FINAL CCNA2 VERSI 2
1. What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
*to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
2. Which service team in an ISP is responsible for determining if the new customer has hardware that will support the new WAN connection and if new WAN circuits need to be installed?
*planning and provisioning
network operations center
3. Which statement describes a route that has been learned dynamically?
*It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
4. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?
*a default route
a directly connected route
a dynamically updated route
a static route to the destination network
5. Which routing protocol facilitates the exchange of routing information between different autonomous systems?
6. Which routing protocol excludes the subnet information from routing updates?
7. Why is the OSI model useful in network design and assessment?
It combines specific networking tasks into a complex format.
It defines the four lower layers, which standardize applications supported within the model.
It is used during troubleshooting to focus on the entire networking process instead of a single layer.
*It divides networking communications into multiple processes that are smaller and more manageable.
8. Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)
9. A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
10. Refer to the exhibit. The network administrator must set up a network with two subnets. In network A, the network administrator selects the network address 192.168.1.128/26. Which address combination should the administrator select in network B to accommodate the same number of hosts as in network A?
11. How many host addresses may be assigned on each subnetwork when using the 188.8.131.52 network address with a subnet mask of 255.255.248.0?
12. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)
Network A broadcast address 192.168.1.32
*Network A broadcast address 192.168.1.47
Network A broadcast address 192.168.1.15
*Network B broadcast address 192.168.1.207
Network B broadcast address 192.168.1.240
Network B broadcast address 192.168.1.192
13. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
*There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.
14. What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
*It allows multiple hosts on a single LAN to share globally unique IP addresses.
15. Refer to the exhibit. The PC tries to ping router B at 192.168.2.2, but the ping fails. What is the problem?
*The address of the PC is on the wrong subnet.
The subnet mask of the PC should be 255.255.255.0.
The default gateway should be 192.168.2.1.
The DNS server is incorrect.
16.The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:
C 192.168.4.0/24 is directly connected, Serial0/0
R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
C 192.168.3.0/24 is directly connected, Serial0/1
From which router was this command executed?
17. Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces are properly configured, but neither router is receiving routing updates. What two things can be done to solve the problem? (Choose two.)
*Configure the routing protocol on R1 for network 10.0.0.0.
*Configure the routing protocol on R2 for network 10.0.0.0.
Configure the routing protocol on R1 for network 192.168.4.0.
Configure the routing protocol on R1 for network 192.168.2.0.
Configure the routing protocol on R2 for network 192.168.1.0.
Configure the routing protocol on R2 for network 192.168.3.0.
18. Refer to the exhibit. Static routes have been configured on all routers in the network. PC2 can communicate with PC1 but not with PC3. What should be done to remedy the problem?
Reconfigure the first static route with the exit interface S0/0/0.
*Reconfigure the second static route with the exit interface S0/0/1.
Reconfigure the first static route with the next hop address 172.16.3.1.
Reconfigure the second static route with the next hop address 172.16.3.1.
19. Refer to the exhibit. A technician has been assigned to configure RIPv2 as a routing protocol on the network. Users who are connected to the LAN network on router R3 can ping both S0/0/0 and S0/0/1 interfaces on R1 but are not able to ping the LAN network that is attached to R1. What could be the possible cause of the problem?
The version 2 command was not issued when RIP was configured on router R1.
The ip address command was not issued when interfaces S0/0/0 and S0/0/1 were configured on router R1.
The no shutdown command was not issued when interfaces S0/0/0 and S0/0/1 were configured on router R1.
*The network 172.16.10.0 command was not issued when RIP was configured on router R1.
The no auto-summary command is required on router R1.
20. Different hosts connect to the same switch port at different times. If the switch port is configured with dynamic port security, how does it process the MAC addresses?
The addresses are manually assigned with the use of the switchport command.
*The addresses are dynamically learned and stored in the address table.
The addresses are dynamically configured and saved in the running configuration.
The addresses are stored in the address table and added to the running configuration.
21. Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
The router will send a TCP acknowledgment message to workstation A.
Workstation B will send a UDP ping reply message to the router.
*Workstation A will send an ICMP echo request message to workstation B.
*Workstation B will send an ICMP echo reply message to workstation A.
22. Refer to the exhibit. What two conclusions can be drawn about router RTB? (Choose two.)
The router is connected to a router named Boise.
*Router RTB is connected to a Cisco 1841 router.
Router RTB is directly connected to two other routers.
*The IP address of the router interface that is connected to router RTB is 192.168.2.6.
The RTB router is connected to two Cisco devices by FastEthernet links.
23. If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?
*load the IOS from flash
load the IOS from NVRAM
load the IOS from the TFTP server
load the startup configuration file from flash
load the startup configuration file from NVRAM
load the startup configuration file from the TFTP server
24. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?
25. Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of the show running-config command on router RTB, why is the Telnet session failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
*No password has been configured on the VTY lines.
A session limit has not been configured for Telnet.
26. Refer to the exhibit. What will be the effect of the configuration commands if entered on R2?
In-band management access to R2 is configured.
*The user will be able to console into R2 using the password cisco.
The user will be able to telnet into R2 by using the password cisco.
Secure access to R2 for router management via SSH is configured.
27. An administrator wishes to protect a router by encrypting the console access password noaccess. Which command should be used?
Router(config)# enable secret noaccess
Router(config)# enable password noaccess
Router(config-line)# password noaccess
*Router(config)# service password-encryption
28. Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)
RTB# ip address 192.168.102.98 255.255.255.248
RTB(config-if)# ip address 192.168.102.99 255.255.255.252
RTB(config)# ip address 192.168.102.97 255.255.255.252
RTB(config)# no shutdown
*RTB(config-if)# no shutdown
*RTB(config-if)# ip address 192.168.102.97 255.255.255.252
29. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
*The network administrator has attempted to configure the serial interface with a broadcast address.
The same IP address has been configured on another interface.
30. Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice?
31. In a structured cable system, which term describes the cable that connects the wall jack in the user work area to the patch panel in the wiring closet?
32. What is the maximum unrepeated distance set by industry standards for UTP cable?
33. Which statement is true about the reverse lookup DNS zone?
It is most commonly experienced when users are surfing the Internet.
It is the backup for the forward lookup zone.
It dynamically updates the resource records.
*It resolves an IP address to a fully qualified domain name.
34. Which statement describes a feature of TCP?
It provides low overhead data delivery.
*It acknowledges the receipt of packets.
It does not provide error checking.
It is a connectionless protocol.
35. Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission?
36. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?
37. Which statement is correct about the proxy support that is offered by the HTTP protocol?
It allows clients to make direct network connections to other network services.
*It filters unsuitable web content.
It reduces the speed of the network.
It encrypts the data that is being transmitted.
38. In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
the server name where the resource is located
the protocol that is used for the resource request
the domain name of the server that is being accessed
*the folder where the requested resource is stored
39. A network administrator must access a remote Linux server at the branch office to troubleshoot a web service configuration issue. Which secure protocol would be used?
40. When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?
41. Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical bandwidth?
42. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
*branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
43. The command copy tftp running-config has been entered on the router. What will this command do?
copy the configuration in RAM to a server
*copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
44. A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with differential backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?
45. What is a characteristic of Syslog?
It requires users to prove their identity with the use of a username and password before users can access network resources.
It listens to network traffic and sends an alert to a management station to track which applications are used and the length of time for which they are used.
*It enables devices to send information to a daemon that runs on a management station.
It provides users the rights to access specific resources and perform specific tasks.