Troubleshooting IPv4 Connectivity Flashcards
Which statement about the IP SLAs ICMP Echo operation is true?
- The frequency of the operation specified in milliseconds - It is used to identify the best interface from which to send traffic
- It is configured in enable mode
- It is used to determine the frequency of ICMP packets
It is used to determine the frequency of ICMP packets
Which statement about named ACLs is true?
- They support standard and extended ACLs
- They are used to filter usernames and passwords for Telnet and SSH
- They are used to filter Layer 7 traffic
- They support standard ACLs only
- They are used to rate limit traffic destined to targeted networks
They support standard and extended ACLs
If a S0/0 interface on a Router A has a “status up/protocol down” state, what could be causes of the Layer 2 problem?
Keepalives mismatch
Encapsulation mismatch
Clocking problem
Which identification number is valid for an extended ACL? 1
64
99
100
299
1099
100
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?
- copy run start multiple errors on switch port interfaces congestion on the switch inband path
- traceroute
- the ICMP Echo IP SLA
- SPAN
SPAN
If host Z needs to send data through router R1 to a storage server, which destination MAC address does host Z use to transmit packets?
the MAC address of the interface on R1 that connects to host Z
What is the best way to verify that a host has a path to other hosts in different networks?
- Ping the loopback address
- Ping the default gateway
- Ping the local interface address
- Ping the remote network
Ping the remote network
Refer to the exhibit. Host A pings interface S0/0 on router 3, what is the TTL value for that ping?
A. 253
B. 252
C. 255
D. 254

A. 253
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two.)
A. terminal monitor
B. logging host ip-address
C. no logging console
D. snmp-server enable traps syslog
E. show logging | redirect flash:output.txt
A. terminal monitor
B. logging host ip-address
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version
D. show version
Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?
A. show version
B. show ram
C. show flash:
D. show file systems
D. show file systems
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address?
A. 172.16.16.0
B. 172.16.0.0
C. 172.16.24.0
D. 172.16.28.0
A. 172.16.16.0
Which two privileged mode Cisco IOS commands can be used to determine a Cisco router chassis serial number? (Choose two.)
A. show diag
B. show controllers
C. show inventory
D. show flash: filesys
E. dir flash: | include chassis
A. show diag
C. show inventory
In which solution is a router ACL used?
A. filtering packets that are passing through a router
B. to change the default administrative distance of a route in the route table
C. protecting a server from unauthorized access
D. controlling path selection, based on the route metric
A. filtering packets that are passing through a router
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, are the best for accomplishing this task? (Choose two.)
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
B. access-list 10 permit ip 192.168.147.0 0.0.255.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
D. access-list 10 permit ip 192.168.149.0 0.0.255.255
E. access-list 10 permit ip 192.168.146.0 0.0.0.255
F. access-list 10 permit ip 192.168.146.0 255.255.255.0
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?
A. ACDB
B. BADC
C. DBAC
D. CDBA

D. CDBA
Refer to the exhibit. What statement is true of the configuration for this network?
A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
D. ExternalRouter must be configured with static routes to networks 172.16.1.0/24 and 172.16.2.0/24.

C. The number 1 referred to in the ip nat inside source command references access-list number 1.
Refer to the exhibit. A network technician enters the following line into the router.
Tidmore1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.255 any eq www
What is the effect of this configuration?
A. The change has no effect on the packets being filtered.
B. All traffic from the 192.168.254.0 LAN to the Internet is permitted.
C. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.
D. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can access web pages from the Internet.

A. The change has no effect on the packets being filtered.
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport output all
B. transport preferred all
C. transport type all
D. transport input all
D. transport input all
Which router command can be used to verify the type of cable connected to interface serial 0/0?
A. show running-config
B. show controllers serial 0/0
C. show interfaces serial 0/0
D. show ip interface serial 0/0
B. show controllers serial 0/0
Refer to the topology and partial router configurations shown in the exhibit. The network is fully operational and all routing tables are converged. Which route will appear in the output of the show ip route command issued on the Branch router?
A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
B. R 172.16.11.4/30 [120/1] via 192.168.10.82, 00:00:22, Serial0/0
C. R 192.168.10.80/30 [120/0] via 192.168.10.81, 00:00:22, Serial0/0
D. R 192.168.11.0/24 [120/1] via 192.168.10.81, 00:00:22, Serial0/0
E. C 192.168.12.0/24 is directly connected, FastEthernet0/0

A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)
A. protocol
B. VLAN number
C. TCP or UDP port numbers
D. source switch port number
E. source IP address and destination IP address
F. source MAC address and destination MAC address
A. protocol
C. TCP or UDP port numbers
E. source IP address and destination IP address
Which protocol should be used to establish a secure terminal connection to a remote network device?
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
B. SSH
You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?
A. 10.188.31.0/26
B. 10.188.31.0/25
C. 10.188.31.0/28
D. 10.188.31.0/27
E. 10.188.31.0/29
D. 10.188.31.0/27





















