You are on page 1of 16

DRSEnt Practice Final - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.

0)
1. Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choose two.) Set the router ID of R2 to 10.0.0.1. Set the Loopback0 IP address of R3 to 192.168.1.253. Set the FastEthernet0/0 IP address of R1 to 192.168.1.1. Set the router ID of R1 to the highest IP address in the network. Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface. Set the OSPF priority to 255 on the R1 FastEthernet0/0 interface. 2. Refer to the exhibit. How many routers have established OSPF adjacencies with R1? 2 4 5 7 3. What are two features of a standard IP ACL? (Choose two.) It permits or denies access based on the entire protocol. It filters the packet based on the source IP address only. It uses identification numbers between 100 and 199. It can filter traffic based on port number. It can only filter inbound traffic on an interface.

4. Refer to the exhibit. Which two facts can be determined from the output? (Choose two.) The router ID of R2 is 192.168.100.65.

R2 has established adjacencies with three routers. R2 is not receiving hellos from neighbor 192.168.100.66. R2 is connected to an Ethernet network that consists of two routers. Neighbor 192.168.100.3 will become the DR if the current DR becomes unavailable. 5. In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members? client server pruning transparent 6. Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is already operational in a network? All packets with a destination address between 172.16.64.1 and 172.16.80.254 will be forwarded out serial0/0. All packets with a destination address between 172.16.64.1 and 172.16.255.254 will beforwarded out serial0/0. All packets with a destination address between 172.16.64.1 and 172.16.79.254 will be forwarded out serial0/0. All packets with a destination address between 172.16.0.1 and 172.16.64.254 will be forwarded out serial0/0. 7. Refer to the exhibit. How will the access control list impact the operation of the network? Users on the 192.168.64.32 network will be able to telnet into RTA. Users on the 192.168.32.0/27 network will be able to telnet into RTA. Users on the 192.168.64.0/27 network will be able to telnet into RTA. Users on the 192.168.32.0/27 network will not be able to console into RTA 8. Which route will be excluded from the updates that are sent to the neighbor routers?

R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1 R 192.168.2.0/24 [120/15] via 192.168.101.1, 00:00:12, FastEthernet0/0 R 192.168.3.0/24 [120/2] via 192.168.101.1, 00:00:12, FastEthernet0/0 R 192.168.4.0/24 [120/7] via 192.168.101.1, 00:00:12, FastEthernet0/0. 9. Refer to the exhibit. The network administrator has just configured a default route on the HQ router. What two statements describe what must happen so that all routers in the OSPF network have a route to the Internet? (Choose two.) The gateway of last resort must be set on each OSPF router. HQ will automatically propagate the default route to every other OSPF router. HQ will send the default route information to the DR and BDR for distribution to the other routers. Each router must be configured with a static route to the 64.104.22.16/28 network. HQ must be configured with the default-information originate command. Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in the OSPF configuration.

10.Refer to the exhibit. The network administrator at a school with a network address of 128.107.0.0/16 is planning an IP addressing scheme based on the number of hosts in each network. Which combination of subnet masks will support the number of hosts on each network while wasting the fewest addresses? Student - /22 Staff - /27 Admin - /28 Faculty - /26 Student - /21

Staff - /28 Admin - /29 Faculty - /25 Student - /21 Staff - /27 Admin - /28 Faculty - /25 Student - /22 Staff - /27 Admin - /27 Faculty - /26 11.If a modem is being used to connect to an ISP, which WAN connection type is being used? leased line cell switched circuit switched packet switched 12.What is the term for the value 2172416 that is highlighted in the output of the show ip eigrp topology command? feasible distance of the successor reported distance of the successor feasible distance of the feasible successor reported distance of the feasible successor 13.Which two criteria are used by STP to select a root bridge? (Choose two.) memory size bridge priority number of ports

switch location switching speed base MAC address 14.Refer to the exhibit. Both switches have been configured with static VLANs. Host A and host C belong to one VLAN and host B and D belong to another VLAN. However, the hosts within the same VLAN are unable to communicate with each other. Which troubleshooting approach should be followed to resolve this problem? Explore the possibility of adding a router to the network. Ensure that both switches are configured for the same native VLAN. Ensure that the ports connecting the two switches are configured as trunk ports. Ensure that both switches are configured with an IP address in the same subnet. 15.Which statement describes a PVC? A PVC provides a permanent logical connection to forward data between two points. A PVC is dynamically established when a router requests a transmission. A PVC prevents small messages from being held up behind larger messages. A PVC requires call set-up information to be sent before transmitting any data. 16.What are two characteristics of an extended ACL? (Choose two.) IP is used to specify TCP traffic only. IP is used to specify TCP and UDP traffic only. IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols. Traffic can be filtered on source address only. Traffic can be filtered on source and destination address only.

Traffic can be filtered on source and destination address, protocol, and specific port number. 17.Refer to the exhibit. The RIPv2 routing protocol has been enabled with default options on all routers in the network. A user at IP address 192.168.3.20 attempts to connect to a server at IP address 192.168.3.88 but is unsuccessful. What could be done to correct this situation? Change the routing protocol to RIPv1. Turn off automatic summarization on all routers in the network. Set the default gateway on the host at 192.168.3.20 to 192.168.3.88. Set the gateway of last resort on router R1 to the IP address that is assigned to the Serial 0/0/0 interface on R2. 18.An administrator wants to configure a new Cisco Catalyst 2960 switch in order to manage the switch remotely. After configuring the vty lines to allow login, which set of commands should the administrator enter? Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login Switch(config-line)# exit Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.5 255.255.255.0 Switch(config-if)#exit Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login Switch(config-line)# exit Switch(config)# ip default-gateway 192.168.1.1 Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.5 255.255.255.0 Switch(config-if)# no shutdown

Switch(config-if)# exit Switch(config)# ip default-gateway 192.168.1.1 19.A service provider is troubleshooting a failure between two sites in a Frame Relay virtual circuit. Where would the administrator locate the fault if it was determined to be a problem with the CPE? at the CO within the local loop within the Frame Relay switch at the device with the DTE interface 20.Refer to the exhibit. What are two consequences of issuing the displayed commands? (Choose two.) The routing update information is protected against being falsified. The routing table of R2 will be secured. The key is encrypted with the MD5 hashing algorithm. esOSPF rout will get priority over EIGRP routes going into the routing table. The overhead of OSPF information exchange will reduce. 21.Refer to the exhibit. R1 and R2 are connected to each other through their serial0/0/0 interfaces, but are unable to establish OSPF adjacency. What are two reasons for this? (Choose two.) The router IDs of the two routers do not match. The process IDs of the two routers do not match. The Hello and Dead timers of the routers do not match. The OSPF backbone area is configured on both routers. The serial interfaces of the two routers are in different subnets. 22.Refer to the exhibit. What can be determined from the output of the show ip nat translation command? Dynamic NAT addressing is enabled. NAT overload is enabled on router R1.

The outside local and outside global addresses have been misconfigured. The outside global address has been dynamically assigned from a NAT pool. 23.Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem? Configure a default route on R3 and propagate it via the use of RIPv2 to all routers. Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3. Configure a default route on the ISP, and it will be automatically propagated to all routers. Configure a default route on R1, and it will be automatically propagated to all routers. 24.Which software is typically used on a remote PC to access the enterprise through the Internet via a secure tunnel? Telnet client VPN client FTP client web browser 25.What is a limitation of RIPv1? RIPv1 cannot run on networks that are using RIPv2. RIPv1 does not send subnet mask information in its updates. RIPv1 is not widely supported by networking hardware vendors. RIPv1 requires enhanced router processors and extra RAM to function effectively. RIPv1 consumes excessive bandwidth by multicasting routing updates using a Class D address.

26. Refer to the exhibit. What is the purpose of assigning the IP address 192.168.30.1 to an access layer switch? to assign a default gateway to the hosts that are connected to the switch to allow hosts on the same LAN to connect to each other to allow remote management of the switch to allow inter-VLAN communication 27.Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved? Configure dynamic NAT instead of PAT. Configure the access list for the correct network. Include the ip nat pool command in the configuration. Configure the ip nat inside command on the correct interface 28.Which three IP addresses are valid host addresses in the 10.200.0.0/20 network? (Choose three.) 10.200.11.69 10.200.16.1 10.200.0.255 10.201.0.55 10.200.15.240 10.200.30.29.

29.Refer to the exhibit. The network administrator enters the command that is shown in the exhibit and then issues the show ip route command. The route added by the network administrator is missing from the routing table. What is the reason for this? This static route is providing a backup to the existing route to 192.168.1.0 / 24. The route is incorrectly configured.

Dynamic updates are always preferred over static routes. The FastEthernet0/0 interface is administratively down. 30.Refer to the exhibit. Router2 is unable to receive EIGRP routes from Router1. Based on the command output, what is most likely the cause of the failure? Automatic summarization is in effect. The values for DUAL calculation have been changed. The autonomous system number that is configured on each router does not match. The interfaces that connect the two routers have not been configured correctly. 31.While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the network configuration. How many host addresses can be created for each subnetwork in this addressing scheme? 510 512 1022 1024 32.An organization is planning to expand by adding five new branches. After the expansion, it will require secured, full-time, and simultaneous connectivity for its new branch offices with the central office. There is only one port available on the central office router. Which WAN technology can be used in this situation? PPP ISDN Frame Relay analog dialup 33.Which command should a network administrator issue to disable default summarization in an EIGRP network? Router(config-router)# no ip summary-address Router(config-if)# no ip summary-address

Router(config-if)# no auto-summary Router(config-router)# no auto-summary 34.Refer to the exhibit. A network administrator is configuring an ACL on router R1. The purpose of the ACL is to ensure that traffic from the Internet will only be allowed if it is in response to a request that is initiated from the internal network. However, after the ACL has been applied, internal users report that they cannot visit external web sites. What can be done to solve this problem? Remove the deny any any statement. Apply the ACL to the serial 0/0/0 interface inbound. Consolidate all internal computers into one network. Add a permit tcp any any eq www statement to the top of the ACL.

35.Which element of the hierarchical design model provides a connection point for end-user devices to the network? core layer edge device access layer enterprise edge distribution layer 36.Once the root bridge has been determined, which two items are assigned to every other switch before STP converges a switched network? (Choose two.) VLAN ID root port full-duplex port designated port discarding port 37.Refer to the exhibit. If router RTA fails, which statement is true? Hosts A and B can reach each other, but cannot reach hosts C and D or the server.

No host can reach any other host. Hosts A, B, C, and D can reach each other, but cannot reach the server. All hosts can reach each other. 38.What is a feature of PAP authentication? It uses a three-way handshake with encryption. It sends the username/password pair across the link in clear text. It provides protection against playback attack through a variable challenge value. It designates the called device to control the frequency and timing of the authentication. 39.Refer to the exhibit. Host H2 and host H3 are able to ping the default gateway but cannot ping host H1. Host H1 cannot ping either the default gateway, host H2, or host H3. The network technician issues the show interfaces command on switch S1 and notes that all unused switch ports are administratively down and ports Fa0/1, Fa0/3, and Fa0/4 are up with their line protocol up. However, S1 port Fa0/2 is shown as down with the line protocol down error (disabled). What is a possible cause for the inability of H1 to communicate with the network? Routing is misconfigured on router R1. The default gateway on H1 was misconfigured. Host H1 is on a different subnet than hosts H2 and H3. Port security on switch S1 port Fa0/2 is misconfigured. The administrative VLAN on switch S1 does not have an IP address assigned. 40.Refer to the exhibit. Which two statements are correct about the VTP configuration on S2? (Choose two.) The default mode is used. The default domain name is used. A new client mode switch in the CISCO domain would receive updates from S2. S2 would not update a new client mode switch whose VTP revision number is 3.

S2 will share VLAN database updates with a switch that is configured with VTP version 1. 41.Refer to the exhibit. Workstation H1 is unable to reach the Internet. A network technician issues a ping command to troubleshoot the problem. Based on the results of the commands that are shown, what could be the cause of the problem? The default gateway on H1 is incorrect. The IP address on H1 is incorrect. The subnet mask on H1 is incorrect. The Fa0/0 IP address on the router is incorrect. The VLAN IP address on the switch is incorrect. 42.Which routing protocol is unable to support discontiguous networks? RIPv1 RIPv2 EIGRP OSPF 43.Refer to the exhibit. What is the administrative distance for OSPF routes? 0 1 65 110 120 128 44.Refer to the exhibit. EIGRP has been configured on all routers in the network. Based on the provided output, which route or routes will be installed in the R1 routing table for the 172.30.1.0/24 network? EIGRP will install the route via the 10.1.25.0/24 network. EIGRP will install the route via the 10.1.35.0/24 network. EIGRP will install the route via the 10.1.45.0/24 network.

EIGRP will install all three routes and will load balance over them. EIGRP will install both routes via the 10.1.25.0/24 and the 10.1.35.0/24 networks and will load balance over them. EIGRP will install both routes via the 10.1.35.0/24 and the 10.1.45.0/24 networks and will load balance over them. 45.What is the difference between the passive and active route status as displayed in an EIGRP topology table? Routes that are passive are never updated. Routes that are active are used to forward data. Routes that are active are being recalculated by DUAL. Routes that are passive are waiting for the neighbor adjacency process to complete. 46.Refer to the exhibit. Both routers are configured to use the EIGRP routing protocol. The network administrator wants to enable manual summarization by issuing the displayed command. How should the administrator issue this command? after issuing the router eigrp 50 command in interface mode on the Fa0/0 interface of R2 in interface mode on the S0/0/0 interface of R2 in global configuration mode 47.Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routing table? (Choose two.) 1 2 3 4 5 6

48.Which two wildcard masks are required in an extended access list statement that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28? (Choose two.) 0.0.63.255 0.0.0.63 0.0.0.31 0.0.0.15 0.0.0.0 50. Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address? 192.168.0.0/22 192.168.0.0/23 192.168.0.0/24 192.168.0.0/25 51. Where are EIGRP successor routes stored? only in the routing table in the routing table and the topology table in the routing table and the neighbor table only in the neighbor table

You might also like