Sponsor

CCNA 2 R&S Essentials Chapter 9 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 2 R&S Essentials Chapter 9 v5.0 Exam Answers 2014


A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0* 
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
Router1(config)# access-list 10 permit host 192.168.15.23*
2

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny ACE with a sequence number of 5.* 
Manually add the new deny ACE with a sequence number of 15.
Add a deny any any ACE to access-list 1.
Create a second access list denying the host and apply it to the same interface.
3
Launch PT   –    Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Why is the ACL not working?
The ACL is missing a deny ip any any ACE.
The ACL is applied in the wrong direction.
The access-list 105 command or commands are incorrect.
The ACL is applied to the wrong interface.* 
No ACL is needed for this scenario.

Which statement describes a characteristic of standard IPv4 ACLs?
They are configured in the interface configuration mode.
They can be created with a number but not with a name.
They filter traffic based on source IP addresses only.* 
They can be configured to filter traffic based on both source IP addresses and source ports.
5

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
access-list 105 permit ip host 10.0.70.23 host 10.0.54.5
access-list 105 permit tcp any host 10.0.54.5 eq www
access-list 105 permit ip any any
R1(config)# interface s0/0/0
R1(config-if)# ip access-group 105 out
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out ******************
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www
access-list 105 deny ip any host 10.0.54.5
access-list 105 permit ip any any ********************
access-list 105 permit tcp host 10.0.54.5 any eq www
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
R2(config)# interface gi0/0
R2(config-if)# ip access-group 105 in

What are two possible uses of access control lists in an enterprise network? (Choose two.)
limiting debug outputs* 
reducing the processing load on routers
controlling the physical status of router interfaces
controlling virtual terminal access to routers* 
allowing Layer 2 traffic to be filtered by a router

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 out
R1(config-line)# access-class 1 in* 
R1(config-if)# ip access-group 1 out
R1(config-if)# ip access-group 1 in

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Place extended ACLs close to the source IP address of the traffic.* 
For every inbound ACL placed on an interface, there should be a matching outbound ACL.
Place extended ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.* 
Filter unwanted traffic before it travels onto a low-bandwidth link.* 
Place standard ACLs close to the source IP address of the traffic.

Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)
deny icmp any any
deny ipv6 any any* 
permit icmp any any nd-ns* 
permit ipv6 any any
deny ip any any
permit icmp any any nd-na*
10 
Which two characteristics are shared by both standard and extended ACLs? (Choose two.)
Both filter packets for a specific destination host IP address.
Both can be created by using either a descriptive name or number.* 
Both include an implicit deny as a final ACE.* 
Both can permit or deny specific services by port number.
Both kinds of ACLs can filter based on protocol type.
11
Place the options in the following order:
the first valid host address in a subnet 
subnetwork address of a subnet with 14 valid host addresses 
all IP address bits must match exactly 
hosts in a subnet with the subnet mask 255.255.252.0 
addresses with a subnet mask of 255.255.255.248 
– not scored -
12 
Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server:

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out ******************
13 
What two functions describe uses of an access control list? (Choose two.)
ACLs provide a basic level of security for network access.* 
ACLs can control which areas a host can access on a network.* 
Standard ACLs can restrict access to specific applications and ports.
ACLs can permit or deny traffic based upon the MAC address originating on the router.
ACLs assist the router in determining the best path to a destination.
14 
Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?
an implicit permit of neighbor discovery packets* 
an implicit deny any any ACE
the use of named ACL entries
the use of wildcard masks
15 
Which three statements describe ACL processing of packets? (Choose three.)
Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is made.
A packet that has been denied by one ACE can be permitted by a subsequent ACE.
Each statement is checked only until a match is detected or until the end of the ACE list.* 
An implicit deny any rejects any packet that does not match any ACE.* 
A packet that does not match the conditions of any ACE will be forwarded by default.
A packet can either be rejected or forwarded as directed by the ACE that is matched.*
16 
Which statement describes a difference between the operation of inbound and outbound ACLs?
On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.* 
Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers.
17 
What is the only type of ACL available for IPv6?
named standard
numbered extended
named extended* 
numbered standard
18 
Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
permit tcp any host 2001:DB8:10:10::100 eq 23
permit tcp host 2001:DB8:10:10::100 any eq 23
permit tcp host 2001:DB8:10:10::100 any eq 25
permit tcp any host 2001:DB8:10:10::100 eq 25*
19

Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?
neighbor advertisements that are received from the ISP router
ICMPv6 packets that are destined to PC1* 
packets that are destined to PC1 on port 80
HTTPS packets to PC1
20 
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
4
8*
6
16
12
21 
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?
172.16.2.1 to 172.16.255.255
172.16.2.1 to 172.16.3.254
172.16.2.0 to 172.16.2.255
172.16.2.0 to 172.16.3.255*
Read more ...

CCNA 2 R&S Essentials Chapter 8 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 2 R&S Essentials Chapter 8 v5.0 Exam Answers 2014


Which OSPF component is identical in all routers in an OSPF area after convergence?
routing table
link-state database*
SPF tree
adjacency database

Which three statements describe features of the OSPF topology table? (Choose three.)
When converged, all routers in an area have identical topology tables.*
Its contents are the result of running the SPF algorithm.
After convergence, the table only contains the lowest cost route entries for all known networks.
It is a link-state database that represents the network topology.*
The topology table contains feasible successor routes.
The table can be viewed via the show ip ospf database command.*

A router is participating in an OPSFv2 domain. What will always happen if the dead interval expires before the router receives a hello packet from an adjacent DROTHER OPSF router?
SPF will run and determine which neighbor router is “down”.
OSPF will run a new DR/BDR election.
OSPF will remove that neighbor from the router link-state database.*
A new dead interval timer of 4 times the hello interval will start.

Which command will provide information specific to OSPFv3 routes in the routing table?
show ip route ospf
show ip route
show ipv6 route ospf*
show ipv6 route

Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an OSPF configuration?
0.0.0.32
0.0.0.31*
255.255.255.223
255.255.255.224

A network administrator enters the command ipv6 router ospf 64 in global configuration mode. What is the result of this command?
The OSPFv3 process will be assigned an ID of 64.*
The router will be assigned a router ID of 64.
The router will be assigned an autonomous system number of 64.
The reference bandwidth will be set to 64 Mb/s.

Fill in the blank.
The election of a DR and a BDR takes place on    ” multiaccess ”     networks, such as Ethernet networks.

Fill in the blank.
OSPF uses    ” cost ”    as a metric.

Which command should be used to check the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance?
show ip protocols*
show ip ospf interface
show ip ospf
show ip ospf neighbor
10 
Which OSPFv3 function works differently from OSPFv2?
authentication*
metric calculation
hello mechanism
election process
OSPF packet types
11
Launch PT  -  Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then complete the task.
What message is displayed on www.ciscoville.com?
The correct configuration on R1 is:
router ospf 10
network 192.168.2.0 0.0.0.255 area 0
network 10.0.10.0 0.0.0.3 area 0
The correct configuration on R2 is:
router ospf 10
network 10.0.10.0 0.0.0.3 area 0
network 10.0.10.4 0.0.0.3 area 0
network 172.16.5.0 0.0.0.255 area 0
Completion!*
Converged!
Success!
Finished
12 
Fill in the blank. Do not use abbreviations.
To quickly verify OSPFv3 configuration information including the OSPF process ID, the router ID, and the interfaces enabled for OSPFv3, you need to issue the command    ” show ipv6 protocols ”
13

Place the options in the following order:
Third precedence 
Fourth precedence 
- not scored -
First precedence 
Second precedence
14

Place the options in the following order:
This is where the details of the neighboring routers can be found. 
This is the algorithm used by OSPF. 
All the routers are in the backbone area. 
– not scored – 
This is where you can find the topology table. 
– not scored -
15 
Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.)
They both have unicast routing enabled by default.
They both use the exit interface address as the source address when sending OSPF messages.
They both use the same DR/BDR election process.*
They both support IPsec for authentication.
They both share the concept of multiple areas.*
They both are link-state protocols.*
16 
What is a function of OSPF hello packets?
to send specifically requested link-state records
to discover neighbors and build adjacencies between them*
to request specific link-state records from neighbor routers
to ensure database synchronization between routers
17

Place the options in the following order:
Neighbor ID of 3.3.3.3 
– not scored – 
Routing Process “ospf 10″ with ID 1.1.1.1 
Routing Protocol is “ospf 10″ 
BW 1544 Kbit/sec
18 
What are the two purposes of an OSPF router ID? (Choose two.)
to uniquely identify the router within the OSPF domain*
to enable the SPF algorithm to determine the lowest cost path to remote networks
to facilitate the transition of the OSPF neighbor state to Full
to facilitate router participation in the election of the designated router*
to facilitate the establishment of network convergence
19 
Which command will verify that a router that is running OSPFv3 has formed an adjacency with other routers in its OSPF area?
show ipv6 ospf neighbor*
show ipv6 route ospf
show ipv6 interface brief
show running-configuration
20 
Single area OSPFv3 has been enabled on a router via the ipv6 router ospf 20 command. Which command will enable this OSPFv3 process on an interface of that router?
ipv6 ospf 20 area 0*
ipv6 ospf 20 area 20
ipv6 ospf 0 area 20
ipv6 ospf 0 area 0
21 
When a network engineer is configuring OSPFv3 on a router, which command would the engineer issue immediately before configuring the router ID?
ipv6 router ospf 10*
ipv6 ospf 10 area 0
interface serial 0/0/1
clear ipv6 ospf process
22 
Which criterion is preferred by the router to choose a router ID?
the IP address of the highest configured loopback interface on the router
the router-id rid command*
the IP address of the highest active OSPF-enabled interface
the IP address of the highest active interface on the router
23 
Which OPSF packet contains the different types of link-state advertisements?
LSR
LSU*
DBD
LSAck
hello
24 
What does a Cisco router use automatically to create link-local addresses on serial interfaces when OSPFv3 is implemented?
an Ethernet interface MAC address available on the router, the FE80::/10 prefix, and the EUI-64 process*
the MAC address of the serial interface, the FE80::/10 prefix, and the EUI-64 process
the FE80::/10 prefix and the EUI-48 process
the highest MAC address available on the router, the FE80::/10 prefix, and the EUI-48 process
Read more ...

CCNA 2 R&S Essentials Chapter 7 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 2 R&S Essentials Chapter 7 v5.0 Exam Answers 2014


What is the purpose of the passive-interface command?
allows interfaces to share IP addresses
allows an interface to remain up without receiving keepalives
allows a router to send routing updates on an interface but not receive updates via that innterface
allows a routing protocol to forward updates out an interface that is missing its IP address
allows a router to receive routing updates on an interface but not send updates via that interface*

What two tasks do dynamic routing protocols perform? (Choose two.)
assign IP addressing
network discovery*
propagate host default gateways
update and maintain routing tables*
discover hosts

Fill in the blank. Do not abbreviate the answer.
The command   “version 2”   is used in RIP router configuration mode to enable the sending of subnet masks with the routing updates.
4

Refer to the exhibit. OSPF is used in the network. Which path will be chosen by OSPF to send data packets from Net A to Net B?
R1, R3, R5, R7*
R1, R4, R6, R7
R1, R2, R5, R7
R1, R3, R6, R7
R1, R3, R5, R6, R7

Which two statements are true regarding classless routing protocols? (Choose two.)
is supported by RIP version 1
allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology*
sends subnet mask information in routing updates*
reduces the amount of address space available in an organization
sends complete routing table update to all neighbors

What two actions result from entering the network 192.168.1.0 command in RIP configuration mode on a router? (Choose two.)
The neighboring routers are sent a request for routing updates.
The routing table is created in the RAM of the router.
Routing updates are sent through all the interfaces belonging to 192.168.1.0.*
The RIP process is stopped and all existing RIP configurations are erased.
The network address 192.168.1.0 is advertised to the neighbor routers.*
7

Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol? (Choose two.)
The command no auto-summary has been used on the RIP neighbor router.*
RIP version 1 is running on this router and its RIP neighbor.
RIP will advertise two networks to its neighbor.
The metric to the network 172.16.0.0 is 120.
RIP version 2 is running on this router and its RIP neighbor.*
8


In the context of routing protocols, what is a definition for time to convergence?
the capability to transport data, video, and voice over the same media
the amount of time for the routing tables to achieve a consistent state after a topology change*
a measure of protocol configuration complexity
the amount of time a network administrator needs to configure a routing protocol in a small- to medium-sized network
10 
Fill in the blank. Do not abbreviate.
When configuring RIPng, the ” default-information originate ” command instructs the router to propagate a static default route.​
11 
A destination route in the routing table is indicated with a code D. Which kind of route entry is this?
a route dynamically learned through the EIGRP routing protocol*
a route used as the default gateway
a network directly connected to a router interface
a static route
12

Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?
Serial0/0/0
Serial0/0/1*
GigabitEthernet0/0
GigabitEthernet0/1
13 
Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?
S 10.16.0.0/16 is directly connected, Ethernet 0/1
S 10.16.0.0/24 [1/0] via 192.168.0.9*
S 10.0.0.0/8 [1/0] via 192.168.0.2
S 10.0.0.0/16 is directly connected, Ethernet 0/0
14 
Which two requirements are necessary before a router configured with a link-state routing protocol can build and send its link-state packets? (Choose two.)
The router has determined the costs associated with its active links.*
The router has constructed an SPF tree.
The router has established its adjacencies.*
The routing table has been refreshed.
The router has built its link-state database.
15 
Which two requirements are used to determine if a route can be considered as an ultimate route in a router’s routing table? (Choose two.)
contain a next-hop IP address*
contain subnets
be a classful network entry
be a default route
contain an exit interface*
16 
What is different between IPv6 routing table entries compared to IPv4 routing table entries?
By design IPv6 is classless so all routes are effectively level 1 ultimate routes.*
IPv6 does not use static routes to populate the routing table as used in IPv4.
IPv6 routing tables include local route entries which IPv4 routing tables do not.
The selection of IPv6 routes is based on the shortest matching prefix, unlike IPv4 route selection which is based on the longest matching prefix.
17 
Which dynamic routing protocol was developed as an exterior gateway protocol to interconnect different Internet providers?
RIP
OSPF
EIGRP
BGP*
18 
Which route will a router use to forward an IPv4 packet after examining its routing table for the best match with the destination address?
a level 1 child route
a level 1 parent route
a level 2 supernet route
a level 1 ultimate route*
19 
Which two statements describe the OSPF routing protocol? (Choose two.)
used primarily as an EGP
has an administrative distance of 100
calculates its metric using bandwidth*
automatically summarizes networks at the classful boundaries
uses Dijkstra’s algorithm to build the SPF tree*
20 
Which two events will trigger the sending of a link-state packet by a link-state routing protocol? (Choose two.)
the requirement to periodically flood link-state packets to all neighbors
a change in the topology*
the initial startup of the routing protocol process*
the router update timer expiring
a link to a neighbor router has become congested
21

Place the options in the following order: 
[+] typically used on stub networks 
[+] less routing overhead 
[#] new networks are added automatically to the routing table 
[#] best choice for large networks
[+] Order does not matter within this group.
[#] Order does not matter within this group.
22

Place the options in the following order: 
[+] event-driven updates 
[+] building a topological map 
[+] fast convergence 
[#] bandwidth consumption 
[#] memory usage 
[#] CPU processing time
[+] Order does not matter within this group.
[#] Order does not matter within this group.
Read more ...

CCNA 2 R&S Essentials Chapter 6 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 2 R&S Essentials Chapter 6 v5.0 Exam Answers 2014


What are two advantages of static routing over dynamic routing? (Choose two.)
Static routing is more secure because it does not advertise over the network.*
Static routing is relatively easy to configure for large networks.
Static routing requires very little knowledge of the network for correct implementation.
Static routing uses fewer router resources than dynamic routing.*
Static routing scales well with expanding networks.
2

Refer to the exhibit. Which is the best way for PC A and PC B to successfully communicate with sites on the Internet?
Configure a default route from R1 to ISP and a static route from ISP to R1.*
Configure a static route from R1 to ISP and a dynamic route from ISP to R1.
Configure a routing protocol between R1 and ISP and advertise all the routes.
Configure a dynamic route from R1 to ISP and a static route from ISP to R1.
3

Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?
R1 and R2 must use a dynamic routing protocol.
R1 needs a default route to R2.
R2 needs a static route to the Internet.
R2 needs a static route to the R1 LANs.
R1 needs a static route to the R2 LAN.*
4

Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?
ip route 198.133.219.24 255.255.255.252
ip route 64.100.210.80 255.255.255.252
ip route 198.133.219.24 255.255.255.252
ip route 64.100.210.80 255.255.255.252 10
ip route 0.0.0.0 0.0.0.0 s0/0/0
ip route 0.0.0.0 0.0.0.0 s0/1/0
ip route 0.0.0.0 0.0.0.0 s0/0/0
ip route 0.0.0.0 0.0.0.0 s0/1/0 10 ******

What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?
generic route
destination route
dynamic route
default route*
6

Refer to the graphic. Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?
A(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0
A(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
A(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2*
A(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2

The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?
S 172.16.1.0 is directly connected, Serial0/0
S 172.16.1.0 [1/0] via 172.16.2.2*
C 172.16.1.0 [1/0] via 172.16.2.2
C 172.16.1.0 is directly connected, Serial0/0
8

Refer to the exhibit. The network administrator needs to configure a default route on the Border router. Which command would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets?
Border(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1*
Border(config)# ip route 0.0.0.0 0.0.0.0 198.133.219.5
Border(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0
Border(config)# ip route 0.0.0.0 0.0.0.0 198.133.219.6

Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?
to be the priority route in the routing table
to be used as a backup route*
to act as a gateway of last resort
to load-balance the traffic
10

Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?
ipv6 route 2001:db8:1::/65 2001:db8:1:3::1
ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2*
ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::1
ipv6 route ::/0 serial0/0/0
11

Refer to the exhibit. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?
R1(config)# ipv6 route 2001:db8:32::/64 G0/1 fe80::2
R1(config)# ipv6 route ::/0 G0/0 fe80::2
R1(config)# ipv6 route ::/0 G0/1 fe80::2*
R1(config)# ipv6 route 2001:db8:32::/64 G0/0
12 
Which two statements describe classful IP addresses? (Choose two.)
All subnets in a network are the same size.*
Only Class A addresses can be represented by high-order bits 100.
Three of the five classes of addresses are reserved for multicasts and experimental use.
The number of bits used to identify the hosts is fixed by the class of the network.*
Up to 24 bits can make up the host portion of a Class C address.
It is possible to determine which class an address belongs to by reading the first bit.
13 
A company has several networks with the following IP address requirements:
IP phones – 50
PCs – 70
IP cameras – 10
wireless access points – 10
network printers – 10
network scanners – 2
Which block of addresses would be the minimum to accommodate all of these devices if each type of device was on its own network?
172.16.0.0/23
172.16.0.0/24*
172.16.0.0/22
172.16.0.0/25
14 
What does VLSM allow a network administrator to do?
utilize one public IP address to translate multiple private addresses
utilize multiple different subnet masks in the same IP address space*
utilize one dynamic routing protocol throughout the entire network
utilize multiple routing protocols within an autonomous system
utilize one subnet mask throughout a hierarchical network
15 
What would be the best summary route for the following networks?
10.50.168.0/23
10.50.170.0/23
10.50.172.0/23
10.50.174.0/24
10.50.160.0/22
10.50.164.0/23
10.50.168.0/16
10.50.168.0/21*
10.50.168.0/22
10.50.168.0/23
16 
What is a valid summary route for IPv6 networks 2001:0DB8:ACAD:4::/64, 2001:0DB8:ACAD:5::/64, 2001:0DB8:ACAD:6::/64, and 2001:0DB8:ACAD:7::/64?
2001:0DB8:ACAD:0000::/63
2001:0DB8:ACAD:0000::/64
2001:0DB8:ACAD:0004::/62*
2001:0DB8:ACAD:0004::/63
17 
Which type of static route that is configured on a router uses only the exit interface?
directly connected static route*
fully specified static route
default static route
recursive static route
18 
Which three IOS troubleshooting commands can help to isolate problems with a static route? (Choose three.)
show ip route*
show ip interface brief*
ping*
tracert
show arp
show version
19

Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)
A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2*
A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0
A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2
A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2
A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2*
20 
What happens to a static route entry in a routing table when the outgoing interface is not available?
The router polls neighbors for a replacement route.
The router redirects the static route to compensate for the loss of the next hop device.
The route is removed from the table.*
The route remains in the table because it was defined as static.
21
Launch PT  Hide and Save PT
Open the PT activity. Perform the tasks in the activity instructions and then answer the question. What is the name of the web server that is displayed in the webpage?
Webserver10*
Main-Webserver
WWW-Server
MNSRV
22
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What IPv6 static route can be configured on router R1 to make a fully converged network?
ipv6 route 2001:db8:10:12::/64 S0/0/1*
ipv6 route 2001:db8:10:12::/64 2001:db8:32:77::1
ipv6 route 2001:db8:10:12::/64 S0/0/0
ipv6 route 2001:db8:10:12::/64 2001:db8:10:12::1
Read more ...

Advertisment