.255 is the broadcast address for the 172.16.32.0 subnet.
F: 172.16.79.255 is the broadcast address for the 172.16.64.0 subnet.
47. You are a network administrator at Braindumps. The Braindumps network is illustrated in the following
exhibit. Study it carefully:
Routers Braindumps1 and Braindumps2 are connected through their social interfaces, however, they cannot
communicate. You ascertain that Braindumps1 has the correct configuration.
Answer :D
48. You are a network administrator at Braindumps. The Braindumps network is illustrated in the following exhibit.
Study it carefully:
You want to prevent users on the Research Network and the Internet from accessing the Braindumps
Support server, but you want to allow all other Braindumps users access to the server. You create an access
control list (ACL) called research block. The ACL contains the following statements:
deny 172.16.102.0 0.0.0.255 172.16.104.255 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0
Which of the following commands sequences will place this list to meet these requirements?
Answer :F
Explanation:To enable the ACL on an interface and define the direction of packets to which the ACL is
applied, the ip access-group command is used.
When referring to a router, these terms have the following meanings.
A. Out - Traffic that has already been through the router and is leaving the interface; the source Would
be where it's been (on the other side of the router) and the destination is where it's Going.
B. In - Traffic that is arriving on the interface and which will go through the router; the source would Be
where it's been and the destination is where it's going (on the other side of the router).
o You are a network administrator at Braindumps. You are troubleshooting a router problem. You
issue the show ip route command on one of the routers. The output from the command is shown in
the following exhibit:
Router Brain dump# Show in ip route.
Answer :B
Explanation:To decide which route to use, IOS uses a concept called Administrative Distance.
Administrativedistance is a number that denotes how believable an entire routing protocol is on a single
router. The lower the number, the better, or more believable the routing protocol.
Route Type Administrative Distance
Route Type Administrative Distance
A. Connected 0
B. EIGRP 90
C. IGRP 100
D. OSPF 110
E. RIP 120
For RIP, the metric is the hop count, so in this case the route is 3 hops away.
50. Which PPP authentication methods will you use when configuring PPP on an interface of a Cisco router?
(Select two options.)
A. SSL
B. SLIP
C. PAP
D. LAPB
E. CHAP
F. VNP
Answer :C, E
Explanation :Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol
(CHAP) authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method
today because the identifying codes flowing over the link are created using a MD5 one-way hash, which is
more secure that the clear-text passwords sent by PAP.
51. If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by default?
A. ROM
B. RAM
C. Flash
D. Bootstrap
E. Startup-.config
Answer :C
Explanation :Flash memory - Either an EEPROM or a PCMCIA card, Flash memory stores fully functional
IOS images and is the default location where the router gets its IOS at boot time. Flash memory also can be
used to store any other files, including configuration files.
52. What could be the rationale behind using passive-interface command when configuring a router?
A. Allows interfaces to share common IP addresses.
B. Allows an interface to remain up without the aid of keepalives.
C. Allows a router to send routing and not receive updates via that interface.
D. Allows a routing protocol to forward updates that is missing its IP address.
E. Allows a router to receive routing updates on an interface but not send updates via that interface.
Answer :E
53. You are a systems administrator at Braindumps and you've just acquired a new Class C IP network. Which of
one of the subnet masks below is capable of providing one useful subnet for each of the above departments
(support, financial, sales & development) while still allowing enough usable host addresses for each
departments needs?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
F. 255.255.255.252
Answer :C
Explanation:The network currently consists of 5 networks and another network will be acquired. That gives
us atotal of 6 networks. This requires that we use 3 bits for the network address. Using the formula 2n-2 we
get 6. This also leaves us with 5 bits for hosts, which gives us 30 hosts.
54. You are a network administrator at Braindumps. You need to troubleshoot the Braindumps network shown in
the exhibit. Study the Exhibit carefully:
The host, EX1, is connected to the Braindumps1 LAN, but it cannot get access to resources on any ofthe
other networks. The host's configuration is as follows:
Host address: 192.168.5.45
Subnet mask: 255.255.255.240
Default gateway: 192.168.5.32
Which of the following is the cause of this problem?
Answer :A
55. Which of the following are benefits of segmenting a network with a router? (Select all that apply)
A. Broadcasts are not forwarded across the router.
B. All broadcasts are completely eliminated.
C. Adding a router to the network decreases latency.
D. Filtering can occur based on Layer 3 information.
E. Routers are more efficient than switches and will process the data more quickly.
F. None of the above.
Answer :A, D