Enhance Your Knowledge On Ccna2 Final E

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Yunieke
Y
Yunieke
Community Contributor
Quizzes Created: 1 | Total Attempts: 250
| Attempts: 250 | Questions: 22
Please wait...
Question 1 / 22
0 %
0/100
Score 0/100
1. Which routing protocol maintains a topology table separate from the routing table?

Explanation

EIGRP (Enhanced Interior Gateway Routing Protocol) maintains a topology table separate from the routing table. This allows EIGRP to have a more detailed view of the network topology, including information about all available routes, their metrics, and their status. By keeping this information in a separate table, EIGRP can make more efficient and informed routing decisions, resulting in better network performance and faster convergence.

Submit
Please wait...
About This Quiz
Enhance Your Knowledge On Ccna2 Final E - Quiz

Your studies on the Cisco Certified Network Associate have led you to this moment – the finals are coming up, and this quiz aims to enhance your knowledge on everything you need to know in order to achieve your certification and hopefully get a good job in the field of... see morenetworking. see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Refer to the exhibit. A network administrator is accessing router R1 from the console port. Once the administrator is connected to the router, which password should the administrator enter at the R1> prompt to access the privileged EXEC
mode?

Explanation

The correct password that the administrator should enter at the R1> prompt to access the privileged EXEC mode is "Cisco789".

Submit
3. A router boots and enters setup mode. What is the reason for this?

Explanation

The router enters setup mode because the configuration file is missing from NVRAM. Setup mode allows the user to configure basic settings for the router, such as hostname, IP addresses, and passwords. When the router boots and cannot find the configuration file in NVRAM, it prompts the user to enter setup mode to create a new configuration. This is a common scenario when a router is newly installed or if the configuration file has been accidentally deleted or lost.

Submit
4. Refer to the exhibit. What is the meaning of the highlighted value 2?

Explanation

The highlighted value of 2 represents the number of hops between R2 and the 192.168.8.0/24 network. This means that it takes two intermediary devices (routers) for traffic to reach the 192.168.8.0/24 network from R2.

Submit
5. Refer to the exhibit. All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are
unable to access each
other. What can be the cause of this problem?

Explanation

The cause of the problem could be that RIPv1 does not support discontiguous networks. This means that RIPv1 cannot handle networks that are not directly connected or have non-contiguous subnet masks. As a result, the two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to communicate with each other because RIPv1 cannot properly route the traffic between them.

Submit
6. Refer to the exhibit. An administrator is adding a new subnet of 50 hosts to R3. Which subnet address
should be used for
the new subnet that provides enough addresses while wasting a minimum of addresses?

Explanation

The subnet 192.168.1.64/26 should be used for the new subnet. This subnet provides enough addresses for 62 hosts (64 - 2 for network and broadcast addresses) while wasting a minimum of addresses. The other subnets have smaller address ranges and would not provide enough addresses for 50 hosts.

Submit
7. Which two technologies can be used in distance vector routing protocols to prevent routing loops?
(Choose two.)

Explanation

Hold-down timers and split horizon are two technologies that can be used in distance vector routing protocols to prevent routing loops. Hold-down timers are used to temporarily ignore route updates after a route has been invalidated, preventing the router from immediately accepting a potentially incorrect route. Split horizon is a technique where a router does not advertise a route back to the same interface from which it was learned, preventing routing loops by not allowing a route to be sent back in the direction it came from.

Submit
8. A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.)

Explanation

RIP (Routing Information Protocol) uses the Bellman-Ford algorithm to determine the best path. This algorithm calculates the shortest path to a destination by considering the number of hops (routers) between the source and destination. Additionally, RIP periodically sends complete routing tables to all connected devices, ensuring that each device has the most up-to-date information about the network's topology. This helps in maintaining accurate routing information and allows for efficient routing within the autonomous system.

Submit
9. Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose
two.)

Explanation

The router will need to perform a recursive lookup for packets destined to the networks 10.0.0.0/8 and 192.168.2.0/24. This means that the router will have to consult its routing table and potentially query other routers to determine the next hop for these packets. The other networks listed in the exhibit have more specific subnet masks (e.g., /16 or /24) which means that the router can determine the next hop for those packets without needing to perform a recursive lookup.

Submit
10. Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?

Explanation

The reason why Host A is unable to access the Internet is because the Fa0/1 interfaces of the two routers are configured for different subnets. This means that the routers are not able to properly route the traffic from Host A to the Internet, as they are not on the same subnet.

Submit
11. Refer to the exhibit. A ping between host A and host B is successful, but pings from host A to operational
hosts on the
Internet fail. What is the reason for this problem?

Explanation

The reason for the problem is that one of the default routes is configured incorrectly. A default route is used when a router does not have a specific route for a destination network. In this case, the incorrect configuration of one of the default routes is causing the failure of pings from host A to operational hosts on the Internet.

Submit
12. Refer to the exhibit. The 10.4.0.0 network fails. What mechanism prevents R2 from receiving false
update information
regarding the 10.4.0.0 network?

Explanation

Split horizon is a mechanism that prevents a router from advertising a route back onto the same interface from which it was learned. In this scenario, R2 is prevented from receiving false update information regarding the 10.4.0.0 network because split horizon would prevent R1 from advertising that route back to R2 on the same interface. This helps to avoid routing loops and ensures that R2 does not receive incorrect or outdated routing information.

Submit
13. All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been set on any of the routers. Which secondary value will the routers use to determine the router ID?

Explanation

The routers in the network will use the highest IP address among the active interfaces to determine the router ID. The router ID is a unique identifier for each router in OSPF, and it is used for various purposes such as the selection of the designated router and the calculation of the shortest path tree. In this case, since no loopback interface has been set on any of the routers, the highest IP address among the active interfaces will be used as the router ID.

Submit
14. What is the function of the OSPF LSR packet?

Explanation

The OSPF LSR (Link State Request) packet is used by receiving routers to request more information about any entry in the DBD (Database Description). This packet is sent when a router needs more detailed information about a particular entry in the database. By requesting additional information, the router can ensure that it has the most up-to-date and accurate data for making routing decisions.

Submit
15. Refer to the exhibit. Although R2 is configured correctly, host A is unable to access the Internet. What
are two static
routes that can be configured on R1, either of which would enable Internet connectivity for host A?
(Choose two.)

Explanation

Two static routes that can be configured on R1 to enable Internet connectivity for host A are "ip route 0.0.0.0 0.0.0.0 Fa0/1" and "ip route 0.0.0.0 0.0.0.0 10.1.1.2". The first route specifies that any traffic with a destination IP address of 0.0.0.0 should be forwarded out of the Fa0/1 interface. The second route specifies that any traffic with a destination IP address of 0.0.0.0 should be forwarded to the next hop IP address 10.1.1.2. These routes will allow host A to reach the Internet.

Submit
16. A network administrator has enabled RIP on routers B and C in the network diagram. Which of the
following commands will
prevent RIP updates from being sent to Router A?

Explanation

The correct answer is B(config)# router rip B(config-router)# passive-interface S0/0 A(config)# no router rip. This command sequence first enables RIP routing protocol on router B using "router rip" command. Then, it configures the interface S0/0 as passive using "passive-interface S0/0" command, which prevents RIP updates from being sent or received on that interface. Finally, it disables RIP routing protocol on router A using "no router rip" command. This combination of commands ensures that RIP updates are not sent to router A.

Submit
17. Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its
displayed commands,
which statement is true?

Explanation

The exhibit shows the output of the "show ip route" command on Router A. The routing table does not have a specific entry for the link to the ISP (192.168.1.0/24). This means that the routing protocol process is not advertising this network to other routers. Therefore, the statement "The link to the ISP is not advertised by the routing protocol process" is true.

Submit
18. Refer to the exhibit. While trying to diagnose a routing problem in the network, the network
administrator runs the debug ip
rip command. What can be determined from the output of this command?

Explanation

From the output of the "debug iprip" command, it can be determined that the router has two interfaces that participate in the RIP (Routing Information Protocol) process. This means that the router is actively exchanging routing information with other routers in the network using RIP. This information is useful for diagnosing routing problems and understanding the network topology.

Submit
19. Refer to the exhibit. The routers are properly configured using a dynamic routing protocol with default
settings, and the
network is fully converged. Router A is forwarding data to router E. Which statement is true about the
routing path?

Explanation

If the network uses the RIP protocol, router A will determine that all paths have equal cost. This is because RIP uses hop count as the metric to determine the best path, and in this scenario, all paths have the same number of hops. Therefore, router A will see all paths as having equal cost and will choose any of them to forward data to router E.

Submit
20. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.)

Explanation

The split horizon with poison reverse method of routing loop prevention assigns a value that represents an infinite metric to the poisoned route. This ensures that the poisoned route is considered unreachable and not used for forwarding packets. Additionally, this method limits the number of hops a packet can traverse through the network before it is discarded. By discarding packets that exceed the hop limit, the method prevents routing loops and improves network efficiency.

Submit
21. What are two reasons for the occurrence of a routing loop? (Choose two.)

Explanation

Routing loops can occur for two reasons: incorrectly configured static routes and static and dynamic routing being used on the same router. Incorrectly configured static routes can lead to loops when the routes are pointing to each other or when there are overlapping routes. When static and dynamic routing protocols are used on the same router, there is a possibility of conflicting information being received, leading to loops. Slow convergence, routes learned via two routing protocols, and lack of a default route on the router that connects to the Internet are not directly related to the occurrence of routing loops.

Submit
22. Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)

Explanation

The given correct answer states that the AD (Administrative Distance) of EIGRP routes has been manually changed to a value other than the default value. This means that the router is prioritizing EIGRP routes over other routing protocols. The answer also mentions that Router1 is running both the EIGRP and OSPF routing processes, indicating that the router is using multiple routing protocols. Additionally, it states that Network 172.17.0.0 can only be reached using a default route, implying that there is no specific route for this network in the routing table.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2010
    Quiz Created by
    Yunieke
Cancel
  • All
    All (22)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which routing protocol maintains a topology table separate from the...
Refer to the exhibit. A network administrator is accessing router R1...
A router boots and enters setup mode. What is the reason for this?
Refer to the exhibit. What is the meaning of the highlighted value 2?
Refer to the exhibit. All routers are running RIPv1. The two networks...
Refer to the exhibit. An administrator is adding a new subnet of 50...
Which two technologies can be used in distance vector routing...
A network administrator uses the RIP routing protocol to implement...
Refer to the exhibit. Packets destined to which two networks will...
Refer to the exhibit. Host A is unable to access the Internet. What is...
Refer to the exhibit. A ping between host A and host B is successful,...
Refer to the exhibit. The 10.4.0.0 network fails. What mechanism...
All routers in a network are configured in a single OSPF area with the...
What is the function of the OSPF LSR packet?
Refer to the exhibit. Although R2 is configured correctly, host A is...
A network administrator has enabled RIP on routers B and C in the...
Refer to the exhibit. All routers are running the same routing...
Refer to the exhibit. While trying to diagnose a routing problem in...
Refer to the exhibit. The routers are properly configured using a...
Which two statements are correct about the split horizon with poison...
What are two reasons for the occurrence of a routing loop? (Choose...
Refer to the exhibit. Which three statements are true of the routing...
Alert!

Advertisement