Q1. - (Topic 2)
What OSPF command, when configured, will include all interfaces into area 0?
A. network 0.0.0.0 255.255.255.255 area 0
B. network 0.0.0.0 0.0.0.0 area 0
C. network 255.255.255.255 0.0.0.0 area 0
D. network all-interfaces area 0
Answer: A
Explanation:
Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with
an IP address in area 0. The network command.network 0.0.0.0 255.255.255.255 area 0.dictates that you do not care (255.255.255.255) what the IP address is, but if an IP
address is enabled on any interface, place it in area 0.
Example 3-1.Configuring OSPF in a Single Area
router ospf 1 network 0.0.0.0 255.255.255.255 area 0 Reference: http://www.ciscopress.com/articles/article.asp?p=26919&seqNum=3
Q2. - (Topic 2)
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)
A. hello packets
B. SAP messages sent by other routers
C. LSAs from other routers
D. beacons received on point-to-point links
E. routing tables received from other link-state routers
F. TTL packets from designated routers
Answer: A,C
Explanation:
Link State Routing Protocols http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4
Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all:
1. Each router establishes a relationship—an adjacency—with each of its neighbors.
2. Each router sends link state advertisements (LSAs), some
3. Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical.
4. The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table.
Q3. - (Topic 3)
At which layer of the OSI model does PPP perform?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Answer: A
Explanation:
Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression.
Q4. - (Topic 2)
Refer to the exhibit.
What address is a feasible successor?
A. 172.16.4.0
B. 10.1.4.4
C. 10.1.2.2
D. 172.16.3.0
Answer: C Explanation:
The feasible condition states:
“To qualify as a feasible successor, a router must have an AD less than the FD of the current successor route”.
In this case, we see 10.1.2.2 shows an AD less than the current successor of 10.1.4.4
Q5. - (Topic 3)
Refer to the exhibit.
A network associate has configured OSPF with the command: City(config-router)# network 192.168.12.64 0.0.0.63 area 0 After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? (Choose three.)
A. FastEthernet0 /0
B. FastEthernet0 /1
C. Serial0/0
D. Serial0/1.102
E. Serial0/1.103
F. Serial0/1.104
Answer: B,C,D
Explanation:
The “network 192.168.12.64 0.0.0.63 equals to network 192.168.12.64/26. This network has:Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000)Network address:
192.168.12.64 Broadcast address: 192.168.12.127Therefore all interface in the range of this network will join OSPF - B C D are correct.
Q6. - (Topic 3)
What is the purpose of LCP?
A. to perform authentication
B. to negotiate control options
C. to encapsulate multiple protocols
D. to specify asynchronous versus synchronous
Answer: B
Explanation:
In order to be sufficiently versatile to be portable to a wide variety of environments, PPP provides a Link Control Protocol (LCP). The LCP is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common misconfiguration errors, and terminate the link. Other optional facilities provided are authentication of the identity of its peer on the link, and determination when a link is functioning properly and when it is failing.
Reference: Link Control Protocol
http://www.ietf.org/rfc/rfc1661.txt
Q7. - (Topic 3)
Refer to the exhibit.
Which WAN protocol is being used?
A. ATM
B. HDLC
C. Frame Relay
D. PPP
Answer: C
Explanation:
"Show interface pos8/0/0" command showing LMI enq sent which show frame-relay encapsulation enabled on this interface. Cisco supports three different Local Management Interface (LMI) types for Frame Relay: Cisco, ANSI Annex D, and Q933-A Annex A http://www.ciscopress.com/articles/article.asp?p=170741&seqNum=3
Q8. - (Topic 2)
Refer to the exhibit.
How will the router handle a packet destined for 192.0.2.156?
A. The router will drop the packet.
B. The router will return the packet to its source.
C. The router will forward the packet via Serial2.
D. The router will forward the packet via either Serial0 or Serial1.
Answer: C
Explanation:
Router has pointed default router to 192.168.4.1 and this subnet is connected via serial 2 interface. Router does not have router for the 192.0.2.156. so it will use the default gateway
192.168.4.1. A default route identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.
Q9. - (Topic 2)
What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Answer: D,E
Explanation:
It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces -> A is not correct.
We can not physically secure a virtual interface because it is “virtual” -> B is not correct.
To apply an access list to a virtual terminal interface we must use the “access-class” command. The “access-group” command is only used to apply an access list to a physical interface -> C is not correct; E is correct.
The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login -> D is correct.
Q10. - (Topic 2)
What are two drawbacks of implementing a link-state routing protocol? (Choose two.)
A. the sequencing and acknowledgment of link-state packets B. the requirement for a hierarchical IP addressing scheme for optimal functionality
C. the high volume of link-state advertisements in a converged network
D. the high demand on router resources to run the link-state routing algorithm
E. the large size of the topology table listing all advertised routes in the converged network
Answer: B,D
Explanation:
Link State routing protocols, such as OSPF and IS-IS, converge more quickly than their distance vector routing protocols such as RIPv1, RIPv2, EIGRP and so on, through the use of flooding and triggered updates. In link state protocols, changes are flooded immediately and computed in parallel. Triggered updates improve convergence time by requiring routers to send an update message immediately upon learning of a route change. These updates are triggered by some event, such as a new link becoming available oor an existing link failing. The main drawbacks to link state routing protocols are the amount of CPU overhead involved in calculating route changes and memory resources that are required to store neighbor tables, route tables and a complete topology table. http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4