ipx router EIGRP 1 ipx router EIGRP 1 Will a workstation connected to Router 1 be able to attach to a server attached to the Ethernet interface on Router 2, assuming that the Frame Relay
Trang 1
Fravo.com
Certification Made Easy
MCSE, CCNA, CCNP, OCP, CIW, JAVA, Sun Solaris, Checkpoint
World No1 Cert Guides
Trang 2Congratulations!!
You have purchased a Fravo Technologies Study Guide
This study guide is a complete collection of questions and answers that have been developed by our professional & certified team You must study the
contents of this guide properly in order to prepare for the actual certification test The average time that we would suggest you for studying this study guide is approximately 15 to 20 hours and you will surely pass your exam We guarantee it!
If you use this study g uide correctly and still fail the exam, send a scanned copy
of your official score notice at: info@fravo.com
We will gladly refund the cost of this study guide or give you an exchange of study guide of your choice of the same or lesser value
This material is protected by copyright law and international treaties
Unauthorized reproduction or distribution of this material, or any portion thereof, may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under law
© Copyrights 1998-2005 Fravo Technologies All Rights Reserved.
http://www.fravo.com
Trang 3Q1 Consider the length of the netmask of a route, the administrative distance and the metric, what comes first when the router performs a route lookup in order to decide which interface to be forwarded a packet out of?
A The length of the netmask of a route
B The administrative distance
Trang 4ipx router EIGRP 1
ipx router EIGRP 1
Will a workstation connected to Router 1 be able to attach to a server attached to the Ethernet interface on Router 2, assuming that the Frame Relay PVCs are up and running?
A No - Redistribution has not been configured between EIGRP and RIP
B No - EIGRP will not run correctly over the Frame Relay cloud
C No - The GNS response delay is configured on the wrong router
D No - The IPX routing command is not matching the Ethernet's MAC address
E Yes
Answer: D
Q3 Routers A, B, and C are running IGRP over frame relay connections No
subinterfaces are used, and a single IP subnet is used for all the Frame Relay interfaces Router A is able to see routers from both Router B and Router C, but Router B and Router C cannot see routers from each other
Which could be causing this problem?
A Router A is missing frame maps
B Router B and Router C are missing frame maps
C Split-horizon is enabled on Router A
D Split-horizon is disabled on Router A
Answer: C
Q4 Transparent bridges forward, flood, or drop frames based upon entries in the bridge table, which may be dynamically added to or removed from the table
Trang 5Which statements are TRUE regarding bridge table entries?
A Bridge table entries are learned by examining the destination MAC address of each frame
B Bridge table entries are learned by examining the source MAC address of each frame
C Increasing the bridge table aging time would result in a reduction of flooding
D Decreasing the bridge table aging time would result in a reduction of flooding
E It is important to ensure that the aging time is less than the aggregate time to detect and recalculate the spanning tree
A Routers are DTEs and NEVER supply clock to T1 /E1 line
B clock source identifies the stratum level associated with the router T1 /E1 and
the default us Stratum 1
C clock source chooses a source for the interface to clock outbound data
The default is clock source line -Specifies that the T1 /E1 link uses the recovered clock from the line
D clock source chooses a source for the interface to clock buffered data
The default is clock source loop-timed-Specifies that the T1 /E1 interface takes the clock from the Tx (line) and uses it for Rx
Answer: C
Q7 How does a router behave in relation to an EIGRP stub neighbor?
A It will send only default-routes toward stub EIGRP neighbors
B It well send only summary routes toward stub EIGRP neighbors
C It will not query the stub EIGRP neighbor about any internal route
D It will not query the stub EIGRP neighbor about any external route
E It will not query the stub EIGRP neighbor about any route
Answer: E
Trang 6Q8 Current configuration:
!
version 12.0
service timestamps debug uptime
service timestamps log update
no service password-encryption
!
hostname Simon
enable secret 5 $1$XV53$hqb0Ra7gwpky0cmL4u3EW0
enable password cisco
Given the configuration shown above, what should you type to gain enable access on router Simon?
A TACACS+ uses UDP while RADIUS uses TCP for transport
B RADIUS only encrypts the password field of the packet while TACACS+ encrypts the entire body of the packet
C RADIUS is an IETF standard, while TACACS+ is not
D TACACS+ sends a separate request for authorization, while RADIUS uses the same request for authentication and authorization
Answer: A
Q10 Which statement is true?
A PNNI has QoS awareness and has layer two reachability support
B PNNI ignores QoS and supports both layer two and three routing
C PNNI supports redistribution of IP routes to ATM routing tables and route
Trang 7Router 1 and Router 2 are configured to use IPSec for securing traffic between network X and network Y
What is the correct crypto access-list that needs to be configured on Router 1?
A access-list 101 permit ip host 192.168 1.1 host 192.168.1.2
B access-list 101 permit ip 10.1.1.0.0.0.0.255 host 192.168.1.2
Q12 What does the EIGRP Feasibility Condition mean?
A The FD must be unique
B The FD must be higher than zero
C The FD must be equal to RD
D The RD must be lower than FD
E None of the above
Answer: D
Q13 Which are the primary reasons to use traffic shaping? (Choose two.)
A To control the maximum rate of traffic transmitted or received on an interface
B To control access to available bandwidth
C To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits
D To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets
E To ensure that traffic conforms to the policies established for it
Trang 8Answer: B, E
Q14 There is a point-to-point ISDN link between Routers A and B Router A must be able to dial Router B, but Router B must NOT be able to dial Router A
What will accomplish this?
A Use an IP access-list with the access-group command on the interface
B Remove the dial string from Router B
C Use the no-dial keyword on the interface
D Use the same IP address on both sides of the link
Q16 What is true about Custom Queuing?
A Custom queuing will always empty a queue before proceeding to the next queue
B Custom queuing can be used to restrict a particular type of traffic to a given bandwidth regardless of the load on that link
C Custom queuing looks at groups of packets from the same source-destination pair
D Custom queuing can prevent one type of traffic from dominating a busy link
Answer: D
Q17 In Frame Relay traffic shaping, the bc and be parameters are expresses as:
A Bits per second
B Bits per interval
C Bytes per second
D Bytes per interval
Answer: B
Q18 What effect do these configuration commands have?
line vty 0 4
no login
Trang 9password cisco
A The VTY password is cisco
B The login password is login
C The VTY password is required but not set
D No password is required for VTY access
Answer: D
Q19 What statement is TRUE regarding Fast Ethernet Channel?
A Ports within a Fast Ether Channel do not have to be the same speed and duplex
B Port Aggregation Protocol (PAGP) facilitates the automatic creation of Fast Ether channels links
C Fast Ethernet Channels cannot be configured as a trunk
D Ports within a Fast Ether Channels cannot be configured as a trunk
E Ports within a Fast Ether Channel can be assigned to multiple VLANs
ip pim send-RP-announce loopback0 scope 16 group-list 1
ip pim send-RP-discovery loopback0 scope 16
access-list 1 permit 239.0.0.0 0.255.255.255
Trang 10RouterR2:
ip multicast-routing
interface loopback 0
ip address 192.168.1.2 255.255.255.0
ip pim send-RP-announce loopback0 scope 16 group-list 1
ip pim send-RP-discovery loopback0 scope 16
Trang 11Q23 In a PIMv2 Sparse Mode network, the "incoming interface" for a (*, G) mroute entry is calculated using:
A The address of the source
B The address of the PIM neighbor that send the PIM (*, G) Join message
C The address of a directory connected member of group "G"
D The address of the currently active Rendezvous Point for group "G"
E The address of the Mapping Agent
Trang 12Frames originating from the Ethernet device would contain which ring numbers, when observed on the Token Ring?
A Ring 10, Ring 2, and Ring 200
B Ring 200, Ring 100, and Ring 2
C Ring 100, Ring 200, and Ring 10
D Ring 10, and Ring 2
E Ring 2, Ring 200, and Ring 1
Q26 Exhibit: (Refer the EXHIBIT given below.)
After issuing the command set spantree root 1 on Switch R1 in the shown diagram, what scenario would be FALSE?
Trang 13A No other switch in the network will be able to become root as long as Switch R1 remains up and running in this topology
B Switch R1 will change its Spanning Tree priority to become the root for Vlan 1, only
C The port that used to be blocking on Switch R3 will, after the convergence, be changed to forwarding
D The link between Switch R1 and Switch R2 will remain forwarding even during the reconvergence of the Spanning Tree domain
Answer: A
Q27 Exhibit: (Refer the EXHIBIT given below.)
Host A is the only device that has an 8 bit network mask When Host A needs to send a packet to Host B, which are required in order for this to work?
Note: Assume both Router 1 and Router 2 have routing entries for all networks involved
A Host A needs to have its default gateway pointing to Router 1
B Host B needs to have its default gateway pointing to Router 2
C Proxy ARP needs to be enabled on Router 1
D Proxy ARP needs to be enabled on Router 2
Trang 14Q29 Exhibit: (Refer the EXHIBIT given below.)
In the example shown, what prevents the flow of (S, G) traffic from being Pruned and cutting off the flow to the receiver?
A Router C will hear the (S, G) Prune message from router B and will send an (S, G) join message to router A to override the Prune
B Router C will hear the (S, G) Prune message from router B and will send an (S, G) Join message to router B to override the Prune
C Router C will hear the (S, G) Prune message from router B and will send an (S, G) Graft message to router B to override the Prune from router B
D Router A will not respond to the (S, G) Prune because interface EO is in the outgoing interface list
E This is an error condition Router B would not send an (S, G) Prune because it would have heard a previous (S, G) Join message sent by router C
Answer: A
Q30 Which are examples for Physical WAN interface standards?
A EIA/TIA 232, EIA/TIA 449, RFC 1771, and V.35
B EIA/TIA 232, EIA/TIA 449, IEEE 802.3 and IEEE 802.5
C IEEE 802.3, IEEE 802.5, ISO 8648 and RFC 1771
D EIA/TIA 232, EIA/TIA 449, V.35, HSSI and EIA 530
Answer: D
Q31 Load sharing of VLAN traffic over parallel ISL trunks is:
A Not possible due to the nature of ISL
B Configurable on a per VLAN basis
C Configurable on a per packet basis
Trang 15D Automatic due to the nature of ISL and its interaction with the IEEE Spanning Tree protocol
Q33 Exhibit: (Refer the EXHIBIT given below.)
The client can ping through the GRE tunnel to the server and receive small files just fine, but large web page download and file transfer will fail "debug ip icmp" on Router 2 shows "frag needed on DF unreachable" messages sent to the server Which are possible solutions to this problem?
A If the physical link between Router 1 and Router 2 can support a MTU size
greater than 1524 bytes, then increase the interface MTU between the tunnel end points to greater than 1524
B Decrease the physical interface MTU between the tunnel end points to less than
1476 bytes
C Increase the IP MTU on the tunnel interfaces to 1500
Trang 16D Enable "ip unreachables" on all interfaces on Router 2
E Check to see if there is a filtering device between Router 2 and the server that's blocking ICMP messages
If so, change the filter rule to allow ICMP
Answer: A, E
Q34 What trunk mode combination would not produce an operational ISL trunk?
A Local: auto Remote: auto
B Local: on Remote: auto
C Local: nonegotiate Remote: nonegotiate
D Local: nonegotiate Remote: on
E Local: auto Remote: desirable
Answer: A
Q35 Exhibit: (Refer the EXHIBIT given below.)
In the MPLS network shown, which subnets would be in the same Forwarding Equivalence Class (FEC) on Router RS1:
A 172.16.3.0/24 and 192.1.1.0/28
B 172.16.1.0/24 and 172.16.2.0/24
C 172.16.1.0/24 and 193.1.1.0/28
D 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24
Trang 17Answer: C
Q36 A company has deployed a new e-commerce web farm They are using teamed servers that use multicast to maintain a heartbeat between redundant pairs All servers are in the 192.168.202.0/24 network For increased security, they require each pair of servers be allowed to see multicast/broadcast traffic from their default gateway and from each other No pair of servers should ever see any
broadcast/multicast traffic from any other pair of servers
Which is the best mechanism for the server ports to accomplish this?
Trang 18When the PC host sends a 1500 byte TCP packet with the DF (Don't Fragment) bit set to the Internet, what should Router 1 do when it tries to forward this packet to the serial interface?
A It should fragment the packet if it does not honor the DF bit since routers are not required to honor the DF bit
B It should not fragment this packet since the DF bit is set
It should drop the packet and wait for the host to dynamically decrease its MTU size
C It should fragment this packet, and send back ICMP type 3 code 4 (fragmentation needed but DF bit set) messages back to the host
D It should drop this packet, and send back ICMP type 3 code 4 (fragmentation needed but DF bit set) message back to the host
E It should drop this packet, and send back a TCP reset back to the host
access-list 100 permit icmp any any
In order to protect their network from Denial-of-Service attacks via ICMP floods, the command shown in the exhibit were configured This is an example of what QoS mechanism?
Trang 19Given the OSPF network shown above, packets from Router 2 to Router 4 will:
A Always go through Router 1
B Alternate between Router 1 and Router 3 if the costs are equal
C Choose a path depending on the costs inside Area 1 only
D Choose a path depending on the costs inside both Area 0 and Area 0
Trang 21A Router 1 would forward the UDP broadcast out both Serial 0 and Ethernet 1
B Router 1 would only forward the UDP broadcast out of Ethernet 1
C Router 1 would only forward the UDP broadcast out Serial 0
D Router 1 would not forward the UDP broadcast out any interface
MTU 1500 bytes, BW 1544 Kbit, DLY 20000, rely 255/255, load 1/255
Encapsulation FRAME-RELAY, loopback not set, keepalive set (35 sec)
LMI enq sent 7, LMI stat recvd 7, LMI upd recvd 0, DTE LMI up
LMI enq recvd 0, LMI stat sent 0, LMI upd sent 0
LMI DLCI 0 LMI type is ANSI Annex D frame relay DTE
FR SVC disabled, LAPF stat down
Broadcast queue 0/64, broadcasts sent/dropped 2/0, interface broadcast 0 Last input 00:00:30, output 00:00:30, output hang never
Last clearing of "show interface" counters never
Queuing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1 packets input, 24 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
Trang 224 packets output, 608 bytes, 0 underruns
0 output errors, 0 collisions, 4 interface resets
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
Serial 0.2 is down, line protocol is down
A The encapsulation type is not set to Frame - Relay
B The Frame -Relay lmi-type is set improperly
C The interface is configured with too many sub-interfaces exceeding IDB limits
D The DCD not set properly for a Frame-Relay circuit
E Keepalives are not set correctly on both ends
Answer: B
Q45 Suppose a network access server (NAS) is configured to use TACACS+ to provide user authentication service for remote access users The NAS get an ERROR
in response to its authentication request when: (Choose three.)
A The TACACS+ service is not running on the server
B The supplied user password is incorrect
C The username does not exist in the TACACS+ user database
D The NAS TACACS+ server key does not match that on the server
E The TACACS+ server is unreachable by the NAS
Answer: B, C, D
Q46 The BGP backdoor command:
A Changes the distance of an iBGP route to 20
B Changes the distance of an eBGP route to 200
C Changes the distance of an IGRP route to 200
D Changes the distance of an IGP route to 20
E Does not change the distance of the route
Answer: B
Trang 23Q47 Exhibit: (Refer the EXHIBIT given below.)
In the MPLS network shown, how many routing tables are on Router MS1?
Trang 24B The highest router-ID
C The lowest router-ID
D The highest SNPA
E The lowest system-ID
Q51 Exhibit: (Refer the EXHIBIT given below.)
Both End Stations and both Data Link Switching Plus (DLSW+) routers are in a common VLAN
The DLSW+ routers have peers to the Channel Interface Processor (CIP) router Both DLSW+ routers show they can reach the Host via 4000.2feb.0001 Users are having trouble maintaining their SNA sessions Their IP connectivity is unaffected
What DLSW+ feature would most likely fix the problem?
Trang 25A OSPF will not form any adjacency out if that interface but it will accept the
routing updates from the neighbors
B OSPF will form all the available adjacencies out of that interface but it wont install any of the learned routes in the local routing table
C OSPF will not form any adjacency out of that interface
D OSPF will behave as a passive adjacency at the requests coming from neighbors, lying out of the interface, ignoring all the incoming requests
E None of the above
Trang 26A The trunks need to be set to "on" or "nonegotiate"
B The VTP domain names carried in the Dynamic Inter-Switch Link (DISL)
messages are not the same
C The Unidirectional Link Detection timers are shorter than the Spanning Tree Protocol (STP) timers
D The native VLANs are the same
E The VLAN Trunk Protocol multicast address was set to 01-00-0c-cc-cc-cc
Answer: B
Q56 A network administrator is using a private IP address space for the network with NAT to allow the users to reach the Internet However, there is a web server on the internal network that must have incoming access from the Internet
What will be required to accomplish this?
A Put the web server's internal IP address in the external DNS records
B Use a dynamic mapping with the reverse keyword
C There must be a static NAT mapping for the web server's address
D Dynamic NAT will take care of this automatically
Answer: C
Q57 Exhibit: (Refer the EXHIBIT given below)
Router 1 shows EXCHANGE state for neighbor Router 2
Router 1 shows EXSTART state for neighbor Router 2
What is most likely reason for this EXCHANGE/EXSTART state?
A Multicast packets only travel one-way due to some type of failure
B There is an MTU mismatch
C Unicast packets only travel one-way due to some type of failure
D An access-list of some kind is blocking the OSPF DBD packets
E There is an OSPF network type mismatch
Answer: B
Q58 What command in interface configuration mode would you use to enable RSVP?
Trang 27A Determine which interfaces should be including in the outgoing interface list
B Prevent multicast traffic from looping through the network
C Prevent multicast traffic from being sent by unauthorized sources
D Establish the reverse flow path of multicast traffic from the receiver to the
source
Answer: B
Q50 What statement is FALSE with respect to the operation of Unidirectional Link Detection?
A It negotiates the Unidirectional Link Detection link state during physical signaling
B It performs tasks that autonegotiation cannot perform
C It works by exchanging protocol packets between the neighboring devices
D Both devices on the link must support Unidirectional Link Detection and have it enabled on respective ports
Answer: A
Q61 Exhibit of the output from an ASBR:
ASBBR#show ip ospf database external
OSPF Router with ID (5.5.5.5) (Process ID 10)
Type-5 AS External Link States
LS age: 15
Options: (No TOS-capability, DC)
LS Type: AS External Link
Link State ID: 100.10.1.0 (External Network Number)
Trang 28TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
And the following from a router in the network:
RouterCT1#show ip ospf border-routers
OSPF Process 10 internal Routing Table
Codes: i-intra-area route, I-Inter-area route
15.5.5.5(2) via 30.0.0.1, Serial0/0, ASBR, Area0, SPF 4
What is the metric for subnet 100.100.1.0/24 on Router CT1?
Q62 What statement is FALSE concerning the use of SPAN on the Catalyst 6500?
A It is possible to configure SPAN to have a Gigabit port, such as source port, and a 10/100 port as the destination port
B If the source port is configured as a trunk port, the traffic on the destination port will be tagged as well, regardless of the configuration on the destination port
C When a SPAN session is active the destination port does not participate in
Spanning Tree
D With SPAN an entire VLAN can be configured to be the source
E In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN
Trang 29Q64 An AT&T 5ESS N11 switch uses what terminal type of ISDN?
priority-list 1 protocol ip medium list 102
priority-list 1 protocol ip normal list 103
priority-list 1 protocol ip low list 104
priority-list 1 default low
access-list 101 permit ip any any precedence critical
access-list 102 permit ip any any precedence flash
access-list 103 permit ip any any precedence immediate
access-list 104 permit ip any any precedence priority
Given the settings shown in the exhibit, which queue will a packet tagged with IP Precedence value of 4 go into?
Trang 30There are DLSW+ peers between Routers 1 and 2, and Routers 2 and 3 Router 1 uses virtual ring number 50, while Routers 2 and 3 use virtual ring number 100 Clients on Ring 1 cannot reach a host on Ring 2
What could be causing this?
A The dlsw bridge-group command on Router 3 does not match the virtual ring
number
B Routers 2 and 3 cannot have the same virtual ring number
C Router 1 must have a virtual ring number of 100
D None of the above
Answer: C
Q67 Which are LANE Components that are used to logically establish a LANE network?
A LECS, redundant LECS, and BUS
B SSRP, UNI, NNI and LEC
C ILMI, AAL5, LANE and SSCOP
D BUS, LES, LEC and VCC
E LECS, LES, and BUS
Answer: E
Q68 Exhibit:
tamer (enable) show pvlan
Primary Secondary Secondary- Type Port
A Port 9/38 has Layer 2 connectivity with Port 9/39 but not with port 9/37
B Port 9/38 has Layer 3 connectivity with Port 9/39 but not with port 9/37
C Port 9/38 has Layer 3 connectivity with Port 9/37 and port 9/39
D Port 9/38 has Layer 2 connectivity with Port 9/37 and port 9/39
E None of the above
Answer: C
Q69 Exhibit:
2511a#show line 6
Trang 31Tty Typ Tx/Rx A modem Roty Acc0 Accl Uses Noise Overruns
6 TTY 9600/9600 14 59898 0/0
Line 6, Location: "", Type: ""
Length: 24 lines, Width: 80 columns
Baud rate (TX/RX) is 9600/9600, no parity, 1 stopbits, 8 databits
Status Ready
Modem state: Ready
Group codes: 0
Modem hardware state: CTS* noDSR* DTR RTS
Special Chars: Escape Hold Stop Start Disconnect Activation
Timeouts: Idle EXEC Idle Session Modem Answer Session Dispatch
Idle Session Disconnect Warning
never
Modem type is unknown
Session limit is not set
Time since activation: 1d04h
Editing is enabled
History is enabled, history size is 10
DNS resolution in show commands is enabled
Full user help is disabled
Allowed transports are lat pad telnet rlogin mop nasi Preferred is lat
No Output characters are padded
No special data dispatching characters
2511a#
A router has been configured as a Terminal Server Issues are encountered with line
6 due to spurious signals After reviewing the exhibit, what command would mist likely fix the issue?
Q70 A large number of these messages are seen on a Catalyst console:
%MLS-4-MOVEOVERFLOW:Too many moves, stop MLS for 5 sec(20000000)
%MLS-4-RESUMESC:Resume MILS after detecting too many moves
What is the least likely cause?
A Transitory Spanning Tree loop
B Unidirectional Fiber Link
C Faulty Switch Port
D Pinnacle Sync Failure
Answer: A
Trang 32Q71 Exhibit: (Refer the EXHIBIT given below.)
Routers 1 and 2 are running IPX using network number E115E on the link between them IPX EIGRP is enabled between the two routers with AS number 30 Then network administrator wants to disable IPX- RIP traffic across the link
What would accomplish this?
A Use the no network E115E statement under the ipx router rip statement
B IPX-RIP is automatically disabled by default when IPX-EIGRP is enabled
C Use the ipx rip passive-interface command on both sides of the link
D Put the network E115E statement under the ipx router eigrp 30 statement
Answer: A
Q72 Which statements about FTP are true?
A FTP always uses two separate TCP sessions - one for control and one for data
B With passive mode FTP, both the control and data TCP sessions are initiated from
Trang 34Router 2 can telnet to the command interface of the switch, but Router 1 cannot
What may be causing this problem?
A There is no VTP domain created on the Catalyst switch
B The command interface of the Catalyst is attached to the wrong VLAN
C There is no default route configured on the switch
D The IP address of the switch is incorrect
B Distance vector protocols have better convergence that link state protocols
C RIP is a distance vector protocol whereas RIP version 2 and OSPF are link state protocols
D Distance vector protocols only send updates to neighboring routers whereas link state protocols flood updates to all routers in the within the same routing domain
E Both distance vector and link state protocols will take link bandwidth and delays into account when calculating routes
Trang 35A Router 1 would forward the ICMP's out both serial 0 and Ethernet 1
B Router 1 would only forward the ICMP's out of Ethernet 1
C Router 1 would only forward the ICMP's out Serial 0
D Router 1 would not forward the ICMP out any interface
Answer: C
Q80 Using Transmission Control Protocol (TCP) encapsulation, when will the Data Link Switching (DLSW) peers go into CONNECT state?
A When test frame broadcasts are sent
B When the peers finish Capabilities Exchange
C Never- there is no such thing as the "CONNECT" state
D When the CUR/lCR exchange takes place
Answer: B
Trang 36Q81 IEEE 802.1D describes a method to prevent the disconnection of a single end station from disruption Spanning Tree What does the method describe?
A Re-setting the Topology Change flag to zero (0)
B Disabling the 801.1D Change Detection parameter
C Configuring the BridgeForwardDelay to 1/2 of the BridgeMaxage
D Using the BridgeForwardDelay timer to age out dynamic entries
Answer: B
Q82 Exhibit: (Refer the EXHIBIT given below.)
In the example shown, all hosts as well as the router, are IGMPv2 speakers Host 2 and Host 3 are both members of group 224.1.1.1 If Host 2 sends an IGMPv2 Leave message to leave group 224.1.1.1, the router will respond by:
A Sending an IGMPv2 Group Specific Query to 224.0.0.1
B Sending an IGMPv2 Group Specific Query to 224.1.1.1
C Sending an IGMPv2 General Query to 224.0.0.1
D Sending an IGMPv2 General Query to 224.1.1.1
E Sending an IGMPv2 Leave Acknowledgement to Host2
Answer: B
Q83 A new 10/100 NIC is being connected to a Catalyst 5000 switch port Which settings will result in the best connection?
A NIC: 100 Mbps & Full-duplex Catalyst: Auto
B NIC: Auto Catalyst: 100 Mbps & Full-duplex
C NIC: 100 Mbps & Half-duplex Catalyst: Auto
D NIC: 10 Mbps & Half-duplex Catalyst: 100 Mbps & Half-duplex
Trang 37Answer: C
Q84 What feature is provided by IOS NAT (Network Address Translation)?
A Dynamic network address translation using a pool of IP addresses, or port
address translation using a single IP address
B Destination based address translation using either route map or extended list
access-C Dynamic translation for DNS "A" and "PTR" queries
D Inside and outside source static network translation that allows overlapping
network address spaces on the inside and the outside
E All of the above
Answer: E
Q85 In Token Ring networks, Layer 3 IP Multicast addresses are mapped into Layer
2 Token Ring Mac addresses in which ways? (Choose two.)
A All IP Multicast addresses are mapped to broadcast MAC address FFFF.FFFF.FFFF
B All IP Multicast addresses are mapped to Functional Address C000.0000.0001
C All IP Multicast addresses are mapped to Functional Address C000.0004.0000
D All IP Multicast addresses are mapped to MAC addresses using the same method
as is used in Ethernet networks
E Configure the Ring Parameter server to set the I/G address to 1
Answer: C, D
Q86 Exhibit: (Refer the EXHIBIT given below.)
Trang 38Which configuration commands on Router 1 will allow a VoIP call from Phone 1 to Phone 2?
A dial-peer voice 3 voip
B Signalling and ILMI PVC's
C QoS type set to CBR+
D All of the above
Answer: B
Q88 Policing on a Fast Ethernet interface has been configured using Committed Access Rate (CAR) to allow for extended burst Traffic has been bursty and a packet arrives on the interface that causes the compounded debt to be greater than the extended burst
What statement is FALSE?
A The packet is dropped
B A token is removed from the token bucket
C The compounded debt value is effectively set to zero (0)
D The packet is not buffered by the CAR process
Answer: B
Q89 Exhibit: (Refer the EXHIBIT given below.)
Trang 39Router 1:
(*, 224.1.1.1), 00:00:03/00:00:00, RP 171.68.28.140, flags: SP
Incoming interface: Serial0, RPF nbr 171.68.28.191,
Outgoing interfaces list: Null
(171.68.37.121/32, 224.1.1.1), 00:00:03/00:02:56, flags FPT
Incoming interface: Ethernet0, RPF nbr 0.0.0.0, Registering
Outgoing interface list: Null
Which error conditions could cause the "Registering" indicator to never be cleared in the (S, G) entry show? (Choose two.)
A No receivers have joined multicast group 244.1.1.1
B PIM is not enabled on Router 2
C Router 2 has calculated the RPF interface for the source (171.68.37.121)
Pending 1/0 Status: None
EEPROM format version 1
VIP2 RSK controller, HW rev 2.02, board revision DO
Serial number: 17090200 Part number: 73-2167-05
Test history: 0x00 RMA number: 00-00-00
Trang 40Flags: cisco 7000 board; 7500 compatible
EEPROM contents (hex):
0x20: 01 1E 02 02 01 04 C6 98 49 08 77 05 00 00 00 00
0x30: 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Slot database information:
Flags: 0x4 Insertion time: Ox18CO (00:29:13 ago)
Controller Memory Size: 32 Mbytes DRAM, 4096 Kbytes SRAM
Given the information in the exhibit, what model of Versatile Interface Processor (VIP) is shown?
%CBUS-3-BADTXEOFVEC: Fddi0/0 ustatus: bad txEof vec
It is learned form the TAC that this message is indicative that the interface has aborted the transmit due to a claim frame coming in to the interface while the
interface was transmitting The FDDI ring contains some very important web servers and workstations for upper management
What action should be taken?
A The TAC should be contacted and a case should be logged, as this is indicative of
a major problem on the FDDI ring
B Claim Frames are a normal occurrence, so no action should be taken
C A sniffer should be placed on the ring to find the cause of the claims