CISCO 3 Practice Final

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dbuchan
D
Dbuchan
Community Contributor
Quizzes Created: 1 | Total Attempts: 195
| Attempts: 195 | Questions: 59
Please wait...
Question 1 / 59
0 %
0/100
Score 0/100
1. In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain
members?

Explanation

In transparent mode, a switch can create VLANs independently without relying on VTP messages from other switches. It ignores VTP messages received from other switches and does not pass on its local VLAN information to other switches in the VTP domain. This allows the switch to operate autonomously in terms of VLAN management, making it suitable for environments where VLAN configurations need to be controlled locally and not propagated across the network.

Submit
Please wait...
About This Quiz
CISCO Quizzes & Trivia

This 'Cisco 3 practice final' assesses knowledge on network protocols and configurations including RSTP, RIPv1, RIPv2, and VPN setups. It tests understanding of network troubleshooting, remote switch management,... see moreand secure communication setups, crucial for certification and real-world networking scenarios. see less

2. An organization is planning to expand by adding five new branches. After the expansion, it will require secured, full-time, and
simultaneous connectivity for its new branch offices with the central office. There is only one port available on the central office router.
Which WAN technology can be used in this situation?

Explanation

Frame Relay is the correct answer for this question because it is a WAN technology that allows multiple branch offices to connect to a central office using a single port on the central office router. Frame Relay uses virtual circuits to establish connections between the central office and the branch offices, providing secure and simultaneous connectivity. This makes it an ideal choice for the organization's expansion plans, as it can support the required connectivity for all five new branches using just one port on the central office router.

Submit
3. Refer to the exhibit. If router RTA fails, Which statement is true?

Explanation

If router RTA fails, hosts A and B will still be able to reach each other because they are connected to the same switch. However, they will not be able to reach hosts C and D or the server because these devices are connected to a different switch, which is dependent on router RTA for communication between the two switches.

Submit
4. Refer to the exhibit. How many routers have established OSPF adjacencies with R1?

Explanation

Based on the given exhibit, it can be inferred that R1 has established OSPF adjacencies with only two routers. This can be determined by observing the number of lines connecting R1 to other routers in the exhibit. Since there are only two lines, it indicates that R1 has formed adjacencies with two routers. Therefore, the correct answer is 2.

Submit
5. What is a feature of PAP authentication?

Explanation

PAP authentication is a simple and insecure authentication method that sends the username and password pair across the link in clear text. This means that the credentials can be easily intercepted and read by anyone with access to the network. As a result, PAP authentication does not provide any encryption or protection for the transmitted data.

Submit
6. A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?

Explanation

The solution that was implemented for the sales representative is a VPN (Virtual Private Network). A VPN allows for secure and encrypted communication over the internet, making it an ideal choice for transmitting sensitive information. It creates a private network connection between the sales representative's device and the corporate headquarters, ensuring that the data is protected from unauthorized access or interception.

Submit
7. Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.

How can the administrator solve this problem?

Explanation

To solve the problem of the internal network being unable to access the internet, the administrator should configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3. By configuring a default route on R2, any traffic that is not destined for the internal network will be forwarded to R2. This default route will then be propagated to routers R1 and R3 via RIPv2, allowing them to forward the traffic to R2 for internet access.

Submit
8. Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is correct summary address?

Explanation

The correct summary address is 192.168.0.0/22 because it includes all IP addresses from 192.168.0.0 to 192.168.3.255. This is the most efficient summary address as it covers the largest range of IP addresses while minimizing the number of routes required.

Submit
9. Which two statements correctly describe RIPv1 and RIPv2?(choose two)

Explanation

RIPv1 and RIPv2 both advertise their routing updates out all active interfaces every 30 seconds. This means that they periodically send updates about their routing tables to neighboring routers. Additionally, both RIPv1 and RIPv2 have the same administrative distance value of 120. Administrative distance is a measure of the trustworthiness of a routing protocol, and a lower value indicates a higher priority. Therefore, RIPv1 and RIPv2 are considered equally reliable in terms of administrative distance.

Submit
10. Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trunk link that has been tested and is working properly. is VTP unable to propagate VLANs from one switch to the other?

Explanation

The VTP domain name is different on both switches. VTP (VLAN Trunking Protocol) is used to propagate VLAN information across switches in a domain. In order for VLANs to be propagated from one switch to another, both switches must be in the same VTP domain, which means they must have the same domain name. Since the domain name is different on both switches, VTP is unable to propagate VLANs between them.

Submit
11. Which component of the Cisco Enterprise Architecture manages server farms?

Explanation

The enterprise edge component of the Cisco Enterprise Architecture is responsible for managing server farms. It acts as the boundary between the internal network and external networks, providing connectivity and security for the server farms. This component ensures that the server farms are accessible to users within the enterprise while also protecting them from external threats.

Submit
12. Why is UDP preferred for transmission of video traffic?

Explanation

UDP is preferred for transmission of video traffic because it has low overhead. Unlike TCP, which requires a three-way handshake and retransmits lost packets, UDP does not have these mechanisms. This makes UDP faster and more efficient for transmitting real-time video data, as it does not waste time on establishing connections or retransmitting lost packets. Instead, UDP simply sends the video packets as quickly as possible, resulting in lower latency and smoother video playback.

Submit
13. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new
router. What is causing the interface to reject the address?

Explanation

The interface is rejecting the address because the technician is using a network address. A network address is the address that represents the entire network, so it cannot be assigned to an individual interface. Each interface on a router or a device should have a unique IP address within the network.

Submit
14. Which statement describes a PVC?

Explanation

A PVC, or Permanent Virtual Circuit, is a type of connection in a network that provides a permanent logical connection to forward data between two points. Unlike a switched virtual circuit (SVC), which is dynamically established when a router requests a transmission, a PVC remains in place even when not in use. This allows for faster and more efficient data transmission as there is no need to establish a connection each time data needs to be sent. Additionally, a PVC does not prevent small messages from being held up behind larger messages, as it is a fixed connection.

Submit
15. Refer to the exhibit. R1 is using the default OSPF operation. Which IP address will be used as the router ID of R1?

Explanation

The router ID in OSPF is used to uniquely identify each router in the OSPF domain. By default, the router ID is determined by selecting the highest IP address of any of the router's loopback interfaces. If a loopback interface is not configured, the highest IP address of any of the router's physical interfaces will be used. In this case, since there is no information given about loopback interfaces, we can assume that the highest IP address of any of R1's physical interfaces is 10.1.1.1, therefore it will be used as the router ID.

Submit
16. While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the network
configuration. How many host addresses can be created for each subnetwork in this addressing scheme?

Explanation

In the Class A addressing scheme, the first octet is reserved for the network address, leaving 7 bits for the host address. With a subnet mask of 255.255.254.0, the last octet is divided into 8 subnets, each with 2^7 (128) possible host addresses. However, the first and last addresses in each subnet are reserved for network and broadcast addresses respectively, so the number of usable host addresses per subnet is 128-2=126. Therefore, the correct answer is 126, which is closest to 512.

Submit
17. Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?

Explanation

The correct answer is 1=R, 2=D, 3=O, 4=S. This is because the letters in the routing table entries are listed in the order of the corresponding numbers. So, the first letter in the routing table entry is "R", the second letter is "D", the third letter is "O", and the fourth letter is "S".

Submit
18. What are two benefits of implementing VLANs in an enterprise network? (Choose two.)

Explanation

Implementing VLANs in an enterprise network provides segmentation of broadcast domains, which helps to reduce network congestion and improve overall network performance. It also allows for the logical grouping of devices despite their physical location, enabling more flexibility in network management and easier implementation of security policies.

Submit
19. Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will be
most specific?

Explanation

The summary address 172.16.0.0/22 is the most specific because it has the smallest subnet mask (22 bits) compared to the other options. The smaller the subnet mask, the more specific the summary address is.

Submit
20. Which function does the access layer provide in a hierarchical internetworking model?

Explanation

The access layer in a hierarchical internetworking model provides an entry point for hosts into the network. This layer is responsible for connecting end devices such as computers, printers, and IP phones to the network. It provides access to the network resources and services for these devices. The access layer also includes functions like port security, VLAN assignment, and authentication to ensure that only authorized devices can connect to the network.

Submit
21. Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?

Explanation

The session from host B to hosts E and F will be blocked as a result of the displayed commands. This can be inferred from the access list that is applied on the outbound traffic of interface FastEthernet 0/0. The access list denies any traffic from host B to hosts E and F, as indicated by the "deny ip host B any" statement. Thus, the session from host B to hosts E and F will be blocked.

Submit
22. Refer to the exhibit. what is the purpose of assigning the IP address 192.168.30.1 to an access layer switch?

Explanation

The purpose of assigning the IP address 192.168.30.1 to an access layer switch is to allow remote management of the switch. By assigning an IP address, administrators can connect to the switch remotely and manage its configuration, monitor its performance, and troubleshoot any issues without needing physical access to the device. This provides convenience and flexibility in managing the switch, especially in large network environments where physically accessing each switch may not be practical or efficient.

Submit
23. What is the difference between the passive and active route status as displayed in an EIGRP topology table?

Explanation

The correct answer is "Routes that are active are being recalculated by DUAL." In EIGRP, DUAL (Diffusing Update Algorithm) is responsible for calculating the best route to a destination. When a route is active, it means that DUAL is actively recalculating the route, considering any changes in the network. This allows for dynamic routing and ensures that the best path is always chosen. Passive routes, on the other hand, are not updated and do not participate in the recalculation process. They are simply stored in the topology table for reference.

Submit
24. What are two characteristics of EIGRP? (Choose two.)

Explanation

EIGRP (Enhanced Interior Gateway Routing Protocol) has two characteristics mentioned in the answer. Firstly, it sends small hello packets to maintain knowledge of its neighbors. These hello packets are used to establish and maintain neighbor relationships, allowing routers to exchange routing information effectively. Secondly, EIGRP supports equal and unequal cost load balancing. This means that it can distribute traffic across multiple paths, even if the paths have different costs associated with them. This load balancing feature helps in optimizing network performance and utilizing available resources efficiently.

Submit
25. Which Frame Relay component provides connection status information about PVCs in the network?

Explanation

LMI stands for Local Management Interface, which is a protocol used in Frame Relay networks to exchange control information between the network devices and the service provider. LMI provides connection status information about PVCs (Permanent Virtual Circuits) in the network, allowing devices to monitor the availability and status of the connections. CIR (Committed Information Rate) is a bandwidth parameter, DLCI (Data Link Connection Identifier) is a virtual circuit identifier, and FECN (Forward Explicit Congestion Notification) is a bit used to indicate network congestion.

Submit
26. Refer to the exhibit. R1 is configured for inter-VLAN communication as displayed. PC1 is able to ping PC2 but unable to ping PC3. What
is the cause of this problem?

Explanation

Fa0/4 must be configured as a trunk. This is because PC3 and the FastEthernet0/0 interface of R1 are on different VLANs and require inter-VLAN communication. To enable communication between different VLANs, a trunk link is needed. A trunk link carries traffic for multiple VLANs and allows the VLAN tags to be preserved as the traffic is transmitted between switches. Therefore, configuring Fa0/4 as a trunk will allow PC1 to communicate with PC3.

Submit
27. Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed. How will this ACL affect traffic at R1?

Explanation

The ACL 101 is applied outbound on the Fa0/1 interface of R1. Outbound ACLs are used to filter traffic that is leaving the interface. In this case, the ACL denies all traffic that exits the Fa0/1 interface. Therefore, all traffic that tries to leave through this interface will be denied.

Submit
28. Which routing protocol is unable to support discontiguous networks?

Explanation

RIPv2 is unable to support discontiguous networks because it does not include the subnet mask in its routing updates. This means that RIPv2 assumes that all networks within its domain are contiguous, or directly connected. Therefore, if there are discontiguous networks present, RIPv2 will not be able to accurately route traffic to those networks.

Submit
29. Refer to the exhibit. Which VTP function will this switch perform?

Explanation

The given answer states that the switch will send VTP messages to other attached switches. This means that the switch will participate in VTP (VLAN Trunking Protocol) and will send updates about VLAN configurations to other switches in the network. This allows for VLAN information to be synchronized across multiple switches, ensuring consistency in VLAN configurations throughout the network.

Submit
30. Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between
them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause
of this connectivity problem?

Explanation

The cause of the connectivity problem is the incorrect subnet mask on R2. The subnet mask determines the network portion and the host portion of an IP address. If the subnet mask is incorrect, it can result in the devices being on different networks, preventing them from communicating with each other. In this case, even though CDP is operational and Layer 2 connectivity is established, the incorrect subnet mask on R2 is causing the pings between the two interfaces to fail.

Submit
31. Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRP
network fails to converge?

Explanation

The reason the EIGRP network fails to converge is because autosummarization is enabled on both routers. Autosummarization is a feature in EIGRP that automatically summarizes routes at network boundaries, which can cause routing issues when multiple routers are involved. In this case, since both routers have autosummarization enabled, it is likely causing conflicting route summarization, leading to convergence failure.

Submit
32. Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?

Explanation

The route that will be added to the routing table of R1 is "D 192.168.0.0/22 is a summary, Null0". This is indicated by the line "D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0" in the given commands. The "D" indicates that it is a summary route, the "192.168.0.0/22" is the network address with a subnet mask of /22, and "Null0" represents the next hop interface.

Submit
33. Which two STP states allow a switch to learn MAC addresses? (Choose two.)

Explanation

The STP states of "learning" and "forwarding" allow a switch to learn MAC addresses. In the "learning" state, the switch listens to network traffic and adds the source MAC addresses of incoming frames to its MAC address table. In the "forwarding" state, the switch actively forwards network traffic based on the MAC address table entries it has learned. The other options, "blocking," "listening," and "disabled," do not allow the switch to learn MAC addresses.

Submit
34. Which route will be excluded from the updates that are sent to the neighbor routers?

Explanation

The route that will be excluded from the updates sent to the neighbor routers is R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1. This is because the metric value of 1 is the lowest among all the routes listed. In a routing protocol like OSPF, the route with the lowest metric is considered the best route and is chosen to be included in the updates sent to the neighbor routers.

Submit
35. Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved?

Explanation

To resolve the issue of hosts in network A not being able to access the Internet, configuring the access list for the correct network is the appropriate solution. This will ensure that the necessary traffic is allowed through the network and can reach the Internet. By properly configuring the access list, the hosts in network A will be able to establish a connection and access the Internet successfully.

Submit
36. Which EIGRP packet type is sent when DUAL places a route in the active state?

Explanation

When DUAL (Diffusing Update Algorithm) places a route in the active state, it sends a query packet. The query packet is used to search for an alternate route in case the current route fails or becomes unavailable. By sending a query packet, the router asks its neighboring routers if they have a feasible successor for the route. This helps in maintaining a loop-free and efficient routing network.

Submit
37. What are two benefits of using ACLs? (Choose two.)

Explanation

ACLs, or Access Control Lists, provide IP filtering by allowing or denying specific types of traffic based on IP addresses, ports, or protocols. This helps in enhancing network security by controlling access to network resources. Additionally, ACLs identify traffic for multiple uses such as Quality of Service (QoS) and Network Address Translation (NAT), allowing for better network performance and efficient use of network resources.

Submit
38. Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet?

Explanation

The correct IP address that can be used at the Fa0/0 interface of R1 to enable host A to access the Internet is 192.168.1.63/27. This is because the /27 subnet mask allows for 30 usable host addresses, and the IP address 192.168.1.63 falls within the range of usable addresses. Additionally, this IP address is in the same network as host A (192.168.1.65/27), which means they can communicate with each other.

Submit
39. Refer to the exhibit. Using the command ip route 192.168.1.0 255.255.255.0 10.1.1.2 150, the network administrator configures a new
route. Which statement describes how the router will use the new route?

Explanation

The given command "ip route 192.168.1.0 255.255.255.0 10.1.1.2 150" configures a new static route. This means that the network administrator is manually specifying the path for traffic destined to the 192.168.1.0/24 network. However, this route will only be used if the dynamic routing information for this route is lost. In other words, if the router is unable to find a suitable dynamic route for the 192.168.1.0/24 network, it will use the new static route instead. Therefore, the new route will be displayed in the routing table if the dynamic routing information for this route is lost.

Submit
40. Refer to the exhibit. What information can be determined from the exhibited command?

Explanation

The exhibited command specifies the administrative distance of the route to the 10.1.1.2 host, which is 1. The administrative distance is a value used by routers to determine the trustworthiness of a particular route. A lower administrative distance indicates a more preferred route. In this case, since the administrative distance is 1, it means that this route is the most preferred and will be chosen over other routes with higher administrative distances.

Submit
41. Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network.
Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

Explanation

The network statement is missing, which means that the OSPF process is not advertising the 172.30.20.0/24 network. This results in the users on that network being unable to access the servers on the 192.168.0.0/23 network. Additionally, the network 172.30.20.0 has an incorrect wildcard mask, which further prevents proper routing and connectivity between the networks.

Submit
42. Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses?
(Choose two.)

Explanation

The two valid inside global addresses are 198.133.219.102 and 198.133.219.103. These addresses are valid because they are public IP addresses that can be used on the internet. The other addresses, 192.168.1.1 and 192.168.1.2, are private IP addresses that are reserved for use within a local network and cannot be routed on the internet.

Submit
43. Refer to the exhibit. All switches are configured with default bridge priority. Which two ports will be STP root ports if all links are operating
at the same bandwidth? (Choose two.)

Explanation

The STP root port is the port on a switch that provides the shortest path to the root bridge. In this scenario, the root bridge is not specified, but it can be assumed that it is not any of the switches A, B, or C since they all have default bridge priority. The root ports will be the ports on switches A and B that are connected to the switch with the lowest bridge ID. Since the bandwidth of all links is the same, the tiebreaker for the root port selection will be the lowest port ID. Therefore, the root ports will be the Fa0/2 interface of switch A and the Fa0/2 interface of switch B.

Submit
44. Refer to the exhibit. A network engineer at the BRANCH1 office wishes to use network summarization to announce the fewest networks
possible to the MAIN office. If the summaries include only the networks that are shown and no others, how many networks will be
announced?

Explanation

The exhibit is not provided, so it is not possible to generate an explanation for the given correct answer.

Submit
45. What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)

Explanation

The three correct host addresses in the 172.16.0.0/17 network are 172.16.0.255, 172.16.16.16, and 172.16.127.127. These addresses fall within the range of the network address 172.16.0.0 and the broadcast address 172.16.127.255, which are both valid in the /17 subnet. The addresses 172.16.128.1 and 172.17.1.1 are outside the range of the given network.

Submit
46. Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routing
table? (Choose two.)

Explanation

The router will install routes 2 and 6 in its routing table. This is because these routes have the lowest administrative distance. Administrative distance is a measure of the trustworthiness of a routing protocol, with lower values indicating higher trust. In this case, routes 2 and 6 have an administrative distance of 1, which is lower than the administrative distance of routes 1, 3, and 5. Therefore, routes 2 and 6 will be chosen to be installed in the routing table.

Submit
47. Which two wildcard masks are required in an extended access list statement that blocks the traffic from host 172.16.1.2 to network
192.168.1.0/25? (Choose two.)

Explanation

The correct answer is 0.0.0.127 and 0.0.0.0. The first wildcard mask 0.0.0.127 is required because it allows only the last bit of the host IP address to vary, meaning it matches the specific host IP address 172.16.1.2. The second wildcard mask 0.0.0.0 is required because it matches all possible values for the network portion of the destination IP address, effectively blocking traffic to any destination network.

Submit
48. Refer to the exhibit. What are two consequences of issuing the displayed commands? (Choose two.) ONLY ONE ANSWERED AT THIS TIME!!!!

Explanation

The key being encrypted with the MD5 hashing algorithm is one of the consequences of issuing the displayed commands. However, without knowing the other command that was answered, it is not possible to provide an explanation for the second consequence.

Submit
49. Refer to the exhibit. What is the correct description of the highlighted address?

Explanation

The highlighted address refers to the routerID of the neighboring router. RouterIDs are unique identifiers assigned to each router in a network. They are used for various purposes, such as determining the best path for routing and establishing neighbor relationships between routers. In this case, the highlighted address is not related to the destination network, next hop address, or interface IP address. Instead, it specifically identifies the neighboring router.

Submit
50. Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?

Explanation

The exhibited command "ip route 192.168.1.128 255.255.255.192 10.1.1.2" configures a static route on R1. This static route specifies that all packets with the source network address 192.168.1.128/26 should be forwarded through the interface with the IP address 10.1.1.2. Therefore, the correct answer is that it configures a static route for all packets with the source network address 192.168.1.128/26.

Submit
51. Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)

Explanation

CHAP uses repeated challenges for verification. This means that the authentication process involves multiple challenges and responses between the authenticating entity and the remote peer, increasing the security of the authentication process.

PPP encapsulation is configured in interface mode. PPP (Point-to-Point Protocol) encapsulation is a protocol used to establish a direct connection between two nodes over a serial link. It is configured on the interface level to enable PPP encapsulation on that specific interface.

CHAP uses a challenge/response that is based on the MD5 hash algorithm. CHAP (Challenge-Handshake Authentication Protocol) uses a challenge/response mechanism for authentication. The challenge is sent by the authenticating entity, and the response is generated by the remote peer using the MD5 hash algorithm. This ensures the integrity and security of the authentication process.

Submit
52. Which two statements correctly describe RSTP?(choose two)

Explanation

RSTP (Rapid Spanning Tree Protocol) is a standard protocol, not a Cisco proprietary protocol. It is designed to improve the convergence time of the spanning tree algorithm and can recalculate the spanning tree in less than 1 second, making the second statement correct. RSTP does not require the PortFast and UplinkFast features on switch ports, so the third statement is incorrect. RSTP supports four states: blocking, listening, learning, and forwarding, making the fourth statement correct. The last statement about requiring a full-duplex, point-to-point connection between switches for achieving the highest recalculation speed is not mentioned in the question, so we cannot determine its correctness.

Submit
53. What are two reasons for assigning switch ports to different VLANs? (Choose two.)

Explanation

Assigning switch ports to different VLANs decreases the size of the collision domain by dividing the network into smaller broadcast domains. This reduces the chances of collisions and improves network performance. Additionally, assigning switch ports to different VLANs allows for logical grouping of hosts according to their function, which simplifies network management and enhances security by isolating traffic between different groups of hosts.

Submit
54. What are two features of a standard IP ACL? (Choose two.)

Explanation

The two features of a standard IP ACL are that it filters the packet based on the source IP address only and that it can only filter inbound traffic on an interface. Standard IP ACLs do not consider the entire protocol, but only the source IP address. Additionally, they can only be applied to inbound traffic on an interface, not outbound traffic.

Submit
55. Refer to the exhibit. R1 and R2 are connected to each other through their serial0/0/0 interfaces, but are unable to establish OSPF
adjacency. What are two reasons for this? (Choose two.)  ONLY ONE ANSWERED AT THIS TIME!!!

Explanation

The reason for the OSPF adjacency not being established between R1 and R2 could be that the serial interfaces of the two routers are in different subnets. OSPF requires that routers in the same area have interfaces in the same subnet in order to form an adjacency. If the serial interfaces are in different subnets, the routers will not be able to establish OSPF adjacency.

Submit
56. Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR, the routers are booted at the same time? (Choose two.)

Explanation

Based on the information provided, the correct answer is R4 will be the DR. This is because the router with the highest OSPF priority value will become the DR (Designated Router). If two routers have the same priority, the router with the highest router ID will become the DR. In this case, R4 has the highest priority value (100) among all the routers, so it will be selected as the DR.

Submit
57. What are two advantages of using dynamic routing protocols in a network? (Choose two.)

Explanation

Dynamic routing protocols have the advantage of adapting to topological changes in a network. This means that if there are any changes in the network, such as a new router being added or a link going down, dynamic routing protocols can automatically adjust the routing tables to ensure that traffic is still being efficiently routed. Additionally, dynamic routing protocols are generally considered to be more secure than static routes. This is because dynamic protocols use authentication mechanisms to ensure that only trusted routers can exchange routing information, reducing the risk of unauthorized access or malicious routing updates.

Submit
58. Which two statements are true about untagged frames on a switch? (Choose two.)

Explanation

Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN. This means that when a switch receives an untagged frame on a trunk port, it assumes that the frame belongs to the native VLAN, which is the default VLAN for that trunk port. Untagged frames can pass through access ports, but they cannot pass through trunk ports without being assigned to the native VLAN. The statement about untagged frames minimizing delays associated with inspection of the VLAN ID tag is not true, as untagged frames do not have a VLAN ID tag to inspect.

Submit
59. Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choose
two.)

Explanation

Setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface would ensure that R1 always becomes the Designated Router (DR) for OSPF area 0. OSPF uses the DR/BDR (Backup Designated Router) election process to select a router that will act as the DR and BDR for the network. The router with the highest OSPF priority becomes the DR, and if there is a tie, the router with the highest router ID is selected. By setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface, R3 will have a lower priority than R1 and R2, making R1 the preferred DR.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 29, 2009
    Quiz Created by
    Dbuchan
Cancel
  • All
    All (59)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In which VTP mode can a switch create VLANs, ignore VTP messages, and...
An organization is planning to expand by adding five new branches....
Refer to the exhibit. If router RTA fails, Which statement is true?
Refer to the exhibit. How many routers have established OSPF...
What is a feature of PAP authentication?
A sales representative is preparing to send sensitive information to...
Refer to the exhibit. The network administrator has configured R1, R2,...
Refer to the exhibit. A network administrator must manually summarize...
Which two statements correctly describe RIPv1 and RIPv2?(choose two)
Refer to the exhibit. Switch1 and Switch2 are connected to each other...
Which component of the Cisco Enterprise Architecture manages server...
Why is UDP preferred for transmission of video traffic?
Refer to the exhibit. A network support technician has been asked to...
Which statement describes a PVC?
Refer to the exhibit. R1 is using the default OSPF operation. Which IP...
While using the Class A addressing scheme, a network administrator...
Refer to the exhibit. Which set of letters would appear at the...
What are two benefits of implementing VLANs in an enterprise network?...
Refer to the exhibit. R3 is announcing all displayed internal networks...
Which function does the access layer provide in a hierarchical...
Refer to the exhibit. Which Telnet session will be blocked as a result...
Refer to the exhibit. what is the purpose of assigning the IP address...
What is the difference between the passive and active route status as...
What are two characteristics of EIGRP? (Choose two.)
Which Frame Relay component provides connection status information...
Refer to the exhibit. R1 is configured for inter-VLAN communication as...
Refer to the exhibit. The administrator applies ACL 101 outbound on...
Which routing protocol is unable to support discontiguous networks?
Refer to the exhibit. Which VTP function will this switch perform?
Refer to the exhibit. R1 and R2 are connected via serial interfaces....
Refer to the exhibit. The network administrator configured the routers...
Refer to the exhibit. Which route will be added to the routing table...
Which two STP states allow a switch to learn MAC addresses? (Choose...
Which route will be excluded from the updates that are sent to the...
Refer to the exhibit. None of the hosts in network A are able to...
Which EIGRP packet type is sent when DUAL places a route in the active...
What are two benefits of using ACLs? (Choose two.)
Refer to the exhibit. Which IP address can be used at the Fa0/0...
Refer to the exhibit. Using the command ip route 192.168.1.0...
Refer to the exhibit. What information can be determined from the...
Refer to the exhibit. Users on the 172.30.20.0/24 network are unable...
Refer to the exhibit. The network administrator has implemented NAT on...
Refer to the exhibit. All switches are configured with default bridge...
Refer to the exhibit. A network engineer at the BRANCH1 office wishes...
What are three correct host addresses in the 172.16.0.0/17 network?...
Refer to the exhibit. A router has learned the six routes that are...
Which two wildcard masks are required in an extended access list...
Refer to the exhibit. What are two consequences of issuing the...
Refer to the exhibit. What is the correct description of the...
Refer to the exhibit. What is the result of configuring the newly...
Which three statements relate to PPP encapsulation and CHAP...
Which two statements correctly describe RSTP?(choose two)
What are two reasons for assigning switch ports to different VLANs?...
What are two features of a standard IP ACL? (Choose two.)
Refer to the exhibit. R1 and R2 are connected to each other through...
Refer to the exhibit. OSPF is enabled and the network is fully...
What are two advantages of using dynamic routing protocols in a...
Which two statements are true about untagged frames on a switch?...
Refer to the exhibit. What are two possible procedures that would...
Alert!

Advertisement