Troubleshooting IPv4 Connectivity Flashcards
Which statement about the IP SLAs ICMP Echo operation is true?
- The frequency of the operation specified in milliseconds - It is used to identify the best interface from which to send traffic
- It is configured in enable mode
- It is used to determine the frequency of ICMP packets
It is used to determine the frequency of ICMP packets
Which statement about named ACLs is true?
- They support standard and extended ACLs
- They are used to filter usernames and passwords for Telnet and SSH
- They are used to filter Layer 7 traffic
- They support standard ACLs only
- They are used to rate limit traffic destined to targeted networks
They support standard and extended ACLs
If a S0/0 interface on a Router A has a “status up/protocol down” state, what could be causes of the Layer 2 problem?
Keepalives mismatch
Encapsulation mismatch
Clocking problem
Which identification number is valid for an extended ACL? 1
64
99
100
299
1099
100
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?
- copy run start multiple errors on switch port interfaces congestion on the switch inband path
- traceroute
- the ICMP Echo IP SLA
- SPAN
SPAN
If host Z needs to send data through router R1 to a storage server, which destination MAC address does host Z use to transmit packets?
the MAC address of the interface on R1 that connects to host Z
What is the best way to verify that a host has a path to other hosts in different networks?
- Ping the loopback address
- Ping the default gateway
- Ping the local interface address
- Ping the remote network
Ping the remote network
Refer to the exhibit. Host A pings interface S0/0 on router 3, what is the TTL value for that ping?
A. 253
B. 252
C. 255
D. 254
A. 253
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two.)
A. terminal monitor
B. logging host ip-address
C. no logging console
D. snmp-server enable traps syslog
E. show logging | redirect flash:output.txt
A. terminal monitor
B. logging host ip-address
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version
D. show version
Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?
A. show version
B. show ram
C. show flash:
D. show file systems
D. show file systems
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address?
A. 172.16.16.0
B. 172.16.0.0
C. 172.16.24.0
D. 172.16.28.0
A. 172.16.16.0
Which two privileged mode Cisco IOS commands can be used to determine a Cisco router chassis serial number? (Choose two.)
A. show diag
B. show controllers
C. show inventory
D. show flash: filesys
E. dir flash: | include chassis
A. show diag
C. show inventory
In which solution is a router ACL used?
A. filtering packets that are passing through a router
B. to change the default administrative distance of a route in the route table
C. protecting a server from unauthorized access
D. controlling path selection, based on the route metric
A. filtering packets that are passing through a router
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, are the best for accomplishing this task? (Choose two.)
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
B. access-list 10 permit ip 192.168.147.0 0.0.255.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
D. access-list 10 permit ip 192.168.149.0 0.0.255.255
E. access-list 10 permit ip 192.168.146.0 0.0.0.255
F. access-list 10 permit ip 192.168.146.0 255.255.255.0
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?
A. ACDB
B. BADC
C. DBAC
D. CDBA
D. CDBA
Refer to the exhibit. What statement is true of the configuration for this network?
A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
D. ExternalRouter must be configured with static routes to networks 172.16.1.0/24 and 172.16.2.0/24.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
Refer to the exhibit. A network technician enters the following line into the router.
Tidmore1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.255 any eq www
What is the effect of this configuration?
A. The change has no effect on the packets being filtered.
B. All traffic from the 192.168.254.0 LAN to the Internet is permitted.
C. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.
D. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can access web pages from the Internet.
A. The change has no effect on the packets being filtered.
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport output all
B. transport preferred all
C. transport type all
D. transport input all
D. transport input all
Which router command can be used to verify the type of cable connected to interface serial 0/0?
A. show running-config
B. show controllers serial 0/0
C. show interfaces serial 0/0
D. show ip interface serial 0/0
B. show controllers serial 0/0
Refer to the topology and partial router configurations shown in the exhibit. The network is fully operational and all routing tables are converged. Which route will appear in the output of the show ip route command issued on the Branch router?
A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
B. R 172.16.11.4/30 [120/1] via 192.168.10.82, 00:00:22, Serial0/0
C. R 192.168.10.80/30 [120/0] via 192.168.10.81, 00:00:22, Serial0/0
D. R 192.168.11.0/24 [120/1] via 192.168.10.81, 00:00:22, Serial0/0
E. C 192.168.12.0/24 is directly connected, FastEthernet0/0
A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)
A. protocol
B. VLAN number
C. TCP or UDP port numbers
D. source switch port number
E. source IP address and destination IP address
F. source MAC address and destination MAC address
A. protocol
C. TCP or UDP port numbers
E. source IP address and destination IP address
Which protocol should be used to establish a secure terminal connection to a remote network device?
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
B. SSH
You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?
A. 10.188.31.0/26
B. 10.188.31.0/25
C. 10.188.31.0/28
D. 10.188.31.0/27
E. 10.188.31.0/29
D. 10.188.31.0/27
A network administrator receives an error message while trying to configure the Ethernet interface of a router with IP address 10.24.24.24/29. Which statement explains the reason for this issue?
A. VLSM-capable routing protocols must be enabled first on the router.
B. This address is a network address.
C. This address is a broadcast address.
D. The Ethernet interface is faulty.
B. This address is a network address.
A router has been configured to provide the nine users on the branch office LAN with Internet access, as shown in the diagram. It is found that some of the users on the LAN cannot reach the Internet. Based on the topology and router output shown, which command should be issued on the router to correct the problem?
A. Branch(config-if)# no shutdown
B. Branch(config-if)# duplex full
C. Branch(config-if)# no keepalive
D. Branch(config-if)# ip address 192.168.10.30 255.255.255.240
E. Branch(config-if)# bandwidth 100
F. Branch(config-if)# encapsulation 802.3
D. Branch(config-if)# ip address 192.168.10.30 255.255.255.240
The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?
A. 255.255.255.224
B. 255.255.255.248
C. 0.0.0.224
D. 0.0.0.8
E. 0.0.0.7
F. 0.0.0.3
E. 0.0.0.7
Which two statements about static NAT translations are true? (Choose two.)
A. They allow connections to be initiated from the outside.
B. They require no inside or outside interface markings because addresses are statically defined.
C. They are always present in the NAT table.
D. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
A. They allow connections to be initiated from the outside.
C. They are always present in the NAT table.
Refer to the exhibit. What command sequence will enable PAT from the inside to outside network? access
A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload
B. (config-if) ip nat outside overload
C. (config) ip nat inside source list 1 interface ethernet1 overload
D. (config-if) ip nat inside overload
C. (config) ip nat inside source list 1 interface ethernet1 overload
Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but only from the network administrator’s computer. Which group of commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access to the router?
A. access-list 101 permit tcp any host 172.16.3.3 eq telnet
interface s0/0
ip access-group 101 in
B. access-list 3 permit host 172.16.3.3
line vty 0 4
access-class 3 in
C. access-list 101 permit tcp any host 172.16.3.3 eq telnet
access-list 101 permit ip any any
interface s0/0
ip access-group 101 in
D. access-list 3 permit host 172.16.3.3
line vty 0 4
ip access-group 3 in
B. access-list 3 permit host 172.16.3.3
line vty 0 4
access-class 3 in
Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
A. static NAT
B. dynamic NAT
C. overloading
D. overlapping
E. port loading
C. overloading
An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching the HR server attached to the Eastfield router but allow Telnet traffic to other destinations.
Given the following access list:
access-list 101 deny tcp any any eq 23
permit ip any any
On which router, interface, and in what direction should the access list be placed to most efficiently implement this list? (Choose three.)
A. Westfield
B. Eastfield
C. e0
D. s0
E. in
F. out
B. Eastfield
C. e0
F. out
Which command can be used from a router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
B. traceroute address
When are packets processed by an inbound access list?
A. before they are routed to an outbound interface
B. after they are routed to an outbound interface
C. before and after they are routed to an outbound interface
D. after they are routed to an outbound interface but before being placed in the outbound queue
A. before they are routed to an outbound interface
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
A. 192.168.252.0 255.255.255.252
B. 192.168.252.8 255.255.255.248
C. 192.168.252.8 255.255.255.252
D. 192.168.252.16 255.255.255.240
E. 192.168.252.16 255.255.255.252
B. 192.168.252.8 255.255.255.248
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?
A. The IP address for Server A is a broadcast address.
B. The IP address for Workstation B is a subnet address.
C. The gateway for Workstation B is not on the same subnet.
D. The gateway for Server A is not on the same subnet.
D. The gateway for Server A is not on the same subnet.
Which command shows your active Telnet connections?
A. show cdp neigbors
B. show session
C. show users
D. show vty logins
B. show session
A network administrator would like to implement NAT in the network shown in the graphic to allow inside hosts to use a private addressing scheme. Where should NAT be configured?
A. Corporate router
B. Engineering router
C. Sales router
D. all routers
E. all routers and switches
A. Corporate router
The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command? (Choose two.)
A. The command establishes a static route.
B. The command invokes a dynamic routing protocol for 192.168.12.0.
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
D. Traffic for all networks is forwarded to 172.16.12.1.
E. This route is automatically propagated throughout the entire network.
F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network.
A. The command establishes a static route.
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
When using the CLI, which banner displays a message upon every connection that is made into the router?
A. exec
B. login
C. motd
D. slip-ppp
C. motd
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?
A. ping address
B. tracert address
C. traceroute address
D. arp address
A. ping address
On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
D. source address and wildcard mask
When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL?
A. show ip access-lists
B. show access-lists
C. show interface
D. show ip interface
E. list ip interface
D. show ip interface
What are two benefits of using NAT? (Choose two.)
A. NAT facilitates end-to-end communication when IPsec is enabled.
B. NAT eliminates the need to re-address all hosts that require external access.
C. NAT conserves addresses through host MAC-level multiplexing.
D. Dynamic NAT facilitates connections from the outside of the network.
E. NAT accelerates the routing process because no modifications are made on the packets.
F. NAT protects network security because private networks are not advertised.
B. NAT eliminates the need to re-address all hosts that require external access.
F. NAT protects network security because private networks are not advertised.
Refer to the exhibit. HostA cannot ping HostB. Assuming routing is properly configured, what could be the cause of this problem?
A. HostA is not on the same subnet as its default gateway.
B. The address of SwitchA is a subnet address.
C. The Fa0/0 interface on RouterA is on a subnet that can’t be used.
D. The serial interfaces of the routers are not on the same subnet.
E. The Fa0/0 interface on RouterB is using a broadcast address.
D. The serial interfaces of the routers are not on the same subnet.
Refer to the output from the show running-config command in the exhibit. What should the administrator do to allow the workstations connected to the FastEthernet 0/0 interface to obtain an IP address?
A. Apply access-group 14 to interface FastEthernet 0/0.
B. Add access-list 14 permit any any to the access list configuration.
C. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1.
D. Add an interface description to the FastEthernet 0/0 interface configuration.
C. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1.
Refer to the exhibit. The router has been configured with these commands:
hostname Gateway
interface FastEthernet 0/0
ip address 198.133.219.14 255.255.255.248
no shutdown
interface FastEthernet 0/1
ip address 192.168.10.254 255.255.255.0
no shutdown
interface Serial 0/0
ip address 64.100.0.2 255.255.255.252
no shutdown
ip route 0.0.0.0 0.0.0.0 64.100.0.1
What are the two results of this configuration? (Choose two.)
A. The default route should have a next hop address of 64.100.0.3.
B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.
C. The address of the subnet segment with the WWW server will support seven more servers.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation.
Refer to the exhibit. Which address range efficiently summarizes the routing table of the addresses for router Main?
A. 172.16.0.0./21
B. 172.16.0.0./20
C. 172.16.0.0./16
D. 172.16.0.0/18
B. 172.16.0.0./20
Refer to the exhibit. A network engineer is troubleshooting an Internet connectivity problem on the computer. What is causing the problem?
A. incorrect subnet mask
B. incorrect IP address
C. wrong default gateway
D. wrong DNS server
B. incorrect IP address
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straightthrough cable. Attempts to ping between the hosts are unsuccessful. What are two things that could be attempted that would allow communications between the hosts? (Choose two.)
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?
More bandwidth will be required than was needed previously. An additional broadcast domain will be created.
A. 255.255.255.0
B. 255.255.254.0
C. 255.255.252.0
D. 255.255.248.0
B. 255.255.254.0
An organization is concerned that too many employees are wasting company time accessing the Internet. Which access list statement would stop World Wide Web access for employees on the range of subnets from 172.16.8.0/24 to 172.16.11.0/24?
A. access-list 103 deny tcp 172.16.8.0 0.0.0.3 any eq 80
B. access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80
C. access-list 103 deny http 172.16.8.0 0.0.7.255 any
D. access-list 103 deny tcp any 172.16.8.0 0.0.3.255 eq 80
E. access-list 103 deny tcp 172.16.8.0 0.0.11.255 any eq 80
B. access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80
Refer to the exhibit. A technician is testing connection problems in the internetwork. What is the problem indicated by the output from HostA?
A. The routing on Router2 is not functioning properly.
B. An access list is applied to an interface of Router3.
C. The Fa0/24 interface of Switch1 is down.
D. The gateway address of HostA is incorrect or not configured.
D. The gateway address of HostA is incorrect or not configured.