Bank Question Check Answer
Bank Question Check Answer
00) – Switching
Concepts, VLANs, and Inter-VLAN Routing Exam
1. Which tasks can be accomplished by using the command history feature?
(Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
Set the command history buffer size.
Recall previously entered commands.
Save command lines in a log file for future reference.
Explanation: The history command allows you to view and reuse previously entered commands
stored in the buffer. It is also used to manage the of the buffer.
2. What is the first action in the boot sequence when a switch is powered on?
load the default Cisco IOS software
load boot loader software
low-level CPU initialization
load a power-on self-test program
Explanation: The first action to take place when a switch is powered on is the POST or power-on
self-test. POST performs tests on the CPU, memory, and flash in preparation for loading the boot
loader.
3. What must an administrator have in order to reset a lost password on a
router?
a TFTP server
a crossover cable
access to another router
physical access to the router
Explanation: Console access to the device through a terminal or terminal emulator software on a
PC is required for password recovery.
4. When configuring a switch for SSH access, what other command that is
associated with the login local command is required to be entered on the
switch?
enable secret password
password password
username username secret secret
login block-for seconds attempts number within*seconds*
Explanation: The login local command designates that the local username database is used to
authenticate interfaces such as console or vty.
5. Which command displays information about the auto-MDIX setting for a
specific interface?
show interfaces
show controllers
show processes
show running-config
Explanation: To examine the auto-MDIX setting for a specific interface, the show controllers
ethernet-controller command with the phy keyword should be used.
6. If one end of an Ethernet connection is configured for full duplex and the
other end of the connection is configured for half duplex, where would late
collisions be observed?
on both ends of the connection
on the full-duplex end of the connection
only on serial interfaces
on the half-duplex end of the connection
Explanation: Full-duplex communications do not produce collisions. However, collisions often
occur in half-duplex operations. When a connection has two different duplex configurations, the
half-duplex end will experience late collisions. Collisions are found on Ethernet networks. Serial
interfaces use technologies other than Ethernet.
7. Which command is used to set the BOOT environment variable that defines
where to find the IOS image file on a switch?
config-register
boot system
boot loader
confreg
Explanation: The boot system command is used to set the BOOT environment variable.
The config-register and confreg commands are used to set the configuration register.
The boot loader command supports commands to format the flash file system, reinstall the
operating system software, and recover from a lost or forgotten password.
8. What does a switch use to locate and load the IOS image?
BOOT environment variable
IOS image file
POST
startup-config
NVRAM
Explanation: The BOOT environment variable contains the information about where to find the
IOS image file.
9. Which protocol adds security to remote connections?
FTP
HTTP
NetBEUI
POP
SSH
Explanation: SSH allows a technician to securely connect to a remote network device for
monitoring and troubleshooting. HTTP establishes web page requests. FTP manages file transfer.
NetBEUI is not routed on the Internet. POP downloads email messages from email servers.
10. What is a characteristic of an IPv4 loopback interface on a Cisco IOS
router?
The no shutdown command is required to place this interface in an UP state.
It is a logical interface internal to the router.
Only one loopback interface can be enabled on a router.
It is assigned to a physical port and can be connected to other devices.
Explanation: The loopback interface is a logical interface internal to the router and is
automatically placed in an UP state, as long as the router is functioning. It is not assigned to a
physical port and can therefore never be connected to any other device. Multiple loopback
interfaces can be enabled on a router.
11. What is the minimum Ethernet frame size that will not be discarded by
the receiver as a runt frame?
64 bytes
512 bytes
1024 bytes
1500 bytes
Explanation: The minimum Ethernet frame size is 64 bytes. Frames smaller than 64 bytes are
considered collision fragments or runt frames and are discarded.
12. After which step of the switch bootup sequence is the boot loader
executed?
after CPU initialization
after IOS localization
after flash file system initialization
after POST execution
Explanation: The correct bootup sequence order is as follows:
1.- The switch loads and executes the POST.
2.- The switch loads the boot loader software.
3.- The boot loader performs low-level CPU initialization.
4.- The boot loader initializes the flash memory.
5.- The boot loader locates and loads the default IOS image.
13. Which impact does adding a Layer 2 switch have on a network?
an increase in the number of dropped frames
an increase in the size of the broadcast domain
an increase in the number of network collisions
an increase in the size of the collision domain
Explanation: Adding a Layer 2 switch to a network increases the number of collision domains
and increases the size of the broadcast domain. Layer 2 switches do not decrease the amount of
broadcast traffic, do not increase the amount of network collisions and do not increase the number
of dropped frames.
14. Which characteristic describes cut-through switching?
Error-free fragments are forwarded, so switching occurs with lower latency.
Frames are forwarded without any error checking.
Only outgoing frames are checked for errors.
Buffering is used to support different Ethernet speeds.
Explanation: Cut-through switching reduces latency by forwarding frames as soon as the
destination MAC address and the corresponding switch port are read from the MAC address table.
This switching method does not perform any error checking and does not use buffers to support
different Ethernet speeds. Error checking and buffers are characteristics of store-and-forward
switching.
15. What is the significant difference between a hub and a Layer 2 LAN
switch?
A hub extends a collision domain, and a switch divides collision
domains.
A hub divides collision domains, and a switch divides broadcast domains.
Each port of a hub is a collision domain, and each port of a switch is a broadcast domain.
A hub forwards frames, and a switch forwards only packets.
Explanation: Hubs operate only at the physical layer, forwarding bits as wire signals out all ports,
and extend the collision domain of a network. Switches forward frames at the data link layer and
each switch port is a separate collision domain which creates more, but smaller, collision domains.
Switches do not manage broadcast domains because broadcast frames are always forwarded out
all active ports.
16. Which statement is correct about Ethernet switch frame forwarding decisions?
Frame forwarding decisions are based on MAC address and port
mappings in the CAM table.
Cut-through frame forwarding ensures that invalid frames are always dropped.
Only frames with a broadcast destination address are forwarded out all active switch
ports.
Unicast frames are always forwarded regardless of the destination MAC address.
Explanation: Cut-through frame forwarding reads up to only the first 22 bytes of a frame, which
excludes the frame check sequence and thus invalid frames may be forwarded. In addition to
broadcast frames, frames with a destination MAC address that is not in the CAM are also flooded
out all active ports. Unicast frames are not always forwarded. Received frames with a destination
MAC address that is associated with the switch port on which it is received are not forwarded
because the destination exists on the network segment connected to that port.
17. How do switch buffers affect network performance?
They provide error checking on the data received.
They store frames received, thus preventing premature frame
discarding when network congestion occurs.
They provide extra memory for a particular port if autonegotiation of speed or duplex fails.
They hold data temporarily when a collision occurs until normal data transmission
resumes.
Explanation: Switches have large frame buffers that allow data waiting to be transmitted to be
stored so the data will not be dropped. This feature is beneficial especially if the incoming traffic is
from a faster port than the egress port used for transmitting.
18. Which switch characteristic helps keep traffic local and alleviates network
congestion?
high port density
fast port speed
large frame buffers
fast internal switching
Explanation: Switches that have a lot of ports (high port density) reduce the number of switches
required and keep some of the traffic locally on the switch, thus removing the need to send it
between switches.
19. Which switch component reduces the amount of packet handling time
inside the switch?
ASIC
dual processors
large buffer size
store-and-forward RAM
Explanation: Application-specific integrated circuits (ASICs) are used in Cisco switches to speed
up switch operations so that the switch can have an increased number of ports without degrading
switch performance.
20. Refer to the exhibit. A switch receives a Layer 2 frame that contains a
source MAC address of 000b.a023.c501 and a destination MAC address of
0050.0fae.75aa. Place the switch steps in the order they occur. (Not all
options are used.)
21. What information is added to the switch table from incoming frames?
source MAC address and incoming port number
destination MAC address and incoming port number
source IP address and incoming port number
destination IP address and incoming port number
Explanation: A switch “learns” or builds the MAC address table based on the source MAC
address as a frame comes into the switch. A switch forwards the frame onward based on the
destination MAC address.
22. Which switching method ensures that the incoming frame is error-free
before forwarding?
cut-through
FCS
fragment free
store-and-forward
Explanation: Two methods used by switches to transmit frames are store-and-forward and cut-
through switching. The store-and-forward method performs error checking on the frame using the
frame check sequence (FCS) value before sending the frame. In contrast, cut-through switching
sends the frame as soon as the destination MAC address part of the header has been read and
processed.
23. Refer to the exhibit. How many broadcast domains are displayed?
27. Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on
switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why
would the interfaces be missing from the output?
32. Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best
practices are being used?
routed port
access port
trunk port
SVI
Explanation: To allow a router-on-a-stick configuration to function, a switch must be connected
to the router via a trunk port to carry the VLANs to be routed. An SVI would be used on a multilayer
switch where the switch is performing inter-VLAN routing.
46. Refer to the exhibit. A network administrator is configuring RT1 for inter-
VLAN routing. The switch is configured correctly and is functional. Host1,
Host2, and Host3 cannot communicate with each other. Based on the router
configuration, what is causing the problem?
79. What type of VLAN is configured specifically for network traffic such as
SSH, Telnet, HTTPS, HHTP, and SNMP?
voice VLAN
management VLAN
native VLAN
security VLAN
7. In which two port states does a switch learn MAC addresses and process
BPDUs in a PVST network? (Choose two.)
disabled
forwarding
listening
blocking
learning
Explanation: Switches learn MAC addresses at the learning and forwarding port states. They
receive and process BPDUs at the blocking, listening, learning, and forwarding port states.
8. If no bridge priority is configured in PVST, which criteria is considered
when electing the root bridge?
lowest MAC address
lowest IP address
highest IP address
highest MAC address
Explanation: Only one switch can be the root bridge for a VLAN. The root bridge is the switch
with the lowest BID. The BID is determined by priority and the MAC address. If no priority is
configured then all switches use the default priority and the election of the root bridge will be based
on the lowest MAC address.
9. Match the spanning-tree feature with the protocol type. (Not all options
are used.)
192.168.1.1
192.168.1.255
255.255.255.255
192.168.1.8
Explanation: When a host boots and has been configured for dynamic IP addressing, the device
tries to obtain a valid IP address. It sends a DHCPDISCOVER message. This is a broadcast
message because the DHCP server address is unknown (by design). The destination IP address in
the IP header is 255.255.255.255 and the destination MAC address is FF:FF:FF:FF:FF:FF.
8. Which message does an IPv4 host use to reply when it receives a
DHCPOFFER message from a DHCP server?
DHCPOFFER
DHCPDISCOVER
DHCPREQUEST
DHCPACK
Explanation: When the client receives the DHCPOFFER from the server, it sends back a
DHCPREQUEST broadcast message. On receiving the DHCPREQUEST message, the server
replies with a unicast DHCPACK message.
9. Which command, when issued in the interface configuration mode of a
router, enables the interface to acquire an IPv4 address automatically from
an ISP, when that link to the ISP is enabled?
service dhcp
ip address dhcp
ip helper-address
ip dhcp pool
Explanation: The ip address dhcp interface configuration command configures an Ethernet
interface as a DHCP client. The service dhcp global configuration command enables the
DHCPv4 server process on the router. The ip helper-address command is issued to enable
DHCP relay on the router. The ip dhcp pool command creates the name of a pool of addresses
that the server can assign to hosts.
10. Which kind of message is sent by a DHCP client when its IP address lease
has expired?
a DHCPDISCOVER unicast message
a DHCPREQUEST broadcast message
a DHCPREQUEST unicast message
a DHCPDISCOVER broadcast message
Explanation: When the IP address lease time of the DHCP client expires, it sends a
DHCPREQUEST unicast message directly to the DHCPv4 server that originally offered the IPv4
address.
11. A host PC is attempting to lease an address through DHCP. What message
is sent by the server to let the client know it is able to use the provided IP
information?
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPNACK
Explanation: When a host uses DHCP to automatically configure an IP address, the typically
sends two messages: the DHCPDISCOVER message and the DHCPREQUEST message. These
two messages are usually sent as broadcasts to ensure that all DHCP servers receive them. The
servers respond to these messages using DHCPOFFER, DHCPACK, and DHCPNACK messages,
depending on the circumstance.
12. What is one indication that a Windows computer did not receive an IPv4
address from a DHCP server?
The computer cannot ping 127.0.0.1.
The computer receives an IP address that starts with 169.254.
Windows displays a DHCP timeout message.
The computer cannot ping other devices on the same network with IP addresses in the
169.254.0.0/16 range.
Explanation: When a Windows PC cannot communicate with an IPv4 DHCP server, the
computer automatically assigns an IP address in the 169.254.0.0/16 range. Any other device on the
same network that receives an address in the same range is reachable.
13. Which DHCPv4 message will a client send to accept an IPv4 address that
is offered by a DHCP server?
broadcast DHCPACK
broadcast DHCPREQUEST
unicast DHCPACK
unicast DHCPREQUEST
Explanation: When a DHCP client receives DHCPOFFER messages, it will send a broadcast
DHCPREQUEST message for two purposes. First, it indicates to the offering DHCP server that it
would like to accept the offer and bind the IP address. Second, it notifies any other responding
DHCP servers that their offers are declined.
14. A small coffee shop is offering free Wi-Fi to customers. The network
includes a wireless router and a DSL modem that is connected to the local
phone company. What method is typically used to configure the connection to
the phone company?
Set the WAN connection in the wireless router as a DHCP client.
Set the connection between the wireless router and the DSL modem as a private IP
network.
Set the DSL modem as a DHCP client to get a public IP address from the wireless router.
Set the DSL modem as a DHCP client to the phone company and a DHCP server for the
internal connection.
Explanation: In a SOHO environment, a wireless router connects to an ISP via a DSL or cable
modem. The IP address between the wireless router and ISP site is typically assigned by the ISP
through DHCP. The DSL modem does not manage IP address allocation.
15. A company uses DHCP to manage IP address deployment for employee
workstations. The IT department deploys multiple DHCP servers in the data
center and uses DHCP relay agents to facilitate the DHCP requests from
workstations. Which two UDP ports are used to forward DHCP traffic? (Choose
two.)
23
53
67
68
80
Explanation: The DHCP protocol operates with 2 UDP ports. UDP port 67 is the destination port
for DHCP servers, and DHCP clients use UDP port 68.
16. A client device on an Ethernet segment needs an IP address in order to
communicate on the network. A DHCP server with IP address 192.168.1.1 has
been configured and enabled on the network. How will a client device obtain
a usable IP address for this network?
Send a DHCPACK packet to the default gateway address.
Use a statically configured IP address from the pool of IP addresses that is offered by the
DHCP server.
Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-
FF.
Send a DHCPREQUEST packet to IP address 255.255.255.255.
Explanation: Like IP addressing, there is also a special MAC address for broadcast purposes:
FF-FF-FF-FF-FF-FF. When a DHCP client needs to send a DHCP Discover message in order to
seek DHCP servers, the client will use this MAC address as the destination MAC address in the
Ethernet frame. It does this because it has no knowledge of the IP and MAC addresses of DHCP
servers.
17. What is an advantage of configuring a Cisco router as a relay agent?
It can provide relay services for multiple UDP services.
It reduces the response time from a DHCP server.
It can forward both broadcast and multicast messages on behalf of clients.
It will allow DHCPDISCOVER messages to pass without alteration.
Explanation: By default, the ip helper-address command forwards the following eight UDP
services:
Port 37: Time
Port 49: TACACS
Port 53: DNS
Port 67: DHCP/BOOTP client
Port 68: DHCP/BOOTP server
Port 69: TFTP
Port 137: NetBIOS name service
Port 138: NetBIOS datagram service
18. Which statement is true about DHCP operation?
When a device that is configured to use DHCP boots, the client
broadcasts a DHCPDISCOVER message to identify any available DHCP
servers on the network.
A client must wait for lease expiration before it sends another DHCPREQUEST message.
If the client receives several DHCPOFFER messages from different servers, it sends a
unicast DHCPREQUEST message to the server from which it chooses to obtain the IP
information.
The DHCPDISCOVER message contains the IP address and subnet mask to be
assigned, the IP address of the DNS server, and the IP address of the default gateway.
Explanation: The client broadcasts a DHCPDISCOVER message to identify any available DHCP
servers on the network. A DHCP server replies with a DHCPOFFER message. This message offers
to the client a lease that contains such information as the IP address and subnet mask to be
assigned, the IP address of the DNS server, and the IP address of the default gateway. After the
client receives the lease, the received information must be renewed through another
DHCPREQUEST message prior to the lease expiration.
19. Order the DHCP message types as they would occur between a DHCP
client and a DHCP server.
The DNS server address is not on the same network as the clients are on.
The router is configured for SLAAC operation.
The GigabitEthernet interface is not activated.
The clients cannot communicate with the DHCPv6 server, evidenced by the number of
active clients being 0.
Explanation: The router is configured for SLAAC operation because there is no configuration
command to change the RA M and O flag value. By default, both M and O flags are set to 0. In
order to permint stateless DHCPv6 operation, the interface command ipv6 nd other-config-
flag should be issued. The GigabitEthernet interface is in working condition because clients can
get RA messages and configure their IPv6 addresses as expected. Also, the fact that R1 is the
DHCPv6 server and clients are getting RA messages indicates that clients can communicate with
the DHCP server. The number of active clients is 0 because the DHCPv6 server does not maintain
the state of clients IPv6 addresses (it is not configured for stateful DHCPv6 operation). The DNS
server address issue is not relevant to the problem.
23. Question as presented:
A stateless DHCPv6 client would send a DHCPv6 INFORMATION-REQUEST message as step 3 in
the process.
24. A company uses the SLAAC method to configure IPv6 addresses for the
employee workstations. Which address will a client use as its default
gateway?
the global unicast address of the router interface that is attached to the network
the unique local address of the router interface that is attached to the network
the all-routers multicast address
the link-local address of the router interface that is attached to the
network
Explanation: When a PC is configured to use the SLAAC method for configuring IPv6
addresses, it will use the prefix and prefix-length information that is contained in the RA message,
combined with a 64-bit interface ID (obtained by using the EUI-64 process or by using a random
number that is generated by the client operating system), to form an IPv6 address. It uses the link-
local address of the router interface that is attached to the LAN segment as its IPv6 default gateway
address.
25. Refer to the exhibit. A network administrator is configuring a router for
DHCPv6 operation. Which conclusion can be drawn based on the commands?
The router is configured for stateful DHCPv6 operation, but the DHCP pool configuration
is incomplete.
The DHCPv6 server name is ACAD_CLASS.
Clients would configure the interface IDs above 0010.
The router is configured for stateless DHCPv6 operation.
Explanation: The DHCPv6 is for the stateless DHCPv6 operation that is indicated by changing
the O flag to 1 and leaving the M flag as default, which is 0. Therefore, it is not configured for
stateful DHCPv6 operation. Although the DNS server has the interface ID 0010, clients in stateless
DHCPv6 operation will configure their interface IDs either by EUI-64 or a random number. The
ACAD_CLASS is the name of the DHCP pool, not the DHCP server name.
26. A network administrator is analyzing the features that are supported by
different first-hop router redundancy protocols. Which statement describes a
feature that is associated with HSRP?
HSRP uses active and standby routers.
HSRP is nonproprietary.
It allows load balancing between a group of redundant routers.
It uses ICMP messages in order to assign the default gateway to hosts.
Explanation: The HSRP first-hop router redundancy protocol is Cisco proprietary and supports
standby and active devices. VRRPv2 and VRRPv3 are nonproprietary. GLBP is Cisco proprietary
and supports load balancing between a group of redundant routers.
27. Refer to the exhibit. What protocol can be configured on gateway routers
R1 and R2 that will allow traffic from the internal LAN to be load balanced
across the two gateways to the Internet?
GLBP
PVST+
PVST
STP
Explanation: GLBP, or Group Load Balancing Protocol, allows multiple routers to act as a single
default gateway for hosts. GLBP load balances the traffic across the individual routers on a per host
basis.
28. Refer to the exhibit. A network engineer is troubleshooting host
connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4
gateway address should be configured on the host?
192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100
Explanation: The host default gateway address should be the FHRP (in this case GLBP) virtual
IP address.
29. Refer to the exhibit. Which destination MAC address is used when frames
are sent from the workstation to the default gateway?
40. Match the step number to the sequence of stages that occur during the
HSRP failover process. (Not all options are used.)
42. Match the DHCP message types to the order of the DHCPv4 process. (Not
all options are used.)
Explanation: The broadcast DHCPDISCOVER message finds DHCPv4 servers on the network.
When the DHCPv4 server receives a DHCPDISCOVER message, it reserves an available IPv4
address to lease to the client and sends the unicast DHCPOFFER message to the requesting client.
When the client receives the DHCPOFFER from the server, it sends back a DHCPREQUEST. On
receiving the DHCPREQUEST message the server replies with a unicast DHCPACK message.
DHCPREPLY and DHCPINFORMATION-REQUEST are DHCPv6 messages.
43. The address pool of a DHCP server is configured with 192.168.234.0/27.
The network administrator reserves 22 IP addresses for IP phones. How many
IP addresses are left in the pool to be assigned to other hosts?
10
0
8
21
18
Explanation: Calculate the maximum number of hosts available for the slash value and subtract
the required static IP addresses required for the devices.
/24 = 254 hosts
/25 = 126 hosts
/26 = 62 hosts
/27 = 30 hosts
/28 = 14 hosts
44. A company uses DHCP servers to dynamically assign IPv4 addresses to
employee workstations. The address lease duration is set as 5 days. An
employee returns to the office after an absence of one week. When the
employee boots the workstation, it sends a message to obtain an IP address.
Which Layer 2 and Layer 3 destination addresses will the message contain?
both MAC and IPv4 addresses of the DHCP server
FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
FF-FF-FF-FF-FF-FF and 255.255.255.255
MAC address of the DHCP server and 255.255.255.255
Explanation:When the lease of a dynamically assigned IPv4 address has expired, a workstation
will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because
the workstation does not know the addresses of DHCP servers, it sends the message via
broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.
45. Which command will allow a network administrator to check the IP
address that is assigned to a particular MAC address?
Router# show running-config I section_dhcp
Router# show ip dhcp server statistics
Router# show ip dhcp binding
Router# show ip dhcp pool
Explanation: The show ip dhcp binding command will show the leases, including IP addresses,
MAC addresses, lease expiration, type of lease, client ID, and user name.
46. What is the reason that an ISP commonly assigns a DHCP address to a
wireless router in a SOHO environment?
better network performance
better connectivity
easy IP address management
easy configuration on ISP firewall
Explanation:In a SOHO environment, a wireless router connects to the ISP via a DSL or cable
modem. The IP address between the wireless router and ISP site is typically assigned by the ISP
through DHCP. This method facilitates the IP addressing management in that IP addresses for
clients are dynamically assigned so that if a client is dropped, the assigned IP address can be easily
reassigned to another client.
47. What information can be verified through the show ip dhcp binding
command?
the IPv4 addresses that are assigned to hosts by the DHCP server
that DHCPv4 discover messages are still being received by the DHCP server
the IPv4 addresses that have been excluded from the DHCPv4 pool
the number of IP addresses remaining in the DHCP pool
Explanation:The show ip dhcp binding command shows a list of IPv4 addresses and the MAC
addresses of the hosts to which they are assigned. Using this information an administrator can
determine which host interfaces have been assigned to specific hosts.
48. What is the result of a network technician issuing the command ip dhcp
excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?
The Cisco router will exclude only the 10.0.15.1 and 10.0.15.15 IP addresses from being
leased to DHCP clients.
The Cisco router will exclude 15 IP addresses from being leased to
DHCP clients.
The Cisco router will automatically create a DHCP pool using a /28 mask.
The Cisco router will allow only the specified IP addresses to be leased to clients.
Explanation: The ip dhcp excluded-address command is followed by the first and the last
addresses to be excluded from being leased to DHCP clients.
49. Match the descriptions to the corresponding DHCPv6 server type. (Not all
options are used.)
50. Refer to the exhibit. Based on the output that is shown, what kind of IPv6
addressing is being configured?
No one is allowed to disconnect the IP phone or the PC and connect some other wired device.
If a different device is connected, port Fa0/2 is shut down.
The switch should automatically detect the MAC address of the IP phone and the PC and add those
addresses to the running configuration.
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security violation restrict
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security mac-address sticky
Explanation: The default mode for a port security violation is to shut down the port so
the switchport port-security violation command is not necessary. The switchport
port-security command must be entered with no additional options to enable port security for the
port. Then, additional port security options can be added.
11. Refer to the exhibit. Port security has been configured on the Fa 0/12
interface of switch S1. What action will occur when PC1 is attached to switch
S1 with the applied configuration?
Frames from PC1 will be forwarded since the switchport port-security violation command
is missing.
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately,
and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created.
Explanation: Manual configuration of the single allowed MAC address has been entered for port
fa0/12. PC1 has a different MAC address and when attached will cause the port to shut down (the
default action), a log message to be automatically created, and the violation counter to increment.
The default action of shutdown is recommended because the restrict option might fail if an attack is
underway.
12. Which type of VLAN-hopping attack may be prevented by designating an
unused VLAN as the native VLAN?
DHCP spoofing
DHCP starvation
VLAN double-tagging
DTP spoofing
Explanation: Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-
hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the
native VLAN from the default to an unused VLAN reduces the possibility of this type of attack.
DHCP spoofing and DHCP starvation exploit vulnerabilities in the DHCP message exchange.
13. A network administrator is configuring DAI on a switch with the command
ip arp inspection validate src-mac. What is the purpose of this configuration
command?
It checks the source MAC address in the Ethernet header against the user-configured
ARP ACLs.
It checks the source MAC address in the Ethernet header against the MAC address table.
It checks the source MAC address in the Ethernet header against the
sender MAC address in the ARP body.
It checks the source MAC address in the Ethernet header against the target MAC
address in the ARP body.
Explanation: DAI can be configured to check for both destination or source MAC and IP
addresses:
Destination MAC – Checks the destination MAC address in the Ethernet header
against the target MAC address in the ARP body.
Source MAC – Checks the source MAC address in the Ethernet header against the
sender MAC address in the ARP body.
IP address – Checks the ARP body for invalid and unexpected IP addresses including
addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
14. Which two commands can be used to enable BPDU guard on a switch?
(Choose two.)
S1(config)# spanning-tree bpduguard default
S1(config-if)# spanning-tree portfast bpduguard
S1(config)# spanning-tree portfast bpduguard default
S1(config-if)# enable spanning-tree bpduguard
S1(config-if)# spanning-tree bpduguard enable
Explanation: BPDU guard can be enabled on all PortFast-enabled ports by using
the spanning-tree portfast bpduguard default global configuration command.
Alternatively, BPDU guard can be enabled on a PortFast-enabled port through the use of
the spanning-tree bpduguard enable interface configuration command.
15. As part of the new security policy, all switches on the network are
configured to automatically learn MAC addresses for each port. All running
configurations are saved at the start and close of every business day. A
severe thunderstorm causes an extended power outage several hours after
the close of business. When the switches are brought back online, the
dynamically learned MAC addresses are retained. Which port security
configuration enabled this?
auto secure MAC addresses
dynamic secure MAC addresses
static secure MAC addresses
sticky secure MAC addresses
Explanation: With sticky secure MAC addressing, the MAC addresses can be either dynamically
learned or manually configured and then stored in the address table and added to the running
configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned
MAC addressing that is stored only in the address table.
16. Which type of management frame may regularly be broadcast by an AP?
authentication
probe request
probe response
beacon
Explanation: Beacons are the only management frame that may regularly be broadcast by an
AP. Probing, authentication, and association frames are used only during the association (or
reassociation) process.
17. What are the two methods that are used by a wireless NIC to discover an
AP? (Choose two.)
delivering a broadcast frame
receiving a broadcast beacon frame
initiating a three-way handshake
sending an ARP request
transmitting a probe request
Explanation: Two methods can be used by a wireless device to discover and register with an
access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon
frame that contains the SSID and other wireless settings. In active mode, the wireless device must
be manually configured for the SSID, and then the device broadcasts a probe request.
18. A technician is configuring the channel on a wireless router to either 1, 6,
or 11. What is the purpose of adjusting the channel?
to enable different 802.11 standards
to avoid interference from nearby wireless devices
to disable broadcasting of the SSID
to provide stronger security modes
Explanation: Channels 1, 6, and 11 are selected because they are 5 channels apart. thus
minimizing the interference with adjacent channels. A channel frequency can interfere with channels
on either side of the main frequency. All wireless devices need to be used on nonadjacent
channels.
19. While attending a conference, participants are using laptops for network
connectivity. When a guest speaker attempts to connect to the network, the
laptop fails to display any available wireless networks. The access point must
be operating in which mode?
mixed
passive
active
open
Explanation: Active is a mode used to configure an access point so that clients must know the
SSID to connect to the access point. APs and wireless routers can operate in a mixed mode
meaning that that multiple wireless standards are supported. Open is an authentication mode for an
access point that has no impact on the listing of available wireless networks for a client. When an
access point is configured in passive mode, the SSID is broadcast so that the name of wireless
network will appear in the listing of available networks for clients.
20. A network administrator is required to upgrade wireless access to end
users in a building. To provide data rates up to 1.3 Gb/s and still be backward
compatible with older devices, which wireless standard should be
implemented?
802.11n
802.11ac
802.11g
802.11b
Explanation: 802.11ac provides data rates up to 1.3 Gb/s and is still backward compatible with
802.11a/b/g/n devices. 802.11g and 802.11n are older standards that cannot reach speeds over
1Gb/s. 802.11ad is a newer standard that can offer theoretical speeds of up to 7 Gb/s.
21. A technician is about to install and configure a wireless network at a
small branch office. What is the first security measure the technician should
apply immediately upon powering up the wireless router?
Enable MAC address filtering on the wireless router.
Configure encryption on the wireless router and the connected wireless devices.
Change the default user-name and password of the wireless router.
Disable the wireless network SSID broadcast.
Explanation: The first action a technician should do to secure a new wireless network is to
change the default user-name and password of the wireless router. The next action would usually
be to configure encryption. Then once the initial group of wireless hosts have connected to the
network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent
new unauthorized hosts from finding and connecting to the wireless network.
22. On a Cisco 3504 WLC dashboard, which option provides access to the full
menu of features?
Access Points
Network Summary
Advanced
Rogues
Explanation: The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It
provides some basic settings and menus that users can quickly access to implement a variety of
common configurations. By clicking the Advanced button, the user will access the
advanced Summary page and access all the features of the WLC.
23. Which step is required before creating a new WLAN on a Cisco 3500 series
WLC?
Create a new SSID.
Build or have an SNMP server available.
Build or have a RADIUS server available.
Create a new VLAN interface.
Explanation: Each new WLAN configured on a Cisco 3500 series WLC needs its own VLAN
interface. Thus it is required that a new VLAN interface to be created first before a new WLAN can
be created.
24. A network engineer is troubleshooting a newly deployed wireless network
that is using the latest 802.11 standards. When users access high bandwidth
services such as streaming video, the wireless network performance is poor.
To improve performance the network engineer decides to configure a 5 Ghz
frequency band SSID and train users to use that SSID for streaming media
services. Why might this solution improve the wireless network performance
for that type of service?
Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and
will result in fewer users accessing these services.
The 5 GHz band has more channels and is less crowded than the 2.4
GHz band, which makes it more suited to streaming multimedia.
The 5 GHz band has a greater range and is therefore likely to be interference-free.
The only users that can switch to the 5 GHz band will be those with the latest wireless
NICs, which will reduce usage.
Explanation: Wireless range is determined by the access point antenna and output power, not
the frequency band that is used. In this scenario it is stated that all users have wireless NICs that
comply with the latest standard, and so all can access the 5 GHz band. Although some users may
find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater
number of channels, not just fewer users, that will improve network performance.
25. A network administrator is configuring a RADIUS server connection on a
Cisco 3500 series WLC. The configuration requires a shared secret password.
What is the purpose for the shared secret password?
It is used by the RADIUS server to authenticate WLAN users.
It is used to authenticate and encrypt user data on the WLAN.
It is used to encrypt the messages between the WLC and the RADIUS
server.
It allows users to authenticate and access the WLAN.
Explanation: The RADIUS protocol uses security features to protect communications between
the RADIUS server and clients. A shared secret is the password used between the WLC and the
RADIUS server. It is not for end users.
26. Which three parameters would need to be changed if best practices are
being implemented for a home wireless AP? (Choose three.)
wireless client operating system password
antenna frequency
wireless network password
wireless beacon time
AP password
SSID
Explanation: As soon as an AP is taken out of a box, the default device password, SSID, and
security parameters (wireless network password) should be set. The frequency of a wireless
antenna can be adjusted, but doing so is not required. The beacon time is not normally configured.
The wireless client operating system password is not affected by the configuration of a home
wireless network.
27. Which access control component, implementation, or protocol is based
upon usernames and passwords?
802.1X
accounting
authentication
authorization
28. Which type of wireless network is based on the 802.11 standard and a
2.4-GHz or 5-GHz radio frequency?
wireless metropolitan-area network
wireless wide-area network
wireless local-area network
wireless personal-area network
29. Which two Cisco solutions help prevent DHCP starvation attacks? (Choose
two.)
DHCP Snooping
IP Source Guard
Dynamic ARP Inspection
Port Security
Web Security Appliance
Explanation: Cisco provides solutions to help mitigate Layer 2 attacks including these:
IP Source Guard (IPSG) – prevents MAC and IP address spoofing attacks
Dynamic ARP Inspection (DAI) – prevents ARP spoofing and ARP poisoning
attacks
DHCP Snooping – prevents DHCP starvation and SHCP spoofing attacks
Port Security – prevents many types of attacks including MAC table overflow attacks
and DHCP starvation attacks
Web Security Appliance (WSA) is a mitigation technology for web-based threats.
30. What are three techniques for mitigating VLAN attacks? (Choose three.)
Enable trunking manually.
Disable DTP.
Enable Source Guard.
Set the native VLAN to an unused VLAN.
Use private VLANs.
Enable BPDU guard.
Explanation: Mitigating a VLAN attack can be done by disabling Dynamic Trunking Protocol
(DTP), manually setting ports to trunking mode, and by setting the native VLAN of trunk links to
VLANs not in use.
31. Refer to the exhibit. What can be determined about port security from
the information that is shown?
The port has the maximum number of MAC addresses that is supported by a Layer 2
switch port which is configured for port security.
The port has been shut down.
The port violation mode is the default for any port that has port
security enabled.
The port has two attached devices.
Explanation: The Port Security line simply shows a state of Enabled if the switchport
port-security command (with no options) has been entered for a particular switch port. If a port
security violation had occurred, a different error message appears such as Secure-shutdown. The
maximum number of MAC addresses supported is 50. The Maximum MAC Addresses line is
used to show how many MAC addresses can be learned (2 in this case). The Sticky MAC
Addresses line shows that only one device has been attached and learned automatically by the
switch. This configuration could be used when a port is shared by two cubicle-sharing personnel
who bring in separate laptops.
32. A network administrator of a college is configuring the WLAN user
authentication process. Wireless users are required to enter username and
password credentials that will be verified by a server. Which server would
provide such service?
AAA
NAT
RADIUS
SNMP
Explanation: Remote Authentication Dial-In User Service (RADIUS) is a protocol and server
software that provides user-based authentication for an organization. When a WLAN is configured
to use a RADIUS server, users will enter username and password credentials that are verified by
the RADIUS server before allowing to the WLAN.
33. A technician is troubleshooting a slow WLAN that consists of 802.11b and
802.11g devices . A new 802.11n/ac dual-band router has been deployed on
the network to replace the old 802.11g router. What can the technician do to
address the slow wireless speed?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5
GHz band.
Update the firmware on the new router.
Configure devices to use a different channel.
Change the SSID.
Explanation: Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz
band will allow for the 802.11n to use the two bands as two separate wireless networks to help
manage the traffic, thus improving wireless performance.
34. The company handbook states that employees cannot have microwave
ovens in their offices. Instead, all employees must use the microwave ovens
located in the employee cafeteria. What wireless security risk is the company
trying to avoid?
improperly configured devices
rogue access points
accidental interference
interception of data
Explanation: Denial of service attacks can be the result of improperly configured devices which
can disable the WLAN. Accidental interference from devices such as microwave ovens and cordless
phones can impact both the security and performance of a WLAN. Man-in-the-middle attacks can
allow an attacker to intercept data. Rogue access points can allow unauthorized users to access the
wireless network.
35. What is the function provided by CAPWAP protocol in a corporate wireless
network?
CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow
a WLC to configure an autonomous access point.
CAPWAP provides the encapsulation and forwarding of wireless user
traffic between an access point and a wireless LAN controller.
CAPWAP provides connectivity between an access point using IPv6 addressing and a
wireless client using IPv4 addressing.
CAPWAP provides the encryption of wireless user traffic between an access point and a
wireless client.
Explanation: CAPWAP is an IEEE standard protocol that enables a WLC to manage multiple
APs and WLANs. CAPWAP is also responsible for the encapsulation and forwarding of WLAN client
traffic between an AP and a WLC.
36. Open the PT Activity. Perform the tasks in the activity instructions and
then answer the question.
38. What are two protocols that are used by AAA to authenticate users
against a central database of usernames and password? (Choose two.)
SSH
HTTPS
TACACS+
RADIUS
CHAP
NTP
Explanation: By using TACACS+ or RADIUS, AAA can authenticate users from a database of
usernames and passwords stored centrally on a server such as a Cisco ACS server.
39. What is the result of a DHCP starvation attack?
The attacker provides incorrect DNS and default gateway information to clients.
The IP addresses assigned to legitimate clients are hijacked.
Clients receive IP address assignments from a rogue DHCP server.
Legitimate clients are unable to lease IP addresses.
Explanation: DCHP starvation attacks are launched by an attacker with the intent to create a
DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many
DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them
to legitimate hosts.
40. Which feature or configuration on a switch makes it vulnerable to VLAN
double-tagging attacks?
the limited size of content-addressable memory space
the automatic trunking port feature enabled for all ports by default
the native VLAN of the trunking port being the same as a user VLAN
mixed duplex mode enabled for all ports by default
Explanation: A double-tagging (or double-encapsulated) VLAN hopping attack takes advantage
of the way that hardware on most switches operates. Most switches perform only one level of
802.1Q de-encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.
This tag allows the frame to be forwarded to a VLAN that the original 802.1Q tag did not specify. An
important characteristic of the double-encapsulated VLAN hopping attack is that it works even if
trunk ports are disabled, because a host typically sends a frame on a segment that is not a trunk
link. This type of attack is unidirectional and works only when the attacker is connected to a port
residing in the same VLAN as the native VLAN of the trunk port.
41. Which component of AAA allows an administrator to track individuals who
access network resources and any changes that are made to those
resources?
authentication
accounting
accessibility
authorization
Explanation: One of the components in AAA is accounting. After a user is authenticated through
AAA, AAA servers keep a detailed log of exactly what actions the authenticated user takes on the
device.
42. Refer to the exhibit. PC1 and PC2 should be able to obtain IP address
assignments from the DHCP server. How many ports among switches should
be assigned as trusted ports as part of the DHCP snooping configuration?
1
3
5
7
Explanation: The DHCP snooping configuration includes building the DHCP Snooping Binding
Database and assigning necessary trusted ports on switches. A trusted port points to the legitimate
DHCP servers. In this network design, because the DHCP server is attached to AS3, seven switch
ports should be assigned as trusted ports, one on AS3 toward the DHCP server, one on DS1
toward AS3, one on DS2 toward AS3, and two connections on both AS1 and AS2 (toward DS1 and
DS2), for a total of seven.
43. An IT security specialist enables port security on a switch port of a Cisco
switch. What is the default violation mode in use until the switch port is
configured to use a different violation mode?
shutdown
disabled
restrict
protect
Explanation: If no violation mode is specified when port security is enabled on a switch port,
then the security violation mode defaults to shutdown.
44. A laptop cannot connect to a wireless access point. Which two
troubleshooting steps should be taken first? (Choose two.)
Ensure that the correct network media is selected.
Ensure that the laptop antenna is attached.
Ensure that the wireless NIC is enabled.
Ensure that the wireless SSID is chosen.
Ensure that the NIC is configured for the proper frequency.
Explanation: A wireless laptop normally does not have an antenna attached unless a repair has
recently been implemented. If the wireless NIC is enabled, the correct media, radio, will be used.
When the NIC detects an access point, the correct frequency is automatically used.
45. What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the
network.
It is the best way to secure a wireless network.
SSIDs are very difficult to discover because APs do not broadcast them.
It provides free Internet access in public locations where knowing the SSID is of no
concern.
Explanation: SSID cloaking is a weak security feature that is performed by APs and some
wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to
manually identify the SSID to be connected to the network, the SSID can be easily discovered. The
best way to secure a wireless network is to use authentication and encryption systems. SSID
cloaking does not provide free Internet access in public locations, but an open system
authentication could be used in that situation.
46. What is a wireless security mode that requires a RADIUS server to
authenticate wireless users?
personal
shared key
enterprise
WEP
Explanation: WPA and WPA2 come in two types: personal and enterprise. Personal is used in
home and small office networks. Shared key allows three different authentication techniques: (1)
WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is an encryption method.
47. A company has recently implemented an 802.11n wireless network. Some
users are complaining that the wireless network is too slow. Which solution is
the best method to enhance the performance of the wireless network?
Disable DHCP on the access point and assign static addresses to the wireless clients.
Upgrade the firmware on the wireless access point.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
Replace the wireless NICs on the computers that are experiencing slow connections.
Explanation: Because some users are complaining about the network being too slow, the correct
option would be to split the traffic so that there are two networks using different frequencies at the
same time. Replacing the wireless NICs will not necessarily correct the network being slow and it
could be expensive for the company. DHCP versus static addressing should have no impact of the
network being slow and it would be a huge task to have all users assigned static addressing for their
wireless connection. Upgrading the firmware on the wireless access point is always a good idea.
However, if some of the users are experiencing a slow network connection, it is likely that this would
not substantially improve network performance.
48. Which protocol can be used to monitor the network?
DHCP
SNMP
RADIUS
AAA
Explanation: Simple Network Management Protocol (SNMP) is used to monitor the network.
49. A network administrator deploys a wireless router in a small law firm.
Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24
network. Which service is used on the wireless router to allow the employee
laptops to access the internet?
DHCP
RADIUS
DNS
NAT
Explanation: Any address with the 10 in the first octet is a private IPv4 address and cannot be
routed on the internet. The wireless router will use a service called Network Address Translation
(NAT) to convert private IPv4 addresses to internet-routable IPv4 addresses for wireless devices to
gain access to the internet.
50. Which service can be used on a wireless router to prioritize network
traffic among different types of applications so that voice and video data are
prioritized over email and web data?
QoS
DNS
DHCP
NAT
Explanation: Many wireless routers have an option for configuring quality of service (QoS). By
configuring QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over
traffic that is not as time-sensitive, such as email and web browsing.
51. Which access control component, implementation, or protocol is based on
device roles of supplicant, authenticator, and authentication server?
accounting
authentication
authorization
802.1X
52. Which type of wireless network is suitable for national and global
communications?
wireless metropolitan-area network
wireless local-area network
wireless personal-area network
wireless wide-area network
53. Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the mixed duplex mode enabled for all ports by default
the limited size of content-addressable memory space
mixed port bandwidth support enabled for all ports by default
the automatic trunking port feature enabled for all ports by default
Explanation: A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN
without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic
trunking port feature enabled by default on most switch ports.
54. Which component of AAA is used to determine which resources a user can
access and which operations the user is allowed to perform?
accounting
authentication
auditing
authorization
Explanation: One of the components in AAA is authorization. After a user is authenticated
through AAA, authorization services determine which resources the user can access and which
operations the user is allowed to perform.
55. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured
with the switchport port-security mac-address 0023.189d.6456 command and
a workstation has been connected. What could be the reason that the Fa0/2
interface is shutdown?
120
110
1
4
Explanation: The RIP route with the source code R is used to forward data to the destination
IPv6 address of 2001:DB8:CAFE:4::A. This route has an AD value of 120.
10. Which value in a routing table represents trustworthiness and is used by
the router to determine which route to install into the routing table when
there are multiple routes toward the same destination?
administrative distance
metric
outgoing interface
routing protocol
Explanation: The administrative distance represents the trustworthiness of a particular route.
The lower an administrative distance, the more trustworthy the learned route is. When a router
learns multiple routes toward the same destination, the router uses the administrative distance
value to determine which route to place into the routing table. A metric is used by a routing protocol
to compare routes received from the routing protocol. An exit interface is the interface used to send
a packet in the direction of the destination network. A routing protocol is used to exchange routing
updates between two or more adjacent routers.
12. Refer to the graphic. Which command would be used on router A to
configure a static route to direct traffic from LAN A that is destined for LAN
C?
Configure a dynamic routing protocol between R1 and Edge and advertise all routes.
Configure a static route from R1 to Edge and a dynamic route from Edge to R1.
Configure a static default route from R1 to Edge, a default route from
Edge to the Internet, and a static route from Edge to R1.
Configure a dynamic route from R1 to Edge and a static route from Edge to R1.
Explanation: Two routes have to be created: a default route in R1 to reach Edge and a static
route in Edge to reach R1 for the return traffic. This is a best solution once PC A and PC B belong
to stub networks. Moreover, static routing consumes less bandwidth than dynamic routing.
33. Refer to the exhibit. What would happen after the IT administrator enters
the new static route?
The 172.16.1.0 static route would be entered into the running-config but not shown in the
routing table.
The 172.16.1.0 route learned from RIP would be replaced with the
172.16.1.0 static route.
The 0.0.0.0 default route would be replaced with the 172.16.1.0 static route.
The 172.16.1.0 static route is added to the existing routes in the routing table.
Explanation: A route will be installed in a routing table if there is not another routing source with
a lower administrative distance. If a route with a lower administrative distance to the same
destination network as a current route is entered, the route with the lower administrative distance
will replace the route with a higher administrative distance.
34. What two pieces of information are needed in a fully specified static route
to eliminate recursive lookups? (Choose two.)
the interface ID of the next-hop neighbor
the interface ID exit interface
the IP address of the exit interface
the IP address of the next-hop neighbor
the administrative distance for the destination network
Explanation: A fully specified static route can be used to avoid recursive routing table lookups by
the router. A fully specified static route contains both the IP address of the next-hop router and the
ID of the exit interface.
35. Refer to the exhibit. Which command will properly configure an IPv6
static route on R2 that will allow traffic from PC2 to reach PC1 without any
recursive lookups by router R2?
39. Refer to the exhibit. PC A sends a request to Server B. What IPv4 address
is used in the destination field in the packet as the packet leaves PC A?
192.168.11.1
192.168.10.1
192.168.12.16
192.168.10.10
Explanation: The destination IP address in packets does not change along the path between the
source and destination.
40. What does R1 use as the MAC address of the destination when
constructing the frame that will go from R1 to Server B?
R1#
Refer to the exhibit. Which interface will be the exit interface to forward a
data packet that has the destination IP address 172.18.109.152?
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
None, the packet will be dropped.
48. Refer to the exhibit. What will the router do with a packet that has a
destination IP address of 192.168.12.227?
Which route would have to go down in order for this static route to appear in the routing table?
a default route
a static route to the 192.168.10.0/24 network
an OSPF-learned route to the 192.168.10.0/24 network
an EIGRP-learned route to the 192.168.10.0/24 network
The administrative distance of 5 added to the end of the static route creates a floating static
situation for a static route that goes down. Static routes have a default administrative distance of 1.
This route that has an administrative distance of 5 will not be placed into the routing table unless the
previously entered static route to the 192.168.10.0/24 goes down or was never entered. The
administrative distance of 5 added to the end of the static route configuration creates a floating
static route that will be placed in the routing table when the primary route to the same destination
network goes down. By default, a static route to the 192.168.10.0/24 network has an administrative
distance of 1. Therefore, the floating route with an administrative distance of 5 will not be placed into
the routing table unless the previously entered static route to the 192.168.10.0/24 goes down or
was never entered. Because the floating route has an administrative distance of 5, the route is
preferred to an OSPF-learned route (with the administrative distance of 110) or an EIGRP-learned
route (with the administrative distance of 110) to the same destination network.
50. What are two advantages of static routing over dynamic routing? (Choose
two.)
Static routing is more secure because it does not advertise over the
network.
Static routing scales well with expanding networks.
Static routing requires very little knowledge of the network for correct implementation.
Static routing uses fewer router resources than dynamic routing.
Static routing is relatively easy to configure for large networks.
Static routing requires a thorough understanding of the entire network for proper implementation. It
can be prone to errors and does not scale well for large networks. Static routing uses fewer router
resources, because no computing is required for updating routes. Static routing can also be more
secure because it does not advertise over the network.
51. What characteristic completes the following statement?
When an IPv6 static route is configured, it is possible that the same IPv6 link-
local address is used for …
a destination host route with a /128 prefix.
the “ipv6 unicast-routing” command.
the next-hop address of two different adjacent routers.
an administrative distance of 2.
52. A network administrator configures the interface fa0/0 on the router R1
with the command ip address 172.16.1.254 255.255.255.0. However, when
the administrator issues the command show ip route, the routing table does
not show the directly connected network. What is the possible cause of the
problem?
The subnet mask is incorrect for the IPv4 address.
The configuration needs to be saved first.
The interface fa0/0 has not been activated.
No packets with a destination network of 172.16.1.0 have been sent to R1.
Explanation: A directly connected network will be added to the routing table when these three
conditions are met: (1) the interface is configured with a valid IP address; (2) it is activated with no
shutdown command; and (3) it receives a carrier signal from another device that is connected to the
interface. An incorrect subnet mask for an IPv4 address will not prevent its appearance in the
routing table, although the error may prevent successful communications.
53. Refer to the exhibit. What command would be used to configure a static route on R1 so
that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?
54. Refer to the exhibit. What two commands will change the next-hop address for the
10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)
55. Refer to the exhibit. Which interface will be the exit interface to forward a data packet that
has the destination IP address 192.168.139.244?
R1#
GigabitEthernet0/1
None, the packet will be dropped.
Serial0/0/1
GigabitEthernet0/0
56. What characteristic completes the following statement?
When an IPv6 static route is configured, a fully-specified configuration should
be used with …
::/0.
the “ipv6 unicast-routing” command.
the next-hop address of two different adjacent routers.
a directly connected multiaccess network.
57. Refer to the exhibit. Which interface will be the exit interface to forward
a data packet that has the destination IP address 192.168.71.52?
R1#
R1#
R1#
GigabitEthernet0/1
Serial0/0/1
GigabitEthernet0/0
Serial0/0/0
62. Match the characteristic to the corresponding type of routing. (Not all
options are used.)
Explanation: Both static and dynamic routing could be used when more than one router is
involved. Dynamic routing is when a routing protocol is used. Static routing is when every remote
route is entered manually by an administrator into every router in the network topology.
63. Refer to the exhibit. Which interface will be the exit interface to forward
a data packet that has the destination IP address 172.25.128.244?
GigabitEthernet0/0
GigabitEthernet0/1
None, the packet will be dropped.
Serial0/0/1
64. Ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1
Which static route is configured here?
Floating static
Recursive static
Directly attached static
Fully specified static
Explain: The Router has to look up in the routing table twice to find the exit interface. The first is
shown in the Question now the router has to lookup what interface ex.s0/0/0 that the 3000::1
address is associated with. route table ex. 2001:0DB8:3000::1 is directly connected, Serial0/0/0.
This is the 2nd lookup in the table to find out that the packet needs to exit the s0/0/0 interface
making the first route a recursive and 2nd route a direct.