You worked your way through the first thirty questions and that’s no small feat! That said, the questions on the knowledge required to become a Cisco Certified Network Professional don’t stop there! Let’s see how many of the remaining questions you can answer correctly!
10.0.0.0/16
10.0.0.0/24
10.1.0.0/16
10.1.0.0/24
10.1.1.0/30
All /30 networks will be permitted
All networks that do not match the prefix list statements 5 and 10 will be permitted.
The 10.10.10.0/24 network will be denied
The 10.10.10.0/25 network will be denied.
The 10.10.10.0/30 network will be denied.
Routing updates that are received on any interface and permitted by ACL 1.
Routing updates that are received on any interface and permitted by prefix-list 1.
Routing updates that are received on any interface and permitted by route-map 1.
Routing updates that are received on serial 0/0/0 and permitted by ACL 1.
Routing updates that are received on serial 0/0/0 and permitted by prefix-list 1.
Routing updates that are received on serial 0/0/0 and permitted by route-map 1.
Router eigrp 10 network 10.0.0.0 exit router ospf 1 network 192.168.0.0 0.0.255.255 area 0 redistribute eigrp 10
Router eigrp 10 network 10.0.0.0 redistribute ospf 1 exit router ospf 1 network 192.168.0.0 0.0.255.255 area 0
Router eigrp 10 network 10.0.0.0 redistribute ospf 1 metric 10000 10 200 5 1500 exit router ospf 1 network 192.168.0.0 0.0.255.255 area 0
Router eigrp 10 network 10.0.0.0 redistribute ospf 1 metric 10000 10 200 5 1500 exit router ospf 1 network 192.168.0.0 0.0.255.255 area 0 redistribute eigrp 10 subnets metric 100
Redistribution does not cause routing loops due to safeguards such as administrative distance and default metric values.
The default-metric router configuration command takes precedence over the redistribute metric metric-value command.
The redistribute command is configured in the routing process of the routing protocol being redistributed
When redistributing into EIGRP, redistributed routes must be assigned a metric value.
When redistributing into OSPF, the subnets keyword must be configured to redistribute subnetted routes.
Once a route map is made, all possible further comparisons still occur.
Once a route match is made, no further comparisons occur
Once a route match is made, some further comparisons occur.
Once a route match is made, the route is denied.
BGP
OSPF
RIPv2
Static
Configured route map entries will have a default sequence number increments of 5.
It can be applied only to link-state routing protocols.
It is applied only in the inbound direction.
It provides a mechanism to mark packets with different types of service (ToS).
Packets that do not match any match statements will be dropped.
Any packets that are sourced from the internet.
Packets that are not sourced from the 10.2.0.0 network
Packets that are not sourced from ISP1 or ISP2 routers.
Packets that are sourced from 10.0.0.0 or 10.1.0.0 networks destined for 10.2.0.0
Packets that are sourced from the 10.2.0.0 network and destined for the Internet
Access-list 101 permit ip 10.0.0.0 0.0.255.255
Access-list 101 permit ip 10.0.0.0 0.0.255.255 10.0.0.0 0.255.255.255
Ip prefix-list FLIST1 permit 10.0.0.0/8 ge 16
Ip prefix-list FLIST1 permit 10.0.0.0/16 le 24
R2 interface Fa0/0
R2 interface Fa0/1
RTA interface Fa0/0
RTA interface Fa0/1
RTB interface Fa0/0
RTB interface Fa 1/0
To control traffic as it enters a router interface.
To determine the full path a packet takes across the network to its final destination.
To determine the full path a packet takes across the network to its final destination.
To generate and analyze traffic in order to measure performance between devices
Packets that exceed the MTU of an output interface and must be fragmented
Packets that need to be translated by NAT.
Packets which are forwarded to a tunnel interface
Packets whoes destination IP address is in the FIB table
Packets with an expiring TTL counter
IP address client
IP address DHCP
IP address dhcp client
IP address negotiate
Ipv6 address address/prefix-length link-local
Ipv6 address autoconfig
Ipv6 address dhcp
Ipv6 address slaac
Ipv6 dhcp server server-name
NAT64
NAT-PT
NATv6
PAT
The neighbor's IP address used in peering must be activated with the neighbor IP-address activate command
The directly connected network between the two neighbors must be advertised using the network command.
The directly connected network between the two neighbors must be advertised using the neighbor IP-address activate command.
No additional configuration in the address family is needed.
IPv4 can be used to send BGP messages for IPv4 and IPv6.
Supports BGP for both IPv4 and IPv6
Uses address families for configuration
Requires a separate router ID for BGP for IPv4 and BGP for IPv6
SNMPv1 uses community strings to encrypt SNMP messages
SNMPv1 is the most secure version to use
SNMPv1, SNMPv2 and SNMPv3 use community strings
SNMPv2 supports the use of read-write community strings to encrypt SNMP messages
SNMPv3 can provide authenticity, integrity, and confidentiality.
The device was configured with the ip ssh version 2 command.
The device was configured with the no ip ssh version command
This is also known as compatibility mode because it supports both SSHv1 and SSHv2.
This is the default SSH version when SSH is enabled.
This is the original version but has known vulnerabilities.
A layer 3 interface can belong to more than one VRF at a time.
The show ip route vrf-lite vrf-name command is used to display the VRF routing table entries.
Routing table entries prepended with "V" identify VRF enabled routes.
VRF can only be used with MPLS
VRF-lite is the deployment of VRF without MPLS.
BGP supports plain text, MD5 hashing authentication and SHA hashing authentication
EIGRP supports plain text, MD5 hashing authentication and SHA hashing authentication
EIGRP supports MD5 hashing authentication and SHA hashing authentication using named EIGRP.
OSPFv2 supports plain text, MD5 hashing authentication and SHA hashing authentication using key chains
OSPv3 supports plain text, MD5 hashing authentication and SHA hashing authentication
RIPv2 supports plain text, MD5 hashing authentication and SHA hashing authentication
A workstation requires an SSH client such as Tera Term or PuTTY to securely transfer files
Requires a local database entry to be configured when used with AAA.
Requires that a router be configured with the ip ssh server enable global configuration command.
Requires that SSH be enabled before using it.
Requires that SSL be enabled before using it.
RTR-B does not have have the command neighbor 64.100.25.1 remove-private-as applied.
RTR-A and RTR-B do not have the command neighbor ebgp-multihop applied.
The routers are attempting to peer with the loopback interface instead of the physical interface.
A network statement is missing on both routers.
Wait!
Here's an interesting quiz for you.