Which three statements are true about the operation of a full-duplex Ethernet network? (Choose
A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. Ethernet hub ports are preconfigured for full-duplex mode.
D. In a full-duplex environment, the host network card must check for the availability of the
network media before transmitting.
E. The host network card and the switch port must be capable of operating in full-duplex mode.
Which OSI layer header contains the address of a destination host that is on another network?
E. data link
Which layer of the TCP/IP stack combines the OSI model physical and data link layers?
A. Internet layer
B. transport layer
C. application layer
D. network access layer
Which protocol uses a connection-oriented service to deliver files between end systems?
Refer to the exhibit. If the hubs in the graphic were replaced by switches, what would be virtually
A. broadcast domains
B. repeater domains
C. Ethernet collisions
D. signal amplification
E. Ethernet broadcasts
Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be
in the frame when it reaches host B?
Refer to the exhibit. HostX is transferring a file to the FTP server. Point A represents the frame as it
goes toward the Toronto router. What will the Layer 2 destination address be at this point?
Which network device functions only at Layer 1 of the OSI model?
Refer to the exhibit. The host in Kiev sends a request for an HTML document to the server in Minsk.
What will be the source IP address of the packet as it leaves the Kiev router?
Refer to the exhibit. As packets travel from Mary to Robert, which three devices will use the
destination MAC address of the packet to determine a forwarding path? (Choose three.)
Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into
a series of packets that will traverse all network devices. What addresses will populate these
packets as they are forwarded from Router1 to Router2?
Refer to the exhibit. A network device needs to be installed in the place of the icon labeled Network
Device to accommodate a leased line attachment to the Internet. Which network device and
interface configuration meets the minimum requirements for this installation?
A. a router with two Ethernet interfaces
B. a switch with two Ethernet interfaces
C. a router with one Ethernet and one serial interface
D. a switch with one Ethernet and one serial interface
E. a router with one Ethernet and one modem interface
Which transport layer protocol provides best-effort delivery service with no acknowledgment
Which layer of the OSI model controls the reliability of communications between network devices
using flow control, sequencing and acknowledgments?
Which statements are true regarding ICMP packets? (Choose two.)
A. They acknowledge receipt of TCP segments.
B. They guarantee datagram delivery.
C. TRACERT uses ICMP packets.
D. They are encapsulated within IP datagrams.
E. They are encapsulated within UDP datagrams.
Which statements accurately describe CDP? (Choose three.)
A. CDP is an IEEE standard protocol.
B. CDP is a Cisco proprietary protocol.
C. CDP is a datalink layer protocol.
D. CDP is a network layer protocol.
E. CDP can discover directly connected neighboring Cisco devices.
F. CDP can discover Cisco devices that are not directly connected.
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
What must occur before a workstation can exchange HTTP packets with a web server?
A. A UDP connection must be established between the workstation and its default gateway.
B. A UDP connection must be established between the workstation and the web server.
C. A TCP connection must be established between the workstation and its default gateway.
D. A TCP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. An ICMP connection must be established between the workstation and the web server.
How does TCP differ from UDP? (Choose two.)
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
A workstation has just resolved a browser URL to the IP address of a server. What protocol will the
workstation now use to determine the destination MAC address to be placed into frames directed
toward the server?
Refer to the exhibit. Host A is sending a packet to Host B for the first time. What destination MAC
address will Host A use in the ARP request?
What are two common TCP applications? (Choose two.)
Refer to the exhibit. SwitchA receives the frame with the addressing shown. According to the
command output also shown in the exhibit, how will SwitchA handle this frame?
A. It will drop the frame.
B. It will forward the frame out port Fa0/6 only.
C. It will flood the frame out all ports.
D. It will flood the frame out all ports except Fa0/3.
Refer to the exhibit. SwitchA receives the frame with the addressing shown in the exhibit.
According to the command output also shown in the exhibit, how will SwitchA handle this frame?
C. It will forward the frame out port Fa0/3 only.
D. It will flood the frame out all ports.
E. It will flood the frame out all ports except Fa0/3.
Refer to the exhibit. The exhibit is showing the topology and the MAC address table. Host A sends
a data frame to host D. What will the switch do when it receives the frame from host A?
A. The switch will add the source address and port to the MAC address table and forward the
frame to host D.
B. The switch will discard the frame and send an error message back to host A.
C. The switch will flood the frame out of all ports except for port Fa0/3.
D. The switch will add the destination address of the frame to the MAC address table and forward
the frame to host D.
Which two statements describe the operation of the CSMA/CD access method? (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of
the CSMA/CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period
has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize
with each other prior to transmitting data.
Refer to the exhibit. A network has been planned as shown. Which three statements accurately
describe the areas and devices in the network plan? (Choose three.)
A. Network Device A is a switch.
B. Network Device B is a switch.
C. Network Device A is a hub.
D. Network Device B is a hub.
E. Area 1 contains a Layer 2 device.
F. Area 2 contains a Layer 2 device.
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from
Refer to the exhibit. What must be configured to establish a successful connection from Host A to
switch SW-A through router RT-A?
A. VLAN 1 on RT-A
B. IP routing on SW-A
C. default gateway on SW-A
D. crossover cable connecting SW-A and RT-A
At which layer of the OSI model does the protocol that provides the information that is displayed
by the show cdp neighbors command operate?
Which two characteristics apply to Layer 2 switches? (Choose two.)
A. increases the number of collision domains
B. decreases the number of collision domains
C. implements VLAN
D. decreases the number of broadcast domains
E. uses the IP address to make decisions for forwarding data packets
Correct Answer: AC
Which two characteristics describe the access layer of the hierarchical network design model?
A. layer 3 support
B. port security
C. redundant components
Refer to the topology and switching table shown in the graphic. Host B sends a frame to Host C.
What will the switch do with the frame?
A. drop the frame
B. send the frame out all ports except port 0/2
C. return the frame to Host B
D. send an ARP request for Host C
E. send an ICMP Host Unreachable message to Host B
F. record the destination MAC address in the switching table and send the frame directly to Host
Which two options will help to solve the problem of a network that is suffering a broadcast storm?
A. a bridge
B. a router
C. a hub
D. a Layer 3 switch
E. an access point
A switch receives a frame on one of its ports. There is no entry in the MAC address table for the
destination MAC address. What will the switch do with the frame?
B. forward it out of all ports except the one that received it
C. forward it out of all ports
D. store it until it learns the correct port
Which address type does a switch use to make selective forwarding decisions?
A. source IP address
B. destination IP address
C. source and destination IP address
D. source MAC address
E. destination MAC address
Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is
shown arrives at the switch. What two operations will the switch perform when it receives this
frame? (Choose two.)
A. The switch will not forward a frame with this destination MAC address.
B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.
C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.
D. The frame will be forwarded out all active switch ports except for port fa0/0.
E. The frame will be forwarded out fa0/0 and fa0/1 only.
F. The frame will be forwarded out all the ports on the switch.
What does a host on an Ethernet network do when it is creating a frame and it does not have the
A. drops the frame
B. sends out a Layer 3 broadcast message
C. sends a message to the router requesting the address
D. sends out an ARP request with the destination IP address
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch
A. 4, 48
B. 48, 4
C. 48, 1
D. 1, 48
E. 4, 1
Refer to the exhibit. All devices attached to the network are shown. How many collision domains
are present in this network?
Refer to the exhibit. The ports that are shown are the only active ports on the switch. The MAC
address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What
two operations will the switch perform when it receives this frame? (Choose two.)
A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table.
B. The MAC address of 0000.00dd.dddd will be added to the MAC address table.
C. The frame will be forwarded out port fa0/3 only.
D. The frame will be forwarded out fa0/1, fa0/2, and fa0/3.
E. The frame will be forwarded out all the active ports.
Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.)
Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?
Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The
network administrator needs to design a classful addressing scheme to accommodate the three
subnets, with 30, 40 and 50 hosts, as shown. What subnet mask would accommodate this network?
Which two statements describe the IP address 10.16.3.65/23? (Choose two.)
A. The subnet address is 10.16.3.0 255.255.254.0.
B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.
Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are
available on each of the subnets?
Which one of the following IP addresses is the last valid host in the subnet using mask
What is the subnet address for the IP address 172.19.20.23/28?
What is the subnet address of 172.16.159.159/22?
An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.)
Refer to the exhibit. The internetwork is using subnets of the address 192.168.1.0 with a subnet
mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be
assigned to the FastEthernet interface on RouterA?
What is the network address for the host with IP address 192.168.23.61/28?
The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its
own collision domain. The expansion is to be as cost-effective as possible while still meeting the
requirements. Which three items will adequately fulfill the request? (Choose three).
A. one IP subnet with a mask of 255.255.254.0
B. two IP subnets with a mask of 255.255.255.0
C. seven 48-port hubs
D. seven 48-port switches
E. one router interface
F. seven router interfaces
What is the purpose of assigning an IP address to a switch?
A. provides local hosts with a default gateway address
B. allows remote management of the switch
C. allows the switch to respond to ARP requests between two hosts
D. ensures that hosts on the same LAN can communicate with each other
What two things does a router do when it forwards a packet? (Choose two.)
A. switches the packet to the appropriate outgoing interfaces
B. computes the destination host address
C. determines the next hop on the path
D. updates the destination IP address
E. forwards ARP requests
Refer to the exhibit. What is the simplest way to configure routing between the regional office
network 10.89.0.0/20 and the corporate network?
A. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2
B. router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2
C. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1
D. router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1
Refer to the exhibit. Which command would you use to configure a static route on Router1 to
network 192.168.202.0/24 with a nondefault administrative distance?
A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1
C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
What does administrative distance refer to?
A. the cost of a link between two neighboring routers
B. the advertised cost to reach a network
C. the cost to reach a network that is administratively set
D. a measure of the trustworthiness of a routing information source
Which IOS command is used to initiate a login into a VTY port on a remote router?
A. router# login
B. router# telnet
C. router# trace
D. router# ping
E. router(config)# line vty 0 5
F. router(config-line)# login
The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.
No routing protocols or other static routes are configured on the router. Which statement is true
about this command?
A. The interface with IP address 192.168.10.2 is on this router.
B. The command sets a gateway of last resort for the router.
C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.
D. The command creates a static route for all IP traffic with the source address 192.168.100.160.
Which two of these functions do routers perform on packets? (Choose two.)
A. Examine the Layer 2 headers of inbound packets and use that information to determine the
next hops for the packets
B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops
C. Examine the Layer 3 headers of inbound packets and use that information to determine the
next hops for the packets
D. Examine the Layer 3 headers of inbound packets and use that information to determine the
complete paths along which the packets will be routed to their ultimate destinations
E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to
valid next hops
F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to
their ultimate destinations.
Refer to the exhibit. Which two statements are correct? (Choose two.)
A. This is a default route.
B. Adding the subnet mask is optional for the ip route command.
C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond
D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP
E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network
can reach network 10.0.0.0.
Refer to the exhibit. If CDP is enabled on all devices and interfaces, which devices will appear in the
output of a show cdp neighbors command issued from R2?
A. R2 and R3
B. R1 and R3
C. R3 and S2
D. R1, S1, S2, and R3
E. R1, S1, S2, R3, and S3
Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information
between R1 and R2?
A. Configure the router with the cdp enable command.
B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.
C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces.
D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1
Which two commands will display the current IP address and basic Layer 1 and 2 status of an
interface? (Choose two.)
A. router#show version
B. router#show ip interface
C. router#show protocols
D. router#show controllers
E. router#show running-config
An administrator is in the process of changing the configuration of a router. What command will
allow the administrator to check the changes that have been made prior to saving the new
A. Router# show startup-config
B. Router# show current-config
C. Router# show running-config
D. Router# show memory
E. Router# show flash
F. Router# show processes
On a live network, which commands will verify the operational status of router interfaces?
A. Router# show interfaces
B. Router# show ip protocols
C. Router# debug interface
D. Router# show ip interface brief
E. Router# show start
Which router command will configure an interface with the IP address 10.10.80.1/19?
A. router(config-if)# ip address 10.10.80.1/19
B. router(config-if)# ip address 10.10.80.1 255.255.0.0
C. router(config-if)# ip address 10.10.80.1 255.255.255.0
D. router(config-if)# ip address 10.10.80.1 255.255.224.0
E. router(config-if)# ip address 10.10.80.1 255.255.240.0
F. router(config-if)# ip address 10.10.80.1 255.255.255.240
Refer to the exhibit. If the resume command is entered after the sequence that is shown in the
exhibit, which router prompt will be displayed?
What is the best practice when assigning IP addresses in a small office of six hosts?
A. Use a DHCP server that is located at the headquarters.
B. Use a DHCP server that is located at the branch office.
C. Assign the addresses by using the local CDP protocol.
D. Assign the addresses statically on each node.
Refer to the exhibit. Which default gateway address should be assigned to HostA?
Drag and Drop
Drag and Drop
Drag and Drop
In the configuration of NAT, what does the keyword overload signify?
A. When bandwidth is insufficient, some hosts will not be allowed to access network
B. The pool of IP addresses has been exhausted.
C. Multiple internal hosts will use one IP address to access external network resources.
D. If the number of available IP addresses is exceeded, excess traffic will use the specified
What happens when computers on a private network attempt to connect to the Internet through
a Cisco router running PAT?
A. The router uses the same IP address but a different TCP source port number for each
B. An IP address is assigned based on the priority of the computer requesting the connection.
C. The router selects an address from a pool of one-to-one address mappings held in the lookup
D. The router assigns a unique IP address from a pool of legally registered addresses for the
duration of the connection.
When configuring NAT, the Internet interface is considered to be what?
The ip helper-address command does what?
A. assigns an IP address to a host
B. resolves an IP address from a DNS server
C. relays a DHCP request across networks
D. resolves an IP address overlapping issue
Refer to the exhibit. The network administrator made the entries that are shown and then saved
the configuration. From a console connection, what password or password sequence is required
for the administrator to access privileged mode on Router1?
D. either cisco or sanfran
E. either cisco or sanjose
F. sanjose and sanfran
Drag and Drop
The following commands are entered on the router:
Burbank(config)# enable secret fortress
Burbank(config)# line con 0
Burbank(config-line)# password n0way1n
Burbank(config)# service password-encryption
What is the purpose of the last command entered?
A. to require the user to enter an encrypted password during the login process
B. to prevent the vty, console, and enable passwords from being displayed in plain text in the
C. to encrypt the enable secret password
D. to provide login encryption services between hosts attached to the router
What is the effect of using the service password-encryption command?
A. Only the enable password will be encrypted.
B. Only the enable secret password will be encrypted.
C. Only passwords configured after the command has been entered will be encrypted.
D. It will encrypt the secret password and remove the enable secret password from the
E. It will encrypt all current and future passwords.
An administrator has connected devices to a switch and, for security reasons, wants the
dynamically learned MAC addresses from the address table added to the running configuration.
What must be done to accomplish this?
A. Enable port security and use the keyword sticky.
B. Set the switchport mode to trunk and save the running configuration.
C. Use the switchport protected command to have the MAC addresses added to the
D. Use the no switchport port-security command to allow MAC addresses to be added to the
A company has placed a networked PC in a lobby so guests can have access to the corporate
directory. A security concern is that someone will disconnect the directory PC and re-connect their
laptop computer and have access to the corporate network. For the port servicing the lobby, which
three configuration steps should be performed on the switch to prevent this? (Choose three.)
A. Enable port security.
B. Create the port as a trunk port.
C. Create the port as an access port.
D. Create the port as a protected port.
E. Set the port security aging time to 0.
F. Statically assign the MAC address to the address table.
G. Configure the switch to discover new MAC addresses after a set time of inactivity.
Why would a network administrator configure port security on a switch?
A. to prevent unauthorized Telnet access to a switch port
B. to prevent unauthorized hosts from accessing the LAN
C. to limit the number of Layer 2 broadcasts on a particular switch port
D. block unauthorized access to the switch management interfaces
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Configure the server MAC address as a static entry of port security.
C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from
spoofing the server IP address.
Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem,
the administrator has entered the command shown in the exhibit. Based on the output shown,
what could be the problem?
A. The serial interface is configured for half duplex.
B. The serial interface does not have a cable attached.
C. The serial interface has the wrong type of cable attached.
D. The serial interface is configured for the wrong frame size.
E. The serial interface has a full buffer.
Download the complete collection of Exam's Real Q&As www.ensurepass.com
Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network
administrator is located in the NY office and has made a console connection to the NY router. After
establishing the connection they are unable to backup the configuration file and IOS of the NY
router to the TFTP server. What is the cause of this problem?
A. The NY router has an incorrect subnet mask.
B. The TFTP server has an incorrect IP address.
C. The TFTP server has an incorrect subnet mask.
D. The network administrator computer has an incorrect IP address.
If a host experiences intermittent issues that relate to congestion within a network while
remaining connected, what could cause congestion on this LAN?
A. half-duplex operation
B. broadcast storms
C. network segmentation
Refer to the exhibit. The junior network support staff provided the diagram as a recommended
configuration for the first phase of a four-phase network expansion project. The entire network
expansion will have over 1000 users on 14 network segments and has been allocated this IP address
192.168.1.1 through 192.168.5.255
192.168.100.1 through 192.168.100.255
What are three problems with this design? (Choose three.)
A. The AREA 1 IP address space is inadequate for the number of users.
B. The AREA 3 IP address space is inadequate for the number of users.
C. AREA 2 could use a mask of /25 to conserve IP address space.
D. The network address space that is provided requires a single network-wide mask.
E. The router-to-router connection is wasting address space.
F. The broadcast domain in AREA 1 is too large for IP to function.
Refer to the exhibit. Host A can communicate with Host B but not with Hosts C or D. How can the
network administrator solve this problem?
A. Configure Hosts C and D with IP addresses in the 192.168.2.0 network.
B. Install a router and configure a route to route between VLANs 2 and 3.
C. Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the
D. Enable the VLAN trunking protocol on the switch.
Refer to the exhibit. A network administrator has configured a Catalyst 2950 switch for remote
management by pasting into the console the configuration commands that are shown in the exhibit.
However, a Telnet session cannot be successfully established from a remote host. What should be
done to fix this problem?
A. Change the first line to interface fastethernet 0/1.
B. Change the first line to interface vlan 0/1.
C. Change the fifth line to ip default-gateway 192.168.17.241
D. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1.
E. Change the sixth line to line con 0.
Refer to the exhibit. The network administrator is testing connectivity from the branch router to
the newly installed application server. What is the most likely reason for the first ping having a
success rate of only 60 percent?
A. The network is likely to be congested, with the result that packets are being intermittently
B. The branch router had to resolve the application server MAC address.
C. There is a short delay while NAT translates the server IP address.
D. A routing table lookup delayed forwarding on the first two ping packets.
E. The branch router LAN interface should be upgraded to FastEthernet.
Select two options which are security Issues which need to be modified before RouterA is used?
A. unencrypted weak password is configured to protect privilege mode
B. inappropriate wording in banner message
C. the virtual terminal lines have a weak password configured
D. virtual terminal lines have a password, but it will not be used
E. configuration supports un-secure web server access
Select three options which are security issues with the current configuration of SwitchA. (Choose
A. privilege mode is protected with an unencrypted password
C. virtual terminal lines are protected only by a password requirement
D. both the username and password are weak
E. telnet connections can be used to remotely manage the switch
F. cisco user will be granted privilege level 15 by default
Which two of the following are true regarding the configuration of RouterA? (Choose two.)
A. at least 5 simultaneous remote connections are possible
B. only telnet protocol connections to RouterA are supported
C. remote connections to RouterA using telnet will succeed
D. console line connections will nevertime out due to inactivity
E. since DHCP is not used on Fa0/1 there is not a need to use the NAT protocol
Which of the following is true regarding the configuration of SwitchA?
A. only 5 simultaneous remote connections are possible
B. remote connections using ssh will require a username and password
C. only connections from the local network will be possible
D. console access to SwitchA requires a password
What is the subnet broadcast address of the LAN connected to Router1?
What is the bandwidth on the WAN interface of Router 1?
A. 16 Kbit/sec
B. 32 Kbit/sec
C. 64 Kbit/sec
D. 128 Kbit/sec
E. 512 Kbit/sec
F. 1544 Kbit/sec
Including the address on the Routed Ethernet interface, how many hosts can have IP addresses on
the LAN to which Routed is connected?
The hosts in the LAN are not able to connect to the Internet. Which commands will correct this
A. Router1(conf)#interface fa0/0
B. Router1(conf)#interface fa0/1
C. Router1(conf)#interface s0/0
D. Router1(conf)#interface s0/1
E. Router1(conf)#interface s0/0
Router1(conf-if)#ip address 10.11.12.13 255.255.255.252
F. Router1(conf)#interface s0/1
Router1(conf-if)#ip address 10.100.1.1 255.255.255.252
Refer to the exhibit. A router boots to the prompt shown in the exhibit. What does this signify,
and how should the network administrator respond?
A. This prompt signifies that the configuration file was not found in NVRAM. The network
administrator should follow the prompts to enter a basic configuration.
B. The prompt signifies that the configuration file was not found in flash memory. The network
administrator should use TFTP to transfer a configuration file to the router.
C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network
administrator should use TFTP to transfer an IOS image to the router.
D. The prompt signifies that the router could not authenticate the user. The network
administrator should modify the IOS image and reboot the router.
Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP
A. The router cannot verify that the Cisco IOS image currently in flash is valid
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. In order for the router to use the new image as the default, it must be the only IOS image in
Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location
that is shown? (Choose two.)
A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
B. Router1 is acting as a TFTP server for other routers.
C. Router1 cannot locate a valid IOS image in flash memory.
D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load an image from TFTP for management purposes.
Which two privileged mode Cisco IOS commands can be used to determine a Cisco router chassis
serial number? (Choose two)
A. show inventory
B. show flash:filesys
C. dir flash:|include chassis
D. show diag
E. show controllers
Which command helps a network administrator to manage memory by displaying flash memory
and NVRAM utilization?
A. show secure
B. show file systems
C. show flash
D. show version
Refer to the exhibit. What is the effect of the configuration that is shown?
A. It tells the router or switch to try establish an SSH connection first and if that fail to use
B. It configures a cisco network device to use the SSH protocol on incoming communications via
the virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures the virtual terminal lines with the password 030752180500.
E. It configures SSH globally for all logins.
Which commands is necessary to permit SSH and Telnet access to a Catalyst?
A. transport type all
B. transport output all
C. transport preferred all
D. transport input all
Refer to the exhibit. The networks connected to router R2 have been summarized as a
192.168.176.0/21 route and sent to R1. Which two packet destination addresses will R1 forward
to R2? (Choose two.)
Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose
A. With a network wide mask of 255.255.255.128, each interface does not require an IP
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on
a unique IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to
communicate with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to
communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
What is the principle reason to use a private IP address on an internal network?
A. Subnet strategy for private companies.
B. Manage and scale the growth of the internal network.
C. Conserve public IP addresses so that we do not run out of them.
D. Allow access reserved to the devices.
Which IP address can be assigned to an Internet interface?
What will happen if a private IP address is assigned to a public interface connected to an ISP?
A. Addresses in a private range will be not routed on the Internet backbone.
B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address in a valid IP address.
D. Several automated methods will be necessary on the private network.
E. A conflict of IP addresses happens, because other public routers can use the same range.
When is it necessary to use a public IP address on a routing interface?
A. Connect a router on a local network.
B. Connect a router to another router.
C. Allow distribution of routes between networks.
D. Translate a private IP address.
E. Connect a network to the Internet.
Refer to the exhibit. Which VLSM mask will allow for the appropriate number of host addresses
for Network A?
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with
the least amount of wasted addresses?
Refer to the exhibit. Which mask is correct to use for the WAN link between the routers that will
provide connectivity while wasting the least amount of addresses?
Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24
On the network 126.96.36.199/27, what is the last IP address that can be assigned to a host?
The ip subnet zero command is not configured on a router. What would be the IP address of
Ethernet0/0 using the first available address from the sixth subnet of the network 192.168.8.0/29?
For the network 192.0.2.0/23, which option is a valid IP address that can be assigned to a host?
How many addresses for hosts will the network 188.8.131.52/22 provide?
The network default gateway applying to a host by DHCP is 192.168.5.33/28. Which option is the
valid IP address of this host?
Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0?
The network administrator has asked you to check the status of the workstation's IP stack by
pinging the loopback address. Which address would you ping to perform this task?
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned
an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through
cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to
allow communications between the hosts? (Choose Two.)
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.
Refer to the exhibit. According to the routing table, where will the router send a packet destined
Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is
preventing Workstation B from reaching Server A?
A. The IP address for Server A is a broadcast address.
B. The IP address for Workstation B is a subnet address.
C. The gateway for Workstation B is not on the same subnet.
D. The gateway for Server A is not on the same subnet.
Which of the following host addresses are members of networks that can be routed across the
public Internet? (Choose Three.)
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to
network hosts? (Choose Three.)
A national retail chain needs to design an IP addressing scheme to support a nationwide network.
The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per
subnet. Working with only one Class B address, which of the following subnet masks will support
an appropriate addressing scheme? (Choose Two.)
Given the address 192.168.20.19/28, which of the following are valid host addresses on this
subnet? (Choose two.)
Which of the following IP addresses fall into the CIDR block of 184.108.40.206/22? (Choose three.)
The Ethernet networks connected to router R1 in the graphic have been summarized for router
R2 as 220.127.116.11/20. Which of the following packet destination addresses will R2 forward to R1,
according to this summary? (Choose two.)
Which of the following describe private IP addresses? (Choose two.)
A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization
The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP
addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is
configured on the router? (Choose Three.)
Which two sub networks would be included in the summarized address of 172.31.80.0 /20?
A. 172.31.17.4 /30
B. 172.31.51.16 /30
C. 172.31.64.0 /18
D. 172.31.80.0 /22
E. 172.31.92.0 /22
F. 172.31.192.0 /18
Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is
usable? (Choose three.)
Which of the following IP addresses can be assigned to the host devices? (Choose two.)
Refer to the exhibit. A network technician is asked to design a small network with redundancy.
The exhibit represents this design with all hosts configured in the same VLAN. What conclusions
can be made about this design?
A. The design will function as intended
B. Spanning-tree will need to be used.
C. The router will not accept the addressing scheme.
D. The connection between switches should be a trunk.
E. The router interfaces must be encapsulated with the 802.1Q protocol.
How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many
usable host addresses will there be per subnet?
A. 8 subnets, 31 hosts.
B. 8 subnets, 32 hosts.
C. 16 subnets, 30 hosts.
D. 16 subnets, 32 hosts.
E. A Class B address can't be subnetted into the fourth octet.
Refer to the exhibit. In this VLSM addressing scheme, what summary address would be sent from
A. 172.16.0.0 /16
B. 172.16.0.0 /20
C. 172.16.0.0 /24
D. 18.104.22.168 /16
E. 22.214.171.124 /17
F. 126.96.36.199 /16
Refer to the exhibit. Which is the most efficient summarization that R1 can use to advertise its
networks to R2?
You are working in a data center environment and are assigned the address range 10.188.31.0/23.
You are asked to develop an IP addressing plan to allow the maximum number of subnets with as
many as 30 hosts each. Which IP address range meets these requirements?
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct
Which address range efficiently summarizes the routing table of the addresses for router main?
Refer to the exhibit. A new subnet with 60 hosts has been added to the network. Which subnet
address should this network use to provide enough usable addresses while wasting the fewest
The network technician is planning to use the 255.255.255.224 subnet mask on the network.
Which three valid IP addresses can the technician use for the hosts? (Choose Three)
In the implementation of VLSM techniques on a network using a single Class C IP address, which
subnet mask is the most efficient for point-to-point serial links?
Refer to the exhibit. Host A cannot ping Host B. Assuming routing is properly configured. What
could be the cause of this problem?
A. Host A is not on the same subnet as its default gateway.
B. The address of Switch A is a subnet address.
C. The Fa0/0 interface on Router A is on a subnet that cannot be used.
D. The serial interfaces of the routers are not on the same subnet.
E. The Fa0/0 interface on Router B is using a broadcast address.
The network administrator is asked to configure 113 point-to-point links. Which IP addressing
scheme best defines the address range and subnet mask that meet the requirement and waste
the fewest subnet and host addresses?
A. 10.10.0.0/18 subnetted with mask 255.255.255.252
B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252
If an Ethernet port on a router was assigned an IP address of 188.8.131.52/20, what is the maximum
number of hosts allowed on this subnet?
Refer to the exhibit. Which address and mask combination a summary of the routes learned by
A. 192.168.25.0 255.255.255.240
B. 192.168.25.16 255.255.255.252
C. 192.168.25.0 255.255.255.252
D. 192.168.25.28 255.255.255.240
E. 192.168.25.16 255.255.255.240
F. 192.168.25.28 255.255.255.240
A network administrator receives an error message while trying to configure the Ethernet
interface of a router with IP address 10.24.24.24/29. Which statement explains the reason for it?
A. The address is a broadcast address.
B. The Ehernet interface is faulty.
C. VLSM-capable routing protocols must be enable first on the router.
D. This address is a network address.
Host A pings interface S0/0 on Router3, what will be the TTL value for that ping before it enter
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0
192.168.2.4? (Choose two.)
A. It establishes a static route to the 172.16.3.0 network.
B. It establishes a static route to the 192.168.2.0 network.
C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0
D. It configures the router to send any traffic for an unknown destination out the interface with
the address 192.168.2.4.
E. It uses the default administrative distance.
F. It is a route that would be used last if other routes to the same destination exist.
Refer to the exhibit. Assume that the routing protocol referenced in each choice below is
configured with its default settings and the given routing protocol is running on all the routers.
Which two conditional statements accurately state the path that will be chosen between
networks 10.1.0.0 and 10.3.2.0 for the routing protocol mentioned? (Choose two.)
A. If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5.
B. If OSPF is the routing protocol, the path will be from R1 to R2 to R5.
C. If OSPF is the routing protocol, the path will be from R1 to R5.
D. If RIPv2 is the routing protocol, the path will be from R1 to R3 to R4 to R5.
E. If RIPv2 is the routing protocol, the path will be from R1 to R5.
Refer to the exhibit. Which three statements are true about how router JAX will choose a path to
the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if
RIPv2 is the routing protocol.
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing
table by default.
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will
be installed in the routing table by default.
E. With EIGRP and OSPF both running on the network with their default configurations, the
EIGRP paths will be installed in the routing table.
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on
the network with their default configurations.
Refer to the exhibit. The network administrator must establish a route by which London
workstations can forward traffic to the Manchester workstations. What is the simplest way to
A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.
B. Configure a dynamic routing protocol on London to advertise summarized routes to
C. Configure a dynamic routing protocol on Manchester to advertise a default route to the
D. Configure a static default route on London with a next hop of 10.1.1.1.
E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2.
F. Configure Manchester to advertise a static default route to London.
Refer to the output of the corporate router routing table shown in the graphic. The corporate
router receives an IP packet with a source IP address of 192.168.214.20 and a destination address
of 192.168.22.3. What will the router do with this packet?
A. It will encapsulate the packet as Frame Relay and forward it out interface Serial 0/0.117.
B. It will discard the packet and send an ICMP Destination Unreachable message out interface
C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply message out
interface serial 0/0.102.
D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0.
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.
The network administrator connected to router Coffee via the console port, issued the show ip
route command, Based on the output of the show ip route command and the topology shown in
the graphic, what is the cause of the failure?
A. The network has not fully converged.
B. IP routing is not enabled.
C. A static route is configured incorrectly.
D. The FastEthernet interface on Coffee is disabled.
E. The neighbor relationship table is not correctly updated.
F. The routing table on Coffee has not updated.
Which command is used to configure a default route?
A. ip route 172.16.1.0 255.255.255.0 0.0.0.0
B. ip route 172.16.1.0 255.255.255.0 172.16.2.1
C. ip route 0.0.0.0 255.255.255.0 172.16.2.1
D. ip route 0.0.0.0 0.0.0.0 172.16.2.1
If IP routing is enabled, which two commands set the gateway of last resort to the default
gateway? (Choose two.)
A. ip default-gateway 0.0.0.0
B. ip route 172.16.2.1 0.0.0.0 0.0.0.0
C. ip default-network 0.0.0.0
D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E. ip route 0.0.0.0 0.0.0.0 172.16.2.1
What must be set correctly when configuring a serial interface so that higher-level protocols
calculate the best route?
What are two characteristics of RIPv2? (Choose two.)
A. classful routing protocol
B. variable-length subnet masks
C. broadcast addressing
D. manual route summarization
E. uses SPF algorithm to compute path
What two things will a router do when running a distance vector routing protocol? (Choose two.)
A. Send periodic updates regardless of topology changes.
B. Send entire routing table to all routers in the routing domain.
C. Use the shortest-path algorithm to the determine best path.
D. Update the routing table based on updates from their neighbors.
E. Maintain the topology of the entire network in its database.
Refer to the exhibit. Which (config-router) command will allow the network represented on the
interface to be advertised by RIP?
A. redistribute ethernet0
B. network ethernet0
C. redistribute 10.12.0.0
D. network 10.12.0.0
Refer to the exhibit. What information can be gathered from the output?
A. One router is running RIPv1.
B. RIP neighbor is 184.108.40.206.
C. The network contains a loop.
D. Network 10.10.1.0 is reachable.
Use the output from the router shown in the graphic above to determine which of the following
are correct. (Choose two.)
A. Router John uses a link-state routing protocol.
B. Router John will receive routing updates on the Serial0/0 interface.
C. Router John will receive routing updates on the Serial0/1 interface.
D. Router John will send routing updates out the Serial0/0 interface.
E. Router John will send routing updates out the FastEthernet0/0 interface.
F. Router John will send routing updates out the Serial0/1 interface.
Which series of commands will configure router R1 for LAN-to-LAN communication with router
R2? The enterprise network address is 220.127.116.11/24 and the routing protocol in use is RIPv2.
A. R1(config)# interface ethernet 0
R1(config-if)# ip address 18.104.22.168 255.255.255.192
R1(config-if)# no shutdown
B. R1(config)# interface ethernet 0
R1(config-if)# ip address 22.214.171.124 255.255.255.192
R1(config-if)# no shutdown
C. R1(config)# interface serial 0
R1(config-if)# ip address 126.96.36.199 255.255.255.252
R1(config-if)# clock rate 56000
D. R1(config)# interface serial 0
R1(config-if)# ip address 188.8.131.52 255.255.255.252
R1(config-if)# no shutdown
E. R1(config)# router rip
R1(config-router)# network 184.108.40.206
R1(config-router)# network 220.127.116.11
F. R1(config)# router rip
R1(config-router)# version 2
R1(config-router)# network 18.104.22.168
Which routing protocols can be used within the enterprise network shown in the diagram?
A. RIP v1
B. RIP v2
Which routing protocols will support the following IP addressing scheme? (Choose three.)
Network 1 - 192.168.10.0 /26
Network 2 - 192.168.10.64 /27
Network 3 - 192.168.10.96 /27
Network 4 - 192.168.10.128 /30
Network 5 - 192.168.10.132 /30
A. RIP version 1
B. RIP version 2
Refer to the graphic. Host 1 cannot receive packets from Host 2. Assuming that RIP v1 is the
routing protocol in use, what is wrong with the IP configuration information shown?
A. The fa0/1 interface of router R2 has been assigned a broadcast address.
B. The fa0/1 network on router R2 overlaps with the LAN attached to R1.
C. Host 2 has been assigned the incorrect subnet mask.
D. Host 1 has been configured with the 255.255.248.0 subnet mask.
E. Host 2 on router R2 is on a different subnet than its gateway.
Refer to the exhibit. Host A is to send data to Host B. How will Router1 handle the data frame
received from Host A? (Choose three.)
A. Router1 will strip off the source MAC address and replace it with the MAC address on the
forwarding FastEthernet interface.
B. Router1 will strip off the source IP address and replace it with the IP address on the
forwarding FastEthernet interface.
C. Router1 will strip off the destination MAC address and replace it with the MAC address of
D. Router1 will strip off the destination IP address and replace it with the IP address of Host B.
E. Router1 will forward the data frame out interface FastEthernet0/1.
F. Router1 will forward the data frame out interface FastEthernet0/2.
What can be determined from the line of show ip route output shown in the exhibit? (Choose
A. The next routing update can be expected in 35 seconds.
B. The IP address 10.10.10.6 is configured on S0/1.
C. The IP address 10.10.10.8 is configured on S0/1.
D. This route is using the default administrative distance.
E. The 10.10.10.8 network is two hops away from this router.
What is an appropriate use of a default route?
A. to provide routing to a local web server
B. to provide routing from an ISP to a stub network
C. to provide routing that will override the configured dynamic routing protocol
D. to provide routing to a destination that is not specified in the routing table and which is
outside the local network
Refer to the exhibit. Two routers have just been configured by a new technician. All interfaces are
up. However, the routers are not sharing their routing tables. What is the problem?
A. Split horizon is preventing Router2 from receiving routing information from Router1.
B. Router1 is configured for RIP version 2 and Router2 is configured for RIP version 1.
C. Router1 has an ACL that is blocking RIP version 2.
D. There is a physical connectivity problem between Router1 and Router2.
E. Router1 is using authentication and Router2 is not.
A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco
router. All three routers are using RIP version 1. The company network is using the block of
22.214.171.124/24. The company has decided it would be a good idea to split the network into
three smaller subnets and create the option of conserving addresses with VLSM. What is the best
course of action if the company wants to have 40 hosts in each of the three subnets?
A. Convert all the routers to EIGRP and use 126.96.36.199/27, 188.8.131.52/27, and
184.108.40.206/27 as the new subnetworks.
B. Maintain the use of RIP version 1 and use 220.127.116.11/27, 18.104.22.168/27, and
133.219.92/27 as the new subnetworks.
C. Convert all the routers to EIGRP and use 22.214.171.124/26, 126.96.36.199/26, and
133.219.192/26 as the new subnetworks.
D. Convert all the routers to RIP version 2 and use 188.8.131.52/26, 184.108.40.206/26, and
133.219.192/26 as the new subnetworks.
E. Convert all the routers to OSPF and use 220.127.116.11/28, 18.104.22.168/28, and
22.214.171.124/28 as the new subnetworks.
F. Convert all the routers to static routes and use 126.96.36.199/28, 188.8.131.52/28, and
184.108.40.206/28 as the new subnetworks.
What is the default routing update period for RIPv2?
A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds
Refer to the exhibit. S0/0 on R1 is configured as a multipoint interface to communicate with R2
and R3 in the hub-and-spoke Frame Relay topology. While testing this configuration, a technician
notes that pings are successfully from hosts on the 172.16.1.0/24 network to hosts on both the
172.16.2.0/25 and 172.16.0.2.128/25 networks. However, pings between hosts on the
172.16.2.0/25 and 172.16.2.128/25 network are not successful. What could explain this
A. The ip subnet-zero command has been issued on the R1 router.
B. The RIP v2 dynamic routing protocol cannot be used across a Frame Relay network.
C. Split horizon is preventing R2 from learning about the R3 networks and R3 from learning
about R2 networks.
D. The 172.16.2.0/25 and 172.16.2.128/25 networks are overlapping networks that can be seen
by R1, but not between R2 and R3.
E. The 172.16.3.0/29 network used on the Frame Relay links is creating a discontiguous
network between the R2 and R3 router subnetworks.
Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse
before that route is removed from the routing table?
A. 30 seconds
B. 60 seconds
C. 90 seconds
D. 180 seconds
E. 240 seconds
Refer to the exhibit. A network associate has configured the internetwork that is shown in the
exhibit, but has failed to configure routing properly. Which configuration will allow the hosts on
the Branch LAN to access resources on the HQ LAN with the least impact on router processing
and WAN bandwidth?
A. HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5
Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6
B. HQ(config)# router rip
HQ(config-router)# network 192.168.2.0
HQ(config-router)# network 172.16.0.0
Branch(config)# router rip
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.0
C. HQ(config)# router eigrp 56
HQ(config-router)# network 192.168.2.4
HQ(config-router)# network 172.16.25.0
Branch(config)# router eigrp 56
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.4
D. HQ(config)# router ospf 1
HQ(config-router)# network 192.168.2.4 0.0.0.3 area 0
HQ(config-router)# network 172.16.25.0 0.0.0.255 area 0
Branch(config)# router ospf 1
Branch(config-router)# network 192.168.1.0 0.0.0.255 area 0
Refer to the exhibit. The network administrator requires easy configuration options and minimal
routing protocol traffic. Which two options provide adequate routing table information for traffic
that passes between the two routers and satisfy the requests of the network administrator?
A. a dynamic routing procotol on InternetRouter to advertise summarized routers to
B. a dynamic routing procotol on CentralRouter to advertise summarized routers to
C. a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to
D. a dynamic routing procotol on InternetRouter to advertise all routes to CentralRouer
E. a dynamic routing procotol on CentralRouer to advertise all routes to InternetRouter
F. a static, default route on CentralRouter that directs traffic to InternetRouter
Which two statements describe the advantages to the use of RIP over the use of OSPF? (Choose
A. RIP requires less time to converge
B. RIP uses less bandwidth
C. RIP is less complex to configure
D. RIP demands fewer router resources
E. RIP has a more accurate metric
A router receives information about network 192.168.10.0/24 from multiple sources. What will
the router consider the most reliable information about the path to that network?
A. an OSPF update for network 192.168.0.0/16
B. a static router to network 192.168.10.0/24
C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next
D. a RIP update for network 192.168.10.0/24
E. a directly connected interface with an address of 192.168.10.254/24
F. a default route with a next hop address of 192.168.10.1
Refer to the exhibit. Explain how the routes in the table are being affected by the status change
on interface Ethernet0.
A. The router is poisoning the routes and multicasting the new path costs via interface
B. The router is receiving updates about unreachable networks from router that are connected
to interface Ethernet1.
C. The router is poisoning the routes and broadcasting the new path costs via interface
D. The router is requesting updates for these networks from routers that are connected to
What is the most likely reason for the disparity between the actual network numbers at the
branches and the routes in the routing table on Gateway-Router?
A. Branch-Router2 is configured to send both RIPv1 and RIPv2 updates.
B. Gateway-Router is configured to only receive RIPv2 updates.
C. Gateway-router is configured to receive only RIPv1 updates.
D. Branch-Router1 is configured to only send RIPv1 updates.
Which two statements are characteristics of a distance vector routing protocol? (Choose two)
A. RIP is an example of distance vector routing protocols.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks.
E. Convergence is usually faster than with link state protocols.
F. Each router has its own view of the topology.
Which of the following are true regarding the debug output shown in the graphic? (Choose Two)
A. This router was configured with the commands:
B. This router was configured with the commands:
C. Network 10.0.0.0 will be displayed in the routing table.
D. Network 192.168.168.0 will be displayed in the routing table.
E. This router was configured with the commands:
F. split-horizon was disabled on this router.