ccna 2 chapter 7 v4
TRANSCRIPT
CCNA 2 Chapter 7 V4.0 Answers
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)
10.0.0.0/8
127.0.0.0/8
169.254.0.0/16
172.16.0.0/12
192.168.0.0/16
209.165.201.0/27
2.
Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?
A gateway of last resort is required.
Subnetting is not supported by RIPv1.
VLSM is not supported by RIPv1.
One of the routers needs a clock rate on the serial interface.
3.
Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?
Only version 2 updates are sent to 255.255.255.255.
Only version 2 updates are sent to 224.0.0.9
Both version 1 and version 2 updates are sent to 224.0.0.9.
Both version 1 and version 2 updates are sent to 255.255.255.255.
4.
Refer to the exhibit. What can be concluded from the output shown in the exhibit?
The routing table is limited to 2 routes.
The LAN interfaces are participating in the routing process.
One update has been sent out of each serial interface and 2 have been received.
The no auto-summary has not been configured on this router.
5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)
RIP version 2 supports VLSM.
RIP version 2 supports more than 16 routers.
RIP version 2 supports classful (and not classless) routing.
RIP version 2 supports routing update authentication.
RIP version 2 supports multi-areas.
RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.
6.
Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router rip network 10.0.0.0 network 172.16.0.0
When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?
The network statements are configured incorrectly.
A routing loop has been created.
RIPv1 is unable to route to discontiguous subnets of a major network.
RIPv1 is unable to route networks with a /24 subnet mask.
7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?
prevents Router1 from forwarding updates about networks that are not directly connected
causes all routers in the network to synchronize routing updates with Router1
forces Router1 to become the primary or designated router (DR) for updates
propagates the default route to all routers in the network
8.
Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:
Sanford(config)# interface loopback1 Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error?
The router does not allow loopback interface configurations.
This mask can not be used with this class of addresses.
Classless routing must be configured before this address can be added.
The network address for Loopback1 overlaps with an already configured interface address.
The router is over the limit for the maximum paths that can be provided in the routing table.
9. What is the maximum network diameter permitted by the default metric of RIPv2?
15 hops
16 hops
100 hops
120 hops
255 hops
10. What are two functions of the network command used when configuring routing protocols? (Choose two.)
identifies which networks will be included in the routing updates
identifies the hosts addresses that can be summarized in the network
used to list all addresses for remote and local networks
determines which subnet mask to apply to routing updates
determines which interfaces can send and receive routing updates
11.
Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?
Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added.
A connected route to the 10.16.1.128/27 network is added.
A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.
The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.
12.
Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?
Rip version 2 does not send subnet masks in its updates.
Router A is not setup with RIP as a routing protocol.
Rip version 2 will auto summarize routes by default.
Router B is not setup to advertise the 192.168.1.64/30 network.
13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?
Subnet masks will be added to the routing updates.
Routing updates will be sent out using multicast address 224.0.0.9.
Version 1 and 2 updates will be received and the version 2 updates will not be sent.
The RIP routing process will be removed from the router and routing updates will not be forwarded.
14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)
They both use hop count as a metric.
They both have the same metric value for infinite distance.
They both broadcast their updates to their neighbors.
They both send subnet mask information in their updates.
They both provide for authentication of update sources.
They both use split horizon to prevent routing loops.
15.
Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem?
Enable split horizon in the network.
Configure RIPv2 on routers.
Add network 192.168.1.0 to the RIP configuration on the JAX router.
Configure JAX Fa0/0 as a passive interface.
Enable the Serial0/0/0 interface on the JAX router.
Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.
16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?
subnet mask
destination port number
address family identifier
source and destination IP addresses
17.
Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?
Router1(config)# ip classless
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2
18.
Refer to the exhibit. Which two statements are true? (Choose two.)
Router1 will install a route to 192.168.0.0/20
Router1 will install a route to 192.168.0.0/24
Router1 will install a route to 192.168.16.0/24
Router2 will install a route to 192.168.16.0/24
Router2 will not install a route to 192.168.16.0/20
19.
Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network
administrator enters the commands shown in the exhibit. What changes will occur in this network?
The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.
The CHI router will install a route to the 192.168.0.0/16 network in its routing table.
The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route.
The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.
20.
Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?
Router1(config)# ip classless
Router1(config-router)# network 192.168.16.0
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2
CCNA 2 Chapter 7 V4.0 Answers
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)10.0.0.0/8127.0.0.0/8169.254.0.0/16172.16.0.0/12192.168.0.0/16209.165.201.0/27
2.
Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?A gateway of last resort is required.Subnetting is not supported by RIPv1.VLSM is not supported by RIPv1.One of the routers needs a clock rate on the serial interface.
3.
Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?Only version 2 updates are sent to 255.255.255.255.Only version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 255.255.255.255.
4.
Refer to the exhibit. What can be concluded from the output shown in the exhibit?The routing table is limited to 2 routes.The LAN interfaces are participating in the routing process.One update has been sent out of each serial interface and 2 have been received.The no auto-summary has not been configured on this router.
5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLSM.RIP version 2 supports more than 16 routers.
RIP version 2 supports classful (and not classless) routing.RIP version 2 supports routing update authentication.RIP version 2 supports multi-areas.RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.
6.
Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router: router ripnetwork 10.0.0.0network 172.16.0.0When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?The network statements are configured incorrectly.A routing loop has been created.RIPv1 is unable to route to discontiguous subnets of a major network.RIPv1 is unable to route networks with a /24 subnet mask.
7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?prevents Router1 from forwarding updates about networks that are not directly connectedcauses all routers in the network to synchronize routing updates with Router1forces Router1 to become the primary or designated router (DR) for updatespropagates the default route to all routers in the network
8.
Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:
Sanford(config)# interface loopback1
Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error?The router does not allow loopback interface configurations.This mask can not be used with this class of addresses.Classless routing must be configured before this address can be added.The network address for Loopback1 overlaps with an already configured interface address.The router is over the limit for the maximum paths that can be provided in the routing table.
9. What is the maximum network diameter permitted by the default metric of RIPv2?15 hops16 hops100 hops120 hops255 hops
10. What are two functions of the network command used when configuring routing protocols? (Choose two.)identifies which networks will be included in the routing updatesidentifies the hosts addresses that can be summarized in the networkused to list all addresses for remote and local networksdetermines which subnet mask to apply to routing updatesdetermines which interfaces can send and receive routing updates
11.
Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added.A connected route to the 10.16.1.128/27 network is added.A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.
12.
Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 does not send subnet masks in its updates.
Router A is not setup with RIP as a routing protocol.Rip version 2 will auto summarize routes by default.Router B is not setup to advertise the 192.168.1.64/30 network.
13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?Subnet masks will be added to the routing updates.Routing updates will be sent out using multicast address 224.0.0.9.Version 1 and 2 updates will be received and the version 2 updates will not be sent.The RIP routing process will be removed from the router and routing updates will not be forwarded.
14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)They both use hop count as a metric.They both have the same metric value for infinite distance.They both broadcast their updates to their neighbors.They both send subnet mask information in their updates.They both provide for authentication of update sources.They both use split horizon to prevent routing loops.
15.
Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the
192.168.1.16/28 network. What is a possible solution to this problem?Enable split horizon in the network.Configure RIPv2 on routers.Add network 192.168.1.0 to the RIP configuration on the JAX router.Configure JAX Fa0/0 as a passive interface.Enable the Serial0/0/0 interface on the JAX router.Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.
16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?subnet maskdestination port numberaddress family identifiersource and destination IP addresses
17.
Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router1(config)# ip classlessRouter1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2
18.
Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router1 will install a route to 192.168.0.0/24Router1 will install a route to 192.168.16.0/24Router2 will install a route to 192.168.16.0/24Router2 will not install a route to 192.168.16.0/20
19.
Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.The CHI router will install a route to the 192.168.0.0/16 network in its routing table.The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route.The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.
20.
Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?Router1(config)# ip classlessRouter1(config-router)# network 192.168.16.0Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2Router2(config-router)# neighbor 10.CCNA 2 Chapter 7 2012 V4.0 Answers
1. A network administrator has been told that the company IP address
infrastructure must adhere to RFC 1918. What three IP address ranges
from RFC 1918 could the administrator use on the network? (Choose
three.)
10.0.0.0/8
127.0.0.0/8
169.254.0.0/16
172.16.0.0/12
192.168.0.0/16
209.165.201.0/27
2.
Refer to the exhibit. Routers East and West are configured using RIPv1.
Both routers are sending updates about their directly connected routes.
The East router can ping the West router serial interface and West can
ping the serial interface of East. However, neither router has
dynamically learned routes from the other. What is most likely the
problem?
A gateway of last resort is required.
Subnetting is not supported by RIPv1.
VLSM is not supported by RIPv1.
One of the routers needs a clock rate on the serial interface.
3.
Refer to the exhibit. What effect will the commands that are shown have
on RIP updates for Router1?
Only version 2 updates are sent to 255.255.255.255.
Only version 2 updates are sent to 224.0.0.9.
Both version 1 and version 2 updates are sent to 224.0.0.9.
Both version 1 and version 2 updates are sent to 255.255.255.255.
4.
Refer to the exhibit. What can be concluded from the output shown in
the exhibit?
The routing table is limited to 2 routes.
The LAN interfaces are participating in the routing process.
One update has been sent out of each serial interface and 2 have been
received.
The no auto-summary has not been configured on this router.
5. What are two reasons to implement RIP version 2 rather than RIP
version 1? (Choose two.)
RIP version 2 supports VLSM.
RIP version 2 supports more than 16 routers.
RIP version 2 supports classful (and not classless) routing.
RIP version 2 supports routing update authentication.
RIP version 2 supports multi-areas.
RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford
algorithm.
6.
Refer to the exhibit. RIPv1 is configured as the routing protocol for the
network that is shown. The following commands are used on each
router:
router rip
network 10.0.0.0
network 172.16.0.0
When this configuration is complete, users on the LAN of each router are
unable to access the remote LANs. Why?
The network statements are configured incorrectly.
A routing loop has been created.
RIPv1 is unable to route to discontiguous subnets of a major network.
RIPv1 is unable to route networks with a /24 subnet mask.
7. A network administrator installed four new routers that are running
RIPv2. Router1 is a boundary router in the RIPv2 network and has
a default routeconfigured. Once the network has converged, the
network administrator enters Router1(config-router)# default-
information originate on Router1. How will this affect the network?
prevents Router1 from forwarding updates about networks that are not directly
connected
causes all routers in the network to synchronize routing updates with Router1
forces Router1 to become the primary or designated router (DR) for updates
propagates the default route to all routers in the network
8.
Refer to the exhibit. A technician needs to add a new loopback interface
to test routing functionality and network design. The technician enters
the following set of commands on the router:
Sanford(config)# interface loopback1
Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the
router respond with an error?
The router does not allow loopback interface configurations.
This mask can not be used with this class of addresses.
Classless routing must be configured before this address can be added.
The network address for Loopback1 overlaps with an already configured
interface address.
The router is over the limit for the maximum paths that can be provided in the
routing table.
9. What is the maximum network diameter permitted by the default
metric of RIPv2?
15 hops
16 hops
100 hops
120 hops
255 hops
10. What are two functions of the network command used when
configuringrouting protocols? (Choose two.)
identifies which networks will be included in the routing updates
identifies the hosts addresses that can be summarized in the network
used to list all addresses for remote and local networks
determines which subnet mask to apply to routing updates
determines which interfaces can send and receive routing updates
11.
Refer to the exhibit. All routers are running RIPv1. What changes will
occur in the routing table of router B if a loopback interface with an
address of 10.16.1.129/27 is configured on router B?
Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are
added.
A connected route to the 10.16.1.128/27 network is added.
A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.
The 10.0.0.0/8 route is dropped immediately from the routing table after router
B is configured.
12.
Refer to the exhibit. If all routers are running RIP version 2, why is
there no route for the 192.168.1.32/27 network?
Rip version 2 does not send subnet masks in its updates.
Router A is not setup with RIP as a routing protocol.
Rip version 2 will auto summarize routes by default.
Router B is not setup to advertise the 192.168.1.64/30 network.
13. RIPv2 is the configured routing protocol on the routers in a
network. The command Router(config-router)# no version 2 is entered
on the routers. What effect does entering this command have on
routing updates?
Subnet masks will be added to the routing updates.
Routing updates will be sent out using multicast address 224.0.0.9.
Version 1 and 2 updates will be received and the version 2 updates will not be
sent.
The RIP routing process will be removed from the router and routing updates
will not be forwarded.
14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)
They both use hop count as a metric.
They both have the same metric value for infinite distance.
They both broadcast their updates to their neighbors.
They both send subnet mask information in their updates.
They both provide for authentication of update sources.
They both use split horizon to prevent routing loops.
15.
Refer to the exhibit. The exhibited network contains a mixture of Cisco
and non-Cisco routers. The command debug ip rip was entered on the
JAX router. All routers are running the same version of RIP. Router CHI
and Router ORL are not able to reach the 192.168.1.16/28 network.
What is a possible solution to this problem?
Enable split horizon in the network.
Configure RIPv2 on routers.
Add network 192.168.1.0 to the RIP configuration on the JAX router.
Configure JAX Fa0/0 as a passive interface.
Enable the Serial0/0/0 interface on the JAX router.
Change the IP address on the Fa0/0 interface of the JAX router to
192.168.1.1/24.
16. What field was added to the RIP message header by RFC 1723 to add
support for VLSM and CIDR?
subnet mask
destination port number
address family identifier
source and destination IP addresses
17.
Refer to the exhibit. Which command on which router will allow
Router1 to learn about the 192.168.0.0/20 network?
Router1(config)# ip classless
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2
18.
Refer to the exhibit. Which two statements are true? (Choose two.)
Router1 will install a route to 192.168.0.0/20
Router1 will install a route to 192.168.0.0/24
Router1 will install a route to 192.168.16.0/24
Router2 will install a route to 192.168.16.0/24
Router2 will not install a route to 192.168.16.0/20
19.
Refer to the exhibit. All routers are running RIP version 2. JAX is
configured to just advertise the 10.0.0.0/24 network. CHI is configured
to advertise the 172.16.0.0/16 network. A network administrator enters
the commands shown in the exhibit. What changes will occur in this
network?
The JAX router will ignore updates for the 172.16.0.0/16 network due to split
horizon issues.
The CHI router will install a route to the 192.168.0.0/16 network in its routing
table.
The routing table for CHI will have the 192.168.0.0/16 route but it will have an
S next to the route.
The ORL router will apply a 255.255.0.0 subnet mask to all networks in the
routing updates it forwards.
20.
Refer to the exhibit. Which command will allow Router2 to learn about
the 192.168.16.0/28 network?
Router1(config)# ip classless
Router1(config-router)# network 192.168.16.0
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2
You are here: Home / Cisco Associate / CCNA / CCNA Exploration / ERouting Chapter 7 CCNA 2 4.0 2012 2013 100ERouting Chapter 7 CCNA 2 4.0 2012 2013 100%
January 16, 2012 by HeiseR 0 Comments and 0 Reactions
Take Assessment – ERouting Chapter 7 – CCNA Exploration: Routing Protocols and Concepts (Version 4.0) – Answers – 2012 – 2013
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)10.0.0.0/8127.0.0.0/8169.254.0.0/16172.16.0.0/12192.168.0.0/16209.165.201.0/27
2.
Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?A gateway of last resort is required.Subnetting is not supported by RIPv1.VLSM is not supported by RIPv1.One of the routers needs a clock rate on the serial interface.
3.
Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?Only version 2 updates are sent to 255.255.255.255.Only version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 224.0.0.9.Both version 1 and version 2 updates are sent to 255.255.255.255.
4.
Refer to the exhibit. What can be concluded from the output shown in the exhibit?The routing table is limited to 2 routes.The LAN interfaces are participating in the routing process.One update has been sent out of each serial interface and 2 have been received.The no auto-summary has not been configured on this router.
5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLSM.RIP version 2 supports more than 16 routers.RIP version 2 supports classful (and not classless) routing.RIP version 2 supports routing update authentication.RIP version 2 supports multi-areas.RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.
6.
Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router:router ripnetwork 10.0.0.0network 172.16.0.0When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?The network statements are configured incorrectly.A routing loop has been created.RIPv1 is unable to route to discontiguous subnets of a major network.RIPv1 is unable to route networks with a /24 subnet mask.
7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?prevents Router1 from forwarding updates about networks that are not directly connectedcauses all routers in the network to synchronize routing updates with Router1forces Router1 to become the primary or designated router (DR) for updatespropagates the default route to all routers in the network
8.
Refer to the exhibit. A technician needs to add a new loopback interface to
test routing functionality and network design. The technician enters the following set of commands on the router:Sanford(config)# interface loopback1Sanford(config-if)# ip address 192.168.6.62 255.255.255.252Why does the router respond with an error?The router does not allow loopback interface configurations.This mask can not be used with this class of addresses.Classless routing must be configured before this address can be added.The network address for Loopback1 overlaps with an already configured interface address.The router is over the limit for the maximum paths that can be provided in therouting table.
9. What is the maximum network diameter permitted by the default metric of RIPv2?15 hops16 hops100 hops120 hops255 hops
10. What are two functions of the network command used when configuring routing protocols? (Choose two.)identifies which networks will be included in the routing updatesidentifies the hosts addresses that can be summarized in the networkused to list all addresses for remote and local networksdetermines which subnet mask to apply to routing updatesdetermines which interfaces can send and receive routing updates
11.
Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks areadded.A connected route to the 10.16.1.128/27 network is added.A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.
12.
Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 does not send subnet masks in its updates.Router A is not setup with RIP as a routing protocol.Rip version 2 will auto summarize routes by default.Router B is not setup to advertise the 192.168.1.64/30 network.
13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?Subnet masks will be added to the routing updates.Routing updates will be sent out using multicast address 224.0.0.9.Version 1 and 2 updates will be received and the version 2 updates will not be sent.The RIP routing process will be removed from the router and routing updates will not be forwarded.
14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)They both use hop count as a metric.They both have the same metric value for infinite distance.They both broadcast their updates to their neighbors.They both send subnet mask information in their updates.They both provide for authentication of update sources.They both use split horizon to prevent routing loops.
15.
Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem?Enable split horizon in the network.Configure RIPv2 on routers.Add network 192.168.1.0 to the RIP configuration on the JAX router.Configure JAX Fa0/0 as a passive interface.Enable the Serial0/0/0 interface on the JAX router.Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.
16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?subnet maskdestination port numberaddress family identifiersource and destination IP addresses
17.
Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router1(config)# ip classlessRouter1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2
18. Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router1 will install a route to 192.168.0.0/24Router1 will install a route to 192.168.16.0/24Router2 will install a route to 192.168.16.0/24Router2 will not install a route to 192.168.16.0/20
19.
Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.The CHI router will install a route to the 192.168.0.0/16 network in its routing table.The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to
the route.The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routingupdates it forwards.
20.
Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?Router1(config)# ip classlessRouter1(config-router)# network 192.168.16.0Router1(config-router)# no passive-interface serial 0/1/1Router2(config-router)# version 2Router2(config-router)# neighbor 10.0.0.2
DsmbISP Chapter 7 CCNA Discovery 2 4.1 2012 2013 100%January 1, 2012 by HeiseR 0 Comments and 0 Reactions
Take Assessment – DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1) – Answers – 2012 – 2013
1.
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.The OSI network layer is comparable to the Internet layer of the TCP/IP model.The TCP/IP model specifies protocols for the physical network interconnection.The TCP/IP model is based on four layers and the OSI model is based on seven layers.
2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)accessibilityadaptabilityavailabilityreliabilityscalability
3. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)It utilizes TCP port 110.A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.It utilizes a store and forward process.The same application layer protocol is used to send the e-mail and retrieve it from the destination server.SMTP is used to send the e-mail message to the mail servers.
4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?Host1 sends an ACK message to Host2.Host1 sends a SYN message to Host2.Host1 sends a SYN-ACK message to Host2.Host2 sends an ACK message to Host1.Host2 sends a SYN message to Host1.Host2 sends a SYN-ACK message to Host1.
5. What are three characteristics of network reliability? (Choose three.)Redundant hardware provides enhanced reliability.Reliability is measured as a percent.Reliability is the responsibility of the ISP customers.Fault tolerance is a measure of reliability.The longer the MTBF, the greater the reliability.
6. Which two statements describe the FTP protocol? (Choose two.)It uses well-known port 23.The protocol interpreter is responsible for the data transfer function.In passive data connections, the FTP client initiates the transfer of data.It requires two connections between client and server.FTP servers open a well-known port on the client machine.
7. What is the function of the TCP three-way handshake?It enables the synchronization of port numbers between source and destination hosts.It immediately triggers the retransmission of lost data.It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence
numbers.It identifies the destination application on the receiving host.
8. What are three characteristics of HTTPS? (Choose three.)It uses a different client request-server response process than HTTP uses.It specifies additional rules for passing data between the application and data link layers.It supports authentication.It allows more simultaneous connections than HTTP allows.It encrypts packets with SSL.It requires additional server processing time.
9. Which DNS zone resolves an IP address to a qualified domain name?dynamic lookupforward lookupresolution lookupreverse lookup
10. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?dynamiczone transferlocal recursive queryroot domain querytop-level domain query
11. Refer to the exhibit. Which two statements are true about this file
? (Choose two.)If the gateway address changes, the file will be updated dynamically.The command ping fileserv will use IP address 172.16.5.10.If the ping http://www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.The file must be created by the user if it is to be used by a workstation.Name to IP address mappings are added to the file after they are received from DNS.
12. Which two tasks are the responsibility of the local DNS server? (Choose two.)maintaining a large number of cached DNS entriesmaintaining the ISP servermapping name-to-IP addresses for internal hostsforwarding name resolution requests to a caching-only serverforwarding all name resolution requests to root servers on the Internet
13. What are three unique characteristics of UDP? (Choose three.)connection orientedfull-duplex operationlow overheadno flow controlno error-recovery functionreliable transmission
14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)FTPHTTPICMPPPPTelnetSMTP
15. Which two options correctly match protocol and well-known port number? (Choose two.)DNS – 25FTP – 110HTTP – 80POP3 – 25SMTP – 25
16. Within TCP, what combination makes up a socket pair?source port with destination portsource IP address with destination portsource IP address and destination IP addresssource IP address and port with a destination IP address and port
17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?SNMPFTPSMTPHTTPS
18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
19. What type of DNS server is typically maintained by an ISP?caching-onlyrootsecond-leveltop-level
20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?The server will apply the default service configured in directory services.The server will use ARP to discover the appropriate service from the local router.The server will send a request to the client asking for the appropriate service.The server will determine the appropriate service from the destination port field.
21. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)21. When a host is communicating with multiple applications on the same server at the same time, which two values will likely be the same in all packets for each session? (Choose two.)IP addressMAC addresssession numbersequence number
22. Which three fields do a TCP header and UDP header have in common? (Choose three.)checksumdestination portsource port
23. Which three fields do a TCP header and a UDP header have in common? (Choose three.)source portchecksumdestination portacknowledgment numbersequence number
24. A manufacturing company subscribes to certain hosted services from their ISP. The services require include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)FTPHTTPDNSSNMPDHCPSMTP
DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)
1. Which DNS zone resolves an IP address to a qualified domain name?
dynamic lookup
forward lookup
resolution lookup
reverse lookup
2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)
accessibility
adaptability
availability
reliability
scalability
3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
dynamic
zone transfer
local recursive query
root domain query
top-level domain query
4. Within TCP, what combination makes up a socket pair?
source port with destination port
source IP address with destination port
source IP address and destination IP address
source IP address and port with a destination IP address and port
5. Which two options correctly match protocol and well-known port number? (Choose two.)
DNS – 25
FTP – 110
HTTP – 80
POP3 – 25
SMTP – 25
6.
Refer to the exhibit. Which two statements are true about this file? (Choose two.)
If the gateway address changes, the file will be updated dynamically.
The command ping fileserv will use IP address 172.16.5.10.
If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
The file must be created by the user if it is to be used by a workstation.
Name to IP address mappings are added to the file after they are received from DNS.
7. What are three characteristics of network reliability? (Choose three.)
Redundant hardware provides enhanced reliability.
Reliability is measured as a percent.
Reliability is the responsibility of the ISP customers.
Fault tolerance is a measure of reliability.
The longer the MTBF, the greater the reliability.
8. Which two statements are true about the OSI and TCP/IP models? (Choose two.)
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
The TCP/IP model is based on four layers and the OSI model is based on seven layers.
9.
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends an ACK message to Host2.
Host1 sends a SYN message to Host2.
Host1 sends a SYN-ACK message to Host2.
Host2 sends an ACK message to Host1.
Host2 sends a SYN message to Host1.
Host2 sends a SYN-ACK message to Host1.
10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
The server will apply the default service configured in directory services.
The server will use ARP to discover the appropriate service from the local router.
The server will send a request to the client asking for the appropriate service.
The server will determine the appropriate service from the destination port field.
11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)
IP address
MAC address
session number
sequence number
12. Which two statements describe the FTP protocol? (Choose two.)
It uses well-known port 23.
The protocol interpreter is responsible for the data transfer function.
In passive data connections, the FTP client initiates the transfer of data.
It requires two connections between client and server.
FTP servers open a well-known port on the client machine.
13. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)
It utilizes TCP port 110.
A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
It utilizes a store and forward process.
The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
SMTP is used to send the e-mail message to the mail servers.
14. What is the function of the TCP three-way handshake?
It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.
15.
Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
16. What type of DNS server is typically maintained by an ISP?
caching-only
root
second-level
top-level
17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?
SNMP
FTP
SMTP
HTTPS
18. Which two tasks are the responsibility of the local DNS server? (Choose two.)
maintaining a large number of cached DNS entries
maintaining the ISP server
mapping name-to-IP addresses for internal hosts
forwarding name resolution requests to a caching-only server
forwarding all name resolution requests to root servers on the Internet
19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)
FTP
HTTP
ICMP
PPP
Telnet
SMTP
20. What are three unique characteristics of UDP? (Choose three.)
connection oriented
full-duplex operation
low overhead
no flow control
no error-recovery function
reliable transmission
21. What are three characteristics of HTTPS? (Choose three.)
It uses a different client request-server response process than HTTP uses.
It specifies additional rules for passing data between the application and data link layers.
It supports authentication.
It allows more simultaneous connections than HTTP allows.
It encrypts packets with SSL.
It requires additional server processing time.
DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)
1. Which DNS zone resolves an IP address to a qualified domain name?
dynamic lookup
forward lookup
resolution lookup
reverse lookup
2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)
accessibility
adaptability
availability
reliability
scalability
3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
dynamic
zone transfer
local recursive query
root domain query
top-level domain query
4. Within TCP, what combination makes up a socket pair?
source port with destination port
source IP address with destination port
source IP address and destination IP address
source IP address and port with a destination IP address and port
5. Which two options correctly match protocol and well-known port number? (Choose two.)
DNS – 25
FTP – 110
HTTP – 80
POP3 – 25
SMTP – 25
6.
Refer to the exhibit. Which two statements are true about this file? (Choose two.)
If the gateway address changes, the file will be updated dynamically.
The command ping fileserv will use IP address 172.16.5.10.
If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
The file must be created by the user if it is to be used by a workstation.
Name to IP address mappings are added to the file after they are received from DNS.
7. What are three characteristics of network reliability? (Choose three.)
Redundant hardware provides enhanced reliability.
Reliability is measured as a percent.
Reliability is the responsibility of the ISP customers.
Fault tolerance is a measure of reliability.
The longer the MTBF, the greater the reliability.
8. Which two statements are true about the OSI and TCP/IP models? (Choose two.)
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
The TCP/IP model is based on four layers and the OSI model is based on seven layers.
9.
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends an ACK message to Host2.
Host1 sends a SYN message to Host2.
Host1 sends a SYN-ACK message to Host2.
Host2 sends an ACK message to Host1.
Host2 sends a SYN message to Host1.
Host2 sends a SYN-ACK message to Host1.
10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
The server will apply the default service configured in directory services.
The server will use ARP to discover the appropriate service from the local router.
The server will send a request to the client asking for the appropriate service.
The server will determine the appropriate service from the destination port field.
11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)
IP address
MAC address
session number
sequence number
12. Which two statements describe the FTP protocol? (Choose two.)
It uses well-known port 23.
The protocol interpreter is responsible for the data transfer function.
In passive data connections, the FTP client initiates the transfer of data.
It requires two connections between client and server.
FTP servers open a well-known port on the client machine.
13. User1 is sending an e-mail to [email protected]. What are two characteristics of the process of sending this data? (Choose two.)
It utilizes TCP port 110.
A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
It utilizes a store and forward process.
The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
SMTP is used to send the e-mail message to the mail servers.
14. What is the function of the TCP three-way handshake?
It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.
15.
Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
16. What type of DNS server is typically maintained by an ISP?
caching-only
root
second-level
top-level
17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?
SNMP
FTP
SMTP
HTTPS
18. Which two tasks are the responsibility of the local DNS server? (Choose two.)
maintaining a large number of cached DNS entries
maintaining the ISP server
mapping name-to-IP addresses for internal hosts
forwarding name resolution requests to a caching-only server
forwarding all name resolution requests to root servers on the Internet
19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three
protocols represent the key application services that are required by the company? (Choose three.)
FTP
HTTP
ICMP
PPP
Telnet
SMTP
20. What are three unique characteristics of UDP? (Choose three.)
connection oriented
full-duplex operation
low overhead
no flow control
no error-recovery function
reliable transmission
21. What are three characteristics of HTTPS? (Choose three.)
It uses a different client request-server response process than HTTP uses.
It specifies additional rules for passing data between the application and data link layers.
It supports authentication.
It allows more simultaneous connections than HTTP allows.
It encrypts packets with SSL.
It requires additional server processing time.