CCNA: EIGRP Troubleshooting Questions! Trivia Quiz

44 Questions | Total Attempts: 19

SettingsSettingsSettings
CCNA: EIGRP Troubleshooting Questions! Trivia Quiz

CCNA: EIGRP troubleshooting questions! If you are reading for your CCNA certification exam, there is a lot of information that you are expected to have on various issues the computer might have. In this specific quiz, we help refresh your memory on troubleshooting the Enhanced Interior Gateway Routing Protocol. Give it a try and see how much you recall.


Questions and Answers
  • 1. 
    A Network Administrator creates a static route that points directly to a multi-access interface, instead of the next-hop IP address. The administrator notices that Cisco Express Forwarding ARP requests are being sent to all destinations. Which issue might this configuration create?
    • A. 

      Low Bandwidth Usage

    • B. 

      High Memory Usage

    • C. 

      Cisco Express Forwarding Routing Loop

    • D. 

      High Bandwidth Usage

    • E. 

      IP Route Interference

  • 2. 
    A network administrator enters the following command on a router: logging trap 3. What are the three message types that will be sent to the Syslog server?
    • A. 

      Informational

    • B. 

      Emergency

    • C. 

      Warning

    • D. 

      Critical

    • E. 

      Debug

    • F. 

      Error

  • 3. 
    Which two statements about the GRE tunnel interface are true?
    • A. 

      A tunnel can be established when a source the source interface is in the up/down state

    • B. 

      A destination must be routable, but it can be unreachable 

    • C. 

      To establish a tunnel the source interface must be a loopback

    • D. 

      To establish a tunnel the source interface must be up/up state

    • E. 

      A tunnel destination must be a physical interface that is on up/up state

  • 4. 
    Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface?
    • A. 

      Show interface trunk

    • B. 

      Show interface interface

    • C. 

      Show ip interface brief

    • D. 

      Show interface vlan

    • E. 

      Show interface switchport

  • 5. 
    Which type of EIGRP route entry describes a feasible successor?
    • A. 

      A backup route, stored in the topology table

    • B. 

      A primary route, stored in the routing table

    • C. 

      A backup route, stored in the routing table

    • D. 

      Primary route, stored in the topology table

  • 6. 
    What levels will be trapped if the administrator executes the command router(config)# logging trap 4?
    • A. 

      Emergency

    • B. 

      Notice

    • C. 

      Alert

    • D. 

      Error

    • E. 

      Warning

    • F. 

      Notification

  • 7. 
    Which command will display all the EIGRP feasible successor routes known to a router?
    • A. 

      Show ip routes

    • B. 

      Show ip eigrp summary

    • C. 

      Show ip eigrp topology

    • D. 

      Show ip eigrp adjacencies

  • 8. 
    Which three characteristics are representative of a link-state routing protocol?
    • A. 

      Provides common view of the entire topology

    • B. 

      Exchanges routing tables with neighbors

    • C. 

      Calculates shortest path

    • D. 

      Utilizes event triggered updates

    • E. 

      Utilizes frequent periodic updates

  • 9. 
    Where are EIGRP successor routes stored?
    • A. 

      In the routing table only

    • B. 

      In the neighbor table only

    • C. 

      In the topology table only

    • D. 

      In the routing table and the topology table

    • E. 

      In the routing table and the neighbor table

  • 10. 
    What are three benefits of implementing VLANs?
    • A. 

      A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure

    • B. 

      Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.

    • C. 

      A higher level of network security can be reached by separating sensitive data traffic from other network traffic

    • D. 

      Port-based VLANs increase switch-port use efficient,thanks to 802.1Q trunks

    • E. 

      A more efficient use of bandwidth can be achieved by allowing many logical networks to use the same network infrastructure

    • F. 

      Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size

    • G. 

      VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain.

  • 11. 
    Refer to the exhibit. A network engineer has configured GRE between two IOS routers. The state of the tunnel interface is continuously oscillating between up and down. What is the solution to this problem?
    • A. 

      Create a more specific static route to define how to reach the remote router.

    • B. 

      Create a more specific ARP entry to define how to reach the remote router.

    • C. 

      Save the configuration and reload the router.

    • D. 

      Check whether the internet service provider link is stable

  • 12. 
    Refer to the exhibit. Router 1 cannot ping router 2 via the Frame Relay between them. Which two statements describe the problems? 
    • A. 

      Encapsulation is mismatched

    • B. 

      Frame Relay map is configured

    • C. 

      DLCI is active

    • D. 

      DLCI is inactive or deleted

    • E. 

      An access list is needed to allow ping

  • 13. 
    802.1Q and  [Blank] are the two link protocols are used to carry multiple VLANs over a single link.
  • 14. 
    You get a call from a network administrator who tells you that he typed the following into his router: Router(config)#router ospf 1 Router(config-router)#network 10.0.0.0 255.0.0.0 area 0 He tells you he still cant see any routes in the routing table. What configuration error did the administrator make?
    • A. 

      The wildcard mask is incorrect

    • B. 

      The OSPF area is wrong.

    • C. 

      The OSPF process ID is incorrect.

    • D. 

      The AS configuration is wrong.

  • 15. 
    What following parameters for the EIGRP authentication need to match in order for EIGRP neighbors to establish a neighbor relationship?
    • A. 

      Autonomous System Number

    • B. 

      K-Values

    • C. 

      If authentication is used both: the key number, the password, and the date/time

    • D. 

      The neighbors must be on common subnet (all IGPs follow this rule).

  • 16. 
    Other than working EIGRP configuration, What needs to match to allow EIGRP rollover?
    • A. 

      Syslog

    • B. 

      Time

    • C. 

      SNMP

    • D. 

      Password

  • 17. 
    Which mode is compatible with Trunk, Access, and desirable ports?
    • A. 

      Trunk Ports

    • B. 

      Access Ports

    • C. 

      Dynamic Auto

    • D. 

      Dynamic Desirable

  • 18. 
    How to enable VLANs automatically across multiple switches?
    • A. 

      Configure VLAN

    • B. 

      Configure NTP

    • C. 

      Configure each VLAN

    • D. 

      Configure VTP

  • 19. 
    Which PPP subprotocol negotiates authentication options?
    • A. 

      SLIP

    • B. 

      NCP

    • C. 

      ISDN

    • D. 

      LCP

    • E. 

      DLCI

  • 20. 
    If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface?
    • A. 

      The lowest IP address of any physical interface

    • B. 

       The highest IP address of any physical interface

    • C. 

      The lowest IP address of any logical interface

    • D. 

      The highest IP address of any logical interface

  • 21. 
    A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme?
    • A. 

      255.255.255.0

    • B. 

      255.255.255.128

    • C. 

      255.255.252.0

    • D. 

      255.255.255.224

    • E. 

      255.255.255.192

    • F. 

      255.255.248.0

  • 22. 
    Which three statements about Syslog utilization are true?
    • A. 

      Utilizing Syslog improves network performance.

    • B. 

      The Syslog server automatically notifies the network administrator of network problems.

    • C. 

      A Syslog server provides the storage space necessary to store log files without using the router disk space

    • D. 

      Enabling Syslog on a router automatically enables NTP for accurate time stamping.

    • E. 

      A Syslog server helps in aggregation of logs and alerts.

    • F. 

      There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

  • 23. 
    Which two among the following are used to indicate external type of route in routing table?
    • A. 

      DEX

    • B. 

      IA

    • C. 

      OE2

    • D. 

      RE2

    • E. 

      IL2

  • 24. 
    In which two ways can split-horizon issues be overcome in a Frame Relay network environment?
    • A. 

      Configuring one physical serial interface with Frame Relay to various remote sites.

    • B. 

      Configure a loopback interface with Frame Relay to various remote sites.

    • C. 

      Configuring multiple subinterfaces on a single physical interface to various remote sites.

    • D. 

      Enabling split horizon.

    • E. 

      Disabling split horizon

  • 25. 
    What are two benefits of using NAT?
    • A. 

      NAT protects network security because private networks are not advertised.

    • B. 

      NAT accelerates the routing process because no modifications are made on the packets.

    • C. 

      C. Dynamic NAT facilitates connections from the outside of the network.

    • D. 

      D. NAT facilitates end-to-end communication when IPsec is enable.

    • E. 

      NAT eliminates the need to re-address all hosts that require external access

    • F. 

      F. NAT conserves addresses through host MAC-level multiplexing.

  • 26. 
    While troubleshooting a connection problem on a computer, you determined that the computer can ping a specific web server but it cannot connect to TCP port 80 on that server. Which reason for the problem is most likely true?
    • A. 

      A VLAN number is incorrect

    • B. 

      An ARP table entry is missing

    • C. 

      A route is missing

    • D. 

      An ACL is blocking the TCP port

  • 27. 
    Which of the following are benefits of VLANs?
    • A. 

      They increase the size of collision domains.

    • B. 

      They allow logical grouping of users by function

    • C. 

      They can enhance network security

    • D. 

      They increase the size of broadcast domains while decreasing the number of collision domains.

    • E. 

      They increase the number of broadcast domains while decreasing the size of collision domains

    • F. 

      They simplify switch administration.

  • 28. 
    When the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true?
    • A. 

      A router must have a route towards the tunnel destination.

    • B. 

      The router must have wccp redirects enabled inbound from the tunnel destination

    • C. 

      The router must have cisco discovery protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination

    • D. 

      The router must have redirects enabled outbound towards the tunnel destination

  • 29. 
    A network engineer wants to ensure an optimal end-to-end delay bandwidth product. The delay is less than 64 KB. Which TCP feature ensures steady state throughput?
    • A. 

      Window Scaling

    • B. 

      Network Buffers

    • C. 

      Round-Trip Timers

    • D. 

      TCP Acknowledgement

  • 30. 
    With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process?
    • A. 

      Point-to-point

    • B. 

      Backbone area 0

    • C. 

      Broadcast multi-access

    • D. 

      Non-boradcast multi-access

    • E. 

      IS-IS

  • 31. 
    Which two of these statements regarding RSTP are correct?
    • A. 

      RSTP cannot operate with PVST+.

    • B. 

      RSTP defines new port roles

    • C. 

      RSTP defines no new port states

    • D. 

      RSTP is a proprietary implementation of IEEE 802.1D STP.

    • E. 

      RSTP is compatible with the original IEEE 802.1D STP

  • 32. 
    Which type of traffic does DHCP snooping drop?
    • A. 

      Discover messages

    • B. 

      DHCP messages where the source MAC and client MAC do not match

    • C. 

      Traffic from a trusted DHCP server to client

    • D. 

      DHCP messages where the destination MAC and client MAC do not match

  • 33. 
    Which two statements about static NAT translations are true?
    • A. 

      They are always present in the NAT table

    • B. 

      They allow connection to be initiated from the outside

    • C. 

      They can be configured with access lists, to allow two or more connections to be initiated from the outside.

    • D. 

      They require no inside or outside interface markings because addresses are statically defined.

  • 34. 
    How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?
    • A. 

      Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.

    • B. 

      Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.

    • C. 

      Configure many sub-interfaces on the same subnet.

    • D. 

      Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.

  • 35. 
    Which two attributes describe UDP within a TCP/IP network?
    • A. 

      Acknowledgements

    • B. 

      Unreliable Delivery

    • C. 

      Connectionless Communication

    • D. 

      Increased headers

    • E. 

      Connection-oriented communication

  • 36. 
    What WAN Protocol is being used ? [Blank]
  • 37. 
    Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?[Blank]
  • 38. 
    Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?[Blank]
  • 39. 
    What is the administrative distance for eBGP?[Blank]
  • 40. 
    What is the default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router?[Blank]
  • 41. 
    A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used? [Blank]
  • 42. 
    Which command can be used from a PC to verify the connectivity between host that connect through a switch in the same LAN? [Blank]
  • 43. 
    At which layer of osi model is rstp used to prevent loops?[Blank]
  • 44. 
    At which layer does cisco express forwarding use adjacency tables to populate addressing information?[Blank]