P4S - ICND2 - SIM 2 Flashcards

1
Q

Which type of EIGRP route entry describes a feasible successor?

A. a backup route, stored in the routing table

B. a primary route, stored in the routing table

C. a backup route, stored in the topology table

D. a primary route, stored in the topology table

A

C. a backup route, stored in the topology table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command enables IPv6 forwarding on a Cisco router?

A. ipv6 local

B. ipv6 host

C. ipv6 unicast-routing

D. ipv6 neighbor

A

C. ipv6 unicast-routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following configuration is applied to a Layer 2 Switch:

interface fastethernet 0/4

switchport mode access

switchport port-security

switchport port-security mac-address 0000.1111.1111

switchport port-security maximum 2

swithcport port-security

What is the result of the above configuration being applied to the switch?

A. A host with a mac address of 0000.1111.1111 and up to two other hosts can connect to FastEthernet 0/4 simultaneously

B. A host with a mac address of 0000.1111.1111 and one other host can connect to Fast Ethernet 0/4 simultaneously

C. Violating addresses are dropped and no record of the violation is kept

D. The switch can send an SNMP message to the network management station

E. The port is effectively shutdown

A

B. A host with a mac address of 0000.1111.1111 and one other host can connect to Fast Ethernet 0/4 simultaneously

D. The switch can send an SNMP message to the network management station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit. Which of these correctly describes the results of port security violation of an unknown packet?

A. port enabled; unknown packets dropped; no SNMP or syslog messages

B. port enabled; unknown packets dropped; SNMP or syslog messages

C. port disabled; no SNMP or syslog messages

D. port disabled; SNMP or syslog messages

A

D. port disabled; SNMP or syslog messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. What three actions will the switch take when a frame with an unknown source MAC address arrives at the interface? (Choose three.)

A. Send an SNMP trap.

B. Send a syslog message.

C. Increment the Security Violation counter.

D. Forward the traffic.

E. Write the MAC address to the startup-config.

F. Shut down the port.

A

A. Send an SNMP trap.

B. Send a syslog message.

C. Increment the Security Violation counter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. Assuming that the entire network topology is shown, what is the operational status of the interfaces of R2 as indicated by the command output shown?

A. One interface has a problem.

B. Two interfaces have problems.

C. The interfaces are functioning correctly.

D. The operational status of the interfaces cannot be determined from the output shown.

A

C. The interfaces are functioning correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refer to the exhibit. Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output from RouterA, what are two possible reasons for the failure? (Choose two.)

A. The cable that is connected to S0/0 on RouterA is faulty.

B. Interface S0/0 on RouterB is administratively down.

C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.

D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet.

E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.

F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.

A

E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.

F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSPF is configured using default classful addressing. With all routers and interfaces operational, how many networks will be in the routing table of R1 that are indicated to be learned by OSPF?

A. 2

B. 3

C. 4

D. 5

E. 6

F. 7

A

C. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two options are valid WAN connectivity methods? (Choose two.)

A. PPP

B. WAP

C. DSL

D. L2TPv3

E. Ethernet

A

A. PPP

C. DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refer to the exhibit. Which WAN protocol is being used?

A. ATM

B. HDLC

C. Frame Relay

D. PPP

A

C. Frame Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What occurs on a Frame Relay network when the CIR is exceeded?

A. All TCP traffic is marked discard eligible.

B. All UDP traffic is marked discard eligible and a BECN is sent.

C. All TCP traffic is marked discard eligible and a BECN is sent.

D. All traffic exceeding the CIR is marked discard eligible.

A

D. All traffic exceeding the CIR is marked discard eligible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)

A. They create split-horizon issues.

B. They require a unique subnet within a routing domain.

C. They emulate leased lines.

D. They are ideal for full-mesh topologies.

E. They require the use of NBMA options when using OSPF.

A

B. They require a unique subnet within a routing domain.

C. They emulate leased lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

A. CHAP uses a two-way handshake.

B. CHAP uses a three-way handshake.

C. CHAP authentication periodically occurs after link establishment.

D. CHAP authentication passwords are sent in plaintext.

E. CHAP authentication is performed only upon link establishment.

F. CHAP has no protection from playback attacks

A

B. CHAP uses a three-way handshake.

C. CHAP authentication periodically occurs after link establishment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?

A. show frame-relay lmi

B. show frame-relay map

C. show frame-relay pvc

D. show interfaces serial

A

B. show frame-relay map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of Inverse ARP?

A. to map a known IP address to a MAC address

B. to map a known DLCI to a MAC address

C. to map a known MAC address to an IP address

D. to map a known DLCI to an IP address

E. to map a known IP address to a SPID

F. to map a known SPID to a MAC address

A

D. to map a known DLCI to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Refer to the exhibit.

A network associate has configured OSPF with the command:

City(config-router)# network 192.168.12.64 0.0.0.63 area 0

After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? (Choose three.)

A. FastEthernet0 /0

B. FastEthernet0 /1

C. Serial0/0

D. Serial0/1.102

E. Serial0/1.103

F. Serial0/1.104

A

B. FastEthernet0 /1

C. Serial0/0

D. Serial0/1.102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?

A. It avoids split-horizon issues with distance vector routing protocols.

B. IP addresses can be conserved if VLSM is not being used for subnetting.

C. A multipoint interface offers greater security compared to point-to-point subinterface configurations.

D. The multiple IP network addresses required for a multipoint interface provide greater addressing flexibility over point-to-point configurations.

A

B. IP addresses can be conserved if VLSM is not being used for subnetting.

22
Q

Which two statistics appear in show frame-relay map output? (Choose two.)

A. the number of BECN packets that are received by the router

B. the value of the local DLCI

C. the number of FECN packets that are received by the router

D. the status of the PVC that is configured on the router

E. the IP address of the local router

A

B. the value of the local DLCI

D. the status of the PVC that is configured on the router

23
Q

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA

B. L2TP

C. IPsec

D. PPTP

A

C. IPsec

24
Q

At which layer of the OSI model does PPP perform?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 5

A

A. Layer 2

25
Q

The command show frame-relay map gives the following output:

Serial 0 (up): ip 192.168.151.4 dlci 122, dynamic, broadcast, status defined, active

Which statements represent what is shown? (Choose three.)

A. 192.168.151.4 represents the IP address of the remote router

B. 192.168.151.4 represents the IP address of the local serial interface

C. DLCI 122 represents the interface of the remote serial interface

D. DLCI 122 represents the local number used to connect to the remote address

E. broadcast indicates that a dynamic routing protocol such as RIP v1 can send packets across this PVC

F. active indicates that the ARP process is working

A

A. 192.168.151.4 represents the IP address of the remote router

D. DLCI 122 represents the local number used to connect to the remote address

E. broadcast indicates that a dynamic routing protocol such as RIP v1 can send packets across this PVC

26
Q

What can be done to Frame Relay to resolve split-horizon issues? (Choose two.)

A. Disable Inverse ARP.

B. Create a full-mesh topology.

C. Develop multipoint subinterfaces.

D. Configure point-to-point subinterfaces.

E. Remove the broadcast keyword from the frame-relay map command.

A

B. Create a full-mesh topology.

D. Configure point-to-point subinterfaces.

27
Q

What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)

A. reduced cost

B. better throughput

C. broadband incompatibility

D. increased security

E. scalability

F. reduced latency

A

A. reduced cost

D. increased security

E. scalability

28
Q

Which command is used to enable CHAP authentication, with PAP as the fallback method, on a serial interface?

A. Router(config-if)# ppp authentication chap fallback ppp

B. Router(config-if)# ppp authentication chap pap

C. Router(config-if)# authentication ppp chap fallback ppp

D. Router(config-if)# authentication ppp chap pap

A

B. Router(config-if)# ppp authentication chap pap

29
Q

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?

A. defines the destination IP address that is used in all broadcast packets on DCLI 202

B. defines the source IP address that is used in all broadcast packets on DCLI 202

C. defines the DLCI on which packets from the 192.168.1.2 IP address are received

D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

A

D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

30
Q

Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?

A. HDLC

B. PPP

C. X.25

D. Frame Relay

A

B. PPP

31
Q

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

A. IETF

B. ANSI Annex D

C. Q9333-A Annex A

D. HDLC

A

A. IETF

32
Q

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

A. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252

Main(config-if)# no shut

B. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252

Main(config-if)# encapsulation ppp

Main(config-if)# no shut

C. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252

Main(config-if)# encapsulation frame-relay

Main(config-if)# authentication chap

Main(config-if)# no shut

D. Main(config)# interface serial 0/0

Main(config-if)#ip address 172.16.1.1 255.255.255.252

Main(config-if)#encapsulation ietf

Main(config-if)# no shut

A

B. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252

Main(config-if)# encapsulation ppp

Main(config-if)# no shut

33
Q

Which PPP subprotocol negotiates authentication options?

A. NCP

B. ISDN

C. SLIP

D. LCP

E. DLCI

A

D. LCP

34
Q

What command is used to verify the DLCI destination address in a Frame Relay static configuration?

A. show frame-relay pvc

B. show frame-relay lmi

C. show frame-relay map

D. show frame relay end-to-end

A

C. show frame-relay map

35
Q

The output of the show frame-relay pvc command shows “PVC STATUS = INACTIVE”. What does this mean?

A. The PVC is configured correctly and is operating normally, but no data packets have been detected for more than five minutes.

B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.

C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger a call to the remote router.

D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.

E. The PVC is not configured on the local switch.

A

D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.

36
Q

Refer to the exhibit. A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host2 fails, but the technician is able to ping the S0/0 interface of R2 from Host1. The configurations of the hosts have been verified as correct. What is the cause of the problem?

A. The serial cable on R1 needs to be replaced.

B. The interfaces on R2 are not configured properly.

C. R1 has no route to the 192.168.1.128 network.

D. The IP addressing scheme has overlapping subnetworks.

E. The ip subnet-zero command must be configured on both routers.

A

C. R1 has no route to the 192.168.1.128 network.

37
Q

What does the frame-relay interface-dlci command configure?

A. local DLCI on the subinterface

B. remote DLCI on the main interface

C. remote DCLI on the subinterface

D. local DLCI on the main interface

A

A. local DLCI on the subinterface

38
Q

Refer to the exhibit. The show interfaces serial 0/1 command was issued on the R10-1 router. Based on the output displayed which statement is correct?

A. The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable.

B. The R10-1 router can ping the router interface connected to the serial 0/1 interface.

C. The clock rate used for interface serial 0/1 of the R10-1 router is 1,544,000 bits per second.

D. The CSU used with the serial 0/1 interface of the R10-1 router has lost connection to the service provider.

E. The interface of the remote router connected to the serial 0/1 interface of the R10-1 router is using the default serial interface encapsulation.

A

E. The interface of the remote router connected to the serial 0/1 interface of the R10-1 router is using the default serial interface encapsulation.

39
Q

Refer to the exhibit. How should the FastEthernet0/1 ports on the 2950 model switches that are shown in the exhibit be configured to allow connectivity between all devices?

A. The ports only need to be connected by a crossover cable.

B. SwitchX (config)# interface fastethernet 0/1

SwitchX (config-if)# switchport mode access

SwitchX (config-if)# switchport access vlan 1

C. SwitchX (config)# interface fastethernet 0/1

SwitchX (config-if)# switchport mode trunk

SwitchX (config-if)# switchport trunk vlan 1

SwitchX (config-if)# switchport trunk vlan 10

SwitchX (config-if)# switchport trunk vlan 20

D. SwitchX(config)# interface fastethernet 0/1

SwitchX(config-if)# switchport mode trunk

A

D. SwitchX(config)# interface fastethernet 0/1

SwitchX(config-if)# switchport mode trunk

40
Q

Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.)

A. Host E and host F use the same IP gateway address.

B. Router1 and Switch2 should be connected via a crossover cable.

C. Router1 will not play a role in communications between host A and host D.

D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.

F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.

A

D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.

41
Q

A department decides to replace its hub with a Catalyst 2950 switch that is no longer needed by another department. To prepare the switch for installation, the network administrator has erased the startup configuration and reloaded the switch. However, PCs that are connected to the switch experience various connectivity problems. What is a possible cause of the problem?

A. The VLAN database was not erased.

B. The management VLAN is disabled.

C. The running configuration should have been erased.

D. The “mode” button was not pressed when the switch was reloaded.

E. The switch was not configured with an IP address or a default gateway.

A

A. The VLAN database was not erased.

42
Q

Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?

A. It has more than one interface that is connected to the root network segment.

B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.

C. It has a higher MAC address than the elected root bridge.

D. It has a higher bridge ID than the elected root bridge.

A

D. It has a higher bridge ID than the elected root bridge.

43
Q

Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.

2950Switch(config-if)# switchport port-security

2950Switch(config-if)# switchport port-security mac-address sticky

2950Switch(config-if)# switchport port-security maximum 1

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.)

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

B. Only host A will be allowed to transmit frames on fa0/1.

C. This frame will be discarded when it is received by 2950Switch.

D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.

E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.

F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.

A

B. Only host A will be allowed to transmit frames on fa0/1.

D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.

44
Q

Which two of these statements regarding RSTP are correct? (Choose two.)

A. RSTP cannot operate with PVST+.

B. RSTP defines new port roles.

C. RSTP defines no new port states.

D. RSTP is a proprietary implementation of IEEE 802.1D STP.

E. RSTP is compatible with the original IEEE 802.1D STP.

A

B. RSTP defines new port roles.

E. RSTP is compatible with the original IEEE 802.1D STP.

45
Q

Refer to exhibit. A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this failure?

A. A Level 5 password is not set.

B. An ACL is blocking Telnet access.

C. The vty password is missing.

D. The console password is missing.

A

C. The vty password is missing.

46
Q

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)

A. The network administrator can apply port security to dynamic access ports. B. The network administrator can apply port security to EtherChannels.

B. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.

C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

D. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.

A

C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

D. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.

47
Q

What are two characteristics of a switch that is configured as a VTP client? (Choose two.)

A. If a switch that is configured to operate in client mode cannot access a VTP server, then the switch reverts to transparent mode.

B. On switches that are configured to operate in client mode, VLANs can be created, deleted, or renamed locally.

C. The local VLAN configuration is updated only when an update that has a higher configuration revision number is received.

D. VTP advertisements are not forwarded to neighboring switches that are configured in VTP transparent mode.

E. VTP client is the default VTP mode.

F. When switches in VTP client mode are rebooted, they send a VTP advertisement request to the VTP servers.

A

C. The local VLAN configuration is updated only when an update that has a higher configuration revision number is received.

F. When switches in VTP client mode are rebooted, they send a VTP advertisement request to the VTP servers.

48
Q

At which layer of the OSI model is RSTP used to prevent loops?

A. physical

B. data link

C. network

D. transport

A

B. data link

49
Q

Which protocol provides a method of sharing VLAN configuration information between two Cisco switches?

A. STP

B. VTP

C. 802.1Q

D. RSTP

A

B. VTP

50
Q

Refer to the exhibit. What is the most appropriate summarization for these routes?

A. 10.0.0.0 /21

B. 10.0.0.0 /22

C. 10.0.0.0 /23

D. 10.0.0.0 /24

A

B. 10.0.0.0 /22