3.1 CCNA 2 - Voucher

1
Which statements are true regarding VTY passwords? (Choose two.)
VTY passwords must be encrypted.
All VTY lines do not need to use the same password.
A VTY password is required to establish telnet sessions.
The VTY password is set with the command line console 0.
The VTY password must be identical with the enable secret password.

2


Refer to the network and routing table entries shown in the graphic.
What will happen when a packet destined for network 192.66.7.0
is received by Router A?
It will be forwarded through interface S1.
It will be forwarded to the default route.
It will be directed toward the Internet.
It will be discarded.

3


Which command will produce the output shown in the graphic?
show cdp
show cdp neighbors
show cdp neighbors detail
show cdp detail

4


Router B received an interface configuration change. Suddenly,
it transmits a new update. Which of the following could have
triggered this update? (Choose two.)
Router B received a configuration change.
Router A sent a message requesting an update.
Router C came online after Router B sent the RIP update.
Router B received an error message indicating the last
update was not received.

5
How many Telnet sessions can take place simultaneously on a
router running a standard edition of the IOS?
4
5
8
10

6
Which of the following WAN connection services typically
use synchronous communications? (Choose two.)
circuit-switched
leased line
packet-switched
Ethernet
analog modem services

7
Which of the following will add a TFTP server as a fallback source
for a router to load an IOS image?
Router# boot system tftp 163.150.9.31 c2500-d-l.120-9
Router# copy run start
Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router# copy run start
Router# config t
Router(config)# boot system tftp c2500-d-l.120-9.
bin 163.150.9.31

Router(config)# exit
Router# copy run start
Router# config t
Router(config)# boot system tftp 163.150.9.31
c2500-d-l.120-9.bin

Router(config)# exit
Router# copy run start

8
What types of messages are sent periodically by devices
configured for CDP?
probes
beacons
signals
advertisements
routing updates
unicast

9
An administrator has made routing protocol changes to a
router's configuration. To ensure that the changes are implemented,
the active configuration is saved and the router is reloaded.
After the router has initialized, the output on the screen displays
"Would you like to enter the initial configuration dialog?[yes/no]:
" Why did this dialog appear?
There was a POST failure.
The incorrect IOS loaded.
There was an error in the startup configuration file.
The configuration register was set to ignore NVRAM.

10
Which command is used to redirect debug information to a
device that is connected though a Telnet session?
Router# monitor
Router# terminal redirect vty 0
Router# terminal monitor
Router# monitor output vty 0

11
After issuing the show interfaces command, a technician
notices the line "Serial1 is down, line protocol is down" in the output.
Which of the following are possible reasons for this message output?
(Choose three.)
There is a mismatch in the encapsulation type on both
ends of the link.
A Layer 1 issue exists.
An interface problem exists.
The clockrate was not set during configuration.
There is no usable media for the protocol.
Keepalive messages are not being sent.

12


Refer to the above graphic. When using RIP as the routing protocol,
how would Chicago use load balancing to route packets to New York?
(Choose two.)
by forwarding packets over paths of equal cost
by forwarding packets according to hop count and speed of the link
by determining which interface has the least traffic and sending
to it first
by first determining the speed of the links and then cycling packets
through the fastest links first
by cycling packets through interfaces and routes following the
same pattern (Router 1, 2, 3) each time

13
When would the ROM monitor mode be used? (Choose two.)
maintaining routing configuration settings
modifying the IOS image stored in Flash
running a limited IOS feature set
performing the bootstrap process

14
Which two statements are true about route metrics? (Choose two.)
The more factors that make up a metric, the greater the
flexibility to tailor network operations.
The larger the metric number, the better the path.
Routing protocols use metrics to send routing updates to
directly connected neighbors.
Bandwidth and delay are static metrics used by RIP v1.
Ticks, delay, and cost are metrics used by routing protocols.

15


Which of the following are valid static IP routes? (Choose three.)
RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1
RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1
RouterA(config)# ip route 192.168.3.0 255.255.255.0
192.168.2.2
RouterB(config)# ip route 192.168.1.0 255.255.255.0
192.168.2.2
RouterC(config)# ip route 192.168.2.0 255.255.255.0
192.168.4.1
RouterA(config)# ip route 192.168.4.0 255.255.255.0
192.168.2.1

16
Of the eight network users on the Human Resources
department LAN, one cannot connect to the file server.
The user's PC has successfully booted but can not see the network.
What should be checked first?
the PC power cord
the file server
the PC network interface card LEDs
the LAN switch in the wiring closet
the configuration of the router interface attached to the LAN

17
What can be determined from the partial output of the
show ip route
command displayed below? (Choose two.)

R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14,
Serial0/0

C 192.168.10.0/24 is directly connected, Serial0/0
The next update will be in 76 seconds.
The next update will be in 16 seconds.
The administrative distance is 120 and the metric is 1.
The metric is 120 and the administrative distance is 1.
200.200.200.0 is configured on Serial0/0.
192.168.10.2 is configured on Serial0/0.

18
Why is it useful to have an interface description?
A user can telnet to the router using the interface description.
The interface description is a shortcut way to edit the
running-config.
The interface description helps identify distant network
connections.
The interface will remain inactive until an interface
description is applied.

19


Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)
Updates start broadcasting every 30 seconds.
Updates start broadcasting every 90 seconds.
Link-state advertisements are flooded.
Link-state advertisements are sent only to
neighboring routers.
All routers note the change and adjust routes.
All routers ignore the change until the route becomes active again.

20


The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet.
Which commands must be configured in order to enable this communication? (Choose three.)
Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1
Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0
Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2
Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1
Utah(config)# ip route 172.31.3.0 255.255.255.0 s1
Utah(config)# ip route 0.0.0.0 0.0.0.0 s0

21
Which statement about datagram life is true?
Each router increments the TTL value of the datagram until
the maximum hop count of the routing protocol is reached.
The packet is then returned to the source.
The packet is dropped when the router count and the TTL
value match. The source is notified that transmission has failed.
Each router decreases the TTL value by one until it reaches zero.
The datagram is then discarded and a time exceeded for message
is sent to the source.
The destination device discards the datagram if the TTL
value is zero on arrival. An ICMP destination unreachable
message is sent back to the source.

22


The following access list has been created to prevent traffic
from host 204.204.7.122 from accessing the 201.100.11.0 network.

access-list 22 deny host 204.204.7.122
access-list 22 permit any


Which group of commands will properly place this access
list so that this host is denied access only to the 201.100.11.0 network?
RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 in
RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 out
RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 22 in
RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 in
RouterB(config)# interface s0/0
RouterB(config-if)# ip access-group 22 in
RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 out

23
A network administrator can establish a remote session to a
host using the Router> telnet 192.168.1.1 command but is
unsuccessful when using the Router> telnet Boston command
to connect to the same interface. Which of the following could be
the problem? (Choose two.)
The ip host table on the router is not configured.
The command telnet Boston was issued from the wrong
router prompt.
The routing table is missing.
Domain name services are not available.

24
Which of the following are functions of a router? (Choose three.)
packet switching
extension of network segments
segmentation of local area networks
selection of best path based on a logical addressing
selection of best path based on a physical addressing

25


The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?
The router will load c2500-js-l.112-26d.
The router will load c2500-d-l.120-9.
The router will load the IOS from ROM.
The router will boot into ROM monitor mode.

26


A network administrator trying to deny Telnet traffic from
the 192.5.5.0 network to the 201.100.11.0 network entered the
commands shown in the graphic. When monitoring the network,
the administrator noticed that Telnet packets were still passing
between those networks. What is the cause?
The router ignored this type of traffic because it required a
standard access list to be configured instead of an extended one.
The wrong port was configured for the ACL so Telnet traffic
was still allowed.
The access list has not been assigned to an interface.
The permit ip any any allowed all traffic to pass regardless
of the other statements listed in this ACL.

27


Refer to the network graphic. A packet needs to travel from
Router F to Router A. Which path would be selected by the
RIP routing protocol if the default metrics are used?
F, G, E, D, B, A
F, E, D, C, A
F, E, D, A
F, E, D, B, A

28
Which of the following is the correct flow of routines for a
router startup?
load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS

29
In the configuration register value 0x2104, which value
represents the boot field setting?
x
2
1
0
4

30
ACL statements operate in sequential, logical order.
If a condition match is true, the rest of the ACL statements
are not checked. If all of the ACL statements are unmatched,
what happens to the packet?
The packets will be placed in a buffer and forwarded when
the ACL is removed.
The packets will be sent to the source with an error
notification message.
The implicit permit any statement placed at the end of
the list will allow the packets to flow through uninhibited.
The implicit deny any statement placed at the end of the
list will cause the packets to be dropped.

31
Which of the following would cause the "Message Of The Day"
banner to appear? (Choose three.)
telnetting into the router
initiating a debug session
configuring a router for the first time
using the Aux port to check the current configuration
using the console port to check the current configuration

32


The administrator knows that port E0 on router B connects to a
small LAN without any routers. Which command can be executed
on router B to conserve bandwidth on port E0?
no update timers
holdown-timer 96
poison reverse E0
passive-interface E0
no triggered updates

33
When must a router serial interface be configured with the
clock rate
command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

34
What are the major characteristics of a wide area network?
(Choose three.)
connect devices separated by wide geographical
areas
includes technologies of FDDI and Ethernet
uses serial connections to access bandwidth
common carriers are needed for connections
type of connection between a router and a switch

35
If the config-register on a router is set to 0x2102,
where is the first place the router will look for boot
system commands?
RAM
ROM
Flash
NVRAM

36
Why would an administrator use the Telnet application when
troubleshooting a network? (Choose three.)
It can be used to verify the operation of application
layer software between the source and destination.
Telnet can use the ICMP protocol to verify a hardware
connection and network layer address.
It is the most complete testing mechanism available.
Remote networks may be accessed via a Telnet session for troubleshooting.
Time to Live values are used by Telnet to identify a failure of device between source and destination.

37


The network shown in the graphic is using RIP as the routing protocol.
Which of the following are true regarding the network discovery
process that will occur for this network? (Choose three.)
The Palm Beach router will show networks 192.168.7.0 and
192.168.8.0 as directly connected networks.
All of the routers will have direct knowledge of the exact
topology of the entire network.
The Key West router will forward routing table information to
the Miami and Palm Beach routers.
The Miami router will learn about network 192.168.1.0 from
the Key West router.
If network 192.168.4.0 becomes unavailable, the Key
West router will notify the other routers of this fact in the
next update.

38
Which of the following are characteristics of the Open Shortest
Path First (OSPF) routing protocol? (Choose two.)
functions as a link-state routing protocol
discards packets when the hop count is greater than 15
calculates the shortest path to a destination using the
Diffused Update Algorithm (DUAL)
created as a proprietary routing protocol
floods updates as topology changes occur
broadcasts routing updates every 90 seconds or as triggered
by topology changes

39
The following line was displayed in the output of the
show ip route
command.
R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0
What is the value of the routing metric?
3
12
20
30
120

40


Refer to the output from the show ip route command.
What can be concluded from the output of this router command?
A preferred route to the destination has not been set.
There are two equal cost paths to network 1.0.0.0.
Both interfaces are being used equally to route traffic.
A variance must be set to load-balance across multiple paths.

41
Which of the following are true statements about creating and
applying access lists? (Choose three.)
Access list entries should filter in the order from general to specific.
One access list per port per protocol per direction
is permitted.
Standard ACLs should be applied closest to the source while
extended ACLs should be applied closest to the destination.
There is an implicit deny at the end of all access lists.
Statements are processed sequentially from top to
bottom until a match is found.
The inbound keyword refers to traffic entering the network
from the router interface where the ACL is applied.

42
Which of the following are true regarding the setup configuration
mode? (Choose three.)
To abort the setup mode, use the CTRL+SHIFT+6 keys.
To abort the setup mode, use the CTRL+C keys.
Setup mode allows a complete configuration of the router.
To enter setup mode, use the privileged mode setup
command.
A router that does not find a valid IOS during the boot process
will start the system configuration dialog.
A router that does not find a valid configuration file
during the boot process will start the system configuration dialog.

43
Which of the following are necessary for basic network
communication to occur between hosts that will run such
applications as Telnet, web browsers, and e-mail? (Choose three.)
TCP/IP must be installed and properly configured
on each device.
Multiple subnets must be configured on the router to ensure
accurate delivery.
A default gateway must be configured for datagrams
to travel outside of the LAN.
The hosts must be directly connected to a switch to travel
outside of the LAN.
To ensure accurate delivery, a router must be
configured and accessible by hosts on the network.

44


Given the above topology, which of the following statements are true?
(Choose two.)
If RouterC receives a packet destined for 10.5.183.46,
it will be forwarded out interface Serial 1.
If RouterA receives a packet destined for 192.168.3.146,
it will be forwarded out interface Ethernet 0.
If RouterA receives a packet destined for 10.5.27.15,
it will be forwarded out interface Serial 1.
If RouterB receives a packet destined for 10.5.27.83,
it will be forwarded out interface Serial 0.
If RouterA receives a packet destined for 172.16.55.101,
it will be forwarded out interface Serial 1.

45
Host name resolution allows for the use of an alphanumeric
name to identify network devices. Select the answer that
displays the correct configuration syntax for creating a host name.
Router# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5
Router(config-if)# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5/24

0 comments: