Practice Questions

263
1. Which Cisco layer is responsible for breaking up collision domains? A. Physical B. Access C. Core D. Network E. Distribution F. Data Link 2. PDUs at the Network layer of the OSI are called what? A. Core B. Frames C. Packets D. Segments E. Access F. Distribution G. Transport 3. At which Cisco layer would broadcase domains bed defined? A. Core B. Network C. Physical D. Distribution E. Access F. Transport 4. PDUs at the Data Link layer are named what? A. Frames B. Packets C. Datagrams D. Transports E. Segments F. Bits

Transcript of Practice Questions

1. Which Cisco layer is responsible for breaking up collision domains?

A. PhysicalB. AccessC. CoreD. NetworkE. DistributionF. Data Link

2. PDUs at the Network layer of the OSI are called what?

A. CoreB. FramesC. PacketsD. SegmentsE. AccessF. DistributionG. Transport

3. At which Cisco layer would broadcase domains bed defined?

A. CoreB. NetworkC. PhysicalD. DistributionE. AccessF. Transport

4. PDUs at the Data Link layer are named what?

A. FramesB. PacketsC. DatagramsD. TransportsE. SegmentsF. Bits

5. Segmentation of a data stream happens at which layer of the OSI model?

A. PhysicalB. Data LinkC. NetworkD. TransportE. DistributionF. Access

6. For which of the Following would you not need to provide a crossover cable?

A. Connecting uplinks between switchesB. Connecting routers to switchesC. Connecting hub to hubD. Connecting hubs to switches

7. What does the Data Link layer user to find hosts on a local network?

A. Logical network addressesB. Port numbersC. Hardware addressesD. Default gateways

8. How is a crossover Cabled?

A. The pins 1-8 are completely opposite on the other side.B. It has the pins 1-8 cabled the same on the other side.C. Pin 1 on one side connects to pin 3 on the other side and pin 2

connects to pin 6 on the other end.D. Pin 2 on one side connects to pin 3 on the other side and pin 1

connects to pin 6 on the other end.

9. Where are routers defined in the OSI model?

A. PhysicalB. TransportC. Data LinkD. Network

10. At which layer of the OSI are 1s and 0s converted to a digital signal?

A. PhysicalB. TransportC. Data LinkD. Network

11. Bridges are defined at what layer of the OSI model?

A. PhysicalB. TransportC. Data LinkD. Network

12. What Cisco layer provides segmentation of contention networks?

A. AccessB. PhysicalC. NetworkD. DistributionE. CoreF. TransportG. Data Link

13. What is used at the Transport layer to stop a receiving host’s buffer from overflowing?

A. SegmentationB. PacketsC. AcknowledgementsD. Flow controlE. PDUs

14. Which layer of the OSI provides translation of data?

A. ApplicationB. PresentationC. SessionD. TransportE. Data Link

15. Routers can provide which of the following functions? (Choose all that apply.)

A. Breakup of collision domainsB. Breakup of broadcast domainsC. Logical network addressingD. Physical address filtering of the local network

16. Routers are typically used at which layer of the Cisco three-layer model?

A. AccessB. CoreC. NetworkD. Data LinkE. Distribution

17. How many bits define a hardware address?

A. 6 bitsB. 16 bitsC. 46 bitsD. 48 bits

18. Which of the following is not an advantage of a layer model?

A. Dividing the complex network operation into a more manageable layer approach.

B. Allowing changes to occur in one layer without having to change all layers.

C. Allowing changes to occur in all layers without having to change one layer.

D. Defining a standard interface for the “plug-and-play” multivendor integration

19. Which three options use twisted-pair copper wiring?

A. 100BaseFXB. 100BaseTXC. 100VG-AnyLAND. 10BaseTE. 100BaseSX

20. What does the “Base” indicate in 10BaseT?

A. Backbone wiring that uses many digital signals at the same time in one wire.

B. Baseband wiring that uses many digital signals at the same time in one wire.

C. Backbone wiring that uses only one digital signal at a time in the wire.

D. Baseband wiring that uses only one digital signal at a time in the wire.

1. Which LAN switch method runs a CRC on every frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

2. Which LAN switch type only checks the hardware address before forwarding a frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

3. What is true regarding the STP blocked state of a port? (Choose all that apply.)

A. No frames are transmitted or received on the blocked port.B. BPDUs are sent and received on the blocked port.C. BPDUs are still received on the blocked port.D. Frames are sent or received on the blocked port.

4. Layer-2 switching provides which of the following?

A. Hardware-based bridging (MAC)B. Wire speedC. High latencyD. High cost

5. What is used to determine the root bridge in a network? (Choose all that apply.)

A. PriorityB. Cost of the links attached to the switchC. MAC addressD. IP address

6. What is used to determine the designated port on a bridge?

A. PriorityB. Cost of the links attached to the switchC. MAC addressD. IP address

7. What are the four port states of an STP switch?

A. LearningB. LearnedC. ListenedD. HeardE. ListeningF. ForwardingG. ForwardedH. BlockingI. Gathering

8. What are the three distinct functions of layer-2 switching?

A. Address learningB. RoutingC. Forwarding and filteringD. Creating network loopsE. Loop avoidanceF. IP addressing

9. What is true regarding BPDUs?

A. They are used to send configuration messages using IP packets.B. They are used to send configuration messages using multicast frames.C. They are used to set the cost of STP links.D. They are used to set the bridge ID of a switch

10. If a switch determines that a blocked port should now be the designated port, what state will the port go into?

A. UnblockedB. ForwardingC. ListeningD. ListenedE. LearningF. Learned

11. What is the difference between a bridge and a layer-2 switch? (Choose all that apply.)

A. Bridges can only have one spanning-tree instance per bridge.B. Switches can only have many spanning-tree instances per switch.C. Bridges can only have many spanning-tree instances per bridge.D. Switches can only have one spanning-tree instance per switch.

12. What is the difference between a bridge and a layer-2 switch? (Choose all that apply.)

A. Switches are software based.B. Bridges are software based.C. Switches are hardware based.D. Bridges are hardware based.

13. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter tables?

A. Forwards the switch to the first available linkB. Drops the frameC. Floods the network with the frame looking for the deviceD. Sends backs a message to the origination station asking for a name

resolution

14. Which LAN switch type waits for the collision window to pass before looking up the destination hardware address in the MAC filter table and forwarding the frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

15. What is the default LAN switch type on a 1900 switch?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

16. How is the bridge ID of a switch communicated to a neighboring switches?

A. IP RoutingB. STPC. During the four STP states of a switchD. Bridge Protocol Data UnitsE. Broadcasts during convergence times

17. How is the root port on a switch determined?

A. The switch determines the highest cost of a link to the root bridge.B. The switch determines the lowest cost of a link to the root bridge.C. The fastest BPDU transfer rate is determined by sending and receiving

BPDUs between switches, and that interface becomes the root port.D. The root Bridge will broadcast the bridge ID, and the receiving bridge

will determine what interface this broadcast was received on and make this interface the root port.

18. How many root bridges are allowed in a network?

A. 10B. 1C. One for each switchD. 20

19. What could happen on a network if no loop avoidance schemes are put in place?

A. Faster convergence timesB. Broadcast stormsC. Multiple frame copiesD. IP routing will cause flapping on a serial link

20. What is the default priority of STP on a switch?

A. 32,768B. 3,276C. 100D. 10E. 1

1. Which protocol working at the Transport layer provides a connection-less service between hosts?

A. IPB. ARPC. TCPD. UDP

2. Which protocol works at the Transport layer and provides virtual circuits between hosts?

A. IPB. ARPC. TCPD. UDP

3. Which protocol works at the Internet layer and provides a connection service between hosts?

A. IPB. ARPC. TCPD. UDP

4. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself. Which protocol at the Network layer does the host use?

A. RARPB. ARPAC. ICMPD. TCPE. IPX

5. If a router interface is congested, which protocol in the IP suite is used to tell neighbor routers?

A. RARPB. ARPC. ICMPD. IPE. TCP

6. What is the valid host range the IP address 172.16.10.22, 255.255.255.240 is a part of?

A. 172.16.10.20 through 172.16.10.22B. 172.16.10.1 through 172.16.10.255C. 172.16.10.16 through 172.16.10.23D. 172.16.10.17 through 172.16.10.31E. 172.16.10.17 through 172.16.10.30

7. What range of addresses can be used in the first octet of a Class B network interface.

A. 1-126B. 1-127C. 128-190D. 128-192E. 129-192F. 192-220

8. What range of addresses can be used in the first octet of a Class C address?

A. 1-127B. 129-192C. 203-234D. 192-223

9. How many bytes is an Ethernet address?

A. 3B. 4C. 5D. 6E. 7F. 8G. 16

10. What protocol is used to find the hardware address of a local device?

A. RARPB. ARPC. IPD. ICMPE. BootP

11. Which of the following is the broadcast address for a Class B network ID using the default subnet mask.

A. 172.16.10.255B. 172.16.255.255C. 172.255.255.255D. 255.255.255.255

12. Which class of IP address provides a maximum of only 254 host addresses per network ID?

A. AB. BC. CD. DE. E

13. What is the broadcast address of the subnet address 10.254.255.19, 255.255.255.248?

A. 10.254.255.23B. 10.254.255.24C. 10.254.255.255D. 10.255.255.255

14. What is the broadcast address of the subnet address 172.06.99.99, 255.255.192.0?

A. 172.16.99.255B. 172.16.127.255C. 172.16.255.255D. 172.16.64.127

15. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?

A. 255.255.255.252B. 255.255.255.248C. 255.255.255.240D. 255.255.255.255

16. What is the port number range that a transmitting host can use to setup a session with another host?

A. 1-1023B. 1024 and aboveC. 1-256D. 1-65534

17. Which of the following ranges are considered well-know port numbers?

A. 1-1023B. 1024 and aboveC. 1-256D. 1-65534

18. What is the broadcast address of the host subnet address 10.10.10.10, 255.255.254.0?

A. 10.10.10.255B. 10.10.11.255C. 10.10.255.255D. 10.255.255.255

19. What broadcast address will the host 192.168.210.5, 255.255.255.252 use?

A. 192.168.210.255B. 192.168.210.254C. 192.168.210.7D. 192.168.210.15

20. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?

A. 255.255.255.252B. 255.255.255.128C. 255.255.0.0D. 255.255.255.192

1. When a router is first booted, where is the IOS loaded by default?

A. Boot ROMB. NVRAMC. FlashD. ROM

2. What are the two ways that you can enter setup mode on a router?

A. By typing the clear flash commandB. By typing the erase start command and rebooting the routerC. By typing the command setupD. By typing the command setup mode

3. If you are in privileged mode and want to return to user mode, what Command would you use?

A. ExitB. QuitC. DisableD. Control+Z

4. What editing command moves your cursor to the beginning of the line?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

5. Which editing command will move your cursor to the end of the line?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

6. Which editing command moves your cursor back one character?

A. Ctrl+eB. Ctrl+FC. Ctrl+BD. Ctrl+A

7. Which editing command moves your cursor back one word?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

8. Which command will show you the IOS version currently running on your router?

A. Show flashB. Show flash fileC. Show ip flashD. Sh ver

9. Which command will show you the contents of the EEPROM in your router?

A. Show flashB. Show flash fileC. Show ip flashD. Sh ver

10. Which command will show you if a DTE or DCE cable is plugged into serial 0?

A. Sh int s0B. Sh int serial 0C. Sho controllers s 0D. Sho controllers s0

11. What command will stop console messages from writing over the command You are trying to type in?

A. No loggingB. LoggingC. Logging asynchronousD. Logging synchronous

12. What command will allow users to telnet into a router and not be prompted With a user-mode password?

A. LoginB. No loginC. You can telnet by default, so no command is neededD. No password

13. What command will set your console to time out after only one second?

A. Timeout 1 0B. Timeout 0 1C. Exec-timeout 1 0D. Exec-timeout 0 1

14. How do you only set your Telnet line 1 to a password of bob?

A. line vty 0 1LoginPassword bob

B. line vty 0 4LoginPassword bob

C. line vty 1LoginPassword bob

D. line vty 1Password bobLogin

15. How do you set the password for the auxiliary port?

A. Line aux 1B. Line aux 0C. Line aux 0 4D. Line aux port

16. Which of the following commands will encrypt your Telnet password on aCisco router?

A. Line telnet 0, encryption on, password toddB. Line vty 0, password encryption, password toddC. Service password encryption, line vty 0 4, password todd

17. What command do you type to back up your currently running configuration And have it reload if the router is restarted?

A. (Config)#copy current to startingB. Router#copy starting to runningC. Router(config)#copy running-config starD. Router#copy run startup

18. When using setup mode, what are the two different management setupConfigurations?

A. BasicB. AdvancedC. ExtendedD. Expanded

19. Which command will delete the contents of NVRAM on a router?

A. Delete NVRAMB. Delete Startup-configC. Erase NVRAMD. Erase start

20. What is the problem with an interface if you type show interface serial 0 and Receive the following message?

Serial0 is administratively down, line protocol is down

A. The keepalives are different times.B. The administrator has the interface shut down.C. The administrator is pinging from the interface.D. No cable is attached.

1.What is the routing algorithm used by RIP?

A. Routed informationB. Link togetherC. Link stateD. Distance vector

2. What is the routing algorithm used by IGRP?A. Routed informationB. Link togetherC. Link stateD. Distance vector

3. Which command can you type at the router prompt to verify the broadcastfrequency for IGRP?

A. sh ip routeB. sh ip protocolC. sh ip broadcastD. debug ip igrp

3. What is the routing metric used by RIP?

A. sh ip routeB. sh ip protocolC. sh ip broadcastD. debug ip igrp

4. What is the routing metric used by RIP?

A. count to infinityB. hop countC. TTLD. Bandwidth, delay

5. What command is used to stop routing updates from exiting out an interface?

A. Router(config-if)#no routingB. Router(config-if)#passive-interfaceC. Router(config-router)#passive-interface s0D. Router(config-router)#no routing updates

6. What is the default routing metric used by IGRP? (Choose all that apply)

A. count to infinityB. hop countC. TTLD. BandwidthE. Delay

7. What does a metric of 16 hops represent in a RIP routing network?

A. 16msB. number of routers in the internetworkC. number of hopsD. 16 hops—unreachableE. last hop available

8. What are holddowns used for?

A. To hold down the protocol from going to the next hopB. To prevent regular update messages from reinstating a

route that has gone downC. To prevent regular update messages from reinstating a

route that has just come upD. To prevent irregular update messages from reinstating a

route that has gone down

9. What is split horizon?

A. When a router differentiates on which interface a packet arrived and does not advertise that information back out the same interface.

B. When you have a large bus (horizon) physical network, it splits the traffic.

C. It holds the regular updates from broadcasting to a downed link

D. It prevents regular update messages from reinstating a route that has gone down.

10. What is poison reverse?

A. It sends back the protocol received form a router as a poison pill, which stops the regular updates.

B. It is information received from a router that can’t be sent back to the originating router.

C. It prevents regular update messages from reinstating a route that has just come up.

D. It describes when a router sets the metric for a downed link to infinity.

11. What is the default administrative distance for IGRP?

A. 90B. 100C. 120D. 220

12. Which of the following is a correct default route?

A. route ip 172.0.0.0 255.0.0.0 s0B. ip route 0.0.0.0 0.0.0.0 172.16.20.1C. ip route 0.0.0.0 255.255.255.255 172.16.20.1D. route ip 0.0.0.0 0.0.0.0 172.16.10.1150

13. Which of the following is an IP link state protocol?

A. RIP V2B. EIGRPC. OSPFD. IGRP

14. What commands are available for supporting RIP networks? (Choose all that apply.)

A. sh ip routeB. sh ip ripC. sh rip networkD. debug ip rip

15. Which of the following statements is true about distance-vector-based networks? (Choose all that apply)

A. They send out partial updates every 60 secondsB. They send their complete routing table every 60 secondsC. They send their entire routing table every 30 secondsD. They update every 90 seconds.

16. Which Cisco IPS command can you use to see the IP routing table?

A. sh ip configB. sh ip arpC. sh ip routeD. sh ip table

17. What is the administrative distance used for in routing?

A. Determining the network administrator for entering that route

B. Creating a databaseC. Rating the source’s trustworthiness, expressed as a

numeric value from 0 to 255D. Rating the source’s trustworthiness, expressed as a

numeric value from 0 to 1023

18. When looking at a routing table, what does the S mean?

A. Dynamically connectedB. Directly connectedC. Statically connectedD. Sending packets

19. Which of the following is true about IP routing?

A. The destination IP address changes at each hopB. The source IP address changes at each hopC. The frame does not change at each hopD. The frame changes at each hop

20. Which of the following is true when creating static routes? (Choose all that apply.)

A. The mask parameter is optionalB. The gateway parameter is requiredC. The administrative distance is requiredD. The administrative distance is optionalE. None of the above

1. which of the following is a true statement regarding VLANs? (Choose all that apply.)

A. you must have at least tow VLANs defined in every Cisco switched network.

B. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.

C. You should not have more than 10 switches in the same VTP domain.

D. VTP is used to send VLAN information to switches in a configured VTP domain

2. What are the two ways that an administrator can configure VLAN memberships?

A. Via a DHCP serverB. StaticallyC. DynamicallyD. Via a VTP database

3. What size frame is possible with ISL frames?

A. 1518B. 1522C. 4202D. 8190

4. How are dynamic VLANs configured?

A. staticallyB. By an administratorC Via a DHCP serverD. Via a VLAN Management Policy Server

5. Which of the following protocols is used to configure trunking on a switch? (Choose all that apply.)

A. virtual Trunk ProtocolB. VLANC. TrunkD. ISL

6. Which of the following is true regarding VTP? (Choose all that apply.)

A. VTP pruning is enables by default on all switches.B. VTP pruning is disabled by default on all switchesC. You can only run VTP pruning on 5000 or higher

switches.D. VTP pruning is configured on all switches by default

if it is turned on in just one VTP server switch.

7. Which of the following Cisco standards encapsulates a frame and even adds a new FCS field?

A. ISLB. 802.1qC. 802.3zD. 802.3u

8. What does setting the VTP mode to transparent accomplish?

A. transparent mode will only forward messages and advertisements, not add them to their own database.

B. Transparent mode will both forward messages and advertisements and add them to their own database.

C. Transparent mode will not forward messages and advertisements.

D. Transparent mode makes a switch dynamically secure.

9. VTP provides which of the following benefits to a switched network? (Choose all that apply.)

A. Multiple broadcast domains in VLAN 1B. Multiple broadcast domains in VLAN 1C. Consistency of VLAN configuration across all

switches in the networkD. Allowing VLANs to be trunked over mixed networks,

like Ethernet to ATM LANE or FDDIE. Accurate tracking and monitoring of VLANsF. Dynamic reporting of added VLANs to all switchesG. Plug-and-Play VLAN addingH. Plug-and Play configuration

10. Which of the following is true regarding VTP?

A. All switches are a VTP server by defaultB. All switches are vVTP transparent by default.C. VTP is on by default with a domain name of Cisco on

all Cisco switches.D. All switches are VTP clients by default.

11. Which of the following is true regarding trunked links?

A. they are configured by default on all switch ports.B. They only work with a type of Ethernet network and

not Token ing, FDDI, or ATM.C. You can set trunk links on any 10-, 100-, and

1000Mbps ports.D. You must clear the unwanted VLANs by hand.

12. When will a switch update its VTP database?

A. every 60 secondsB. when a switch receives an advertisement that has a

higher revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

C. When a switch broadcasts an advertisement that has a lower revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

D. When a switch receives an advertisement that has the same revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

13. Which of the following is an IEEE standard for frame tagging?

A. ISLB. 802.3zC. 802.1qD. 802.3u

14. Which of the following statements describes a trunked link?

A. They can carry multiple VLANsB. Switches remove any VLAN information from the

frame before it is sent to an access link device.C. Access link devices cannot communicate with devices

outside their VLAN unless the packet is routed through a router.

D. Trunked links are used to transport VLANs between devices and can be configured to transport all VLANs or just a few.

15. Which of the following is true regarding an access link?

A. They can carry multiple VLANsB. Switches remove any VLAN information from the

frame before it is sent to an access-link device.C. Access-link devices cannot communicate with

devices outside their VLAN unless the packet is routed through a router.

D. Access links are used to transport VLANs between devices and can be configured to transport all VLANs or just a few.

16. Which of the following statements describes access links?

A. they can carry multiple VLANsB. they are used to transport VLANs between devices

and can be configured to transport all VLANs or just a few.

C. They can only be used with FastEthernet or Gigabit Ethernet.

D. They are only part of one VLAN and are referred to as the native VLAN of the port.

17. What is the IEEE method of frame tagging?

A. ISLB. LANEC. SAID fieldD. 802.1q

18. What VTP mode does not participate in the VTP domain but will still forward VTP advertisements through the configured trunk links?

A. ISLB. ClientC. TransparentD. Server

19. What is the size of an ISL header?

A. 2 bytesB. 6 bytesC. 26 bytesD. 1522 bytes

20. When is frame tagging used?

A. When VLANs are traversing an access linkB. When VLANs are traversing a trunked linkC. When ISL is used on an access linkD. When 802.1q is used on an access link

1. Which command will show you the hostname resolved to the IP address on a router?

A. sh routerB. sho hostsC. sh ip hostsD. sho name resolution

2. Which command will copy the IPS to a backup host on your network?

A. transfer IPS to 172.16.10.1B. copy run startC. copy tftp flashD. copy start tftpE. copy flash tftp

3. Which command will copy a router configuration stored on a TFTP host to the router’s NVRAM?

A. transfer IPS to 172.16.10.1B. copy run startC. copy tftp startupD. copy tftp runE. copy flash tftp

4. To copy a configuration from a TFTP host to a Cisco router’s DRAM on your network, what two commands can you use?

A. config netwB. config memC. config termD. copy tftp runE. copy tftp start

5. Which memory in a Cisco router stores packet buffers and routing tables?

A. FlashB. RAMC. ROMD. NVRAM

6. Which of the following is the correct command to create a host table on a Cisco router?

A. bob ip host 172.16.10.1B. host 172.16.10.1 bobC. ip host bob 172.16.10.1 172.16.10.2D. host bob 172.16.10.1

7. What command will allow you to see the connections made from your router to remove device?

A. sh sessB. sh usersC. disconnectD. clear line

8. Which command will show the CDP-enabled interfaces on a router?

A. sh cdpB. sh cdp interfaceC. sh interfaceD. sh cdp tgraffic

9. What is the default update timer and holdtime for DCP?

A. 240, 90B. 90, 240C. 180, 60D. 60, 180

10. To copy a configuration from the Cisco router’s DRAM to a TFTP host on your network, what command can you use?

A. config netwB. config memC. config termD. copy run tftpE. copy start tftp

11. If you want to have more than one Telnet session open at the same time, what keystroke combination would you use?

A. Tab+spacebarB. Ctrl_X, then 6C. Ctrl+Shift+X, then 6D. Ctrl+Shift_6, then X

12. Which of the following commands will give you he same output as the show cdp neighbors detail command?

A. show cdpB. show cdp ?C. sh cdp neighD. sh cdp entry *

13. What does the command cdp timer 90 do?

A. Displays the update frequency of CDP packetsB. Changes the update frequency of CDP packetsC. Sets the CDP neighbor command to 90 linesD. Changes the holdtime of CDP packets

14. Which command disables CDP on an individual interface?

A. no cdp runB. no cdp enableC. no cdpD. disable cdp

15. Which command is used to find the path a packet takes through an internetwork?

A. pingB. traceC. RIPD. SAP

16. Which two commands can be used to test IP through your network?

A. pingB. traceC. RIPD. SAP

17. Which command will clear a connection to a remote router?

A. clear connectionB. clear lineC. disconnectD. clear user

18. Which command will clear a VTY connection into your router?

A. clear connectionB. clear line #C. disconnectD. clear user

19. The show cdp neighbor command, run on a Cisco router, will provide you with 3which of the following? (Choose all that apply.)

A. IP address of neighborB. Local port/interfaceC. The same information as show versionD. CapabilityE. The same information as show cdp entry *F. Remote port IDG. Neighbor device IDH. HoldtimeI. Hardware platformJ. Speed of the link

20. Which command can you use to copy a new IPS into a router?

A. copy tftp runB. copy tftp flashC. copy tftp startD. copy flash tftpE. boot system flash IOS_name

1. IP standard access lists use which of the following as a basis for permitting or denying packets?

A. Source AddressB. Destination addressC. ProtocolD. Port

2. IP extended access lists use which of the following as a basis for permitting or denying packets?

A. Source addressB. Destination addressC. ProtocolD. PortE. All of the above

3. To specify all hosts in the Class B IP network 172.16.0.0, which wildcard access list mask would you use?

A. 255.255.0.0B. 255.255.255.0C. 0.0.255.255D. 0.255.255.255E. 0.0.0.255

4. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP address list?

A. 172.16.30.55. 0.0.0.255B. 172.16.30.55.0.0.0.0C. any 172.16.30.55D. host 172.16.30.55E. 0.0.0.0 172.16.30.55F. ip any 172.16.30.55

5. Which of the following access lists will allow only WWW traffic into network 196.15.7.0?

A. access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq wwwB. access-list 100 permit 196.15.7.0 eq wwwC. access-list 100 permit ip any 196.15.7.0 0.0.0.255D. access-list 110 permit www 196.15.7.0 0.0.0.255E. access-list 110 permit www 196.15.7.0 0.0.0.255

6. Which of the following commands will show the ports that have IP access lists applied?

A. show ip portB. show access-listC. show ip interfaceD. show access-list interfaceE. show running-config

7. What wildcard would you use to filter networks 172.16.16.0 through 172.16.23.0?

A. 172.16.16.0 0.0.0.255B. 172.16.255.255 255.255.0.0C. 172.16.0.0 0.0.255.255D. 172.16.16.0 0.0.8.255E. 172.16.16.0 0.0.7.255F. 172.16.16.0 0.0.15.255

8. Which of the following is a valid IPX standard access list?

A. access-list 800 permit 30 50B. access-list 900 permit 30 50C. access-list permit all 30 50D. access-list 800 permit 30 50 eq SAPE. access-list 900 permit –1 50

9. What wildcard would you use for the following networks?172.16.32.0 through 172.16.63.0

A. 172.16.0.0 0.0.0.255B. 172.16.255.255 0.0.0.0C. 0.0.0.0 255.255.255.255D. 172.16.32.0 0.0.0.255E. 172.16.32.0 0.0.0.31F. 172.16.32.0 0.0.31.255G. 172.16.32.0 0.31.255.255H. 172.16.32.0 0.0.63.255

10. Which of the following commands will apply IPX SAP access list 1050 for incoming traffic, assuming you’re already at interface configuration?

A. ipx access-group 1050 inB. ipx input-sap-filter 1050C. ipx access-list 1050 inD. ipx input-sap=filter 1050 inE. ipx access-group 1050

11. Which of the following commands will show extended access list 187?

A. sh ip intB. sh ip access-listC. sh access-list 187D. sh access-list 187 extended

12. What is the IP extended access list range?

A. 1-99B. 200-299C. 1000-1999D. 100-199

13. Which of the following commands is valid for creating an extended IP access list?

A. access-list 101 permit ip host 172.16.30.0 any eq 21B. access-list 101 permit tcp host 172.16.30.0 any eq 21C. access-list 101 permit icmp host 172.16.30.0 any ftp logD. access-lsit 101 permit ip any eq 12.16.30.0 21 log

14. What is the extended IPX access list range?

A. 100-199B. 900-999C. 1000-1999D. 700-799

15. What does the –1 mean in an extended IPX access list?

A. Deny this hostB. Deny any network or hostC. Local network only, no hopsD. Any host or any network

16. What are the commands you can use to monitor IP access lists?

A. sh intB. sh ip interfaceC. sh runD. sh access-list

17. Which of the following commands should follow this command?Access-list 110 deny tfp any any eq ftp

A. access-list 110 deny ip any anyB. access-list 110 permit tcp anyC. access-list 110 permit ip anyD. access-list 110 permit ip any 0.0.0.0 255.255.255.255

18. Which access configuration allows only traffic from network 172.16.0.0 to enter int s0?

A. access-list 10 permit 172.16.0.0 0.0.255.255, int s0, ip access0list 10 inB. access-group 10 permit 172.16.0.0 0.0.255.255, int s0, ip access-list 10

outC. access-list 10 permit 172.16.0.0 0.0.255.255, into s0, ip access-group 10

inD. access-list 10 permit 172.16.0.0 0.0.255.255, int s0, ip access-group 10

out

19. Where should you place standard access lists in a network?

A. On the closest switchB. Closest to the sourceC. Closest to the destinationD. On the Internet

20. Where should you place extended access lists in a network?

A. On the closest switchB. Closest to the sourceC. Closest to the destinationD. On the Internet

1. Which of the following protocols support PPP?

A. HDLCB. LCPC. SDLCD. NCPE. LAPB

2. When would you use ISDN?

A. to connect IBM mainframesB. to connect local area networks (LANs) using digital service with

dissimilar mediaC. to support applications requiring high-speed voice, video, and data

communicationsD. when you need both a consistent and very high rate of data speed and

transfer

3. How many Frame Relay encapsulation types are available with Cisco routers?

A. TwoB. ThreeC. FourD. Five

4. How many LMI types are available?

A. TwoB. ThreeC. FourD. Five

5. Regarding Frame Relay, which of the following statements is true?

A. You must use Cisco encapsulation if connecting to non-Cisco equipmentB. You must use ANSI encapsulation if connecting to non-Cisco equipmentC. You must use IETF encapsulation if connecting to non-Cisco equipmentD. You must use Q.933A encapsulation if connecting to non-Cisco

equipment

6. What is the default LMI type?

A. Q.933AB. ANSIC. IETFD. Cisco

7. Which of the following uses PVC at layer 2?

A. X.25B. ISDNC. Frame RelayD. HDLC

8. Which ISDN protocol prefix specifies switching?

A. IB. EC. SD. Q

9. If you wanted to view the DLCI numbers configured for your Frame Relay network, which command would you use? (Choose all that apply.)

A. sh frame-relayB. show runningC. sh into s0D. sh frame-relay dlciE. sh frame-relay pvc

10. What is IARP used for?

A. Mapping X.121 addresses to X.25 addressesB. Mapping DLCIs to network protocol addressesC. SMDS addressingD. Mapping ATM addresses to virtual addresses

11. What does the ISDN Basic Rate Interface (BRI) provide?

A. 23 B channels and one 64Kbps D channelB. total bit rate of up to 1.544 MbpsC. two 56Kbps B channels and one 64Kbps D channelD. Two 64Kbps B channels and one 16Kbps D channel

12. What is true about Frame Relay DLCI?

A. DLCI is optional in a Frame Relay networkB. DLCI represents a single physical circuitC. DLCI identifies a logical connection between DTE devicesD. DLCI is used to tag the beginning of a frame when using LAN switching.

13. Which command will list all configured PVCs and DCIs?

A. sh frame pvcB. sh frameC. sh frame lmiD. sh pvc

14. What is the default encapsulation on point-to-point links between two Cisco routers?

A. SDLCB. HDLCC. CiscoD. ANSI

15. What information is provided by the Local Management Interface?

A. The status of virtual circuitsB. The current DLCI valuesC. The global or local significance of DLCI valuesD. LMI encapsulation type

16. Which protocol used in PPP allows multiple network-layer protocols to be used during a connection?

A. LCP B. NCPC. HDLCD. X.25

17. Which protocol is used with PPP to establish, configure, and authenticate a data-link connection?

A. LCPB. NCPC. HDLCD. X.25

18. In Frame Relay, what identifies the PVC?

A. NCPB. LMIC. IARPD. DLCI

19. Which of the following is true about LMIs?

A. LMIs map DLCI numbers to virtual circuitsB. LMIs map X.121 addresses to virtual circuitsC. LMIs report the status of virtual circuitsD. LMI messages provide information about the current DLCI values

20. Which of the following contains Frame Relay control information?

A.DLCIIARPLMIBECN

1. Which of the following provides connection-oriented transport to upper-layer protocols?

A. RIPB. NLSPC. SPXD. NCP

2. Which of the following can respond to a client GNS request? (Choose all that apply).

A. Local NetWare serverB. Remote Netware serverC. Local client D. Cisco router

3. How often do servers exchange RIP and Sap information unless set otherwise?

A. Every 15 secondsB. Every 30 secondsC. Every 60 secondsD. Every 120 seconds

4. How can you configure a secondary subinterface on your Ethernet interface?

A. Config t, int e0.24010 B. Config t, int e100.0

C. congif t, 24000 e0D. config t, 24000 e100

5. Given the IPX address 71.00A0.2494.E939, which of the following is the associated IPX network and node address?

A. Net 00a0. node 2494 E939B. Net 71 node 00a0.2494.e939C. Net 00A0.2494. node E939D. Net 71 00a0 Node 2494.e939

6. If you bring up a new NetWare server and the Novell clients cannot see the server, what could the problem be?

A. You need to upgrade the client software.B. You need to load the NetWare patches.C. You have a frame type mismatch.D. New NetWare servers do not support IPX.

7. Which of the following are valid methods of including multiple encapsulations on a single interface? (choose all that apply.)

8. Which command would you use to see if you were receiving SAP and RIP information on an interface?

A. sho ipx routeB. sho ipx trafficC. sho ipx interfaceD. sho ips servers

9. Which command would you use to check if the router is hearing your server SAPs?

A. sho ipx route B. sho ipx traffic C. sho ipx interface D. sho ipx servers

10. Which commands will allow you to display the IPX address of an interface? (Choose all that apply.)

A. sh ipx route B. sh int C. sh prot D. debug ipx int E. show ipx inter

11. You want to forward IPX packets over multiple paths. What command do you use?

A. ipx forward maximum-pathsB. ipx maximum-pathsC. ipx forward D. ipx forward-paths

12. Which of the following are valid Cisco encapsulation names? (Choose all that apply.)

A. arpa = IPX EthernetB. hdlc = HDLC on serial linksC. novell-ether = IPX Ethernet_802.3D. novell-fddi = IPX fddi_RawE. sap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring

13. Which commands at a minimum, must be used to enable IPX networking?

A. IPX routing, IPX number , network 790B. IPX routing, int e0, IPX network number 980C. IPX routing , int e0, IPX network 77790 encapsulation arpaD. IPX routing, IPX encapsulation SAP, int e0, network 789

14. What is the default encapsulation on an Ethernet interface when enabling Novell?

A. SAPB. 802.2C. SNAPD. Token_SNAPE. 802.3F. Ethernet_II

15. What command will show you the amount of ticks that it takes an IPX packet to reach a remote nerwork?

A. show ticks B. show ip route C. show ipx route D. show ipx traffic

16. If you ant to run the 802.2 frame type on your Ethernet interface, which encapsulation type should you choose?

A. SNAPB. 802.2

C. Ethernet_IID. SAPE. Novell-Ether

17. If you want to enable the Ethernet_II frame type on your Ethernet interface, which encapsulation should you use?

A. arpaB. rarpa C. sap D. rip E. snap F. novell-ether

18. Which of the following commands will show you the routed protocols running on your Cisco router?

A. Show novellB. show ip route C. show protocolsD. show ipx protocols

19. Which command will show the network servers advertising on your network?

A. sh novell B. sh ipx sapC. sh ipx serversD. sh servers

20. Which command will show you the IPX RIP packets being sent and received on you router?

A. Show ip rip B. Sh ipx intC. Debug ipx routing activityD. Debug ipx interface

The OSI reference model is the foundation for networking as we know it today. Cisco has used it as a mold for their hardware and software development. It has greatly reduced the costs of development and virtually guaranteed interoperability between the products of a variety of vendors. If you do not have a good understanding of the OSI reference

model, you will not have a good understanding of advanced networking. The OSI model is the foundation of networking and should not be overlooked.

The Internetworking Model

1. Which group created the OSI reference model?

A. IEEB. ISOC. ARPAD. ANSI

2. With which other layers must a layer in the OSI model generally be able to communicate? (Choose all that apply.)

A. All layers B. All higher-level layersC. All lower-lever layersD. Its neighboring layersE. Its corresponding layer on the machine with which it intends to

communicate

3. What are the most common types of networks? (Choose all that apply.)

A. Wireless networkB. Local area network (LAN)C. Infrared networkD. Wide area network (WAN)

4. How many layers does TCP/IP have in its transport model?

A. 4B. 5C. 7D. 8

The Physical and Data-Link Layers

1. Which of the following would be at the physical layer? (Choose all that

A. BitstreamB. Hardware addressC. Physical addressD. Transmission media addressE. Data compression

2. What purpose do voltage levels serve?

1. What are the layers of the OSI reference model, in order (top to bottom)?

A. application, transport, network physicalB. application, presentation, session, network, transport, datalink, physicalC. application, presentation, session, transport, network, datalink, physicalD. application, session, transport, physical

2. Which of the following is not defined at the physical layer of the OSI reference model?

A. hardware addressesB. bitstream transmissionC. voltage levelsD. physical interface

3. What is the function of CSMA/CD?

A. It passes a token around a star topology.B. Nodes access the network and retransmit if they detect a collision.C. Nodes connect to a dual ring of fiber-optics and use a token-passing

scheme.D. Nodes break the frames into tiny cells and forward them through a cell-

switching network.

4. The FDDI specification includes which layers of the OSI reference model?

A. Physical and networkB. Physical and transportC. Physical and MAC sub-layer of datalinkD. Physical and application

5. What does the network layer address provide?

A. The hardware addressB. The node address and the hardware addressC. The network address and the node addressD. The network address mapped to the hardware address

6. What qualities match TCP?

A. Connectionless, reliableB. Connection-oriented, reliableC. Connectionless, unreliableD. Connection-oriented, unreliable

7. Which layer of the OSI reference model specifies data formats, such as encryption?

A. ApplicationB. PresentationC. SessionD. TransportE. NetworkF. DatalinkG. Physical

8. Which of the following statements is true in general when an application at the source wishes to send data to an application at the destination address?

A. The lower layer at destination adds its own header information to the data it receives from the higher layer.

B. The lower layer at source adds its own header information to the data it receives from the higher layer.

C. The lower layer at destination strips header information from the data added by the higher layer.

D. The higher layer at source strips header information added to the data by the lower layer.

9. In the OSI Model, encapsulation of the data may occur at:

A. Layer 7 of the sourceB. Layer 1 of the destinationC. Layer 7 of the destinationD. The session, network, and datalink layers of the sourceE. Layer 1 of the source.

10. ADS Enterprises it experiencing collisions in their network. After frequently monitoring the network, it is determined that the network end nodes are

operating at half-duplex. Which statement is true concerning the occurrence of collisions in a CSMA/CD network?

A. A node listens to the network and hears nothing.B. A node receives a message from the network.C. Two nodes hear nothing and then transmit data simultaneously.D. A node on the network has physical failure.

11. A broadcast system means:

A. Only a few nodes on the network see the data meant for these nodes.B. All nodes on the network see all the data frames.C. The network informs all the nodes of a network failure.D. None of the above.

12. An FCS in the IEEE 802.3 frame is:

A. A receiving station addressB. A source station addressC. A CRC valueD. A sequence number of the frame

13. What is the main purpose of the dual-ring architecture in FDDI?

A. To increase traffic on the networkB. To allow bi-directional traffic on the networkC. To provide fault toleranceD. To provide on path for traffic from selected nodes

14. The BRI in ISDN has:

A. One B channel and one D channelB. 23 B channels and one D channelC. Two B channels and one D channelD. Two D channels and one B channel

15. Synchronization of network timing is done at which layer?

A. Datalink layerB. Transport layerC. Physical layer

D. Session layer

16. In a Frame Relay network, which statement is true of FECN when the network is congested?

A. It is a bit that is set to “0.”B. It is a bit that is set to “1.”C. It is sent by DTE to upper protocol layers.D. A and C only.E. B and C only

17. The DLCI in a Frame Relay network identifies what?

A. DTEB. DCEC. A connection between two devicesD. All of the above

18. After talking with a local carrier about establishing a frame-relay network, the carrier representative asks about the virtual circuits to the sites. The question arises of whether or not to implement SVCs or PVCs. How does a PVC in a Frame Relay network differ from an SVC?

A. A PVC is a permanently established link.B. A PVC terminates after the call has ended.C. A PVC has a transfer phase.D. A PVC has an idle phase.

19. What is the minimum size for and Ethernet frame?

A. 48 bytesB. 64 bytesC. 128 bytesD. 1500 bytes

20. What does token seizing imply?

A. Any Token Ring station can take the token whenever it wantsB. Once taken, a token is not returned.C. Each Token Ring station is responsible for its own token.D. Tokens are reserved and can be used by machines with an appropriate

priority level.

1. What characterizes a broadcast frame?

A. A frame’s destination is an end-point device.B. A frame’s destination is a subset of devices on a segment.C. A frame’s destination is all devices on a segment.D. A frame’s destination is the same as the frame’s source.

2. Which of the following IP addresses is a multicast destination address?

A. 192.168.2.5B. 224.0.0.2C. 24.112.35.1D. 255.255.255.255

3. You have noticed that the CPU usage of workstations connected to the network is more than 10 percent even when users are not working at them. If you unplug the network cable from the computer’s CPU, utilization drops to one percent. What can cause a high CPU usage on computers connected to the network?

A. A high number of CRC error on the network.B. Many broadcast packets may be caused by a broadcast storm.C. The routing protocol you use is not compatible with the workstation

operation system.D. You are using the wrong cabling system.

4. Your network has a big collision domain, and you would like to divide it in to a number of smaller ones. Which devices can you use to do that? (Choose all that apply.)

A. RepeatersB. HubsC. Bridges

D. SwitchesE. Routers

5. Repeaters allow you to do what?

A. Divide one broadcast domain into a few broadcast domainsB. Extend the maximum distance of a networkC. Avoid collisionsD. Route packets between segments

6. Switches allow you to do what? (Choose all that apply.)

A. Use Full Duplex network devicesB. Filter FTP trafficC. Summarizes addressesD. Divide one collision domain into a few collision domains

21. Which Cisco layer is responsible for breaking up collision domains?

A. PhysicalB. AccessC. CoreD. NetworkE. DistributionF. Data Link

22. PDUs at the Network layer of the OSI are called what?

A. CoreB. FramesC. PacketsD. SegmentsE. AccessF. DistributionG. Transport

23. At which Cisco layer would broadcase domains bed defined?

A. CoreB. NetworkC. PhysicalD. DistributionE. AccessF. Transport

24. PDUs at the Data Link layer are named what?

A. FramesB. PacketsC. DatagramsD. TransportsE. SegmentsF. Bits

25. Segmentation of a data stream happens at which layer of the OSI model?

A. PhysicalB. Data LinkC. NetworkD. TransportE. DistributionF. Access

26. For which of the Following would you not need to provide a crossover cable?

A. Connecting uplinks between switchesB. Connecting routers to switchesC. Connecting hub to hubD. Connecting hubs to switches

27. What does the Data Link layer user to find hosts on a local network?

A. Logical network addressesB. Port numbersC. Hardware addressesD. Default gateways

28. How is a crossover Cabled?

A. The pins 1-8 are completely opposite on the other side.B. It has the pins 1-8 cabled the same on the other side.C. Pin 1 on one side connects to pin 3 on the other side and pin 2

connects to pin 6 on the other end.D. Pin 2 on one side connects to pin 3 on the other side and pin 1

connects to pin 6 on the other end.

29. Where are routers defined in the OSI model?

A. Physical

B. TransportC. Data LinkD. Network

30. At which layer of the OSI are 1s and 0s converted to a digital signal?

A. PhysicalB. TransportC. Data LinkD. Network

31. Bridges are defined at what layer of the OSI model?

A. PhysicalB. TransportC. Data LinkD. Network

32. What Cisco layer provides segmentation of contention networks?

A. AccessB. PhysicalC. NetworkD. DistributionE. CoreF. TransportG. Data Link

33. What is used at the Transport layer to stop a receiving host’s buffer from overflowing?

A. SegmentationB. PacketsC. AcknowledgementsD. Flow controlE. PDUs

34. Which layer of the OSI provides translation of data?

A. ApplicationB. PresentationC. SessionD. TransportE. Data Link

35. Routers can provide which of the following functions? (Choose all that apply.)

A. Breakup of collision domainsB. Breakup of broadcast domainsC. Logical network addressingD. Physical address filtering of the local network

36. Routers are typically used at which layer of the Cisco three-layer model?

A. AccessB. CoreC. NetworkD. Data LinkE. Distribution

37. How many bits define a hardware address?

A. 6 bitsB. 16 bitsC. 46 bitsD. 48 bits

38. Which of the following is not an advantage of a layer model?

A. Dividing the complex network operation into a more manageable layer approach.

B. Allowing changes to occur in one layer without having to change all layers.

C. Allowing changes to occur in all layers without having to change one layer.

D. Defining a standard interface for the “plug-and-play” multivendor integration

39. Which three options use twisted-pair copper wiring?

A. 100BaseFXB. 100BaseTXC. 100VG-AnyLAND. 10BaseTE. 100BaseSX

40. What does the “Base” indicate in 10BaseT?

A. Backbone wiring that uses many digital signals at the same time in one wire.

B. Baseband wiring that uses many digital signals at the same time in one wire.

C. Backbone wiring that uses only one digital signal at a time in the wire.

D. Baseband wiring that uses only one digital signal at a time in the wire.

21. Which LAN switch method runs a CRC on every frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

22. Which LAN switch type only checks the hardware address before forwarding a frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

23. What is true regarding the STP blocked state of a port? (Choose all that apply.)

A. No frames are transmitted or received on the blocked port.B. BPDUs are sent and received on the blocked port.C. BPDUs are still received on the blocked port.D. Frames are sent or received on the blocked port.

24. Layer-2 switching provides which of the following?

A. Hardware-based bridging (MAC)B. Wire speed

C. High latencyD. High cost

25. What is used to determine the root bridge in a network? (Choose all that apply.)

A. PriorityB. Cost of the links attached to the switchC. MAC addressD. IP address

26. What is used to determine the designated port on a bridge?

A. PriorityB. Cost of the links attached to the switchC. MAC addressD. IP address

27. What are the four port states of an STP swithch?

A. LearningB. LearnedC. ListenedD. HeardE. ListeningF. ForwardingG. ForwardedH. BlockingI. Gathering

28. What are the three distinct functions of layer-2 switching?

A. Address learningB. RoutingC. Forwarding and filteringD. Creating network loopsE. Loop avoidanceF. IP addressing

29. What is true regarding BPDUs?

A. They are used to send configuration messages using IP packets.B. They are used to send configuration messages using multicast frames.C. They are used to set the cost of STP links.

D. They are used to set the bridge ID of a switch

30. If a switch determines that a blocked port should now be the designated port, what state will the port go into?

A. UnblockedB. ForwardingC. ListeningD. ListenedE. LearningF. Learned

31. What is the difference between a bridge and a layer-2 switch? (Choose all that apply.)

A. Bridges can only have one spanning-tree instance per bridge.B. Switches can only have many spanning-tree instances per switch.C. Bridges can only have many spanning-tree instances per bridge.D. Switches can only have one spanning-tree instance per switch.

32. What is the difference between a bridge and a layer-2 switch? (Choose all that apply.)

A. Switches are software based.B. Bridges are software based.C. Switches are hardware based.D. Bridges are hardware based.

33. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter tables?

A. Forwards the switch to the first available linkB. Drops the frameC. Floods the network with the frame looking for the deviceD. Sends backs a message to the origination station asking for a name

resolution

34. Which LAN switch type waits for the collision window to pass before looking up the destination hardware address in the MAC filter table and forwarding the frame?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

35. What is the default LAN switch type on a 1900 switch?

A. Cut-throughB. Store and forwardC. FragmentCheckD. FragmentFree

36. How is the bridge ID of a switch communicated to a neighboring switches?

A. IP RoutingB. STPC. During the four STP states of a switchD. Bridge Protocol Data UnitsE. Broadcasts during convergence times

37. How is the root port on a switch determined?

A. The switch determines the highest cost of a link to the root bridge.B. The switch determines the lowest cost of a link to the root bridge.C. The fastest BPDU transfer rate is determined by sending and receiving

BPDUs between switches, and that interface becomes the root port.D. The root Bridge will broadcast the bridge ID, and the receiving bridge

will determine what interface this broadcast was received on and make this interface the root port.

38. How many root bridges are allowed in a network?

A. 10B. 1C. One for each switchD. 20

39. What could happen on a network if no loop avoidance schemes are put in place?

A. Faster convergence timesB. Broadcast stormsC. Multiple frame copiesD. IP routing will cause flapping on a serial link

40. What is the default priority of STP on a switch?

A. 32,768B. 3,276C. 100D. 10E. 1

21. Which protocol working at the Transport layer provides a connection-less service between hosts?

A. IPB. ARPC. TCPD. UDP

22. Which protocol works at the Transport layer and provides virtual circuits between hosts?

A. IPB. ARPC. TCPD. UDP

23. Which protocol works at the Internet layer and provides a connection service between hosts?

A. IPB. ARPC. TCPD. UDP

24. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself. Which protocol at the Network layer does the host use?

A. RARPB. ARPAC. ICMPD. TCPE. IPX

25. If a router interface is congested, which protocol in the IP suite is used to tell neighbor routers?

A. RARPB. ARPC. ICMPD. IPE. TCP

26. What is the valid host range the IP address 172.16.10.22, 255.255.255.240 is a part of?

A. 172.16.10.20 through 172.16.10.22B. 172.16.10.1 through 172.16.10.255C. 172.16.10.16 through 172.16.10.23D. 172.16.10.17 through 172.16.10.31E. 172.16.10.17 through 172.16.10.30

27. What range of addresses can be used in the first octet of a Class B network interface.

A. 1-126B. 1-127C. 128-190D. 128-192E. 129-192F. 192-220

28. What range of addresses can be used in the first octet of a Class C address?

A. 1-127B. 129-192C. 203-234D. 192-223

29. How many bytes is an Ethernet address?

A. 3B. 4C. 5D. 6E. 7F. 8G. 16

30. What protocol is used to find the hardware address of a local device?

A. RARPB. ARPC. IPD. ICMPE. BootP

31. Which of the following is the broadcast address for a Class B network ID using the default subnet mask.

A. 172.16.10.255B. 172.16.255.255C. 172.255.255.255D. 255.255.255.255

32. Which class of IP address provides a maximum of only 254 host addresses per network ID?

A. AB. BC. CD. DE. E

33. What is the broadcast address of the subnet address 10.254.255.19, 255.255.255.248?

A. 10.254.255.23B. 10.254.255.24C. 10.254.255.255D. 10.255.255.255

34. What is the broadcast address of the subnet address 172.06.99.99, 255.255.192.0?

A. 172.16.99.255B. 172.16.127.255C. 172.16.255.255D. 172.16.64.127

35. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?

A. 255.255.255.252B. 255.255.255.248C. 255.255.255.240D. 255.255.255.255

36. What is the port number range that a transmitting host can use to setup a session with another host?

A. 1-1023B. 1024 and aboveC. 1-256D. 1-65534

37. Which of the following ranges are considered well-know port numbers?

A. 1-1023B. 1024 and aboveC. 1-256D. 1-65534

38. What is the broadcast address of the host subnet address 10.10.10.10, 255.255.254.0?

A. 10.10.10.255B. 10.10.11.255C. 10.10.255.255D. 10.255.255.255

39. What broadcast address will the host 192.168.210.5, 255.255.255.252 use?

A. 192.168.210.255B. 192.168.210.254C. 192.168.210.7D. 192.168.210.15

40. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?

A. 255.255.255.252B. 255.255.255.128C. 255.255.0.0D. 255.255.255.192

21. When a router is first booted, where is the IOS loaded by default?

A. Boot ROMB. NVRAMC. FlashD. ROM

22. What are the two ways that you can enter setup mode on a router?

A. By typing the clear flash commandB. By typing the erase start command and rebooting the routerC. By typing the command setupD. By typing the command setup mode

23. If you are in privileged mode and want to return to user mode, what Command would you use?

A. ExitB. QuitC. DisableD. Control+Z

24. What editing command moves your cursor to the beginning of the line?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

25. Which editing command will move your cursor to the end of the line?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

26. Which editing command moves your cursor back one character?

A. Ctrl+eB. Ctrl+FC. Ctrl+BD. Ctrl+A

27. Which editing command moves your cursor back one word?

A. Ctrl+EB. Ctrl+FC. Ctrl+BD. Ctrl+A

28. Which command will show you the IOS version currently running on your router?

A. Show flashB. Show flash fileC. Schow ip flashD. Sh ver

29. Which command will show you the contents of the EEPROM in your router?

A. Show flashB. Show flash fileC. Show ip flashD. Sh ver

30. Which command will show you if a DTE or DCE cable is plugged into serial 0?

A. Sh int s0B. Sh int serial 0C. Sho controllers s 0D. Sho controllers s0

31. What command will stop console messages from writing over the command You are trying to type in?

A. No loggingB. LoggingC. Logging asynchronousD. Logging synchronous

32. What command will allow users to telnet into a router and not be prompted With a user-mode passwork?

A. LoginB. No loginC. You can telnet by default, so no command is neededD. No password

33. What command will set your console to time out after only one second?

A. Timeout 1 0B. Timeout 0 1C. Exec-timeout 1 0D. Exec-timeout 0 1

34. How do you only set your Telnet line 1 to a password of bob?

A. line vty 0 1LoginPassword bob

B. line vty 0 4LoginPassword bob

C. line vty 1LoginPassword bob

D. line vty 1Password bobLogin

35. How do you set the password for the auxiliary port?

A. Line aux 1B. Line aux 0

C. Line aux 0 4D. Line aux port

36. Which of the following commands will encrypt your Telnet password on aCisco router?

A. Line telnet 0, encryption on, password toddB. Line vty 0, password encryption, password toddC. Service password encryption, line vty 0 4, password todd

37. What command do you type to back up your currently running configuration And have it reload if the router is restarted?

A. (Config)#copy current to startingB. Router#copy starting to runningC. Router(config)#copy running-config starD. Router#copy run startup

38. When using setup mode, what are the two different management setupConfigurations?

A. BasicB. AdvancedC. ExtendedD. Expanded

39. Which command will delete the contents of NVRAM on a router?

A. Delete NVRAMB. Delete Startup-configC. Erase NVRAMD. Erase start

40. What is the problem with an interface if you type show interface serial 0 and Receive the following message?

Serial0 is administratively down, line protocol is down

E. The keepalives are different times.F. The administrator has the interface shut down.G. The administrator is pinging from the interface.H. No cable is attached.

1.What is the routing algorithm used by RIP?

E. Routed informationF. Link togetherG. Link stateH. Distance vector

2. What is the routing algorithm used by IGRP?A. Routed informationB. Link togetherC. Link stateD. Distance vector

3. Which command can you type at the router prompt to verify the broadcastfrequency for IGRP?

E. sh ip routeF. sh ip protocolG. sh ip broadcastH. debug ip igrp

3. What is the routing metric used by RIP?

A. sh ip routeB. sh ip protocolC. sh ip broadcastD. debug ip igrp

4. What is the routing metric used by RIP?

A. count to infinityB. hop countC. TTLD. Bandwidth, delay

5. What command is used to stop routing updates from exiting out an interface?

A. Router(config-if)#no routingB. Router(config-if)#passive-interfaceC. Router(config-router)#passive-interface s0D. Router(config-router)#no routing updates

6. What is the default routing metric used by IGRP? (Choose all that apply)

A. count to infinityB. hop countC. TTLD. BandwidthE. Delay

7. What does a metric of 16 hops represent in a RIP routing network?

A. 16msB. number of routers in the internetworkC. number of hopsD. 16 hops—unreachableE. last hop available

8. What are holddowns used for?

A. To hold down the protocol from going to the next hopB. To prevent regular update messages from reinstating a

route that has gone downC. To prevent regular update messges from reinstating a

route that has just come upD. To prevent irregular update messages from reinstating a

route that has gone down

9. What is split horizon?

A. When a router differentiates on which interface a packet arrived and does not advertise that information back out the same interfae.

B. When you have a large bus (horizon) physical network, it splits the traffic.

C. It holds the regular updates from broadcasting to a downed link

D. It prevents regular update messages from reinstating a route that has gone down.

10. What is poison reverse?

A. It sends back the protocol received form a router as a poison pill, which stops the regular updates.

B. It is information received from a router that can’t be sent back to the originating router.

C. It prevents regular update messages from reinstating a route that has just come up.

D. It describes when a router sets the metric for a downed link to infinity.

11. What is the default administrative distance for IGRP?

A. 90B. 100C. 120D. 220

12. Which of the following is a correct default route?

A. route ip 172.0.0.0 255.0.0.0 s0B. ip route 0.0.0.0 0.0.0.0 172.16.20.1C. ip route 0.0.0.0 255.255.255.255 172.16.20.1D. route ip 0.0.0.0 0.0.0.0 172.16.10.1150

13. Which of the following is an IP link state protocol?

A. RIP V2B. EIGRPC. OSPFD. IGRP

14. What commands are available for supporting RIP networks? (Choose all that apply.)

A. sh ip routeB. sh ip ripC. sh rip networkD. debug ip rip

15. Which of the following statements is true about distance-vector-based networks? (Choose all that apply)

A. They send out partial updates every 60 secondsB. They send their complete routing table every 60 secondsC. They send their entire routing table every 30 secondsD. They update every 90 seconds.

16. Which Cisco IPS command can you use to see the IP routing table?

A. sh ip configB. sh ip arpC. sh ip routeD. sh ip table

17. What is the administrative distance used for in routing?

A. Determining the network administrator for entering that route

B. Creating a databaseC. Rating the source’s trustworthiness, expressed as a

numeric value from 0 to 255D. Rating the source’s trustworthiness, expressed as a

numeric value from 0 to 1023

18. When looking at a routing table, what does the S mean?

A. Dynamically connectedB. Directly connectedC. Statically connectedD. Sending packets

19. Which of the following is true about IP routing?

A. The destination IP address changes at each hopB. The source IP address changes at each hopC. The frame does not change at each hop

D. The frame changes at each hop

20. Which of the following is true when creating static routes? (Choose all that apply.)

A. The mask parameter is optionalB. The gateway parameter is requiredC. The administrative distance is requiredD. The administrative distance is optionalE. None of the above

1. which of the following is a true statement regarding VLANs? (Choose all that apply.)

A. you must have at least tow VLANs defined in every Cisco switched network.

B. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.

C. You should not have more than 10 switches in the same VTP domain.

D. VTP is used to send VLAN information to switches in a configured VTP domain

2. What are the two ways that an administrator can configure VLAN memberships?

A. Via a DHCP serverB. StaticallyC. DynamicallyD. Via a VTP database

3. What size frame is possible with ISL frames?

A. 1518B. 1522C. 4202D. 8190

4. How are dynamic VLANs configured?

A. staticallyB. By an administratorC Via a DHCP serverD. Via a VLAN Management Policy Server

5. Which of the following protocols is used to configure trunking on a switch? (Choose all that apply.)

A. virtual Trunk ProtocolB. VLANC. TrunkD. ISL

6. Which of the following is true regarding VTP? (Choose all that apply.)

A. VTP pruning is enables by default on all switches.B. VTP pruning is disabled by default on all switchesC. You can only run VTP pruning on 5000 or higher

switches.D. VTP pruning is configured on all switches by default

if it is turned on in just one VTP server switch.

7. Which of the following Cisco standards encapsulates a frame and even adds a new FCS field?

A. ISLB. 802.1qC. 802.3zD. 802.3u

8. What does setting the VTP mode to transparent accomplish?

A. transparent mode will only forware messages and advertisements, not add them to their own database.

B. Transparent mode will both forward messages and advertisements and add them to their own database.

C. Transparent mode will not forward messages and advertisements.

D. Transparent mode makes a switch dynamically secure.

9. VTP provides which of the following benefits to a switched network? (Choose all that apply.)

A. Multiple broadcast domains in VLAN 1B. Multiple broadcast domains in VLAN 1C. Consistency of VLAN configuration across all

switches in the networkD. Allowing VLANs to be trunked over mixed networks,

like Ethernet to ATM LANE or FDDIE. Accurate tracking and monitoring of VLANsF. Dynamic reporting of added VLANs to all switchesG. Plug-and-Play VLAN addingH. Plug-and Play configuration

10. Which of the following is true regarding VTP?

A. All switches are a VTP server by defaultB. All switches are vVTP transparent by default.C. VTP is on by default with a domain name of Cisco on

all Cisco switches.D. All switches are VTP clients by default.

11. Which of the following is true regarding trunked links?

A. they are configured by default on all switch ports.B. They only work with a type of Ethernet network and

not Token ing, FDDI, or ATM.C. You can set trunk links on any 10-, 100-, and

1000Mbps ports.D. You must clear the unwanted VLANs by hand.

12. When will a switch update its VTP database?

A. every 60 secondsB. when a switch receives an advertisement that has a

higher revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

C. When a switch broadcasts an advertisement that has a lower revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

D. When a switch receives an advertisement that has the same revision number, the switch will overwrite the

database in NVRAM with the new database being advertised.

13. Which of the following is an IEEE standard for frame tagging?

A. ISLB. 802.3zC. 802.1qD. 802.3u

14. Which of the following statements describes a trunked link?

A. They can carry multiple VLANsB. Switches remove any VLAN information from the

frame before it is sent to an access link device.C. Access link devices cannot communicate with devices

outside their VLAN unless the packet is routed through a router.

D. Trunked links are used to transport VLANs between devices and can be configured to transport all VLANs or just a few.

15. Which of the following is true regarding an access link?

A. They can carry multiple VLANsB. Switches remove any VLAN information from the

frame before it is sent to an access-link device.C. Access-link devices cannot communicate with

devices outside their VLAN unless the packet is routed through a router.

D. Access links are used to transport VLANs between devices and can be configured to transport all VLANs or just a few.

16. Which of the following statements describes access links?

A. they can carry multiple VLANsB. they are used to transport VLANs between devices

and can be configured to transport all VLANs or just a few.

C. They can only be used with FastEthernet or Gigabit Ethernet.

D. They are only part of one VLAN and are referred to as the native VLAN of the port.

17. What is the IEEE method of frame tagging?

A. ISLB. LANEC. SAID fieldD. 802.1q

18. What VTP mode does not participate in the VTP domain but will still forward VTP advertisements through the configured trunk links?

A. ISLB. ClientC. TransparentD. Server

19. What is the size of an ISL header?

A. 2 bytesB. 6 bytesC. 26 bytesD. 1522 bytes

20. When is frame tagging used?

A. When VLANs are traversing an access linkB. When VLANs are traversing a trunked linkC. When ISL is used on an access linkD. When 802.1q is used on an access link

21. Which command will show you the hostname resolved to the IP address on a router?

A. sh routerB. sho hostsC. sh ip hostsD. sho name resolution

22. Which command will copy the IPS to a backup host on your network?

A. transfer IPS to 172.16.10.1B. copy run startC. copy tftp flashD. copy start tftpE. copy flash tftp

23. Which command will copy a router configuration stored on a TFTP host to the router’s NVRAM?

A. transfer IPS to 172.16.10.1B. copy run startC. copy tftp startupD. copy tftp runE. copy flash tftp

24. To copy a configuration from a TFTP host to a Cisco router’s DRAM on your network, what two commands can you use?

A. config netwB. config memC. config term

D. copy tftp runE. copy tftp start

25. Which memeory in a Cisco router stores packet buffers and routing tables?

A. FlashB. RAMC. ROMD. NVRAM

26. Which of the following is the correct command to create a host table on a Cisco router?

A. bob ip host 172.16.10.1B. host 172.16.10.1 bobC. ip host bob 172.16.10.1 172.16.10.2D. host bob 172.16.10.1

27. What command will allow you to see the connections made from your router to remove device?

A. sh sessB. sh usersC. disconnectD. clear line

28. Which command will show the CDP-enabled interfaces on a router?

A. sh cdpB. sh cdp interfaceC. sh interfaceD. sh cdp tgraffic

29. What is the default update timer and holdtime for DCP?

A. 240, 90B. 90, 240C. 180, 60D. 60, 180

30. To copy a configuration from the Cisco router’s DRAM to a TFTP host on your nework, wht command can you use?

A. config netwB. config memC. config termD. copy run tftpE. copy start tftp

31. If you want to have more than one Telnet session open at the same time, what keystroke combination would you use?

A. Tab+spacebarB. Ctrl_X, then 6C. Ctrl+Shift+X, then 6D. Ctrl+Shift_6, then X

32. Which of the following commands will give you he same output as the show cdp neighbors detail command?

A. show cdpB. show cdp ?C. sh cdp neighD. sh cdp entry *

33. What does the command cdp timer 90 do?

A. Displays the update frequency of CDP packetsB. Changes the update frequency of CDP packetsC. Sets the CDP neighbor command to 90 linesD. Changes the holdtime of CDP packets

34. Which command disables CDPon an individual interface?

A. no cdp runB. no cdp enableC. no cdpD. disable cdp

35. Which command is used to find the path a packet takes through an internetwork?

A. pingB. traceC. RIPD. SAP

36. Which two commands can be used to test IP through your network?

A. ping

B. traceC. RIPD. SAP

37. Which command will clear a connection to a remote router?

A. clear connectionB. clear lineC. disconnectD. clear user

38. Which command will clear a VTY connection into your router?

A. clear connectionB. clear line #C. disconnectD. clear user

39. The show cdp neighbor command, run on a Cisco router, will provide you with 3which of the following? (Choose all that apply.)

A. IP address of neighborB. Local port/interfaceC. The same information as show versionD. CapabilityE. The same information as show cdp entry *F. Remote port IDG. Neighbor device IDH. HoldtimeI. Hardware platformJ. Speed of the link

40. Which command can you use to copy a new IPS into a router?

A. copy tftp runB. copy tftp flashC. copy tftp startD. copy flash tftpE. boot system flash IOS_name

Questions

1. What composes the X.25 protocol suite? PLP, LAPB, X.21bis2. What is the maximum speed of X.21bis? 19.2KBPS3. What portion of PPP establishes the connection? LCP4. What does TA mean? Terminal adapter5. What is NT1? Network termination device for legacy ISDN networks, also

requires a TA 6. What is NT2? Network termination device for current ISDN networks, has

incorporated TA.7. BRI is what? Basic Rate Interface for ISDN has 2 64K B channels and 1

16K D channel. The B channels carry data and the D channel carries control information.

8. PRI is what? Primary Rate Interface for ISDN has 23 63K B channels and 1 16K D channel. Used in the US, has 1.544 MBPS throughput. PRI every where else in the world has 30 B channels

9. What is a DTE? Data Terminating Equipment, usually owned by the customer

10.What is a DCE? Data circuit Equipment, usually owned by the phone company and provides for clocking and switching services in a network.

11.What is PVC? Permanent Virtual Circuit, a path between two devices that is never terminated, going through a frame relay cloud. Used for frequent and consistent data transfers. PVC’s only have one mode of data transfer.

12.What is a SVC? Switched Virtual Circuit, a dynamic temporary path between two devices that is only brought online when needed. Used when permanent connections aren’t required and the company is trying to save money. SVC’s have three modes: circuit establishment, data transfer, and circuit termination

13.What is a DLCI? Data link Connection Identifier, unique identifier for Frame Relay virtual circuits.

14.What is OSPF? Open Shortest Path First is a link state routing protocol that uses LSA (link State Advertisements) and Hello packets to find its neighbors. OSPF is divided into areas called Autonomous Systems. If there is more than one area at least one must be called area0

15.What is RIP? Router Information Protocol is a distance vector routing protocol that uses hop count as its measurment information. Updates every 30 seconds. RIP Version 2 supports VLSM. Limited to 15 hops, anything above that was considered too far away. RIP is updated by each router gossiping about what it knows, passes it along.

16.What is IPX RIP? Same as RIP but with the IPX protocol, uses hops and ticks as measurement. Updates every 60 seconds

17.What is SAP? Service Advertising Protocol, broadcasts every 60 seconds, used by servers and clients to advertise or look for services.

18.NLSP – Novell Link state routing protocol is an upgrade to RIP and SAP, uses link state rather than advertisements.

19.What is RTMP – Appletalk Routing Table Maintanence Protocol is the appletalk version of RIP, updates every 10 seconds.

20.What is IGRP? Interior Gateway Routing Protocol is a distance vector routing protocol that uses reliability, bandwidth, load, and delay information provided by each router to determine the shortest path. Updates every 90 seconds. Limited to 255 hops. IGRP is updated from each router personally, there is no second hand information.

21.What is EIGRP? Enhanced Interior Gateway Routing Protocol supports VLSM. Only sends changes to its routing tables out rather than all route tables as RIP and IGRP does.

22.What is an MIB? Management Information base is a collection of information stored about nodes on the network.

23.What is a multicast? A transmission set for a subset of computers.24.What is a unicast? A transmission set for only one computer25.what is a broadcast? A transmission set for all computers within that

broadcast domain.26. If you have media problems the recommended to uses switches.27. IF you have protocol problems it is recommended that you use routers.28. if you have transport problems it is recommended that you upgrade your

network to fast Ethernet or ATM.29.Utilization over 40% on Ethernet is bad.30.Utilization over 70% on token ring is bad.31.WAN links utilized over 70% is bad.32. response time should be less than 100 milliseconds33.no segments should have more than 20% broadcasts/multicasts34.no segments should have more than 1 CRC error per million bytes of data35.Cisco routers shouldn’t be utilized more than 75%.36.You should use a frame size that is the maximum supported for that media

type.37.Maximum frame size for Ethernet is 1518 bytes.38.Maximum frame size is 53 bytes for ATM.39.The network should be designed hierarchically of core, distribution, and

access.40.core layer should allow for switching and high speed access with

reliability.41.From one edge of the network to the other is known as the diameter.42.Distribution layer is where policy’s, security, aggregation, or route

summerization occurs.43.Access layer provides for local user access to segments on the network.

44.What is HSRP? Hot Standby Router Protocol used to have more than one router simulate a virtual router/gateway. If one router goes down the other router takes over immediately.

45.Load balancing is done by default on IP but must be configured for IPX and Appletalk using the maximum-paths command.

46. IP load balancing is by default done over 4 paths and up to a maximum of 6 paths.

47.What is pinhole congestion? When you are load balancing over more than one path and one becomes completely congested and the other isn’t. However because of this the other still slows down the transmission rate as well, its an equal 50/50 transmission.

48.Spanning Tree ensures that there is only one active path between two network stations, when one goes down the other automatically starts up.

49.you can use routers in a three part firewall system to set up a DMZ of sorts to protect the internal LAN.

50.Cisco makes a firewall called the PIX firewall.51.What is the 80/20 rule? 80% traffic is local, 20% is remote.52. ISDN is used primarily for telecommuters and remote offices AND support

for voice/video AND as a backup to another type of link.53.Frame Relay is a cost-effective, high-speed, low-latency mesh or hub and

spoke topology between remote sites and can be used in both private and carrier-provided networks.

54.ATM is used as support for accelerating bandwidth requirements.55. Important to use route summerization (AKA Supernetting) on routers to

keep route tables small.56.classful routing is when the prefix length (subnet mask) is NOT

transmitted. RIP and IGRP uses classful routing.57.Classless routing is when the prefix length is transmitted. OSPF uses

classless routing.58. for route summerization to work the following must be done: multiple IP

addresses must share the same leftmost bits, routers must base their routing decisions on a 32 bit IP address and a prefix length that can be up to 32 bits, routing protocols must carry the prefix length

59.Cisco offers a DNS/DHCP server solution.60.What is convergence? When the routing information from all routers is

shared with all other routers.61.Directly connected routers have an administrative distance value of 0,

statically assigned routes are 1, IGRP route is 100, RIP is 120.62.RTMP has a hop limitation of 15 hops as well.63. IGRP limit is 255 but is set to 100 by default.64. IPX RIP hop limit is 15 but can be extended to 254.65.Transparent bridging is found in Ethernet networks and will flood all ports

with any broadcasts or multicasts sent over the network with the exception of the port that sent the broadcast or multicast.

66.source-route bridging is found in tokenring networks67. translational bridging is used to go from Ethernet to tokenring.

68.Cisco recommends that compression/encryption be disabled if the CPU load is in excess of 40%.

69.Executive summary is used to give a quick overview of the project to key decision makers.

70.design requirements summarizes conclusions about the customers needs71.design solution is your recommended solution.72.Summary is your summary of the design solution.73.The framework triangle is composed of what? Protocols, media, transport74.X.25 would be an example of what? Name of a protocol75.what is the first step in designing the customers network? Identify what

the customer needs.76.what would you complete to identify a customers organizational objectives

that will affect your network design? Identify and document the business objectives, schedule requirements, and political issues

77.wan links are saturated when they exceed ___ percent? 7078. the failure rate of a network segment is a good indicator to measure that

the network lacks? Availability79.when designing a flast switched network you can have more IP nodes

than you could have IPX nodes on the same segment without any degradation.

80.Cisco Catalyst 5000 series switches represent the _____ layer? Core81. the catalyst 1900 series switch is best described as a lowcost, standalone

10baseT switch.82.A partial mesh is less expensive due to fewer virtual circuits.83.access lists enable you to do what? Control whether network traffic is

forwarded or blocked at a routers interface.84.security policies should be based on an understanding of which company

assets are most valuable.85.

OBJ. 1. DESCRIBE the key requirements of a scalable internetwork

Q. Choose the requirements for a scalable internetwork among the following (Choose all that apply)

a. availableb. efficientc. fastd. mesh topology

ans: A,B

Q. Choose the requirements for a scalable internetwork among the following (Choose all that apply)

a. asymmetric bacndwidthb. adaptablec. inexpensived. secure

ans: B,D

OBJ. 2. SELECT A CISCO IOS FEATURE AS A SOLUTION FOR A GIVEN INTERNETOWRK REQUIREMENT

Q. Which cisco IOS feature(s) help provide adaptibility to an internetwork ? Choose all that apply.

a. access listsb. snapshot routingc. EIGRP proprietary protocold. redistribution

ans: B,D

Q. Which cisco IOS feature(s) help provide responsiveness to an internetwork ? Choose all that apply.

a. custom queueingb. tunnelingc. load balancingd. access-lists

ans: A

OBJ. 3. DESCRIBE causes of network congestion

Q. Which of the following is NOT a cause of network congestion ?

a. distance-vector routing protocolsb. broadcast stormsc. bridging in situations where switching should be implementedd. snapshot routing

ans: D

Q. 2 examples of chatty routed protocols.

a. NETBUIb. TCP/IP

c. IPXd. Appletalk

ans: C,D

OBJ. 4. LIST solutions for controlling network congestion

Q. Potential solutions for network congestion (choose all that apply).

a. route summarizationb. incremental updatesc. snapshot routingd. distance-vector routing protocolse. autonomous switching

ans: A,B,C,E

Q. You want keep the ARP cache entries in the cache for 10 minutes instead of the default value. Which command will do that ?

a. router# arp timeout 60b. router(config)# arp timeout 60c. router(config)# arp timeout 1d. router(config)# arp keep 1e. router(config)# arp holdtime 1

ans:B

Q. How many kinds of network packet buffers are there ?

a. 2b. 3c. 4d. 5e. 6

ans: E

Q. Which of the follwoing are names of network packet buffers. Choose 3.

a. tinyb. smallc. medium

d. bige. huge

ans: B,D,E

NOTE: Names of network packet buffers: small, middle, big, very big, large, huge.

Q. What does a filter list do ?

a. filters regular user trafficb. filters traffic based on TCP portsc. controls the passing of routing protocol broadcasts and advertisementsd. controls dialup accesse. filters BPDU packets

ans: C

Q. What command would you use see info about buffers ?

a. router# buffer infob. router# bufferc. router# show bufferd. router(config)# show buffere. router(config)# buffers

ans: C

Q. Which of the following commands configures switching on cisco routers ? (Choose 3)

a. ip route-cacheb. ip switch s0 s1c. ip cache-flowd. ip cefe. ip flow-export

ans: A,D,E

Q. Which logical interface can be used by SNMP to monitor a router.

a. nullb. snmp0c. loopbackd. dialer

e. tunnel

ans: C

NOTE: loopback is equivalent of loopback (127.0.0.1) on unix

Q. You want to find out how many SNMP packets have been sent out or have been received. Which command ? (Type out the command)

ans: show snmp

Q. How does IOS allocate buffers for packets ?

a. it allocates the smallest one availableb. it allocates the smallest one the packet would fit in.c. it allocates the biggest one availabled. it allocates one of the sizes that is most freee. it allocates randomly

ans: B

Q. You do "sh buffer" and for on of the buffers you get this Large buffers, 5024 bytes (total 10, permanent 10): What does "5024 bytes" mean ?

a. size of the bufferb. number of total bytes available in "large" sizec. size of the largest packet in the "large" bufferd. size of the smallest packet in the "large" buffer

ans: A

Q. You do "sh buffer" and for on of the buffers you get this Large buffers, 5024 bytes (total 10, permanent 10):

What does "permanent 10" mean ?

a. number of permanent overhead bytes in the large bufferb. number of currently used large buffersc. number of permanent large buffers in the poold. number of currently unused large buffers in the poole. number of allowed maximum used large buffers in the pool

ans: C

NOTE: Permanent buffers are allocated at boot time and are never removed from the pool.

Q. You do "sh buffer" and you get this:

Big buffers, 1524 bytes (total 90, permanent 90):30 in free list (5 min, 300 max allowed)87900 hits, 0 misses, 0 trims, 0 created0 failures (0 no memory)

What does "5 min" mean ?

a. If number of free Big Buffers fell below 5, IOS will create more Big buffersb. Number of big buffers at boot timec. IOS can create upto 5 big buffers when there is none in the poold. The lowest number of big buffers used since the last reboote. The minimum number of processes that can occuply big buffers at any given time

ans: A

NOTE: Size of each Big buffer is 1524 bytes There were 90 Big buffers at boot time. Right now 60 (90-30) are being used IOS can create upto 300 Big buffers if need be. Big buffers have allocated 87900 times. Never was a time when a big buffer was needed, but there was none is the free list

(if that happened, more big buffers would have been created) 0 trims means that no big buffer was ever destroyed because they are no longer being used 0 buffers were created because of a miss 0 times a buffer allocation failed as a result of not having have a free buffer and not creating another buffer to accommodate the request. 0 failures resulting from not having enough memory.

Q. Which command would reset interface e0 hardware ?

a. router# reset interface e0b. router# reload interface e0c. router# clear interface e0d. router(config)# clear interface e0e. router(config)# reload interface e0

ans: C

Q. Which command would reset all interface hardware ?

a. router# reset interface allb. router# reload interfacec. router# clear interfaced. router(config)# clear interface alle. router(config)# reload interface

ans: C

OBJ. 5. CONFIGURE IP standard access lists

Q. Make an access list that blocks all ip traffic from 128.252.144.0 network and allows the rest. Choose all that apply.

a. access-list 102 deny 128.252.144.0 0.0.0.255b. access-list 2 deny 128.252.144.0 0.0.0.255c. access-list 102 permit anyd. access-list 2 permit anye. acces-list 2 deny 128.252.144.0f. acces-list 2 deny ip 128.252.144.0 0.0.0.255

ans: B,D

Q. Which statement should be at the top of the access list statements ?

a. One that matches the least hostsb. One that matches the most hostsc. One that denies most trafficd. one that permits most traffice. One that works on class C networks

ans: B

NOTE: Saves CPU cycles

Q. True/Flase: Cisco router may reorde access list statements in certain situations.

a. Trueb. False

ans: True

Q. How many access-lists can you have ?

a. 1 per portb. 1 per port per protocol

c. 1 per port per directiond. 1 per port per direction per protocole. 2 per port per direction per protocol

ans: D

OBJ. 6. LIMIT VIRTUAL TERMINAL ACCESS

Q. What kind of access-lists can be applied to virtual terminals ?

a. standard ip listsb. extended ip listsc. standard ipx listsd. extended ipx lists

ans: A,B

Q. You already made an access list(#3) for vty access. You want to apply it to vty 0 through 2 Which commands would you run ?

a. router(config)# line vty 0 1 2b. router(config)# line vty 0 to 2c. router(config)# line vty 0 2d. router(config-vty)# access-group 3 ine. router(config-vty)# access-class 3 in

ans: C,E

Q. Want to add a telnet password to your router. Which of the follwoing commands would you run ? Choose all that apply.

a. router(config)# line vty 0 4b. router(config-vty)# password c. router(config-vty)# passwdd. router(config-vty)# password XXXXXXe. router(config-vty)# login

ans: A,D,E

Q. You want to forcefully kill one of the suspended sessions ? How ? Assume that the session number of the want you want to kill is 2.

a. router# disconnectb. router# disconnect 2

c. router# kill 2d. router(config)# disconnecte. router(config)# disconnect 2

ans: B

Q. When you type (in the previleged mode) vty 0 4, what do the 0 and 4 represent ?

a. VTY 0 and 4b. VTY 0 to 3c. VTY 0 to 4d. VTY 0 or 4

ans: C

Q. You just resumed a session with a remote router. You forgot if you were in the middle of typing a command. You would like to erase the command (if any) and start over. What to do ?

a. Cntrl-Ab. Cntrl-Ec. Cntrl-Ud. Cntrl-Xe. Cntrl-Z

ans: C

Q. Which version of IP has built-in mechanism that can check whether a packet's source is really what it says it is (i.e. is it spoofing or not ?) ?

a. noneb. IPv4c. IPv6d. both IPv4 and IPv6

ans: C

Q. You do "sh sessions" and you see that you have 3 sessions open (1--> router1, 2 ---> router2, 3 --> router3). You want to get back to session 2. How ? Choose 2.

a. 2b. rejoin 2c. login 2d. enter 2e. resume 2

ans: A,E

Q. You have 3 suspended telnet sessions. You hit return. Which sessions would you get back to ?

a. the very first sessionb. the session with the longest time loginc. whichever session has "*" in the output of "sh sessions" commandd. whichever session has the lowest session number

ans: C

Q. You want to allow a remote user "johndoe" on a remote host with the IP address 128.252.144.1 to execute commands on router1 using the rsh or rcp protocol. You also want "johndoe" to be able to execute commands in the privileged EXEC mode. Which command would you run on your router. (Type in the command)

ans: ip rcmd remote-host router1 128.252.144.1 johndoe enable

Q. You just resumed a session with a remote router. You were in the middle of typing a command. It was long command and you don't want to start over. But, you can't see how much the command you had typed. What to do ?

a. Cntrl-Ab. Cntrl-Ec. Cntrl-Rd. Cntrl-Xe. Cntrl-Z

ans: C

NOTE: Press Cntrl-R to redisplay the command

Q. You were connected to a remote router. You were typing a command. You then suspended the session by typing ctrl-shift-6-x. Now resumed the session. What would happen to the command that you were typing.

a. you will start over the commandb. it would still be there , but you won't see it.c. it would still be there and you will see itd. it would still be there and you will only see the last 6 characters of the command

ans: B

Q. DMZ = ?

a. Data Manipulation Zoneb. Data Mining Zonec. Duplex Multiplier Zoned. De-militarized Zone

ans: D (The part of the network that lies outside the firewall, but inside the border router. Mostly used for www,email etc. services)

Q. What is a bastion host ?

a. a host in Fast Ethernet LANb. a host in a De-militarized Zonec. a host in FDDI ringd. a host between a DCE and a DTE

ans: B

NOTE:

The De-militarized Zone is The part of the network that lies outside the firewall, but inside the border router. Mostly used for www,email etc. services.

Q. Command to enable password encryption.

a. router# service password-encryptionb. router(config)# service password-encryptionc. router(config)# encryptd. router(config)# encrypt password

ans: B

Q. Command to turn off password-encryption

a. router# no service password-encryptionb. router(config)# no service password-encryptionc. router(config)# encrypt nulld. router(config)# no encrypt password

ans: B

Q. You ran "no service password-encryption" and yet the password is encrypted. Why ?

a. you have get out of the previleged mode and get back inb. you have to logout of the router and log back inc. you have to reboot the routerd. the passwords will remain encrypted until you enter them again.

ans: D

Q. Deafult time-out values for vty sessions ?

a. 30 secondsb. 60 secindsc. 5 minutesd. 10 minutes

ans: D

Q. You would like to change the default time-out value for vty sessions to 5 minutes and 10 seconds. How ?

a. line vty timeout 5 10b. exec-timeout 5 10 c. line vty timeout 310b. exec-timeout 310

ans: B (in aux/con/vty config mode)

Q. You want to do away with the automatic time out on vty sessions altogether. How ?

a. exec-timeout 0 0 b. line vty timeout 0c. no line vty timeoutd. exec-timeout 0

ans: A (in aux/con/vty config mode)

Q. You do "sh user" and you see that someone is logged in via a vty session who shouldn't be logged in. You want to log him off. How do you do that ?

a. issue the command : clear vty 1b. issue the command : disconnect line remotec. find out the vty number of the session and issue the command "clear line #"d. issue the command : disconnect vty remote

ans: C

Q. You suspended 3 telnet sessions. You forgot in what order you went in. How do you find out ?

a. show telnetsb. show vtyc. show usersd. show sessionse. show sessions order

ans: D

Q. Easiest way to find out the status of the line devices ?

a. show telnetsb. show vtyc. show usersd. show sessionse. show line

ans: E

Q. How do you know which line devices are in use ?

a. run "show vty" and look for "u" at the beginning of each lineb. run "show vty" and look for "-" at the beginning of each linec. run "show line" and look for "-" at the beginning of each lined. run "show line" and look for "*" at the beginning of each linee. run "show users" and look for "*" at the beginning of each line

ans: D

Q. How do you find out how many times a line device has been used ?

a. run "show vty" and look in "permit" columnb. run "show line" and look in "permit" columnc. run "show line" and look in "uses" columnd. run "show users" and look in "uses" columne. run "show users" and look in "permit" column

ans: C

Q. Which command would you run to find out about line 2 device ?

a. show line 2b. show users line 2c. show vty 1

d. show vty 2e. show vty 2 detail

ans: A

Q. You are afraid of "denial-of-service" attacks. Hence, you want to disable ip directed broadcast. How and in which mode ?

a. router(config)# no ip directed-broadcast [access-list#]b. router(config-if)# no ip directed-broadcast [access-list#]c. router(config)# no ip broadcast [access-list#]d. router(config-if)# no ip broadcast [access-list#]

ans: B

OBJ. 7. CONFIGURE IP EXTENDED ACCESS LISTS

Q. Construct an access-list statement that denies packets from 128.252.0.0/16 network destined for 128.252.144.0/24 .

a. access-list 101 deny ip 128.252.0.0 0.0.255.255 128.252.144.0 0.0.0.255b. access-list 10 deny ip 128.252.0.0 0.0.255.255 128.252.144.0 0.0.0.255c. access-list 101 deny 128.252.0.0 0.0.255.255 128.252.144.0 0.0.0.255d. access-list 101 deny ip 128.252.0.0 0.0.255.255 128.252.144.0 0.255.255.255

ans: A

Q. Construct an access-list statement that permits any http traffic from 128.0.0.0/8.

(Type the list. Not multiple choice)

ans: access-list 101 permit tcp 128.0.0.0 0.255.255.255 any eq 80

Q. Construct an access-list statement that denies UDP packets from any host to destination 128.252.0.0/16 that maps to SNMP port.

a. access-list 10 permit udp any 128.252.0.0 0.0.255.255 eq 161b. access-list 101 permit udp any 128.252.0.0 0.0.255.255 eq 69c. access-list 101 permit udp any host 128.252.0.0 0.0.255.255 eq 161d. access-list 10 permit udp any host 128.252.0.0 0.0.255.255 eq 161e. access-list 101 permit udp any 128.252.0.0 0.0.255.255 eq 161

ans: E

Q. Construct an access-list statement that denies ICMP Echo Reply (ICMP type-code 0) packets from host 128.252.144.84 to any network.

(Type the statement; NOT a multiple choice question)

ans: access-list 101 deny icmp host 128.252.144.84 any 0

OBJ. 8. VERIFY ACCES LIST OPERATION

Q. Commmand to enable accounting for IP access-lists violations and display the accounting data

a. ip accountingb. debug ip packetsc. ip accounting access-violationsd. show ip accounting

ans: C

Q. Command to see access lists applied to vertual terminals

a. show access-listsb. show linec. show intd. show protocol ipe. debug access-lists

ans:B

Q. Command to display the ip traffic that matches access list 5.

a. show ip trafficb. show protocol ipc. debug ip traffic 5d. debug ip packet 5e. debug access-list 5

ans: D

Q. Command To see what access lists are defined.

a. show protocolb. show access-listsc. show access-lists definedd. debug acces-listse. access-lists

ans: B

Q. Command to see which access-lists have been applied to which interfaces.

a. show interfaceb. show interface accessc. show access-listsd. show access

ans: A

OBJ. 9. CONFIGURE AN ALTERNATIVE TO USING ACCESS LISTS

Q. What is the null interface ?

a. a term that represents "all physical interfaces"b. a term that represents "any logical interface"c. a logical interface where packets are dropped without any processingd. a dialer interface, not assigned to any physical interfacee. any interface that is "down"

ans: C

NOTE: Equivalent to /dev/null in unix. Packet that do not go anywhere can be dropped in the null interface

Q. How do you create a null logical interface ?

a. It is automatically created.b. By referencing itc. using the command "no shutdown interface null"d. using the command "enable null"

ans: A

Q. How do you drop packets without wasting any CPU cycles ?

a. direct them to line devices

b. direct them to the null interfacec. direct them to any dialer interfaced. direct them to any tunnel interfacee. direct them to any backup interface

ans: B

OBJ. 10. CONFIGURE AN IP HELPER ADDRESS TO MANAGE BROADCASTS

Q. Give an example where the use of a ip helper address would be useful :

a. when RIP is reaching its 16 HOP limitb. when the WINS server is on a different network than its client PCsc. when an appletalk server is overwhelmed with requestsd. when a secondary DNS server is on a different network than the clients and the primary DNS server is on the same network as the clinets

ans: B

Q. What is an IP helper address ?

a. a host that will stop all broadcastsb. a host that will forward all broadcast on a network to a server on a different networkc. a host that will forward all broadcast on a network to a host in the same networkd. a host that will forward all multicast packets on a network to another networke. a host that will forward all multicast packets on a network to a server on a different network.

ans: B

NOTE: This includes UDP packets

Q. You want your router (128.252.144.254) to propagate broadcast in the 128.252.144.0 network to a server 128.252.120.1. Which comamnd ?

a. router# ip helper-address 128.252.120.1b. router(config)# ip helper-address 128.252.120.1c. router(config)# helper-address 128.252.120.1d. router(config)# helper-address ip 128.252.120.1e. router(config)# ip helper-address 128.252.120.1 0.255.255.255

ans: B

Q. You want your router to propagate all broadcasts through interface e0. Which comamnd (if possible at all) would do that ?

a. not possibleb. router#ip helper-address e0c. router(config)# ip helper-address e0d. router(config)# helper-address e0e. router(config)# helper-address int e0

ans: C

Q. When you define ip-helper address, which of the following protocols are forwarded ? Choose 3.

a. BOOTPb. DNSc. RIPd. GNSe. TACAS

ans: A,B,E

Q. You have configured a helper-address on your router. However, you want your router to pass broadcasts of protocols other than the default ones. Which command ? (Type in the command. Not a multiple-choice question)

ans: ip forward-protocol

OBJ. 11. CONFIGURE IPX/SPX TRAFFIC MANAGEMENT ISSUES

Q. Default SAP update interval = ?

a. 30 secb. 60 secc. 90 secondsd. 120 secondse. 300 seconds

ans: B

Q. If you have multiple IPX encapsulations on your LAN, what has to be true of the follwoing for the network to work smoothly ?

a. IPX hosts per subnet must not be over 253b. Number of IPX hosts with the same type of encapsulations must not exceed 253c. IPX hosts with the same encapsulations have to have the same network numberd. You have to configure each host to run both encapsulationse. Hosts with different encapsulations have to segmented with a switch

ans: C

Q. You are adding a static SAP entry. In the field for "socket", you want to enter "all". What value would you use ?

a. -1b. 0c. 1d. 9e. 99

ans: B

Q. You want your router to respond to SAP requests with each server name evenly. Which command ? (Type the statement; NOT a multiple choice question)

ans: ipx gns-round-robin

Q. You want to see the internal IPX network numbers of the Netware servers in your network. Which comamnd would you type on your router ?

a. show ipx servers address b. show arpc. show netwared. show netware addresse. show ipx servers

ans: E

Q. The node address of Novell servers is always ________________ ?

a. 0000.0000.0000b. 0000.0000.0001c. 0000.0000.1000d. 0000.1000.0000e. 1000.0000.0000

ans: B

Q. Cisco routers' default encapsulation for IPX = ?

a. arpab. novell-etherc. sapd. snap

ans: B

Q. How many IPX encapsulations can you have in a LAN ?

a. upto 2b. upto 4c. upto 7d. upto 15e. upto 31

ans: B

Q. What is necessary for a router to run NLSP ?

a. nothingb. it has to have at least 2 interfaces with IPX runningc. it has to have at least 1 token ring interfaced. it has to configured with an "internal" network numbere. it has to have a ip helper address configured

ans: D

Q. SAP advertises what ?

a. filesb. printersc. directory infod. browse masterse. services

ans: E

Q. NLSP works on which layer ?

a. data linkb. network

c. transportd. session

ans: B

Q. NLSP = ?

a. Netware Link Services Protocolb. Netware Layer Service Protocolc. Novell Link Services Protocold. Novell Layer Service Protocol

ans: C

NOTE: Developed to overcome IPX RIP and SAP shortcomings

Q. What would be the IPX node address of serial interface on a cisco router ?

a. The MAC address of the highest numbered LAN interface + 1 (HEX)b. The MAC address of the highest numbered LAN interfacec. The MAC address of the highest numbered active LAN interfaced. The MAC address of the lowest numbered LAN interfacee. The MAC address of the lowest numbered active LAN interface

ans: E

Q. How many services can each SAP pakcet advertise ?

a. 1b. 2c. 4d. 7e. 8

ans: D

NOTE: each service needs 66 bytes and each SAP packet is 576 byte long

Q. When can a workstation issue a SAP broadcast ?

a. only when it is issuing a GNS request.b. only when it is responding to a GNS request.c. When it is issuing a GNS OR responding to one.d. at boot time and when it is responding to a GNS request.e. when it has at least 2 interfaces running IPX

ans: A

Q. Which command shows the routing table for IPX ?

a. show ipx routeb. show route ipxc. show routingd. show routing ipxe. show arp

ans: A

OBJ. 12. FILTER IPX TRAFFIC USING IPX ACCESS LISTS

Q. What would be rough equivalent of TCP ports in IPX/SPX ?

a. IPX service numbersb. IPX node numbersc. IPX protocol numbersd. IPX hostid'se. IPX sequence numbers

ans: C

Q. What do the following IPX port numbers represent ?

-1, 1, 4

a. Any, RIP, NCPb. Netbios, RIP, SAPc. SPX, Netbios, Anyd. NCP, Netbios, SPXe. Any, RIP SAP

ans: E Q. What port number would use for SPX, NCP and Netbios in an IPX access lists.

a. 5, 17, 21b. 5, 17, 20c. 2, 9, 19d. 5, 12, 13e. 2, 9, 13

ans: B

Q. When desiging an IPX access list, how do you specify "any" protocol ?

a. -1b. 0c. 9d. 99e. 255

ans: A

Q. You are making an extended IPX access list. How would you insert in the field for "Port Number" if you want packets to be examined for IPX sockets ?

a. -1b. 0c. 9d. 99e. 255

ans: B

NOTE: 0 stands for undefined

Q. Which of the follwoing has a log option ?

a. standard ipx access-listb. extended ipx access-listc. both standard and extended ipx access-listsd. neither of standard and extended ipx access-lists

ans: B

Q. What do these IPX socket numbers represent ?

0 2 451

a. all, NCP, cpingb. netbios, NCP, SPXc. SPX, netbios, alld. all, cping, NCPe. cping, netbios, all

ans: D

NOTE: cping stands for Cisco IPX ping

Q. What numbers represent the following IPX sockets ?

SAP, EIGRP, NLSP

452 - SAP858E - Enhanced IGRP9001 - NLSP

Q. Construct an access-list statement that denies any traffic from network 100 to network 200. (Type the statement; NOT a multiple choice question)

ans: access-list 800 deny 100 200

Q. Construct an access-list statement that denies any traffic from network 100 to any network. (Type the statement; NOT a multiple choice question)

ans: access-list 800 deny 100

Q. You are making an IPX standard access list. How would you represent "any host" ?

a. -1b. 0c. 1d. 9e. 255

ans: A

Q. You are making an extended IPX access list. True or False: You can use keywords instead of numbers in the field for "Protocol Type" .

a. Trueb. False

ans: True

NOTE: Example: SPX instead of 5

Q. Construct an Extended IPX access list that denies traffic that matches the following criteria:

protocol_type: SPX source network: 100 source socket: 17 destination network: 200 destination socket: 17 (Type the statement; NOT a multiple choice question)

ans: access-list 900 deny spx 100 17 200 17OR

access-list 900 deny 5 100 17 200 17

Q. You are making an extended IPX access list. What keyword would you use to indicate that you care nothing about the source network or the destination network ?

a. eachb. everyc. alld. anye. zero

ans: C

Q. You are making an extended IPX access list. What keyword would you use to indicate that you care nothing about the sockets (source or destination) ?

a. eachb. everyc. alld. anye. zero

ans: C

Q. You have an access-list numbered 905. You want to undefine that list. What command ?

a. no shutdown access-list 905b. no access-list 905c. clear access-list 905d. undefine access-list 905

ans: B

Q. You have an access-list numbered 905. You no longer have any interfaces that use that list. But you think that you may use it later. Can you keep the list and not use it ?

a. Yesb. No

ans: A

Q. When you are applying a SAP filter to an interface, you want the router to filter only certain advertisements from a certain router. Which command ? The access list number is 1000.

a. router# ipx router-sap-filter 1000b. router(config)# ipx router-sap-filter 1000c. router(config-if)# ipx router-sap-filter 1000d. router(config-if)# ipx access-group 1000e. router(config)# ipx access-group 1000

ans: C

Q. You have made a extended IPX list. You want to see what statements make up the list. What commmand would you type. The list number is 905.

a. show access-list 905b. show ipx access-list 905c. show interface 905d. show 905 access-liste. show ipx list 905

ans: B

Q. Make a list that denies all SAP advertisements from server 1.0000.0000.2345, but allows everything else. Choose how many ever statements are required.

a. access-list 1000 deny 1.0000.0000.2345b. access-list 900 deny 1.0000.0000.2345c. access-list 1000 deny any 1.0000.0000.2345d. access-list permit -1e. access-list permit all

ans: A,D

Q. You already made a list (#1000) that is meant to control how the router responds to client GNS requests. How do you apply that to an interface ?

a. router1(config)# ipx output-gns-filter 1000b. router1(config)# ipx input-gns-filter 1000c. router1(config-if)# ipx output-gns-filter 1000d. router1(config-if)# ipx access-group 1000e. router1(config-if)# ipx input-gns-filter 1000

ans: router1(config-if)# C

Q. Can you specify a mask that covers a range of IPX networks in a standard or extended IPX access lists ?

a. Nietherb. In standard IPX access list onlyc. In extended IPX access list onlyd. In both standard and extended IPX access lists

Ans: C

NOTE. The mask in standard IPX access list covers only the node portion

Q. If a sap filter denying a particular service is invoked, do you need to configure a GNS filter as well?

a. Yesb. No

Ans: B

Q. What range of access-list numbers would you use for SAP filters and for GNS filters ?

a. 900-999 for bothb. 900-999 and 1000-1099 respectivelyc. 1000-1099 and 900-999 respectivelyd. 1000-1099 for bothe. 1000-1099 and 1100-1199 respectively

ans: D

OBJ. 13. MANAGE IPX/SPX TRAFFIC OVER WAN CONNECTION

Q. What is IPXWAN ?

a. A protocol that runs on serial interfaces that connect 2 routersb. A protocol that runs on atm interfaces that connect 2 routersc. A protocol that runs DCE interfaces that connect 2 routersd. A protocol that runs on serial interfaces that connect more than 2 routerse. A protocol that runs on FDDI interfaces that connect 2 routers

ans: A

NOTE: IPXWAN = Internetwork Packet Exchange for wide-area networks A protocol runs on serial interfaces that connect 2 routers. Helps to find out about link delay, throughput, routing protocol, and link cost. The First 2 sets information can be used by routing protocols.

Q. If you are running IPXWAN on your router, what is used as the identifier of your router ?

a. routers' hostnameb. lowest of router's interface IPsd. highest of router's interface IPX numbersd. lowest of router's interface IPX numberse. router's "internal" network number

ans: E

Q. What is a tunnel interface used for ?

a. to store dialer profilesb. To forward traffic of a protocol to a network that does not support that protocolc. to drop packest without wasting CPU cyclesd. to support VLANse. to multiple ISDN B channels

ans: B

Q. 2 ways to pass ipx traffic over a WAN interface

a. ipxwan b. use VLANsc. use frame-relay LMIsd. tunnel over IPe. use same model of highend cisco routers

ans: A,D

Q. How do you set the internal network number of a router ?

a. It is automatically setb. It is dynamically setc. router(config)# ipx internal-network-number numberd. router(config-if)# ipx internal-network-number numbere. router(config)# ipx network-number number

ans: C

Q. What is the internal network number of a shared WAN link ?

a. same as the internal network number of the slave routerb. same as the internal network number of the master routerc. lower of the internal network numbers of the 2 routersc. higher of the internal network numbers of the 2 routerse. 0

ans: B

Q. How do you set the interval at which an interface will advertise its sap table over a WAN link to 5 minutes ?

a. router(config-if)# ipx sap-interval 5 b. router(config-if)# ipx sap-interval 300c. router(config)# ipx sap-interval 300d. router(config)# ipx sap-interval 5e. router(config-if)# ipx sapint 5

ans: A

Q. You want to tunnel ipx over ip. Which interface do you use ?

a. dialer 0b. nullc. tunnel 0d. ipxwan 0e. serail 0

ans: C

OBJ. 14. VERIFY IPX/SPX FILTER OPERATION

Q. You want to see what ipx access-lists have ben defined on your router. Which comamnd ? (Type the statement; NOT a multiple choice question)

ans: show ipx access-lists

Q. You want to see which ipx access-lists have been applied to interface e0. Which command ?

a. show ipx access-listsb. show ipx access-lists appliedc. show ipx access-lists e0d. shoe ipx interface e0e. show access-lists ipx e0

ans: D

OBJ. 15. DESCRIBE THE NEED FOR QUEUEING IN A LARGE NETWORK

Q. You want to find out what queueing strategy is in use for serial0. which command ?

a. sh queue serial1b. sh queueing serial1c. sh int serial1 d. sh line serial1

ans: C

NOTE: (look for the line starting with "queueing startegy")

Q. How many custom queues can you define ?

a. 4b. 8c. 12d. 16e. 32

ans: D

Q. You have a ISDN BRI line to your ISP. What kind of queueing would be good for you ?

a. weighted-fair queue

b. priority queuec. custom queued. none

ans: D.

NOTE: (You should not use queues on line with bandwidth less than that of T1 line)

Q. Which queueing is best suited for low-bandwidth links.

a. weighted-fair queueb. priority queuec. custom queued. none

ans: B

OBJ. 16. DESCRIBE WEIGHTED FAIR QUEUEING OPERATION

Q. Which queueing is enabled by default on links 2Mbps or less ?

a. weighted-fair queueb. priority queuec. custom queued. none

ans: A

Q. What kind of traffic gets priority in weighted fair queueing ? (choose 2)

a. low volume conversation trafficb. high volume conversation trafficc. interactive trafficd. http traffice. file transfer traffic

ans: A,C

OBJ. 17. CONFIGURE PRIORITY QUEUEING

Q. You have already defined a priority-list (1). How do you apply it to interface serial0 ?

d. router(config)# priority-group 1 s0e. router(config)# priority-group s0 1 c. router(config-if)# priority-group 1d. router(config-if)# access-group 1e. router(config-if)# access-group 1 [in/out]

ans: C

Q. You want to make a priority queue list (1) that puts any ipx tarffic to "high" priority. Which statement would define such traffic and priority.

a. access-list 1 protocol ipx highb. access-list 1 protocol ipx 1c. priority-list 1 protocol ipx highd. priority-list 1 ipx highe. priority-list 1 ipx 1

ans: C

Q. How do you tell your router any traffic that does not match any of the definitions in priority list 1 is of "normal" priority ? (Type the statement; NOT a multiple choice question)

ans: priority-list 1 default normal

OBJ. 18. CONFIGURE CUSTOM QUEUEING

Q. You have already defined custom queue list 1. How do you apply it to int s0 ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)# custom-queue-list 1

Q. You have configured custom queuing for your router. You have not configured byte-counts. You are getting hit constantly by traffic that matches queue 1. When will the traffic that matches queue 2 be processed ? a. after a default of 30 sec b. after a default of 60 sec c. when the "huge" buffers fill up d. never

ans: D

Note: Without byte-counts set, custom queueing becomes nearly the same as priority queueing.

OBJ. 19. LIST the key information routers need to route data

Q. If you are using CIDR what info would router need to route data (besides the IP address) ?

a. the route pathb. bandwidthc. AS numberd. network length suffix

ans: D

Q. Why can't some routing protocols deal with VLSM ?

a. VLSM was not around at the time of the protocol's inceptionb. VLSM was not to be supportedc. VLSM gets very complicated when it comes to ISP-based internetd. VLSM forces a larger routing table

ans: A

Q. Which of the following protocols can not deal with VLSM ? Choose all that apply

a. RIPb. IGRPc. EIGRPd. OSPFe. BGPf. RIP2

ans:A,B

Q. Which protocols do not carry mask info with IP address ? Choose all that apply

a. RIPb. IGRPc. EIGRPd. OSPF

e. BGPf. RIP2

ans: A,B

Q. Discontiguous addressing = ?

a. 2 subnets belonging to different classful networks separated by a a third network addressb. 2 subnets belonging to different classful networks separated by a netowrk that belongs to one of two classfull networksc. 2 subnets belonging to the same classful networks separated by a different netowrk addressd. 2 subnets belonging to the same classful networks separated by a netowrk address that belongs to the same classful network

ans: C

OBJ. 20. COMPARE distance vector and link-state protocol operation

Q. Which of the follwoing are true ?

a. Distance-Vector routing protocol advertises the full tableb. Distance-Vector routing protocol advertises to neighbors onlyc. Link-State routing protocols advertises updates onlyd. Link-State routing protocols advertises to the whole area

ans: A,C

Q. How do you solve the bandwidth and resource usage problem with Link-State Routing Protocols. Choose 2.

a. use broadcast for routing updateb. dampen periodic updatesc. use targeted multicast and do not flood updatesd. increase frequency of routing updates

ans: B,C

Q. Which of the following are true ?

a. Distance-Vector routing protocols are prone to routing loopsb. Distance-Vector routing protocols are prone to having inconsistent views of network

c. Link-State routing protocols are prone to routing loopsd. Link-State routing protocols are prone to having inconsistent view of network

ans: A,B

Q. Which of the following is true ?

a. Distanace-Vector routing protocols use more computing power than Link-State routing protocolsb. Distanace-Vector routing protocols use about same computing power than Link-State routing protocolsc. Distanace-Vector routing protocols use less computing power than Link-State routing protocolsd. How much computing power Distance-Vector and Link-State routing protocols use depend on the bandwidth of the interfaces

ans: C

OBJ. 21. GIVEN AN IP ADDRESS, USE VLSMs TO EXTEND THE USE OF THE IP ADDRESS

NOTE: This objective basically points to subnetting questions. Please refer to CCNA question set for subnetting formulas and subnetting questions.

Q. You are using classful protocols like RIP and IGRP. When (if at all) would you use "ip classless" command ?

a. neverb. only if you are connected to the internetc. if you have contiguous subnetsd. if you have discontiguous subnets

ans: D

OBJ. 22. GIVEN A NETWORK PLAN THAT INCLUDES IP ADDRESSING, EXPLAIN IF

ROUTE SUMMARIZATION IS OR IS NOT POSSIBLE.

Q. 2 protocols that can not do route summarization.

a. RIP

b. IGRPc. EIGRPd. OSPFe. BGPf. RIP2

ans: A,B

Q. Given the follwoing networks, is route summarization possible ? If so, what is the summarized network ?

128.252.224.0/20 128.252.240.0/20

a. Yes ; 128.252.128.0/17b. Yes ; 128.252.160.0/18c. Yes ; 128.252.160.0/19d. Yes ; 128.252.192.0/18e. No

ans: D

Explanation: Step 1: Write Out in binary :

( | represents the netowrk/host bounday)

1000 0000. 1111 1100. 1101 | 0000. 0000 0000 1000 0000. 1111 1100. 1110 | 0000. 0000 0000 1000 0000. 1111 1100. 1111 | 0000. 0000 0000

If the higher bits are the same, the network addresses are contigous and route summarization is possible. In this case, they are (1000 0000. 1111 1100. 11)

Step 2: Take the network parts and find the part that's common in all (1000 0000. 1111 1100. 11). This yields the network address (128.252.192.0). Prefix is just the number of bits (= 18)

Q. Command to turn off route summarization in EIGRP (Type the statement; NOT a multiple choice question)

ans: no auto-summary

Q. 3 conditions for route summarization :

a. ip addresses must be contiguousb. ip addresses must be discontiguousc. routing tables must support classless routingd. routing protocol must be BGPe. routing protocols must be able to handle prefix length and subnet info with the ip address

ans: A,C,E

Note: In order for networks to be contiguous, higher bits have to be the same.

Q. Is route summarization possible in the following scenario ?

128.252.144.128/27128.252.144.160/27128.252.144.224/27

a. Yes ; 128.252.144.128/24b. Yes ; 128.252.144.128/25c. Yes ; 128.252.144.192/19d. Yes ; 128.252.144.192/18e. No

ans: B

Explanation:

Step 1. Write out in binary:

1000 0000. 1111 1100. 1001 0000. 100|0 0000 1000 0000. 1111 1100. 1001 0000. 101|0 0000 1000 0000. 1111 1100. 1001 0000. 111|0 0000

If the higher bits are the same, the network addresses are contigous and route summarization is possible. In this case, they are (1000 0000. 1111 1100. 1001 0000. 1)

Step 2.

Take the network parts and find the part that's common in all (1000 0000. 1111 1100. 1001 0000.1). This yields the network address (128.252.144.128). Prefix is just the number of bits (= 25)

OBJ. 23. DEFINE private addressing and determine when it can be used

Q. What IP network addresses are set aside for class A ?

a. 1.0.0.0 (mask 255.0.0.0)b. 10.0.0.0 (mask 255.0.0.0)c. 10.0.0.0 (mask 255.255.0.0)d. 100.0.0.0 (mask 255.0.0.0)e. 100.0.0.0 (mask 255.255.0.0)

ans: B

Q. You have been using private addressing for your enterprise network. Now you want to connect to internet. How can you translate between your private addresses and your addresses provided by your ISP ?

Choose all that apply.

a. Proxy serverb. Dialer Profilesc. NATd. Tunnel Interfacee. EasyIP feature

ans: Proxy server, NAT

Q. What IP network addresses are set aside for class B ?

a. 128.0.0.0 (mask 255.255.0.0)b. 128.252.0.0 (mask 255.255.0.0)c. 172.16.0.0 (mask 255.240.0.0)d. 172.16.0.0 (mask 255.255.0.0)e. 172.240.0.0 (mask 255.255.0.0)

ans: C

Q. What IP network addresses are set aside for class C ?

a. 172.16.0.0 (mask 255.240.0.0)b. 172.16.0.0 (mask 255.255.0.0)c. 196.168.0.0 (mask 255.255.0.0)d. 198.168.0.0 (mask 255.255.0.0)e. 198.168.0.0 (mask 255.255.255.0)

ans: D

OBJ. 24. DEFINE NETWORK ADDRESS TRANSLATION AND DETERMINE WHEN IT CAN BE USED

Q. T/F: NAT is a Cisco Proprietary Software.

a. Trueb. False

ans: A

Q. What version of cisco IOS has NAT ?

a. 10.0b. 10.5c. 11.0d. 11.2e. 11.8

ans: D

Q. Command to define a pool named "outwego" as the address 128.252.144.39 to 128.252.144.53 (mask 255.255.255.0) :

a. router(config)#ip nat pool outwego 128.252.144.39 128.252.144.53 netmask 255.255.255.0b. router(config)#ip nat outwego 128.252.144.39 128.252.144.53 netmask 255.255.255.0c. router(config)#ip nat pool outwego 128.252.144.39 128.252.144.53 255.255.255.0d. router(config)#nat outwego 128.252.144.39 128.252.144.53 netmask 255.255.255.0

ans: A

Q. Command to specify the current interface as the "outside" interface: (Type the statement; NOT a multiple choice question)

ans: router(config-if)#ip nat outside

Q. How many interfaces can be configured as the "outside" interface (NAT) ?

a. 1b. 2c. 3d. 4

e. 5

ans: A

OBJ. 25. EXPLAIN why OSPF is better than RIP in a large internetwork

Q. Which of the following reasons explain why OSPF is better than RIP in a large internetwork ? (Choose 3)

a. OSPF is more scalable than RIPb. OSPF uses less CPU power than RIP doesc. OSPF is easier to configure than RIPd. OSPF produces faster convergence than RIPe. OSPF handles larger networks than RIP can

ans: A,D,E

Q. Which of the following reasons explain why OSPF is better than RIP in a large internetwork ? (Choose 3)

a. OSPF uses less memory power than RIPb. OSPF produces less network traffic and traffic is multicastc. OSPF provides VLSM supportd. OSPF is not a proprietary protocole. OSPF provides better path determination

ans: B,C,E

OBJ. 26. EXPLAIN HOW OSPF DISCOVERS, CHOOSES, AND MAINTAINS ROUTES

Q. States OSPF routers can be in ? (Choose 5)

a. downb. administratively downc. initd. twowaye. threewayf. exstartg. exchange

ans: A,C,D,F,G

Q. What priority value dictates that the router can not be DR/BDR ?

a. -1b. 0c. 1d. 99e. 255

ans: B

Q. ABR = ?

a. Area Border Routerb. Area Backbone Routerc. Area Backup Routerd. Admin Backbone Routere. Admin Backup Routerf. Admin Border Router

ans: A

Q. Master/Slave relationship is created at which state ?

a. downb. initc. twowayd. exstarte. exchange

ans: D

Q. Exchange of DDPs happen in which state ?

a. downb. initc. twowayd. exstarte. exchange

ans: E

NOTE: DDP = (Database Description packets)

Q. Which is the corret order ?

a. LSR --> LSU ---> LSAckb. LSU --> LSR ---> LSAckc. LSU --> LSAck ---> LSR

d. LSR --> LSAck ---> LSUe. LSAck --> LSR ---> LSU

ans: A

Q. How long will a router wait before doing SPF calculation after a link state change ?

a. 30 secb. 60 secc. determined by SPF holdtimed. determined by OSPF recalc parametere. determined by the cost of the link that has changed

ans: C

OBJ. 27. CONFIGURE OSPF FOR PROPER OPERATION

Q. Comamnd to specify a router ID ?

a. ip ospf router id numberb. ip ospf router numberc. ip ospf routerid numberd. ospf router id numbere. int loopback number

ans: E

Q. Which modifier do you use when you are redistributing from other routing protocols to OSPF ?

a. router idb. bandwidthc. subnetsd. coste. reliabilityf. load

ans: C

Q. Command to change a router priority to 5

a. priority 5b. ospf priority 5 c. ip ospf priority 5

d. ip ospf router priority 5 ans: C

Q. In OSPF, What is the default "cost" ?

a. 10b. 56c. 100d. 10^6/bandwidthe. 10^8/bandwidth

ans: E

Q. If I have an OSPF network with only one area, what must be the area number ?

a. -1b. 0c. 1d. 16e. It can be anything

ans: B

OBJ. 28. VERIFY OSPF OPERATION (SINGLE-AREA)

Q. You are configuring OSPF and the ip address which is being used as the router id is deleted. What must be done ? Choose 2.

a. Router must be reloaded orb. Force a SPF calculation orc. OSPF deconfigured and reconfigured ord. all interfaces must be reset ore. a multicst route update must be sent out

ans: A,C

Q. Which command will display ospf information including router id ?

a. show ospf routerb. show ip ospf localc. show ip ospfd. show ip ospf neighbor

e. show ip ospf detail

ans: C

Q. Command to see the neighbor table (OSPF) ? (Type the statement; NOT a multiple choice question)

ans: show ip ospf neighbor

Q. You suspect that somehow OSPF routes are not in your's IP routing table. What command would run to see if OSPF routers are in your IP routing table.

a. show routingb. show ospf routec. show ip ospf routed. show ip routee. show route ospf

ans: D

NOTE: Look for the CODE O in the front of the route.

Q. You want to find out the router id, priority and area of neighbor 128.252.144.254 . Which comamnd ?

a. show ospf neighbor 128.252.144.254 b. ip ospf neighbor 128.252.144.254c. show neighbor 128.252.144.254d. sh ip ospf neighbor 128.252.144.254 ans: D

Q. You want to find out which OSPF process and OSPF area e0 belongs to. Which command ?

a. show ospf interface e0b. show interface e0 ospfc. show ip ospf e0d. show ip ospf interface e0e. show ip ospf process

ans: D

Q. You want to watch as your router's interfaces go through different OSPF states with its neighbours, exchange messages, elect DR/BDR.

Which command ?

a. show ip ospf b. show ospf detailc. show ip ospf detaild. debug ip ospf adje. debug ospf ip

ans: D

Q. You want to know which interfaces are talking OSPF. Which command would you run ?

a. show ip ospf interfaceb. show ospf interfacesc. show ip ospf processd. show ip ospf areae. show ip ospf interfaces

ans: E

OBJ. 29. DESCRIBE THE ISSUES WITH INTERCONNECTION MULTIPLE AREAS AND

HOW OSPF ADDRESSES EACH

Q. When (if at all) can OSPF be configured to allow arbitrary connection between areas ?

a. not allowedb. at least one area has a non-zero id c. both areas have a non-zero idsd. if the areas are contiguouse. if the areas are discontiguous

ans: A

Q. A link in area 2 goes down. Who has to recalculate shortest paths to all destinations.

a. ABRs in area 2b. ABRs in area 0 and 2c. Each router in area 0d. Each router in area 2e. Each router in all areas

ans: D

Q. Each interface can belong to at most _______ area(s).

a. 1b. 2c. 3d. 4e. 5

ans: A

Q. T/False: each area must connect to area 0 directly.

a. Trueb. False

ans: A

OBJ. 30. EXPLAIN THE DIFFERENCES BETWEENTHE POSSIBLE TYPES OF AREAs,

ROUTERs, AND LSAs

Q. OSPF: What is a characteristic of all internal routers ?

a. same routing tablesb. same neighbor databasec. identical link-state databased. routing update timing synchronized

ans: C

Q. What is the difference between stub area and totally stub area ?

a. Stub area knows about routes in its own area and routes in areas connected via backbone & ABRs

Totally stub area knows about routes in its own area onlyb. Stub area knows about routes in its own area only Totally stub area knows about routes in its own area

and routes in areas connected via backbone & ABRsc. Stub area knows about only its default route Totally stub area knows about routes in its own aread. Stub area knows about routes in its own area Totally stub area knows about it default route only

ans: A

Q. Who issues type 5 LSAs (OSPF) ?

a. ABRb. ASBRc. routers in stub aread. routers in totally stub areae. routers that niether ABR nor ASBR

ans: B

Note: Type 5 LSAs contain Autonomous System Entries which tells about external routes.

Q. In a stub area type ____ LSAs are not flooded.

a. 1b. 2c. 3d. 4e. 5

ans: E

NOTE: (AS external LSAa)

OBJ. 31. CONFIGURE A MULTI AREA OSPF NETWORK

Q. You sun 'sh ip route". You see a letter/digit/character combination code at the beginning of each route . What do they mean ?

E1 and IA

a. OSPF external type 1 and OSPF inter-area respectivelyb. OSPF NSSA external type 1 and OSPF intra-area respectivelyc. OSPF external type 1 and OSPF intra-area respectivelyd. OSPF NSSA external type 1 and OSPF inter-area respectively

ans: A

Q. ASBR must reside in a __________ OSPF area.

a. stub

b. area 0c. area 1d. totally stube. non-stub

ans: E

Q. ASBR must run at least __________ ? (Choose all that apply)

a. RIPb. IGRPc. EIGRPd. OSPFe. at least 1 another routing protocol (RIP, IGRP, EIGRP etc.)

ans: D,E

Q. In OSPF, all areas have to be connected to backbone area. If you can't do that, how can you get around it ?

a. use a tunnelb. use a ppp linkc. use a loopback interfaced. use a virtual-link

ans: D

NOTE: (through a transit area)

Q. Transit areas can not be _____ area ?

a. a backboneb. a stubc. a totally stubd. a partitionede. 0

ans: B

Q. What is the difference between area 0 and backbone area ?

a. noneb. backbone area includes stub areasc. backbone area includes ABR d. backbone area includes ASBRe. backbone area can include totally-stub areas in it

ans: A

Q. When can non-backbone areas exchange packets directly ?

a. when they have router ids 1 or 2b. when one of them is a stub areac. when one of them is a totally-stub aread. when both of them are stub arease. never

ans: E

Q. An area in which a link failure causes one part of the area to become isolated from another is called ____ area.

a. backboneb. transitc. partitionedd. stube. totally-stub

ans: C

Q. You want to find out which areas your router knows about and each of area's number of routers, number of networks. Which command ?

a. sh ospf database database-summaryb. sh ip ospf database summaryc. sh ip ospf database database-summaryd. sh ip ospf database-summarye. sh ip ospf neighbor

ans: C

Q. Network Summary LSAs are originated by ______ ?

a. internal routersb. designated routersc. backup designated routersd. area border routerse. router in stub areas

ans: D

Q. Command to list all of the router LSAs in a database. Which command ?

a. show ip ospf database routerb. show ospf database routerc. show ip ospf databased. show ip ospf database lsae. show ip ospf database router local

ans: A

Q. Command to observe a network LSA :

a. show ospf database networkb. show ip ospf networkc. show ip ospf databased. show ip ospf database networke. show ip ospf database network lsa

ans: D

Q. Command to list router 128.252.144.254's LSA: (Type the statement; NOT a multiple choice question)

ans: show ip ospf database router 128.252.144.254

Q. You run "sh ip route". Which codes indicate OSPF external routes ?

a. Ob. N1c. N1/N2d. OEe. O E1 / O E2

ans: E

Q. Autonomous System External LSAs are originated by _____ ?

a. ABRsb. ASBRc. Internal routersd. External routerse. BDR

ans: B

Q. You sun 'sh ip route". You see a letter/digit/character combination code at the beginning of each route . What do they mean ?

N1 and O

a. OSPF external type 1 and OSPF inter-area respectivelyb. OSPF NSSA external type 1 and OSPF respectivelyc. OSPF external type 1 and OSPF respectivelyd. OSPF external type 1 and OSPF intra-area respectivelye. OSPF NSSA external type 1 and OSPF inter-area respectively

ans: B

Q. You want to find out how many LSAs in your router's OSPF database are external ? Which command ?

a. show ip ospf database b. show ip ospf database summary c. show ip ospf database database-summary d. show ospf database database-summary e. show ospf database summary

ans: C

Q. You run "sh ip route" . Which code indicates routes in the same AS but in a different area.

a. O E1b. O E2c. O IAd. N1e. N2

ans: C

OBJ. 32. VERIFY OSPF OPERATION (MULTI-AREA)

Q. Command to see routes to ABRs and ASBRs: (Type the statement; NOT a multiple choice question)

ans: sh ip ospf border-routers

Q. You want to find out which transit area and interface your router is using for virtual link (OSPF). Which command ?

a. sh ip ospf transit

b. sh ip ospf partitionedc. sh ip ospf virtual-linkd. sh ospf veirtual-linke. sh ospf tarnsit

ans: C

Q. Your router is running 3 OSPF processes. You only want to find out about OSPF process 2. Which command ?

a. sh ospf 2b. sh ospf proc 2c. sh ip ospf proc 2d. sh ip ospf id 2e. sh ip ospf 2

ans: E

Q. You want to know about router 128.252.144.254's LSA in area 3 of OSPF process 2. Which command ?

a. sh ip ospf 2 3 database router 128.252.144.254b. sh ip ospf 3 2 database router 128.252.144.254c. sh ip ospf 3 2 database 128.252.144.254d. sh ip ospf database 2 3 128.252.144.254e. sh ip ospf 2 3 LSA 128.252.144.254

ans: A

OBJ. 33. DESCRIBE ENHANCED IGRP FEATURES AND OPERATION

Q. Which algorithm helps induce rapid convergence in EIGRP.

a. SPF b. DUALc. Link-state Routing Algorithmd. OSPFe. Distance-Vector Routing Algorithm

ans: B

NOTE: DUAL = Diffusing Update Algorithm

Q. EIGRP routing updates are __________________ ?

a. flooded on the networkb. sent to neighbors onlyc. sent to a central routerd. sent at regular intervals even if there is no change

ans: B

Q. Advertised Distance = ? (in EIGRP)

a. distance between next hop and destinationb. between a central router and destinationc. between local router and next hopd. between local router and destination

ans: A

Q. Which Layer 3 protocols does EIGRP support ? Choose All That Apply.

a. netbuib. ipc. ipxd. appletalke. ppp

ans: B,C,D

NOTE: PPP is not a layer 3 protocol

Q. Distance between local router and next hop is called ?

a. administrative distanceb. advertised distancec. cost metricd. local distancee. feasible distance

ans: E

Q. In EIGRP: How many successors can you have ?

a. 0b. 1 and only 1c. at most 2

d. more than 1

ans: D

Q. NBMA = ?

a. Nonbroadcast Multiple Accessb. Nonbroadcast Media Accessc. NO Broadcast Multiple Accessd. Non-Broadband Media Access

ans: A

Q. Default Interval for EIGRP hello packets in NBMA networks ?

a. 30 secb. 60 secc. 90 secd. 120 sece. 180 sec

ans: B

Q. You have distcontigous networks. What should you do if you are using EIGRP ?

a. disable automatic route summarizationb. enable automatic route summarizationc. disable incremental updatesd. increase the frequency of incremental updatese. decrease the frequency of incremental updates

ans: A

Q. Types of EIGRP routes : Choose all that apply.

a. defaultb. localc. internald. externale. summary

ans: C,D,E

Q. You sun 'sh ip route". You see the following letter/digit/character combination code at the beginning of each route. What do they mean ?

D and EX

a. RIP, OSPF EXTERNALb. IGRP, OSPF EXTERNALc. IGRP, BGP EXTERNALd. BGP, EIGRP EXTERNALe. EIGRP, EIGRP EXTERNAL

ans: E

Q. Which command (in IGRP) can you use to specify how close paths (in cost) have to be before load balancing can occur ?

a. loadb. traffic-share minc. path-balanced. variancee. balance-factor

ans: D

Q. Which command will tell the router to use only the lowest cost path and not do any load balancing (IGRP) ? (Type the statement; NOT a multiple choice question)

ans: traffic-share min

OBJ. 34. CONFIGURE ENHANCED IGRP

Q. EIGRP is proprietory.

a. Trueb. False

ans: True

Q. You have a 100BaseT ethernet interafce. You want to set the bandwidth value for eigrp. Which command ?

a. router(config-if)# bandwidth 100b. router(config-if)# bandwidth 100000c. router(config-if)# bandwidth 100000000d. router(config)# bandwidth fastethernet1/0 100

e. router(config-if)# speed 100000

ans: B

Q. Command to disable automatic route summarization (EIGRP) ? (Type the statement; NOT a multiple choice question)

ans: no auto-summary

Q. You are running EIGRP. However, you do not want the s0 interface to participate in EIGRP in EIGRP protocol traffic. Which command ?

a. router(config-router)# no eigrp s0b. router(config-router)# eigrp passive-interface s0c. router(config-router)# passive-interface s0d. router(config-if)# passive-interfacee. router(config-if)# eigrp passive-interface

ans: C

Q. EIGRP: On interface e0 you want to summarize route to network 128.252.144.0/24. Your AS# is 20. Which comamnd ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)# ip summary-address eigrp 20 128.252.144.0 255.255.255.0

Q. You want ipx to be routed by eigrp. You have already enabled ipx routing. What's next ? your AS# is 20.

a. ipx router eigrp 20b. you don't have to do anything elsec. eigrp router ipx 20d. eigrp as 20e. eigrp ipx router 20

ans: A

Q. EIGRP: You want to allow SAP updates on e0 only if there is a chnage in SAP table. Your AS# is 20. Which command would you use ? (Type the statement; NOT a multiple choice question)

ans: ipx sap-incremental eigrp 20

Q. Why would you set the bandwidth of an interface ?

a. Some protocols (e.g. EIGRP) use bandwidths to determine the best route

b. Otherwise, keepalives will be misreadc. Mandatory in RIPd. Mandatory in IGRPe. routing updates will not be synchronized otherwise

ans: A

Q. Each AS (autonomous system) is assigned _________ bit address ? a. 4b. 8c. 16d. 32

ans: C

Q. Deafult bandwidth value for Fast Serial Interface on Cisco routers = ?

a. 64 (kbps)b. 128 (kbps)c. 256 (kbps)d. 512 (kbps)e. 1544 (kbps)

ans: E

OBJ. 35. VERIFY ENHANCED IGRP OPERATION

Q. Which command would you use to monitor eigrp packet exchanges between your router and one of the your neighbor (128.252.144.254) of eigrp process 12.

a. sh ip eigrp neighbor 128.252.144.254b. sh ip eigrp neighbor 12 128.252.144.254c. sh eigrp neighbor 12 128.252.144.254d. sh ip eigrp 12 128.252.144.254e. sh ip eigrp neighbor 128.252.144.254 12

ans: B

Q. You run "sh ip eigrp topology". You see a "P" in front of an entry. What does it mean ?

a. next hop

b. passive statec. paired stated. primary linke. redistributed route

ans: B

Q. All you want to do is monitor eigrp neighbor events (e.g. neighbor going down, coming up etc.). You do not want to monitor packet level info. Which command would you issue ?

a. debug eigrp neighborsb. show eigrp neighborsc. show ip eigrp topologyd. debug eigrp packetse. show ip eigrp neighbors

ans: A

Q. You want to know the best route to 128.252.144.0 and its feasible distance ? How ?

a. show eigrp distance 128.252.144.0 b. show eigrp distance and look for the line containing 128.252.144.0c. show ip eigrp distance feasibled. show ip eigrp topology distancese. show ip eigrp topology and look for the line containing 128.252.144.0

ans: E

Q. Command to monitor eigrp packets:

a. sh ip eigrp packetsb. sh eigrp packetsc. debug eigrp neighborsd. debug eigrp packetse. debug ip eigrp packets

ans: D

Q. You do "sh ip route" and you see the following:

D EX 172.25.0.0/16 [170/2221056] via 172.20.15.5, 00:41:48, serial0

What does the "D EX" mean ?

a. eigrp external routeb. IGRP routec. default external routed. eigrp internal routee. redistributed OSPF route

ans: A

Q. You want to find out how long each of the eigrp neighbors has been up. Which command should you run ? (Type the statement; NOT a multiple choice question)

ans: sh ip eigrp neighbors

OBJ. 36. SELECT AND CONFIGURE THE DIFFERENT WAYS TO CONTROL ROUTE UPDATE TRAFFIC

Q. Name 4 ways to control update traffic:

a. use passive interfacesb. use default routesc. define bandwidth for interfacesd. use static routese. use routing update access-listsf. increase route update frequencyg. use redistribution

ans: A,B,D,E

Q. Define a default ipx route via node 00.80.1A.2B.3C.4D, network 200.

a. route ipx default 200.00801A2B3C4Db. ipx route default 200.00801A2B3C4Dc. ipx route statis 200.00801A2B3C4Dd. ipx default-network 200.00801A2B3C4De. route ipx default 200.00801A2B3C4D

ans: B

Q. You are running RIP on your router. What command would stop RIP updates from going out from interafce e2.

a. router(config-router)# passive-interafce e2b. router(config-router)# no router rip e2

c. router(config-router)# no router rip int e2d. router(config-if)# no ripe. router(config-if)# no rip update

ans: A

Q. You want all ip packets to go to network 128.252.144.0 by default. Which comamnd ? (Type the statement; NOT a multiple choice question)

ans: router(config)# ip default-network 128.252.144.0

Q. What is a floating static route ?

a. dynamically learned route made staticb. route that has come off redistribution made statisc. static route redistributed into more than one routing protocolsd. a static route that can be overridden by a dynamically learned route

ans: D

Q. Write a statement to dictate a static route to 128.252.144/24 via 128.252.5.254 .

a. ip route 128.252.144.0 255.255.255.0 128.252.5.254b. route ip 128.252.144.0 255.255.255.0 128.252.5.254c. static ip 128.252.144.0 255.255.255.0 128.252.5.254c. ip static 128.252.144.0 255.255.255.0 128.252.5.254ans: A

Q. You want to redistribute static route into OSPF. What command would you use under the "router ospf" section ? (Type the statement; NOT a multiple choice question)

ans: router(config-router)# redistribute static

Q. What does the following command do ? router(config-if)#ipx advertise-default-route-only 100

a. advertise ipx routes to network 100 only b. advertises only the default RIP route via network 100c. advertises default routes of all protocols via network 100d. use the route to network 100 as the default route

ans: B

Note: to advertise all knows RIP routes out the interface, useno ipx advertise-default-route-only 100

Q. You want to redistribute RIP routes into OSPF. What command would you use under the "router ospf" section if you want RIP routes to have a cost of 20. (Type the statement; NOT a multiple choice question)

ans: router(config-router)# redistribute rip metric 20

Q. If you do not specify an administrative distance when you are issuing static routes, what will this static route's administrative distance be ?

a. 0b. 1c. 10d. 20e. 100

ans: B

Note: default administrative distance for static routes

Q. You have already defined an access-list to control incoming route update as access-list number 10. How do you apply that list in incoming route updates on e0.

a. router(config-router)#distribute-list 10 in e0b. router(config-router)#access-group 10 in e0c. router(config-router)#distribute-list 10 e0d. router(config-router)#filter 10 in e0e. router(config-router)#distribute-list 10 e0 in

ans: A

Q. You have not defined a default network for IP. You have not issued ip classless commadn. There is no route in the routing table for class B network 128.252.0.0. If your router receives a packet destined for 128.252.0.0, what will the router do ?

a. hold it for 90 seconds for a route to be advertisedb. forward it to any subnetwork that belongs to 128.252.0.0c. drop it.d. hold it till the next routing update and then drop it if the

situation remains the same

ans: C

Q. You have already defined access-list 10 that would control your outgoiing routing updates. How do you apply this list to outgoing route updates to AS 311 ?

a. router(config-router)#distribute-list 10 out 311b. router(config-router)#access-group 10 out 311c. router(config-router)#distribute-list 10 311d. router(config-router)#filter 10 out 311e. router(config-router)#distribute-list 10 311 out

ans: A

Q. When you define static ip route with "ip route" command, what does it mean to add the word "permanent" at the end of the statement ?

a. it is redistributed automatically into all routing protocolsb. survives a rebootc. route stays in routing table even if the interface goes downd. becomes the default route

ans: C

OBJ. 37. CONFIGURE ROUTE REDISTRIBUTION IN A NETWORK THAT DOES NOT

HAVE REDUNDANT PATHS BETWEEN DISSIMILAR ROUTING PROCESSES.

Q. Your router runs a igrp process with the process id of 1. It also runs a eigrp process with the process id of 1. You want to redistribute eigrp routes eigrp routes into igrp. What do you have to do ?

a. nothingb. use "redistribue igrp" command in "router eigrp" sectionc. use "redistribue eigrp" command in "router igrp" sectiond. both b and ce. either b or c

ans: A

Note: IGRP & EIGRP processes with the same id will redistribute automatically

Q. True or False: Route distribution can take place only between 2 different protocols.

a. Trueb. False

ans: False.

NOTE: Route distribution can take place between 2 sessions (or processes) of the same protocols.

Q. Metrics used by EIGRP: (choose all that apply)

a. bandwdithb. costc. delayd. hop counte. loadf. mtug. reliability

ans: A,C,E,F,G

Q. You want to redistribute rip into OSPF. Which commands would you apply ? (Choose 2)

a. router ospfb. router ripc. redistribute ripd. redistribute OSPFe. default-metric rip 10f. deafult-metric ospf 20

ans: A,C

Q. Metrics used by OSPF: (choose all that apply)

a. bandwdithb. costc. delayd. hop counte. loadf. mtu

g. reliability

ans: B

Q. You want to redistribute all the directly connected networks into IGRP process 1. Which command would you issue in the "router igrp 1" section ? (Type the statement; NOT a multiple choice question)

ans: router(config-router)# redistribute connected

Q. Difference between metrics and administrative distances ?

a. metrics are assigned to routes, administrative distances are assigned to route sourcesb. metrics are assigned to routes sources administrative distances are assigned to routesc. they are the same concept, except they are named differently for different protocolsd. metrics do not have the "bandwidth" parametere. metrics do not have the "load" parameter

ans: A

Q. You want to redistribute ospf process 1 routes to igrp process 1 with the following metrics:

Bandwidth = 10 Mbps Delay = 50 microseconds Load = 2/255 MTU = 1500 bytes Reliablity = 250/255

What commnd would you issue in "router igrp 1" section ?

ans: router(config-router)#redistribute ospf 1 metric 10000 5 250 2 1500

Note: Format: default-metric <bandwidth> <delay> <reliability> <load> <mtu> Bandwdith = in kbps delay = in tens of microseconds reliability = in 1/255 load = in 1/255 MTU = in bytes

Q. When would you use default-metric <number> command ? Choose 3

a. redistribute into IGRPb. redistribute into EIGRPc. redistribute into RIPd. redistribute into OSPFe. redistribute into BGP

ans: CDE

Q. Which form of default-metric command would you use when you are redistributing into IGRP,EIGRP ?

a. default-metric <bandwidth> <delay> <reliability> <load> <mtu>b. default-metric <delay> <bandwidth> <reliability> <load> <mtu>c. default-metric <delay> <bandwidth> <reliability> <mtu> <load>d. default-metric <bandwidth> <delay> <reliability> <mtu> <load>e. default-metric <bandwidth> <delay> <load> <reliability> <mtu>

ans: A

Q. Metrics used by IGRP (choose all that apply)

a. bandwdithb. costc. delayd. hop counte. loadf. mtug. reliability

ans: A,C

OBJ. 38. CONFIGURE ROUTE REDISTRIBUTION IN A NETWORK THAT HAS REDUNDANT

PATHS BETWEEN DISSIMILAR ROUTING PROCESSES

Q. You are redistributing external routes from eigrp into OSPF. What would it be labeled as ?

a. unpredictableb. E1c. E2d. E

ans: C

Q. How do you force an external route into OSPF as E1 ?

a. add metric-type 1 to the redistribute command.b. add "E1" to the redistribute commandc. add "type E1" to the redistribute commandd. add "route-type E1" to the redistribute command

ans: A

NOTE:(e.g. redistribute eigrp 1 metric 100 metric-type 1 subnets)

Q. You want to redistribute eigrp process 1 routes into ospf. However, you want eigrp to suppress any specific routes that fall withing 128.252.144.0/24 network. When it redistributes routes into OSPF, which extra command would you issue in the "router ospf" section besides "redistribute eigrp 1" command. (Type the statement; NOT a multiple choice question)

ans: router(config-router)# summary-address 128.252.144.0 255.255.255.0

Q. When routing protocol 1 is redistributing into routing protocol routing 2 and vice versa, it is called _________ ?

a. complete redistributionb. exchanged redistributionc. permanent redistributiond. mutual redistributione. multi-redistribution

ans: D

OBJ. 39. RESOLVE PATH SELECTION PROBLEMS THAT RESULT IN A REDISTRIBUTED NETOWRK

Q. To avoid routing loops, what should the default-metric be set to ?

a. half of the native-metricb. at least 1 less than the native metricc. same as the native metric

d. at least 1 larger than the native metrice. double of the native metric

ans: D

Q. Default Administrative distance for the following protocols :

RIP, IGRP, EIGRP, OSPF

a. 100, 120, 90, 110b. 100, 120, 110, 90c. 120, 100, 90, 110d. 120, 90, 100, 110e. 90, 110, 120, 100

ans: C

Q. What is used in conjunction with summary routes to prevent routing loops during redistributions.

a. duplicate summary address route destined for null0 interfaceb. routing profilesc. static routesd. static routes destined for a local interfacee. access-lists that direct certain packets to null0 interface

ans: A

Note: ...so that when a summary-route fails, packet is dropped

Q. Default Administrative distances for the following protocols/routes:

Internal BGP, External BGP, Static Route, Connected Interface

a. 20, 200, 1,0b. 0, 1, 200 20c. 200, 20, 1, 0d. 200, 1, 20, 0e. 200, 20, 0, 1

ans: C

Q. You are redistributing eigrp into RIP. You want to set administrative distance for internal EIGRP to 50 and that for external EIGRP to 80. Which command would you run and in what section ? (Type the statement; NOT a multiple choice question)

ans: distance 50 80

NOTE: (in the "router eigrp 1" section)

OBJ. 40. VERIFY ROUTE DISTRIBUTION

Q. You have used redistribution in your router's configuration. However, you want to confirm that your router actually is forwarding packets from 128.252.0.0 . What 2 things would you do ?

a. define an access-list that permits packets from 128.252.0.0b. debug ip packet access-list#c. apply the access-list to all interfacesd. apply the access-list to 1 interfacee. sh ip route and look for 128.252.0.0

ans: A,B

Q. You are using redistribution. You want to see all the ip routes that has resulted after the redistribution. Which command ?

(Type the statement; NOT a multiple choice question)

ans: sh ip route

Q. You have defined a statis route via an interface. Can this route be redistributed into RIP ?

ans: Yes.

Note: In fact, it will be distributed without the "redistribution static" command provided RIP configuration includes the destination network (of the static route) in it.

Q. You are running 2 EIGRP processes which redistribute into each other. How would the redistributed routes show up in the routing table ?

a. D EXb. E1c. E2

d. E

ans: A

NOTE: EIGRP external

OBJ. 41. DESCRIBE WHEN TO USE BGP TO CONNECT TO ISP

Q. You only have 1 link to your ISP. What should you use ?

a. BGPb. RIPc. a static routed. OSPFe. EIGRPf. IGRP

ans: C

Q. You want to filter out the routes that pass through a specific AS, but you would like to keep that routes to that AS. Which protocol and which feature would you use ?

a. IGRP and access-listsb. EIGRP and access-listsc. BGP and redistributiond. BGP and AS path filter

ans: D

Q. Which of the following conditions would dictate the use of BGP. Choose 2.

a. local AS uses a static route to to the ISPb. local AS and ISP use different policiesc. local AS uses redistributiond. local AS needs to know about other ASs in the internetwork.

ans: B,D

Q. Command to define 128.252.144.254 of AS 76 as a neighbor in BGP :

a. router(config-router)# neighbor 128.252.144.254 remote-as 76

b. router(config-router)# ip bgp neighbor 128.252.144.254 remote-as 76c. router(config-router)# bgp neighbor 128.252.144.254 remote-as 76d. router(config-router)# neighbor 128.252.144.254 76e. router(config-router)# neighbor 128.252.144.254 as 76

ans: A

Q. Which of the following conditions would dictate the use of BGP. Choose all that apply.

a. 1 link to your ISPb. 1 live and 1 backup link to your ISPc. 2 live links and 1 backup link to your ISPd. 3 live links to your ISP

ans: C,D

Q. You want to use BGP. Your AS# is 76. You want your router to advertise 128.252.0.0/16 and 128.251.0.0/16 networks only. Which commands would you run ? Choose 3.

a. router(config)# router bgp 76b. router(config-router)# network 128.251.0.0c. router(config-router)# network 128.252.0.0d. router(config)# router bgpe. router(config)# bgp as 76f. router(config-router)# bgp network 128.251.0.0g. router(config-router)# bgp network 128.252.0.0

ans: A,B,C

Q. You have just made some configuration changes in BGP. How do you clear the old BGP info from your router. (Type the statement; NOT a multiple choice question)

ans: clear ip bgp *

Q. What is the difference between a neighbor and peer (BGP) ?

a. peers have the same AS#b. neighbors have the same AS#

Q. You have just made some configuration changes in BGP. How do you clear the old BGP info from your router.

ans: clear ip bgp *

Q. What is the difference between a neighbor and peer (BGP) ?

a. peers have the same AS#b. neighbors have the same AS#c. peer have different AS#d. neighbors have different AS#e. none

ans: E

Note: Any 2 routers that have opened a TCP connection to each other for the purpose of exchanging routing information are known as peers or neighbors.

Q. 2 examples of exterior protocols ?

a. BGPb. EIGRPc. EGPd. IGPe. OSPF ans: A,C

Q. Which came first ? EGP or BGP ? ans : EGP

Q. T/F : The concept of "internet core" was continued on to BGP from EGP. ans: False

Q. BGP does routing between _________________________ ?

a. class B networksb. class C networksc. DNS domainsd. WINS domainse. Autonomous systems

ans: E

Q. Which protocol does BGP use for transport ?

a. SPXb. IPc. TCPd. TCP and SPX

ans: C

Q. In BGP, a neighbour is also called a _______ ?

a. routerb. bgprouterc. peerd. hope. border router

ans: C

OBJ. 42. DESCRIBE METHODS TO CONNECT TO AN ISP USING STATIC & DEFAULT ROUTES, and BGP.

Q. Which TCP port does BGP use ?

a. 171b. 173c. 177d. 179

ans: D

Q. Command to set a default route via 128.252.5.254

a. router(config)# ip route 128.252.5.254 defaultb. router(config)# ip route 0.0.0.0 128.252.5.254c. router(config)# route ip 0.0.0.0 0.0.0.0 128.252.5.254d. router(config)# ip route 0.0.0.0 0.0.0.0 128.252.5.254e. router(config)# route 0.0.0.0 0.0.0.0 128.252.5.254

ans: D

Q. Which version of BGP uses CIDR ?

a. BGP2b. BGP4

c. BGP6d. BGP8

ans: B

Q. Command to set a default route via interface e0.

a. router(config)# ip route e0 defaultb. router(config)# ip route 0.0.0.0 e0c. router(config)# route ip 0.0.0.0 0.0.0.0 e0d. router(config)# route 0.0.0.0 0.0.0.0 e0e. router(config)# ip route 0.0.0.0 0.0.0.0 e0

ans: E

Q. T/F : The concept of "internet core" was continued on to BGP from EGP.

ans: False

Q. You sun 'sh ip route". Which letter/digit/character combination code would you see at the beginning of a route if it was a BGP route ?

a. Bb. BGc. Ed. E1e. E2

ans: A

Q. You are using OSPF as your internal routing protocol. How do you redistribute the default-route into the OSPF AS ? (Type the statement; NOT a multiple choice question)

ans: router(config)# default-information originate always

OBJ. 43. COMPARE THE DIFFERENCES BETWEEN WAN CONNECTION TYPES:

DEDICATED, ASYNCHRONOUS DIAL-IN, DIAL-ON-DEMAND and PACKET-SWITCHED SERVICES

Q. PSN = ?

a. Public Switched Networkb. Packet Switched Networkc. Packet Server Networkd. Packet Segmented Networke. Packet Served Network

ans: B

Q. Which of the following networks can run CDP ? Choose all that apply.

a. X.25b. Frame-Relayc. Ethernetd. Token Ring

ans: B,C,D

NOTE: X.25 can not support SNAP encapsulation, and therefore, can not run CDP

Q. Frame Relay: subintrefaces allow you to use multiple ____________ on a single interface ? a. encapsulationsb. virtual circuitsc. static routesd. routing protocols

ans: B

Q. Which of the following networks can run CDP. Choose all that apply.

a. HDLC b. PPPc. FDDId. X.25

ans: A,B,C

Q. Two kinds of subinterfaces in Frame Relay are ______ and ______ ?

a. Point-to-Point b. Multipointc. pvcd. svc

e. lmif. crc

ans: A,B

NOTE: Point-to-point subinterface connects to 1 PVC Multipoint subinterface connects to more than 1 PVCs

Q. Network layer address of a X.25 device consists of ____ digits, of which first ___ bits identifies the network ?

a. 12,3b. 13,3c. 10,3d. 14,4

ans: D

NOTE: one could think of this as 4 digit country code and 10 digit phone number just like in US

Q. LMI= ? a. set of enhancements to the basic frame relay specificationb. any interface that is running HDLC encapsulationc. ATM extensionsd. LANE Module Interface

ans: A

NOTE: LMI= Local Management Interface

Q. A frame relay subinterface is serving a PVC . What happens if the PVC goes down ?

a. subinterface stays upb. subinterface goes downc. subinterface stays up for a preconfigured amount of time before going downd. subinterface gets redirected to another physical interface

ans: B

Q. What is the range of available for subinterfaces ?

a. 16b. 512

c. 1024d. 2^20 -1e. 2^32 -1

ans: E

OBJ. 44. DETERMINE WHEN TO USE PPP, HDLC, LAPB, and IETF ENCAPSULATION TYPES

Q. What is a tunnel interface used for ?

a. to forward traffic of a protocol to a network that does not support that protocolb. to drop packets w/o processing c. to save dialup configuration settingsd. to forward packets to a OSPF area other than 0

ans: A

Q. Which encapsulation must be supported if CDP is to work ?

a. ARPAb. novell-etherc. ethernet_IId. 802.2e. SNAPf. PPP

ans: F

Q. You are using LAPB on interface s0. You want to enable whole compression. Which 2 kinds of compressions are available.

a. compressorb. payloadc. ietfd. crc4e. predictorf. stacker

ans: E,F

Q. When to use HDLC encapsulation ?

a. point-to-point linksb. dialup linksc. packet switched public networksd. SMDS networkse. ATM networks

ans: A

Q. Command to enable payload compression on frame-relay:

a. router(config-if)# frame-relay compression payloadb. router(config-if)# compression payloadc. router(config)# compression int s0d. router(config-if)# frame-relay payload-compress

ans: D

Q. When would you use PPP encapsulation ? Choose 2

a. point-to-point linksb. dial-up-linksc. packet switched publick networksd. ethernete. token ring

ans: A,B

Q. ABM= ?

a. Area Border Mediab. Asynchronous Balanced Modec. Asynchronous Bandwidth Multiplexingd. ATM Bearing Medium

ans: B

NOTE: a transfer mode between 2 devices where each can initiate transmission

Q. Command to enable TCP header-compression on s0 interface ?

a. router(config-if)# ip tcp header-compressionb. router(config)# compression int s0 headerc. router(config-if)# tcp compression headerd. router(config-if)# tcp header-compressione. router(config-if)# ip tcp compression header

ans: A

Q. When to use LAPB encapsulation ?

a. point-to-point linksb. dialup linksc. packet switched public networksd. SMDS networkse. ATM networks

ans: C

Q. When would you use ietf encapsulation ?

a. on frame relay interfaces that connect to non-cisco routersb. on ATM interfaces that connect to cisco devicesc. on ATM interfaces that connect to non-cisco devicesd. on high speed (52Mbps) serial interfacese. on frame relay interfaces that connect to cisco routers

ans: A

Q. Command to configure interface e0 to use LAPB and allow more than one protocol to run on it. (Type the statement; NOT a multiple choice question)

ans: router(config-if)# encapsulation lapb multi

OBJ. 45. LIST AT LEAST FOUR COMMON ISSUES TO BE CONSIDERED WHEN EVALUATING A WAN SERVICE

Q. Which of the follwoing is/are packet-switched/packet-based. Choose all that apply.

a. frame-relayb. X.25c. SMDSd. ATM

ans: B,C

Q. Which of the follwoing is/are connection-oriented ? Choose all that apply.

a. frame-relayb. X.25

c. SMDSd. ATM

ans: A,B

Q. Which of the following has/have built-in error checking ? Choose all that apply.

a. frame-relayb. X.25c. SMDSd. ATM

ans: A,B

Q. Which of the following is/are capable of providing bandwidth over 40Mbps ? Choose all that apply.

a. frame-relayb. X.25c. SMDSd. ATM

ans: A,C,D

Q. Choose 4 most common issues from the following to be considered when evaluating a WAN service.

a. bandwidthb. costc. availabilityd. ease of managemente. scalabilityf. redundancy

ans: A,B,C,D

OBJ. 46. DESCRIBE THE COMPONENTS THAT MAKE UP ISDN CONNECTIVITY

Q. Which of the following is NOT an ISDN component ? (choose 1)

a. NT1b. NT2

c. BTd. TAe. TE1f. TE2g. LTh. ET

ans: C

Q. You have the following setup:

REGULAR PHONE -------- TA ------ NT1 ------ ISDN SWITCH

What reference point is between "Regular Phone" and "TA" ? What reference point is between "NT1" and "ISDN switch" ?

a. R,Sb. S,Tc. T,Ud. R,Ue. U,U

ans: D

Q. You have the following setup:

PC ----- NT1 ------- ISDN SWITCH

What reference point is between PC and NT1 ? What reference point is between NT1 and ISDN Switch ?

a. R,Sb. S,Tc. S/T, Ud. T, Ue. R,U

ans: C

Q. Which ISDN component combines Layer 2 and 3 functions and is typically found in PBXs ?

a. TE1b. TE2c. NT1d. NT2

e. TA

ans: D

OBJ. 47. CONFIGURE ISDN BRI

Q. Command to define the SPID of the first B-channel on a BRI interface as 314935123401

a. router(config-if)# spid1 314935123401b. router(config-if)# spid 314935123401c. router(config-if)# isdn spid1 314935123401d. router(config-if)# isdn id 314935123401e. router(config-if)# isdn string 314935123401

ans: C

Q. isdn switch-type command

a. is a global configuration commandb. is a interface configuration commandc. can be used as either global or interface configuration commandd. can be used for primary ISDN lines only

ans: A

Q. Command to see dialer group info:

a. show access-listsb. show interfacec. show dialerd. show dialer groupse. show dialer profiles

ans: C

Q. Command to tell the bri interface to dial 9358500 to reach the device with the IP address 128.252.144.254 at the speed 64kbps.

a. router(config-if)# dialer map ip 128.252.144.254 9358500 speed 64b. router(config-if)# dialer ip 128.252.144.254 9358500 speed 64c. router(config-if)# map ip 128.252.144.254 9358500 speed 64d. router(config-if)# dialer map 128.252.144.254 9358500 speed 64e. router(config-if)# dialer map ip 128.252.144.254 9358500 64

ans: A

Q. What is the difference between the "dialer map" comamnd and the "dialer-group command"

a. dialer map command tells the interface what is interesting traffic to place a call & dialer-group command tells the interface what number to callb. dialer map command tells the interface what number to call & dialer-group command tells the interface what is interesting traffic to place the call.c. dialer map maps routers and phone numbers, whereas dialer-group applies dialer mapsd. dialer map maps ip to phone numbers, whereas dialer-group groups dialing interfaces in groups of networks

ans: B

Note: dialer-group only defines indirectly. dialer-group points to a particular dialer-list and the list defines interesting traffic

Q. Command to find info on the D channel:

a. sh controller bri0b. sh isdn controllerc. sh isdn channelsd. sh isdn channel de. sh controller d

ans: A

Q. You have already defined a dialer list 1. How do you tell the bri0 interface that it belongs to that dialer list.

a. router(config)# interface bri0 dialer-list 1b. router(config)# interface bri0 dialer-group 1c. router(config-if)#dialer-list 1d. router(config-if)#dialer-group 1e. router(config-if)#dialer group 1

ans: D

Q. Command that will tell the router to start using the 2nd B channel for multilink when either inbound or outbound traffic utilization exceeeds 50%. (Type the statement; NOT a multiple choice question)

ans: router(config-if)#dialer load-threshold either 128

Note: load varies between 1 and 255. By giving it the value of 127, you mean 50% substitute "in" for inbound substitute "out" for outbound

Q. Command that enables multilink on either B channels.

a. router(config-if)# ppp multilinkb. router(config-if)# multilinkc. router(config-if)# isdn multilinkd. router(config-if)# multilink pppe. router(config-if)# multilink enable

ans: A

Q. How many SPIDs do you have to define for each bri interface ?

a. 1b. 2c. 3d. 4e. 5

ans: 2

Note: for each B -channel

Q. Command that dictates the closing of the connection through your bri0 interface after 3 minutes of no activity. (Type the statement; NOT a multiple choice question)

ans: router(config-if)#dialer idle-timeout 180

OBJ. 48. CONFIGURE LEGACY DIAL-ON-DEMAND ROUTER (DDR)

Q. How do you define the interesting traffic as anything that passes access-list 3 ?

a. router(config)#dialer-list 1 3b. router(config)#dialer-list 1 access-list 3

c. router(config)#dialer-group 1 access-list 3d. router(config)#dialer-group 1 3e. router(config)#dialer-list 1 list 3

ans: E

Q. You have 4 interfaces that belong to rotary group 3. You want to assign a priority to an interface such that it always is the first one to be used ?

a. router(config-if)# dialer priority 255b. router(config-if)# dialer-list 255c. router(config-if)# dialer map 255d. router(config-if)# dialer-map 255e. router(config-if)# dialer priority high

ans: A

Note: Priority values range from 0-255. You also have to assign all the other interafces a priority less than 255.

Q. You want to use CHAP as the ppp authentication scheme on bri0. Which command ?

a. router(config-if)#authentication chapb. router(config-if)#ppp chapc. router(config-if)#ppp authentication chapd. router(config-if)#ppp password chape. router(config-if)#ppp security chap

ans: C

Q. You want to use the username "johndoe" and the password "ccie" when your router's dialup interfaces connect to the dialup server. How do you configure this pair ? (Type the statement; NOT a multiple choice question)

ans: router(config)#username johndoe password ccie

Q. How do you assign a physical interface to rotary group 3 ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)#dialer rotary-group 3

Q. How do you create a logical interface for rotary group 2 ?

a. router(config)# rotary-group 2b. router(config)# rotary group 2c. router(config)# interface dialer 2d. router(config)# rotary interface 2e. router(config)# interface rotary 2

ans: C

Q. What does the "dialer wait-for-carrier 30" command do ?

a. makes the the interface wait for 30 seconds for carrier to come up when it places a callb. makes the the interface wait for 30 seconds before hanging up (after the last interesting packet has passed)c. makes the the interface wait for 30 seconds after the first packet of interesting traffic before making the calld. makes the the interface wait for 30 seconds before hanging up (after all traffic has passed)

ans: A

Q. What does the "80" mean in the "dialer hold-queue 80 timeout 20" command ?

a. 80 frames are stored in the queue at any given momentb. 80 packets are stored in the queue at any given momemtc. 80 packets can be stored in the queue until the central site router returns the call.d. hold all traffic in queue for a maximum of 80 seconds until the central site router returns the phone call.

ans: C Q. What does the "20" mean in the "dialer hold-queue 80 timeout 20" command ?

a. If the the the central site router does not return the call in 20 seconds, packets are dropped.b. If the the the central site router does not return the call in 20 miliseconds, c. a maximum of 100 (80+20) packets can be held in the queue before the return of the phone call.d. after the dialup session is established, inactivity of 20 seconds forces termination of the session.

ans: A

Q. Your router reaches multiple destinations through the same modem.

You want your modem to timeout its connection after 1 minute of inactivity on a dialup link when ther is interesting traffic that requires the same modem to dialup a different destination. Which command ?

a. dialer time-out 60b. dialer inactivity-out 60c. dialer fast-idle 60d. dialer contention 60e. dialer backup 60

ans: C

Q. What is dialer logical interface used for ?

a. DDRb. BDRc. modem statisticsd. isdn statistics

ans: A

Q. You have a modem attached to your router. How do you tell the router that this modem is an on-demand interface ?

a. router(config)#dialer bri0b. router(config)#dialer in-band bri0c. router(config-if)#dialer in-bandd. router(config-if)#dialer on-demande. router(config-if)#dialer ddr

ans: C

OBJ. 49. CONFIGURE DIALER PROFILES

Q. What does the "dialer pool 2" command do ?

a. limits 2 interfaces to dialer poolb. defines 2 sec as the minimum wait before hanging up a connectionc. define access list 2 as the criteria for interesting trafficd. defines a pool of dialup settings as "2" to which dial-up interfaces can be assigned to.

ans: D

Q. How do you tell your router's bri0 interface to belong to pool 2 and have the priority of 255 in that pool ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)#dialer pool-member 2 priority 255

Q. What is the purpose of dialer profiles ?

a. An interface can use different profiles of dialup settings as needed.b. defines a list of dialup usersc. configures dialup security parametersd. configures legacy DDR

ans: A

Q. What does the "dialer string" command do ?

a. defines ppp strings to be remitted during dialup setupb. identifies the telephone number of the targeted destinationc. defines the welcome message for incoming dialup usersd. defines username and password to be used during dialup

ans: B

OBJ. 50. VERIFY DDR OPERATION

Q. One of your router's interfaces just dialed up a link that connects your router to 128.252.5.254. What command would you run to make sure you have a route to 128.252.5.254 ?

a. sh dialerb. sh isdnc. sh ip routed. sh isdn statuse. sh route

ans: C

Q. Which command shows dialer type, dialer state, dialer string, idle timer, fast-idle time etc.

a. sh isdnb. sh isdn statusc. sh intd. sh dialupe. sh dialer

ans: E

Q. Which command turns on ISDN Q921 packets debugging ?

a. show isdn statusb. show dialerc. debug dialerd. debug isdn q921e. debug isdn dialer q921

ans: D

Q. Which command shows the isdn switch type and isdn layer 1,2,3 status ?

a. sh isdn statusb. sh int bri0c. sh isdn switchd. sh isdn layerse. sh dialer isdn

ans: A

OBJ. 51. CONFIGURE DIAL BACKUP

Q. Your primary link is via interface s0. Your backup link is via interface bri0. You want your backup link to comeup 15 seconds after s0 goes down and stays up 45 seconds after s0 comes backup. How do you configure ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)# backup delay 15 45

Q. You have configured your backup interface with the following command.

router(config)# backup load 75 5

Once the backup interface has been activated, when will it

be deactivated ?

a. when the primary interface's transmitting load drops below 75% of its bandwidthb. when the backup interface's transmitting load drops below 75% of its bandwidthc. when the primary interface's transmitting load drops below 5% of its bandwidthd. when the combined load of the primary and the backup interfaces' transmitting load drops below 5% of their bandwidthe. when the combined load of the primary and the backup interfaces' transmitting OR receiving load drops below 5% of their bandwidth

ans: E

Q. Name 2 ways to get around the fact that backup interfaces can not be used for other things:

a. dialer profilesb. static routesc. floating static route DDR designd. multilink ppp

ans: A,C

Q. You are using bri0 interface as a dial backup interface. Normally, can you still use bri0 for other operations ?

a. yesb. No

ans: A

Q. You want to use bri1 interface as a backup interface for interface bri0. What command do you use ?

a. router(config)# backup interface bri0 bri1b. router(config)# backup interface bri1 bri0c. router(config-if)# backup interface bri1 (on bri0)d. router(config-if)# backup interface bri0 (on bri1)

ans: C

NOTE: on the primary interface (bri0)

OBJ. 52. VERIFY DIAL BACKUP OPERATION

Q. Which command gives the status of a link ?

a. sh dialerb. sh ip routec. sh linksd. sh status

ans: A

Q. What command ensures the connectivity between your router and your destination after a backup interface has been activated.

a. sh ip routeb. pingc. sh dialerd. debug dialer

ans: B

NOTE: sh ip route can only show a route, but it does not gurantee connectivity

OBJ. 53. CONFIGURE MULTILINK PPP

Q. You have 2 BRI interfaces on your router. You want to enable multilink ppp. In which section , would you run the "ppp multilink" command ?

a. In the interface configuration section of only 1 of the BRI interfacesb. In the interface configuration section of both of the BRI interfacesc. In the interface configuration section of the dialer interfaced. In the global configuration section

ans: C

Q. You are configuring multilink ppp. You want the 2nd interface to be enabled only when the load is 200/255 inbound. Which command ? (Type the statement; NOT a multiple choice question)

ans: dialer load-threshold 200 in

OBJ. 54. VERIFY MULTILINK PPP

Q. You just ran "sh user" command to find out which virtual "LINE"s each of the interfaces are connected through. Which command would you use to find out which one is the master link (multilink ppp). (Type the statement; NOT a multiple choice question)

ans: sh ppp multilink

Q. You want to find out whether layer1 is "active" or not on each of the ISDN interfaces. Which command ?

a. sh isdn statusb. sh pppc. sh userd. debug pppe. sh isdn layer

ans: A

Q. Which command would you use to find out which virtual "Line" each interface is connected through (multilink ppp) ?

a. sh ppp multilinkb. sh userc. sh isdn statusd. sh ppp multilink linee. sh ppp multilink interface

ans: B

NOTE: This command can be used in conjuction with "sh ppp multilink" command to find out which one is the master link.

Q. Which command will show you which interface is being used for the currently active multilink ppp session.

a. sh isdn statusb. sh ppp multi intc. sh userd. sh ppp multie. sh ppp active

ans: D

Q. You want to minitor multilink ppp activity. Which command ? (Type the statement; NOT a multiple choice question)

ans: debug ppp multilink

Q. You have an active multilink ppp session. You run the "sh user" command. What would you see in the host column ?

a. an IP addressb. SPID numbersc. hostnamed. The words "Virtual PPP(Bundle)"

ans: D

Q. Which command will show you number of member links in the active multilink ppp session ?

a. sh userb. debug ppp multilinkc. sh isdn statusd. sh ppp linkse. show ppp multi

ans: E

OBJ. 55. CONFIGURE SNAPSHOT ROUTING

Q. Which of the following problems does snapshot routing solve ?

a. Routing loops may occur when two protocols distribute into each otherb. outdated information from a neighbor may reinstate a befallen routec. ISDN links may be activated just to exchange routing info even if there is no real traffic.d. Count-to-infinite problem

ans: C

Q. Your router's snapshot client interface (bri0) is on "quiet" state. You want it to start exchanging routing information with the server ASAP. Which command do you run ? (Type the statement; NOT a multiple choice question)

ans: clear snapshot quiet-time bri0

NOTE: It actually waits 2 minutes

Q. How do you define dialer map for a snapshot client to a server named "server1"? Number to dial to reach the server is 9351234. Priority for this dialer map should be 2.

a. router(config-if)# dialer map snapshot 2 name server1 9351234b. router(config-if)# dialer map snapshot 2 server1 9351234c. router(config-if)# dialer map snapshot 2 name server1 string 9351234d. router(config-if)# dialer map snapshot name server1 9351234e. router(config-if)# dialer map snapshot priority 2 name server1 9351234

ans: A

Q. Which command displays snapshot routing information associated with bri0

a. show bri0 snapshotb. show int bri0 snapshotc. show snapshot routingd. show snapshot bri0e. show snapshot routing bri0

ans: D

Q. You are configuring a snapshot client. You have already done the "snapshot client" command to set the quiet time and active time durations. What else do you have to do ?

a. nothingb. setup a dialer profilec. define a dialer map with a "dialer map snapshot" commandd. setup an access-liste. provide a dialer string

ans: C

Q. Quiet time has to be _______ than the active time when configuring snapshot routing.

a. at most 1 minute less thanb. at most equal toc. at least equal to

d. at least 1 minute longere. at least 3 minutes longer

ans: E

Q. You have already configured a snapshot client with an active time of 30 minutes and a quite time of 6 hours. You are now configuring the server. What command do you run ?

a. router(config-if)# snapshot server 6b. router(config-if)# snapshot server 30c. router(config-if)# snapshot server 360d. router(config-if)# snapshot server 1800e. router(config-if)# snapshot server 21600

ans: B

Q. Sanpshot routing uses the ________ design model ?

a. peer to peerb. many to manyc. hub and spoked. client-server

ans: D

Q. You are configuring a client for snapshot routing. You want this ISDN interface to have an active time of 30 minutes and quite time of 6 hours. Command ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)# snapshot client 30 360

OBJ. 56. CONFIGURE IPX SPOOFING

Q. What do you have to do before you can turn on ipx spoofing or watch-dog spoofing.

a. turn off fast switching for ipxb. setup ipx idel-time c. issue the command "ipx route-cache"d. turn off store and forward switchinge. turn off snapshot routing

ans: A

NOTE: Forces the router to look inside the packets

Q. You have configured dialer idle time to be 5 minutes. You have also set the spx-idle-time to be 2 minutes. How much time will go by before SPX spoofing will actually start ?

a. 2 minutesb. 3 minutesc. 5 minutesd. 7 minutes

ans: D

Q. You have turned on SPX spoofing, but did not set an idle time. What is the default idle time ?

a. 30 sec.b. 60 sec.c. 90 sec.d. 120 sec.e. 180 sec.

ans: B

Q. Which command turns on ipx watchdog spoofing ?

a. router(config)# spoof watchdogb. router(config)# no shutdown spoof watchdogc. router(config)# ipx watchdog-spoofd. router(configi-if)# ipx watchdog-spoofe. router(configi-if)# no shutdown spoof watchdog

ans: C

Q. Which command turns on ipx spoofing ?

a. router(config)# ipx spx-spoofb. router(config)# ipx watchdog-spoofc. router(config)# ipx route-cached. router(config)# spx-spoofe. router(config)# no ipx spx-spoof

ans: A

Q. How do you set the SPX idle time to 2 minutes ? (Type the statement; NOT a multiple choice question)

ans: router(config)# ipx spx-idle-time 120

Q. Which command turns off fast switching for IPX ?

a. ipx route-cacheb. no ipx spx-spoofc. no ipx route-cached. no ipx watchdog-spoofe. no route-cache ipx

ans: C

OBJ. 57. DEFINE ROUTABLE and NONROUTABLE PROTOCOLS AND GIVE AN EXAMPLE OF EACH.

Q. Which of the following are routable protocols ?

a. Appletalkb. IPc. IPXd. LATe. MOPf. Netbeui

ans: A,B,C

Q. What is the key difference between any routable protocol and any non-routable protocol ?

a. addressing information at layer 2b. addressing information at layer 3c. addressing information at layer 4d. bandwidth informatione. cost information

ans: B

OBJ. 58. DEFINE VARIOUS BRIDGING TYPES AND DESCRIBE WHEN TO USE EACH TYPE

Q. When would you use encapsulation bridging ?

a. for bridging non routable protocolsb. when the same router needs to route and bridge the same protocolc. to connect a remote site that lacks routing capabilitiesd. when translation is necessary

ans: A

Q. You are trying to bridge some hosts on a FDDI ring and an ethernet network. What kind of bridging would you use ?

a. Transparent bridgingb. SRBc. SRTd. SR/TLBe. NOT possible. FDDI rings can only bridge transit ethernet packets

ans: E

Q. You want to bridge 2 different networks: one that has RIFs (e.g. token ring) and the another that does not. What kind of bridging would you use ?

a. Transparentb. Encapsulationc. IRBd. SRBe. SRTf. SR/TLB

ans: E

Q. What is Source Route Bridging ?

a. Bridging that brings together multiple ethernet networksb. Bridging that brings together multiple token ring networksc. Bridging that brings together multiple FDDI ring networksd. Bridging that brings together multiple SMDS networkse. Bridging that brings together multiple Frame Relay networks

ans: B

Q. What would be the simplest solution if you are trying to bridge

2 ethernet networks ?

a. use transparent bridgingb. use IRBc. use SRBd. use SRTe. use SR/TLB

ans: A

Q. You are bridging 2 different network (ethernet and token ring) and you need to use translation between protocols. Which kind of bridging woul you use ?

a. IRBb. SRBc. SRTd. transparent bridginge. SR/TLB

ans: E

Q. You are trying to migrate a bridged network to a routed network. What would be the simplest solution ?

a. IRBb. SRBc. SRTd. transparent bridginge. SR/TLB

ans: A

Q. SRT is a mix of _______ & _______ ?

a. transparent bridging, IRBb. IRB, SRBc. IRB, SR/TLBd. SRB, SR/TLBe. SRB, Transparent Bridging

ans: E

Q. Which of the following are types of bridging ?

a. Transparent

b. Translationalc. Encapsulated

OBJ. 59. CONFIGURE TRANSPARENT BRIDGING

Q. Which command will display entry for device with the hardware address of 00:80:00:1A:2B:3C (transparent bridging) ?

a. router# show bridge 0080.001A.2B3Cb. router# show bridge-group 0080.001A.2B3Cc. router# show bridge MAC 0080.001A.2B3Cd. router# show bridge ethernet 0080.001A.2B3C

ans: A

Q. You want to know which port is the root for the spanning tree. Which command would you issue ?

a. router# sh bridge rootb. router# sh bridge-group rootc. router# sh bridge-group spand. router# sh bridge tablee. router# sh span

ans: E

Q. How do you assign a cost of 100 for bridge group 1 to go out interface e0. (Type the statement. NOT a multiple choice question)

ans: router(conig-if)#bridge-group 1 path-cost 100

Q. Which command will show the bridge parameters (hello time, max age, forward delay) for each bridge group ?

a. router# sh spanb. router# sh bridge parametersc. router# sh bridge-group parametersd. router# sh span parameters

ans: A

Q. What is Bridge Protocol Data Unit ?

a. protocol to transfer payload informationb. spanning tree protocol hello packet to exchange info among bridgesc. protocol to send keep alivesd. protocol to exchange bridging information among interfaces

ans: B

Q. Which command will display all entries for hosts reachable via interface ethernet 0 (tranparent bridging) ?

a. router# show span ethernet 0b. router# show bpdu ethernet 0c. router# show bridge interface ethernet 0d. router# show bridge ethernet 0e. router# show bridge ethernet 0 hosts

ans: D

Q. Which command will show the priority of all the bridges and the protocol (iee/dec) used for the bridging ?

a. router# sh spanb. router# sh bridge protocolc. router# ssh bridge interfacesd. router# sh span detaile. router# debug bridge span

ans: A

Q. When you are configuring transparent bridging, you have 2 choices for protocol: ieee and dec. Are they compatible ?

a. yesb. no

ans: B

Q. You want interface e0 to belong to bridge group 1. How do you set that ?

a. router(config)# bridge group int e0 1b. router(config)# bridge-group int e0 1c. router(config-if)# bridge-group 1d. router(config-if)# bridge group 1e. router(config-if)# bridge span 1

ans: C

Q. How do you set the priority for the bridge group 1 to a value of 24 for spanning tree protocol ? (Type the statement. NOT a multiple choice question)

ans: router(config)# bridge 1 priority 24

OBJ. 60. CONFIGURE IINTEGRATED ROUTING AND BRIDGING (IRB)

Q. Which command enables IRB on cisco routers ?

a. enabled by defaultb. router(config)#irbc. router(config)# bridge irbd. router(config)# bridge irb one. router(config)# bridge integrated

ans: C

Q. You have defined bridge group 2 between 2 interfaces. Now, you want to use IRB to do routing between this bridge and other interfaces. Which comamnd creates the appropriate interface for IRB ? (Type the command. NOT a multiple choice question)

ans: router(config)# interface bvi 2

Q. True/False: steps to configure a logical interface are essentially the same as those for a physical inteface.

ans: True

Q. IRB, by default, bridge _______ protocol(s).

a. IP onlyb. IP and IPXc. IP and Appletalkd. IPX and Appletalke. IP, IPX and Appletalk

ans: E

Q. IRB: Which command will show you which protocols are bridged and which protocols are routed on interface e0 ?

a. router# sh int e0 irbb. router# sh int e0 bridgec. router# sh int e0 spand. router(config)# sh int e0 irbe. router(config-if)# sh bridge irb

ans: A

Q. True/False: A protocol can be routed and bridged on the same interface.

ans: False

Q. You want to know the IP address of the bvi1 interface. Which command ?

a. router# sh bvi1 ipb. router# sh ip bv1c. router# sh int bvi1d. router# sh int bvi1 protocole. router# sh protocol int bvi1

ans: C

Q. Which command will disable bridging of appletalk on bvi 3. (Type the command. NOT a multiple choice question)

ans: router(config)# no bridge 3 bridge appletalk

Q. IRB stands for __________________ ?

a. Integrated Routing and Bridgingb. Incorporated Routed Bridgingc. Integrated Routing on Broadbandd. Internetworkwide Routing and Bridging

NOTE: The same router routes and bridges the same protocol

Q. What is the range of numbers for logical interfaces ?

a. 0-3b. 1-4c. 0-31d. 1-32e. 0-(2^31-1)

ans: E

NOTE: BVI interfaces are logical interfaces

Q. Which limitation does bvi interfaces overcome ?

a. backup dialer interfaces cannot be used for normal dialupsb. IOS can not bridge and route the same protocol. c. IOS can not bridge more than 2 protocolsd. IOS can not bridge more than 2 interfaces

ans: B

Q. Which logical interface in necessary for IRB ?

a. nullb. tunnelc. loopbackd. dialere. bvi

ans: E

OBJ. 61. DESCRIBE THE BASIC FUNCTION OF SOURCE-ROUTE BRIDGING (SRB)

Q. What is the most common use of SRB ?

a. to connect 2 or more ethernet networksb. to connect 2 or more token ring networksc. to connect 2 or more FDDI ring networksd. to connect 1 ethernet and 1 token ring networkse. to connect 1 ethernet and 1 FDDI ring networks

ans: B

Q. 3 types of explorer packets are:

a. local explorer packetsb. remote explorer packetsc. bridge explorer packetsd. spanning explorer packetse. all-routes explorer packets

ans: A,D,E

Q. RIF stands for _____________________ ?

a. Re-route Information Fieldb. Route Information Fieldc. Routing Integrated Fieldd. Reduced Intermedia Frame-exchange

ans: B

Q. RII stands for ______________________ ?

a. Re-route Information Indicatorb. Routing Information Indicatorc. Route Integration Indicatord. Reduced Intermedia Integration

ans: B

NOTE: It is the most significant bit in the source MAC address and is set by the source

Q. RIF is supported in ______________ ?

a. Ethernet, but not in Token Ringb. Token Ring, but not in Ethernetc. Neither Token Ring and Ethernetd. Both Ethernet and Token Ring

ans: B

OBJ. 62. CONFIGURE SRB

Q. Command to enable the explorer packet processing queue and to specify queue depth of 20 ? (Type the command. NOT a multiple-choice question)

ans: router(config)# source-bridge explorerq-depth 20

Q. Comamnd that disables IP routing ?

a. disable routing ipb. disable ip routing

c. no routing ipd. no ip routinge. ip no routing

ans: D

Q. Which command enables generation of RIFs for IP frames on interface tokenring 0.

a. router(config-if)# multiring ipb. router(config-if)# ip rifc. router(config-if)# ip rif ond. router(config-if)# protocol ip rife. router(config-if)# rif

ans: A

Q. How do you enable IBM bridging protocol for bridge group 5 when you configure SRB.

a. router(config)# srb 5 ibmb. router(config)# srb 5 protocol ibmc. router(config)# bridge 5 ibmd. router(config)# srb bridge 5 protocol ibme. router(config)# bridge 5 protocol ibm

ans: E

Q. Command that enables spanning explorer on an interface ?

a. router(config-if)# srbb. router(config-if)# source-bridgec. router(config-if)# spanning srbd. router(config-if)# source-bridge spanninge. router(config-if)# spanning source-bridge

ans: D

Q. You have 2 token ring interfaces with the ring numbers 99 and 100. You want to setup SRB between these interfaces (bridge# 2). What comamnd would you run on the inetrface with the ring number 99 ? (Type the command. NOT a multiple-choice question)

ans: router(config-if)# source-bridge 99 1 100

Q. You are configuring SRB. How do you set path cost of 20 for an interface

for the spanning tree. Assume that this interface is in bridge-group 5.

a. router(config-if)# source-bridge spanning 5 path-cost 20b. router(config-if)# srb spanning 5 path-cost 20c. router(config-if)# source-bridge 5 path-cost 20d. router(config-if)# source-bridge spanning path-cost 20e. router(config-if)# source-bridge spanning 5 cost 20

ans: A

Q. If you are configuring SRB with more than 2 interfaces, what do you have to do ?

a. not possibleb. nothing aditional needs to be done just because there are more than 2 interfaces involvedc. create a source-bridge between each combination pair possibled. create a virtual ringe. use SRT

ans: D

Q. command to prohibit IP source routing ?

a. no ip source-routeb. no source-routec. no source-route ipd. no protocol ip source-route

ans: A

OBJ. 63. CONFIGURE SOURCE-ROUTE TRANSPARENT BRIDGING (SRT)

Q. What command turns on Source-Route Transparent Brdiging ?

a. no such commandb. source-routec. source-route transparentd. srt

ans: A

NOTE: configuring SRT is just a combination of configuring SRB and Transparent Bridging.

Q. You have configured SRT. Which state best describes how the packets will be handled ?

a. if the packet can be bridged, it is bridge. Or else, it is routed to its destinationb. if the the packets come with SRB routing info, SRB is used. else transparent bridging is used.c. packets are bridged and translated , unless it comes with SRB routing info.d. packets are bridged transparently unless SR/TLB is also configured.

ans: B

Q. SRT stands for ____________________________ ?

a. Source Route Transparent-Bridgingb. Source Route Translational Bridgingc. Serial Router Transparent Bridgingd. Source RARP Translational Bridging

ans: A

Q. T/F: Token Ring to Ethernet communication is possible by SRT.

ans: Flase

OBJ. 64. CONFIGURE SOURCE-ROUTE TRANSLATIONAL BRIDGING (SR/TLB)

Q. Command to define a "virtual ring" for the token ring interfaces: (Assume the virtual ring number will be 5)

a. router(config)# source-bridge access-ring 5b. router(config)# source-bridge virtual-ring 5c. router(config)# source-bridge ring-group 5d. router(config)# source-route ring-group 5

ans: C

Q. Your router's token ring interfaces are configured into a SRB

(#2)(. You have defined a virtual ring for your token ring interfaces as ring-group 3. Your ethernet interfaces are bridged into transparent bridge group 1. You want to configure SR/TLB. Which of the following command would do ?

a. router(config)# sr-tlb transparent 3 4 2 1b. router(config)# sr-tlb transparent 4 3 2 1c. router(config)# source-bridge transparent 3 4 2 1d. router(config)# source-bridge transparent 4 3 2 1e. router(config)# source-bridge 3 4 2 1

ans: C

Q. You are configuring SR/TLB. You have done the following:

1. configure a transparent bridge between your ethernet interfaces 2. configure a SRB between your token ring interfaces 3. used "source-bridge transparent" command to configure SR/TLB

which step did you miss ?

a. creating a virtual bridge among all te ethernet and token ring interfacesb. creating a virtual ring for the token ring interfacesc. creating a virtual bridge for the ethernet interfacesd. issue " source-bridge translation" command

ans: B

Q. OUI stands for ____________________ ?

a. Organizational Unit Identifierb. On Undefined Interfacec. One Unit Interfaced. Online Unit Identifier

ans: A

NOTE: Optional parameter for "source-bridge transparent" command

Q. How many path(s) is(are) allowed between SRB and transparent bridge groups when SR/TLB is configured ?

a. 0b. 1c. 2

d. 3e. 4

ans: B

NOTE: to avoid potential loops

Q. SR/TLB stands for _____________________ ?

a. Source Route Translational Bridgingb. Source Route Transparent Bridgingc. Source Route Tertiary-layer Bridgingd. Serial Router Translational Bridginge. Segmented Route Tertiary-layer Bridging

ans: A

OBJ. 65. VERIFY SRB OPERATION

Q. When you run "show source-bridge", you will see "srn", "bn", and "trn" columns for each interface in the "Local Interfaces" section. What do they mean ?

a. type of interfaceb. whether or not the interface is part of the virtual ringc. where source-route information is forwarded from this interfaced. state of the interface

ans: C

Q. You ran 'show rif", but no RIF timeout value is shown. What is the default RIF timeout ?

a. 1 minuteb. 5 minutesc. 10 minutesd. 15 minutese. 30 minutes

ans: D

Q. You ran "show rif". You see the following as part of the output.

Hardware Addr. How Idle(min) Routing Information Field 00.80.1a.2b.3c.4d rg2 5 00:80:1a.2b.3c.4e

How was this RIF learned ?

a. via 00.80.1a.2b.3c.4db. via Ring Group 2c. via 00.80.1a.2b.3c.4ed. you can not determine the answer to this question from the information given above

ans: B

Q. You ran "show rif". You see the following as part of the output.

Hardware Addr. How Idle(min) Routing Information Field 00.80.1a.2b.3c.4d rg2 5 00:80:1a.2b.3c.4e

What does the "5" mean in the Idle column ?

a. 5 seconds since the last direct response from 00.80.1a.2b.3c.4db. 5 minutes since the last direct response from 00.80.1a.2b.3c.4dc. 5 minutes since any packet went out to 00.80.1a.2b.3c.4dd. 5 seconds since any packet went out to 00.80.1a.2b.3c.4d

ans: B

Q. You ran "show rif" on your router. How would a cached entry be represented ?

a. -b. +c. *d. positive integer

ans: D

Q. Which 2 commands are enoough to find out how your router (using SRB) finds a node with a given IP ?

a. show arpb. show ip routec. show interfaced. show rife. show source-bridge

ans: A,D

NOTE: "show arp" command will yield the MAC address. "show rif" commmand will yield the path info.

Q. You ran "show rif" command. Which codes would indicate "router's own interface" and "static entry" respectively ?

a. - , +b. + , *c. * , -d. + , -e. - , *

ans: C

Q. Which command shows the RIF entry for each node ? (Type the statement; NOT a multiple choice question)

ans: router# show rif

Q. You ran "show source-bridge" and you see the following in the "Local Interfaces" section:

receive transmit srn bn trn r p s n maxhops cnt cnt drops TR0 * 10 7

what does the "*" in the "r" column mean ?

a. ring-group has been assigned to this interfaceb. ring-group has not been assigned to this interfacec. at least one node reachable via this interface is without its RIF entryd. no node reachable via this interface is without its RIF entry

ans: A

OBJ. 66. IDENTIFY POTENTIAL SOURCES OF CONGESTION IN AN APPLETALK NETWORK

NOTE: There is really not much to know about this objective as it states except the fact that appletalk is chatty by its nature.

Appletalk talk is chatty because it does many functions automatically which have to configured and maintained in other protocols. However, this objective may be way for Cisco to ask general appletalk questions, especially since appletalk is not covered in CCNA exam.

Q. Equivalent of which of the following services are provided automatically in appletalk. Choose 3.

a. DNSb. RIPc. HTTPd. DHCPe. VLAN

ans: A,D,E

Q. You to know the MAC addresses of the Macintosh computers your router knows about ? Which command ?

a. sh appletalk b. ah appletalk arp c. sh arp appletalkd. sh arp e. sh mac ans: B

Q. Which protocol from the appletalk protocol suite makes sure each node gets a unique node address ?

a. ATPb. AURPc. DDPd. RARPe. RTMP

ans: C

Q. In appletalk, the network address and the node address are ____ and ___ bits long ?

a. 4, 12b. 4, 16c. 6, 16

d. 8, 12e. 8, 16

ans. E

Q. Name the protocol from the appletalk protocol suite that is "roughly" equivalent to "ARP" ?

a. AURPb. ATPc. DDPd. RARPe. RTMP

ans: D

Q. ATP = ?

a. A protocol that provides guaranteed transaction services between socketsb. A protocol that translates layer 3 addresses to layer 2 addressesc. A protocol that translates layer 2 addresses to layer 3 addressesd. A protocols that translates between names and layer 3 addresses

ans: A

NOTE: Stands for Appletalk Transaction Protocol

Q. AURP stands for ______________________ ?

a. Appletalk Unique Routing Protocolb. Appletalk Update-based Routing Protocolc. Appletalk Unit Routing Protocold. Appletalk Unit Resolution Protocol

ans: B

Q. DDP stands for _________________________ ?

a. Datagram Delivery Protocolb. Dedicated Datagram Protocolc. Data Delivery Protocold. Datagram Detection Protocol

ans: A

NOTE: Network Layer protocol in the appletalk protocol suit that is responsible for socket to socket delivery of datagrams over an appletalk network.

OBJ. 67. CONFIGURE ZONE FILTERS

Q. 2 ways to configure zone filtering are :

a. GZI filteringb. ZIP replying filteringc. GZL filteringd. gleaninge. ATP filtering

ans: A,B

Q. GetZoneList filters filter between _______ and routers and ZIP replying filters filter between _______ and routers.

a. routers, clientsb. sockets, clientsc. clients, socketsd. sockets, routerse. clients, routers

ans: E

Q. You have already defined an accesslist (#650) that denies zone named "admin". How do you apply this access-list to an interface as ZIP replying filter ? (Type the statement; NOT a multiple choice question)

ans: router(config-if)# appletalk zip-reply-filter 650

Q. You have already defined an access-list (#650) that denies zone named "admin". How do you apply this access-list to an interface as a GZL filter ?

a. router(config-if)# getzonelist-filter 650b. router(config-if)# appletalk gzl 650c. router(config-if)# appletalk getzonelist-filter 650d. router(config-if)# appletalk gzl-group 650

ans: C

Q. You want to know which appletalk zones your router knows about. Which command would you issue ?

a. sh appletalk zoneb. sh zonesc. appletalk zonesd. appletalk show zonese. show ddp zones

ans: A

OBJ. 68. CONFIGURE RTMP FILTERS

Q. RTMP filter controls what ______ info a router advertises.

a. socket b. appletalk zonec. cable-ranged. macip

ans: C

Q. You have defined an access-list (#650) that will filter out cable- ranges 180-182 from the advertisements of your router. You have applied this access-list to an interface with the following command :

router(config-if)# appletalk distribute-list 650 in

What will this do ?

a. filter out packets going out to cable-range 180-182b. filter out packets coming from cable-range 180-182c. filter out routing updates coming from cable-range 180-182d. filter out routing updates going to cable-range 180-182

ans: C

Q. You are defining an access-list to filter appletalk traffic. You have defined the following statement so far.

access-list 650 deny cable-range 180-182

What else do you have to add to this to allow all traffic from all other zones.

a. nothingb. access-list 650 permit additional-zonesc. access-list 650 permit other-zonesd. access-list 651 permit additional-zonese. access-list 650 permit any any

ans: B

Q. Which command will instruct your router not to send any rtmp packets at all from an interface. (Type the statement; NOT a multiple choice question)

ans: router(config-if)# no appletalk send rtmps

Q. Name 3 protocols from the appletalk protocol suite that map to the network layer of the OSI model ?

a. ATPb. DDPc. DNSd. RARPe. RTMP

ans: B,D,E

Q. What is the default routing protocol for Appletalk ?

a. RIPb. RTMPc. EIGRPd. OSPF

ans: B . RTMP is proprietory and it was derived from RIP.

OBJ. 69. CONFIGURE NBP FILTERS

Q. You need to control access to a Mac file server in your appletalk network. What kind of filter would you use ?

a. zone filter

b. RTMP filterc. NBP filterd. Not possiblee. None of the above

ans: C

Q. Construct an access-list statement that prevents forwarding of NBP packets that come from any LaserWriter printer.

a. access-list 650 deny nbp 1 type LaserWriterb. access-list 550 deny nbp 1 type LaserWriterc. access-list 650 deny nbp 1 LaserWriterd. access-list 650 deny nbp 1 type Printere. It is not possible to define such specific statement

ans: A

Q. You are configuring an NBP access list. Construct a statement (access-list) that prevents forwarding of all NBP packets that have not not been explicitely permitted in the statements defined beforehand. (Type the statement. NOT a multiple-choice question)

ans: access-list 650 deny other-nbps

Q. Name the protocol from the appletalk protocol suite that is "roughly" equivalent to DNS ?

a. AURPb. ATPc. NBPd. RARPe. RTMP

ans: C

Q. Name 2 protocols from the appletalk protocol suite that map to the transport layer of the OSI model and above ?

a. DDPb. NBPc. RARPd. RTMPe. ZIP

ans: B,E

OBJ. 70. CONFIGURE CHANNELIZED T1 and E1 CONFIGURATION

Q. Which command will show you whether T1 lines are up, framing in each T1 line, Linecode in each T1 line etc. ? (Type the command. NOT a multiple-choice question)

ans: show controller t1

Q. What are the available linecode types for E1 ? Choose 2.

a. AMIb. B8ZSc. HDB3d. crc4e. no-crc4

ans: A,C

Q. You have purchased 8 time slots (1,5,15,16,17,18,19,20) for your E1 line. What command would you run when you are configuring the controller interface to reflect this fact. Speed of each channel is 64 Kbps.

a. router(config-if)# channel-group 1 timeslots 8 1,5,15-20 64b. router(config-if)# controller 1 timeslots 8 1,5,15-20 speed 64c. router(config-if)# channel-group 1 channel 8 1,5,15-20 speed 64d. router(config-if)# channel-group 1 timeslots 8 1,5,15-20 speed 64e. router(config-if)# channel-group 1 timeslots 1,5,15-20 speed 64

ans: D

Q. 2 types of Frame Types available when you are configuring T1 are :

a. Super Frameb. crc4c. no-crc4d. Extended Super Framee. australia

ans: A,D

Q. Your T1 line uses B8ZS linecode. What command would you run to reflect this fact ? (Type the command. NOT a multiple-choice question)

ans: router(config-if)# linecode b8zs

NOTE: This is to be done on the T1 controller interface.

OBJ. 71. CONFIGURE ISDN PRI CONFIGURATION COMMANDS

(NOTE: see also OBJECTIVE 47 questions)

Q. Which command displays type of isdn switch and layer 1-3 status ?

a. sh isdn serviceb. show isdn statusc. sh isdn protocold. sh isdn controllere. sh isdn channel

ans: B

Q. What command shows PRI B-channel status ? (Type the command. NOT a multiple-choice question)

ans: show isdn service

Q. PRI channel 5 map to pri-group timeslot _ ?

a. 3b. 4c. 5d. 6e. 7

ans: D

NOTE: PRI channels 0-23 map to pri-group timeslot 1-24

Q. All B channel in an ISDN PRI interface are automatically bundled into a _________ interface ?

a. controllerb. channelc. tunneld. dialere. payload

ans: D

Q. To configure a T1-based PRI, one should apply the configuration commands to the PRI D channel, that is, interface ________ ?

a. serial0b. seriald0c. serial23d. serial24e. serial0:23

ans: E

Q. You are using AT&T 5ESS switch for PRI access. Which command would reflect this fact.

a. router# isdn switch-type primary-5essb. router(config)# isdn switch-type primary-5essc. router(config-if)# isdn switch-type primary-5essd. router(config-if)# isdn switch-type basic-5esse. router(config)# isdn switch-type att-5ess

ans: B

Q. If you are using PRI , what pri-group command must be entered in the "controller T1 0" section ?

a. router(config-if)# pri-group timeslots 1-24b. router(config-if)# pri-group timeslots 0-23c. router(config-if)# pri-group time slots 0-23d. router(config-if)# pri-group time slots 1-24e. router(config)# pri-group timeslots 1-24

ans: A

NOTE: Enable PRI services on Cisco IOS NAS by configuring the T1 controller(s).