1.
Which command would you use on a Cisco router to verify the Layer 3 path to a host?
Correct Answer
B. Traceroute address
Explanation
To check the connectivity between a host and a destination (through some networks) we can use both “tracert” and “ping” commands. But the difference between these 2 commands is the “tracert” command can display a list of near-side router interfaces in the path between the source and the destination. The “traceroute” command has the same function of the “tracert” command but it is used on Cisco routers only, not on a PC -> B is correct.
2.
Refer to the exhibit:Which three statements correctly describe Network Device A? (Choose three)
Correct Answer(s)
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
Explanation
The principle here is if the subnet mask makes two IP addresses 10.1.0.36 and 10.1.1.70 in the same subnet then the Network device A does not need to have IP addresses on its interfaces (and we don’t need a Layer 3 device here).
A quick way to find out the correct answers is notice that all 255.255.255.x subnet masks will separate these two IP addresses into two separate subnets so we need a Layer 3 device here and each interface must require an IP address on a unique IP subnet -> A, C are not correct while B, D are correct.
With 255.255.254.0 subnet mask, the increment here is 2 in the third octet -> the first subnet is from 10.1.0.0 to 10.1.1.255, in which two above IP addresses belong to -> each interface of Network device A does not require an IP address -> E is correct.
3.
What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three)
Correct Answer(s)
A. Reduced cost
D. Increased security
E. Scalability
Explanation
An organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links for three reasons. Firstly, it can help reduce costs as VPNs utilize existing internet connections rather than requiring dedicated point-to-point links. Secondly, it provides increased security by encrypting data transmitted over the internet, ensuring confidentiality and integrity. Lastly, VPNs offer scalability, allowing the organization to easily add or remove users and branch offices without the need for significant infrastructure changes.
4.
What two things will a router do when running a distance vector routing protocol? (Choose two)
Correct Answer(s)
A. Send periodic updates regardless of topology changes.
D. Update the routing table based on updates from their neighbors.
Explanation
A router running a distance vector routing protocol will send periodic updates regardless of topology changes to ensure that all routers in the network have the most up-to-date routing information. Additionally, it will update its routing table based on updates received from its neighboring routers, allowing it to make informed decisions about the best path to forward packets.
5.
What is the purpose of the inverse ARP?
Correct Answer
A. To map a known DLCI to an IP address
Explanation
For more information about Inverse ARP, please read my Frame Relay tutorial.
6.
The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)
Correct Answer(s)
B. Configure the gateway on Host B as 10.1.2.254.
D. Configure the IP address of Host B as 10.1.2.2.
Explanation
Configuring the gateway on Host B as 10.1.2.254 will correct the connectivity problems because the gateway is responsible for routing network traffic between different networks. By setting the correct gateway address, Host B will be able to send and receive data from other networks. Additionally, configuring the IP address of Host B as 10.1.2.2 will also help to resolve the connectivity problems as it ensures that Host B has a valid IP address within the same network.
7.
Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two)
Correct Answer(s)
A. Router1 has specific boot system command that instruct it to load IOS from TFTP server.
C. Router1 cannot locate a valid IOS image in flash memory.
Explanation
When powered on, the router first checks its hardware via Power-On Self Test (POST). Then it checks the configuration register to identify where to load the IOS image from. In the output above we learn that the Configuration register value is 0×2102 so the router will try to boot the system image from Flash memory first.
But we also see a line “System image file is “tftp://112.16.1.129/hampton/nitro/c7200-j-mz”. Please notice that this line tells us the image file that the device last started. In this case it is from a TFTP server. Therefore we can deduce that the router could not load the IOS image from the flash and the IOS image has been loaded from TFTP server.
Note:
If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:
+ Flash (the default location)
+ TFTP server
+ ROM (used if no other source is found)
8.
Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two)
Correct Answer(s)
A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
D. Router C will send a Destination Unreachable message type.
Explanation
The last known good router will try to inform you that the destination cannot be reached (with a Destination Unreachable message type) so from that information you can learn how far your packets can travel to and where the problem is.
9.
How is an EUI-64 format interface ID created from a 48-bit MAC address?
Correct Answer
D. By inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
Explanation
We convert a 48-bit MAC address (IEEE 802) to a 64-bit value by breaking the MAC address into its two 24-bit halves. The first part is the Organizationally Unique Identifier (OUI) and the next part is the NIC specific part. Then the 16-bit hex value 0xFFFE is inserted between them to create a 64-bit value.Just for your information, to obtain an IPv6 interface identifier from EUI-64 address, we have to complement the U/L bit (the seventh bit of the first byte and is used to determine whether the address is universally or locally administered). This means if it is a 1, it is set to 0; and if it is a 0, it is set to 1. In the above example, the U/L bit is 0 (from 00 = 0000 0000). Therefore we have to set this bit to 1 to create an IPv6 interface address.
10.
Refer to the exhibit:A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three)
Correct Answer(s)
A. Host A IP address: 192.168.1.79
C. Host A default gateway: 192.168.1.78
F. Host B IP address: 192.168.1.190
Explanation
The correct answer includes three values that could be used for the configuration of the two new hosts. The first value is the IP address for host A, which is 192.168.1.79. The second value is the default gateway for host A, which is 192.168.1.78. The third value is the IP address for host B, which is 192.168.1.190. These values are necessary for the hosts to be able to communicate on the network.