CCNA 2 Chapter 7 V4

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 56

CCNA 2 Chapter 7 V4.

0 Answers
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27 2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem? A gateway of last resort is required. Subnetting is not supported by RIPv1.

VLSM is not supported by RIPv1. One of the routers needs a clock rate on the serial interface. 3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1? Only version 2 updates are sent to 255.255.255.255.
Only version 2 updates are sent to 224.0.0.9

Both version 1 and version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 255.255.255.255. 4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit? The routing table is limited to 2 routes. The LAN interfaces are participating in the routing process. One update has been sent out of each serial interface and 2 have been received. The no auto-summary has not been configured on this router.

5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.) RIP version 2 supports VLSM. RIP version 2 supports more than 16 routers. RIP version 2 supports classful (and not classless) routing. RIP version 2 supports routing update authentication. RIP version 2 supports multi-areas. RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.

6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0

When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? The network statements are configured incorrectly. A routing loop has been created. RIPv1 is unable to route to discontiguous subnets of a major network. RIPv1 is unable to route networks with a /24 subnet mask.

7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates propagates the default route to all routers in the network

8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:

Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error? The router does not allow loopback interface configurations. This mask can not be used with this class of addresses. Classless routing must be configured before this address can be added. The network address for Loopback1 overlaps with an already configured interface address. The router is over the limit for the maximum paths that can be provided in the routing table.

9. What is the maximum network diameter permitted by the default metric of RIPv2? 15 hops 16 hops 100 hops 120 hops 255 hops

10. What are two functions of the network command used when configuring routing protocols? (Choose two.) identifies which networks will be included in the routing updates identifies the hosts addresses that can be summarized in the network used to list all addresses for remote and local networks determines which subnet mask to apply to routing updates determines which interfaces can send and receive routing updates

11.

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B? Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added. A connected route to the 10.16.1.128/27 network is added. A third route to the 10.0.0.0/8 network with RIPv1 as the source is added. The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.

12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? Rip version 2 does not send subnet masks in its updates. Router A is not setup with RIP as a routing protocol. Rip version 2 will auto summarize routes by default. Router B is not setup to advertise the 192.168.1.64/30 network.

13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? Subnet masks will be added to the routing updates. Routing updates will be sent out using multicast address 224.0.0.9. Version 1 and 2 updates will be received and the version 2 updates will not be sent. The RIP routing process will be removed from the router and routing updates will not be forwarded.

14. How are RIP v1 and RIP v2 similar to one another? (Choose three.) They both use hop count as a metric. They both have the same metric value for infinite distance.

They both broadcast their updates to their neighbors. They both send subnet mask information in their updates. They both provide for authentication of update sources. They both use split horizon to prevent routing loops.

15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem? Enable split horizon in the network. Configure RIPv2 on routers. Add network 192.168.1.0 to the RIP configuration on the JAX router. Configure JAX Fa0/0 as a passive interface.

Enable the Serial0/0/0 interface on the JAX router. Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.

16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number address family identifier source and destination IP addresses

17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2

18.

Refer to the exhibit. Which two statements are true? (Choose two.) Router1 will install a route to 192.168.0.0/20 Router1 will install a route to 192.168.0.0/24 Router1 will install a route to 192.168.16.0/24 Router2 will install a route to 192.168.16.0/24 Router2 will not install a route to 192.168.16.0/20

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network

administrator enters the commands shown in the exhibit. What changes will occur in this network? The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues. The CHI router will install a route to the 192.168.0.0/16 network in its routing table. The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route. The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.

20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network? Router1(config)# ip classless Router1(config-router)# network 192.168.16.0 Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2

CCNA 2 Chapter 7 V4.0 Answers


1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27 2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem? A gateway of last resort is required. Subnetting is not supported by RIPv1. VLSM is not supported by RIPv1. One of the routers needs a clock rate on the serial interface.

3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1? Only version 2 updates are sent to 255.255.255.255. Only version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 255.255.255.255. 4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit? The routing table is limited to 2 routes. The LAN interfaces are participating in the routing process. One update has been sent out of each serial interface and 2 have been received. The no auto-summary has not been configured on this router. 5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.) RIP version 2 supports VLSM. RIP version 2 supports more than 16 routers.

RIP version 2 supports classful (and not classless) routing. RIP version 2 supports routing update authentication. RIP version 2 supports multi-areas. RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm. 6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0 When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? The network statements are configured incorrectly. A routing loop has been created. RIPv1 is unable to route to discontiguous subnets of a major network. RIPv1 is unable to route networks with a /24 subnet mask. 7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# defaultinformation originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates propagates the default route to all routers in the network 8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router: Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error? The router does not allow loopback interface configurations. This mask can not be used with this class of addresses. Classless routing must be configured before this address can be added. The network address for Loopback1 overlaps with an already configured interface address. The router is over the limit for the maximum paths that can be provided in the routing table. 9. What is the maximum network diameter permitted by the default metric of RIPv2? 15 hops 16 hops 100 hops 120 hops 255 hops 10. What are two functions of the network command used when configuring routing protocols? (Choose two.) identifies which networks will be included in the routing updates identifies the hosts addresses that can be summarized in the network used to list all addresses for remote and local networks determines which subnet mask to apply to routing updates determines which interfaces can send and receive routing updates 11.

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B? Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added. A connected route to the 10.16.1.128/27 network is added. A third route to the 10.0.0.0/8 network with RIPv1 as the source is added. The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured. 12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? Rip version 2 does not send subnet masks in its updates.

Router A is not setup with RIP as a routing protocol. Rip version 2 will auto summarize routes by default. Router B is not setup to advertise the 192.168.1.64/30 network. 13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? Subnet masks will be added to the routing updates. Routing updates will be sent out using multicast address 224.0.0.9. Version 1 and 2 updates will be received and the version 2 updates will not be sent. The RIP routing process will be removed from the router and routing updates will not be forwarded. 14. How are RIP v1 and RIP v2 similar to one another? (Choose three.) They both use hop count as a metric. They both have the same metric value for infinite distance. They both broadcast their updates to their neighbors. They both send subnet mask information in their updates. They both provide for authentication of update sources. They both use split horizon to prevent routing loops. 15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the

192.168.1.16/28 network. What is a possible solution to this problem? Enable split horizon in the network. Configure RIPv2 on routers. Add network 192.168.1.0 to the RIP configuration on the JAX router. Configure JAX Fa0/0 as a passive interface. Enable the Serial0/0/0 interface on the JAX router. Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24. 16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number address family identifier source and destination IP addresses 17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2 18. Refer to the exhibit. Which two statements are true? (Choose two.) Router1 will install a route to 192.168.0.0/20 Router1 will install a route to 192.168.0.0/24 Router1 will install a route to 192.168.16.0/24 Router2 will install a route to 192.168.16.0/24 Router2 will not install a route to 192.168.16.0/20

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network? The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues. The CHI router will install a route to the 192.168.0.0/16 network in its routing table. The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route. The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards. 20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network? Router1(config)# ip classless Router1(config-router)# network 192.168.16.0 Router1(config-router)# no passive-interface serial 0/1/1

Router2(config-router)# version 2 Router2(config-router)# neighbor 10.CCNA 2 Chapter 7 2012 V4.0 Answers

1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27 2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem? A gateway of last resort is required. Subnetting is not supported by RIPv1.

VLSM is not supported by RIPv1. One of the routers needs a clock rate on the serial interface.

3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1? Only version 2 updates are sent to 255.255.255.255. Only version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 255.255.255.255. 4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit?

The routing table is limited to 2 routes. The LAN interfaces are participating in the routing process. One update has been sent out of each serial interface and 2 have been received. The no auto-summary has not been configured on this router. 5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.) RIP version 2 supports VLSM. RIP version 2 supports more than 16 routers. RIP version 2 supports classful (and not classless) routing. RIP version 2 supports routing update authentication. RIP version 2 supports multi-areas. RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm. 6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0 When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? The network statements are configured incorrectly. A routing loop has been created. RIPv1 is unable to route to discontiguous subnets of a major network. RIPv1 is unable to route networks with a /24 subnet mask.

7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default routeconfigured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates propagates the default route to all routers in the network 8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router: Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error? The router does not allow loopback interface configurations. This mask can not be used with this class of addresses. Classless routing must be configured before this address can be added. The network address for Loopback1 overlaps with an already configured interface address. The router is over the limit for the maximum paths that can be provided in the routing table. 9. What is the maximum network diameter permitted by the default metric of RIPv2?

15 hops 16 hops 100 hops 120 hops 255 hops 10. What are two functions of the network command used when configuringrouting protocols? (Choose two.) identifies which networks will be included in the routing updates identifies the hosts addresses that can be summarized in the network used to list all addresses for remote and local networks determines which subnet mask to apply to routing updates determines which interfaces can send and receive routing updates 11.

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B? Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added. A connected route to the 10.16.1.128/27 network is added.

A third route to the 10.0.0.0/8 network with RIPv1 as the source is added. The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured. 12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? Rip version 2 does not send subnet masks in its updates. Router A is not setup with RIP as a routing protocol. Rip version 2 will auto summarize routes by default. Router B is not setup to advertise the 192.168.1.64/30 network. 13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? Subnet masks will be added to the routing updates. Routing updates will be sent out using multicast address 224.0.0.9. Version 1 and 2 updates will be received and the version 2 updates will not be sent. The RIP routing process will be removed from the router and routing updates will not be forwarded. 14. How are RIP v1 and RIP v2 similar to one another? (Choose three.) They both use hop count as a metric. They both have the same metric value for infinite distance. They both broadcast their updates to their neighbors. They both send subnet mask information in their updates.

They both provide for authentication of update sources. They both use split horizon to prevent routing loops. 15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem? Enable split horizon in the network. Configure RIPv2 on routers. Add network 192.168.1.0 to the RIP configuration on the JAX router. Configure JAX Fa0/0 as a passive interface. Enable the Serial0/0/0 interface on the JAX router. Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24. 16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number

address family identifier source and destination IP addresses 17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2 18. Refer to the exhibit. Which two statements are true? (Choose two.) Router1 will install a route to 192.168.0.0/20 Router1 will install a route to 192.168.0.0/24 Router1 will install a route to 192.168.16.0/24 Router2 will install a route to 192.168.16.0/24 Router2 will not install a route to 192.168.16.0/20 19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network? The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues. The CHI router will install a route to the 192.168.0.0/16 network in its routing table. The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route. The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards. 20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network? Router1(config)# ip classless Router1(config-router)# network 192.168.16.0

Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2


You are here: Home / Cisco Associate / CCNA / CCNA Exploration / ERouting Chapter 7 CCNA 2 4.0 2012 2013 100ERouting Chapter 7 CCNA 2 4.0 2012 2013 100% January 16, 2012 by HeiseR 0 Comments and 0 Reactions

Take Assessment ERouting Chapter 7 CCNA Exploration: Routing Protocols and Concepts (Version 4.0) Answers 2012 2013
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27 2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem? A gateway of last resort is required.

Subnetting is not supported by RIPv1. VLSM is not supported by RIPv1. One of the routers needs a clock rate on the serial interface. 3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1? Only version 2 updates are sent to 255.255.255.255. Only version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 224.0.0.9. Both version 1 and version 2 updates are sent to 255.255.255.255. 4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit? The routing table is limited to 2 routes. The LAN interfaces are participating in the routing process. One update has been sent out of each serial interface and 2 have been received. The no auto-summary has not been configured on this router.

5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.) RIP version 2 supports VLSM. RIP version 2 supports more than 16 routers. RIP version 2 supports classful (and not classless) routing. RIP version 2 supports routing update authentication. RIP version 2 supports multi-areas. RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm. 6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0 When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? The network statements are configured incorrectly. A routing loop has been created. RIPv1 is unable to route to discontiguous subnets of a major network. RIPv1 is unable to route networks with a /24 subnet mask. 7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# defaultinformation originate on Router1. How will this affect the network? prevents Router1 from forwarding updates about networks that are not directly connected causes all routers in the network to synchronize routing updates with Router1 forces Router1 to become the primary or designated router (DR) for updates propagates the default route to all routers in the network

8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router: Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error? The router does not allow loopback interface configurations. This mask can not be used with this class of addresses. Classless routing must be configured before this address can be added. The network address for Loopback1 overlaps with an already configured interface address. The router is over the limit for the maximum paths that can be provided in therouting table. 9. What is the maximum network diameter permitted by the default metric of RIPv2? 15 hops 16 hops 100 hops 120 hops 255 hops 10. What are two functions of the network command used when configuring routing protocols? (Choose two.) identifies which networks will be included in the routing updates identifies the hosts addresses that can be summarized in the network used to list all addresses for remote and local networks determines which subnet mask to apply to routing updates determines which interfaces can send and receive routing updates

11.

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B? Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks areadded. A connected route to the 10.16.1.128/27 network is added. A third route to the 10.0.0.0/8 network with RIPv1 as the source is added. The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured. 12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? Rip version 2 does not send subnet masks in its updates. Router A is not setup with RIP as a routing protocol.

Rip version 2 will auto summarize routes by default. Router B is not setup to advertise the 192.168.1.64/30 network. 13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? Subnet masks will be added to the routing updates. Routing updates will be sent out using multicast address 224.0.0.9. Version 1 and 2 updates will be received and the version 2 updates will not be sent. The RIP routing process will be removed from the router and routing updates will not be forwarded. 14. How are RIP v1 and RIP v2 similar to one another? (Choose three.) They both use hop count as a metric. They both have the same metric value for infinite distance. They both broadcast their updates to their neighbors. They both send subnet mask information in their updates. They both provide for authentication of update sources. They both use split horizon to prevent routing loops. 15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem? Enable split horizon in the network. Configure RIPv2 on routers.

Add network 192.168.1.0 to the RIP configuration on the JAX router. Configure JAX Fa0/0 as a passive interface. Enable the Serial0/0/0 interface on the JAX router. Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24. 16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR? subnet mask destination port number address family identifier source and destination IP addresses 17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? Router1(config)# ip classless Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2 18. Refer to the exhibit. Which two statements are true? (Choose two.) Router1 will install a route to 192.168.0.0/20 Router1 will install a route to 192.168.0.0/24 Router1 will install a route to 192.168.16.0/24 Router2 will install a route to 192.168.16.0/24 Router2 will not install a route to 192.168.16.0/20

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network? The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues. The CHI router will install a route to the 192.168.0.0/16 network in its routing table. The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route. The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routingupdates it forwards. 20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network? Router1(config)# ip classless Router1(config-router)# network 192.168.16.0 Router1(config-router)# no passive-interface serial 0/1/1 Router2(config-router)# version 2 Router2(config-router)# neighbor 10.0.0.2

DsmbISP Chapter 7 CCNA Discovery 2 4.1 2012 2013 100%


January 1, 2012 by HeiseR 0 Comments and 0 Reactions

Take Assessment DsmbISP Chapter 7 CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1) Answers 2012 2013
1.

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model. The TCP/IP model is a theoretical model and the OSI model is based on actual protocols. The OSI network layer is comparable to the Internet layer of the TCP/IP model. The TCP/IP model specifies protocols for the physical network interconnection. The TCP/IP model is based on four layers and the OSI model is based on seven layers. 2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.) accessibility adaptability availability reliability scalability 3. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.) It utilizes TCP port 110. A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message. It utilizes a store and forward process. The same application layer protocol is used to send the e-mail and retrieve it from the destination server. SMTP is used to send the e-mail message to the mail servers. 4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next? Host1 sends an ACK message to Host2. Host1 sends a SYN message to Host2. Host1 sends a SYN-ACK message to Host2. Host2 sends an ACK message to Host1. Host2 sends a SYN message to Host1. Host2 sends a SYN-ACK message to Host1.

5. What are three characteristics of network reliability? (Choose three.) Redundant hardware provides enhanced reliability. Reliability is measured as a percent. Reliability is the responsibility of the ISP customers. Fault tolerance is a measure of reliability. The longer the MTBF, the greater the reliability. 6. Which two statements describe the FTP protocol? (Choose two.) It uses well-known port 23. The protocol interpreter is responsible for the data transfer function. In passive data connections, the FTP client initiates the transfer of data. It requires two connections between client and server. FTP servers open a well-known port on the client machine. 7. What is the function of the TCP three-way handshake? It enables the synchronization of port numbers between source and destination hosts. It immediately triggers the retransmission of lost data. It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers. It identifies the destination application on the receiving host. 8. What are three characteristics of HTTPS? (Choose three.) It uses a different client request-server response process than HTTP uses. It specifies additional rules for passing data between the application and data link layers. It supports authentication. It allows more simultaneous connections than HTTP allows. It encrypts packets with SSL. It requires additional server processing time. 9. Which DNS zone resolves an IP address to a qualified domain name? dynamic lookup forward lookup resolution lookup reverse lookup 10. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur? dynamic zone transfer local recursive query root domain query top-level domain query 11. Refer to the exhibit. Which two statements are true about this file

? (Choose two.) If the gateway address changes, the file will be updated dynamically. The command ping fileserv will use IP address 172.16.5.10. If the ping http://www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried. The file must be created by the user if it is to be used by a workstation. Name to IP address mappings are added to the file after they are received from DNS. 12. Which two tasks are the responsibility of the local DNS server? (Choose two.) maintaining a large number of cached DNS entries maintaining the ISP server mapping name-to-IP addresses for internal hosts forwarding name resolution requests to a caching-only server forwarding all name resolution requests to root servers on the Internet 13. What are three unique characteristics of UDP? (Choose three.) connection oriented full-duplex operation low overhead no flow control no error-recovery function reliable transmission 14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.) FTP HTTP ICMP PPP Telnet SMTP 15. Which two options correctly match protocol and well-known port number? (Choose two.) DNS 25 FTP 110 HTTP 80 POP3 25 SMTP 25 16. Within TCP, what combination makes up a socket pair? source port with destination port

source IP address with destination port source IP address and destination IP address source IP address and port with a destination IP address and port 17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server? SNMP FTP SMTP HTTPS 18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request? Source 192.168.1.17:80 ; Destination 192.168.2.39:80 Source 192.168.1.17:80 ; Destination 192.168.2.39:1045 Source 192.168.1.17:1045 ; Destination 192.168.2.39:80 Source 192.168.1.17:1045 ; Destination 192.168.2.39:1061 19. What type of DNS server is typically maintained by an ISP? caching-only root second-level top-level 20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client? The server will apply the default service configured in directory services. The server will use ARP to discover the appropriate service from the local router. The server will send a request to the client asking for the appropriate service. The server will determine the appropriate service from the destination port field. 21. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.) 21. When a host is communicating with multiple applications on the same server at the same time, which two values will likely be the same in all packets for each session? (Choose two.) IP address MAC address session number sequence number 22. Which three fields do a TCP header and UDP header have in common? (Choose three.) checksum destination port source port

23. Which three fields do a TCP header and a UDP header have in common? (Choose three.) source port checksum destination port acknowledgment number sequence number 24. A manufacturing company subscribes to certain hosted services from their ISP. The services require include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) FTP HTTP DNS SNMP DHCP SMTP DsmbISP Chapter 7 CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1) 1. Which DNS zone resolves an IP address to a qualified domain name? dynamic lookup forward lookup resolution lookup reverse lookup 2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.) accessibility adaptability availability reliability scalability 3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?

dynamic zone transfer local recursive query root domain query top-level domain query 4. Within TCP, what combination makes up a socket pair? source port with destination port source IP address with destination port source IP address and destination IP address source IP address and port with a destination IP address and port

5. Which two options correctly match protocol and well-known port number? (Choose two.) DNS 25 FTP 110 HTTP 80 POP3 25 SMTP 25

6.

Refer to the exhibit. Which two statements are true about this file? (Choose two.) If the gateway address changes, the file will be updated dynamically. The command ping fileserv will use IP address 172.16.5.10. If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried. The file must be created by the user if it is to be used by a workstation. Name to IP address mappings are added to the file after they are received from DNS.

7. What are three characteristics of network reliability? (Choose three.) Redundant hardware provides enhanced reliability. Reliability is measured as a percent. Reliability is the responsibility of the ISP customers. Fault tolerance is a measure of reliability. The longer the MTBF, the greater the reliability.

8. Which two statements are true about the OSI and TCP/IP models? (Choose two.) The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model. The TCP/IP model is a theoretical model and the OSI model is based on actual protocols. The OSI network layer is comparable to the Internet layer of the TCP/IP model. The TCP/IP model specifies protocols for the physical network interconnection. The TCP/IP model is based on four layers and the OSI model is based on seven layers.

9.

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next? Host1 sends an ACK message to Host2. Host1 sends a SYN message to Host2. Host1 sends a SYN-ACK message to Host2. Host2 sends an ACK message to Host1. Host2 sends a SYN message to Host1. Host2 sends a SYN-ACK message to Host1.

10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client? The server will apply the default service configured in directory services. The server will use ARP to discover the appropriate service from the local router. The server will send a request to the client asking for the appropriate service. The server will determine the appropriate service from the destination port field.

11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.) IP address MAC address session number sequence number

12. Which two statements describe the FTP protocol? (Choose two.) It uses well-known port 23. The protocol interpreter is responsible for the data transfer function. In passive data connections, the FTP client initiates the transfer of data. It requires two connections between client and server. FTP servers open a well-known port on the client machine.

13. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.) It utilizes TCP port 110.

A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message. It utilizes a store and forward process. The same application layer protocol is used to send the e-mail and retrieve it from the destination server. SMTP is used to send the e-mail message to the mail servers.

14. What is the function of the TCP three-way handshake? It enables the synchronization of port numbers between source and destination hosts. It immediately triggers the retransmission of lost data. It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers. It identifies the destination application on the receiving host.

15.

Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request? Source 192.168.1.17:80 ; Destination 192.168.2.39:80 Source 192.168.1.17:80 ; Destination 192.168.2.39:1045 Source 192.168.1.17:1045 ; Destination 192.168.2.39:80

Source 192.168.1.17:1045 ; Destination 192.168.2.39:1061

16. What type of DNS server is typically maintained by an ISP? caching-only root second-level top-level

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server? SNMP FTP SMTP HTTPS

18. Which two tasks are the responsibility of the local DNS server? (Choose two.) maintaining a large number of cached DNS entries maintaining the ISP server mapping name-to-IP addresses for internal hosts forwarding name resolution requests to a caching-only server forwarding all name resolution requests to root servers on the Internet

19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three

protocols represent the key application services that are required by the company? (Choose three.) FTP HTTP ICMP PPP Telnet SMTP

20. What are three unique characteristics of UDP? (Choose three.) connection oriented full-duplex operation low overhead no flow control no error-recovery function reliable transmission

21. What are three characteristics of HTTPS? (Choose three.) It uses a different client request-server response process than HTTP uses. It specifies additional rules for passing data between the application and data link layers. It supports authentication. It allows more simultaneous connections than HTTP allows. It encrypts packets with SSL. It requires additional server processing time.

DsmbISP Chapter 7 CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1) 1. Which DNS zone resolves an IP address to a qualified domain name? dynamic lookup forward lookup resolution lookup reverse lookup 2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.) accessibility adaptability availability reliability scalability 3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur? dynamic zone transfer local recursive query root domain query top-level domain query 4. Within TCP, what combination makes up a socket pair? source port with destination port source IP address with destination port source IP address and destination IP address

source IP address and port with a destination IP address and port

5. Which two options correctly match protocol and well-known port number? (Choose two.) DNS 25 FTP 110 HTTP 80 POP3 25 SMTP 25

6.

Refer to the exhibit. Which two statements are true about this file? (Choose two.) If the gateway address changes, the file will be updated dynamically. The command ping fileserv will use IP address 172.16.5.10.

If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried. The file must be created by the user if it is to be used by a workstation. Name to IP address mappings are added to the file after they are received from DNS.

7. What are three characteristics of network reliability? (Choose three.) Redundant hardware provides enhanced reliability. Reliability is measured as a percent. Reliability is the responsibility of the ISP customers. Fault tolerance is a measure of reliability. The longer the MTBF, the greater the reliability.

8. Which two statements are true about the OSI and TCP/IP models? (Choose two.) The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model. The TCP/IP model is a theoretical model and the OSI model is based on actual protocols. The OSI network layer is comparable to the Internet layer of the TCP/IP model. The TCP/IP model specifies protocols for the physical network interconnection. The TCP/IP model is based on four layers and the OSI model is based on seven layers.

9.

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next? Host1 sends an ACK message to Host2. Host1 sends a SYN message to Host2. Host1 sends a SYN-ACK message to Host2. Host2 sends an ACK message to Host1. Host2 sends a SYN message to Host1. Host2 sends a SYN-ACK message to Host1.

10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client? The server will apply the default service configured in directory services. The server will use ARP to discover the appropriate service from the local router. The server will send a request to the client asking for the appropriate service. The server will determine the appropriate service from the destination port field.

11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.) IP address MAC address

session number sequence number

12. Which two statements describe the FTP protocol? (Choose two.) It uses well-known port 23. The protocol interpreter is responsible for the data transfer function. In passive data connections, the FTP client initiates the transfer of data. It requires two connections between client and server. FTP servers open a well-known port on the client machine.

13. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.) It utilizes TCP port 110. A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message. It utilizes a store and forward process. The same application layer protocol is used to send the e-mail and retrieve it from the destination server. SMTP is used to send the e-mail message to the mail servers.

14. What is the function of the TCP three-way handshake? It enables the synchronization of port numbers between source and destination hosts. It immediately triggers the retransmission of lost data. It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.

It identifies the destination application on the receiving host.

15.

Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request? Source 192.168.1.17:80 ; Destination 192.168.2.39:80 Source 192.168.1.17:80 ; Destination 192.168.2.39:1045 Source 192.168.1.17:1045 ; Destination 192.168.2.39:80 Source 192.168.1.17:1045 ; Destination 192.168.2.39:1061

16. What type of DNS server is typically maintained by an ISP? caching-only root second-level top-level

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server? SNMP

FTP SMTP HTTPS

18. Which two tasks are the responsibility of the local DNS server? (Choose two.) maintaining a large number of cached DNS entries maintaining the ISP server mapping name-to-IP addresses for internal hosts forwarding name resolution requests to a caching-only server forwarding all name resolution requests to root servers on the Internet

19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.) FTP HTTP ICMP PPP Telnet SMTP

20. What are three unique characteristics of UDP? (Choose three.) connection oriented full-duplex operation

low overhead no flow control no error-recovery function reliable transmission

21. What are three characteristics of HTTPS? (Choose three.) It uses a different client request-server response process than HTTP uses. It specifies additional rules for passing data between the application and data link layers. It supports authentication. It allows more simultaneous connections than HTTP allows. It encrypts packets with SSL. It requires additional server processing time.

You might also like