Troubleshooting IPv4 Connectivity Flashcards
Which statement about the IP SLAs ICMP Echo operation is true?
- The frequency of the operation specified in milliseconds - It is used to identify the best interface from which to send traffic
- It is configured in enable mode
- It is used to determine the frequency of ICMP packets
It is used to determine the frequency of ICMP packets
Which statement about named ACLs is true?
- They support standard and extended ACLs
- They are used to filter usernames and passwords for Telnet and SSH
- They are used to filter Layer 7 traffic
- They support standard ACLs only
- They are used to rate limit traffic destined to targeted networks
They support standard and extended ACLs
If a S0/0 interface on a Router A has a “status up/protocol down” state, what could be causes of the Layer 2 problem?
Keepalives mismatch
Encapsulation mismatch
Clocking problem
Which identification number is valid for an extended ACL? 1
64
99
100
299
1099
100
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?
- copy run start multiple errors on switch port interfaces congestion on the switch inband path
- traceroute
- the ICMP Echo IP SLA
- SPAN
SPAN
If host Z needs to send data through router R1 to a storage server, which destination MAC address does host Z use to transmit packets?
the MAC address of the interface on R1 that connects to host Z
What is the best way to verify that a host has a path to other hosts in different networks?
- Ping the loopback address
- Ping the default gateway
- Ping the local interface address
- Ping the remote network
Ping the remote network
Refer to the exhibit. Host A pings interface S0/0 on router 3, what is the TTL value for that ping?
A. 253
B. 252
C. 255
D. 254

A. 253
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two.)
A. terminal monitor
B. logging host ip-address
C. no logging console
D. snmp-server enable traps syslog
E. show logging | redirect flash:output.txt
A. terminal monitor
B. logging host ip-address
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version
D. show version
Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?
A. show version
B. show ram
C. show flash:
D. show file systems
D. show file systems
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address?
A. 172.16.16.0
B. 172.16.0.0
C. 172.16.24.0
D. 172.16.28.0
A. 172.16.16.0
Which two privileged mode Cisco IOS commands can be used to determine a Cisco router chassis serial number? (Choose two.)
A. show diag
B. show controllers
C. show inventory
D. show flash: filesys
E. dir flash: | include chassis
A. show diag
C. show inventory
In which solution is a router ACL used?
A. filtering packets that are passing through a router
B. to change the default administrative distance of a route in the route table
C. protecting a server from unauthorized access
D. controlling path selection, based on the route metric
A. filtering packets that are passing through a router
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, are the best for accomplishing this task? (Choose two.)
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
B. access-list 10 permit ip 192.168.147.0 0.0.255.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
D. access-list 10 permit ip 192.168.149.0 0.0.255.255
E. access-list 10 permit ip 192.168.146.0 0.0.0.255
F. access-list 10 permit ip 192.168.146.0 255.255.255.0
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?
A. ACDB
B. BADC
C. DBAC
D. CDBA

D. CDBA
Refer to the exhibit. What statement is true of the configuration for this network?
A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
D. ExternalRouter must be configured with static routes to networks 172.16.1.0/24 and 172.16.2.0/24.

C. The number 1 referred to in the ip nat inside source command references access-list number 1.
Refer to the exhibit. A network technician enters the following line into the router.
Tidmore1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.255 any eq www
What is the effect of this configuration?
A. The change has no effect on the packets being filtered.
B. All traffic from the 192.168.254.0 LAN to the Internet is permitted.
C. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.
D. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can access web pages from the Internet.

A. The change has no effect on the packets being filtered.
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport output all
B. transport preferred all
C. transport type all
D. transport input all
D. transport input all
Which router command can be used to verify the type of cable connected to interface serial 0/0?
A. show running-config
B. show controllers serial 0/0
C. show interfaces serial 0/0
D. show ip interface serial 0/0
B. show controllers serial 0/0
Refer to the topology and partial router configurations shown in the exhibit. The network is fully operational and all routing tables are converged. Which route will appear in the output of the show ip route command issued on the Branch router?
A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
B. R 172.16.11.4/30 [120/1] via 192.168.10.82, 00:00:22, Serial0/0
C. R 192.168.10.80/30 [120/0] via 192.168.10.81, 00:00:22, Serial0/0
D. R 192.168.11.0/24 [120/1] via 192.168.10.81, 00:00:22, Serial0/0
E. C 192.168.12.0/24 is directly connected, FastEthernet0/0

A. S* 0.0.0.0/0 [1/0] via 192.168.10.82
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)
A. protocol
B. VLAN number
C. TCP or UDP port numbers
D. source switch port number
E. source IP address and destination IP address
F. source MAC address and destination MAC address
A. protocol
C. TCP or UDP port numbers
E. source IP address and destination IP address
Which protocol should be used to establish a secure terminal connection to a remote network device?
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
B. SSH
You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?
A. 10.188.31.0/26
B. 10.188.31.0/25
C. 10.188.31.0/28
D. 10.188.31.0/27
E. 10.188.31.0/29
D. 10.188.31.0/27
A network administrator receives an error message while trying to configure the Ethernet interface of a router with IP address 10.24.24.24/29. Which statement explains the reason for this issue?
A. VLSM-capable routing protocols must be enabled first on the router.
B. This address is a network address.
C. This address is a broadcast address.
D. The Ethernet interface is faulty.
B. This address is a network address.
A router has been configured to provide the nine users on the branch office LAN with Internet access, as shown in the diagram. It is found that some of the users on the LAN cannot reach the Internet. Based on the topology and router output shown, which command should be issued on the router to correct the problem?
A. Branch(config-if)# no shutdown
B. Branch(config-if)# duplex full
C. Branch(config-if)# no keepalive
D. Branch(config-if)# ip address 192.168.10.30 255.255.255.240
E. Branch(config-if)# bandwidth 100
F. Branch(config-if)# encapsulation 802.3

D. Branch(config-if)# ip address 192.168.10.30 255.255.255.240
The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?
A. 255.255.255.224
B. 255.255.255.248
C. 0.0.0.224
D. 0.0.0.8
E. 0.0.0.7
F. 0.0.0.3
E. 0.0.0.7
Which two statements about static NAT translations are true? (Choose two.)
A. They allow connections to be initiated from the outside.
B. They require no inside or outside interface markings because addresses are statically defined.
C. They are always present in the NAT table.
D. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
A. They allow connections to be initiated from the outside.
C. They are always present in the NAT table.
Refer to the exhibit. What command sequence will enable PAT from the inside to outside network? access
A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload
B. (config-if) ip nat outside overload
C. (config) ip nat inside source list 1 interface ethernet1 overload
D. (config-if) ip nat inside overload

C. (config) ip nat inside source list 1 interface ethernet1 overload
Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but only from the network administrator’s computer. Which group of commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access to the router?
A. access-list 101 permit tcp any host 172.16.3.3 eq telnet
interface s0/0
ip access-group 101 in
B. access-list 3 permit host 172.16.3.3
line vty 0 4
access-class 3 in
C. access-list 101 permit tcp any host 172.16.3.3 eq telnet
access-list 101 permit ip any any
interface s0/0
ip access-group 101 in
D. access-list 3 permit host 172.16.3.3
line vty 0 4
ip access-group 3 in
B. access-list 3 permit host 172.16.3.3
line vty 0 4
access-class 3 in
Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
A. static NAT
B. dynamic NAT
C. overloading
D. overlapping
E. port loading
C. overloading
An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching the HR server attached to the Eastfield router but allow Telnet traffic to other destinations.
Given the following access list:
access-list 101 deny tcp any any eq 23
permit ip any any
On which router, interface, and in what direction should the access list be placed to most efficiently implement this list? (Choose three.)
A. Westfield
B. Eastfield
C. e0
D. s0
E. in
F. out
B. Eastfield
C. e0
F. out
Which command can be used from a router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
B. traceroute address
When are packets processed by an inbound access list?
A. before they are routed to an outbound interface
B. after they are routed to an outbound interface
C. before and after they are routed to an outbound interface
D. after they are routed to an outbound interface but before being placed in the outbound queue
A. before they are routed to an outbound interface
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
A. 192.168.252.0 255.255.255.252
B. 192.168.252.8 255.255.255.248
C. 192.168.252.8 255.255.255.252
D. 192.168.252.16 255.255.255.240
E. 192.168.252.16 255.255.255.252
B. 192.168.252.8 255.255.255.248
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?
A. The IP address for Server A is a broadcast address.
B. The IP address for Workstation B is a subnet address.
C. The gateway for Workstation B is not on the same subnet.
D. The gateway for Server A is not on the same subnet.

D. The gateway for Server A is not on the same subnet.
Which command shows your active Telnet connections?
A. show cdp neigbors
B. show session
C. show users
D. show vty logins
B. show session
A network administrator would like to implement NAT in the network shown in the graphic to allow inside hosts to use a private addressing scheme. Where should NAT be configured?
A. Corporate router
B. Engineering router
C. Sales router
D. all routers
E. all routers and switches

A. Corporate router
The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command? (Choose two.)
A. The command establishes a static route.
B. The command invokes a dynamic routing protocol for 192.168.12.0.
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
D. Traffic for all networks is forwarded to 172.16.12.1.
E. This route is automatically propagated throughout the entire network.
F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network.
A. The command establishes a static route.
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
When using the CLI, which banner displays a message upon every connection that is made into the router?
A. exec
B. login
C. motd
D. slip-ppp
C. motd
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?
A. ping address
B. tracert address
C. traceroute address
D. arp address
A. ping address
On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
D. source address and wildcard mask
When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL?
A. show ip access-lists
B. show access-lists
C. show interface
D. show ip interface
E. list ip interface
D. show ip interface
What are two benefits of using NAT? (Choose two.)
A. NAT facilitates end-to-end communication when IPsec is enabled.
B. NAT eliminates the need to re-address all hosts that require external access.
C. NAT conserves addresses through host MAC-level multiplexing.
D. Dynamic NAT facilitates connections from the outside of the network.
E. NAT accelerates the routing process because no modifications are made on the packets.
F. NAT protects network security because private networks are not advertised.
B. NAT eliminates the need to re-address all hosts that require external access.
F. NAT protects network security because private networks are not advertised.
Refer to the exhibit. HostA cannot ping HostB. Assuming routing is properly configured, what could be the cause of this problem?
A. HostA is not on the same subnet as its default gateway.
B. The address of SwitchA is a subnet address.
C. The Fa0/0 interface on RouterA is on a subnet that can’t be used.
D. The serial interfaces of the routers are not on the same subnet.
E. The Fa0/0 interface on RouterB is using a broadcast address.

D. The serial interfaces of the routers are not on the same subnet.
Refer to the output from the show running-config command in the exhibit. What should the administrator do to allow the workstations connected to the FastEthernet 0/0 interface to obtain an IP address?
A. Apply access-group 14 to interface FastEthernet 0/0.
B. Add access-list 14 permit any any to the access list configuration.
C. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1.
D. Add an interface description to the FastEthernet 0/0 interface configuration.

C. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1.
Refer to the exhibit. The router has been configured with these commands:
hostname Gateway
interface FastEthernet 0/0
ip address 198.133.219.14 255.255.255.248
no shutdown
interface FastEthernet 0/1
ip address 192.168.10.254 255.255.255.0
no shutdown
interface Serial 0/0
ip address 64.100.0.2 255.255.255.252
no shutdown
ip route 0.0.0.0 0.0.0.0 64.100.0.1
What are the two results of this configuration? (Choose two.)
A. The default route should have a next hop address of 64.100.0.3.
B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.
C. The address of the subnet segment with the WWW server will support seven more servers.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation.

D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation.
Refer to the exhibit. Which address range efficiently summarizes the routing table of the addresses for router Main?
A. 172.16.0.0./21
B. 172.16.0.0./20
C. 172.16.0.0./16
D. 172.16.0.0/18

B. 172.16.0.0./20
Refer to the exhibit. A network engineer is troubleshooting an Internet connectivity problem on the computer. What is causing the problem?
A. incorrect subnet mask
B. incorrect IP address
C. wrong default gateway
D. wrong DNS server

B. incorrect IP address
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straightthrough cable. Attempts to ping between the hosts are unsuccessful. What are two things that could be attempted that would allow communications between the hosts? (Choose two.)
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?
More bandwidth will be required than was needed previously. An additional broadcast domain will be created.
A. 255.255.255.0
B. 255.255.254.0
C. 255.255.252.0
D. 255.255.248.0

B. 255.255.254.0
An organization is concerned that too many employees are wasting company time accessing the Internet. Which access list statement would stop World Wide Web access for employees on the range of subnets from 172.16.8.0/24 to 172.16.11.0/24?
A. access-list 103 deny tcp 172.16.8.0 0.0.0.3 any eq 80
B. access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80
C. access-list 103 deny http 172.16.8.0 0.0.7.255 any
D. access-list 103 deny tcp any 172.16.8.0 0.0.3.255 eq 80
E. access-list 103 deny tcp 172.16.8.0 0.0.11.255 any eq 80
B. access-list 103 deny tcp 172.16.8.0 0.0.3.255 any eq 80
Refer to the exhibit. A technician is testing connection problems in the internetwork. What is the problem indicated by the output from HostA?
A. The routing on Router2 is not functioning properly.
B. An access list is applied to an interface of Router3.
C. The Fa0/24 interface of Switch1 is down.
D. The gateway address of HostA is incorrect or not configured.

D. The gateway address of HostA is incorrect or not configured.
Refer to the exhibit. Which route will be found in the routing table of the Main router?
A. C 192.168.2.0 is directly connected, Serial0/1
B. R 192.168.2.0/24 [120/1] via 192.168.255.26, 00:00:24, Serial0/0
C. R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1
D. R 192.168.255.16 [120/2] via 192.168.255.21, 00:00:22, Serial0/0

C. R 192.168.255.16 [120/1] via 192.168.255.26, 00:00:24, Serial0/1
A network administrator has configured access list 173 to prevent Telnet and ICMP traffic from reaching a server with the address of 192.168.13.26. Which commands can the administrator issue to verify that the access list is working properly? (Choose three.)
A. Router# ping 192.168.13.26
B. Router# debug access-list 173
C. Router# show open ports 192.168.13.26
D. Router# show access-lists
E. Router# show ip interface
A. Router# ping 192.168.13.26
D. Router# show access-lists
E. Router# show ip interface
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?
A. standard
B. extended
C. dynamic
D. reflexive
C. dynamic
Refer to the exhibit. Router4 can ping Router5 (172.16.6.5), but not Router7 (172.16.11.7). There are no routing protocols running in any of the routers, and Router4 has Router6 as its default gateway. What can be done to address this problem?
A. Convert to static NAT.
B. Convert to dynamic NAT.
C. Add a static route in Router7 back to Router4.
D. Change the inside and outside NAT commands.

C. Add a static route in Router7 back to Router4.
Refer to the exhibit. A network technician enters the following lines into the router.
Tidmore1(config)# interface FastEthernet 0/0
Tidmore1(config-if)# no ip access-group 106 in
Tidmore1(config-if)# interface Serial 0/0
Tidmore1(config-if)# ip access-group 106 out
What is the effect of this configuration?
A. The change has no effect on the packets being filtered.
B. All traffic from the 192.168.254.0 LAN to the Internet is permitted.
C. Web pages from the Internet cannot be accessed by hosts in the 192.168.254.0 LAN.
D. No hosts in the 192.168.254.0 LAN except 192.168.254.7 can telnet to hosts on the Internet.

A. The change has no effect on the packets being filtered.
What does the “Inside Global” address represent in the configuration of NAT?
A. the summarized address for all of the internal subnetted addresses
B. the MAC address of the router used by inside hosts to connect to the Internet
C. a globally unique, private IP address assigned to a host on the inside network
D. a registered address that represents an inside host to an outside network
D. a registered address that represents an inside host to an outside network
Refer to the exhibit. What is the result of setting the no login command?
A. Both SSH and Telnet access is denied.
B. Both SSH and Telnet access requires a password.
C. Both SSH and Telnet access requires a new password at first login.
D. There is a virtually limitless supply of IP addresses.

D. There is a virtually limitless supply of IP addresses.
Refer to the exhibit. Host A has tested connectivity to a remote network. What is the default gateway for host A?
A. 10.16.176.1
B. 192.168.1.6
C. 192.168.1.1
D. 172.16.182.1

D. 172.16.182.1
An administrator is troubleshooting a problem between routers that are using different versions of RIP. Which two commands would provide information about which version of RIP was being sent and received on an interface? (Choose two.)
A. show ip protocols
B. show ip route rip
C. show interfaces
D. debug rip routing
E. debug ip rip
A. show ip protocols
E. debug ip rip
The network technician is planning to use the 255.255.255.224 subnet mask on the network.
Which three valid IP addresses can the technician use for the hosts? (Choose three.)
A. 172.22.243.127
B. 172.22.243.190
C. 172.22.243.191
D. 192.168.1.160
E. 10.17.64.34
F. 10.16.33.98
B. 172.22.243.190
E. 10.17.64.34
F. 10.16.33.98
Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24

B. 10.0.0.0 /22
Refer to the exhibit. A junior network engineer has prepared the exhibited configuration file.
What two statements are true of the planned configuration for interface fa0/1? (Choose two.)
A. The two FastEthernet interfaces will require NAT configured on two outside serial interfaces.
B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.
C. The fa0/1 IP address overlaps with the space used by s0/0.
D. The fa0/1 IP address is invalid for the IP subnet on which it resides.
E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is shown.

B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.
E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is shown.
Refer to the graphic. Users on the Holyoke router are unable to access the intranet server attached to interface E0 of the Chicopee router. Inspection of the routing table of the Holyoke router shows that an entry for the Chicopee E0 network is missing. Which command will configure the Holyoke router with a path to the intranet server network?
A. Holyoke(config)# ip host Chicopee 201.73.127.2
B. Holyoke(config)# ip host Chicopee 201.73.127.0 255.255.255.0
C. Holyoke(config)# ip network 202.18.38.0
D. Holyoke(config)# ip network 202.18.18.0 255.255.255.0
E. Holyoke(config)# ip route 202.18.18.0 255.255.255.0 201.73.127.2
F. Holyoke(config)# ip route 201.73.127.2 255.255.255.0 202.18.18.0

E. Holyoke(config)# ip route 202.18.18.0 255.255.255.0 201.73.127.2
Refer to the exhibit. The Lakeside Company has the internetwork in the exhibit. The administrator would like to reduce the size of the routing table on the Central router.
Which partial routing table entry in the Central router represents a route summary that represents the LANs in Phoenix but no additional subnets? 10.0.0.0/22 is subnetted, 1 subnets?
A. 10.0.0.0/22 is subnetted, 1 subnets
D 10.0.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
B. 10.0.0.0/28 is subnetted, 1 subnets
D 10.2.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
C. 10.0.0.0/30 is subnetted, 1 subnets
D 10.2.2.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
D. 10.0.0.0/22 is subnetted, 1 subnets
D 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
E. 10.0.0.0/28 is subnetted, 1 subnets
D 10.4.4.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
F. 10.0.0.0/30 is subnetted, 1 subnets
D 10.4.4.4 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1

D. 10.0.0.0/22 is subnetted, 1 subnets
D 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
Refer to the exhibit.
Assuming that the entire network topology is shown, what is the operational status of the interfaces of R2 as indicated by the command output shown?
A. One interface has a problem.
B. Two interfaces have problems.
C. The interfaces are functioning correctly.
D. The operational status of the interfaces cannot be determined from the output shown.

C. The interfaces are functioning correctly.
Refer to the exhibit. How will the router handle a packet destined for 192.0.2.156?
A. The router will drop the packet.
B. The router will return the packet to its source.
C. The router will forward the packet via Serial2.
D. The router will forward the packet via either Serial0 or Serial1.

C. The router will forward the packet via Serial2.
Which statement about MPLS is true?
A. It operates in Layer 1.
B. It operates between Layer 2 and Layer 3.
C. It operates in Layer 3.
D. it operates in Layer 2.
B. It operates between Layer 2 and Layer 3.
Which statement about named ACLs is true?
A. They support standard and extended ACLs.
B. They are used to filter usernames and passwords for Telnet and SSH.
C. They are used to filter Layer 7 traffic.
D. They support standard ACLs only.
E. They are used to rate limit traffic destined to targeted networks.
A. They support standard and extended ACLs.
At what level of the OSI model should you begin troubleshooting connectivity problems if you are taking a bottom-up approach?
physical
What are the steps of the troubleshooting process?
Check cables
Check path
Check default gateway
Verify name resolution
Check ACLs
What can be used instead of ping to test the availability of far-end devices
IP SLA ICMP echo test
What command creates an IP SLA operation?
ip sla [operation-number]
What command configures an ICMP echo test for the specified destination?
icmp-echo [destination ip-address]
What command sets the rate at which a specified IP SLAs operation repeats?
frequency [seconds]
What command configures the scheduling parameters for an individual IP SLAs operation?
ip sla schedule [operation number]
What IP SLA operation keyword allows you to set how long the IP SLA test will run?
life
What IP SLA scheduling parameter allows you to control how long the collected data is kept?
ageout
What command verifies the IP SLA configuration on a device?
show ip sla configuration
What is the most likely cause of a high collision count in the output of the show interfaces command?
duplex mismatch
Which command would you use to determine whether there are any input or output errors on a GigabitEthernet 0/0 interface?
show interfaces GigabitEthernet 0/0
Which command would you use to identify the current path to a given destination on a router?
show ip route
Which Cisco IOS command will enable you to see the path that packets are taking on a hop-by-hop basis?
traceroute
With SPAN can the destination port be the source port?
No
How does SPAN operate?
It copies the traffic that the device receives and/or sends on source ports to a destination port for analysis.
What command starts a SPAN session with source ports?
monitor session [#] source interface [int]
What command starts a SPAN session with destination ports?
monitor session [#] destination interface [int]
What command allows you to configure DNS server information within DHCP pool?
dns-server [ip address]
What are the three places that mappings between names and IP addresses?
Host file on PC
DNS server
Cisco switch or router
What command allows you to create static name resolution entries on a switch or router?
ip host [name ip address]
A _____ ACL can specify only source IP addresses and source networks, and cannot filter a specific destination.
standard
In addition to verifying packet source addresses, what other three things can an extended ACL check?
destination address
protocols
port numbers
What are the numbered ranges for an extended ACL?
100-199
2000-2699
What command allows you to create an extended named ACL?
ip access-list extended [name]
What command specifies the conditions to permit or deny packets?
permit/deny [ip / tcp / udp/ icmp] [source ip - wildcard / any / host (name/address)] [lt / gt / eq / neq / range (port number of UDP or TCP)] [destination ip - wildcard / any / host (name/address)] [lt / gt / eq / neq / range (port number of UDP or TCP)]
What command applies the specified access list to the interface in the inbound or outbound direction?
ip access-group [name] [in/out]
What command displays the access-lists configured?
show ip access-lists
What commands should you issue to determine whether your router meets the minimum DRAM and flash memory requirements or a new IOS image?
show version
What command displays the type of cable that is connected to each serial interface?
show controllers
What command would you use to determine whether your router meets the minimum memory requirements for a new IOS image?
show flash
Limited to monitoring traffic on only one device and cannot direct traffic to destination ports on a separate device for analysis.
SPAN
Enables you to monitor traffic on a network by capturing and sending traffic from a source port on one device to a destination port on a different device on a non routed network.
RSPAN (Remote Switched Port Analyzer)
Hosts do not require a default gateway configuration when what is enabled?
proxy ARP
What is displayed in the output of the “show protocols” command?
IP addresses configured on each interface
Layer 1 and Layer 2 status of each interface
What information would be displayed in the show version command on a router?
configuration register setting
amount of memory installed
IOS version
Router C is configured with a static route through a GRE tunnel to Router A. The tunnel interface is up/down. Router C has a default route configured to all networks. Could the traffic still be sent to Router A?
No because a default route only sends traffic when no route to the destination exists in the routing table. The static route will still show up.
What commands will configure a router with a gateway of last resort?
ip default-gateway
ip default-network
ip route 0.0.0.0 0.0.0.0
What are the common protocols that use TCP?
FTP
SSH
Telnet
SMTP
HTTP
POP3
NTP
HTTPS
What are the common protocols that use UDP?
DNS
DHCP
TFTP
SNMP
What is the port number for Telnet?
23
What is the port number for SSH?
22
What is the port number for DNS?
53
What is the port number for FTP?
20, 21
What is the port number for HTTP?
80
What is the port number for SMTP?
25
What is the port number for DHCP?
67
What is the port number for TFTP?
69
What is the port number for SNMP?
161
Where should a standard access list be placed?
Close to the destination
Where should an extended access list be placed?
Close to the source
What command configures a Cisco router as an IPv4 DHCP client?
ip address dhcp
What additional parameters modify the DHCP request that is sent to the DHCP server?
DHCP lease time
Host name
Client identifier
If you issued the ip dhcp client lease 0 3, what does it specify?
Requests a 3 hour lease duration from DHCP server
If no DHCP lease time is configured, how long do Cisco devices lease an address for?
24 hours
Typically configured on a single router on the network and is a means of enabling hosts that are not configured with a default gateway to communicate with hosts on remote networks.
proxy ARP
What tables are larger, host ARP or proxy ARP?
proxy ARP
What commands will configure a router with a gateway of last resort?
ip route 0.0.0.0 0.0.0.0
ip default-network
ip default-gateway
The Catalyst ____ switch is a multilayer switch that is capable of InterVLAN routing.
3560
The Catalyst 3560 switch is not configured to route IP packets by default. What command enables IP routing on the switch from global config mode?
ip routing
What command allows you to examine the status and statistics associated with an IP SLA?
show ip sla statistics
What is displayed in the “show version” command?
IOS version
configuration register setting
amount of memory installed
To monitor traffic on a port on a neighboring switch, what tasks would you need to perform?
- Create RSPAN VLAN on both switches
- Create a monitor session on the neighboring switch with the RSPAN VLAN as the source and the monitoring port as the destination
- Create a monitor session on the local switch with the RSPAN VLAN as the source and the monitoring port as the destination
Enables you to monitor traffic on a network by capturing and sending traffic from a source port on one device to a destination port on a different device on a non routed network.
RSPAN