Cisco - Actualtests.200-120.v2013-12-09.by - Watson.314q: Sections
Cisco - Actualtests.200-120.v2013-12-09.by - Watson.314q: Sections
Cisco - Actualtests.200-120.v2013-12-09.by - Watson.314q: Sections
314q
Number: 200-120
Passing Score: 825
Time Limit: 120 min
File Version: 14.5
Sections
1. Introduction
2. TCP/IP
3. IP Addressing / VLSM
4. Introduction to Cisco IOS
5. Managing Cisco IOS
6. IP Routing
7. Security
8. NAT
9. Switching
10. VLAN
11. IPv6
12. WAN
13. Drag & Drop
14. Simulation
15. Netflow
16. SNMP/HSRP/GLBP
17. Syslog
Ahmed Tawfik
Exam B
QUESTION 1
Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.)
A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.
B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.
C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.
E. Router1 will forward the data packet out interface FastEthernet0/1.
F. Router1 will forward the data packet out interface FastEthernet0/2.
Explanation/Reference:
The router will decapsulate the frame, thus removing the source and destination MAC addresses. It will
consult its routing table to work out on which interface to send the packet which is going to 192.168.40.5:
interface FastEthernet0/2. The router will then encapsulate the packet into a new frame with its own MAC
address as the source MAC address and the MAC address of 192.168.40.5 as the destination MAC
address.
Looking at the ARP table, the MAC address for 192.168.40.5 is 0000.0c07.4320 (the one which has been
dynamically learned and has age 9 minutes). So what is the router’s MAC address on this link? The ARP
table shows a static entry (no age) for 192.168.40.1 which is 0000.0c36.6965. As it is static, we can
conclude that these are the router’s IP and MAC address.
QUESTION 2
Which layer in the OSI reference model is responsible for determining the availability of the receiving
program and checking to see if enough resources exist for that communication?
A. transport
B. network
C. presentation
D. session
E. application
Correct Answer: E
Section: Introduction
Explanation
Explanation/Reference:
Programs live at the top end of the OSI model, so this rules out the network (delivery of packets across
Ahmed Tawfik
multiple links) and transport (end-to-end reliability and ports). The presentation layer is concerned with the
representation of data. The session layer provides the mechanism for opening, closing and managing a
session between end-user application processes, i.e., a semi-permanent dialogue (Wikipedia).
Wikipedia says: In the OSI model, the definition of its application layer is narrower in scope. The OSI model
defines the application layer as being the user interface. The OSI application layer is responsible for
displaying data and images to the user in a human-recognizable format. So the best answer is the
application layer, as this will see if there is a program (user interface) available to receive communications.
QUESTION 3
Refer to the exhibit.
Host A pings interface S0/0 on router 3. What is the TTL value for that ping?
A. 252
B. 253
C. 254
D. 255
Correct Answer: B
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
The default TTL is 255, and as a packet passes through a router the TTL is decremented. By the time the
ping packet reaches S0/0 on Router 3, it has passed through two routers and the TTL is now 253. Note that
the S0/0 interface responds to the ping: the packet is not routed by Router 3 and so the TTL in the ping
packet is not decremented to 252.
QUESTION 4
Ahmed Tawfik
A network administrator is verifying the configuration of a newly installed host by establishing an FTP
connection to a remote server.
What is the highest layer of the protocol stack that the network administrator is using for this operation?
A. application
B. presentation
C. session
D. transport
E. internet
F. data link
Correct Answer: A
Section: TCP/IP
Explanation
Explanation/Reference:
FTP is an application layer protocol, so this is the highest OSI layer involved in the operation.
QUESTION 5
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair
network. From this statement, what is known about the network interface port?
Correct Answer: C
Section: Introduction
Explanation
Explanation/Reference:
The only time that CSMA/CD (carrier sense medium access with collision detection) is ever needed is when
the medium is shared by all devices. In this situation, devices can never send and receive at the same time;
they must operate in half-duplex mode. The bitrate is irrelevant.
QUESTION 6
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame
is then discarded. At which OSI layer did this happen?
A. physical
B. session
C. data link
D. transport
E. network
Correct Answer: C
Section: Introduction
Explanation
Explanation/Reference:
Operations on frames occur at the data link layer.
QUESTION 7
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
A. The transport layer divides a data stream into segments and may add reliability and flow control
information.
Ahmed Tawfik
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Correct Answer: AD
Section: Introduction
Explanation
Explanation/Reference:
The key word here is encapsulation. The transport layer breaks the stream into segments, with ports,
reliability and flow control fields added (TCP) (A). The network layer encapsulates the segment (not a
frame) into packets by adding layer 3 addresses (D). The data link layer adds physical source and
destination addresses and an FCS to a packet, not a segment.
QUESTION 8
Refer to the graphic.
Host A is communicating with the server. What will be the source MAC address of the frames received by
Host A from the server?
Correct Answer: D
Section: Introduction
Explanation
Explanation/Reference:
Host A and the Server are on different subnets and are separated by routers, so the MAC address of the
Server will never get back to Host A: the router will decapsulate the frames that the Server sends. The
router will re-encapsulate the packets from the Server and and put its own MAC address on the outbound
interface (e0) in the frames. Host A will see the MAC address of router interface e0.
QUESTION 9
Refer to the exhibit.
What two results would occur if the hub were to be replaced with a switch that is configured with one
Ethernet VLAN? (Choose two.)
Ahmed Tawfik
A. The number of broadcast domains would remain the same.
B. The number of collision domains would increase.
C. The number of collision domains would decrease.
D. The number of broadcast domains would decrease.
E. The number of collision domains would remain the same.
F. The number of broadcast domains would increase.
Correct Answer: AB
Section: Introduction
Explanation
Explanation/Reference:
Only routers create broadcast domains, so the number of broadcast domains will be unchanged. A hub is a
single collision domain, whereas each port on a switch is its own collision domain. Therefore, by adding a
switch the number of collision domains will increase.
QUESTION 10
Where does routing occur within the DoD TCP/IP reference model?
A. application
B. internet
C. network
D. transport
Correct Answer: B
Section: TCP/IP
Explanation
Explanation/Reference:
In the OSI reference model, routing occurs at Layer 3, i.e. the network layer. However, the question isn’t
asking about OSI, it’s asking about the DoD TCP/IP model! In this model, the internet layer does routing.
QUESTION 11
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)
Ahmed Tawfik
Correct Answer: AE
Section: Introduction
Explanation
Explanation/Reference:
Physical addresses (also known as link or MAC addresses) identify devices at layer 2 (A). They can be
used to deliver frames between different devices on the same link (subnet, network) (E). To cross different
links/subnets, we use layer 3 addresses.
QUESTION 12
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)
Correct Answer: CD
Section: Introduction
Explanation
Explanation/Reference:
Ethernet devices don’t use tokens (rules out A). They can only transmit when there is no carrier (rules out
B) medium is idle and no other device is transmitting (C and D). There is no server required to grant access
(rules out E).
QUESTION 13
Which of the following statements describe the network shown in the graphic? (Choose two.)
Correct Answer: AF
Section: Introduction
Ahmed Tawfik
Explanation
Explanation/Reference:
Each side of a router is its own broadcast domain (routers separate broadcast domains), so there are two
broadcast domains (A). All sides of a hub are the one collision domains, but each side of a switch is its own
collision domain. Thus, the number of collision domains are 1 (around the hub), 1 (between switch and
router) plus the 5 collision domains on the cables out to the five PCs: seven in total (F).
QUESTION 14
Which command can be used from a PC to verify the connectivity between hosts that connect through a
switch in the same LAN?
A. ping address
B. tracert address
C. traceroute address
D. arp address
Correct Answer: A
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
In the same LAN means that we don't need to cross through a router, while rules out any traceroute
command (B, C). The arp command only shows if we have previously received a frame from that address,
not if connectivity is still OK, so not D. We need the ping command to send an ICMP packet to the host and
receive a reply for it.
QUESTION 15
How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on
the switches?
A. one
B. six
C. twelve
D. two
Correct Answer: A
Section: Introduction
Explanation
Explanation/Reference:
Routers separate broadcast domains. Hubs and switches extend broadcast domains (if we neglect VLANs).
There are no routers in the diagram, so there is only one broadcast domain.
QUESTION 16
An administrator must assign static IP addresses to the servers in a network.
For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is
given the last usable host address.
Which of the following should be entered into the IP properties box for the sales server?
Ahmed Tawfik
A. IP address: 192.168.20.14
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.9
B. IP address: 192.168.20.254
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.20.1
C. IP address: 192.168.20.30
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.25
D. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.17
E. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.25
Correct Answer: C
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
A /29 network has only 8 IP addresses, of which 6 are usable IP addresses. This means that 192.168.20.24
represents the network, 192.168.20.25 is the first usable IP address, 192.168.20.30 is the last usable IP
address and 192.168.20.31 is the broadcast address on the network. Another way to write /29 is
255.255.255.248, so the answer is C.
QUESTION 17
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight
LANs, with each LAN containing 5 to 26 hosts?
A. 0.0.0.240
B. 255.255.255.252
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240
Correct Answer: D
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
We need 26 usable IP addresses, so we need subnets with a range of 32 addresses. This is the /27
netmask, or 255.255.255.224.
QUESTION 18
A national retail chain needs to design an IP addressing scheme to support a nationwide network.
The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet.
Working with only one Class B address, which of the following subnet masks will support an appropriate
addressing scheme? (Choose two.)
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0
Correct Answer: BE
Section: IP Addressing / VLSM
Ahmed Tawfik
Explanation
Explanation/Reference:
50 hosts per subnet, so we'd need a range of 64 IP addresses which is a /26. This converts to a mask of
255.255.255.192.
QUESTION 19
Which command can you use to manually assign a static IPv6 address to a router interface?
Correct Answer: D
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 20
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best
defines the address range and subnet mask that meet the requirement and waste the fewest subnet and
host addresses?
Correct Answer: D
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 21
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS
image. What function does the router perform next?
Correct Answer: A
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
Explanation:
QUESTION 22
Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?
Ahmed Tawfik
A. The maximum number of bytes that can traverse this interface per second is 1500.
B. The minimum segment size that can traverse this interface is 1500 bytes.
C. The maximum segment size that can traverse this interface is 1500 bytes.
D. The minimum packet size that can traverse this interface is 1500 bytes.
E. The maximum packet size that can traverse this interface is 1500 bytes.
F. The maximum frame size that can traverse this interface is 1500 bytes.
Correct Answer: E
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 23
Which command displays CPU utilization?
A. show protocols
B. show process
C. show system
D. show version
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 24
Refer to the exhibit. The technician wants to upload a new IOS in the router while keeping the existing IOS.
What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
Ahmed Tawfik
A. 3MB
B. 5MB
C. 7MB
D. 4MB
Correct Answer: D
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 25
Refer to the exhibit.
The two exhibit devices are the only Cisco devices on the network. The serial network between the two
devices has a mask of 255.255.255.252.
Given the output that is shown, what three statements are true of these devices? (Choose three.)
Explanation/Reference:
QUESTION 26
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which
command should be used to gather this information? (Choose two.)
Ahmed Tawfik
D. show version.
E. show processes.
F. show running-config.
Correct Answer: BD
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 27
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version
Correct Answer: D
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 28
Which command would you use on a Cisco router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
Correct Answer: B
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
Explanation:
QUESTION 29
Refer to the exhibit.
A network administrator configures a new router and enters the copy startup-config running-config
command on the router.
The network administrator powers down the router and sets it up at a remote location.
When the router starts, it enters the system configuration dialog as shown. What is the cause of the
problem?
Ahmed Tawfik
A. The network administrator failed to save the configuration.
B. The configuration register is set to 0x2100.
C. The boot system flash command is missing from the configuration.
D. The configuration register is set to 0x2102.
E. The router is configured with the boot system startup command.
Correct Answer: A
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 30
Why is flash memory erased prior to upgrading the IOS image from the TFTP server?
A. In order for the router to use the new image as the default, it must be the only IOS image in flash.
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. The router cannot verify that the Cisco IOS image currently in flash is valid.
Correct Answer: C
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 31
Which command would you configure globally on a Cisco router that would allow you to view directly
connected Cisco devices?
A. enable cdp
B. cdp enable
C. cdp run
Ahmed Tawfik
D. run cdp
Correct Answer: C
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 32
Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two.)
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server
Correct Answer: CE
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 33
Which two statements describe the process identifier that is used in the command to configure OSPF on a
router? (Choose two.)
A. All OSPF routers in an area must have the same process ID.
B. Only one process number can be used on the same router.
C. Different process identifiers can be used to run multiple OSPF processes.
D. The process number can be any number from 1 to 65,535.
E. Hello packets are sent to each neighbor to determine the processor identifier.
Correct Answer: CD
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 34
Refer to the exhibit.
For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two)
Ahmed Tawfik
A. Router1 has specific boot system commands that instruct it to load IOS from TFTP server.
B. Router1 is acting as a TFTP server for other routers.
C. Router1 cannot locate a valid IOS image in flash memory.
D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load a image from TFTP for management purposes.
Correct Answer: AC
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 35
Refer to the exhibit. What can be determined about the router from the console output?
Ahmed Tawfik
Correct Answer: A
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 36
Which command shows your active Telnet connections?
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 37
Which statement describes the process of dynamically assigning IP addresses by the DHCP server?
A. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an
address must be made.
D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
Correct Answer: D
Section: TCP/IP
Explanation
Explanation/Reference:
QUESTION 38
How does a DHCP server dynamically assign IP addresses to hosts?
A. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an
address must be made.
D. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the
DHCP server to renew the lease.
Correct Answer: D
Section: TCP/IP
Explanation
Explanation/Reference:
QUESTION 39
Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?
Ahmed Tawfik
A. The address is removed from the pool until the conflict is resolved.
B. The address remains in the pool until the conflict is resolved.
C. Only the IP detected by Gratuitous ARP is removed from the pool.
D. Only the IP detected by Ping is removed from the pool.
E. The IP will be shown, even after the conflict is resolved.
Correct Answer: A
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 40
Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)
Correct Answer: CF
Section: TCP/IP
Explanation
Explanation/Reference:
QUESTION 41
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose
two.)
Correct Answer: AB
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 42
When you are troubleshooting an ACL issue on a router, which command can help you to verify which
Ahmed Tawfik
interfaces are affected by the ACL?
A. show access-lists
B. show interface
C. show ip interface
D. show ip access-lists
E. list ip interface
Correct Answer: C
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 43
What will happen if a private IP address is assigned to a public interface connected to an ISP?
Correct Answer: A
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 44
Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three.)
A. winipcfg
B. tracert
C. ping
D. ip config
E. show ip route
F. show interfaces
Explanation/Reference:
QUESTION 45
Refer to the exhibit.
An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer
is the problem?
Ahmed Tawfik
A. data link layer
B. application layer
C. access layer
D. session layer
E. network layer
Correct Answer: E
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 46
Which statement is correct regarding the operation of DHCP?
Correct Answer: D
Section: TCP/IP
Explanation
Explanation/Reference:
QUESTION 47
How does using the service password-encryption command on a router provide additional security?
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Ahmed Tawfik
Explanation/Reference:
QUESTION 48
Refer to the exhibit. A new subnet with 60 hosts has been added to the network.
Which subnet address should this network use to provide enough usable addresses while wasting the
fewest addresses?
A. 192.168.1.56/27
B. 192.168.1.64/26
C. 192.168.1.64/27
D. 192.168.1.56/26
Correct Answer: B
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 49
Refer to the exhibit.
All of the routers in the network are configured with the ip subnet-zero command.
Which network addresses should be used for Link A and Network A? (Choose two.)
A. Network A - 172.16.3.48/26
B. Network A - 172.16.3.128/25
C. Network A - 172.16.3.192/26
D. Link A - 172.16.3.0/30
E. Link A - 172.16.3.40/30
F. Link A - 172.16.3.112/30
Ahmed Tawfik
Correct Answer: BD
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 50
A network administrator needs to allow only one Telnet connection to a router.
For anyone viewing the configuration and issuing the show run command, the password for Telnet access
should be encrypted.
Which set of commands will accomplish this task?
A. service password-encryption
access-listl permit 192.168.1.0.0.0.0.255
line vty0 4
login
password cisco
access-class 1
B. enable password secret
line vty0
login
password cisco
C. service password-encryption
line vty1
login
password cisco
D. service password-encryption
line vty0 4
login
password cisco
Correct Answer: C
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 51
What is the effect of using the service password-encryption command?
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 52
Ahmed Tawfik
Refer to the exhibit. What is the effect of the configuration that is shown?
A. It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
B. It configures a Cisco network device to use the SSH protocol on incoming communications via the
virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures the virtual terminal lines with the password 030752180500.
E. It configures SSH globally for all logins.
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 53
Refer to the exhibit.
What is the reason that the interface status is "administratively down, line protocol down"?
Correct Answer: D
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 54
What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
Correct Answer: C
Section: Introduction
Ahmed Tawfik
Explanation
Explanation/Reference:
QUESTION 55
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least
amount of wasted addresses?
A. 255.255.255.0
B. 255.255.254.0
C. 255.255.252.0
D. 255.255.248.0
Correct Answer: B
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 56
Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24
Correct Answer: B
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 57
Which command enables IPv6 forwarding on a Cisco router?
A. ipv6 local
B. ipv6 host
C. ipv6 unicast-routing
D. ipv6 neighbor
Ahmed Tawfik
Correct Answer: C
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 58
Which command encrypts all plaintext passwords?
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 59
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network
address?
A. 172.16.16.0
B. 172.16.24.0
C. 172.16.0.0
D. 172.16.28.0
Correct Answer: A
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 60
You are working in a data center environment and are assigned the address range 10.188.31.0/23.
You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as
30 hosts each.
Which IP address range meets these requirements?
A. 10.188.31.0/27
B. 10.188.31.0/26
C. 10.188.31.0/29
D. 10.188.31.0/28
E. 10.188.31.0/25
Correct Answer: A
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 61
The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use
Ahmed Tawfik
on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that
can be supported on each LAN if the organization is using one class C address block?
A. 8
B. 6
C. 30
D. 32
E. 14
F. 16
Correct Answer: C
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 62
What is a global command?
Correct Answer: A
Section: Introduction to Cisco IOS
Explanation
Explanation/Reference:
QUESTION 63
Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?
Exhibit:
Ahmed Tawfik
Ahmed Tawfik
A. Correctly assign an IP address to interface fa0/1.
B. Change the ip access-group command on fa0/0 from "in* to "our.
C. Remove access-group 106 in from interface fa0/0 and add access-group 115 in.
D. Remove access-group 102 out from interface s0/0/0 and add access-group 114 in
E. Remove access-group 106 in from interface fa0/0 and add access-group 104 in.
Correct Answer: E
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
Explanation: Let's have a look at the access list 104:
The question does not ask about ftp traffic so we don't care about the two first lines. The 3rd line denies all
telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is
applied on the inbound direction so the 5th line "access-list 104 deny icmp any any echo-reply" will not
affect our icmp traffic because the "echo-reply" message will be sent over the outbound direction.
QUESTION 64
What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface?
Exhibit:
Ahmed Tawfik
Ahmed Tawfik
A. Attempts to telnet to the router would fail.
B. It would allow all traffic from the 10.4.4.0 network.
C. IP traffic would be passed through the interface but TCP and UDP traffic would not.
D. Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface.
Correct Answer: B
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
Explanation: From the output of access-list 114: access-list 114 permit ip 10.4.4.0 0.0.0.255 any we can
easily understand that this access list allows all traffic (ip) from 10.4.4.0/24 network
QUESTION 65
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which
command should be used to gather this information? (Choose two.)
Correct Answer: BD
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 66
Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two.)
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server
Correct Answer: CE
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 67
A network administrator changes the configuration register to 0x2142 and reboots the router. What are two
results of making this change? (Choose two.)
Ahmed Tawfik
E. The configuration in flash memory will be booted.
Correct Answer: BD
Section: Managing Cisco IOS
Explanation
Explanation/Reference:
QUESTION 68
Refer to the exhibit. The networks connected to router R2 have been summarized as a 192.168.176.0/21
route and sent to R1. Which two packet destination addresses will R1 forward to R2? (Choose two.)
A. 192.168.194.160
B. 192.168.183.41
C. 192.168.159.2
D. 192.168.183.255
E. 192.168.179.4
F. 192.168.184.45
Correct Answer: BE
Section: IP Addressing / VLSM
Explanation
Explanation/Reference:
QUESTION 69
List 3 components of SNMP ?
A. MIB
B. NMS (Manager)
C. Agent
D. SET
Explanation/Reference:
Ahmed Tawfik