CCNA3 Exam
CCNA3 Exam
CCNA3 Exam
The failure of a switch block will not impact all end users.
This is network application software that prevents the failure of a single network device.
Which characteristic would most influence a network design engineer to select a multilayer
switch over a Layer 2 switch?
ability to have multiple forwarding paths through the switched network based on VLAN
number(s)
What are three access layer switch features that are considered when designing a network?
(Choose three.)
failover capability
forwarding rate
port density
speed of convergence
In a large enterprise network, which two functions are performed by routers at the distribution
layer? (Choose two.)
A set of switches is being connected in a LAN topology. Which STP bridge priority value will
make it least likely for the switch to be selected as the root?
4096
32768
61440
65535
Refer to the exhibit. Which switch will be the root bridge after the election process is
complete?
S1
S2
S3
S4
Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-
enabled network?
A network administrator enters the spanning-tree portfast bpduguard default command. What
is the result of this command being issued on a Cisco switch?
Any trunk ports will be allowed to connect to the network immediately, rather than waiting to
converge.
Any switch port that has been configured with PortFast will be error-disabled if it
receives a BPDU.
Any switch port that receives a BPDU will ignore the BPDU message.
Refer to the exhibit. A network administrator is configuring PVST+ for the three switches.
What will be a result of entering these commands?
Refer to the exhibit. Which destination MAC address is used when frames are sent from the
workstation to the default gateway?
A network administrator is analyzing the features that are supported by different first-hop
router redundancy protocols. Which statement is a feature that is associated with GLBP?
It is nonproprietary.
A network administrator is analyzing the features that are supported by different first-hop
router redundancy protocols. Which statement describes a feature that is associated with
HSRP?
HSRP is nonproprietary.
enabling traffic from multiple VLANs to travel over a single Layer 2 link
creating one logical link by using multiple physical links between two LAN switches
Which mode configuration setting would allow formation of an EtherChannel link between
switches SW1 and SW2 without sending negotiation traffic?
SW1: on
SW2: on
SW1: desirable
SW2: desirable
SW1: auto
SW2: auto
SW1: auto
SW2: auto
SW1: passive
SW2: active
Which two channel group modes would place an interface in a negotiating state using PAgP?
(Choose two.)
on
desirable
active
auto
passive
What are two requirements to be able to configure an EtherChannel between two switches?
(Choose two.)
The interfaces that are involved need to be contiguous on the switch.
Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)
What two conditions have to be met in order to form a cluster that includes 5 access points?
(Choose two.)
A remote classroom can successfully access video-intensive streaming lectures via wired
computers. However, when an 802.11n wireless access point is installed and used with 25
wireless laptops to access the same lectures, poor audio and video quality is experienced.
Which wireless solution would improve the performance for the laptops?
Adjust the wireless NICs in the laptops to operate at 10GHz to be compatible with 802.11n.
Which wireless network topology is being configured by a technician who is installing a
keyboard, a mouse, and headphones, each of which uses Bluetooth?
ad hoc mode
hotspot
infrastructure mode
mixed mode
What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)
At a local college, students are allowed to connect to the wireless network without using a
password. Which mode is the access point using?
network
open
passive
shared-key
WPA
WEP
Users on an IEEE 801.11n network are complaining of slow speeds. The network
administrator checks the AP and verifies it is operating properly. What can be done to improve
the wireless performance in the network?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
A network engineer is implementing security on all company routers. Which two commands
must be issued to force authentication via the password 1C34dE for all OSPF-enabled
interfaces in the backbone area of the company network? (Choose two.)
Refer to the exhibit. When the show ip ospf neighbor command is given from the R1#
prompt, no output is shown. However, when the show ip interface brief command is given, all
interfaces are showing up and up. What is the most likely problem?
The ISP has not configured a static route for the ABC Company yet.
R1 has not sent a default route down to R2 by using the default-information originate
command.
What are two methods to make the OSPF routing protocol more secure? (Choose two.)
When feasible, create a VPN tunnel between each OSPF neighbor adjacency.
Use the passive-interface command on LAN interfaces that are connected only to end-
user devices.
Enable the OSPFv3 routing process on the interface connected to the remote LAN.
Use the network command to configure the LAN network under the global routing process.
There is a problem with the OSPFv3 adjacency between the local router and the router
that is using the neighbor ID 2.2.2.2.
The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for
the router databases to be fully synchronized.
The dead time must be higher than 30 for all routers to form neighbor adjacencies.
The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully
synchronized routing databases.
type 1
type 2
type 3
type 4
type 5
Refer to the exhibit. What can be concluded about network 192.168.1.0 in the R2 routing
table?
This network has been learned from an internal router within the same area.
What are two features of OSPF interarea route summarization? (Choose two.)
Type 3 and type 5 LSAs are used to propagate summarized routes by default.
Refer to the exhibit. A company has migrated from single area OSPF to multiarea. However,
none of the users from network 192.168.1.0/24 in the new area can be reached by anyone in
the Branch1 office. From the output in the exhibit, what is the problem?
There are no interarea routes in the routing table for network 192.168.1.0.
The router has not established any adjacencies with other OSPF routers.
When are EIGRP update packets sent?
Which two statements are correct about EIGRP acknowledgment packets? (Choose two.)
The packets are used to discover neighbors that are connected on an interface.
Refer to the exhibit. If router B is to be configured for EIGRP AS 100, which configuration
must be entered?
An administrator issues the router eigrp 100 command on a router. What is the number 100
used for?
as the length of time this router will wait to hear hello packets from a neighbor
A network administrator wants to verify the default delay values for the interfaces on an
EIGRP-enabled router. Which command will display these values?
show ip protocols
show running-config
show interfaces
show ip route
Which two parameters does EIGRP use by default to calculate the best path? (Choose two.)
delay
MTU
reliability
bandwidth
Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)
When will a router that is running EIGRP put a destination network in the active state?
when there is an EIGRP message from the successor of the destination network
when the connection to the successor of the destination network fails and there is no
feasible successor available
Which address is used by an IPv6 EIGRP router as the source for hello messages?
Refer to the exhibit. A network administrator issues the show ipv6 eigrp neighbors command.
Which conclusion can be drawn based on the output?
R1 has two neighbors. They connect to R1 through their S0/0/0 and S0/0/1 interfaces.
The neighbor with the link-local address FE80::5 is the first EIGRP neighbor that is learned
by R1.
If R1 does not receive a hello packet from the neighbor with the link-local address FE80::5 in
2 seconds, it will declare the neighbor router is down.
Refer to the exhibit. Which route or routes will be advertised to the router ISP if
autosummarization is enabled?
10.0.0.0/8
10.1.0.0/16
10.1.0.0/28
10.1.1.0/24
10.1.2.0/24
10.1.3.0/24
10.1.4.0/28
By default, how many equal cost routes to the same destination can be installed in the routing
table of a Cisco router?
16
32
When a Cisco router is configured with fast-switching, how are packets distributed over
equal-cost paths?
on a per-packet basis
on a per-interface basis
on a per-path-load basis
on a per-destination basis
Refer to the exhibit. Router CiscoVille has been partially configured for EIGRP
authentication. What is missing that would allow successful authentication between EIGRP
neighbors?
The same key number must be used on any EIGRP neighbor routers.
The CiscoVIlle router requires a second keychain to function correctly when using two
interfaces for EIGRP authentication.
Which two conditions should the network administrator verify before attempting to upgrade a
Cisco IOS image using a TFTP server? (Choose two.)
Verify the name of the TFTP server using the show hosts command.
Verify that the TFTP server is running using the tftpdnld command.
Verify that the checksum for the image is valid using the show version command.
Verify connectivity between the router and TFTP server using the ping command.
Verify that there is enough flash memory for the new Cisco IOS image using the show
flash command.
Which requirement should be checked before a network administrator performs an IOS image
upgrade on a router?
The desired IOS image file has been downloaded to the router.
Refer to the exhibit. A network administrator is attempting to upgrade the IOS system image
on a Cisco 2901 router. After the new image has been downloaded and copied to the TFTP
server, what command should be issued on the router before the IOS system image is
upgraded on the router?
dir flash:
ping 10.10.10.1
ping 10.10.10.2
It is a way to compress an existing IOS so that a newer IOS version can be co-installed on a
router.
Which Cisco IOS Software Release 15.0 technology pack is shipped with a permanent license
on all Cisco ISR G2 devices?
IPBase
DATA
Unified Communications
Security
A network administrator issues the command R1(config)# license boot module c1900
technology-package securityk9 on a router. What is the effect of this command?
The IOS will prompt the user to provide a UDI in order to activate the license.
The Evaluation Right-To-Use license for the Security technology package is activated.
What two license states would be expected on a new Cisco router once the license has been
activated? (Choose two.)
License State: On
2
Refer to the exhibit. What are two consequences of issuing the
displayed commands? (Choose two.)
3
What two STP features are incorporated into Rapid PVST+? (Choose
two.)
loop guard
BPDU guard
BPDU filter
UplinkFast *
BackboneFast*
PortFast
4
What are two reasons to enable OSPF routing protocol
authentication on a network? (Choose two.)
6
What are three characteristics of the Cisco IOS Software Release
12.4T train? (Choose three.)
It receives regular software fixes that are synchronized with the 12.4
Mainline train.*
It has a number of embedded technology packages.
It requires the activation of a license.
It is updated with new features and hardware support. *
It is derived from the Cisco IOS Software Release 12.4 Mainline
train.*
It has extended maintenance new feature releases approximately every 16 to
20 months.
8
Refer to the exhibit. How did this router learn of the highlighted
route in the routing table?
9
When the show spanning-tree vlan 33 command is issued on a
switch, three ports are shown in the forwarding state. In which two
port roles could these interfacesfunction while in the forwarding
state? (Choose two.)
blocked
disabled
designated *
alternate
root*
10
Which method of wireless authentication is currently considered to
be the strongest?
WEP
WPA2 *
WPA
shared key
open
11
When a range of ports is being configured for EtherChannel, which
mode will configure LACP on a port only if the port receives LACP
packets from another device?
passive*
auto
desirable
active
12
While attending a conference, participants are using laptops for
network connectivity. When a guest speaker attempts to connect to
the network, the laptop fails to display any available wireless
networks. The access point must be operating in which mode?
active*
passive
mixed
open
13
interface.
14
Which model and which two characteristics would be more likely to
be considered in purchasing an access layer switch, as compared to
buying switches that operate at the other layers of the Cisco
hierarchical design model? (Choose three.)
RSTP
EtherChannel
PoE *
number of ports *
Catalyst 4500X
Catalyst 2960
15
What is the purpose of issuing the ip ospf message-digest-key key
md5 password command and the area area-id authentication
message-digest command on a router?
16
Which two metric weights are set to one by default when costs in
EIGRP are being calculated? (Choose two.)
k4
k3*
k2
k1*
k6
k5
17
What are two reasons to install a single 48-port fixed configuration
switch, rather than two 24-port fixed configuration switches, in a
wiring closet that supports two classrooms? (Choose two.)
18
In the Cisco hierarchical design model, which layer is more likely to
have a fixed configuration switch than the other layers?
access *
internet
transport
core
distribution
19
Which step supports disaster recovery and should be performed first
when upgrading an IOS system image on a Cisco router?
20
Refer to the exhibit. Two routers have been configured to use EIGRP.
Packets are not being forwarded between the two routers. What
could be the problem?
An incorrect IP address was configured on a router interface. *
The default bandwidth was used on the routers.
The routers were not configured to monitor neighbor adjacency changes.
EIGRP does not support VLSM.
21
22
trunking
EtherChannel *
PortFast
HSRP
24
In which mode is the area area-id range address mask command
issued when multiarea OSPF summarization is being configured?
25
Open the PT Activity. Perform the tasks in the activity instructions
and then answer the question.
Why are users in the OSPF network not able to access the Internet?
26
Which statement describes the Autonomous System number that is
used in EIGRP?
Refer to the exhibit. Why are some of the entries marked O IA?
They correspond to entries that are learned from other routing protocols.
They are default routes that are learned from other routing protocols.
They represent summary routes that are internal to the area.
They correspond to entries that are learned from other areas.*
28
Which command can be issued on a router to display information
about the successors and feasible successors for a destination
network when EIGRP is used as the routing protocol?
29
What does an OSPF area contain?
30
A network administrator is configuring the authentication for EIGRP
routing. The administrator enters these commands:
31
When EtherChannel is configured, which mode will force an interface
into a port channel without exchanging aggregation protocol
packets?
desirable
on *
active
auto
32
In wireless networks what is a disadvantage of using mixed mode on
an AP?
33
The customer of a networking company requires VPN connectivity for
workers who must travel frequently. To support the VPN server, the
customer router must be upgraded to a new Cisco IOS software
version with the Advanced IP Services feature set. What should the
field engineer do before copying the new IOS to the router?
Issue the show version and the show flash commands to ensure that
the router has enough memory and file space to support the new IOS
image.*
Delete the currently installed IOS by using the erase flash: command, and
reload the router
Set the router to load the new IOS image file directly from the TFTP server on
the next reboot.
34
35
A network technician is attempting to upgrade an IOS system image
on a Cisco 1941 router. Which command should the technician issue
to verify the presence of sufficient free space in flash for the new
image on the router that is being upgraded?
36
When would a network engineer configure an access point with
channel bonding?
37
Which two parameters must match on the ports of two switches to
create a PAgP EtherChannel between the switches? (Choose two.)
MAC address
port ID
VLAN information *
speed *
PAgP mode
38
Which statement describes a characteristic of a Cisco Enterprise
Architecture module?
Server Farm and Data Center Module are submodules of the Enterprise Edge
module.
The Enterprise Campus only consists of the core layer of the campus
infrastructure.
The Enterprise Edge consists of the Internet, VPN, and WAN modules
connecting the enterprise with the service providers network. *
The Service Provider Edge provides QoS, policy reinforcement, service levels,
and security.
39
What is a wireless security mode that requires a RADIUS server to
authenticate wireless users?
shared key
personal
WEP
enterprise*
40
Refer to the exhibit. The routing table on R2 does not include all
networks that are attached to R1. The network administrator verifies
that the network statement is configured to include these two
networks. What is a possible cause of the issue?
41
Which wireless network topology would be used by network
engineers to provide a wireless network for an entire college
building?
hotspot
ad hoc
infrastructure *
mixed mode
42
44
A laptop cannot connect to a wireless access point. Which two
troubleshooting steps should be taken first? (Choose two.)
45
BGP
RIPv2
OSPF *
EIGRP
48
What are two advantages of EtherChannel? (Choose two.)
49
A network administrator is troubleshooting the EIGRP routing
between two routers, R1 and R2. The problem is found to be that
only some, but not all networks attached to R1 are listed in the
routing table of router R2. What should the administrator investigate
on router R1 to determine the cause of the problem?
Does the hello interval setting match the hello interval on R2?
Does the AS number match the AS number on R2?
Do the network commands include all the networks to be advertised?
*
Is the interface connected to R2 configured as a passive interface?
50
25574400 bytes
33591768 bytes
249856000 bytes
221896413 bytes*
====================
Which port role is assigned to the switch port that has the lowest
cost to reach the root bridge?
disabled port
non-designated port
root port*
designated port
CCNA 3 Scaling Networks Chapter 1 v5.0 Exam
Answers 2014
1
What are two benefits of extending access layer connectivity to
users through a wireless medium? (Choose two.)
reduced costs*
increased flexibility*
2
A network engineer is reviewing a network design that uses a fixed
configuration enterprise router that supports both LAN and WAN
connections. However, the engineer realizes that the router does not
have enough interfaces to support growth and network expansion.
Which type of device should be used as a replacement?
a PoE device
a modular router*
a Layer 3 switch
3
What are two functions of a router? (Choose two.)
4
Which design feature will limit the size of a failure domain in an
enterprise network?
the purchase of enterprise equipment that is designed for large traffic volume
the installation of redundant power supplies
5
How can an enterprise network be designed to optimize bandwidth?
6
As the network administrator you have been asked to implement
EtherChannel on the corporate network. What does this
configuration consist of?
7
Which technology is required when switched networks are designed
to include redundant links?
virtual LANs
link aggregation
8
Which statement describes a characteristic of Cisco Catalyst 2960
switches?
Refer to the exhibit. Which devices exist in the failure domain when
switch S3 loses power?
S4 and PC_2
S1 and S4
10
Immediately after a router completes its boot sequence, the network
administrator wants to check the routers configuration. From
privileged EXEC mode, which of the following commands can the
administrator use for this purpose? (Choose two.)
show flash
show startup-config*
show NVRAM
show version
show running-config*
11
A network administrator is planning redundant devices and cabling
in a switched network to support high availability. Which benefit will
implementing the Spanning Tree Protocol provide to this design?
Network access can be expanded to support both wired and wireless devices.
12
Which two requirements must always be met to use in-band
management to configure a network device? (Choose two.)
13
Place the options in the following order:
connectivity
not scored
identification
security
14
In which situation would a network administrator install a Cisco
Nexus Series or Cisco Catalyst 6500 Series switch to promote
infrastructure scalability?
15
Which statement describes a characteristic of Cisco Meraki switches?
They are service provider switches that aggregate traffic at the edge of the
network.
to display routing table and other information about directly connected Cisco
devices
to display line status and other information about directly connected Cisco
devices
17
What is a characteristic of in-band device management?
18
Which two features of enterprise class equipment assists an
enterprise network in maintaining 99.999 percent up-time? (Choose
two.)
failure domains
services module
collapsed core
failover capabilities*
CCNA 3 Scaling Networks Chapter 2 v5.0 Exam
Answers 2014
1
Which protocol provides up to 16 instances of RSTP, combines many
VLANs with the same physical and logical topology into a common
RSTP instance, and provides support for PortFast, BPDU guard, BPDU
filter, root guard, and loop guard?
STP
Rapid PVST+
PVST+
MST*
2
Which two types of spanning tree protocols can cause suboptimal
traffic flows because they assume only one spanning-tree instance
for the entire bridged network? (Choose two.)
STP*
RSTP*
MSTP
Rapid PVST+
PVST+
3
Refer to the exhibit. Which protocol information is being displayed in
the output?
HSRP
VRRP
GLBP*
FHRP
4
A network administrator is preparing the implementation of Rapid
PVST+ on a production network. How are the Rapid PVST+ link types
determined on the switch interfaces?
Link types can only be configured on access ports configured with a single
VLAN.
5
Which RSTP ports are connected to end devices?
root ports
designated ports
trunk ports
edge ports*
6
If no bridge priority is configured in PVST, which criteria is
considered when electing the root bridge?
highest IP address
lowest IP address
7
Which port state will switch ports immediately transition to when
configured for PortFast?
learning
blocking
forwarding*
listening
8
To obtain an overview of the spanning tree status of a switched
network, a network engineer issues the show spanning-tree
command on a switch. Which two items of information will this
command display? (Choose two.)
9
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions
and then answer the question.
Which switch is the root bridge?
Switch_1
Switch_2
Switch_4*
Switch_3
10
Fill in the blank. Do not use abbreviations.
The spanning-tree mode rapid-pvst global configuration command is
used to enable Rapid PVST+.
11
Which STP priority configuration would ensure that a switch would
always be the root switch?
12
Which nonproprietary protocol provides router redundancy for a
group of routers which support IPv4 LANs?
VRRPv2*
SLB
GLBP
HSRP
13
Fill in the blank.
In FHRP operation, two or more routers are represented as a single virtual
router.
14
Which three components are combined to form a bridge ID?
MAC address*
port ID
IP address
cost
bridge priority*
15
What is a characteristic of a Layer 2 loop?
17
What additional information is contained in the 12-bit extended
system ID of a BPDU?
MAC address
VLAN ID*
port ID
IP address
18
What is an advantage of PVST+?
PVST+ requires fewer CPU cycles for all the switches in the network.
19
What is the purpose of HSRP?
listening
learning*
forwarding*
disabled
blocking
21
22
Refer to the exhibit. A network engineer is troubleshooting host
connectivity on a LAN that uses a first hop redundancy protocol.
Which IPv4 gateway address should be configured on the host?
192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100*
23
What is the outcome of a Layer 2 broadcast storm?
desirable
auto
active*
passive
not scored
4
Which command will initiate EtherChannel interface configuration
mode?
interface interface-identifier
channel-group group-identifier
5
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions
and then answer the question.
What are two reasons why the ping messages that are issued from
Laptop0 towards Laptop1 are failing? (Choose two.)
6
Which three options must match in order to establish an
EtherChannel between two directly connected switches? (Choose
three.)
speed of the interfaces that are used for EtherChannel*
trunking
EtherChannel*
HSRP
PortFast
8
Which statement is true regarding the use of PAgP to create
EtherChannels?
It is Cisco proprietary.*
10
What is a best practice to use before beginning an EtherChannel
implementation?
11
Which two protocols are link aggregation protocols? (Choose two.)
STP
802.3ad*
EtherChannel
RSTP
PAgP*
12
Refer to the exhibit. A network administrator has decided that an
EtherChannel between ports 0/1 and 0/2 on switches S1 and S2
would help performance. After making the configuration, the
administrator notices no performance gain. Based on the output that
is shown, what two possible assumptions could a network
administrator make? (Choose two.)
13
Which statement describes an EtherChannel implementation?
active
desirable
auto*
passive
15
As the network administrator you have been asked to implement
EtherChannel on the corporate network. What does this
configuration consist of?
16
Traffic cannot be sent to two different switches, but only to two different
devices like an EtherChannel-enabled server and a switch.
17
An EtherChannel link using LACP was formed between two switches,
S1 and S2. While verifying the configuration, which mode
combination could be utilized on both switches?
18
What is the most cost-effective method of solving interface
congestion that is caused by a high level of traffic between two
switches?
19
Refer to the exhibit. An EtherChannel was configured between
switches S1 and S2, but the interfaces do not form an EtherChannel.
What is the problem?
The switch ports were not configured with speed and duplex mode.
The EtherChannel was not configured with the same allowed range of
VLANs on each interface.*
The switch ports have to be configured as access ports with each port having
a VLAN assigned.
20
Which two load balancing methods can be implemented with
EtherChannel technology? (Choose two.)
destination IP to source IP
SSID: Home-Network
Message: Well done!
SSID: Home-Network
Message: Good job!
SSID: Home-Net
Message:Congratulations! You did it!
SSID: Home-Net
Message:Congratulations! You were able to connect it! *
2
A administrator wishes to extend the range of the existing IEEE
802.11n network without changing the AP. What can the
administrator do to accomplish this?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz
band.
3
Which security mode is the least secure choice when a home wireless
router is configured?
WPA
WEP*
WPA2-Personal
WPA2
4
Which two roles are typically performed by a wireless router that is
used in a home or small business? (Choose two.)
repeater
access point*
WLAN controller
Ethernet switch*
5
Which organization certifies vendors for adherence to the 802.11
standards to improve interoperability of 802.11 products?
IEEE
FCC
ITU-R
Wi-Fi Alliance*
6
Which feature of 802.11n wireless access points allows them to
transmit data at faster speeds than previous versions of 802.11 Wi-Fi
standards did?
MITM
SPS
MIMO*
WPS
7
Which type of wireless topology is created when two or more Basic
Service Sets are interconnected by Ethernet?
ESS*
BSS
IBISS
ad hoc WLAN
WiFi Direct
8
If three 802.11b access points need to be deployed in close
proximity, which three frequency channels should be used? (Choose
three.)
1*
6*
8
11*
9
What type of wireless antenna is best suited for providing coverage
in large open spaces, such as hallways or large conference rooms?
Yagi
omnidirectional*
directional
dish
10
Which three Wi-Fi standards operate in the 2.4GHz range of
frequencies? (Choose three.)
802.11b*
802.11n*
802.11ac
802.11a
802.11g*
11
What is the purpose of the Distributed Coordination Function in an
IEEE 802.11 WLAN environment?
12
An employee connects wirelessly to the company network using a
cell phone. The employee then configures the cell phone to act as a
wireless access point that will allow new employees to connect to the
company network. Which type of security threat best describes this
situation?
cracking
denial of service
13
During which stage of establishing connectivity between a WLAN
client and an AP does the client learn the MAC address of the AP?
encryption
authentication
discovery
association*
probing
14
Fill in the blank. Do not use abbreviations.
Ad hoc wireless topologies sometimes can use a feature called tethering
to enable a smartphone to create a personal hotspot.
15
What is an advantage of SSID cloaking?
SSIDs are very difficult to discover because APs do not broadcast them.
It provides free Internet access in public locations where knowing the SSID is
of no concern.
16
A student uses a laptop to upload an assignment to a file server.
Which wireless frame type did the laptop send to locate and
associate with the campus access point?
data frame
beacon frame
management frame*
control frame
17
Which type of management frame may regularly be broadcast by an
AP?
authentication
beacon*
probe response
probe request
18
A company has recently implemented an 802.11n wireless network.
Some users are complaining that the wireless network is too slow.
Which solution is the best method to enhance the performance of the
wireless network?
Disable DHCP on the access point and assign static addresses to the wireless
clients.
Replace the wireless NICs on the computers that are experiencing slow
connections.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.*
19
For which discovery mode will an AP generate the most traffic on a
WLAN?
open mode
passive mode*
active mode
mixed mode
20
Which statement defines the control frame operation between two
stations?
After receiving a data frame, the receiving station will send an ACK
frame to the sending station if no errors are found.*
A station responds to an RTS frame with an ACK frame, thus providing
permission for the requesting station to send a data frame.
If the sending station does not receive an ACK frame within a predetermined
period of time, the sending station will drop the connection.
A station sends an RTS frame as the first step in a three-way handshake that
is required before sending data frames.
21
What is a difference between Cisco APs that operate in a home
environment and Cisco APs that operate in a corporate environment?
Controller-based APs are used in the corporate environment, and they are
server-dependent devices that require an initial configuration to operate.
Autonomous APs are used only in the home environment, and they
incorporate the functions of a router, switch, and AP into one device.
22
23
Place the options in the following order:
not scored
Step 2
Step 5
Step 1
Step 3
not scored
Step 4
2
Refer to the exhibit. What three conclusions can be drawn from the
displayed output? (Choose three.)
There have been 9 seconds since the last hello packet sent.*
The router ID values were not the criteria used to select the DR and
the BDR.*
3
When checking a routing table, a network technician notices the
following entry:
The edge of the OSPF area 0 is the interface that is addressed 192.168.16.3.
4
Which command will a network engineer issue to verify the
configured hello and dead timer intervals on a point-to-point WAN
link between two routers that are running OSPFv2?
5
A network engineer has manually configured the hello interval to 15
seconds on an interface of a router that is running OSPFv2. By
default, how will the dead interval on the interface be affected?
The dead interval will not change from the default value.
The OSPF process ID and area values are backwards in the interface
configuration.
Two-Way state*
Loading state
Init state
Exchange state
9
Refer to the exhibit. R1 and R2 are connected to the same LAN
segment and are configured to run OSPFv3. They are not forming a
neighbor adjacency. What is the cause of the problem?
10
Refer to the exhibit. What kind of OSPF authentication has been
configured on this interface?
null
simple
MD5*
plain text
11
Why is MD5 authentication more secure than simple authentication
for OSPF updates?
OSPF router ID
secret key*
router hostname
interface IP address
OSPF message*
13
A network engineer is troubleshooting convergence and adjacency
issues in an OSPFv2 network and has noted that some expected
network route entries are not displayed in the routing table. Which
two commands will provide additional information about the state of
router adjacencies, timer intervals, and the area ID? (Choose two.)
show running-configuration
show ip protocols
14
Why do OSPF serial interfaces usually require manual bandwidth
configuration?
OSPF uses the bandwidth value to compute routes for its routing
table.*
Each side of an OSPF serial link should be configured with a unique value.
15
A network engineer is troubleshooting an OSPFv2 network and
discovers that two routers connected by a point-to-point WAN serial
link are not establishing an adjacency. The OSPF routing process,
network commands and area ID are all confirmed as correct, and the
interfaces are not passive. Testing shows that the cabling is correct,
that the link is up, and pings between the interfaces are successful.
What is most likely the problem?
A clock rate has not been set on the DCE interface of the serial link.
16
A network engineer is troubleshooting OSPFv2 routing issues on two
connected routers. Which two requirements to form an adjacency
need to be verified? (Choose two.)
Verify that the interfaces that connect the two routers are in the
same area.*
Verify that one of the routers is the DR or BDR and the other router a DRother.
Verify that one of the interfaces that connects the two routers is active and
the other passive.
Verify that the interfaces that connect the two routers are in the
same subnet.*
Verify that both routers are using the same OSPFv2 process ID.
17
Which command is used to verify that OSPF is enabled and also
provides a list of the networks that are being advertised by the
network?
show ip protocols*
18
Refer to the exhibit. Four routers are connected to an Ethernet LAN
segment and are configured to run OSPFv3. However, none of the
routers are receiving routing updates. What is the cause of the
problem?
19
Refer to the exhibit. These two routers are configured to run OSPFv3
but they are not forming a neighbor adjacency. What is the cause of
the problem?
The routers do not have global IPv6 addresses that are configured on the
Fa0/0 interfaces.
20
A network engineer suspects that OSPFv3 routers are not forming
neighbor adjacencies because there are interface timer mismatches.
Which two commands can be issued on the interface of each OSFPv3
router to resolve all timer mismatches? (Choose two.)
ip ospf dead-interval 40
ip ospf hello-interval 10
21
Refer to the exhibit. Fill in the blank. Do not use abbreviations.
The command show ipv6 route can be issued on router R2 to verify the
propagation of a static default route from R1 to R2.
22
Fill in the blank. Do not use abbreviations.
When IPv4 and OSPFv2 are being used, the command show ip ospf
neighbor is used to verify that a router has formed an adjacency with its
neighboring routers.
23
not scored
full state
loading state
ExStart state
24
2
Fill in the blank.
The backbone area interconnects with all other OSPF area types.
4
Fill in the blank. Do not use acronyms.
OSPF type 2 LSA messages are only generated by the DR router to
advertise routes in multiaccess networks.
5
What is one advantage of using multiarea OSPF?
O IA*
O E2
The network was learned from a router within the same area as R2.*
8
An ABR in a multiarea OSPF network receives LSAs from its neighbor
that identify the neighbor as an ASBR with learned external
networks from the Internet. Which LSA type would the ABR send to
other areas to identify the ASBR, so that internal traffic that is
destined for the Internet will be sent through the ASBR?
LSA type 1
LSA type 2
LSA type 3
LSA type 4*
LSA type 5
9
Which three steps in the design and implementation of a multiarea
OSPF network are considered planning steps? (Choose three.)
Configure OSPF.
Verify OSPF.
10
Fill in the blank. Use a number.
An ASBR generates type 5 LSAs for each of its external routes and floods
them into the area that it is connected to.
11
12
Which command can be used to verify the contents of the LSDB in an
OSPF area?
13
Which statement describes a multiarea OSPF network?
It has multiple routers that run multiple routing protocols simultaneously, and
each protocol consists of an area.
14
Which characteristic describes both ABRs and ASBRs that are
implemented in a multiarea OSPF network?
They are required to reload frequently and quickly in order to update the
LSDB.
15
Where can interarea route summarization be performed in an OSPF
network?
ABR*
any router
DR
ASBR
16
17
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions
and then answer the question.
What is preventing users who are connected to router R2 from
accessing resources located either within the network 192.168.1.0 or
the internet?
The default route is not redistributed correctly from the router R1 by OSPF.
The OSPF timers that are configured on routers R1, R2, and R3 are not
compatible.
18
Which two statements correctly describe OSPF type 3 LSAs? (Choose
two.)
Type 3 LSAs are used for routes to networks outside the OSPF autonomous
system.
19
A network administrator is implementing OSPF in a portion of the
network and must ensure that only specific routes are advertised via
OSPF. Which network statement would configure the OSPF process
for networks 192.168.4.0, 192.168.5.0, 192.168.6.0, and 192.168.7.0,
now located in the backbone area, and inject them into the OSPF
domain?
20
Which two networks are part of the summary route 192.168.32.0/22?
(Choose two.)
192.168.35.0/24*
192.168.36.0/24
192.168.33.0/24*
192.168.31.0/24
192.168.37.0/24
192.168.38.0/24
21
3
What is the purpose of using protocol-dependent modules in EIGRP?
4
Which statement describes a characteristic of the delivery of EIGRP
update packets?
5
A new network administrator has been asked to verify the metrics
that are used by EIGRP on a Cisco device. Which two EIGRP metrics
are measured by using static values on a Cisco device? (Choose two.)
bandwidth*
MTU
delay*
load
reliability
6
Which protocol is used by EIGRP to send hello packets?
RTP*
TCP
UDP
IP
7
Which destination MAC address is used when a multicast EIGRP
packet is encapsulated into an Ethernet frame?
01-00-5E-00-00-09
01-00-5E-00-00-10
01-00-5E-00-00-0A*
01-00-5E-00-00-0B
8
Place the options in the following order:
not scored
EIGRP for IPv4 only
both EIGRP for IPv4 and EIGRP for IPv6
EIGRP for IPv6 only
10
Refer to the exhibit. Which two networks contain feasible
successors? (Choose two.)
192.168.51.0
10.44.101.252
10.44.104.253
10.44.100.252*
192.168.71.0*
11
If all router Ethernet interfaces in an EIGRP network are configured
with the default EIGRP timers, how long will a router wait by default
to receive an EIGRP packet from its neighbor before declaring the
neighbor unreachable?
10 seconds
15 seconds*
20 seconds
30 seconds
12
Which command or commands must be entered on a serial interface
of a Cisco router to restore the bandwidth to the default value of
that specific router interface?
shutdown
no shutdown
bandwidth 1500
no bandwidth*
13
Which EIGRP route would have the preferred administrative
distance?
a summary route*
an internal route
14
How do EIGRP routers establish and maintain neighbor relationships?
15
When an EIGRP-enabled router uses a password to accept routes
from other EIGRP-enabled routers, which mechanism is used?
EIGRP authentication*
bounded updates
partial updates
16
What is indicated when an EIGRP route is in the passive state?
The route has the highest path cost of all routes to that destination network.
The route is a feasible successor and will be used if the active route fails.
17
Which three metric weights are set to zero by default when costs in
EIGRP are being calculated? (Choose three.)
k6
k3
k5*
k4*
k2*
k1
18
Why would a network administrator use a wildcard mask in the
network command when configuring a router to use EIGRP?
20
Where are EIGRP successor routes stored?
21
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions
and then answer the question.
Done
Complete*
EIGRP
IPv6EIGRP
22
Which command is used to display the bandwidth of an interface on
an EIGRP-enabled router?
show ip protocols
show interfaces*
show ip route
23
Fill in the blank.
In an EIGRP topology table, a route that is in a/an active state will cause
the Diffusing Update Algorithm to send EIGRP queries that ask other routers
for a path to this network.
show ip protocols*
2
Which address best summarizes the IPv6 addresses
2001:DB8:ACAD::/48, 2001:DB8:9001::/48, and 2001:DB8:8752::/49?
2001:DB8:8000::/48
2001:DB8:8000::/36
2001:DB8:8000::/47
2001:DB8:8000::/34*
3
Refer to the exhibit. Router R3 is receiving multiple routes through
the EIGRP routing protocol. Which statement is true about the
implementation of summarization in this network?
4
Refer to the exhibit. Considering that R2, R3, and R4 are correctly
configured, why did R1 not establish an adjacency with R2, R3, and
R4?
5
In which IOS CLI mode must a network administrator issue the
maximum-paths command to configure load balancing in EIGRP?
privileged mode
6
Two routers, R1 and R2, have established an EIGRP neighbor
relationship, but there is still a connectivity problem. Which issue
could be causing this problem?
a process ID mismatch
an authentication mismatch
The hello timer has been modified on interface GigabitEthernet 0/1 of R3 and
not on the neighbor, causing a neighbor adjacency not to form.
The GigabitEthernet interfaces are not limiting the flow of EIGRP message
information and are being flooded with EIGRP traffic.
8
In which scenario will the use of EIGRP automatic summarization
cause inconsistent routing in a network?
10
Refer to the exhibit. Which statement accurately reflects the
configuration of routing on the HQ router?
11
12
10.1.2.0/24*
10.1.4.0/28
10.1.4.0/30*
10.1.4.0/24
10.1.0.0/16
13
Refer to the exhibit. A network administrator has configured EIGRP
authentication between routers R1 and R2. After the routing tables
are reviewed, it is noted that neither router is receiving EIGRP
updates. What is a possible cause for this failure?
The key string should be used in interface mode instead of the key chain.
14
Two routers, R1 and R2, share a 64 kb/s link. An administrator wants
to limit the bandwidth used by EIGRP between these two routers to
48 kb/s. Which command is used on both routers to configure the
new bandwidth setting?
ip bandwidth-percent eigrp 64 48
It ensures that traffic for multiple subnets uses one path through the
internetwork.*
16
The network statement used for EIGRP 55 does not enable EIGRP on interface
serial 0/1/0.
The networks that are configured on serial 0/0/0 and serial 0/1/0 of router R1
are overlapping.
17
What is a characteristic of manual route summarization?
18
Fill in the blank. Do not use abbreviations.
The passive-interface command causes an EIGRP router to stop sending
hello packets through an interface.
19
serial 0/1/0 of R4
serial 0/0/1 of R2
20
Fill in the blank. Do not use abbreviations.
What is the command that should be issued on a router to verify that EIGRP
adjacencies were formed?
21
22
The network statement for the ISP connection has not been issued.
Refer to the exhibit. All networks are active in the same EIGRP
routing domain. When the auto-summary command is issued on R3,
which two summary networks will be advertised to the neighbors?
(Choose two.)
172.16.3.0/24
172.16.0.0/16*
192.168.10.0/24*
192.168.10.0/30
192.168.1.0/30
UC
IPBase*
SEC
DATA
2
When a router is powered on, where will the router first search for a
valid IOS image to load by default?
flash memory*
RAM
ROM
NVRAM
3
What statement describes a Cisco IOS image with the
universalk9_npe designation for Cisco ISR G2 routers?
It is an IOS version that offers all of the Cisco IOS Software feature sets.
It is an IOS version that can only be used in the United States of America.
4
Which statement describes a difference between the IOS 15.0
extended maintenance release and a standard maintenance release?
The extended maintenance release will deliver new IOS features as soon as
they are available.
5
A network administrator configures a router with the command
sequence:
The router will copy the IOS image from the TFTP server and then reboot the
system.
The router will search and load a valid IOS image in the sequence of flash,
TFTP, and ROM.
On next reboot, the router will load the IOS image from ROM.
The router will load IOS from the TFTP server. If the image fails to
load, it will load the IOS image from ROM.*
6
Which command would a network engineer use to find the unique
device identifier of a Cisco router?
show running-configuration
show version
7
Which command is used to configure a one-time acceptance of the
EULA for all Cisco IOS software packages and features?
license save
show license
8
How long is the evaluation license period for Cisco IOS Release 15.0
software packages?
30 days
15 days
60 days*
180 days
9
Which IOS 12.4 software package integrates full features, including
voice, security, and VPN capabilities, for all routing protocols?
Advanced Security
Advanced IP Services
10
A network engineer is upgrading the Cisco IOS image on a 2900
series ISR. What command could the engineer use to verify the total
amount of flash memory as well as how much flash memory is
currently available?
show version
show interfaces
show startup-config
show flash0:*
11
Which three software packages are available for Cisco IOS Release
15.0?
Security*
Advanced IP Services
IPVoice
DATA*
Enterprise Services
Unified Communications*
12
Fill in the blank. Do not use abbreviations.
The license install flash0:seck9-C1900-SPE150_K9-FAB12340099.xml
command will restore the specified saved Cisco IOS Release 15 license to a
router.
13
A newly hired network engineer wants to use a 2911 router from
storage. What command would the technician use to verify which IOS
technology licenses have been activated on the router?
show interfaces
show flash0:
show version
show license*
show startup-config
14
When a customer purchases a Cisco IOS 15.0 software package, what
serves as the receipt for that customer and is used to obtain the
license as well?
15
The customer of a networking company requires VPN connectivity for
workers who must travel frequently. To support the VPN server, the
customer router must be upgraded to a new Cisco IOS software
version with the Advanced IP Services feature set. What should the
field engineer do before copying the new IOS to the router?
Issue the show version and the show flash commands to ensure that
the router has enough memory and file space to support the new IOS
image.*
Set the router to load the new IOS image file directly from the TFTP server on
the next reboot.
Delete the currently installed IOS by using the erase flash: command, and
reload the router
52
1900
15*
17
18
Refer to the exhibit. Based on the output that is shown, what type of
NAT has been implemented?
3
A router needs to be configured to route within OSPF area 0. Which
two commands are required to accomplish this? (Choose two.)
RouterA(config)# router ospf 1 *
RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0 *
RouterA(config-router)# network 192.168.2.0 255.255.255.0 0
RouterA(config-router)# network 192.168.2.0 0.0.0.255 0
RouterA(config)# router ospf 0
4
Which OSPF component is identical in all routers in an OSPF area
after convergence?
adjacency database
SPF tree
routing table
link-state database*
5
Which statement is true about the difference between OSPFv2 and
OSPFv3?
OSPFv3 routers do not need to have matching subnets to form
neighbor adjacencies.*
OSPFv3 routers use a 128 bit router ID instead of a 32 bit ID.
OSPFv3 routers use a different metric than OSPFv2 routers use.
OSPFv3 routers do not need to elect a DR on multiaccess segments.
6
What are two features of a link-state routing protocol? (Choose two.)
Routers send periodic updates only to neighboring routers.
Routers create a topology of the network by using information from
other routers. *
Routers send triggered updates in response to a change. *
The database information for each router is obtained from the same source.
Paths are chosen based on the lowest number of hops to the designated
router.
7
What condition is required to enable Layer 3 switching?
All routed subnets must be on the same VLAN.
All participating switches must have unique VLAN numbers.
Inter-VLAN portions of Layer 3 switching must use router-on-a-stick.
The Layer 3 switch must have IP routing enabled.*
Refer to the exhibit. Which address will R1 use as the source address
for all OSPFv3 messages that will be sent to neighbors?
2001:DB8:ACAD:A::1
FF02::1
FE80::1 *
FF02::5
9
An organization needs to provide temporary voice and data services
to a new small lab building. They plan to install an access switch in
the new lab and connect it using a 100Mb/s FastEthernet trunk link.
The network administrator is concerned about the capability of the
link to meet quality requirements of the proposed voice and data
services. The administrator plans to manage the datalink layer traffic
to and from the lab so that trunk usage is optimized. What could the
administrator apply to the trunk to help achieve this?
Disable Spanning Tree Protocol to provide maximum bandwidth for the voice
and data traffic.
Configure the trunk ports on the trunk link to the lab to allow only
the voice and data VLANs.*
Configure the switches to run Per VLAN Spanning Tree for the voice and data
VLANs only.
Configure the lab switch to use the same voice and data VLAN as the rest of
the campus LAN.
10
Refer to the exhibit. A network administrator is configuring a router
as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool
command to verify the configuration. Which statement explains the
reason that the number of active clients is 0?
11
Which two factors are important when deciding which interior
gateway routing protocol to use? (Choose two.)
12
A network administrator is using the router-on-a-stick method to
configure inter-VLAN routing. Switch port Gi1/1 is used to connect to
the router. Which command should be entered to prepare this port
for the task?
13
Which three pieces of information does a link-state routing protocol
use initially as link-state information for locally connected links?
(Choose three.)
14
15
Which three parameters could be in an extended access control list?
(Choose three.)
16
17
The computers used by the network administrators for a school are
on the 10.7.0.0/27 network. Which two commands are needed at a
minimum to apply an ACL that will ensure that only devices that are
used by the network administrators will be allowed Telnet access to
the routers? (Choose two.)
18
Which two commands should be implemented to return a Cisco 3560
trunk port to its default configuration? (Choose two.)
19
Which two methods can be used to provide secure management
access to a Cisco switch? (Choose two.)
20
What is a function of the distribution layer?
fault isolation
network access to the user
high-speed backbone connectivity
interconnection of large-scale networks in wiring closets*
21
Which statement describes a characteristic of standard IPv4 ACLs?
23
24
25
Which two statements are true about half-duplex and full-duplex
communications? (Choose two.)
26
What are the two methods that a wireless NIC can use to discover an
AP? (Choose two.)
sending a multicast frame
transmitting a probe request *
receiving a broadcast beacon frame *
initiating a three-way handshake
sending an ARP request broadcast
27
What is the purpose of the Spanning Tree Protocol (STP)?
28
This network has been learned from an internal router within the same area.
This network should be used to forward traffic toward external networks.
This network was learned through summary LSAs from an ABR. *
This network is directly connected to the interface GigabitEthernet0/0.
29
When are EIGRP update packets sent?
30
What are two advantages of EtherChannel? (Choose two.)
31
Refer to the exhibit. What are two results of issuing the displayed
commands on S1, S2, and S3? (Choose two.)
32
A network engineer is troubleshooting a newly deployed wireless
network that is using the latest 802.11 standards. When users
access high bandwidth services such as streaming video, the
wireless network performance is poor. To improve performance the
network engineer decides to configure a 5 Ghz frequency band SSID
and train users to use that SSID for streaming media services. Why
might this solution improve the wireless network performance for
that type of service?
The 5 GHz band has more channels and is less crowded than the 2.4
GHz band, which makes it more suited to streaming multimedia.*
The only users that can switch to the 5 GHz band will be those with the latest
wireless NICs, which will reduce usage.
Requiring the users to switch to the 5 GHz band for streaming media is
inconvenient and will result in fewer users accessing these services.
The 5 GHz band has a greater range and is therefore likely to be interference-
free.
33
Which wireless encryption method is the most secure?
WPA2 with TKIP
WPA
WEP
WPA2 with AES*
34
Which statement describes a characteristic of the delivery of EIGRP
update packets?
35
37
Which statement is true regarding states of the IEEE 802.1D
Spanning Tree Protocol?
38
Which wireless network topology is being configured by a technician
who is installing a keyboard, a mouse, and headphones, each of
which uses Bluetooth?
hotspot
mixed mode
infrastructure mode
ad hoc mode*
39
A network administrator is troubleshooting slow performance in a
Layer 2 switched network. Upon examining the IP header, the
administrator notices that the TTL value is not decreasing. Why is
the TTL value not decreasing?
40
Refer to the exhibit. Which two conclusions can be derived from the
output? (Choose two.)
1
Refer to the exhibit. A network administrator is attempting to
upgrade the IOS system image on a Cisco 2901 router. After the new
image has been downloaded and copied to the TFTP server, what
command should be issued on the router before the IOS system
image is upgraded on the router?
ping 10.10.10.1
dir flash:
ping 10.10.10.2*
copy tftp: flash0:
The backbone area interconnects with all other OSPF area types.
3
Which address is used by an IPv6 EIGRP router as the source for
hello messages?
Refer to the exhibit. Which two conclusions can be derived from the
output? (Choose two.)
7
What two conditions have to be met in order to form a cluster that
includes 5 access points? (Choose two.)
8
Which technological factor determines the impact of a failure
domain?
9
Which mode configuration setting would allow formation of an
EtherChannel link between switches SW1 and SW2 without sending
negotiation traffic?
SW1: desirable
SW2: desirable
SW1: passive
SW2: active
SW1: on
SW2: on*
SW1: auto
SW2: auto
trunking enabled on both switches
SW1: auto
SW2: auto
PortFast enabled on both switches
10
In a large enterprise network, which two functions are performed by
routers at the distribution layer? (Choose two.)
11
A network engineer is implementing security on all company routers.
Which two commands must be issued to force authentication via the
password 1C34dE for all OSPF-enabled interfaces in the backbone
area of the company network? (Choose two.)
12
When does an OSPF router become an ABR?
13
Which characteristic would most influence a network design engineer
to select a multilayer switch over a Layer 2 switch?
ability to have multiple forwarding paths through the switched network based
on VLAN number(s)
ability to aggregate multiple ports for maximum data throughput
ability to build a routing table*
ability to provide power to directly-attached devices and the switch itself
14
A network designer is considering whether to implement a switch
block on the company network. What is the primary advantage of
deploying a switch block?
15
16
What are two differences between the Cisco IOS 12 and IOS 15
versions? (Choose two.)
Every Cisco ISR G2 platform router includes a universal image in the IOS 12
versions, but not the IOS 15 versions.
The IOS version 15 license key is unique to each device, whereas the
IOS version 12 license key is not device specific.*
The IOS 12 version has two trains that occur simultaneously, whereas the IOS
15 version still has two trains, but the versions occur in a single sequential
order.
The IOS 12 version has commands that are not available in the 15 version.
IOS version 12.4(20)T1 is a mainline release, whereas IOS version
15.1(1)T1 is a new feature release.*
17
Refer to the exhibit. What are two results of issuing the displayed
commands on S1, S2, and S3? (Choose two.)
18
A remote classroom can successfully access video-intensive
streaming lectures via wired computers. However, when an 802.11n
wireless access point is installed and used with 25 wireless laptops
to access the same lectures, poor audio and video quality is
experienced. Which wireless solution would improve the
performance for the laptops?
19
A network engineer is troubleshooting a single-area OSPFv3
implementation across routers R1, R2, and R3. During the
verification of the implementation, it is noted that the routing tables
on R1 and R2 do not include the entry for a remote LAN on R3.
Examination of R3 shows the following:
20
When should EIGRP automatic summarization be turned off?
22
Which action should be taken when planning for redundancy on a
hierarchical network design?
23
Fill in the blank. Use the acronym.
Which encryption protocol is used by the WPA2 shared key authentication
technique? AES
24
25
The local router has formed complete neighbor adjacencies, but must be in a
2WAY state for the router databases to be fully synchronized.
The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses
to ensure fully synchronized routing databases.
The dead time must be higher than 30 for all routers to form neighbor
adjacencies.
There is a problem with the OSPFv3 adjacency between the local
router and the router that is using the neighbor ID 2.2.2.2.*
27
Refer to the exhibit. Which two conclusions can be drawn from the
output? (Choose two.)
28
The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive
ports.
The EtherChannel is in use and functional as indicated by the SU and
P flags in the command output.*
The EtherChannel is down as evidenced by the protocol field being empty.
The EtherChannel is partially functional as indicated by the P flags for the
FastEthernet ports.
29
A network engineer is configuring a LAN with a redundant first hop
to make better use of the available network resources. Which
protocol should the engineer implement?
FHRP
VRRP
GLBP*
HSRP
30
Users on an IEEE 801.11n network are complaining of slow speeds.
The network administrator checks the AP and verifies it is operating
properly. What can be done to improve the wireless performance in
the network?
Split the wireless traffic between the 802.11n 2.4 GHz band and the
5 GHz band.*
Set the AP to mixed mode.
Change the authentication method on the AP.
Switch to an 802.11g AP.
31
A network administrator is troubleshooting slow performance in a
Layer 2 switched network. Upon examining the IP header, the
administrator notices that the TTL value is not decreasing. Why is
the TTL value not decreasing?
32
What is a wireless modulation technique used by 802.11 WLAN
standards that can implement MIMO?
FHSS
OFDM*
BSS
DSSS
33
Which technology is an open protocol standard that allows switches
to automatically bundle physical ports into a single logical link?
Multilink PPP
PAgP
DTP
LACP*
34
A set of switches is being connected in a LAN topology. Which STP
bridge priority value will make it least likely for the switch to be
selected as the root?
32768
4096
65535
61440*
35
Which wireless network topology is being configured by a technician
who is installing a keyboard, a mouse, and headphones, each of
which uses Bluetooth?
ad hoc mode*
hotspot
mixed mode
infrastructure mode
36
10.0.0.0/8*
10.1.0.0/16
10.1.0.0/28
10.1.1.0/24
10.1.2.0/24
10.1.3.0/24
10.1.4.0/28
37
When are EIGRP update packets sent?
38
Which requirement should be checked before a network
administrator performs an IOS image upgrade on a router?
The old IOS image file has been deleted.
The FTP server is operational.
There is sufficient space in flash memory.*
The desired IOS image file has been downloaded to the router.
39
What method of wireless authentication is dependent on a RADIUS
authentication server?
WPA Personal
WEP
WPA2 Enterprise*
WPA2 Personal
40
A network administrator wants to verify the default delay values for
the interfaces on an EIGRP-enabled router. Which command will
display these values?
show running-config
show interfaces*
show ip protocols
show ip route
41
A network administrator in a branch office is configuring EIGRP
authentication between the branch office router and the
headquarters office router. Which security credential is needed for
the authentication process?
a randomly generated key with the crypto key generate rsa command
a common key configured with the key-string command inside a key
chain*
the username and password configured on the headquarters office router
the hostname of the headquarters office router and a common password
42
Refer to the exhibit. Interface FastEthernet 0/1 on S1 is connected to
Interface FastEthernet 0/1 on S2, and Interface FastEthernet 0/2 on
S1 is connected to Interface FastEthernet 0/2 on S2. What are two
errors in the present EtherChannel configurations? (Choose two.)
43
Which port role is assigned to the switch port that has the lowest
cost to reach the root bridge?
disabled port
root port*
designated port
non-designated port
44
What are two features of OSPF interarea route summarization?
(Choose two.)
45
Work done!
Congratulations!
Wonderful work!
Youve made it!*
46
The metric that will be installed in the routing table for the 10.0.0.0 route will
be 65 (64+1).
Interface Fa0/1 is not participating in the OSPF process.
R1 is the distribution point for the routers that are attached to the
10.0.0.4 network.*
R1 is participating in multiarea OSPF.*
The OSPF process number that is being used is 0.
47
RouterA# -> copy flash0:tftp:
48
A network administrator has configured an EtherChannel between
two switches that are connected via four trunk links. If the physical
interface for one of the trunk links changes to a down state, what
happens to the EtherChannel?
49
Refer to the exhibit. A company has migrated from single area OSPF
to multiarea. However, none of the users from network
192.168.1.0/24 in the new area can be reached by anyone in the
Branch1 office. From the output in the exhibit, what is the problem?
51
What are two requirements when using out-of-band configuration of
a Cisco IOS network device? (Choose two.)
52
For troubleshooting missing EIGRP routes on a router, what three
types of information can be collected using the show ip protocols
command? (Choose three.)
53
What are two requirements to be able to configure an EtherChannel
between two switches? (Choose two.)
54
55
At a local college, students are allowed to connect to the wireless
network without using a password. Which mode is the access point
using?
network
shared-key
open*
passive
56
What are three access layer switch features that are considered
when designing a network? (Choose three.)
This network has been learned from an internal router within the same area.
This network was learned through summary LSAs from an ABR.*
This network is directly connected to the interface GigabitEthernet0/0.
This network should be used to forward traffic toward external networks.
58
Which two statements are correct about EIGRP acknowledgment
packets? (Choose two.)
59
An STP instance has failed and frames are flooding the network.
What action should be taken by the network administrator?
60
A network administrator issues the command R1(config)# license boot
module c1900 technology-package securityk9 on a router. What is the
effect of this command?
The IOS will prompt the user to provide a UDI in order to activate the license.
The IOS will prompt the user to reboot the router.
The features in the Security package are available immediately.
The Evaluation Right-To-Use license for the Security technology
package is activated.*
61
A router has been removed from the network for maintenance. A new
Cisco IOS software image has been successfully downloaded to a
server and copied into the flash of the router. What should be done
before placing the router back into service?
Delete the previous version of the Cisco IOS software from flash.
Copy the running configuration to NVRAM.
Back up the new image.
Restart the router and verify that the new image starts successfully.*
62
What are the two methods that are used by a wireless NIC to
discover an AP? (Choose two.)
63
Refer to the exhibit. Why did R1 and R2 not establish ad adjacency?
64
NEW QUESTIONS
65
Refer to the exhibit. Router CiscoVille has been partially configured
for EIGRP authentication. What is missing that would allow
successful authentication between EIGRP neighbors?
The same key number must be used on any EIGRP neighbor routers.
IPBase*
DATA
Unified Communications
Security
New questions:
By default, how many equal cost routes to the same destination can
be installed in the routing table of a Cisco router?
2
4***
16
32
=======================
What are two reasons to implement passive interfaces in the EIGRP
configuration of a Cisco router? (Choose two.)
to provide increased network security ***
=======================================
The IOS 12 version has commands that are not available in the 15 version.
The IOS version 15 license key is unique to each device, whereas the IOS
version 12 license key is not device specific.
Every Cisco ISR G2 platform router includes a universal image in the IOS 12
versions, but not the IOS 15 versions.
=======================================
=======================================
Widgets
Speed Test
Media Prioritization
Bandwidth Prioritization*
=======================================
on a per-path-load basis
on a per-destination basis*
on a per-interface basis
on a per-packet basis
=======================================
=======================================
=======================================
What is the purpose of the Cisco PAK?
It is a proprietary encryption algorithm.
It is a compression file type used when installing IOS 15 or an IOS upgrade.
It is a way to compress an existing IOS so that a newer IOS version can be
co-installed on a router.
It is a key for enabling an IOS feature set.*
=======================================
What two license states would be expected on a new Cisco router
once the license has been activated? (Choose two.)
License State: On
License State: Active, Registered
License Type: Permanent *
License Type: ipbasek9
License Type: Temporary
License State: Active, In Use *
=======================================
If a company wants to upgrade a Cisco 2800 router from IOS 12.4T,
what IOS should be recommended for a stable router platform?
13.1T
12.5T
15.1M *
14.0
=======================================
Fill in the blank.
EIGRP keeps feasible successor routes in the routing table.
=======================================
A network engineer is troubleshooting a newly deployed wireless
network that is using the latest 802.11 standards. When users
access high bandwidth services such as streaming video, the
wireless network performance is poor. To improve performance the
network engineer decides to configure a 5 Ghz frequency band SSID
and train users to use that SSID for streaming media services. Why
might this solution improve the wireless network performance for
that type of service?
Requiring the users to switch to the 5 GHz band for streaming media is
inconvenient and will result in fewer users accessing these services.
The 5 GHz band has a greater range and is therefore likely to be
interference-free.
The 5 GHz band has more channels and is less crowded than the 2.4
GHz band, which makes it more suited to streaming multimedia. *
The only users that can switch to the 5 GHz band will be those with the
latest wireless NICs, which will reduce usage.
It provides regular bug fix maintenance rebuilds, plus critical fix support for
network-affecting bugs.
What are two methods to make the OSPF routing protocol more
secure? (Choose two.)
-Use only OSPFv3.
-Use MD5 authentication. *
-When feasible, create a VPN tunnel between each OSPF neighbor adjacency.
-Use the enable secret command.
-Use the passive-interface command on LAN interfaces that are connected
only to end-user devices.
Refer to the exhibit. What are the possible port roles for ports A, B, C
and D in this RSTP-enabled network?
What are two drawbacks to turning spanning tree off and having
multiple paths through the Layer 2 switch network? (Choose two.)
Port security shuts down all of the port that attached devices.
May 6, 2015
Refer to the exhibit. Which switch will be the root bridge after the
election process is complete?
S1
S2
S3
S4
08 May 2015
NEW Question: What is a requirement to configure a trunking
EtherChannel between two switches?
The participating interfaces must be on the same module on a switch.
The participating interfaces must be assigned the same VLAN number on both
switches.