Ims Asia Route Test Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 80,705
| Attempts: 76 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. What command could be used to stop rip from sending updates to an interface?

Explanation

The correct answer is (config-router)# Passive interface s 0. This command is used in the router configuration mode to stop the Routing Information Protocol (RIP) from sending updates to the specified interface. By making the interface passive, RIP will not send any updates through it, effectively stopping RIP updates on that interface.

Submit
Please wait...
About This Quiz
Ims Asia Route Test Quiz - Quiz

The IMS Asia Route Test Quiz assesses proficiency in configuring and managing network routing protocols including EIGRP, BGP, and OSPF. It tests skills crucial for network engineers, focusing... see moreon selective routing advertisement, table management, and interface-specific configurations. see less

2. What command would typically be used to check the LSDB in ospf?

Explanation

The correct answer is "Show ip ospf database". This command is typically used to check the Link State Database (LSDB) in OSPF. The LSDB contains information about the network topology and is used by OSPF routers to determine the best path for routing. By using the "Show ip ospf database" command, network administrators can view the contents of the LSDB and gather information about the OSPF network.

Submit
3. What command can be used to check the routing table?

Explanation

The correct answer is "Show ip route." This command can be used to check the routing table. It displays the routing table information, including the network destinations and their corresponding next hop addresses. By using this command, network administrators can verify the current routing configuration and troubleshoot any routing issues.

Submit
4. Wat is the command used to create a p2p interface in frame relay?

Explanation

The correct answer is "interface s 0/0.1 point-to-point". This command is used to create a point-to-point interface in frame relay. The "point-to-point" keyword specifies that the interface is a point-to-point connection, which means that it is a direct connection between two devices.

Submit
5. What address will represent the subnet of this ip address?
197.234.17.19 /27

Explanation

The given IP address is 197.234.17.19 and the subnet mask is /27. The subnet mask determines the network portion of an IP address. In this case, a /27 subnet mask means that the first 27 bits of the IP address are the network portion, and the remaining 5 bits are the host portion. Therefore, the subnet address for this IP address would be 197.234.17.0, as it represents the network portion of the IP address.

Submit
6. When using Route-Maps in conjunction with PBR, what will happen to packets that is denied in a match statement in the route map?

Explanation

When using Route-Maps in conjunction with PBR, if a packet is denied in a match statement in the route map, it will follow normal routing. This means that the packet will be forwarded based on the routing table and not be affected by the PBR configuration.

Submit
7. What command could be used to check the BGP routing table?

Explanation

The correct answer is "Show ip bgp." This command is used to check the BGP routing table. BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems on the internet. By using the "Show ip bgp" command, network administrators can view the BGP routing table, which contains information about the available routes and their attributes. This command provides detailed information about BGP routes, including the network prefix, next hop, metric, and other attributes.

Submit
8. Which one of the following attributes is not a well known mandatory attribute?

Explanation

Local preference is not a well-known mandatory attribute in the context of routing protocols. AS-Path, Origin, and next-hop are all attributes that are commonly used and required in the routing decision-making process. The AS-Path attribute indicates the sequence of autonomous systems that a route has traversed, the Origin attribute specifies the origin of the route (e.g., IGP, EGP, or Incomplete), and the next-hop attribute identifies the next router to which the route should be forwarded. In contrast, Local preference is an optional attribute that is used to influence the routing decision within a single autonomous system.

Submit
9. What command can be used to check whether a virtual link is operational?

Explanation

The command "Show ip ospf virtual-links" can be used to check whether a virtual link is operational. This command specifically displays information about the OSPF virtual links configured on a router. By using this command, network administrators can verify the status and operational state of the virtual links in the OSPF network.

Submit
10. What command would you use to clear a routing table?

Explanation

The correct answer is "Clear ip route *". This command is used to clear the entire routing table in Cisco IOS devices. By using the "clear ip route *" command, all the routes in the routing table will be removed, allowing for a fresh start in the routing process.

Submit
11. What command can you use to see whether and what access-list is bound to an interface as in or outbound? 

Explanation

The correct answer is "Show ip interface S0". This command is used to display information about the specified interface, including any access-lists that are bound to it. By using this command, you can determine whether there is an access-list applied to the interface and view the details of the access-list if it is present.

Submit
12. What command can be used to set int s 0/0 to its default?

Explanation

The correct answer is (config)# default interface s0. This command is used to reset the configuration of interface s0 to its default settings. It allows the user to undo any changes made to the interface and revert it back to its original state.

Submit
13.                        197.234.17.19 /27
What will be the broadcast address of this ip address?

Explanation

The given IP address is 197.234.17.19 with a subnet mask of /27. This means that the first 27 bits of the IP address are used for network identification, and the remaining 5 bits are used for host identification. To find the broadcast address, we need to set all the host bits to 1. Since the last host bit is the 32nd bit, we set it to 1, resulting in the broadcast address of 197.234.17.31.

Submit
14. What type of protocol is BGP considered to be?

Explanation

BGP (Border Gateway Protocol) is considered to be an EGP (Exterior Gateway Protocol). EGP is a type of protocol that is used for routing between different autonomous systems (AS) in the internet. BGP is specifically designed for this purpose, allowing the exchange of routing and reachability information between ASs. It is not an advanced distance vector protocol using the Dijkstra algorithm, nor is it a link-state protocol. Therefore, the correct answer is EGP.

Submit
15. You have a router with ospf and rip configured and you want to redistribute Rip into ospf. What is the most correct command to achieve this? 

Explanation

The most correct command to redistribute Rip into ospf is "Router ospf 10 Redistribute rip subnets". This command specifies that the OSPF process with ID 10 should redistribute RIP routes into OSPF, including all subnets.

Submit
16. Which Router in sketch 6 between RB and RF will be the DR on that link?

Explanation

The question is asking which router between RB and RF will be the designated router (DR) on the link shown in sketch 6. However, the answer is "None of the above," which means that neither RB nor RF will be the DR on that link. This suggests that there may be another router in the network that will assume the role of the DR on that particular link.

Submit
17. What command can you use to verify peering in BGP?

Explanation

The command "Show ip bgp summary" can be used to verify peering in BGP. This command provides a summary of the BGP routing table, including information about the BGP neighbors and their status. It allows you to see if the BGP peering sessions are established and if there are any issues with the neighbors. By using this command, you can quickly check the status of BGP peering and ensure that the routing information is being exchanged properly.

Submit
18. You want to change the rid on a ospf configured router, what is the best way to make sure that the new rid will be used? 

Explanation

The best way to ensure that the new RID will be used is by clearing the OSPF process on the router. This can be done by using the command "clear ip ospf process". This command will reset the OSPF process on the router, causing it to reevaluate the RID and use the new one.

Submit
19. What command should be used to set an interface in level 2 only with ISIS?

Explanation

The correct answer is "(config-if)# isis circuit level-2 only". This command is used to set an interface in level 2 only with ISIS. It specifies that the interface should only participate in level 2 routing with ISIS, and not in level 1 routing.

Submit
20. What is the administrative distance for IBGP?

Explanation

The administrative distance for IBGP is 200. Administrative distance is a measure used by routers to determine the preference of routes received from different routing protocols. It is used to select the best route when multiple routing protocols are present. A lower administrative distance indicates a more preferred route. In this case, IBGP has an administrative distance of 200, which means it is less preferred than other routing protocols with lower administrative distances.

Submit
21.                     172.16.33.10 /23
What is the broadcast address for this address?

Explanation

The given IP address is 172.16.33.10 with a subnet mask of /23. This means that the first 23 bits of the IP address are the network address, and the remaining 9 bits are for host addresses. In binary, the network address is 172.16.32.0. The broadcast address is obtained by setting all the host bits to 1, so the broadcast address for this network is 172.16.33.255.

Submit
22. What adjacency's will be formed between RC and RD?



Explanation

The correct answer is L1 and L2. This means that both L1 and L2 will form adjacencies with RC and RD.

Submit
23. Which command can be used to view the level-1 and level-2 topology table in IS-IS?

Explanation

The correct answer is "Show is-is topology". This command is used to view the level-1 and level-2 topology table in IS-IS. It provides information about the network topology, including the routers, links, and their respective metrics. By using this command, network administrators can gain insights into the IS-IS routing protocol and make informed decisions about network optimization and troubleshooting.

Submit
24. What command can be used to make sure a ospf router does not take over the DR or BDR role in a broadcast medium? 

Explanation

Setting the OSPF priority to 0 using the "ip ospf priority 0" command on the interface configuration level ensures that the OSPF router will not take over the DR (Designated Router) or BDR (Backup Designated Router) role in a broadcast medium. The OSPF priority value determines the likelihood of a router becoming the DR or BDR, with a higher value indicating a higher priority. By setting the priority to 0, the router effectively removes itself from contention for these roles.

Submit
25. What command should be used to set up a relationship between RC and RD?

Explanation

The correct answer is "None of the above." This is because the given commands are used to set up relationships between the local router and the specified neighbors, but none of the specified neighbors are RC or RD. Therefore, none of the given commands can be used to set up a relationship between RC and RD.

Submit
26. Which of the protocols uses the DUAL algorithm?
1) Rip2) Rip23) EIGRP4) IGRP5) OSPF6) IS-IS7) BGP

Explanation

The correct answer is 3. EIGRP uses the DUAL algorithm. The DUAL (Diffusing Update Algorithm) is a routing algorithm used by EIGRP to calculate the best path to a destination network. It allows for fast convergence and loop-free routing by considering multiple factors such as bandwidth, delay, reliability, and load when selecting the best path. EIGRP is an advanced distance vector routing protocol developed by Cisco and is commonly used in large enterprise networks.

Submit
27. If a router has the following configuration: int S0 10.1.1.1/24, int S1 10.1.2.1/24 and int S2 192.168.37.10/24 and you only want to enable ospf on int S0 in area 0. What command would you use?

Explanation

The correct command to enable OSPF on interface S0 in area 0 would be "network 10.1.1.0 0.0.0.255 area 0". This command matches the network address and wildcard mask of the S0 interface, specifying that this network should be included in OSPF area 0. None of the given options match this command, so the correct answer is "None of the above".

Submit
28. What command should be used to bind a route-map to a router?

Explanation

The correct answer is "Ip local policy route-map pbr." This command should be used to bind a route-map to a router. The "ip local policy route-map pbr" command is used to apply a route-map to the router's local policy routing. It allows the router to make routing decisions based on the defined route-map criteria.

Submit
29. Which of these protocols is class full and only works with FLSM?
1) Rip2) Rip23) EIGRP4) IGRP5) OSPF6) IS-IS7) BGP

Explanation

RIP (Routing Information Protocol) and IGRP (Interior Gateway Routing Protocol) are both classful protocols that only work with Fixed Length Subnet Masking (FLSM). These protocols do not support Variable Length Subnet Masking (VLSM) which allows for more efficient use of IP addresses. Therefore, the correct answer is 1,4.

Submit
30. What command would typically be used to check the lsdb for type 5 LSAs?

Explanation

The correct answer is "Show ip ospf database external". This command is typically used to check the link state database (lsdb) for type 5 LSAs in OSPF. The "show" command is commonly used in network devices to display information, and in this case, "show ip ospf database external" specifically displays the OSPF database entries for external LSAs. This command allows network administrators to view the information about external routes learned by OSPF.

Submit
31.

Explanation

not-available-via-ai

Submit
32. Which one of the following entries in an ospf hello packet does not need to match for ospf to establish a database?

Explanation

The Router ID is a unique identifier assigned to each OSPF router. In OSPF, routers exchange hello packets to establish and maintain neighbor relationships. These hello packets contain information about the router, including the Router ID. The Router ID does not need to match for OSPF to establish a database because the OSPF database is built based on the information exchanged in the hello packets, such as the network topology and routing information, rather than the Router ID itself.

Submit
33. What command if any would be used to update the bgp table if changes to the bgp policy has been made? 

Explanation

To update the BGP table after making changes to the BGP policy, the command "clear ip bgp *" would be used. This command clears all the BGP sessions and forces the router to reestablish the BGP connections, causing the BGP table to be updated with the new policy changes.

Submit
34. You want to redistribute RIP into EIGRP 100 with all subnets. What command can be used to achieve this?

Explanation

The command "Redistribute rip metric 10" can be used to redistribute RIP into EIGRP 100 with all subnets. This command specifies the redistribution of RIP routes into EIGRP 100 and sets the metric of the redistributed routes to 10.

Submit
35.
You want traffic originating from E0 on Ra to use S0 as its next hop with a route map called PBR. What command can you use to achieve this?

Explanation

The correct answer is "Int E0 ip policy route-map PBR" because this command is used to apply the route map called PBR to the interface E0. By applying the route map to this interface, any traffic originating from E0 will be routed using the policy defined in the route map, which specifies that the next hop should be S0.

Submit
36. You have a router with the following setup: Int S0 192.168.1.1 /24, Int e 0 10.1.1.1 /24 and loop 0 1.1.1.1/32, what will the RID be?

Explanation

The answer is 1.1.1.1 because the question is asking for the Router ID (RID), which is typically the highest IP address on any of the router's loopback interfaces. In this case, the loopback interface has the IP address 1.1.1.1, so it will be the RID.

Submit
37. What transport protocol does BGP use?

Explanation

BGP (Border Gateway Protocol) uses TCP (Transmission Control Protocol) on port 179. TCP is a reliable and connection-oriented transport protocol that ensures the delivery of data packets in a secure and ordered manner. BGP, being a routing protocol used in large-scale networks, requires the reliability and error-checking features provided by TCP to establish and maintain connections between routers. Port 179 is specifically designated for BGP communication, allowing routers to exchange routing information and make informed routing decisions.

Submit
38. What command could be used to summarize an address in level 2 only?

Explanation

The command "summary-address 10.3.2.0 255.255.254.0 level-2" could be used to summarize an address in level 2 only. This command specifies the network address and subnet mask to be summarized, and the "level-2" parameter indicates that the summarization should be performed at level 2 only.

Submit
39. What command can be used to set a router to only participate int level 1 isis routing?

Explanation

The command "is-type level-1" is used to set a router to only participate in level 1 ISIS routing.

Submit
40. What command can be used to switch of auto summary on Rip2?

Explanation

The correct answer is "(config-router)# no auto-summary". This is the correct command to switch off auto summary on Rip2. By entering this command in the router configuration mode, the auto summary feature will be disabled for the Rip2 routing protocol.

Submit
41. What command can be used to set up BGP between RA and RC?

Explanation

The correct answer is "Neighbor 10.1.1.2 remote-as 198" because this command is used to establish a BGP neighbor relationship between the local router (RA) and the remote router (RC) with the IP address 10.1.1.2. The "remote-as" parameter specifies the autonomous system number (AS) of the remote router, which in this case is 198. By configuring this command, BGP can be set up between RA and RC to exchange routing information.

Submit
42. What command can be used to set up BGP between RA and RB?

Explanation

The correct answer is "neighbor 10.4.4.1 remote-as 189" because this command is used to set up a BGP neighbor relationship between two routers. The "neighbor" keyword is used to specify the IP address of the neighbor router, and the "remote-as" keyword is used to specify the autonomous system number of the neighbor router. In this case, the command is setting up BGP between router RA and router RB, with router RB having the IP address 10.4.4.1 and autonomous system number 189.

Submit
43. You find that when you run EIGRP on this network that it seems to be working fine, but when the link between RB and RC is disconnected the network stops working. What is the most likely reason for this?

Explanation

Auto summarization is active on RA, RB, and RC. Auto summarization is a feature in EIGRP that allows the router to summarize multiple subnets into a single network address. When the link between RB and RC is disconnected, the network stops working because the auto summarization causes the routers to advertise a summary route for the disconnected link. As a result, traffic destined for the disconnected link is sent to the summarized route instead of being dropped, leading to a network failure.

Submit
44. OSPF uses port ___________ to transfer data and hello packets?

Explanation

OSPF uses IP protocol number 89 to transfer data and hello packets.

Submit
45. You work on a router with the following configuration: Int S0 IP address 192.168.37.2/24, int E0 IP address 10.1.1.1/24 and int E1 IP address 10.2.2.1/24. You only want to advertise EIGRP AS 100 on S0 and E0 NOT E1. Which command can be used to achieve this?

Explanation

The correct answer is "Router eigrp 100 Network 192.168.37.0 Network 10.1.1.0 255.255.255.0". This command is used to configure EIGRP with AS 100 and advertise the networks 192.168.37.0/24 and 10.1.1.0/24. By specifying the subnet mask 255.255.255.0 for the network 10.1.1.0, only the E0 interface with the IP address 10.1.1.1/24 will be included in the EIGRP updates, while the E1 interface will be excluded.

Submit
46. Which router generates a type 2 LSA?

Explanation

An internal router generates a type 2 LSA. A type 2 LSA is used in OSPF (Open Shortest Path First) routing protocol to describe the network topology within an area. An internal router is a router that is located within an OSPF area and is responsible for routing traffic within that area. It advertises the network information to other routers within the same area by generating type 2 LSAs. These LSAs provide information about the internal routers and the networks they are connected to.

Submit
47. Show ip ospf border-routers:

Explanation

The command "ip ospf border-routers" is used to display information about ABRs (Area Border Routers) and ASBRs (Autonomous System Boundary Routers). ABRs are routers that connect different OSPF areas, while ASBRs are routers that connect OSPF to external networks. Therefore, this command provides information about both types of routers.

Submit
48.

Explanation

not-available-via-ai

Submit
49. What command can be used to stop the flow of LSAs type 3,4 and 5 through an ABR?

Explanation

The correct answer is "Area 1 stub no-summary". This command can be used on an ABR (Area Border Router) to stop the flow of LSAs (Link State Advertisements) of type 3, 4, and 5 through the specified area. By configuring this command, the ABR will not advertise external routes (type 5 LSAs) or summary routes (type 3 and 4 LSAs) into the stub area. This helps in reducing the size of the routing table and preventing unnecessary traffic in the stub area.

Submit
50. What command could you use to summarize all the networks from 10.1.0.0 /24 to 10.1.3.0/24 in ospf in area 0?

Explanation

The correct answer is "Area 0 range 10.1.0.0 255.255.252.0". This command is used to summarize all the networks from 10.1.0.0/24 to 10.1.3.0/24 in OSPF area 0. By specifying the range as 10.1.0.0 and the subnet mask as 255.255.252.0, it includes all the subnets within the specified range. This helps in reducing the routing table size and improving network efficiency.

Submit
51. What command can be used to check information about clns in IS-IS?

Explanation

The "Show clns route" command can be used to check information about clns in IS-IS. This command displays the routing table for clns, showing the routes and their associated metrics. It provides information about the clns routes in the IS-IS network, allowing network administrators to troubleshoot and analyze the clns routing information.

Submit
52. What is important to remember with class full routing?

Explanation

In classful routing, the subnet mask is assumed to be consistent within the same network. This means that all devices within the network must use the same subnet mask. Classful networks do not support the use of classless masks, so the subnet mask cannot be varied within the network. Therefore, the correct answer is that within the same network, consistency of the subnet mask is assumed.

Submit
53. Which of these protocols does class full auto-summarization?

1) Rip2) Rip23) EIGRP4) IGRP5) OSPF6) IS-IS7) BGP

Explanation

not-available-via-ai

Submit
54. What is the correct option to summarize the following addresses?
10.1.1.0
10.1.2.010.1.3.010.1.4.0  

Explanation

The correct option to summarize the given addresses is 10.1.1.0 /24, 10.1.2.0 /23, and 10.1.4.0 /24. These addresses can be summarized because they have the same network address (10.1.0.0) and the same subnet mask (255.255.0.0). The subnet mask determines the number of bits that are used for the network portion of the address, and in this case, it is 24 bits for the first address, 23 bits for the second address, and 24 bits for the third address. Therefore, these addresses can be summarized as 10.1.0.0 /16.

Submit
55. Given a address with a prefix of /20, how many additional subnets are gained when further subnetting it with a prefix of /28?

Explanation

When subnetting a network with a prefix of /20 into smaller subnets with a prefix of /28, each subnet will have 16 IP addresses (2^4 = 16). Since the original network has a prefix of /20, it has 2^12 = 4096 IP addresses. When further subnetting it with a prefix of /28, each subnet will have 16 IP addresses. Therefore, the number of additional subnets gained will be 4096/16 = 256.

Submit
56. If RD is the BDR in sketch 6, and RB is the DR and RB is switched off. What router will be the DR?



Explanation

If RB is switched off, it means it is no longer functioning as a router. In this case, RD, which was the BDR (Backup Designated Router) in sketch 6, would become the DR (Designated Router). The DR is responsible for maintaining the OSPF (Open Shortest Path First) database and exchanging routing information with other routers in the network. Therefore, with RB out of the picture, RD would assume the role of the DR.

Submit
57. What is the subnet for this address?
                 172.16.33.10 /23

Explanation

The given IP address is 172.16.33.10 with a subnet mask of /23. The /23 subnet mask indicates that the first 23 bits of the IP address are the network address and the remaining 9 bits are the host address. To find the subnet, we need to determine the network address by setting the host bits to zero. In this case, the network address would be 172.16.32.0. However, the given answer is 172.16.33.32 /27, which is incorrect. Therefore, the correct subnet for the given IP address and subnet mask is not available.

Submit
58. You want to set a manual rid of 10.1.1.1 in ospf, what command will best achieve this?

Explanation

The correct answer is "router-id 10.1.1.1" because this command is used in OSPF to manually set the router ID. The router ID is a unique identifier for the router within the OSPF domain. By using this command, the router will use the specified IP address as its router ID.

Submit
59. What command can you use to check for authentication in OSPF areas?

Explanation

The command "Show ip ospf" can be used to check for authentication in OSPF areas. This command displays information about OSPF routing processes, including authentication settings. By using this command, network administrators can verify if authentication is enabled and configured correctly in OSPF areas.

Submit
60. You want to pass all traffic in AS 189 through RB. What command will achieve this for you?

Explanation

The command "bgp default local-preference 150" will achieve passing all traffic in AS 189 through RB by setting a higher local preference value. By default, BGP uses the local preference attribute to determine the preferred path for outbound traffic. Setting a higher local preference value for RB ensures that all traffic from AS 189 will be sent through RB.

Submit
61. What transport mechanism is used to communicate in EIGRP?

Explanation

not-available-via-ai

Submit
62. What transport mechanism is used between a DROTHER and DR/BDR?

Explanation

The correct answer is 224.0.0.6. In a network, the DROTHER (Designated Router Other) and DR/BDR (Designated Router/Backup Designated Router) use the transport mechanism of 224.0.0.6. This address is reserved for OSPF (Open Shortest Path First) routing protocol, specifically for the AllDRouters multicast group. The DROTHER and DR/BDR use this multicast address to exchange OSPF routing information and maintain network topology.

Submit
63. Which one of the following NSAP representations will most likely be found on a CISCO router?

Explanation

The correct answer is 38.01.112233445566.00. This is because the NSAP representation used by CISCO routers typically follows the format of X.Y.ZZZZZZZZZZZZ.HH, where X is the AFI (Authority and Format Identifier), Y is the Area ID, ZZZZZZZZZZZ is the System ID, and HH is the NSAP Selector. In this case, 38 represents the AFI, 01 represents the Area ID, 112233445566 represents the System ID, and 00 represents the NSAP Selector.

Submit
64. How do you enable IS-IS on a router?

Explanation

To enable IS-IS on a router, the correct command is "Router isis". This command allows the router to participate in the IS-IS routing protocol. The other options mentioned, "Router is-is", "Router ip isis", and "Router ip is-is" are incorrect and do not activate IS-IS on the router.

Submit
65. Which if any of these protocols is capable of auto and manual summarization?
1) Rip2) Rip23) EIGRP4) IGRP5) OSPF6) IS-IS7) BGP

Explanation

The protocols capable of auto and manual summarization are EIGRP, IGRP, and BGP. Rip2, OSPF, and IS-IS do not support manual summarization. Rip2, EIGRP, and BGP support auto summarization. Therefore, the correct answer is 2,3,7.

Submit
66. A routing table in OSPF is also called?

Explanation

In OSPF, a routing table is also referred to as a Forwarding Database. The routing table contains information about the network topology and the best paths to reach different destinations. It is used by routers to determine the next hop for forwarding packets. The term "Forwarding Database" accurately describes the purpose and function of the routing table in OSPF.

Submit
67. If using prefix lists and you do not specify the first sequence # what would it be?

Explanation

If you do not specify the first sequence number when using prefix lists, the first sequence number would be 5.

Submit
68. What command could you use to summarize all the networks from 10.1.0.0 /24 to 10.1.3.0/24 in eigrp?

Explanation

The correct answer is (config-if)# ip summary-address eigrp 100 10.1.0.0 255.255.252.0. This command is used to summarize the networks from 10.1.0.0/24 to 10.1.3.0/24 in EIGRP. The subnet mask 255.255.252.0 is used to include all the networks within the range. The "config-if" indicates that this command should be entered in interface configuration mode.

Submit
69. What is the most effective way to achieve QUARRY SCOPING in EIGRP?

Explanation

Route summarization is the most effective way to achieve quarry scoping in EIGRP. By summarizing routes, unnecessary detailed information is suppressed and only a summarized route is advertised, reducing the size of the routing table and improving network efficiency. This helps to prevent excessive routing updates from being propagated throughout the network, limiting the scope of EIGRP queries and reducing unnecessary traffic. Changing the AS number between routers, setting up access-lists, or stating that quarry scoping should not make a difference in EIGRP are not valid explanations for achieving quarry scoping.

Submit
70. What command should be used to view a prefix list in detail?

Explanation

The correct answer is "Show ip prefix-list detail" because the "show ip prefix-list detail" command is used to view a prefix list in detail. This command provides a more comprehensive and detailed output compared to other options.

Submit
71. Which of these protocols uses the DIJKSTRA algorithm to work out the best routes?
1) Rip2) Rip23) EIGRP4) IGRP5) OSPF6) IS-IS7) BGP

Explanation

The correct answer is 5,6. OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System) are the protocols that use the DIJKSTRA algorithm to work out the best routes.

Submit
72. If you run EIGRP, What is the update interval for hello packets on RA?

Explanation

The update interval for hello packets on RA when running EIGRP is 60 seconds. Hello packets are used by EIGRP routers to establish and maintain neighbor relationships. These packets are sent periodically to check the reachability and availability of neighboring routers. In this case, the hello packets are sent every 60 seconds to ensure that the neighboring routers are still active and reachable.

Submit
73.

Explanation

not-available-via-ai

Submit
74. How often does EBGP update its neighbor table?

Explanation

EBGP (External Border Gateway Protocol) updates its neighbor table every 40 seconds. This means that every 40 seconds, EBGP will update the information it has about its neighboring routers or peers. This update includes exchanging routing information and ensuring that the neighbor table is up to date with the latest network topology. By updating the neighbor table regularly, EBGP can maintain accurate routing information and make informed decisions about the best paths for data transmission.

Submit
75. What values needs to match before 2 EIGRP neighbors will peer?

Explanation

Before two EIGRP neighbors can peer, their AS numbers and K values need to match. The AS number is a unique identifier for an EIGRP autonomous system, and both routers must be configured with the same AS number in order to form a neighbor relationship. The K values, also known as the metric weights, determine how EIGRP calculates the best path to a destination. If the K values are not the same on both routers, they will not be able to establish a neighbor relationship.

Submit
76. What is the more preferred way to enhance policy control?

Explanation

Prefix lists are a more preferred way to enhance policy control compared to access-lists, route-maps, and distribute lists. Prefix lists allow for more granular control over routing decisions by specifying specific IP address prefixes that can be permitted or denied. They are more efficient and scalable than access-lists and provide better control over routing updates. Route-maps and distribute lists are also used for policy control, but prefix lists are generally considered the best practice for controlling routing policies.

Submit
77. What command would you use to check IS-IS level 1 routing table?

Explanation

The correct answer is "show isis route." This command is used to check the IS-IS level 1 routing table. IS-IS (Intermediate System to Intermediate System) is a routing protocol used in computer networks. By using this command, network administrators can view the routing information specific to IS-IS level 1.

Submit
78. What command can be used to check whether a route-map is bound to an interface?

Explanation

The "Show ip policy" command can be used to check whether a route-map is bound to an interface. This command displays the IP policy routing configuration, which includes information about any route-maps that are applied to interfaces. By using this command, network administrators can verify if a specific route-map is being applied to the desired interface.

Submit
79. What command can be used to advertise the network 10.3.3.0 on RA?

Explanation

The correct answer is "Network 10.3.3.0 mask 255.255.255.0". This command is used to advertise the network 10.3.3.0 on RA. The network command followed by the network address and subnet mask is used to advertise a network in a routing protocol. In this case, the network address is 10.3.3.0 and the subnet mask is 255.255.255.0, so this command correctly advertises the network with the specified subnet mask.

Submit
80. How many hosts per subnet can you have if no other subnetting takes place?

Explanation

If no other subnetting takes place, the number of hosts per subnet can be calculated using the formula 2^n - 2, where n is the number of host bits. In this case, since the question does not provide any information about the subnet mask or network size, it is assumed that the entire IP address range is available for hosts. Therefore, the number of host bits is 10 (since 2^10 = 1024) and subtracting 2 gives us 1022 hosts per subnet.

Submit
81. What command can be used to debug whether the route map is working as intended?

Explanation

The command "debug ip policy" can be used to debug whether the route map is working as intended. This command allows for the debugging of IP policy routing, which includes the use of route maps to control the flow of traffic. By using this command, network administrators can monitor and troubleshoot any issues or inconsistencies in the route map configuration and ensure that it is functioning correctly.

Submit
82. What level routing would you find in ES-IS routing?

Explanation

ES-IS routing uses Level 0 routing.

Submit
83. You only run BGP in your AS, there is no IGP set up. You find that some of the information is not getting through the network. What is the most common reason for this?

Explanation

The most common reason for the information not getting through the network when only running BGP in your AS without an IGP set up is that the synchronization between the IBGP neighbors is switched on. This means that the IBGP routers in the AS are not advertising routes learned from an EBGP neighbor to other IBGP neighbors. As a result, the information does not propagate throughout the network.

Submit
84.                      189.17.12.18 /22
How many subnets are available in this scenario?

Explanation

not-available-via-ai

Submit
85. What command should you use to set up RC as a route reflector for RB AND RC?

Explanation

To set up RC as a route reflector for RB and RC, the "neighbor" command should be used on RC with the IP addresses of RB and RC as the neighbors. The "route-reflector-client" keyword is added to both neighbor commands to specify that these neighbors are route reflector clients. Therefore, the correct answer is "On RC: neighbor 10.3.3.1 route-reflector-client, neighbor 10.4.4.1 route-reflector-client."

Submit
86. If you have 6 routers in an IBGP full mesh topology, How many sessions would you have to set up and  maintain?

Explanation

In an IBGP full mesh topology, each router needs to establish a session with every other router in the network. Since there are 6 routers, each router needs to set up and maintain a session with the other 5 routers. Therefore, the total number of sessions required is 6 x (6-1) = 15.

Submit
87. If using Route Reflectors and there is an update from a non-client, reflect to:

Explanation

When using Route Reflectors, if there is an update from a non-client, it should be reflected to the clients. This means that the clients should receive the update from the non-client. The update should not be reflected to the route-reflectors or all non-clients, only the clients should accept the originator of the update.

Submit
88. RA needs to advertise ALL routing information to RB and RC, only BGP is used in AS 189. What command should be used to achieve this?

Explanation

The "no-synchronization" command should be used to achieve the goal of advertising ALL routing information to RB and RC. This command disables the synchronization between the BGP routing table and the Interior Gateway Protocol (IGP) routing table, ensuring that all routes are advertised regardless of their synchronization status. This is necessary in this scenario because only BGP is being used in AS 189, so synchronization is not required.

Submit
89. The address 192.168.17.0 /22 is a good example of:

Explanation

RFC 1518 refers to a document that outlines the guidelines for address allocation in the Internet Protocol version 4 (IPv4) network. It specifically addresses the issue of address exhaustion and suggests the use of address summarization techniques to conserve IP addresses. In the given question, the address 192.168.17.0 /22 is mentioned as an example, indicating that it is following the guidelines set forth in RFC 1518. Therefore, the correct answer is RFC 1518.

Submit
90. What are the 3 ways to redistribute into BGP?

Explanation

The three ways to redistribute into BGP are: redistributing from IGPs, redistributing static routes, and redistributing static routes pointing to null0. Additionally, the network command can be used to redistribute routes into BGP.

Submit
91. Which Modes of operation in ospf NBMA is not RFC compliant?

Explanation

The OSPF mode of operation "Broadcast" is not RFC compliant because it assumes that all routers in the network are directly connected to each other, which is not always the case in NBMA (Non-Broadcast Multi-Access) networks. The "Point-Point" mode is RFC compliant as it is designed for point-to-point links. The "Point-Multipoint" mode is also RFC compliant as it supports multiple routers connected to a single subnet. The "Point-Multipoint non-broadcast" mode is RFC compliant as it allows communication between multiple routers in a non-broadcast environment.

Submit
92. Which one of the following statements is not considered a good design principle in OSPF?

Explanation

"Keep it Safe" is not considered a good design principle in OSPF because OSPF is an open standard routing protocol that does not provide any built-in security mechanisms. It relies on the underlying network infrastructure to provide security measures such as access control lists (ACLs) and firewalls. Therefore, it is not recommended to rely solely on OSPF for network security and instead implement additional security measures to protect the OSPF network.

Submit
93. What command can be used to switch of auto summary on Rip1

Explanation

None of the given commands can be used to switch off auto summary on Rip1. The correct command to disable auto summary on Rip1 is "no auto-summary" which is not listed as an option.

Submit
94. If RA want to summarize the whole 1.0.0.0 network, what command/s can be used?
1)  ip route 1.0.0.0 255.0.0.0 null 0 2)  aggregate- address 1.0.0.0 mask 255.255.255.0 3)  aggregate-address 1.0.0.0 255.255.255.0 summary-only  4)  network 1.0.0.0 mask 255.0.0.0

Explanation

not-available-via-ai

Submit
95. You have an ip address which is 178.132.10.0 What is the correct subnet mask for this address?

Explanation

not-available-via-ai

Submit
96. EIGRP uses port _______ to send hellos to his peers?

Explanation

EIGRP uses Port 88 to send hellos to its peers.

Submit
97. With sketch 6 in mind, what router will most probably be the DR?

Explanation

Based on sketch 6, the router RA is most likely to be the DR (Designated Router).

Submit
98. What hello packet would be used to reply to a hello from the router to the host in ES-IS?

Explanation

The correct answer is ISH. In ES-IS (End System to Intermediate System) protocol, ISH (Intermediate System Hello) packets are used to reply to a hello message from the router to the host. These packets are used for neighbor discovery and to maintain connectivity between ES and IS in the network.

Submit
99. What are the characteristics of a PSNP packet is IS-IS?

Explanation

The characteristics of a PSNP packet in IS-IS are for acknowledgments on LSPs on P2P links and to request missing pieces of the link-state Database. PSNP packets are used to acknowledge the receipt of Link State Packets (LSPs) on point-to-point (P2P) links and to request any missing pieces of the link-state database. This helps ensure the reliability and accuracy of the network's link-state information.

Submit
100. When you configure 2 way redistribution, what are the options for redistributing routes from the core to the edge?

Explanation

The options for redistributing routes from the core to the edge in a 2-way redistribution configuration are default or static routes, redistributing and filtering routes, and redistributing and changing the administrative distance. This means that you can either use the default or static routes as they are, or you can redistribute the routes and apply filters to control which routes are redistributed. Additionally, you can also redistribute the routes and modify their administrative distance to prioritize certain routes over others.

Submit
View My Results

Quiz Review Timeline (Updated): Oct 3, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 03, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 08, 2011
    Quiz Created by
    Apalani
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What ...
What command would typically be used to check the LSDB in ospf?
What command can be used to check the routing table?
Wat is the command used to create a p2p interface in frame relay?
What ...
When ...
What command could be used to check the BGP routing table?
Which ...
What ...
What command would you use to clear a routing table?
What ...
What command can be used to set int s 0/0 to its default?
                  ...
What type of protocol is BGP considered to be?
You ...
Which ...
What command can you use to verify peering in BGP?
You ...
What ...
What is the administrative distance for IBGP?
                  ...
What adjacency's will be formed between RC and RD?
Which ...
What ...
What ...
Which ...
If ...
What command should be used to bind a route-map to a router?
Which ...
What ...
Which ...
What ...
You ...
You ...
You ...
What transport protocol does BGP use?
What command could be used to summarize an address in level 2 only?
What ...
What command can be used to switch of auto summary on Rip2?
What command can be used to set up BGP between RA and RC?
What command can be used to set up BGP between RA and RB?
You ...
OSPF uses port ___________ to transfer data and hello packets?
You work on a router with the following configuration: Int S0 IP...
Which router generates a type 2 LSA?
Show ip ospf border-routers:
What ...
What ...
What command can be used to check information about clns in IS-IS?
What is important to remember with class full routing?
Which ...
What ...
Given ...
If ...
What ...
You ...
What command can you use to check for authentication in OSPF areas?
You ...
What transport mechanism is used to communicate in EIGRP?
What transport mechanism is used between a DROTHER and DR/BDR?
Which ...
How do you enable IS-IS on a router?
Which ...
A routing table in OSPF is also called?
If ...
What ...
What is the most effective way to achieve QUARRY SCOPING in EIGRP?
What command should be used to view a prefix list in detail?
Which ...
If ...
How often does EBGP update its neighbor table?
What values needs to match before 2 EIGRP neighbors will peer?
What is the more preferred way to enhance policy control?
What command would you use to check IS-IS level 1 routing table?
What ...
What command can be used to advertise the network 10.3.3.0 on RA?
How ...
What ...
What level routing would you find in ES-IS routing?
You ...
                  ...
What ...
If ...
If ...
RA ...
The address 192.168.17.0 /22 is a good example of:
What are the 3 ways to redistribute into BGP?
Which Modes of operation in ospf NBMA is not RFC compliant?
Which ...
What command can be used to switch of auto summary on Rip1
If ...
You ...
EIGRP uses port _______ to send hellos to his peers?
With sketch 6 in mind, what router will most probably be the DR?
What ...
What are the characteristics of a PSNP packet is IS-IS?
When ...
Alert!

Advertisement