CCNA 3 R&S: Scaling Networks Revised Flashcards

1
Q
Refer to the exhibit. A network administrator is attempting to upgrade the IOS system image on a Cisco 2901 router. After the new image has been downloaded and copied to the TFTP server, what command should be issued on the router before the IOS system image is upgraded on the router?
  ping 10.10.10.1
  dir flash:
  ping 10.10.10.2
  copy tftp: flash0:
A

ping 10.10.10.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)

The network 192.168.10.8/30 can be reached through 192.168.11.1.
The reported distance to network 192.168.1.0/24 is 41024256.
Router R1 has two successors to the 172.16.3.0/24 network.
There is one feasible successor to network 192.168.1.8/30.
The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.

A

There is one feasible successor to network 192.168.1.8/30.

The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two conditions have to be met in order to form a cluster that includes 5 access points? (Choose two.)

The APs must use different cluster names.
The APs must all be configured to use different radio modes.
At least two controllers are needed to form the cluster.
The APs have to be connected on the same network segment.
Clustering mode must be enabled on the APs.

A

The APs have to be connected on the same network segment.

Clustering mode must be enabled on the APs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1C34dE for all OSPF-enabled interfaces in the backbone area of the company network? (Choose two.)

area 0 authentication message-digest

ip ospf message-digest-key 1 md5 1C34dE

username OSPF password 1C34dE

enable password 1C34dE

area 1 authentication message-digest

A

area 0 authentication message-digest

ip ospf message-digest-key 1 md5 1C34dE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. What are two results of issuing the displayed commands on S1, S2, and S3? (Choose two.)

S3 can be elected as a secondary bridge.
S2 can become root bridge if S3 fails.
S1 will automatically adjust the priority to be the lowest.
S2 can become root bridge if S1 fails.
S1 will automatically adjust the priority to be the highest.

A

S1 will automatically adjust the priority to be the lowest.

S2 can become root bridge if S1 fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network engineer is troubleshooting a single-area OSPFv3 implementation across routers R1, R2, and R3. During the verification of the implementation, it is noted that the routing tables on R1 and R2 do not include the entry for a remote LAN on R3. Examination of R3 shows the following:

that all interfaces have correct addressing
that the routing process has been globally configured
that correct router adjacencies have formed
What additional action taken on R3 could solve the problem?

Force DR/BDR elections to occur where required.

Use the network command to configure the LAN network under the global routing process.

Enable the OSPFv3 routing process on the interface connected to the remote LAN.

Restart the OPSFv3 routing process.

A

Enable the OSPFv3 routing process on the interface connected to the remote LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank. Use the acronym.

Which encryption protocol is used by the WPA2 shared key authentication technique?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two features of OSPF interarea route summarization? (Choose two.)

ASBRs perform all OSPF summarization.

Routes within an area are summarized by the ABR.

Route summarization results in high network traffic and router overhead.

ABRs advertise the summarized routes into the backbone.

Type 3 and type 5 LSAs are used to propagate summarized routes.

A

Routes within an area are summarized by the ABR.

ABRs advertise the summarized routes into the backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. A company has migrated from single area OSPF to multiarea. However, none of the users from network 192.168.1.0/24 in the new area can be reached by anyone in the Branch1 office. From the output in the exhibit, what is the problem?

There are no interarea routes in the routing table for network 192.168.1.0.

The OSPF routing process is inactive.

The router has not established any adjacencies with other OSPF routers.

The link to the new area is down.

A

There are no interarea routes in the routing table for network 192.168.1.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two requirements when using out-of-band configuration of a Cisco IOS network device? (Choose two.)

Telnet or SSH access to the device
a connection to an operational network interface on the device

a direct connection to the console or AUX port

a terminal emulation client

HTTP access to the device

A

a direct connection to the console or AUX port

a terminal emulation client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For troubleshooting missing EIGRP routes on a router, what three types of information can be collected using the show ip protocols command? (Choose three.)

any interfaces on the router that are configured as passive

any ACLs that are affecting the EIGRP routing process

any interfaces that are enabled for EIGRP authentication

networks that are unadvertised by the EIGRP routing protocol

the local interface that is used to establish an adjacency with EIGRP neighbors

the IP addresses that are configured on adjacent routers

A

any interfaces on the router that are configured as passive

any ACLs that are affecting the EIGRP routing process

networks that are unadvertised by the EIGRP routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.)

All the interfaces need to work at the same speed.

All interfaces need to be assigned to different VLANs.

The interfaces that are involved need to be contiguous on the switch.

All the interfaces need to be working in the same duplex mode.

Different allowed ranges of VLANs must exist on each end.

A

All the interfaces need to work at the same speed.

All the interfaces need to be working in the same duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refer to the exhibit. Why did R1 and R2 not establish ad adjacency?

The link-local address must be the same on both routers.

The AS number must be the same on R1 and R2.

R1 S0/0/0 and R2 S0/0/0 are on different networks.

The no shutdown command is misapplied on both routers.

The router ID must be the same on both routers.

A

The AS number must be the same on R1 and R2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refer to the exhibit. Router CiscoVille has been partially configured for EIGRP authentication. What is missing that would allow successful authentication between EIGRP neighbors?

The interfaces that will use EIGRP authentication must be specified.

The CiscoVIlle router requires a second keychain to function correctly when using two interfaces for EIGRP authentication.

The same key number must be used on any EIGRP neighbor routers.

The keychain for EIGRP authentication must be configured on the interfaces.

A

The keychain for EIGRP authentication must be configured on the interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An EIGRP router loses the route to a network. Its topology table contains two feasible successors to the same network. What action will the router take?

The router will query neighbors for an alternate route.

The router uses the default route.

The DUAL algorithm is recomputed to find an alternate route.

The best alternative backup route is immediately inserted into the routing table.

A

The best alternative backup route is immediately inserted into the routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of STP in a scalable network?
It combines multiple switch trunk links to act as one logical link for increased bandwidth.

It decreases the size of the failure domain to contain the impact of failures.

It protects the edge of the enterprise network from malicious activity.

It disables redundant paths to eliminate Layer 2 loops.

A

It disables redundant paths to eliminate Layer 2 loops.

17
Q

After implementing an IPv6 network, the administrator notices that the OSPFv3 process is not starting on the routers. What could be the problem?​

No router IDs are configured on the routers.

Authentication was not implemented between the routers.

The routers were not configured with the network command.​

The routers are configured with the default priority.

A

No router IDs are configured on the routers.

18
Q

While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point is probably operating in which mode?

passive
mixed
open
active

A

passive

19
Q

Which statement describes a characteristic of OSPF external routes?

Type 1 and type 2 external routes in IPv4 networks are represented in the routing table by EX1 and EX2, respectively.

The cost of a type 1 route is always the external cost, regardless of the interior cost to reach that route.

A type 2 route is always preferred over a type 1 route for the same destination.

The difference between type 1 and type 2 is in the way the cost of the route is being calculated.

A

The difference between type 1 and type 2 is in the way the cost of the route is being calculated.

20
Q

What is a feature of the OSPF routing protocol?

OSPF authentication is configured in the same way on IPV4 and IPV6 networks

The SPF algorithm chooses the best path based on 30-second updates

Routers can be grouped into autonomous systems to support a hierarchical system.

It scales well in both small and large networks.

A

It scales well in both small and large networks.