Sunteți pe pagina 1din 14

http://www.docstoc.

com/docs/13388042/CCNA-3-Final-Exam-V40
http://www.scribd.com/doc/14277669/CCNA-3-Discovery-40-final-Exam

Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing a


nd Switching in the Enterprise (Version 4.0)

Time Remaining:

1 What is considered a best practice when configuring ACLs on vty lines?


Use only extended access lists.
Place identical restrictions on all vty lines.
Apply the ip access-group command inbound.
Remove the vty password since the ACL restricts access to trusted users.

2
Refer to the exhibit. A network administrator must manually summarize all IP add
resses on the POP router for the ISP. Which one is the correct summary address?
192.168.0.0/22
192.168.0.0/23
192.168.0.0/24
192.168.0.0/25

3
Refer to the exhibit. A network administrator is configuring an ACL. Which state
ment is true about the effect of the ACL?
A host with the IP address 192.168.10.22 is allowed to access the FTP server th
at has the IP address 172.17.2.240.
A host with the IP address 192.168.10.42 is allowed to access the FTP server th
at has the IP address 172.17.2.241.
A host with the IP address 192.168.10.12 is allowed to access the web server th
at has the IP address 172.17.2.242.
A host with the IP address 192.168.10.52 is allowed to have SSH access to the s
erver that has the IP address 172.17.2.240.

4 When MD5 authentication is used for OSPF routing protocol authentication, what
two facts are known about the key? (Choose two.)
The key passes between routers in plain text.
The key is used to help generate an encrypted number for authentication.
The key passes between routers in encrypted form.
The key is never transmitted.
The key can be captured by using a packet sniffer.

5
Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trun
k link that has been tested and is working properly. Why is VTP unable to propag
ate VLANs from one switch to the other?
The revision number is different on both switches.
Both switches are in server mode.
The VTP domain name is different on both switches.
The VTP pruning mode is disabled.

6 A router in a fully converged EIGRP network detects that a remote route is unr
eachable. Which two events may occur next? (Choose two.)
EIGRP will look for a feasible successor in the routing table.
DUAL will calculate the highest cost routes to each network.
EIGRP will send a bounded update to alert neighbors about the failure.
The router will forward the complete routing table to the neighboring routers.
DUAL will look for a feasible successor route in the topology table and, if one
is found, it will add this route to the routing table.

7 Which type of distance vector routing mechanism helps prevent the formation of
loops by preventing routing information from exiting a router interface through
the same interface on which it was received?
split horizon
hold-down timer
poisoned reverse
setting maximum hop count
8
Refer to the exhibit. The network administrator has just configured a default ro
ute on the HQ router. What two statements describe what must happen so that all
routers in the OSPF network have a route to the Internet? (Choose two.)
The gateway of last resort must be set on each OSPF router.
HQ will automatically propagate the default route to every other OSPF router.
HQ will send the default route information to the DR and BDR for distribution t
o the other routers.
Each router must be configured with a static route to the 64.104.22.16/28 netwo
rk.
HQ must be configured with the default-information originate command.
Each router must include the statement network 64.104.22.16 0.0.0.15 area 0 in
the OSPF configuration.

9
Refer to the exhibit. OSPF has been configured on all routers. What is the DR/BD
R status immediately after all routers have converged?
R1 is the DR. R3 is the BDR.
R2 is the DR. R5 is the BDR.
R3 is the DR. R4 is the BDR.
R4 is the DR. R5 is the BDR.
R5 is the DR. R2 is the BDR.

10
Refer to the exhibit. Workstation H1 is unable to reach the Internet. A network
technician issues a ping command to troubleshoot the problem. Based on the resul
ts of the commands that are shown, what could be the cause of the problem?
The default gateway on H1 is incorrect.
The IP address on H1 is incorrect.
The subnet mask on H1 is incorrect.
The Fa0/0 IP address on the router is incorrect.
The VLAN IP address on the switch is incorrect.

11
Refer to the exhibit. What is the administrative distance for OSPF routes?
0
1
65
110
120
128

12
Refer to the exhibit. What is the purpose of assigning the IP address 192.168.30
.1 to an access layer switch?
to assign a default gateway to the hosts that are connected to the switch
to allow hosts on the same LAN to connect to each other
to allow remote management of the switch
to allow inter-VLAN communication

13
Refer to the exhibit. A network technician is attempting to manage a switch that
has an IP address that has been assigned to the default management VLAN. What i
s a possible reason that the Telnet session fails from a PC connected to a port
that is assigned to VLAN 10?
The incorrect encapsulation command is used.
There is no encapsulation dot1q 1 configuration on the FastEthernet 0/0 port.
The default gateway address of the switch must be in the same network as the PC
.
There is no subinterface associated with the default management VLAN on the swi
tch.

14
Refer to the exhibit. A network administrator is configuring an ACL on router R1
. The purpose of the ACL is to ensure that traffic from the Internet will only b
e allowed if it is in response to a request that is initiated from the internal
network. However, after the ACL has been applied, internal users report that the
y cannot visit external web sites. What can be done to solve this problem?
Remove the deny any any statement.
Apply the ACL to the serial 0/0/0 interface inbound.
Consolidate all internal computers into one network.
Add a permit tcp any any eq www statement to the top of the ACL.

15 A company requests the service of an ISP for Internet access. Which device is
needed to connect the company router to the ISP by a T1 or E1?
CSU/DSU
DMZ router
DMZ switch
web server
Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment

Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing a


nd Switching in the Enterprise (Version 4.0)

Time Remaining:

16 Which protocol is a classful routing protocol?


BGP
EIGRP
OPSF
RIPv1
RIPv2

17 Which statement describes a PVC?


A PVC provides a permanent logical connection to forward data between two point
s.
A PVC is dynamically established when a router requests a transmission.
A PVC prevents small messages from being held up behind larger messages.
A PVC requires call set-up information to be sent before transmitting any data.

18 What can be done to reduce the impact of a failure domain?


Create a single local network on a central switch.
Move wired users to a more reliable wireless network.
Add redundant devices to key positions within the network.
Add more VLANs to each switch and assign fewer users per VLAN.
19
Refer to the exhibit. EIGRP has been configured on all routers in the network. B
ased on the outputs from the show ip route commands on R1 and R2, how will the r
outers process traffic from Host2 to the hosts on the 172.16.11.0/24 and 172.16.
12.0/24 networks?
The traffic will reach the destination networks.
Traffic will be dropped by R2 because the gateway of last resort is not set.
The traffic will reach the Null interface on router R1 where it will be dropped
.
Because EIGRP does not support discontiguous networks, the traffic from R1 will
not reach R2.

20
Refer to the exhibit. Which two facts can be determined from the output? (Choose
two.)
The router ID of R2 is 192.168.100.65.
R2 has established adjacencies with three routers.
R2 is not receiving hellos from neighbor 192.168.100.66.
R2 is connected to an Ethernet network that consists of two routers.
Neighbor 192.168.100.3 will become the DR if the current DR becomes unavailable
.

21
Refer to the exhibit. The network administrator wants to restrict the Production
network from accessing the HR network. All other traffic will have access to al
l networks. Which combination of interface and direction should the administrato
r use to apply the ACL?
Fa0/1, out
Fa1/0, out
Fa0/1, in
Fa1/0, in

22 Which two statements are true when comparing RIP and EIGRP? (Choose two.)
Both RIP and EIGRP support equal cost load balancing.
Both RIP and EIGRP can run on Cisco and non-Cisco routers.
RIP supports a maximum hop count of 15 while EIGRP supports up to 255 hops.
By default RIP summarizes networks at the classful boundary while EIGRP does no
t.
Routes learned via RIP have a lower administrative distance than those learned
via EIGRP.
23 A network administrator is configuring an edge router to support external acc
ess to several internal web servers that have private IP addresses. Which type o
f address resolution would be appropriate for this scenario?
PAT
static PAT
static NAT
dynamic NAT

24
Refer to the exhibit. EIGRP has been configured for all routers in the topology.
For the network 10.1.2.0/24, which value represents the reported distance of th
e feasible successor?
256
532
768
1280

25 A sales representative is preparing to send sensitive information to corporat


e headquarters from a hotel room using the Internet. Prior to the trip, the IT s
taff made the necessary provisions to allow secure Internet access. What solutio
n was implemented for the sales representative?
VPN
Frame Relay
PPP with CHAP authentication
PPP with PAP authentication

26
Refer to the exhibit. The command that is displayed was run on a switch with 24
FastEthernet ports. Why are some ports missing from VLAN1?
The missing ports are administratively down.
The missing ports are not configured for STP.
The missing ports are not connected to any active device.
The missing ports are configured for trunk ports.

27
Refer to the exhibit. Which IP addressing scheme would be correct for the networ
k?
H1-172.18.0.10/16
H2-172.18.0.11/16
H3-172.18.0.12/16
H1-172.18.0.10/16
H2-172.19.0.10/16
H3-172.18.0.11/16
H1-172.18.0.10/16
H2-172.18.0.11/16
H3-172.19.0.11/16
H1-172.18.0.10/16
H2-172.19.0.11/16
H3-172.19.0.11/16

28 A journalist is using a wireless connection to transmit a video clip. Which i


s the best protocol to use to transport the video packets?
TCP
UDP
PPP
HDLC

29 What is the function of Inverse ARP in a Frame Relay network?


It maps the IP address to the MAC address.
It maps the MAC address to the DLCI.
It maps the DLCI to the remote IP address.
It maps the local IP address to the remote MAC address.

30 What is one major difference between RIPv1 and RIPv2?


RIPv2 has a higher maximum hop count than RIPv1.
RIPv1 utilizes broadcasts. RIPv2 utilizes multicasts.
RIPv1 supports discontiguous networks. RIPv2 does not.
RIPv1 updates are exchanged more often than RIPv2 updates.

Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment
Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing a
nd Switching in the Enterprise (Version 4.0)

Time Remaining:

31
Refer to the exhibit. Which access list, when applied inbound to the Fa0/0 inter
face of router R1, will prevent all IP traffic from the 172.16.1.16 network from
entering the 172.16.1.32 network while allowing all other traffic?
access-list 101 deny tcp 172.16.1.16 0.0.0.7 172.16.1.32 0.0.0.15
access-list 101 permit ip any any
access-list 101 deny ip 172.16.1.16 0.0.0.15 172.16.1.32 0.0.0.7
access-list 101 permit ip any any
access-list 10 deny ip 172.16.1.0 0.0.0.255 172.16.1.32 0.0.0.255
access-list 10 permit tcp any any
access-list 101 deny tcp 172.16.1.16 0.0.0.15 172.16.1.32 0.0.0.7
access-list 101 permit ip any any

32 A network administrator wishes to log ACL messages on a remote server. Which


two procedures should be completed for the remote logging to be successful? (Cho
ose two.)
Configure logging to a syslog server IP address.
Configure logging to the router loopback IP address.
Ensure that logging to the console is configured.
Apply the terminal monitor command on the router.
Restrict remote access by applying an ACL to all VTY lines.
Verify that the clock is set to the correct date, time, and time zone.

33
Refer to the exhibit. An administrator is adding a new router to the network. Th
e IP address 192.168.13.6/30 has been assigned to the connecting serial interfac
e on R2. What IP address must the administrator assign to the serial interface o
f the new router?
192.168.13.4/30
192.168.13.5/30
192.168.13.7/30
192.168.13.58/30
192.168.13.61/27
192.168.13.63/27
34 Where are EIGRP successor routes stored?
only in the routing table
only in the neighbor table
in the routing table and the topology table
in the routing table and the neighbor table

35
Refer to the exhibit. Host H2 and host H3 are able to ping the default gateway b
ut cannot ping host H1. Host H1 cannot ping either the default gateway, host H2,
or host H3. The network technician issues the show interfaces command on switch
S1 and notes that all unused switch ports are administratively down and ports F
a0/1, Fa0/3, and Fa0/4 are up with their line protocol up. However, S1 port Fa0/
2 is shown as down with the line protocol down error (disabled). What is a possi
ble cause for the inability of H1 to communicate with the network?
Routing is misconfigured on router R1.
The default gateway on H1 was misconfigured.
Host H1 is on a different subnet than hosts H2 and H3.
Port security on switch S1 port Fa0/2 is misconfigured.
The administrative VLAN on switch S1 does not have an IP address assigned.

36
Refer to the exhibit. Which VTP function will this switch perform?
It will create, change and share local VLAN information with other switches in
the XYZ domain.
It will forward to other switches the VLANs that are created in Switch1.
It will back up the VTP database for domain XYZ.
It will forward VTP configuration information for domain XYZ.

37
Refer to the exhibit. Routers R1 and R2 cannot communicate. What could be the ca
use of the problem?
Usernames on both routers R1 and R2 are misconfigured.
The passwords are identical on both routers.
The encapsulation command is entered incorrectly.
The IP addressing scheme has incorrect subnet masks.

38
Refer to the exhibit. Server7 has been added to the server farm network. The hos
ts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7
cannot ping the other servers connected to the switch. What is the cause of thi
s problem?
The Fa0/1 port on the switch should be in access mode.
The switch IP address is not on the same subnet as Server7.
The switch port used for Server7 is not in the same VLAN as Server2 and Server3
.
The Fa0/0 interface of the router has not been configured for subinterfaces to
support inter-VLAN routing.

39 Which two statements are true regarding a PPP connection between two Cisco ro
uters? (Choose two.)
LCP tests the quality of the link.
LCP manages compression on the link.
Only a single NCP is allowed between the two routers.
NCP terminates the link when data exchange is complete.
With CHAP authentication, the routers exchange plain text passwords.

40 Which three IP addresses are valid host addresses in the 10.200.0.0/20 networ
k? (Choose three.)
10.200.11.69
10.200.16.1
10.200.0.255
10.201.0.55
10.200.15.240
10.200.30.29

41 While using the Class A addressing scheme, a network administrator decides to


use the 255.255.254.0 subnet mask in the network configuration. How many host a
ddresses can be created for each subnetwork in this addressing scheme?

510
512
1022
1024

42 What are two features of a standard IP ACL? (Choose two.)


It permits or denies access based on the entire protocol.
It filters the packet based on the source IP address only.
It uses identification numbers between 100 and 199.
It can filter traffic based on port number.
It can only filter inbound traffic on an interface.
43
Refer to the exhibit. The routing protocols are configured with their default se
ttings. Which two statements are true about the path or paths that R1 will choos
e to the 192.168.2.0/24 network? (Choose two.)
If only EIGRP is configured on the network, only the path R1->R3 will be instal
led in the routing table.
If OSPF and RIPv2 are both configured on the network, only OSPF paths will be i
nstalled in the routing table.
If EIGRP and OSPF are both configured on the network, only EIGRP paths will be
installed in the routing table.
If EIGRP and RIPv2 are both configured on the network, only RIPv2 paths will be
installed in the routing table.
If RIPv2 is the routing protocol, the two equal cost paths (R1-R2-R3 and R1-R4-
R3) will be installed in the routing table.

44 What are two characteristics of a static route? (Choose two.)


A static route can be used by border routers to provide secure and stable paths
to the ISP.
By default, a static route is more secure than dynamic routing.
A static route automatically adapts to topology changes.
A static route can only be used with classful addressing schemes.
A static route creates processing overhead in a large network.

45 Which two STP states allow a switch to learn MAC addresses? (Choose two.)
blocking
listening
learning
disabled
forwarding

Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment
Take Assessment - DRSEnt Practice Final - CCNA Discovery: Introducing Routing a
nd Switching in the Enterprise (Version 4.0)

Time Remaining:

46
Refer to the exhibit. An administrator sees this error message after entering co
mmands to configure a router interface. Which command could the administrator en
ter that would avoid the error?
Router(config-if)# ip address 192.168.4.0/24
Router(config-if)# ip address 192.168.4.1 255.255.255.0
Router(config-if)# ip address 192.168.4.0 255.255.255.240
Router(config-if)# ip address 192.168.4.255 255.255.255.0

47
Refer to the exhibit. The network administrator has configured R1, R2, and R3 to
use RIPv2, and the network is fully converged. The hosts on the internal networ
k are able to access R2, but they are unable to access the Internet.
How can the administrator solve this problem?
Configure a default route on R3 and propagate it via the use of RIPv2 to all ro
uters.
Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3
.
Configure a default route on the ISP, and it will be automatically propagated t
o all routers.
Configure a default route on R1, and it will be automatically propagated to all
routers.

48 What are two advantages of using CHAP instead of PAP? (Choose two.)
less router overhead
more secure authentication
immunity from replay attacks
automatically configured usernames
support for both IP and non-IP based protocols
49
Refer to the exhibit. None of the hosts in network A are able to access the Inte
rnet. How can this problem be resolved?
Configure dynamic NAT instead of PAT.
Configure the access list for the correct network.
Include the ip nat pool command in the configuration.
Configure the ip nat inside command on the correct interface.

50
Refer to the exhibit. The network administrator enters the command that is shown
in the exhibit and then issues the show ip route command. The route added by th
e network administrator is missing from the routing table. What is the reason fo
r this?
This static route is providing a backup to the existing route to 192.168.1.0 /2
4.
The route is incorrectly configured.
Dynamic updates are always preferred over static routes.
The FastEthernet0/0 interface is administratively down.

Showing 4 of 4 <Prev Page: Introduction 1 2 3 4 Submit Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Tr
ademarks.

S-ar putea să vă placă și