ccna 2 chapter 7 v4

66
CCNA 2 Chapter 7 V4.0 Answers 1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.) 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16 209.165.201.0/27 2. Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East.

Upload: sang-niyomkham

Post on 01-Dec-2015

274 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CCNA 2 Chapter 7 V4

CCNA 2 Chapter 7 V4.0 Answers

1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)

10.0.0.0/8

127.0.0.0/8

169.254.0.0/16

172.16.0.0/12

192.168.0.0/16

209.165.201.0/27

2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?

A gateway of last resort is required.

Subnetting is not supported by RIPv1.

Page 2: CCNA 2 Chapter 7 V4

VLSM is not supported by RIPv1.

One of the routers needs a clock rate on the serial interface.

3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?

Only version 2 updates are sent to 255.255.255.255.

Only version 2 updates are sent to 224.0.0.9

Both version 1 and version 2 updates are sent to 224.0.0.9.

Both version 1 and version 2 updates are sent to 255.255.255.255.

4.

Page 3: CCNA 2 Chapter 7 V4

Refer to the exhibit. What can be concluded from the output shown in the exhibit?

The routing table is limited to 2 routes.

The LAN interfaces are participating in the routing process.

One update has been sent out of each serial interface and 2 have been received.

The no auto-summary has not been configured on this router.

 

5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)

RIP version 2 supports VLSM.

RIP version 2 supports more than 16 routers.

RIP version 2 supports classful (and not classless) routing.

RIP version 2 supports routing update authentication.

RIP version 2 supports multi-areas.

RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.

 

6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0

Page 4: CCNA 2 Chapter 7 V4

When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?

The network statements are configured incorrectly.

A routing loop has been created.

RIPv1 is unable to route to discontiguous subnets of a major network.

RIPv1 is unable to route networks with a /24 subnet mask.

 

7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?

prevents Router1 from forwarding updates about networks that are not directly connected

causes all routers in the network to synchronize routing updates with Router1

forces Router1 to become the primary or designated router (DR) for updates

propagates the default route to all routers in the network

 

8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:

Page 5: CCNA 2 Chapter 7 V4

Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error?

The router does not allow loopback interface configurations.

This mask can not be used with this class of addresses.

Classless routing must be configured before this address can be added.

The network address for Loopback1 overlaps with an already configured interface address.

The router is over the limit for the maximum paths that can be provided in the routing table.

 

9. What is the maximum network diameter permitted by the default metric of RIPv2?

15 hops

16 hops

100 hops

120 hops

255 hops

 

10. What are two functions of the network command used when configuring routing protocols? (Choose two.)

identifies which networks will be included in the routing updates

identifies the hosts addresses that can be summarized in the network

used to list all addresses for remote and local networks

determines which subnet mask to apply to routing updates

determines which interfaces can send and receive routing updates

 

11.

Page 6: CCNA 2 Chapter 7 V4

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?

Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added.

A connected route to the 10.16.1.128/27 network is added.

A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.

The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.

 

12.

Page 7: CCNA 2 Chapter 7 V4

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?

Rip version 2 does not send subnet masks in its updates.

Router A is not setup with RIP as a routing protocol.

Rip version 2 will auto summarize routes by default.

Router B is not setup to advertise the 192.168.1.64/30 network.

 

13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?

Subnet masks will be added to the routing updates.

Routing updates will be sent out using multicast address 224.0.0.9.

Version 1 and 2 updates will be received and the version 2 updates will not be sent.

The RIP routing process will be removed from the router and routing updates will not be forwarded.

 

14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)

They both use hop count as a metric.

They both have the same metric value for infinite distance.

Page 8: CCNA 2 Chapter 7 V4

They both broadcast their updates to their neighbors.

They both send subnet mask information in their updates.

They both provide for authentication of update sources.

They both use split horizon to prevent routing loops.

 

15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem?

Enable split horizon in the network.

Configure RIPv2 on routers.

Add network 192.168.1.0 to the RIP configuration on the JAX router.

Configure JAX Fa0/0 as a passive interface.

Page 9: CCNA 2 Chapter 7 V4

Enable the Serial0/0/0 interface on the JAX router.

Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.

 

16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?

subnet mask

destination port number

address family identifier

source and destination IP addresses

 

17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?

Router1(config)# ip classless

Router1(config-router)# no passive-interface serial 0/1/1

Router2(config-router)# version 2

Router2(config-router)# neighbor 10.0.0.2

 

Page 10: CCNA 2 Chapter 7 V4

18.

Refer to the exhibit. Which two statements are true? (Choose two.)

Router1 will install a route to 192.168.0.0/20

Router1 will install a route to 192.168.0.0/24

Router1 will install a route to 192.168.16.0/24

Router2 will install a route to 192.168.16.0/24

Router2 will not install a route to 192.168.16.0/20

 

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network

Page 11: CCNA 2 Chapter 7 V4

administrator enters the commands shown in the exhibit. What changes will occur in this network?

The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.

The CHI router will install a route to the 192.168.0.0/16 network in its routing table.

The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route.

The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.

 

20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?

Router1(config)# ip classless

Router1(config-router)# network 192.168.16.0

Router1(config-router)# no passive-interface serial 0/1/1

Router2(config-router)# version 2

Router2(config-router)# neighbor 10.0.0.2

Page 12: CCNA 2 Chapter 7 V4

CCNA 2 Chapter 7 V4.0 Answers

1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)10.0.0.0/8127.0.0.0/8169.254.0.0/16172.16.0.0/12192.168.0.0/16209.165.201.0/27

2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?A gateway of last resort is required.Subnetting is not supported by RIPv1.VLSM is not supported by RIPv1.One of the routers needs a clock rate on the serial interface.

3.

Page 13: CCNA 2 Chapter 7 V4

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?Only version 2 updates are sent to 255.255.255.255.Only version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 255.255.255.255.

4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit?The routing table is limited to 2 routes.The LAN interfaces are participating in the routing process.One update has been sent out of each serial interface and 2 have been received.The no auto-summary has not been configured on this router.

5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLSM.RIP version 2 supports more than 16 routers.

Page 14: CCNA 2 Chapter 7 V4

RIP version 2 supports classful (and not classless) routing.RIP version 2 supports routing update authentication.RIP version 2 supports multi-areas.RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.

6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router ripnetwork 10.0.0.0network 172.16.0.0When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?The network statements are configured incorrectly.A routing loop has been created.RIPv1 is unable to route to discontiguous subnets of a major network.RIPv1 is unable to route networks with a /24 subnet mask.

7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?prevents Router1 from forwarding updates about networks that are not directly connectedcauses all routers in the network to synchronize routing updates with Router1forces Router1 to become the primary or designated router (DR) for updatespropagates the default route to all routers in the network

8.

Page 15: CCNA 2 Chapter 7 V4

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:

Sanford(config)# interface loopback1

Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error?The router does not allow loopback interface configurations.This mask can not be used with this class of addresses.Classless routing must be configured before this address can be added.The network address for Loopback1 overlaps with an already configured interface address.The router is over the limit for the maximum paths that can be provided in the routing table.

9. What is the maximum network diameter permitted by the default metric of RIPv2?15 hops16 hops100 hops120 hops255 hops

10. What are two functions of the network command used when configuring routing protocols? (Choose two.)identifies which networks will be included in the routing updatesidentifies the hosts addresses that can be summarized in the networkused to list all addresses for remote and local networksdetermines which subnet mask to apply to routing updatesdetermines which interfaces can send and receive routing updates

11.

Page 16: CCNA 2 Chapter 7 V4

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added.A connected route to the 10.16.1.128/27 network is added.A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.

12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 does not send subnet masks in its updates.

Page 17: CCNA 2 Chapter 7 V4

Router A is not setup with RIP as a routing protocol.Rip version 2 will auto summarize routes by default.Router B is not setup to advertise the 192.168.1.64/30 network.

13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?Subnet masks will be added to the routing updates.Routing updates will be sent out using multicast address 224.0.0.9.Version 1 and 2 updates will be received and the version 2 updates will not be sent.The RIP routing process will be removed from the router and routing updates will not be forwarded.

14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)They both use hop count as a metric.They both have the same metric value for infinite distance.They both broadcast their updates to their neighbors.They both send subnet mask information in their updates.They both provide for authentication of update sources.They both use split horizon to prevent routing loops.

15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the

Page 18: CCNA 2 Chapter 7 V4

192.168.1.16/28 network. What is a possible solution to this problem?Enable split horizon in the network.Configure RIPv2 on routers.Add network 192.168.1.0 to the RIP configuration on the JAX router.Configure JAX Fa0/0 as a passive interface.Enable the Serial0/0/0 interface on the JAX router.Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.

16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?subnet maskdestination port numberaddress family identifiersource and destination IP addresses

17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router1(config)# ip classlessRouter1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2

18.

Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router1 will install a route to 192.168.0.0/24Router1 will install a route to 192.168.16.0/24Router2 will install a route to 192.168.16.0/24Router2 will not install a route to 192.168.16.0/20

Page 19: CCNA 2 Chapter 7 V4

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.The CHI router will install a route to the 192.168.0.0/16 network in its routing table.The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route.The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.

20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?Router1(config)# ip classlessRouter1(config-router)# network 192.168.16.0Router1(config-router)# no passive-interface serial 0/1/1

Page 20: CCNA 2 Chapter 7 V4

Router2(config-router)# version 2Router2(config-router)# neighbor 10.CCNA 2 Chapter 7 2012 V4.0 Answers

1. A network administrator has been told that the company IP address

infrastructure must adhere to RFC 1918. What three IP address ranges

from RFC 1918 could the administrator use on the network? (Choose

three.)

10.0.0.0/8

127.0.0.0/8

169.254.0.0/16

172.16.0.0/12

192.168.0.0/16

209.165.201.0/27

2.

Refer to the exhibit. Routers East and West are configured using RIPv1.

Both routers are sending updates about their directly connected routes.

The East router can ping the West router serial interface and West can

ping the serial interface of East. However, neither router has

dynamically learned routes from the other. What is most likely the

problem?

A gateway of last resort is required.

Page 21: CCNA 2 Chapter 7 V4

Subnetting is not supported by RIPv1.

VLSM is not supported by RIPv1.

One of the routers needs a clock rate on the serial interface.

3.

Refer to the exhibit. What effect will the commands that are shown have

on RIP updates for Router1?

Only version 2 updates are sent to 255.255.255.255.

Only version 2 updates are sent to 224.0.0.9.

Both version 1 and version 2 updates are sent to 224.0.0.9.

Both version 1 and version 2 updates are sent to 255.255.255.255.

4.

Page 22: CCNA 2 Chapter 7 V4

Refer to the exhibit. What can be concluded from the output shown in

the exhibit?

The routing table is limited to 2 routes.

The LAN interfaces are participating in the routing process.

One update has been sent out of each serial interface and 2 have been

received.

The no auto-summary has not been configured on this router.

5. What are two reasons to implement RIP version 2 rather than RIP

version 1? (Choose two.)

RIP version 2 supports VLSM.

RIP version 2 supports more than 16 routers.

RIP version 2 supports classful (and not classless) routing.

RIP version 2 supports routing update authentication.

RIP version 2 supports multi-areas.

RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford

algorithm.

6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the

network that is shown. The following commands are used on each

router: 

router rip

network 10.0.0.0

network 172.16.0.0

When this configuration is complete, users on the LAN of each router are

unable to access the remote LANs. Why?

Page 23: CCNA 2 Chapter 7 V4

The network statements are configured incorrectly.

A routing loop has been created.

RIPv1 is unable to route to discontiguous subnets of a major network.

RIPv1 is unable to route networks with a /24 subnet mask.

7. A network administrator installed four new routers that are running

RIPv2. Router1 is a boundary router in the RIPv2 network and has

a default routeconfigured. Once the network has converged, the

network administrator enters Router1(config-router)# default-

information originate on Router1. How will this affect the network?

prevents Router1 from forwarding updates about networks that are not directly

connected

causes all routers in the network to synchronize routing updates with Router1

forces Router1 to become the primary or designated router (DR) for updates

propagates the default route to all routers in the network

8.

Refer to the exhibit. A technician needs to add a new loopback interface

to test routing functionality and network design. The technician enters

the following set of commands on the router:

Sanford(config)# interface loopback1

Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the

router respond with an error?

The router does not allow loopback interface configurations.

This mask can not be used with this class of addresses.

Page 24: CCNA 2 Chapter 7 V4

Classless routing must be configured before this address can be added.

The network address for Loopback1 overlaps with an already configured

interface address.

The router is over the limit for the maximum paths that can be provided in the

routing table.

9. What is the maximum network diameter permitted by the default

metric of RIPv2?

15 hops

16 hops

100 hops

120 hops

255 hops

10. What are two functions of the network command used when

configuringrouting protocols? (Choose two.)

identifies which networks will be included in the routing updates

identifies the hosts addresses that can be summarized in the network

used to list all addresses for remote and local networks

determines which subnet mask to apply to routing updates

determines which interfaces can send and receive routing updates

11.

Page 25: CCNA 2 Chapter 7 V4

Refer to the exhibit. All routers are running RIPv1. What changes will

occur in the routing table of router B if a loopback interface with an

address of 10.16.1.129/27 is configured on router B?

Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are

added.

A connected route to the 10.16.1.128/27 network is added.

A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.

The 10.0.0.0/8 route is dropped immediately from the routing table after router

B is configured.

12.

Page 26: CCNA 2 Chapter 7 V4

Refer to the exhibit. If all routers are running RIP version 2, why is

there no route for the 192.168.1.32/27 network?

Rip version 2 does not send subnet masks in its updates.

Router A is not setup with RIP as a routing protocol.

Rip version 2 will auto summarize routes by default.

Router B is not setup to advertise the 192.168.1.64/30 network.

13. RIPv2 is the configured routing protocol on the routers in a

network. The command Router(config-router)# no version 2 is entered

on the routers. What effect does entering this command have on

routing updates?

Subnet masks will be added to the routing updates.

Routing updates will be sent out using multicast address 224.0.0.9.

Version 1 and 2 updates will be received and the version 2 updates will not be

sent.

The RIP routing process will be removed from the router and routing updates

will not be forwarded.

14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)

They both use hop count as a metric.

They both have the same metric value for infinite distance.

They both broadcast their updates to their neighbors.

They both send subnet mask information in their updates.

They both provide for authentication of update sources.

They both use split horizon to prevent routing loops.

15.

Page 27: CCNA 2 Chapter 7 V4

Refer to the exhibit. The exhibited network contains a mixture of Cisco

and non-Cisco routers. The command debug ip rip was entered on the

JAX router. All routers are running the same version of RIP. Router CHI

and Router ORL are not able to reach the 192.168.1.16/28 network.

What is a possible solution to this problem?

Enable split horizon in the network.

Configure RIPv2 on routers.

Add network 192.168.1.0 to the RIP configuration on the JAX router.

Configure JAX Fa0/0 as a passive interface.

Enable the Serial0/0/0 interface on the JAX router.

Change the IP address on the Fa0/0 interface of the JAX router to

192.168.1.1/24.

16. What field was added to the RIP message header by RFC 1723 to add

support for VLSM and CIDR?

subnet mask

destination port number

address family identifier

source and destination IP addresses

17.

Page 28: CCNA 2 Chapter 7 V4

Refer to the exhibit. Which command on which router will allow

Router1 to learn about the 192.168.0.0/20 network?

Router1(config)# ip classless

Router1(config-router)# no passive-interface serial 0/1/1

Router2(config-router)# version 2

Router2(config-router)# neighbor 10.0.0.2

18.

Refer to the exhibit. Which two statements are true? (Choose two.)

Router1 will install a route to 192.168.0.0/20

Router1 will install a route to 192.168.0.0/24

Router1 will install a route to 192.168.16.0/24

Router2 will install a route to 192.168.16.0/24

Router2 will not install a route to 192.168.16.0/20

19.

Page 29: CCNA 2 Chapter 7 V4

Refer to the exhibit. All routers are running RIP version 2. JAX is

configured to just advertise the 10.0.0.0/24 network. CHI is configured

to advertise the 172.16.0.0/16 network. A network administrator enters

the commands shown in the exhibit. What changes will occur in this

network?

The JAX router will ignore updates for the 172.16.0.0/16 network due to split

horizon issues.

The CHI router will install a route to the 192.168.0.0/16 network in its routing

table.

The routing table for CHI will have the 192.168.0.0/16 route but it will have an

S next to the route.

The ORL router will apply a 255.255.0.0 subnet mask to all networks in the

routing updates it forwards.

20.

Refer to the exhibit. Which command will allow Router2 to learn about

the 192.168.16.0/28 network?

Router1(config)# ip classless

Router1(config-router)# network 192.168.16.0

Router1(config-router)# no passive-interface serial 0/1/1

Router2(config-router)# version 2

Router2(config-router)# neighbor 10.0.0.2

You are here: Home / Cisco Associate / CCNA / CCNA Exploration / ERouting Chapter 7 CCNA 2 4.0 2012 2013 100ERouting Chapter 7 CCNA 2 4.0 2012 2013 100%

January 16, 2012 by HeiseR 0 Comments and 0 Reactions

Page 30: CCNA 2 Chapter 7 V4

Take Assessment – ERouting Chapter 7 – CCNA Exploration: Routing Protocols and Concepts (Version 4.0) – Answers – 2012 – 2013

1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)10.0.0.0/8127.0.0.0/8169.254.0.0/16172.16.0.0/12192.168.0.0/16209.165.201.0/27

2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?A gateway of last resort is required.Subnetting is not supported by RIPv1.VLSM is not supported by RIPv1.One of the routers needs a clock rate on the serial interface.

3.

Page 31: CCNA 2 Chapter 7 V4

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?Only version 2 updates are sent to 255.255.255.255.Only version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 255.255.255.255.

4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit?The routing table is limited to 2 routes.The LAN interfaces are participating in the routing process.One update has been sent out of each serial interface and 2 have been received.The no auto-summary has not been configured on this router.

5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLSM.RIP version 2 supports more than 16 routers.RIP version 2 supports classful (and not classless) routing.RIP version 2 supports routing update authentication.RIP version 2 supports multi-areas.RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.

Page 32: CCNA 2 Chapter 7 V4

6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router:router ripnetwork 10.0.0.0network 172.16.0.0When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?The network statements are configured incorrectly.A routing loop has been created.RIPv1 is unable to route to discontiguous subnets of a major network.RIPv1 is unable to route networks with a /24 subnet mask.

7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?prevents Router1 from forwarding updates about networks that are not directly connectedcauses all routers in the network to synchronize routing updates with Router1forces Router1 to become the primary or designated router (DR) for updatespropagates the default route to all routers in the network

8.

Refer to the exhibit. A technician needs to add a new loopback interface to

Page 33: CCNA 2 Chapter 7 V4

test routing functionality and network design. The technician enters the following set of commands on the router:Sanford(config)# interface loopback1Sanford(config-if)# ip address 192.168.6.62 255.255.255.252Why does the router respond with an error?The router does not allow loopback interface configurations.This mask can not be used with this class of addresses.Classless routing must be configured before this address can be added.The network address for Loopback1 overlaps with an already configured interface address.The router is over the limit for the maximum paths that can be provided in therouting table.

9. What is the maximum network diameter permitted by the default metric of RIPv2?15 hops16 hops100 hops120 hops255 hops

10. What are two functions of the network command used when configuring routing protocols? (Choose two.)identifies which networks will be included in the routing updatesidentifies the hosts addresses that can be summarized in the networkused to list all addresses for remote and local networksdetermines which subnet mask to apply to routing updatesdetermines which interfaces can send and receive routing updates

11.

Page 34: CCNA 2 Chapter 7 V4

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks areadded.A connected route to the 10.16.1.128/27 network is added.A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.

12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 does not send subnet masks in its updates.Router A is not setup with RIP as a routing protocol.Rip version 2 will auto summarize routes by default.Router B is not setup to advertise the 192.168.1.64/30 network.

13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?Subnet masks will be added to the routing updates.Routing updates will be sent out using multicast address 224.0.0.9.Version 1 and 2 updates will be received and the version 2 updates will not be sent.The RIP routing process will be removed from the router and routing updates will not be forwarded.

14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)They both use hop count as a metric.They both have the same metric value for infinite distance.They both broadcast their updates to their neighbors.They both send subnet mask information in their updates.They both provide for authentication of update sources.They both use split horizon to prevent routing loops.

Page 35: CCNA 2 Chapter 7 V4

15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem?Enable split horizon in the network.Configure RIPv2 on routers.Add network 192.168.1.0 to the RIP configuration on the JAX router.Configure JAX Fa0/0 as a passive interface.Enable the Serial0/0/0 interface on the JAX router.Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.

16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?subnet maskdestination port numberaddress family identifiersource and destination IP addresses

Page 36: CCNA 2 Chapter 7 V4

17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router1(config)# ip classlessRouter1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2

18. Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router1 will install a route to 192.168.0.0/24Router1 will install a route to 192.168.16.0/24Router2 will install a route to 192.168.16.0/24Router2 will not install a route to 192.168.16.0/20

19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.The CHI router will install a route to the 192.168.0.0/16 network in its routing table.The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to

Page 37: CCNA 2 Chapter 7 V4

the route.The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routingupdates it forwards.

20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?Router1(config)# ip classlessRouter1(config-router)# network 192.168.16.0Router1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2

DsmbISP Chapter 7 CCNA Discovery 2 4.1 2012 2013 100%January 1, 2012 by HeiseR 0 Comments and 0 Reactions

Take Assessment – DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1) – Answers – 2012 – 2013

1.

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.The OSI network layer is comparable to the Internet layer of the TCP/IP model.The TCP/IP model specifies protocols for the physical network interconnection.The TCP/IP model is based on four layers and the OSI model is based on seven layers.

Page 38: CCNA 2 Chapter 7 V4

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)accessibilityadaptabilityavailabilityreliabilityscalability

3. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)It utilizes TCP port 110.A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.It utilizes a store and forward process.The same application layer protocol is used to send the e-mail and retrieve it from the destination server.SMTP is used to send the e-mail message to the mail servers.

4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?Host1 sends an ACK message to Host2.Host1 sends a SYN message to Host2.Host1 sends a SYN-ACK message to Host2.Host2 sends an ACK message to Host1.Host2 sends a SYN message to Host1.Host2 sends a SYN-ACK message to Host1.

5. What are three characteristics of network reliability? (Choose three.)Redundant hardware provides enhanced reliability.Reliability is measured as a percent.Reliability is the responsibility of the ISP customers.Fault tolerance is a measure of reliability.The longer the MTBF, the greater the reliability.

6. Which two statements describe the FTP protocol? (Choose two.)It uses well-known port 23.The protocol interpreter is responsible for the data transfer function.In passive data connections, the FTP client initiates the transfer of data.It requires two connections between client and server.FTP servers open a well-known port on the client machine.

7. What is the function of the TCP three-way handshake?It enables the synchronization of port numbers between source and destination hosts.It immediately triggers the retransmission of lost data.It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence

Page 39: CCNA 2 Chapter 7 V4

numbers.It identifies the destination application on the receiving host.

8. What are three characteristics of HTTPS? (Choose three.)It uses a different client request-server response process than HTTP uses.It specifies additional rules for passing data between the application and data link layers.It supports authentication.It allows more simultaneous connections than HTTP allows.It encrypts packets with SSL.It requires additional server processing time.

9. Which DNS zone resolves an IP address to a qualified domain name?dynamic lookupforward lookupresolution lookupreverse lookup

10. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?dynamiczone transferlocal recursive queryroot domain querytop-level domain query

11. Refer to the exhibit. Which two statements are true about this file

? (Choose two.)If the gateway address changes, the file will be updated dynamically.The command ping fileserv will use IP address 172.16.5.10.If the ping http://www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.The file must be created by the user if it is to be used by a workstation.Name to IP address mappings are added to the file after they are received from DNS.

12. Which two tasks are the responsibility of the local DNS server? (Choose two.)maintaining a large number of cached DNS entriesmaintaining the ISP servermapping name-to-IP addresses for internal hostsforwarding name resolution requests to a caching-only serverforwarding all name resolution requests to root servers on the Internet

Page 40: CCNA 2 Chapter 7 V4

13. What are three unique characteristics of UDP? (Choose three.)connection orientedfull-duplex operationlow overheadno flow controlno error-recovery functionreliable transmission

14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)FTPHTTPICMPPPPTelnetSMTP

15. Which two options correctly match protocol and well-known port number? (Choose two.)DNS – 25FTP – 110HTTP – 80POP3 – 25SMTP – 25

16. Within TCP, what combination makes up a socket pair?source port with destination portsource IP address with destination portsource IP address and destination IP addresssource IP address and port with a destination IP address and port

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?SNMPFTPSMTPHTTPS

18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061

Page 41: CCNA 2 Chapter 7 V4

19. What type of DNS server is typically maintained by an ISP?caching-onlyrootsecond-leveltop-level

20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?The server will apply the default service configured in directory services.The server will use ARP to discover the appropriate service from the local router.The server will send a request to the client asking for the appropriate service.The server will determine the appropriate service from the destination port field.

21. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)21. When a host is communicating with multiple applications on the same server at the same time, which two values will likely be the same in all packets for each session? (Choose two.)IP addressMAC addresssession numbersequence number

22. Which three fields do a TCP header and UDP header have in common? (Choose three.)checksumdestination portsource port

23. Which three fields do a TCP header and a UDP header have in common? (Choose three.)source portchecksumdestination portacknowledgment numbersequence number

24. A manufacturing company subscribes to certain hosted services from their ISP. The services require include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)FTPHTTPDNSSNMPDHCPSMTP

Page 42: CCNA 2 Chapter 7 V4

DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which DNS zone resolves an IP address to a qualified domain name?

dynamic lookup

forward lookup

resolution lookup

reverse lookup

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)

accessibility

adaptability

availability

reliability

scalability

3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?

dynamic

zone transfer

local recursive query

root domain query

top-level domain query

4. Within TCP, what combination makes up a socket pair?

source port with destination port

source IP address with destination port

source IP address and destination IP address

Page 43: CCNA 2 Chapter 7 V4

source IP address and port with a destination IP address and port

 

5. Which two options correctly match protocol and well-known port number? (Choose two.)

DNS – 25

FTP – 110

HTTP – 80

POP3 – 25

SMTP – 25

 

6.

Refer to the exhibit. Which two statements are true about this file? (Choose two.)

If the gateway address changes, the file will be updated dynamically.

The command ping fileserv will use IP address 172.16.5.10.

Page 44: CCNA 2 Chapter 7 V4

If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.

The file must be created by the user if it is to be used by a workstation.

Name to IP address mappings are added to the file after they are received from DNS.

 

7. What are three characteristics of network reliability? (Choose three.)

Redundant hardware provides enhanced reliability.

Reliability is measured as a percent.

Reliability is the responsibility of the ISP customers.

Fault tolerance is a measure of reliability.

The longer the MTBF, the greater the reliability.

 

8. Which two statements are true about the OSI and TCP/IP models? (Choose two.)

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.

The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.

The OSI network layer is comparable to the Internet layer of the TCP/IP model.

The TCP/IP model specifies protocols for the physical network interconnection.

The TCP/IP model is based on four layers and the OSI model is based on seven layers.

 

9.

Page 45: CCNA 2 Chapter 7 V4

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host1 sends an ACK message to Host2.

Host1 sends a SYN message to Host2.

Host1 sends a SYN-ACK message to Host2.

Host2 sends an ACK message to Host1.

Host2 sends a SYN message to Host1.

Host2 sends a SYN-ACK message to Host1.

 

10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?

The server will apply the default service configured in directory services.

The server will use ARP to discover the appropriate service from the local router.

The server will send a request to the client asking for the appropriate service.

The server will determine the appropriate service from the destination port field.

 

11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)

IP address

MAC address

Page 46: CCNA 2 Chapter 7 V4

session number

sequence number

 

12. Which two statements describe the FTP protocol? (Choose two.)

It uses well-known port 23.

The protocol interpreter is responsible for the data transfer function.

In passive data connections, the FTP client initiates the transfer of data.

It requires two connections between client and server.

FTP servers open a well-known port on the client machine.

 

13. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)

It utilizes TCP port 110.

A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.

It utilizes a store and forward process.

The same application layer protocol is used to send the e-mail and retrieve it from the destination server.

SMTP is used to send the e-mail message to the mail servers.

 

14. What is the function of the TCP three-way handshake?

It enables the synchronization of port numbers between source and destination hosts.

It immediately triggers the retransmission of lost data.

It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.

Page 47: CCNA 2 Chapter 7 V4

It identifies the destination application on the receiving host.

 

15.

Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?

Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80

Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045

Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80

Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061

 

16. What type of DNS server is typically maintained by an ISP?

caching-only

root

second-level

top-level

 

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?

SNMP

Page 48: CCNA 2 Chapter 7 V4

FTP

SMTP

HTTPS

 

18. Which two tasks are the responsibility of the local DNS server? (Choose two.)

maintaining a large number of cached DNS entries

maintaining the ISP server

mapping name-to-IP addresses for internal hosts

forwarding name resolution requests to a caching-only server

forwarding all name resolution requests to root servers on the Internet

 

19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)

FTP

HTTP

ICMP

PPP

Telnet

SMTP

 

20. What are three unique characteristics of UDP? (Choose three.)

connection oriented

full-duplex operation

Page 49: CCNA 2 Chapter 7 V4

low overhead

no flow control

no error-recovery function

reliable transmission

 

21. What are three characteristics of HTTPS? (Choose three.)

It uses a different client request-server response process than HTTP uses.

It specifies additional rules for passing data between the application and data link layers.

It supports authentication.

It allows more simultaneous connections than HTTP allows.

It encrypts packets with SSL.

It requires additional server processing time.

DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which DNS zone resolves an IP address to a qualified domain name?

dynamic lookup

forward lookup

resolution lookup

reverse lookup

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)

accessibility

adaptability

availability

Page 50: CCNA 2 Chapter 7 V4

reliability

scalability

3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?

dynamic

zone transfer

local recursive query

root domain query

top-level domain query

4. Within TCP, what combination makes up a socket pair?

source port with destination port

source IP address with destination port

source IP address and destination IP address

source IP address and port with a destination IP address and port

 

5. Which two options correctly match protocol and well-known port number? (Choose two.)

DNS – 25

FTP – 110

HTTP – 80

POP3 – 25

SMTP – 25

 

6.

Page 51: CCNA 2 Chapter 7 V4

Refer to the exhibit. Which two statements are true about this file? (Choose two.)

If the gateway address changes, the file will be updated dynamically.

The command ping fileserv will use IP address 172.16.5.10.

If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.

The file must be created by the user if it is to be used by a workstation.

Name to IP address mappings are added to the file after they are received from DNS.

 

7. What are three characteristics of network reliability? (Choose three.)

Redundant hardware provides enhanced reliability.

Reliability is measured as a percent.

Reliability is the responsibility of the ISP customers.

Fault tolerance is a measure of reliability.

The longer the MTBF, the greater the reliability.

Page 52: CCNA 2 Chapter 7 V4

 

8. Which two statements are true about the OSI and TCP/IP models? (Choose two.)

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.

The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.

The OSI network layer is comparable to the Internet layer of the TCP/IP model.

The TCP/IP model specifies protocols for the physical network interconnection.

The TCP/IP model is based on four layers and the OSI model is based on seven layers.

 

9.

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host1 sends an ACK message to Host2.

Host1 sends a SYN message to Host2.

Host1 sends a SYN-ACK message to Host2.

Host2 sends an ACK message to Host1.

Host2 sends a SYN message to Host1.

Host2 sends a SYN-ACK message to Host1.

 

Page 53: CCNA 2 Chapter 7 V4

10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?

The server will apply the default service configured in directory services.

The server will use ARP to discover the appropriate service from the local router.

The server will send a request to the client asking for the appropriate service.

The server will determine the appropriate service from the destination port field.

 

11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)

IP address

MAC address

session number

sequence number

 

12. Which two statements describe the FTP protocol? (Choose two.)

It uses well-known port 23.

The protocol interpreter is responsible for the data transfer function.

In passive data connections, the FTP client initiates the transfer of data.

It requires two connections between client and server.

FTP servers open a well-known port on the client machine.

 

13. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)

It utilizes TCP port 110.

Page 54: CCNA 2 Chapter 7 V4

A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.

It utilizes a store and forward process.

The same application layer protocol is used to send the e-mail and retrieve it from the destination server.

SMTP is used to send the e-mail message to the mail servers.

 

14. What is the function of the TCP three-way handshake?

It enables the synchronization of port numbers between source and destination hosts.

It immediately triggers the retransmission of lost data.

It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.

It identifies the destination application on the receiving host.

 

15.

Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?

Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80

Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045

Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80

Page 55: CCNA 2 Chapter 7 V4

Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061

 

16. What type of DNS server is typically maintained by an ISP?

caching-only

root

second-level

top-level

 

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?

SNMP

FTP

SMTP

HTTPS

 

18. Which two tasks are the responsibility of the local DNS server? (Choose two.)

maintaining a large number of cached DNS entries

maintaining the ISP server

mapping name-to-IP addresses for internal hosts

forwarding name resolution requests to a caching-only server

forwarding all name resolution requests to root servers on the Internet

 

19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three

Page 56: CCNA 2 Chapter 7 V4

protocols represent the key application services that are required by the company? (Choose three.)

FTP

HTTP

ICMP

PPP

Telnet

SMTP

 

20. What are three unique characteristics of UDP? (Choose three.)

connection oriented

full-duplex operation

low overhead

no flow control

no error-recovery function

reliable transmission

 

21. What are three characteristics of HTTPS? (Choose three.)

It uses a different client request-server response process than HTTP uses.

It specifies additional rules for passing data between the application and data link layers.

It supports authentication.

It allows more simultaneous connections than HTTP allows.

It encrypts packets with SSL.

It requires additional server processing time.

Page 57: CCNA 2 Chapter 7 V4