Anda di halaman 1dari 207

Cisco 642-902

implementing cisco ip routing

www.CertIdea.com/642-902.html

The followings are some tips made for you, we recommend you to read them carefully
since they can help you learn better.

Do's and Don'ts


Do’s: Study our products rather than just remember the questions and answers. Certidea
materials are strictly selected by our experts according to the official standards. After studying
them you can enhance your ability.
Don’ts: Do not go through our products just once. You should make sure you can have
enough time to master our materials in case you have missed something. We guarantee that
you can pass your exam after fully studying our products.

Prompt Update
You can rest assured that every Certidea product is of the latest version. We are constantly
updating our products to make sure our quality. You can enjoy a 120-day free update after the
purchase and you should check your member zone at Certidea an update 3-4 days before the
scheduled exam date.

Development
If you have some complaints or suggestions, please let us know. No matter what is the
problem, we are eager to hear from our customers to develop ourselves. You can contact us
at feedback@Certidea.com and should include the followings: exam number, version, page
number, question number, and your login ID. We will solve your problems as soon as possible.

Certidea--Lead Your Way to Certificates


----------------------------------------------------------------------------------------------------------------------
Sales and Support Manager
Sales Team: sales@Certidea.com Support Team: support@Certidea.com
---------------------------------------------------------------------------------------------------------------------

Copyright
A unique serial number associated with your particular name and contact information is
contained in each PDF file for security purposes. So if we find you have distributed a
particular PDF file, Certidea reserves the right to take legal action against you according to
the International Copyright Laws.

Lead your way to certificates!


Question: 1
Two Certidea EIGRP routers are attempting to establish themselves as neighbors. multicast
packet type is responsible for neighbor discovery?

A. Update
B. Query
C. Acknowledgment
D. Reply
E. Hello
F. None of the other alternatives apply

Answer: E

Question: 2
Certidea has chosen to use EIGRP for their network routing protocol. Which three stat
regarding EIGRP? (Select three)

A. By default, EIGRP uses the Dijkstra algorithm to determine the best path to a destination
on bandwidth and delay.
B. To speed convergence, EIGRP attempts to maintain a successor and feasible successor
destination.
C. EIGRP uses hellos to establish neighbor relationships.
D. By default, EIGRP performs auto-summarization across classful network boundaries.
E. EIGRP uses an area hierarchy to increase network scalability.

Answer: B, C, D

Question: 3
You need to configure EIGRP on all routers within the Certidea network. Which two
statements are characteristics of the routing protocol EIGRP? (Select two)

A. Updates are sent as broadcast.


B. Updates are sent as multicast.
C. LSAs are sent to adjacent neighbors.
D. Metric values are represented in a 32-bit format for granularity.

Answer: B, D

Question: 4
You have been tasked with setting up summarization in the Certidea EIGRP network. Which
two statements are true about EIGRP manual summarization? (Select two)

A. Manual summarization is configured on a per interface basis.

Lead your way to certificates!


B. When manual summarization is configured, auto-summarization is automatically disabled
by default.
C. The summary address is assigned an administrative distance of 10 by default.
D. Manual summaries can be configured with the classful mask only.
E. The summary address is entered into the routing table and is shown to be sourced from the
Null0 interface.

Answer: A, E

Question: 5
Router CK14 is configured as an EIGRP stub router. What are three key concepts that apply
when configuring the EIGRP stub routing feature in a hub and spoke network? (Select three)

A. Stub routers are not queried for routes.


B. A hub router prevents routes from being advertised to the remote router.
C. A stub router should have only EIGRP hub routers as neighbors.
D. EIGRP stub routing should be used on hub routers only.
E. Spoke routers connected to hub routers answer the route queries for the stub router.
F. Only remote routers are configured as stubs.

Answer: A, C, F

Question: 6
You want to reduce the amount of EIGRP traffic across low speed links in the Certidea
network. Which is the most effective technique to contain EIGRP queries?

A. Using a hierarchical addressing scheme


B. Configuring route filters
C. Establishing separate autonomous systems
D. Route summarization
E. None of the other alternatives apply

Answer: D

Question: 7
Routers CK1 and CK2 have formed an EIGRP neighbor relationship. In order for two routers
to become EIGRP neighbors, which two values must match? (Select two)

A. K values
B. Delay
C. Autonomous system
D. Hello time
E. Hold time
F. Bandwidth

Lead your way to certificates!


Answer: A, C

Question: 8
Certidea uses EIGRP as their internal routing protocol. Which three statements are true about
E operation? (Select three)

A. The maximum metric for the specific routes is used as the metric for the summary route.
B. When summarization is configured, the router will also create a route to null 0.
C. The summary route remains in the route table, even if there are no more specific routes to
the netw
D. Automatic summarization across major network boundaries is enabled by default.
E. Summarization is configured on a per-interface level.

Answer: B, D, E

Question: 9
A link failure in the Certidea network has caused the EIGRP routers to update their routing
tables.
What action does CK1, an EIGRP router, take when it cannot find a feasible successor for a
network?

A. It examines the topology table for a next best path.


B. It transitions from passive to active state for that network and queries its neighbors.
C. It examines the routing and neighbor tables for the next best path.
D. It transitions from active to passive state for that network and queries its neighbors.
E. None of the other alternatives apply

Answer: B

Question: 10
EIGRP performs automatic summarization at network boundaries. What administrative
distance is given to these EIGRP summary routes?

A. 1
B. 90
C. 95
D. 0
E. 5
F. 170
G. 255
H. None of the other alternatives apply

Answer: E

Lead your way to certificates!


Question: 11
You need to alter the metrics of certain EIGRP routes in the Certidea network. Which two
paramet are used by default to compute the EIGRP metric? (Select two)

A. MTU
B. Bandwidth
C. Delay
D. Reliability
E. Load
F. Interface up time

Answer: B, C

Question: 12
The Certidea network is using EIGRP as the network routing protocol. Which of the following
statements correctly describe features and characteristics of routing using EIGRP? (Select
three)

A. It sends periodic updates every 60 seconds.


B. EIGRP uses DUAL to achieve rapid convergence.
C. Adjacencies exist between master routers (MRs) in each domain.
D. It uses multicast to discover other EIGRP routers on an internetwork.
E. EIGRP provides support for multiple network layer protocols: IPX, AppleTalk, and IP.

Answer: B, D, E

Question: 13
While comparing the tables associated with EIGRP and OSPF, you notice some similarities.
Which EIGRP table is similar to OSPF’s Link State Adjacency table?

A. Neighbor table
B. Routing table
C. Topology table
D. Successor table
E. None of the other alternatives apply

Answer: A

Question: 14
Different types of EIGRP transmissions are sent between neighboring routers. Which three of
the following terms are known as ‘reliable packets’ in EIGRP? (Select three)

A. Hello

Lead your way to certificates!


B. ACK
C. Reply
D. Query
E. Update

Answer: C, D, E

Question: 15
Which one of the following statements best describes the way EIGRP advertises subnet mask
infor to its destination networks?

A. EIGRP advertises a prefix length for each destination network.


B. EIGRP advertises a fixed length subnet mask for each destination network.
C. EIGRP advertises only a classful subnet mask for each destination network.
D. EIGRP, like IGRP and RIP, does not advertise a subnet mask for each destination network.

Answer: A

Question: 16
EIGRP was designed specifically not to use excessive bandwidth for routing updates and
functions across WAN links. If EIGRP is configured on an interface, what is the maximum
percent of its bandwidth EIGRP would use, by default?

A. 10%
B. 25%
C. 50%
D. 75%
E. 100%

Answer: C

Question: 17
EIGRP supports Variable Length Subnet Masking (VLSM). Which two features of EIGRP are
true regarding EIGRP support for VLSM? (Select two)

A. It advertises a routing mask


B. It is a classful routing protocol
C. It is a classless routing protocol
D. It does not advertise a routing mask.

Answer: A, C

Question: 18

Lead your way to certificates!


In an effort to decrease the size of the routing tables in the Certidea network, summarization is
being configured on all routers. Where in an EIGRP network is it most appropriate to
implement route summarization?

A. At area border routers


B. At autonomous system boundary routers
C. It is done automatically by the DR router in each area
D. Manually at any interface of any EIGRP router within the network
E. In backbone area routers.

Answer: B

Question: 19
The Certidea network is using route summarization to decrease the size of the routing tables.
In this EIGRP network, which of the following describes the best method for implementing
summarization?

A. At WAN interfaces.
B. Manually at major network boundaries.
C. Dynamically at discontiguous interfaces.
D. Dynamically at major network boundaries.
E. None of the other alternatives apply

Answer: D

Question: 20
The Certidea network is running EIGRP on the T1 links within their NBMA frame relay network.
By default what would the hold time be for hello packets across these WAN links?

A. 15 seconds
B. 30 seconds
C. 90 seconds
D. 180 seconds
E. 5 Seconds

Answer: D

Question: 21
EIGRP is being used as the routing protocol within the Certidea network. Which two of the
following features allow EIGRP to support classless routing? (Select two)

A. Djikstra’s algorithm
B. discontiguous subnets
C. variable length subnet masks

Lead your way to certificates!


D. periodic update announcements
E. unequal path-cost load balancing

Answer: B, C

Question: 22
The Certidea network administrator has issued the “EIGRP stub” command on router CK8.
What is the purpose of the “EIGRP stub” configuration command?

A. to reduce the convergence time by enabling the EIGRP stub router to propagate the EIGRP
queries from the EIGRP hub router.
B. to increase scalability by limiting the EIGRP query range.
C. to reduce the size of the routing table by blocking the D EX (External EIGRP) routes into
the EIGRP stub router.
D. to reduce the convergence time by enabling the EIGRP stub router to also perform query
requests to the EIGRP hub router.
E. None of the other alternatives apply.

Answer: B

Question: 23
Router CK1 is configured as shown below:

router eigrp 100


network 10.0.0.0
eigrp stub

Based on the information shown above, which two types of routes will be advertised? (Select
two)

A. Receive-only
B. Stub
C. Static
D. Summary
E. Connected
F. Dynamic

Answer: D, E

Question: 24
You need to configure EIGRP on a new Certidea router. Which command should you issue
first to configure EIGRP for IP?

A. router eigrp autonomous-system-number

Lead your way to certificates!


B. ip eigrp autonomous-system-number
C. ip eigrp routing
D. router eigrp process-id
E. None of the other alternatives apply

Answer: A

Question: 25
You need to configure route summarization on a Certidea EIGRP router. Which is the correct
command format to configure EIGRP summary route?

A. ip summary-route eigrp as-number address mask


B. ip summary-address as-number address mask
C. ip auto-summary as-number address mask
D. ip auto-summary eigrp as-number address mask
E. ip summary-address eigrp as-number address mask
F. None of the other alternatives apply

Answer: E

Question: 26
You want to enable load sharing across the Certidea WAN using EIGRP. Which configuration
command is used to enable EIGRP unequal-cost path load balancing?

A. Variance
B. Distance
C. Maximum-paths
D. Default-metric
E. Metric
F. None of the other alternatives apply

Answer: A

Question: 27
You are a network administrator on a Cisco router that’s running EIGRP. You want to
aggregate some of the routes. Which of the following commands below would you enter to
configure the summary route you need?

A. ip auto-summary as-number address mask


B. ip summary-address as-number address mask
C. ip auto-summary eigrp as-number address mask
D. ip summary-route eigrp as-number address mask
E. ip summary-address eigrp as-number address mask

Lead your way to certificates!


Answer: E

Question: 28
Router CK1 has a 256kbps serial interface link to another Certidea location. The configuration
file of this interface is shown below:

interface serial 0/0


bandwidth 56
ip bandwidth-percent eigrp 1 200

From the command output above, how many kbps of bandwidth is allocated for EIGRP traffic?

A. 56 kbps
B. 112 kbps
C. 128 kbps
D. 256 kbps
E. None of the other alternatives apply

Answer: B

Question: 29
EIGRP is being used as the routing protocol on the Certidea network. While troubleshooting
some network connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active)
messages. What causes these SIA routes? (Select two)

A. The neighboring router stops receiving ACK packets from this router.
B. The neighboring router starts receiving route updates from this router.
C. The neighboring router is too busy to answer the query (generally caused by high CPU
utilization).
D. The neighboring router is having memory problems and cannot allocate the memory to
process the query or build the reply packet.

Answer: C, D

Question: 30
While troubleshooting an EIGRP routing problem you notice that one of the Certidea routers
have generated a large number of SIA messages. What are two possible causes for EIGRP
Stuck-In-Active routes? (Select two)

A. Some query or reply packets are lost between the routers.


B. The neighboring router starts receiving route updates from this router.
C. A failure causes traffic on a link between two neighboring routers to flow in only one
direction (unidirectional link).
D. The neighboring router stops receiving ACK packets from this router.

Lead your way to certificates!


Answer: A, C

Question: 31
EIGRP uses five generic packet types (hello, updates, queries, replies, acknowledgements). If
you wished to view the statistics for these packets, which IOS command should you use?

A. debug eigrp packets


B. show ip eigrp traffic
C. show ip eigrp topology
D. show ip eigrp neighbors

Answer: B

Question: 32
A Certidea network administrator is troubleshooting an EIGRP configuration across a
discontiguous network. What must the administrator do to ensure all of the Certidea routers
have the correct routing information?

A. The administrator must enable classless routing with the command “ip classless”
B. The administrator must disable automatic summarization with the command “no auto-
summary”
C. The administrator must specify a default network with the command “ip default-network”
D. Nothing, EIGRP supports discontiguous networks by default.
E. The administrator must enable manual summarization with the command “ip summary-
address”
F. None of the other alternatives apply

Answer: B

Question: 33
The Certidea OSPF network has been segmented into numerous different areas. Which three
choices below are advantages to creating multiple areas in OSPF? (Select three)

A. Fewer hello packets


B. Fewer adjacencies needed
C. Less frequent SPF calculations
D. Smaller routing tables
E. Reduced Link State Update (LSU) overhead

Answer: C, D, E

Question: 34
Which of the three areas below are valid OSPF area types? (Select three)

Lead your way to certificates!


A. Stub
B. Active
C. Remote
D. Backbone
E. Ordinary or standard

Answer: A, D, E

Question: 35
OSPF networks create Link State Advertisements (LSAs). What kind of LSA is conceived by
an Area Border Router (ABR) containing route summarization of area subnets?

A. Router link, type 1.


B. Router link, type 8.
C. Network summary link, type 3.
D. AS external summary link, type 4.

Answer: C

Question: 36
Router CK1 has an interface in one OSPF area and another interface in a different OSPF area.
What kind of router is CK1?

A. ABR
B. ASBR
C. Internal router
D. Backbone router
E. None of the other alternatives apply

Answer: A

Question: 37
When an OSPF ASBR announces external networks, what kind of LSA type does it use?

A. Type 1 LSA
B. Type 2 LSA
C. Type 3 LSA
D. Type 4 LSA
E. Type 5 LSA

Answer: E

Question: 38

Lead your way to certificates!


What kind of information can you find in a type 3 OSPF network summary link LSA?

A. Summary of routes in the AS.


B. Summary of link states in an OSPF area.
C. Summary of IP subnets in an OSPF area.
D. Summary of metric coast from ABR to ASBR.
E. None of the other alternatives apply.

Answer: C

Question: 39
What does Cisco recommend for those who set up networks with multiple OSPF areas?
(Select two)

A. There should not be more than three areas per router.


B. Area 0 must be larger than any subsequent OSPF area.
C. A router can be a DR or BDR for more than one LAN.
D. You should not run more than one instance of the OSPF process on an ABR.

Answer: C, D

Question: 40
When designing and implementing OSPF in multiple areas; what should be taken in
consideration? (Select two)

A. Each area must connect to area 0.


B. Each area must have a unique AS number.
C. Remote areas must be configured as stub or NSSA areas.
D. Traffic between two areas must travel across the backbone area.

Answer: A, D

Question: 41
You are the administrator of the large Certidea OSPF and are considering dividing it to multiple
areas.
What are two advantages of configuring multiple OSPF areas? (Select two)

A. It eliminates the need for a DR or BDR in the OSPF network.


B. It eliminates security concerns by segregating portions of the network.
C. Type 1 and 2 LSAs are confined to a single area, reducing routing overhead.
D. Area members have smaller topological databases than if the network was one large area,
requiring less CPU to derive routes.

Answer: C, D

Lead your way to certificates!


Question: 42
OSPF has been configured on router CK1, which lies on a multi point network. On this multi-
access network, what type of router floods type 2 Link State Advertisements (LSAs) into an
OSPF area?

A. DR
B. ABR
C. BDR
D. ASBR
E. None of the other alternatives apply

Answer: A

Question: 43
You want router one of the OSPF areas on your network to be able to accept type 7 external
routers, but not type 5 external routes. What kind of area should be configured to accomplish
this?

A. A not-so stubby area


B. A stubby area
C. A totally stubby area
D. A backbone area
E. An on-demand area

Answer: A

Question: 44
Router CK1 is an OSPF router connected to area 1. To create an NSSA totally stubby area in
Area 1, what commands should be configured on the NSSA ABR?

A. router ospf 1
area 1 nssa
B. router ospf 1
area 1 nssa no-summary
C. router ospf 1
area 1 nssa no-redistribution
D. router ospf 1
area 1 nssa default-information originate metric-type 2
E. router ospf 1
area 1 nssa default-information originate
F. None of the other alternatives apply

Answer: B

Lead your way to certificates!


Question: 45
Assuming that you are configuring an ABR in an OSPF area, which IOS command would you
execute if your goal was to summarize the networks advertised out of the area?

A. summary-address address mask


B. area area-id range address mask
C. auto-summary address mask area area-id
D. network network-number wildcard mask area area-id
E. None of the other alternatives apply

Answer: B

Question: 46
Which two of the following characteristics are defined by the network command? (Select two)

A. The OSPF area ID


B. The OSPF router ID
C. The OSPF process ID
D. Which interface belongs to which OSPF area

Answer: A, D

Question: 47
Router CK1 is configured for OSPF as shown below:

router ospf 76
network 172.22.23.0 0.0.0.0 area 1
network 172.18.0.0 0.0.255.255 area 0
area 0 range 172.18.0.0 255.255.0.0
area 1 range 172.22.23.0 255.255.255.0

Which of the following statements are true regarding the above configuration? (Select three)

A. The OSPF router ID is 76.


B. This is an area border router.
C. The designated router priority is 76.
D. This router connects area 1 to the backbone area.
E. Any router interfaces with an address of 172.18.x.x are in area 0.

Answer: B, D, E

Question: 48

Lead your way to certificates!


When configuring a multi-area OSPF network to summarize routes, what additional command
is required by ASBR’s that is not needed by ABR’s?

A. area range command


B. ospf summarize command
C. aggregate-route command
D. summary-address command
E. None of the other alternatives apply

Answer: D

Question: 49
A Certidea OSPF router is configured in the following manner:

router ospf 200


network 203.42.67.0 0.0.0.255 area 7
network 203.42.68.0 0.0.0.255 area 0
area 7 stub no-summary
area 7 default-cost 30

Which of the following statements are true regarding this configuration? (Select two)

A. Area 7 is a totally stubby area.


B. If the backbone becomes discontiguous, traffic can be routed through area 7.
C. Redistribution of other routing protocols takes place at the area designated router.
D. Area 7 non-ABR routers contain only intra-area routing information and a default route.

Answer: A, D

Question: 50
Which of the following is an OSPF configuration parameter that is used on an ABR, but not on
an internal router?

A. A virtual link to area 0.


B. OSPF summarization command.
C. default-cost extension to the area command.
D. no-summary extension to the area stub command.
E. None of the other alternatives apply

Answer: D

Question: 51

Lead your way to certificates!


Router CK1 is an OSPF ABR that connects area 3 to the network. You wish to configure area 3
to summarize the IP address range 172.16.20.192 – 172.16.20.223. Which two of the
following
IOS commands would you execute to accomplish this? (Select two)

A. network 172.16.20.192 0.0.0.31 area 3


B. area 3 range 172.16.20.192 172.16.20.223
C. area 3 range 172.16.20.192 255.255.255.224
D. network 172.16.20.192 255.255.255.224 area 3

Answer: A, C

Question: 52
Router CK1 is an ABR that is part of the Certidea OSPF network. CK1 has been configured
with the “area range” command. What does this command provide?

A. It provides the range of areas in the OSPF internetwork.


B. It provides the range of areas in which this ABR participates.
C. It provides a summary of networks to be advertised outside the area.
D. It provides a summary of networks outside the area and inside the AS.

Answer: C

Question: 53
While performing a routine inspection of your OSPF network you come to the realization that
the Designated Router (DR) may be overloaded, and you’re considering changing the DR.
What are three ways you could manipulate the election of the DR? (Select three)

A. Use of the priority command.


B. Use of the router-id command.
C. Assignment of the loopback address.
D. Assigning a lower IP address
E. By adding additional memory to the desired router.

Answer: A, B, C

Question: 54
While troubleshooting some connectivity issues, you issue the “show ip ospf database” in
order to examine the link state database. Which three of the statements below are true
regarding the OSPF link state database? (Select three)

A. Each router has an identical link state database.


B. External routes are imported into a separate link state database.
C. Synchronization of link state databases is maintained via flooding of LSAs.

Lead your way to certificates!


D. Information in the link state database is used to build a routing table by calculating a
shortest-path tree.
E. By default, link state databases are refreshed every 10 minutes in the absence of topology
changes.

Answer: A, C, D

Question: 55
Which command should you use to verify what networks are being routed by a given OSPF
process?

A. show ip ospf
B. show ip route
C. show ip protocol
D. show ip ospf database
E. None of the other alternatives apply

Answer: C

Question: 56
You have a multi-area OSPF network and you’re concerned because one of the sites is having
connectivity problem to resources in a different area. Which IOS privileged mode command
would you enter to confirm that your network: A) has a path to its ABR, B) has a path to its
ASBR, and C) the SPF calculation is functional?

A. show ip protocols
B. show running-config
C. show ip ospf neighbor
D. show ip ospf border-routers

Answer: D

Question: 57
An OSPF link can be in multiple states at any given moment (ie. Exstart, exchange, full). Which
two IOS commands let you view the state of the link? (Select two)

A. show ip ospf
B. show ip protocols
C. show ip ospf neighbor
D. show ip ospf interface

Answer: C, D

Question: 58

Lead your way to certificates!


Which command would display OSPF parameters such as filters, default metric, maximum
paths, and number of areas configured on a router?

A. show ip protocol
B. show ip route
C. show ip ospf interface
D. show ip ospf
E. show ip interface
F. None of the other alternatives apply

Answer: A

Question: 59
Which IOS command would you use to find out which networks are routed by a particular
OSPF process?

A. show ospf
B. show ip route
C. show ip protocols
D. show ip ospf database
E. None of the other alternatives apply

Answer: C

Question: 60
Which three conditions can cause BGP neighbor establishment to fail? (Select three)

A. There is an access list blocking all TCP traffic between the two BGP neighbors.
B. The EBGP neighbor is not directly connected, and the ebgp-multi-hop option is set to the
default valu
C. The IBGP neighbor is not directly connected.
D. BGP synchronization is enabled in a Transit AS with fully-meshed IBGP neighbors.
E. The BGP update interval is different between the two BGP neighbors.
F. The BGP neighbor is referencing an incorrect AS number in its neighbor statement.

Answer: A, B, F

Question: 61
The router that is being used for the Internet is low on memory. Because multiple ISP’s are
being used, BGP is needed for Internet routing. Which of the following types of routes should
be received from the Internet providers if the goal is to consume as little memory as possible?

A. Only default routes.


B. Only partial BGP routes.

Lead your way to certificates!


C. Only internal BGP routes.
D. Only redistributed routes.
E. All routes

Answer: A

Question: 62
Which BGP state is a router in when it has found the IP address in the neighbor statement and
has created and sent out a BGP packet but the router has not received a response back?

A. Update
B. Connect
C. Active
D. Established

Answer: B

Question: 63
You need to enable BGP within your enterprise network. Which two statements are true regard
BGP? (Select two)

A. BGP is designed to scale only to large companies.


B. The UDP protocol is used for speed and low overhead.
C. BGP will never send a message unless it is triggered update.
D. The TCP protocol is used for reliability.
E. BGP is a path vector routing protocol.
F. BGP is a distance vector routing protocol.

Answer: D, E

Question: 64
Every routing protocol has a loop prevention mechanism. Which BGP attribute is used by BGP
routers to prevent routing loops?

A. Origin
B. Weight
C. AS-path
D. Next-hop
E. Local preference
F. MED
G. None of the other alternatives apply

Answer: C

Lead your way to certificates!


Question: 65
You need to determine if you should implement BGP routing within your enterprise.
Implementing this routing protocol in an AS (Autonomous System) is most appropriate when?
(Select 3)

A. An AS has multiple connections to other autonomous systems.


B. The Intranet is limited to a single connection to the Internet or another AS.
C. Routing policy and route selection for traffic entering and leaving the AS must be
manipulated.
D. An AS allows packets to transit through it to reach other autonomous systems.
E. There is sufficient memory and processor power to handle to the constant updates.,
F. An AS needs to dynamically establish adjacencies with unspecified neighbors.

Answer: A, C, E

Question: 66
There are numerous attributes associated with BGP. Which BGP attribute will not be
advertised in routing updates to its neighboring routers?

A. Local preference
B. Next hop
C. Origin
D. Weight
E. AS_path
F. None of the other alternatives apply

Answer: D

Question: 67
Certidea uses BGP to advertise their IP blocks to the Internet. Which statement is true about
EBGP?

A. EBGP requires a full mesh.


B. An internal routing protocol can be used to reach an EBGP neighbor.
C. A static route can be used to form an adjacency between neighbors.
D. The next hop does not change when BGP updates are exchanged between EBGP
neighbors.
E. None of the other alternatives apply.

Answer: C

Question: 68

Lead your way to certificates!


All of the IBGP routers in the Certidea network have peer relationships built with every other
IBGP router in the Certidea network. Why should iBGP sessions be fully meshed within a
Transit AS?

A. Routes learned via EBGP are never propagated to other IBGP peers.
B. Routes learned via IBGP are never propagated to other IBGP peers.
C. A full mesh allows for optimal routing within the Transit AS.
D. Routes learned via IBGP are never propagated to other EBGP peers.
E. BGP requires redundant TCP sessions between IBGP peers.
F. None of the other alternatives apply.

Answer: B

Question: 69
Which three of the statements below correctly describe the characteristics of Autonomous
Systems in routed networks? (Select three)

A. Within an AS, all routers must run either BGP or IBGP.


B. An AS uses exterior gateway protocols (EGPs) to exchange information with other
autonomous systems.
C. An AS is a group of routers under the same technical administration.
D. Within an AS, routes learned through BGP can be redistributed using interior gateway
protocols.
E. Within an AS, routes learned through an interior protocol cannot be redistributed using BGP
to other autonomous systems.

Answer: B, C, D

Question: 70
Which of the following statements about IBGP routers are true? (Select one)

A. They must be fully meshed.


B. They can be in a different AS.
C. They must be directly connected.
D. They do not need to be directly connected.
E. All of the above

Answer: D

Question: 71
Router CK1 is configured as a route reflector. What would happen if router CK1 would receive
an update from a peer in a different autonomous system?

A. It discards the update.

Lead your way to certificates!


B. It sends the update to all IBGP peers.
C. It sends the update only to non clients.
D. It sends the update only to route reflector clients.
E. It sends the update to all routers in the autonomous system.

Answer: B

Question: 72
Which of the following statements is true about BGP peer communications?

A. Communication between BGP peers runs over RIP.


B. Communication between BGP peers runs over TCP.
C. Communication between BGP peers runs over UDP.
D. Communication between BGP peers runs over ICMP.

Answer: B

Question: 73
A problem was reported that the 10.10.10.0/24 prefix was not injected into the local BGP table
on a Certidea router named CK1. The following information is available from this router:

CK1 Configuration:

router bgp 65001


network 10.0.0.0

neighbor 172.16.1.1 remote-as 65002


no auto-summary

Routing table information:

show ip route | include 10


O 10.10.10.0/24 [110/11] via 192.168.1.1, 2d00h, Ethernet0/0

Why is this prefix not in the local BGP table of the CK1?

A. The 172.16.1.1 neighbor is down.


B. The prefix 10.10.10.0/24 is not a 'connected' route.
C. This route is not a BGP learned route.
D. The network command is wrong.
E. None of the other alternatives apply

Answer: D

Lead your way to certificates!


Question: 74
Routers CK1 and CK2 are configured as BGP peers. Which of the following is true regarding
this peering relationship? (Select two)

A. Periodic keepalives are used to verify connectivity.


B. Incremental keepalives are used to verify connectivity.
C. TCP provides a reliable connection between two BGP routers.
D. It provides a “best effort” connection between two BGP routers.

Answer: A, C

Question: 75
A Certidea BGP router is configured as shown below:

router bgp 65111


neighbor 172.16.1.1 remote-as 65111
neighbor 172.16.2.1 remote-as 65112
network 192.168.0.0
network 10.0.0.0
!
ip route 192.168.0.0 255.255.0.0 null0

The 192.168.0.0 network is not being propagated throughout the network. Based on the
information shown above what is the reason the 192.168.0.0 route is not being advertised?

A. The network 10.0.0.0 statement is missing mask 0.255.255.255.


B. The network 192.168.0.0 statement is missing mask 0.0.255.255.
C. The network 10.0.0.0 statement is missing mask 255.0.0.0.
D. The network 192.168.0.0 statement is missing mask 255.255.0.0
E. The auto-summary configuration is missing.

Answer: D

Question: 76
Router CK1 is configured for BGP and peering with other BGP routers has been established.
During the BGP configuration on this router, the command “aggregate-address
173.33.0.0255.255.252.0” was issued. However, the peers do not receive this aggregate
network in BGP advertisements. Also, the router does not have this aggregate network in its
BGP table. Which option indicates a possible reason this command did not cause the router to
advertise the aggregate network to its peers?

A. The next hop IP address must be a loopback address.


B. Interface NULL 0 is likely shutdown.
C. The IGP running on this router does not have network 173.33.0.0/22 installed.

Lead your way to certificates!


D. The BGP command no synchronization is missing.
E. Subnets of 173.33.0.0/22 do not exist in the BGP table.
F. The BGP command no auto-summary is missing.

Answer: E

Question: 77
The command “bgp always-compare-med” was added to router CK1. What will this command
accomplish?

A. It forces CK1 to compare the communities of routes from different autonomous systems
B. It forces CK 1 to compare the weight of routes from different autonomous systems
C. It forces CK 1 to compare metrics of routes from different autonomous systems
D. It forces CK 1 to compare the local preference of routes from different autonomous systems
E. None of the other alternatives apply

Answer: C

Question: 78
According to Cisco’s official best practice recommendations, what is the preferred method for
populating the BGP table on your router with IGP routes?

A. Use the network command.


B. Redistribute EBGP routes into BGP.
C. Redistribute dynamic routes into BGP.
D. Redistribute static routes into the IGP.
E. None of the other alternatives apply

Answer: A

Question: 79
Your network has 2 separate T1 connections with two different providers. To support this, BGP
is being configured. The required information regarding the ISPs is shown below:

Your network: 164.67.36.0/24


Your AS number: 300
AS number of ISP1: 1005
AS number of ISP2: 1010

Based on the information provided, which of the following commands would you enter to
advertise your network to ISP1 and ISP2 via BGP?

A. router bgp 1005


network 164.67.36.0 mask 255.255.255.0

Lead your way to certificates!


neighbor 15.1.1.1 remote-as 1005
neighbor 25.1.1.1 remote-as 1010
B. router bgp 300
network 164.67.36.0 mask 255.255.255.0
neighbor 15.1.1.1 remote-as 1005
neighbor 25.1.1.1 remote-as 1010
C. router bgp 300
network 164.67.36.0
neighbor 15.1.1.1 remote-as 1005
neighbor 25.1.1.1 remote-as 1010
D. router bgp 1010
network 164.67.36.0
neighbor 15.1.1.1 remote-as 1005
neighbor 25.1.1.1 remote-as 1010

Answer: B

Question: 80
You wish to permit all BGP prefixes between /10 and /18 for the 207.0.0.0 network. How
should a BGP prefix list be configured to do this?

A. ip prefix-list 207.0.0.0/8 ge 10 le 18
B. ip prefix-list 207.0.0.0/8 ge 18 le 10
C. ip prefix-list 207.0.0.0/24 ge 10 le 18
D. ip prefix-list 207.0.0.0/24 ge 18 le 10
E. None of the other alternatives apply

Answer: A

Question: 81
Routers CK1 and CK 2 are configured for BGP as shown below:

RTR CK 1
router bgp 200
neighbor 183.215.22.1 remote-as 200
neighbor 183.215.22.1 update-source loopback 1
RTR CK 2
router bgp 200
neighbor 147.229.1.1 remote-as 200

These two routers currently have an active BGP peering session between them and they are
able to pass routes to each other. Based on these configuration files, which of the following are
true? (Select three)

Lead your way to certificates!


A. RTR CK 1 and RTR CK 2 are running IBGP inside AS 200
B. The IP address of RTR CK 1’s Loopback 1 interface is 147.229.1.1.
C. The IP address of RTR CK 1’s Loopback 1 interface is 183.215.22.1.
D. RTR CK 1 and RTR CK 2 are running EBGP between the autonomous systems.
E. RTR CK 1 has forced BGP to use the loopback IP address as the source in the TCP
neighbor connection.

Answer: A, B, E

Question: 82
The Certidea BGP router is configured as shown below:

router bgp 64000


neighbor 172.16.1.1 remote-as 64000
neighbor 10.1.1.2 remote-as 64550
network 200.52.1.192 mask 255.255.255.224
no synchronization
aggregate-address 200.52.1.0 255.255.255.0
The BGP peers 172.16.1.1 and 10.1.1.2 in the above configuration are established and
working, as well as the interface with IP address 200.52.1.192. Based on this information,
which statement below is true about your configuration?

A. Router TestK has an IBGP connection with neighbor 10.1.1.2.


B. Router TestK has an EBGP connection with the neighbor 172.16.1.1.
C. Router TestK advertises only a route 200.52.1.0 255.255.255.0 in BGP.
D. Router TestK advertises only a route 200.52.1.192 255.255.255.224 in BGP.
E. Router TestK advertises both the routes to 200.52.1.0 255.255.255.0 and 200.52.1.192
255.255.255.224 in BGP.
F. None of the other alternatives apply

Answer: E

Question: 83
While troubleshooting an Internet related problem on the Certidea network, you enable BGP
packet debugging. Which attribute must exist in the BGP update packet?

A. LOCAL_ PREF
B. AGGREGATOR
C. AS_Path
D. Weight
E. None of the other alternatives apply

Answer: C

Lead your way to certificates!


Question: 84
Which IOS command would you enter if you wanted to view a list of IBGP and EBGP neighbor
relationships that are configured?

A. show ip bgp
B. show ip bgp paths
C. show ip bgp peers
D. show ip bgp summary
E. show ip bgp protocols

Answer: D

Question: 85
Which IOS command could you use to verify if a BGP router is or isn’t a route reflector?

A. show ip bgp neighbor


B. show running-config
C. show route-reflector
D. show route-reflector-client
E. None of the other alternatives apply

Answer: A

Question: 86
While verifying BGP operation on the Certidea router, you issue the “show ip bgp” command
as shown below:

router CK >show ip bgp


BGP table version is 1046033, local router ID is 198.32.162.100
Status codes: s suppressed, d damped, h history, * valid, > best, i – internal
Origin codes: i – IGP, e EGP, ? –incomplete

Network Next Hop Metric LocPrf Weight Path


*> 143.16.0.0 128.214.63.2 0 400 0 200 1
* 143.16.0.0 192.208.10.5 0 300 0 300 1
* 143.16.0.0 143.16.63.5 0 100 0 200 1
* 143.16.0.0 203.250.13.41 0 100 0 500 1

From the information above, which path will the network 143.16.0.0 prefer to take to exit the
AS?

A. 128.214.63.2
B. 192.208.10.5
C. 128.213.63.5

Lead your way to certificates!


D. 203.250.13.41
E. All of the above will be used in a round robin fashion.

Answer: A

Question: 87
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when
using the “show ip bgp” command? (Choose two)

A. The network was originated via redistribution of an interior gateway protocol into BGP.
B. The network was defined by a static route.
C. The network was learned via IBGP.
D. The network was learned via EBGP.
E. The network was originated via a network or aggregate command.

Answer: A, E

Question: 88
One of the Certidea routers is unable to form a neighbor relationship with an external BGP
peer. Which two statements are true about external BGP neighbor relationships? (Select two)

A. EBGP neighbors use TCP port 179 to exchange BGP routing tables.
B. The BGP split-horizon rule specifies that routes learned via IBGP are never propagated to
other EBGP peers.
C. EBGP neighbors must be in different autonomous systems.
D. Static routes or an interior gateway protocol is required between EBGP neighbors.
E. When an EBGP neighbor receives an update from another EBGP neighbor, it should not
forward the update to other EBGP neighbors.
F. Loopback addresses should be used between EBGP neighbors.

Answer: A, C

Question: 89
The Certidea network uses the autoconfiguration feature in their IPv6 network. Which
statement best describes autoconfiguration for IPv6?

A. A router connected to the local link sends its 64 bit prefix address and the host appends its
MAC address to create its unique IPv6 address.
B. A router connected to the local link sends a broadcast periodically to advertise the subnet
and the host appends its locally configured IPv4 address to create a unique IPv6 address.
C. A host will contact its local router to receive its unique IPv6 address.
D. The local DHCP server will detect a new host has been added to the LAN segment and
automatically send a unique IPv6 address to the new host.
E. None of the other alternatives apply.

Lead your way to certificates!


Answer: A

Question: 90
An IPv6 packet contains some differences to an IPv4 packet. Which three are characteristics
of IPv6? (Select three)

A. An IPv6 header contains the next header field.


B. An IPv6 header contains the protocol field.
C. An IPv6 header contains the header checksum field.
D. An IPv6 address is 128 bits long.
E. An IPv6 header is 20 bits long.
F. IPv6 routers send RA messages.

Answer: A, D, F

Question: 91
Hosts on the Certidea LAN are IPv6 enabled. When an IPv6 enabled host boots, it sends a
router solicitation (RS) message to the Certidea router. This IPv6 router responds with a
router advertisement (RA). Which two items are contained in the RA? (Select two)

A. Any route advertisements it has received


B. Request for the local host IP address
C. Keepalive timers
D. Prefixes for the link
E. Lifetime of the prefix
F. IPv6 address for the host

Answer: D, E

Question: 92
The Certidea network is in the process of migrating the IP address scheme to use IPv6.
Which of the following address types are associated with IPv6? (Select three)

A. Unicast
B. Private
C. Broadcast
D. Public
E. Multicast
F. Anycast

Answer: A, E, F

Question: 93

Lead your way to certificates!


You wish to represent some IPv6 networks in a shorter form. What number is a valid
representation for the 200F:0000:AB00:0000:0000:0000:0000/56 IPv6 prefix?

A. 200F:0:0:AB/56
B. 200F:0:AB00::/56
C. 200F::AB00/56
D. 200F:AB/56
E. None of the other alternatives apply

Answer: B

Question: 94
What is the IPv6 address FF02:2 used for within the Certidea IP Version 6 network?

A. All hosts in a particular multicast group


B. All routers in an autonomous system
C. All routers in a local segment
D. All host in a local segment
E. None of the other alternatives apply

Answer: C

Question: 95
The Certidea network is migrating to IP version 6. Which two statements are correct regarding
the IPv6 addressing structure? (Select two)

A. An IPv6 interface can have multiple anycast addresses assigned to it.


B. All IPv6 interfaces have a link-local address.
C. An IPv6 interface can have only one unicast, anycast, and multicast address.
D. IPv6 interfaces can only have one local and one global address.

Answer: A, B

Question: 96
What are two rules for compacting IPv6 addresses? (Choose two)

A. Every 16-bit segment segment that consists of all zeroes can be represented with a single
colon.
B. The trailing zeroes in any 16-bit segment do not have to be written.
C. The leading zeroes in any 16-bit segment do not have to be written.
D. Any single, continuous string of one or more 16-bit segments that consists of all zeroes
can be represented with a double colon.
E. The maximum number of times a double colon can replace a 16-bit segment that consists
of all zeroes is two.

Lead your way to certificates!


F. Two zeroes in the middle of any 16-bit segment do not have to be written.

Answer: C, D

Question: 97
In the context of IP version 6, what is router solicitation?

A. A request made by a node to join a specified multicast group


B. A request made by a node for its IP address
C. A request made by a node for the IP address of the DHCP server
D. A request made by a node for the IP address of the local router
E. None of the other alternatives apply

Answer: D

Question: 98
You need to explain the differences between an IPv4 header and an IPv6 headr. In this
comparison, which three statements are true? (Choose three)

A. An IPv6 header is half the size of an IPv4 header.


B. An IPv4 header includes a checksum. However, an IPv6 header does not include one.
C. A router has to recompute the checksum of an IPv6 packet when decrementing the TTL.
D. An IPv6 header is simpler and more efficient than an IPv4 header.
E. The 128-bit IPv6 address makes the IPv6 header more complicated than an IPv4 header.
F. An IPv6 header has twice as many octets as an IPv4 header.

Answer: B, D, F

Question: 99
From the following list, which statement is true about IPv6?

A. Only one IPv6 address can be assigned to each interface.


B. IPv6 hosts use anycast addresses to assign IP addresses to interfaces.
C. Each host can autoconfigure its address without the aid of a DHCP server.
D. Only one IPv6 address is assigned per node.
E. None of the other alternatives apply

Answer: C

Question: 100
IPv6 has been implemented on the Certidea WAN. Which address type does the IPv6
address FF05:0:0:0:0:0:0:2 specify?

A. Site local unicast

Lead your way to certificates!


B. Multicast
C. Link local
D. Aggregable global unicast
E. Unspecified
F. None of the other alternatives apply

Answer: B

Question: 101
Certidea has migrated to IPv6 in their network. Which three IPv6 notations represent the
same address? (Select three)

A. 2031::130F::9C0:876A:130B
B. 2031:0000:130F:0000:0000:09C0:876A:130B
C. 2031:0:130F:::9C0:876A:130B
D. 2031::130F:0::9C0:876A:130B
E. 2031:0:130F:0:0:09C0:876A:130B
F. 2031:0:130F::9C0:876A:130B

Answer: B, E, F

Question: 102
You need to design an addressing scheme for the Certidea IPv6 network. What is the
difference between the IPv6 addresses ::/0 and ::/128?

A. ::/0 is the unspecified address, and ::/128 is the multicast address.


B. ::/0 is the unicast address, and ::/128 is the multicast address.
C. ::/0 is the anycast address, and ::/128 is the multicast address.
D. ::/0 is the default route, and ::/128 is the unspecified address.
E. ::/0 is the unicast address, and ::/128 is the anycast address.
F. ::/0 is the anycast address, and ::/128 is the default address.
G. None of the other alternatives apply

Answer: D

Question: 103
Which command must be globally enabled on router CK 1 to support IPv6?

A. ip routing ipv6
B. ipv6 unicast-routing
C. ipv6 routing
D. ip classless
E. ipv6 cef

Lead your way to certificates!


Answer: B

Question: 104
You have been tasked with setting up OSPF on an existing Certidea router using IPv6. Which
command enables OSPF for IPv6 on a router?

A. ipv6 router ospf process-id


B. router ospf process-id
C. router ospf ipv6 process-id
D. ipv6 ospf process-id area-id
E. None of the other alternatives apply

Answer: A

Question: 105
The command “ipv6 ospf 1 area 0” was issued on router CK 1. What is true about this
command?

A. It must be issued before the network command to enable the OSPF process for IPv6.
B. It must be issued after the network command to enable the OSPF process for IPv6.
C. It must be issued in router global configuration mode to enable the OSPF process for IPv6.
D. It must be issued in interface configuration mode to enable the OSPF process for IPv6.
E. None of the other alternatives apply

Answer: D

Question: 106
Certidea is in the process of migrating from IP version 4 to version 6. Which two statements
are true about using IPv4 and IPv6 simultaneously on a network segment? (Select two)

A. IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
B. Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.
Host configuration options for IPv6 can be statically assigned only.
C. IPv4 and IPv6 addresses can be simultaneously assigned to a host but not to a router
interface.
D. IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other
devices on a network configured via DHCP. IPv4 does not provide a similar capability for
hosts.
E. Hosts can be configured to receive both IPv4 and IPv6 addresses via DHCP.

Answer: D, E

Question: 107

Lead your way to certificates!


Certidea is migrating from IPv4 to IPv6. What happens when an IPv6 enabled router running
version 6 to 4 must send a packet to a remote destination and the next hop is the address of
2002::/16?

A. The IPv6 packet is encapsulated in an IPv4 packet using an IPv4 protocol type of 41.
B. The IPv6 packet has its header removed and replaced with an IPv4 header.
C. The IPv6 packet is dropped because that destination is unable to route IPv6 packets.
D. The packet is tagged with an IPv6 header and the IPv6 prefix is included.
E. None of the other alternatives apply

Answer: A

Question: 108
Certidea is implementing IPv6 within their network. Which two statements are true concerning
IPv6? (Select two)

A. Like IPv4, IPv6 broadcasts are sent to all nodes on a LAN segment.
B. Mobile IP is built into IPv6 by default.
C. The leading zeros in an address format are mandatory.
D. IPSec is mandatory and built into IPv6.

Answer: B, D

Question: 109
Certidea plans to migrate their network from IPv4 to IPv6 in the near future. Which three
techniques can be used to transition from IPv4 to IPv6? (Select three)

A. Dual stack
B. NAT
C. Flow label
D. Mobile IP
E. 6to4 tunneling
F. Anycast
G. MBGP

Answer: A, B, E

Question: 110
The Certidea network will use 6to4 tunneling to migrate from IPv4 to IPv6. Which statement is
true concerning 6to4 tunneling?

A. Hosts and routers inside a 6to4 site will need a special code.
B. An edge router must use IPv6 address of 2002::/16 in its prefix.
C. IPv4 traffic is encapsulated with an IPv6 header.

Lead your way to certificates!


D. The edge routers can use any locally configured IPv6 address.
E. None of the other alternatives apply

Answer: B

Question: 111
To enable BGP tunneling over the Certidea IPv4 backbone, the IPv4 address 192.168.30.1 is
converted into a valid IPv6 address. Which three IPv6 addresses are acceptable formats for
the IPv4 address? (Choose three.)

A. 192.168.30.1:0:0:0:0:0:0
B. 0:0:0:0:0:0:192.168.30.1
C. ::192.168.30.1
D. C0A8:1E01::
E. 192.168.30.1::
F. ::C0A8:1E01

Answer: B, C, F

Question: 112
Testking is using 6to4 tunneling within their IPv6 network. Which two statements about this
kind of tunneling are accurate? (Choose two)

A. 6to4 is a manual tunnel method.


B. Prepending a reserved IPv6 code to the hexadecimal representation of 192.168.0.1
facilitates 6to4 tunneling.
C. Each 6to4 site receives a /48 prefix in a 6to4 tunnel.
D. 2002::/48 is the address range specifically assigned to 6to4.
E. Prepending 0x2002 with the IPv4 address creates an IPv6 address that is used in 6to4
tunneling.

Answer: C, E

Question: 113
Certidea is using 6to4 tunnels in their IPv6 network. Which two statements are true about
these tunnels? (Choose two)

A. In a 6to4 tunnel, the first two bytes of the IPv6 address will be 0x2002 and the next four
bytes will be the hexadecimal equivalent of the IPv4 address.
B. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the
2002:1315:4463:1::/64 IPv6 address.
C. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the
2002:c0a8:6301::/48 IPv6 address.

Lead your way to certificates!


D. In a 6to4 tunnel, the first two bytes of the IPv6 address will be locally derived and the next
two bytes will be the hexadecimal equivalent of the IPv4 address.
E. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the
2002:c0a8:6301::/16 IPv6 address.

Answer: A,C

Question: 114
You need to determine the best tunneling method to use within your IPv6 netwoek. Which
statement best describes the difference between a manually configured IPv6 in IPv4 tunnel
versus an automatic 6to4 tunnel?

A. An automatic 6to4 tunnel does not require dual-stack (IPv4 and IPv6) routers at the tunnel
endpoints.
B. An automatic 6to4 tunnel allows multiple IPv4 destinations.
C. A manually configured IPv6 in IPv4 tunnel allows multiple IPv4 destinations.
D. A manually configured IPv6 in IPv4 tunnel does not require dual-stack (IPv4 and IPv6)
routers at the tunnel endpoints.
E. None of the other alternatives apply.

Answer: B

Question: 115
Which interface command on router CK 1 would provide IPv4-Compatible IPv6 tunnels within
the Certidea network?

A. tunnel mode ipv6ip isatap


B. tunnel mode ipv6ip
C. tunnel mode ipv6ip auto-tunnel
D. tunnel mode gre ipv6
E. tunnel mode ipv6ip 6to4
F. None of the other alternatives apply

Answer: E

Question: 116
The command “clear ipv6 ospf process” was issued on a Certidea router. What does this
command accomplish?

A. The route table is cleared. Then the OSPF neighbors are reformed.
B. The OSPF adjacencies are cleared and initiated again.
C. The OSPF database is repopulated and then the shortest path first (SPF) algorithm is
performed.
D. The shortest path first (SPF) algorithm is performed on the LSA database.

Lead your way to certificates!


E. None of the other alternatives apply

Answer: C

Question: 117
You are using multiple routing protocols in different Autonomous Systems (AS) within the
Certidea network domain. You need to redistribute between the systems. You are using two-
way redistribution but you want to ensure a loop free topology. Which action should help you
avoid routing loop issues?

A. Manually configuring the administrative K-factor


B. Manually configuring the administrative distance
C. Manually configuring the static routes
D. Manually configuring the default gateway
E. None of the other alternatives apply

Answer: B

Question: 118
The Certidea network is redistributing routing information from OSPF and EIGRP. Which
three steps are most helpful in verifying proper route redistribution? (Select three)

A. On the routers not performing the route redistribution, use the show ip route command to
see if the redistributed routes show up.
B. On the ASBR router performing the route redistribution, use the show ip protocol command
to verify the redistribution configurations
C. On the ASBR router performing the route redistribution, use the show ip route command to
verify that the proper routes from each routing protocol are there.
D. On the routers not performing the route redistribution, use the show ip protocols command
to verify the routing information sources.
E. On the routers not performing the route redistribution, use the debug ip routing command
to verify the routing updates from the ASBR.

Answer: A, B, C

Question: 119
Your network is running BGP as well as EIGRP. You are considering redistributing your BGP
routes into your EIGRP. What factors must you consider before redistributing BGP routes to
IGP?

A. IGPs are limited to 250 routes


B. A full BGP routing table may contain 100,000+ routes
C. Because of possible routing loops, Cisco router configuration does not allow BGP routes to
be redistributed into an IGP.

Lead your way to certificates!


D. Because BGP routes are not advertised unless they are known by the IGP, Cisco
automatically redistributes routes into BGP.
E. None of the other alternatives apply.

Answer: B

Question: 120
When you’re running an Interior Gateway Protocol (like OSPF or EIGRP); why would you
want to redistribute these routes into BGP?

A. So BGP can propagate this information to other IGP neighbors.


B. So BGP can propagate this information to other IBGP neighbors.
C. So BGP can propagate this information to other EBGP neighbors.
D. So BGP can propagate this information to other OSPF neighbors.
E. None of the other alternatives apply.

Answer: C

Question: 121
You need to implement route redistribution on a number of the Certidea OSPF routers. Which
three statements are true when configuring redistribution for OSPF? (Select three)

A. Subnets redistribute by default.


B. The default metric is 20.
C. The default metric is 10.
D. The default metric type is 1.
E. Subnets do not redistribute by default.
F. The default metric type is 2.

Answer: B, E, F

Question: 122
A Certidea OSPF router has been configured in the following manner:
router ospf 1
redistribute eigrp 1 metric 33 subnets
Based on this information, what function does the 33 parameter in the redistribute command
serve?

A. It specifies the metric cost to be applied to the redistributed routes.


B. It specifies the administrative distance on the redistributed routes.
C. It specifies the metric limit to 33 subnets in each OSPF route advertisement.
D. It specifies the process-id for the pseudo process that injects the EIGRP routes into OSPF.

Answer: A

Lead your way to certificates!


Question: 123
You are configuring redistribution to advertise EIGRP routes into OSPF on a boundary router.
Given the configuration:
router ospf 1
redistribute eigrp 1 metric 25 subnets
Which is the function of the “subnets” keyword in the redistribute command?

A. It specifies subnetted routes should be advertised into OSPF.


B. It specifies subnetted routes should be advertised out of OSPF.
C. It specified routes that will be summarized on the 25-bit boundary.
D. It specifies a limit of 25 subnets for each OSPF route advertisement.
E. None of the other alternatives apply.

Answer: A

Question: 124
The Certidea network is in the process of changing the routing protocol from EIGRP to OSPF,
as well as changing the IP network to the private 10.0.0.0/8 network. To do this, router CK 1
has been configured as shown below:
router ospf 100
redistribute eigrp 100 metric 100 metric-type 1
network 172.16.0 0.0.0.255.255
All other configurations use the default values.
You want to successfully redistribute all networks and subnets on the Certidea network. What
can you do to accomplish this goal? (Choose two)

A. Change the OSPF process-id number from 100 to 1 in the router ospf command.
B. Configure the redistribute command under router eigrp 1 instead.
C. Change the EIGRP AS number from 100 to 1 in the redistribute command.
D. Add the subnets option to the redistribute command.
E. Add the network 10.0.0.0 0.255.255.255 command under router ospf 100.
F. Change the metric to an EIGRP compatible metric value for Bandwidth, Delay, Reliability,
Load, MTU, (such as 64 1000 100 1 1500) in the redistribute command.

Answer: D, E

Question: 125
During a redistribution of routes from OSPF into EIGRP, the Certidea administrator notices
that none of the OSPF routes are showing up in EIGRP. What are two possible causes?
(Choose two.)

A. Incorrect distribute lists have been configured


B. Missing ip classless command

Lead your way to certificates!


C. CEF not enabled
D. No default metric configured for EIGRP

Answer: A, D

Question: 126
Certidea is implemting IPv6 into their existing IPv4 netwrok. Which statement is true about
incorporating IPv6 into an already existing IPv4 network?

A. Only OSPF version 3 can be utilized for routing IPv4 and IPv6.
B. IPv4 and IPv6 networks can be routed simultaneously.
C. IPv6 can be routed using the same routing protocol versions as IPv4
D. A router routing for IPv6 and IPv4 must convert IPv4 packets to IPv6 packets to route them.
E. None of the other alternatives apply

Answer: B

Question: 127
In this Certidea IPv6 network, an IPv6 overlay tunnel is required to communicate with isolated
IPv6 networks across the existing IPv4 infrastructure. There are currently five IPv6 overlay
tunnel types.
Which three IPv6 overlay tunnel statements are true? (Choose three)

A. Overlay tunnels can only be configured between border routers capable of supporting IPv4
and IPv6.
B. An manual overlay tunnel supports point-to-multipoint tunnels capable of carrying IPv6 and
Connectionless Network Service (CLNS) packets.
C. Overlay tunneling encapsulates IPv6 packets in IPv4 packets for delivery across an IPv4
infrastructure.
D. Overlay tunnels can be configured between border routers or between a border router and
a host capable of supporting IPv4 and IPv6.
E. Cisco IOS supports manual, generic routing encapsulation (GRE), IPv4-compatible, 6to4,
and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) overlay tunneling mechanisms.
F. Cisco IOS supports manual, generic routing encapsulation (GRE), IPv6-compatible, 4to6,
and Multiprotocol Label Switching (MPLS) overlay tunneling mechanisms.

Answer: C, D, E

Question: 128
The Certidea network administrator has configured more than one routing protocol within the
network domain. What two situations could require the use of multiple routing protocols in any
network? (Select two)

A. When there are multiple paths to destination networks.

Lead your way to certificates!


B. When using UNIX host-based routers.
C. When all equipment is manufactured by Cisco
D. When smaller broadcast domains are desired.
E. Because having multiple routing protocols confuses hackers
F. When migrating from an older Interior Gateway Protocol (IGP) to a new IGP

Answer: B, F

Question: 129
It isn’t always in your best interests to redistribute dynamically learned routes from an interior
gateway protocol to a border gateway protocol. Which of the following are potential issues
that can occur when doing so? (Select two)

A. Routing loops can occur.


B. The routes are automatically summarized.
C. External IGP learned routes might not necessarily have originated in this AS.
D. The BGP process will ignore the external IGP learned routes.

Answer: A, C

Question: 130
What’s the preferred method of route redistribution, when two routes of different protocols get
exchanged? (Select two)

A. Use one way route redistribution when there is one path.


B. Use one way route distribution when there are multiple paths.
C. Use static routes when there are multiple paths.
D. Use two way route distribution when there is one path.
E. Use two way route redistribution where there are multiple paths.
F. Use static routes when there is one path.

Answer: B, C

Question: 131
Router CK 1 has been configured to filter routes. Which of the following are reasons to control
routing updates via route filtering? (Choose three)

A. To hide certain networks from the rest of the organization.


B. For easier implementation.
C. To control network overhead on the wire.
D. For simple security.
E. To prevent adjacencies from forming.

Answer: A, C, D

Lead your way to certificates!


Question: 132
Router CK 4 is configured to filter some routes when advertising to its neighbors. Which
statement about route filtering is true when it is used to control routing updates?

A. Only inbound routes can be filtered.


B. Only outbound routes can be filtered.
C. Routes to be filtered are selected by using distribute lists.
D. Routes to be filtered are selected using only extended access lists.
E. Routes to be filtered are selected by using the distribute-group command.

Answer: C

Question: 133
You are a network analyst at Certidea and are currently in the process of analyzing two
autonomous systems, each running a different routing protocol, but connected between each
other with redundant paths. The junior administrator wants to prevent routing loops between
the two autonomous systems and asks you if there’s an IOS feature that could help him. How
would you answer?

A. Route filtering.
B. Passive interfaces.
C. Static redistribution.
D. Two-way redistribution.

Answer: A

Question: 134
Which one of the following BGP prefix lists would you use if you wanted to deny the default
route 0.0.0.0?

A. ip prefix-list abc deny 0.0.0.0/0


B. ip prefix-list abc permit 0.0.0.0/32
C. ip prefix-list abc deny 255.255.255.255/0
D. ip prefix-list abc permit 255.255.255.255/32
E. None of the other alternatives apply

Answer: A

Question: 135
Which of the following prefix-list statements would you enter if you wanted to permit all
prefixes that fall between /8 and /24 on the 192.0.0.0 network?

A. ip prefix-list abc permit 192.0.0.0/8 ge 8 le 24

Lead your way to certificates!


B. ip prefix-list abc permit 192.0.0.0/8 ge 24 le 8
C. ip prefix-list abc permit 192.0.0.0/24 ge 24 le 8
D. ip prefix-list abc permit 192.0.0.0/24 ge 8 le 24

Answer: A

Question: 136
You have a router that’s been configured with multiple IP routing protocols, and you’re
interested in checking out if and how inbound and outbound routing updates are being filtered.
Which one of the following commands would list these filters?

A. show ip
B. show ip route
C. show ip protocols
D. show ip interface
E. show protocol filters

Answer: C

Question: 137
What is the purpose of configuring the router as a PPPoE client?

A. for DSL connectivity and removing the need for the end-user PC to run the PPPoE client
software
B. for connecting the router to a cable modem, which bridges the Ethernet frames from the
router to the cable modem termination system
C. to enable PPP session from the router to the termination device at the headend for metro
Ethernet connectivity
D. to provide VPN access over L2TP

Answer: A

Question: 138
What is the international standard for transmitting data over a cable system?

A. PPPoE
B. AAL5
C. DOCSIS
D. CMTS
E. IPTV

Answer: C

Question: 139

Lead your way to certificates!


Which two methods use IPsec to provide secure connectivity from the Certidea branch office
to the main office? (Choose two.)

A. MPLS VPN
B. Virtual Tunnel Interface (VTI)
C. PPPoE
D. DMVPN
E. SSL VPN
F. PPPoA

Answer: B, D

Question: 140
What is a key benefit of using a GRE tunnel to provide connectivity between branch offices
and headquarters?

A. open standard
B. less overhead
C. scalability
D. granular QoS support
E. authentication, integrity checking, and confidentiality
F. dynamic routing over the tunnel

Answer: F

Question: 141
Which of the following can you do to express an IPv6 address as efficiently as possible?
(Select 2 choices.)

A. Replace every four-character group of zeros with double colons.


B. Remove leading and trailing zeros from each four-character group.
C. Remove only leading zeros from each four-character group.
D. Remove only trailing zeros from each four-character group.
E. Replace only one four-character group of zeros with a double colon.
F. Replace one or more contiguous four-character groups of zeros with a double colon.

Answer: C, F

Question: 142
Which of the following statements are correct regarding EIGRP queries? (Select 2 choices.)

A. EIGRP queries cannot propagate across autonomous systems.


B. EIGRP queries require replies before the network will converge.
C. EIGRP queries can be contained by disabling route summarization.

Lead your way to certificates!


D. EIGRP queries can be contained by creating stub routers.
E. EIGRP queries prevent routers from becoming SIA.

Answer: B, D

Question: 143
Which of the following codes from the output of the show ip route command indicates that the
route is a default route? (Select the best answer.)

A. EX
B. *
C. D
D. S

Answer: B

Question: 144
Which of the following ICMPv6 message types is used to query for the Layer 2 address of a
host? (Select the best answer.)

A. outer solicitation
B. neighbor solicitation
C. router advertisement
D. neighbor advertisement

Answer: B

Question: 145
Which of the following must match for two directly connected routers running OSPF to
establish a neighbor adjacency? (Select 2 choices.)

A. area IDs
B. process IDs
C. router IDs
D. hello timers

Answer: A, D

Question: 146
Which of the following could you do so that the routers can share redistributed routes? (Select
2 choices.)

A. Change the EIGRP router ID by issuing the eigrp router-id 1.2.3.4 command on either
router.

Lead your way to certificates!


B. Change the loopback1 IP address by issuing the ip address 1.2.3.4 255.255.255.255
command for the loopback1 interface on either router.
C. Change the secondary IP address by issuing the ip address 172.16.2.2 255.255.255.0
secondary command for the Fa0/1 interface on RouterB.
D. Change the loopback0 IP address by issuing the ip address 1.2.3.4 255.255.255.255
command for the loopback0 interface on either router.
E. Create a different EIGRP AS by issuing the router eigrp 2 command on either router.

Answer: A, B

Question: 147
What administrative distance is assigned to external BGP routes by default? (Select the best
answer.)

A. 5
B. 1
C. 170
D. 200
E. 20
F. 90

Answer: E

Question: 148
Which of the following statements is correct regarding EIGRP manual summarization? (Select
the best answer.)

A. Manual summarization is configured in interface configuration mode.


B. Manual summarization must occur on classful bit boundaries.
C. Manual summarization is enabled by issuing the no ip summary-address eigrp command.
D. Manual summarization is configured in global configuration mode.
E. Manual summarization is enabled by issuing the no auto-summary command.

Answer: A

Question: 149
Which of the following configurations is consistent with this routing protocol behavior? (Select
the best answer.)

A. Area 2 is a stub area, and Area 3 is an NSSA.


B. Area 2 is a stub area, and Area 3 is a normal area.
C. Area 2 is a normal area, and Area 3 is a stub area.
D. Area 2 is an NSSA, and Area 3 is a stub area.

Lead your way to certificates!


Answer: D

Question: 150
You configure the routers on your network for OSPF operation. You want to configure the
network type so that all routers will automatically establish adjacencies with neighbor routers
without requiring the manual configuration of neighbor commands. Additionally, you want DR
elections to take place.
Which of the following commands should you issue in interface configuration mode? (Select
the best answer.)

A. ip ospf network non-broadcast


B. ip ospf network point-to-multipoint non-broadcast
C. ip ospf network point-to-point
D. ip ospf network point-to-multipoint
E. ip ospf network broadcast

Answer: E

Question: 151
Look at the following configuration below and select the statements that are true.
RD2(config)#router ospf 100
RD2(config-router)# distance 180 10.1.10.1 0.0.0.0 match-me
RD2(config-router)#!
RD2(config-router)#ip access-list standard match-me
RD2(config-std-nacl)# permit host 172.16.0.0
Choose two.

A. OSPF will have an AD of 180 for routes from 10.1.10.1 in the 172.16.0.0/16 range.
B. The neighbor RID is 10.1.10.1
C. OSPF will have an AD of 180 for all routes.
D. The local RID is 10.1.10.1

Answer: A, B

Question: 152
What will the AS Path look like to BGP speaking routers in AS 65101 to reach AS Path 65401?
Choose the best answer.

A. AS 65102 65300 65301 65401


B. AS 65101 65102 65300 65301 65401
C. AS 65102 65301 65401
D. AS 65101 65102 65301 65401

Answer: C

Lead your way to certificates!


Question: 153
Which IOS show command gives you the following SLA tracking information output to the
screen as shown below:
Track 1
Interface Serial0/1/0 ip routing
IP routing is Up
27 changes, last change 00:03:37
Tracked by:
1207165940
Choose the best answer.

A. show ip sla statistics


B. show track
C. show interfaces dampening
D. show ip sla

Answer: B

Question: 154
When configuring EIGRP on new WAN technologies such as an MPLS VPN or Metro
Ethernet, it is important that an engineer understand what layer of the OSI model these
technologies function on to determine how EIGRP will form neighbor relationships. From the
choices below, choose the proper OSIlayer each WAN technology runs on. Choose two.

A. MPLS VPN is a layer 2 technology


B. Metro Ethernet is a layer 2 technology
C. MPLS VPN is a layer 3 technology
D. Metro Ethernet is a layer 3 technology
E. MPLS VPN is a layer 4 technology

Answer: B, C

Question: 155
A router has been configured with OSPF authentication on interface fa0/0. The OSPF
neighbor relationship is not forming. You issue a "debug ip ospf events" command and see
the following log message: 05:01:35: OSPF:
Rcv pkt from 192.168.2.2, OSPF_VL0 : Mismatch Authentication type. Input packet specified
type 0, we use type 1 Using this information, which of the following is true?
Choose the best answer.

A. Fa0/0 on the local router has the following configuration.


ip ospf authentication type-1
B. Fa0/0 on the local router has the following configuration.

Lead your way to certificates!


ip ospf authentication
C. Fa0/0 on the local router has the following configuration.
ip ospf authentication null
D. Fa0/0 on the local router has the following configuration.
ip ospf authentication message-digest

Answer: B

Question: 156
Which of the following commands correctly configures an IPv6 address on an interface and
sets it to operate using RIPng with the name CCNP-lab?
Choose the best answer.

A. Router(Config-if)# interface FastEthernet0/0


Router(Config-if)# ipv6 address 2011::1/64
Router(Config-if)# ipv6 rip CCNP-lab
B. Router(Config)# interface FastEthernet0/0
Router(Config-if)# ipv6 address 2011::1/64
Router(Config-if)# ipv6 rip CCNP-lab enable
C. Router(Config-if)# interface FastEthernet0/0
Router(Config-if)# ipv6 address 2011::1/64
D. Router(Config)# interface FastEthernet0/0
Router(Config-if)# ipv6 address 2011::1/64
Router(Config-if)# ip ripng CCNP-lab enable

Answer: B

Question: 157
An engineer wants to redistribute OSPF into EIGRP. They log in to the boarder router that
runs bothSPF and EIGRP and execute the following commands:
Router(config)#router eigrp 100
Router(config-router)#redistribute ospf 2
Router(config-router)#end
Router#
Unfortunately, this did not cause OSPF routes to redistribute into EIGRP. What is likely the
problem?
Choose two.

A. EIGRP needs to be configured with default metric values before it will redistribute OSPF.
B. OSPF cannot be redistributed into EIGRP.
C. OSPF must first be redistributed into static routes prior to being redistributed into EIGRP.
D. The OSPF process ID is something other than 2.

Answer: A, D

Lead your way to certificates!


Question: 158
When a router analyzes the OSPF LSDB to calculate the best route to each subnet for
internal routes, it does the calculations in a specific order. Which answer below puts the
calculations in the correct order of operation?
Choose the best answer.

A. 1. Calculates the OSPF interface costs for all outgoing interfaces in each route, picking the
lowest total cost route for each subnet as the best route.
2. Finds all subnets inside the area, based on the stub interfaces listed in the Type 1 LSAs
and based on any Type 2 network LSAs.
3. Runs SPF to find all possible paths through the area's topology, from itself to each subnet.
B. 1. Finds all subnets inside the area, based on the stub interfaces listed in the Type 1 LSAs
and based on any Type 2 network LSAs.
2. Runs SPF to find all possible paths through the area's topology, from itself to each subnet.
3. Calculates the OSPF interface costs for all outgoing interfaces in each route, picking the
lowest total cost route for each subnet as the best route.
C. 1. Finds all subnets inside the area, based on the stub interfaces listed in the Type 1 LSAs
and based on any Type 2 network LSAs.
2. Calculates the OSPF interface costs for all outgoing interfaces in each route, picking the
lowest total cost route for each subnet as the best route.
3. Runs SPF to find all possible paths through the area's topology, from itself to each subnet.
D. 1. Runs SPF to find all possible paths through the area's topology, from itself to each
subnet.
2. Finds all subnets inside the area, based on the stub interfaces listed in the Type 1 LSAs
and based on any Type 2 network LSAs.
3. Calculates the OSPF interface costs for all outgoing interfaces in each route, picking the
lowest total cost route for each subnet as the best route.

Answer: Pending.

Question: 159
An engineer is trying to summarize the following networks using the "ip summary-addres
eigrp" command:
10.8.88.0/25
10.8.89.48/29
10.8.64.96/27
Which network and subnet mask below would be the smallest EIGRP summary address to
include all three subnets?
Choose the best answer.

A. 10.8.64.0 255.255.224.0
B. 10.8.64.0 255.255.128.0
C. 10.8.64.0 255.255.192.0

Lead your way to certificates!


D. 10.8.0.0 255.255.192.0

Answer: A

Question: 160
Which of the following routing protocols are supported by the Enhanced Internet Gateway
Routing Protocol (EIGRP)?
Each correct answer represents a complete solution. Choose all that apply.

A. Border Gateway Protocol


B. AppleTalk routing protocol
C. Open Shortest Path First protocol
D. IPX routing protocols
E. IP routing protocols

Answer: B, D, E

Question: 161
Which of the following features belong to the Generic Routing Encapsulation (GRE) tunneling
protocol?
Each correct answer represents a complete solution. Choose all that apply.

A. GRE provides explicit protection against recursive encapsulation.


B. GRE tunnels are designed to be completely stateful.
C. GRE provides implicit protection against recursive encapsulation.
D. GRE supports multiprotocol tunneling.
E. GRE is used for creating a virtual point-to-point link.
F. GRE tunnels are designed to be completely stateless.

Answer: A, B, D, E, F

Question: 162
How many metrics are associated with EIGRP for each route?

A. 3
B. 4
C. 7
D. 5

Answer: D

Question: 163
Which of the following protocols is used in large networks working as service providers?

Lead your way to certificates!


A. Intermediate System-to-Intermediate System protocol (IS-IS)
B. Enhanced Interior Gateway Routing protocol (EIGRP)
C. External Border Gateway protocol (eBGP)
D. Open Shortest Path First protocol (OSPF)

Answer: A

Question: 164
Certidea uses EIGRP as the primary routing protocol in their network. How does EIGRP
advertise subnet masks for each destination network?

A. EIGRP advertises a fixed length subnet mask for each destination network.
B. EIGRP advertises only a classful subnet mask for each destination network.
C. EIGRP, like IGRP and RIP, does not advertise a subnet mask for each destination network.
D. EIGRP advertises a prefix length for each destination network.
E. None of the other alternatives apply

Answer: D

Question: 165
The Certidea network uses EIGRP. Identify three characteristics of EIGRP feasible successors?
(Select three)

A. Traffic will be load balanced between feasible successors with the same advertised distance.
B. If the advertised distance of the non-successor route is less than the feasible distance of
best route, then that route is identified as a feasible successor.
C. If the successor becomes unavailable, then the feasible successor can be used immediately
without recalculating for a lost route.
D. The feasible successor can be found in the routing table.
E. A feasible successor is selected by comparing the advertised distance of a non-successor
route to the feasible distance of the best route.

Answer: B, C, E

Question: 166
The following command was issued on router Certidea2:

Given the above output shown above, which statement is true?

Lead your way to certificates!


A. 192.168.1.0 is a redistributed route into EIGRP.
B. 192.168.1.0 is a summarized route.
C. 192.168.1.0 is a static route.
D. 192.168.1.0 is equal path load balancing with 172.16.1.0.
E. None of the other alternatives apply

Answer: A

Question: 167
A network administrator is troubleshooting an EIGRP connection between router Certidea1
with IP address 10.1.2.1 and Certidea2 with IP address 10.1.2.2. Given the debug output on
Certidea1 shown below, which two statements are true? (Select 2)

A. Certidea1 received a hello packet with mismatched hello timers.


B. Certidea1 will form an adjacency with Certidea2.
C. Certidea1 received a hello packet with mismatched metric-calculation mechanisms.
D. Certidea1 received a hello packet with mismatched autonomous system numbers.
E. Certidea1 received a hello packet with mismatched authentication parameters.
F. Certidea1 will not form an adjacency with Certidea2.

Answer: C, F

Question: 168
Study the exhibit below carefully:

If the configuration shown below is added to Certidea1, which three route entries will EIGRP
advertise to neighboring routers? (Select three)

router eigrp 10
network 10.0.0.0

Lead your way to certificates!


eigrp stub

A. 192.168.20.0/24
B. 10.1.2.0/24
C. 10.1.1.0/24
D. 10.1.3.0/24
E. 10.0.0.0/8

Answer: C, D, E

Question: 169
Two Certidea routers are connected together as shown below:

Certidea1 configuration exhibit:

Certidea2# configuration exhibit:

Lead your way to certificates!


Study the exhibits carefully. EIGRP has been configured on routers Certidea1 and Certidea2.
However, Certidea1 does not show Certidea2 as a neighbor and does not accept routing
updates from
Certidea2. What could be the cause of the problem?

A. The “no auto-summary command” has not been issued under the EIGRP process on both
routers.
B. EIGRP cannot form neighbor relationship and exchange routing updates with a secondary
address.
C. EIGRP cannot exchange routing updates with a neighbor's router interface that is
configured with two IP addresses.
D. Interface E0 on router Certidea1 has not been configured with a secondary IP address of
10.1.2.1/24.
E. None of the other alternatives apply

Answer: B

Question: 170
The Certidea network is shown below, along with the relevant router configurations:

CK1# show run

Lead your way to certificates!


interface Loopback0
ip address 10.10.10.1 255.255.255.0!
!
interface Ethernet0
ip address 172.29.1.1 255.255.255.0
media-type 10BaseT
!
!
router eigrp 999
redistribute connected
network 172.29.0.0
auto-summary
no eigrp log-neighbor-changes
!
ip classless
no ip http server
CK2# show run
interface Ethernet0
ip address 172.29.1.2 255.255.255.0
media-type 10BaseT
!
interface Ethernet1
ip address 172.19.2.2 255.255.255.0
media-type 10BaseT
!
router eigrp 999
network 172.19.0.0
network 172.29.0.0
!
ip classless
no ip http server
CK3# show run
interface Ethernet1/0
ip address 172.19.2.3 255.255.255.0
!
router eigrp 999
network 172.19.0.0
auto-summary
no eigrp log-neighbor-changes
!
ip classless
ip http server
With the topology found in the graphic, what will the CK1 loopback 0 be in the CK3 routing
table?

Lead your way to certificates!


A. It will show up in the routing table as D 10.0.0/8.
B. It will show up in the routing table as D EX 10.0.0.0/8.
C. It will show up in the routing table as D 10.0.0./24.
D. It will not show up in CK3 routing table because there is no network command on CK1.

Answer: B

Question: 171
The Certidea EIGRP network is displayed in the following topology diagram:

You work as a network technician at Certidea.com. Study the exhibits carefully. If the command
“variance 3” was added to the EIGRP configuration of Certidea5, which path or paths would be
chosen to route traffic from Certidea5 to network X?

A. Certidea5-Certidea2-Certidea1
B. Certidea5-Certidea2-Certidea1 and Certidea5-Certidea3-Certidea1.
C. Certidea5-Certidea3-Certidea1 and Certidea5-Certidea4-Certidea1.
D. Certidea5-Certidea2-Certidea1,Certidea5-Certidea3-Certidea1, and Certidea5-Certidea4-
Certidea1.

Answer: B

Question: 172
The Certidea EIGRP network is shown below:

Lead your way to certificates!


In this network, router Certidea5 is configured with the EIGRP “variance 2” command. What
path will Router Certidea5 take to reach Router Certidea1?

A. Both Certidea5-Certidea2-TestKin1 and Certidea5-Certidea4-Certidea1


B. Only Certidea5-Certidea2-Certidea1
C. Only Certidea5-Certidea3-Certidea1
D. All available paths.
E. Only Certidea5-Certidea4-Certidea1
F. Both Certidea5-Certidea2-Certidea1 and Certidea5-Certidea3-Certidea1
G. None of the other alternatives apply

Answer: F

Question: 173
The Certidea multi-protocol WAN is shown below:

In this network, routers Certidea2, Certidea3, Certidea4, and Certidea5 have OSPF enabled.
What should be configured on the routers in area 1 to ensure that all default summary routes

Lead your way to certificates!


and redistributed EIGRP routes will be forwarded from Certidea6 to area 1, and only a default
route for all other OSPF routes will be forwarded from Certidea5 to area 1.

A. Certidea5(config-router)# area 1 nssa no-summary


Certidea6(config-router)# area 1 nssa
B. Certidea5(config-router)# area 1 stub no-summary
Certidea6(config-router)# area 1 stub
C. Certidea5(config-router)# area 1 nssa
Certidea6(config-router)# area 1 nssa
D. Certidea5(config-router)# area 1 stub
Certidea6(config-router)# area 1 stub

Answer: A

Question: 174
The following output was seen on router Certidea1:

Based on the output shown above, which of the following statements is true?

A. A default route is configured on the local router.


B. OSPF router 5.0.0.2 is an ABR.
C. The default route is learned from an OSPF neighbor.
D. Network 6.0.0.0/8 was learned from an OSPF neighbor within the area.
E. None of the other alternatives apply.

Answer: B

Question: 175
The Certidea OSPF network is shown in the following exhibit:

Lead your way to certificates!


Certidea4 configuration exhibit:

Study the exhibits shown above carefully. All routers have simultaneously been reloaded and
the DR election has concluded as expected. On Certidea4, what state is router Certidea2 in?

A. 2WAY/BDR
B. FULL/BDR
C. 2WAY/DROTHER
D. 2WAY/DR
E. FULL/DROTHER
F. FULL/DR
G. None of the other alternatives apply

Answer: E

Question: 176
Exhibit:

Lead your way to certificates!


You work as a network technician at Certidea.com. You trainee Tess King shows you the IOS
command output displayed in the exhibit. What command did Tess use to produce this output?

A. show ip RIP
B. show ipv6 ospf
C. show ip ospf
D. show ip ospf interface
E. show ipv6 ospf interface
F. show ipv4 ospf
G. None of the other alternatives apply

Answer: B

Question: 177
Routers Certidea1, Certidea2, and Certidea3 are part of OSPF area 100 as shown below:

Lead your way to certificates!


In the Certidea network shown above, router Certidea 1 was elected the DR and Certidea 2
was elected the BDR. Assume that Certidea 1 fails, and that Certidea 2 takes the place of the
DR while Certidea 3 becomes the new BDR. What will happen when Certidea 1 comes back
online?

A. Certidea 1 will take the place of DR immediately upon establishing its adjacencies.
B. Certidea 1 will take the place of DR only if Certidea 2 fails.
C. Certidea 1 will take the place of DR only if both Certidea 2 and Certidea 3 fail.
D. A new election will take place establishing an all new DR and BDR based on configured
priority levels an MAC addresses.

Answer: C

Question: 178
The Certidea OSPF network is shown in the diagram below:

Lead your way to certificates!


Which type of Link State Announcement will TestkingE use to announce changes in network 22
to Area 1?

A. Type 1 LSA
B. Type 2 LSA
C. Type 3 LSA
D. Type 4 LSA
E. Type 5 LSA

Answer: E

Question: 179
The Certidea BGP network is shown below:

Lead your way to certificates!


By default, when Certidea2 passes BGP advertisements from Certidea1 about network
192.168.2.0 to Certidea3, what address will be listed as the next-hop address?

A. 10.1.1.2
B. 10.1.1.1
C. 192.168.1.49
D. 192.168.1.50
E. None of the other alternatives apply

Answer: D

Question: 180
The Certidea network is displayed in the following diagram:

On the assumption that there is no IGP running in AS 64700 and synchronization is OFF, which
router in AS 64700 is going to advertise the route to 183.32.0.0?

A. CK2 only

Lead your way to certificates!


B. CK5 only
C. CK2 and CK5 only
D. CK2, CK3, and CK4 only
E. CK2, CK3, CK4, and CK5

Answer: A

Question: 181
The Certidea BGP network is shown in the diagram below:

Router CK1 receives BGP routing advertisements from router CK2 about the network
165.50.0.0. By default, what is the value of the next hop attribute in this multi-access network?

A. 40.1.1.1
B. 40.1.1.2
C. 40.1.1.3
D. Router CK1 does not accept the advertisement from Router CK2 because Router CK1 is
not peering with Router CK3 via BGP.
E. Router CK2 does not advertise network 165.50.0.0 to Router CK1 because the network is
not directly connected to Router CK2.

Answer: B

Question: 182
Observe the diagram shown below:

Lead your way to certificates!


In this network, Certidea3 is the hub router and Certidea1 and Certidea2 are the spokes. There
are no virtual circuits between the spoke locations. What is needed to successfully route traffic
to the 11.11.11.0/24 network from Certidea1?

A. The neighbor 10.10.10.1 next-hop-self command on Certidea2.


B. The neighbor 10.10.10.1 next-hop-self command on Certidea1.
C. The neighbor 10.10.10.1 next-hop-self command on Certidea3.
D. Nothing is required. This is the default behavior on this topology.
E. None of the other alternatives apply.

Answer: C

Question: 183
A Certidea BGP router is configured as shown below:

Lead your way to certificates!


Examine the above configuration. What does the route map named test accomplish in this
configuration?

A. It permits only the 10.0.0.0/8 prefix to be received from the 10.1.1.1 neighbor
B. It marks all prefixes received from the 10.1.1.1 neighbor with a MED of 200
C. It marks the 10.0.0.0/8 prefix received from the 10.1.1.1 neighbor with a MED of 200
D. It marks the 10.0.0.0/8 prefix advertised to the 10.1.1.1 neighbor with a MED of 200
E. It marks all prefixes advertised to the 10.1.1.1 neighbor with a MED of 200
F. It permits only the 10.0.0.0/8 prefix to be advertised to the 10.1.1.1 neighbor

Answer: D

Question: 184
Based on the “show ip bgp summary” output shown below on router Certidea1, which two
statements are true? (Select two)

A. The BGP session to the 10.2.2.2 neighbor is established.


B. The router is attempting to establish a BGP peering session with the 10.1.1.1 neighbor.
C. The router is attempting to establish a BGP peering session with the 10.2.2.2 neighbor.
D. The BGP session to the 10.3.3.3 neighbor is established.
E. The BGP session to the 10.1.1.1 neighbor is established.
F. The BGP session to the 10.3.3.3 neighbor is established, but the router has not received any
BGP routing updates from the 10.3.3.3 neighbor.

Answer: C, E

Question: 185
The “show ip bgp” command was issued on a Certidea router as shown below:

Based on the Certidea2 output, which statement is true?

A. The best path to reach the 192.168.11.0 prefix is via 10.200.200.11.


B. The 192.168.11.0 and 192.168.12.0 prefixes were learned via EBGP from the
10.200.200.11 and 10.200.200.12 EBGP neighbors.
C. The best path to reach the 192.168.11.0 prefix is via both 10.200.200.11 and 10.200.200.12;
BGP will automatically load balance between the two.

Lead your way to certificates!


D. The best path to reach the 192.168.11.0 prefix is via 10.200.200.12.
E. None of the other alternatives apply.

Answer: D

Question: 186
Network Topology Exhibit:

Certidea2 Exhibit:

Certidea3 Exhibit:

You work as a network engineer at Certidea.com. Study the exhibits carefully. BGP has been
configured on the Certidea routers in the network. However, the IBGP peers in autonomous

Lead your way to certificates!


system 65200 have not converged. In addition, this console message was generated on router
PASSUIDE2:

*Mar 1 03:09:07.729: %TCP-6-BADAUTH No MD5 digest from 10.10.23.2(179) to


10.10.23.3(11002)

On the basis of the information that is provided, what is the cause of the problem?

A. OSPF must be configured with the same MD5 authentication.


B. BGP authentication can be used on iBGP peers when the connection is configured between
the loopba interfaces.
C. BGP authentication can be used on eBGP peers only.
D. The password that is used for BGP authentication on both BGP peers in autonomous
system 65200 mu be the same.
E. None of the other alternatives apply

Answer: D

Question: 187
Exhibit:

You work as a network engineer at Certidea.com. You study the exhibit carefully. Which two
statements are correct? (Choose two.)

A. All the routes were redistributed into BGP from an IGP.


B. All the routes were originated by BGP with the network command.
C. All six routes will be installed in the routing table.
D. Four routes will be installed in the routing table.
E. Two routes will be installed in the routing table.

Answer: A, D

Question: 188
Exhibit:

Lead your way to certificates!


Above is the output from the “show ip bgp neighbors” command issued on router CK1. What is
line 21 stating about the BGP connection?

A. The number of consecutive TCP connections to the specified remote neighbor


B. The number of total TCP connections that the router has
C. The number of times the router has established a TCP connection
D. The number of neighbors that the router has
E. None of the other alternatives apply

Answer: C

Question: 189

Lead your way to certificates!


Certidea1 exhibit:

Certidea2 exhibit:

Certidea3 exhibit:

Certidea4 exhibit:

Lead your way to certificates!


Study the exhibits carefully. On the basis of the configuration that is provided, how would the
BGP updates that come from router Certidea1 be replicated inside autonomous system 65200?

A. All BGP updates that are received on router Certidea2 will be sent to routers Certidea3 and
Certidea4.
Routers Certidea3 and Certidea4 will then forward those BGP updates to router R5.
B. None of the BGP updates that are received on router Certidea2 will ever be received by
router Certidea5.
C. All BGP updates that are received on router Certidea2 will not be sent to routers Certidea3
and Certidea4.
D. All BGP updates that are received on router Certidea2 will be sent directly to router
Certidea5.
E. None of the other alternatives apply

Answer: B

Question: 190
Network Topology Exhibit:

Certidea2 Exhibit:

You work as a network engineer at Certidea.com. Study the exhibits carefully. What will
Certidea2 do with a packet sourced from within AS 64200 with a destination address of
192.168.25.1?

A. It will be forwarded to the Certidea2 192.168.25.0 network.


B. It will be dropped because network 192.168.25.0 is not in the Certidea1 routing table.
C. It will be dropped because network 192.168.25.0 is not in the Certidea2 routing table.

Lead your way to certificates!


D. It will be forwarded to the null 0 interface of Certidea2 and dropped.
E. None of the other alternatives apply

Answer: A

Question: 191
The Certidea WAN is shown below:

Based on the network above, if Certidea1 is configured for 6to4 tunneling, what will be the
prefix of its IPv6 network?

A. AC1F:6401::/32
B. 1723:1100:1::/48
C. FFFF:AC1F:6401::/16
D. 2002:AC1F:6401::/48
E. 3FFE:AC1F:6401::/32

Answer: D

Question: 192
A Certidea router is configured as shown below:

Lead your way to certificates!


Given the partial configuration shown above, which statement regarding IPv6 is true?

A. The configuration is an example of a 6to4 tunnel.


B. The configuration is an example of a 4to6 tunnel.
C. The configuration is an example of an encrypted IPv6 VPN tunnel.
D. The configuration is an example of a one to one IPv6 tunnel.
E. None of the other alternatives apply.

Answer: A

Question: 193
Exhibit:

The Certidea network is migrating to IPv6 and needs to maintain communication between the
IPv4 and IPv6 network segments. Based on the exhibit shown, which statement is correct
regarding the operation of NAT-PT between the IPv4 and IPv6 networks shown?

Lead your way to certificates!


A. ICMP can be used to determine the IPv6-toIPv4 address mapping.
B. The router will determine the IPv4 destination address.
C. The host is statically configured with the IPv6-to-IPv4 address mapping.
D. The source IPv6 host can use DNS to determine the IPv6-to-IPv4 address mapping.
E. None of the other alternatives apply.

Answer: D

Question: 194
The following output was seen on an existing Certidea router:

Based on the information shown above, what IOS command produces this output?

A. show ipv6 ospf interface


B. show ipv6 ospf
C. show ip ospf
D. show ip ospf interface
E. None of the other alternatives apply

Answer: B

Question: 195

Lead your way to certificates!


On the basis of the output shown on this Certidea router, which two statements are true?
(Select two)

A. The output was generated by the “show ip interface” command.


B. OSPF Version 2 has been enabled to support IPv6
C. This is the designated router (DR) on the FastEthernet 0/0 link.
D. Interface FastEthernet 0/0 was configured with the ipv6 ospf 1 area 1 command.
E. The router was configured with the commands:
F. router ospf 1
G. network 172.16.6.0 0.0.0.255 area 1
H. The IP address of the backup designated router (BDR) is FE80:205:5FFF:FED3:5808

Answer: D, F

Question: 196
Network Topology Exhibit:

Lead your way to certificates!


Lead your way to certificates!
Study the exhibits carefully. Routers Certidea1 and Certidea2 are IPv6 BGP peers that have
been configured to support a neighbor relationship over an IPv4 internetwork. Which three
neighbor IP addresses are valid choices to use in the highlighted section of the exhibit?
(Choose three)

A. ::0A43:0002
B. 0A43:0002::
C. 10.67.0.2::
D. 10.67.0.2:0:0:0:0:0:0
E. ::10.67.0.2
F. 0:0:0:0:0:0:10.67.0.2

Answer: A, E, F

Question: 197
You work as a network engineer at Certidea.com. You study the exhibit carefully. The 6to4
overlay tunnel configuration has been applied on each router to join isolated IPv6 networks
over a IPv4 network.
Which statements regarding the 6to4 overlay tunnel is true?

Certidea1 Exhibit:

Certidea2 exhibit:

Lead your way to certificates!


A. The least significant 32 bits in the address referenced by the ipv6 route 2002::/16 Tunnel0
command will correspond to the IPv4 address assigned to the tunnel source.
B. The least significant 32 bits in the address referenced by the ipv6 route 2002::/16 Tunnel0
command will correspond to the interface E0/0 IPv4 address.
C. This is actually a configuration example of an IPv4-compatible tunnel and not a 6to4 tunnel.
D. The configuration is invalid since the tunnel source command must be configured with an
IPv6 address.
E. This is actually a configuration example of an ISATAP overlay tunnel and not a 6to4 tunnel.

Answer: A

Question: 198
The Certidea WAN is displayed below:

Lead your way to certificates!


Based on the configuration shown above and the default behavior of the routing protocols,
which network will be present in the routing table of Certidea4?

A. Only networks belonging to EIGRP 100 will be present in the routing table of Certidea4.
B. Network B, which is redistributed using the redistribute statement under EIGRP 100.
C. Network A, which is automatically redistributed between two different EIGRP autonomous
systems.
D. Network A, which is automatically redistributed between two different EIGRP autonomous
systems and Network B which is redistributed using the redistribute statement.

Answer: A

Question: 199
A Certidea router is configured as shown below:

Lead your way to certificates!


Based on the output shown above, which three statements accurately describe the result of
applying the exhibited route map? (Select three)

A. The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric
values-40000, 1000, 255, 1, and 1500.
B. The map prohibits the redistribution of all type 2 external OSPF routes.
C. The map permits the redistribution of all type 1 external OSPF routes.
D. The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set.
E. The map prohibits the redistribution of all external OSPF routes with tag 6 set.
F. All routes that do no match clauses 10 and 20 of the route map are redistributed with their
tags set to 8.

Answer: C, D, F

Question: 200
Study the exhibit below carefully:

Lead your way to certificates!


Based on the network shown above, will redistributed RIP routes from OSPF Area 2 be
allowed in Area 1?

A. RIP routes will be allowed in Area 1 only if they are first redistributed into EIGRP.
B. Because Area 1 is an NSSA, redistributed RIP routes will not be allowed.
C. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 5
LSAs in Area 0 and passed on into Area 1.
D. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 7
LSAs in Area 0 and passed on into Area 1.
E. Because NSSA will discard type 7 LSAs, redistributed RIP routes will not be allowed in
Area 1.

Answer: B

Question: 201
The Certidea multi-protocol network is shown below:

Lead your way to certificates!


Configuration exhibit:

Refer to the exhibit and the partial configuration on router Certidea2. On router Certidea4 all
RIP routes are redistributed into the OSPF domain. A second redistribution is configured on
router Certidea2 using a route map. Based on the configuration on router Certidea2, which
EIGRP external routes will be present in the routing table of Certidea1?

A. The routes originating from the RIP routing domain


B. All OSPF inter and intra-area routes
C. The routes originating from the OSPF stub area
D. All routes originating from RIP and OSPF routing domains
E. None of the other alternatives apply

Answer: A

Question: 202
Router Certidea2 connects two different routing domains as shown below:

Certidea2 is configured as shown below:

During the redistribution process configured on Certidea2, some of the EIGRP routes, such
as 10.1.1.0/24 and 10.2.2.0/24, are not being redistributed into the OSPF routing domain.
Which two items could be a solution to this problem? (Select two)

Lead your way to certificates!


A. Change the EIGRP AS number from 100 to 1 in the redistribute command.
B. Configure the redistribute command under router eigrp 1 instead.
C. Change the metric-type to 2 in the redistribute command.
D. Change the metric to an EIGRP compatible metric value (bandwidth, delay, reliability, load,
MTUs) in the redistribute command.
E. Add the subnets option to the redistribute command.

Answer: A, E

Question: 203
The Certidea network administrator is troubleshooting a redistribution problem with RIP routes
into OSPF. Given the exhibited configuration commands shown below, which statement is
true?

A. Redistributed routes will maintain their original RIP routing metric.


B. Redistributed routes will have a default metric of 0 and will be treated as unreachable and
not advertised.
C. Redistributed routes will be tagged as external type 2 (E2) with a metric of 20.
D. Redistributed routes will be tagged as external type 1 (E1) with a metric of 30.
E. Redistributed routes will have a default metric of 0 but will not be treated as reachable and
will be advertised.
F. None of the other alternatives apply

Answer: C

Question: 204
The Certidea network administrator is troubleshooting a redistribution of OSPF routes into
EIGRP.
Given the exhibited commands shown below, which statement is true?

Lead your way to certificates!


A. Redistributed routes will have an external type of 2 and a metric of 20.
B. Redistributed routes will have a default metric of 0 but will be treated as unreachable and
not advertised.
C. Redistributed routes will maintain their original OSPF routing metric.
D. Redistributed routes will have a default metric of 0 and will be treated as reachable and
advertised.
E. Redistributed routes will have an external type of 1 and a metric of 1.
F. None of the other alternatives apply.

Answer: B

Question: 205
A policy needs to be implemented on Router Certidea2 so that any traffic sourced from
172.16.10.0/24 will be forwarded to Router Certidea3. Which configuration on Router
Certidea2 will achieve the desired effect?
Exhibit:

A.
access-list 1 permit 172.16.10.0 0.0.0.255
!
interface e0
ip policy route-map policy
!
route-map policy permit 10
match ip address 1
set ip next-hop 172.16.14.4
B.
access-list 1 permit 172.16.10.0 0.0.0.255
!
interface s0

Lead your way to certificates!


ip policy route-map policy
!
route-map policy permit 10
match ip address 1
set ip next-hop 172.16.12.3
C.
access-list 1 permit 172.16.10.0 0.0.0.255
!
!
interface e0
ip policy route-map policy
!
route-map policy permit 10
match ip address 1
set ip next-hop 172.16.12.2
D.
access-list 1 deny 172.16.10.0 0.0.0.255
!
interface s0
ip policy route-map policy
!
route-map policy permit 10
match ip address 1
set ip next-hop 172.16.12.2

Answer: B

Question: 206
The Certidea routed network is shown below:

Lead your way to certificates!


You work as a network technician at Certidea.com. Study the exhibits carefully. Both
Certidea5 and Certidea2 are performing two-way IGRP/RIP route redistribution.
What behavior will Certidea2 use with the given Certidea2 configurations?

A. Updates about 192.168.1.0 that are learned through RIP will be ignored.
B. Updates about 192.168.1.0 will be advertised out the s0 interface.
C. Updates about 192.168.1.0 that are heard through the s1 interface will be ignored.
D. Updates about 192.168.1.0 that are learned through IGRP will be added to the routing
table, but not advertised to Certidea1.

Lead your way to certificates!


Answer: C

Question: 207
The Certidea WAN is depicted below:

Certidea3 is redistributing the EIGRP routes into OSPF. What will the EIGRP routes appear in
the routing table of Certidea1?

A. O
B. O IA
C. O E2
D. D
E. D EX

Answer: C

Question: 208
The Certidea administrator is redistributing OSPF into RIP. RIP is routing the 128.103.36.0/24
network.
OSPF is routing the 128.103.35.32/28 network. Users in the RIP domain cannot reach
devices in the OSPF domain. Which two tasks must be done to enable RIP to advertise the
routes learned from OSPF into the RIP domain? (Choose two.)
Exhibit:

Lead your way to certificates!


A. Redistribute configured static routes into RIP.
B. Tune the OSPF default metrics to allow seamless redistribution into RIP.
C. Add a static route that points to the OSPF domain address space with a /24 network mask
with a next hop of null0.
D. Add a static route that points to the RIP domain address space with a /24 network mask
and a next hop of 128.103.36.2.
E. Use a route map statement inserted into a distribute list to control routing updates.

Answer: A, C

Question: 209
The Certidea WAN is shown in the following diagram:

Lead your way to certificates!


Exhibit, Router Configuration

Which command should be added to CertideaB under router bgp 100 to allow only the
external OSPF routes to be redistributed to CertideaC?

A. redistribute ospf 1
B. redistribute ospf 1 match external 1
C. redistribute ospf 1 match external 2
D. redistribute ospf 1 match external 1 external 2

Answer: D

Question: 210
The Certidea network is displayed below:

Lead your way to certificates!


Based on the exhibits above, which statement is true.

A. All routes matching access list 110 will be forwarded.


B. There is a set entry missing in the route-map REDIST-MAP deny 20 statement.
C. The set metric-type entry is not a valid route-map command.
D. There is a match entry missing in the route-map REDIST-MAP permit 30 statement.
E. All routes not matching access list 101 or 110 will be flagged as an OSPF external type 2
with a metric of 5000.
F. None of the other alternatives apply.

Answer: E

Question: 211
Two Certidea RIP routers are connected together as shown in the exhibit:

Lead your way to certificates!


Study the exhibit carefully. Which configuration command sequence would prevent the
propagation of updates for network 192.168.236.0/24 to the Certidea2 router?

A. Certidea2(config)# router rip


Certidea2(config-router)# passive-interface s0/0
B. Certidea2(config)# access-list 1 deny 192.168.236.0
Certidea2(config)# access-list 1 permit any
Certidea2(config)# router rip
Certidea2(config-router)# distribute-list 1 out serial 0/0
C. Certidea2(config)# access-list 1 deny 192.168.236.0
Certidea2(config)# access-list 1 permit any
Certidea2(config)# interface serial 0/0
Certidea2(config-if)# ip access-group 1 in
D. Certidea1(config)# router rip

Lead your way to certificates!


Certidea1(config-router)# passive-interface s0/0
E. Certidea1(config)# access-list 1 deny 192.168.236.0
Certidea1(config)# access-list 1 permit any
Certidea1(config)# interface serial 0/0
Certidea1(config-if)# ip access-group 1 out
F. Certidea1(config)# access-list 1 deny 192.168.236.0
Certidea1(config)# access-list 1 permit any
Certidea1(config)# router rip
Certidea1(config-router)# distribute-list 1 out serial 0/0
G. None of the answers are correct.

Answer: F

Question: 212
Study the exhibit below carefully. What is the correct configuration to enable router Certidea4
to exchange RIP routing updates with router Certidea1 but not with router Certidea3?

A. Certidea4(config)# router rip


Certidea4(config-router)# neighbor 192.168.10.3
Certidea4(config-router)# passive-interface fa0/0
B. Certidea4(config)# interface fa0/0
Certidea4(config-if)# neighbor 192.168.10.3
Certidea4(config-if)# passive-interface fa0/0
C. Certidea4(config)# router rip
Certidea4(config-router)# neighbor 192.168.10.34 no broadcast

Lead your way to certificates!


Certidea4(config-router)# passive-interface fa0/0
D. Certidea4(config)# interface fa0/0
Certidea4(config-if)# neighbor 192.168.10.3
Certidea4(config-if)# passive-interface 192.168.10.34

Answer: A

Question: 213
The Certidea WAN is shown below

Certidea1 configuration exhibit:

What are the effects of this RIP configuration on router Certidea1? (Select two)

A. User traffic from the 172.16.1.0 network is denied by access-list 44


B. No routing updates will be sent from router Certidea1 on interface BRI0 to router Certidea3
C. The routing table on router Certidea1 will be updated with the route to router Certidea4
D. The route to network 172.16.1.0 will not be entered into the routing table on router
Certidea1
E. Router Certidea1 will not advertise the 10.0.0.0 network to router Certidea3

Lead your way to certificates!


Answer: C, D

Question: 214
Two Certidea routers are connected as shown below:

Router certidea1 is configured as follows:


Hostname Certidea1
!
router **
version 2
network 10.0.0.0
dustribute-list 10 in Serial0
access-list 10 permit 10.0.0.0 0.0.255.255
Based on the information shown above, what is the effect of the “distribute-list” command in
the Certidea1 configuration?

A. Certidea1 will filter only the 172.24.1.0/24 route from the Certidea2 RIP updates.
B. Certidea1 will permit only the 10.0.0.0/24 route in the Certidea2 RIP updates.
C. Certidea1 will filter 10.1.0.0/24 and the 172.24.1.0/24 routes from the Certidea2 RIP
updates.
D. Certidea1 will not filter any routes because there is no exact prefix match.

Answer: C

Question: 215
Based on the partial configuration file of router Certidea, which statement is true?

A. Only traffic with a destination from 10.10.0.0/19 will be permitted.

Lead your way to certificates!


B. Router Certidea3 will accept only the 10.10.0.0/19 route from its BGP neighbor.
C. Only traffic going to 10.10.0.0/19 will be permitted.
D. Router Certidea3 will send only route 10.10.0.0/19 to its BGP neighbor.
E. None of the other alternatives apply

Answer: B

Question: 216
Network Topology Exhibit:

Exhibit:

Lead your way to certificates!


In this network, host CertideaA is a DNS server. Examine the Certidea1 configuration file. On
the basis of the information that is presented, which statement is true?

A. Route updates containing the DNS server address will be placed in the route table, but
traffic going to the DNS server will be denied.
B. Route updates containing the DNS server address will be denied placement in the route
table.
C. Route updates containing the DNS server address will be placed in the route table, but
traffic coming from the DNS server will be denied.
D. Traffic going to the DNS server will be blocked at the S0/0 interface on the router
Certidea1.
E. None of the other alternatives apply.

Answer: C

Question: 217
Network Topology Exhibit:

Lead your way to certificates!


Based on the information in the exhibit and the partial configuration file of Certidea2, which
statement is true?

A. Testking2 will not have the 10.0.0.0 network in its routing table.
B. Testking3 will not have the 192.168.10.0 network in its routing table.
C. Testking3 will be able to access the 10.0.0.0 network.
D. Testking3 will not have the 10.0.0.0 network in its routing table.
E. Testking2 and Testking3 will not have the 10.0.0.0 network in their routing tables.
F. None of the other alternatives apply

Answer: D

Question: 218
Part of the router configuration of Certidea2 is shown in the exhibit. The s0 interface connects
to the 192.168.5.0 network. Based on the information shown, select the correct statement.

A. Certidea2 will not advertise the 10.0.0.0/8 network because it is blocked by the ACL.
B. The 10.0.0.0/8 network will not be advertised by Certidea2 because the network statement
for the 10.0.0.0/8 network statement for the 10.0.0.0/8 network is missing from Certidea2.
C. Traffic from the 172.16.0.0/16 network will be blocked by the ACL.
D. Users on the 10.0.0.0/8 network can successfully ping users on the 192.168.5.0/24
network, but users on the 192.168.5.0/24 cannot successfully ping users on the 10.0.0.0/8
network.
E. The 10.0.0.0/8 network will not be in the routing table on Certidea2.
F. None of the other alternatives apply

Lead your way to certificates!


Answer: A

Question: 219
You as a network engineer for Certidea.com. You study the exhibits carefully. A new TAC
engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is
not coming up. What did the TAC engineer configure incorrectly?
Network Topology Exhibit:

A. The crypto map is not configured correctly.


B. The OSPF network is not configured correctly.
C. The crypto map is not applicd to the correct interface.
D. The crypto ACL is not configured correcrly.

Answer: D

Question: 220
The Certidea WAN is displayed in the following diagram:

Lead your way to certificates!


Traffic from Certidea4 to the Certidea Corporate Network is distributed between the links with
unequal costs in the EIGRP network by configuring the variance command on Certidea4 to 2.
How many paths will participate in the load sharing?

A. 1
B. 2
C. 3
D. 4
E. 5
F. 6

Answer: B

Question: 221
You work as a network engineer at Certidea.com. You study the exhibit carefully. Certidea1 and
Certidea2 are summarizing the 10.0.0.0/8 network and advertising it to all routers. Which two
EIGRP configurations will prevent unnecessary EIGRP updates from being sent and possibly
causing 10.0.0.0 from being SIA on router Certidea1 or Certidea2? (Select two)
Five Certidea routers are connected together as shown in the diagram below:

Lead your way to certificates!


A. Configure Certidea3, Certidea4, and Certidea5 as EIGRP stub routers.
B. Configure an ACL on the interface of Certidea1 and Certidea2.
C. Configure Certidea1 and Certidea2 as EIGRP stub routers.
D. Configure summary routes on Certidea1 and Certidea2
E. Configure static routing on Certidea3, Certidea4, and Certidea5

Answer: A, D

Question: 222
Router CK1 Exhibit:

Router CK1 is configured as shown in the exhibit. Based on the information shown, which two
statements are true about CK1’s configuration? (Select two)

A. This configuration is referred to as a stacker.


B. This configuration is referred to as a dual stack.
C. This configuration is referred to as a dual-stack 6to4 tunnel.
D. This configuration is referred to as a stacker 6to4 tunnel.
E. This configuration will attempt to route packets using IPv4 first, and if that fails, then IPv6.
F. The configuration allows applications on the same segment to communicate via IPv4 or
IPv6.

Lead your way to certificates!


Answer: B, F

Question: 223
The Certidea EIGRP network is displayed below:

Based on the network shown above, what optional EIGRP configuration statements will be
required to achieve full connectivity within AS 100?

A. Use the EIGRP “no auto-summary” command on Certidea1 and Certidea2.


B. Use the “passive interface” on the Certidea1 and Certidea2 interface that connects to the
10.1.1.0/24 and 10.1.2.0/24 subnet respectively.
C. Use the EIGRP “no auto-summary” command on Certidea3 and Certidea4.
D. Use the “passive interface” command between the Certidea3 and Certidea1 connection and
between the Certidea3 and Certidea2 connection.
E. Use the “variance” command on Certidea3.
F. None of the other alternatives apply.

Answer: A

Question: 224
Part of the routing table of router CK1 is displayed below:

Lead your way to certificates!


From analyzing the above command output, what is the administrative distance of the external
EIGRP routes?

A. 24
B. 32
C. 90
D. 170
E. 27316
F. None of the other alternatives apply

Answer: D

Question: 225
DRAG DROP
Match the correct EIGRP term on the left to the slot in the middle that is adjacent to the correct
description on the right.

A.
Neighbor table - lists adjacent routers

Lead your way to certificates!


Topology Table - route entries for all destinations.
Successor - primary route used to reach a destination
Routing table - best routes to a destination
Feasible successor - backup route to the destination.

Answer: A

Question: 226
DRAG DROP
Drag the OSPF LSA names to their appropriate places:

A.

Lead your way to certificates!


Answer: A

Question: 227
DRAG DROP
Drag the EIGRP packet names in their appropriate places:

A.

Lead your way to certificates!


Answer: A

Question: 228
DRAG DROP
IP tunneling is a method to encapsulate IP datagram within IP datagrams, which allows
datagrams intended for one IP address to be wrapped and redirected to another IP address.
IPv6 packets are encapsulated directly behind the IPv4 header. Drag the header fields to their
appropriate places:

A.

Lead your way to certificates!


Answer: A

Question: 229
DRAG DROP
A virtual private network (VPN) is a computer network that is layered on the top of an
underlying computer network. VPNs are of different technologies, such as Trusted VPNs,
Secure VPNs, and Hybrid VPNs, each having distinct requirements. Drag the various VPN
names to their appropriate places.

A.

Lead your way to certificates!


Answer: A

Question: 230
Layer 3 provides switching and routing technologies and Layer 4 is responsible for end-to end
error recovery and flow control. In the Tree View pane, place the protocols under their
appropriate layers.

A.

Lead your way to certificates!


Answer: A

Question: 231
Transmission of data can be done with the help of four methods: Unicast, Multicast,
Broadcast, and Anycast. In the Tree View pane, place the features of the transmission
methods to their appropriate places.

Lead your way to certificates!


A.

Answer: A

Question: 232
VPN supports three technologies: secure VPNs, trusted VPNs, and hybrid VPNs. In the Tree
View pane, place the VPN-supported technologies to their appropriate places.

Lead your way to certificates!


A.

Answer: A

Question: 233

Lead your way to certificates!


An IP address is an identifier for a computer system on a TCP/IP network. Networks using the
TCP/IP protocol route message based on the IP address of the destination. Ipv4 and Ipv6 are
the two versions of IP addressing. In the Tree View pane, place the appropriate addressing
features belonging to Ipv4 and Ipv6.

A.

Answer: A

Lead your way to certificates!


Question: 234
According to the case study, how should a retail outlet connect to the M2M.com’s
headquarters using a VPN connection?
(Click the Exhibit button on the toolbar to see the case study.)

Lead your way to certificates!


Lead your way to certificates!
A. Configure the Dial-up connection to ISP.

Lead your way to certificates!


Use PPTP to connect to the VPN Server.
B. Configure the Dial-up connection to the headquaters.
Use PPTP to connect to the VPN Server
C. Configure the Dial-up connection to ISP.
Use L2TP over IPSec to connect to the VPN Server.
D. Configure the Dial-up connection to the headquarters.
Use L2TP over IPSec to connect to the VPN Server.

Answer: A

Question: 235
Drag the OSPF LSA names to their appropriate places:

A.

Lead your way to certificates!


Answer: A

Question: 236
Fill in the blank with the appropriate term:
_____________is an enhanced BGP that transmits routing information for multiple network
layer protocol address families.

A. Multiprotocol BGP

Answer: A

Question: 237
Which of the following codes from the show ip eigrp topology command output indicates a
convergence problem for the associated network?

A. Update
B. Passive
C. SIA
D. Active

Answer: C

Question: 238
Which of the following commands can be used to check the valid times of the various keys
versus the router clocks in EIGRP?

A. show timer

Lead your way to certificates!


B. show time
C. show valid_time
D. show clock

Answer: D

Question: 239
Which of the following is not a Classless protocol?

A. EIGRP
B. RIP v2
C. OSPF
D. IGRP

Answer: D

Question: 240
Which of the following commands can be used to determine if both the EIGRP routers use the
same key values of currently valid keys?

A. show key chain


B. show valid key chain
C. show valid key
D. show key

Answer: A

Question: 241
Which of the following pairs of messages is used as a part of the topology data exchange
process in EIGRP?

A. Ack and Authentication


B. Update and Hello
C. Update and Ack
D. Hello and Authentication

Answer: C

Question: 242
Which of the following statements is TRUE about an EIGRP stub router?

A. It is a router that should not be used to forward datagrams between other routers.
B. It is a router that should be used to forward packets between other routers.
C. It is a router that should be used to forward datagrams between other routers.

Lead your way to certificates!


D. It is a router that should not be used to forward packets between other routers.

Answer: D

Question: 243
Which of the following show commands summarizes the number of EIGRP packets sent and
received?

A. show ip eigrp topology


B. show ip eigrp interface
C. show ip eigrp stats
D. show ip eigrp traffic

Answer: D

Question: 244
Which of the following statements is TRUE about the protocol-dependent modules used in
EIGRP?

A. They are used for application layer protocol-specific requirements.


B. They are used for session layer protocol-specific requirements.
C. They are used for network layer protocol-specific requirements.
D. They are used for transport layer protocol-specific requirements.

Answer: C

Question: 245
Which of the following EIGRP packets can be used to convey reachability of destinations?

A. Query packets
B. Hello packets
C. Acknowledgement packets
D. Update packets

Answer: D

Question: 246
Which of the following addresses is the default destination address of EIGRP?

A. 224.1.1.10
B. 224.0.0.10
C. 224.0.0.11
D. 224.0.0.0

Lead your way to certificates!


Answer: B

Question: 247
Which of the following EIGRP features is used to determine the time of failure of a
neighboring router?

A. Timer
B. Hello timer
C. Fail timer
D. Hold timer

Answer: D

Question: 248
Which of the following protocols does not support classless summarization?

A. IGRP
B. EIGRP
C. IS-IS
D. RIP

Answer: B

Question: 249
Which of the following is the correct syntax of debug commands in EIGRP?

A. Router-debug ip eigrp
B. Router*debug ip eigrp
C. Router#debug ip eigrp
D. Router:debug ip eigrp

Answer: C

Question: 250
Which of the following routing protocols is not available on a non-Cisco router?

A. EIGRP
B. RIP
C. BGP
D. OSPF

Answer: A

Question: 251

Lead your way to certificates!


Which of the following EIGRP messages asks the neighboring routers to verify their route to a
particular subnet?

A. Verify
B. Query
C. Acknowledgement
D. Routes

Answer: B

Question: 252
Which of the following commands is used to display all the EIGRP feasible successor routes
known to a specific router?

A. show up eigrp topology


B. showip topology
C. show eigrp topology
D. show ip eigrp topology

Answer: D

Question: 253
Which of the following protocols is a balanced hybrid routing protocol?

A. IGRP
B. EIGRP
C. OSPF
D. RIP

Answer: B

Question: 254
Which of the following protocols makes use of DUAL?

A. IGRP
B. OSPF
C. EIGRP
D. RIP

Answer: C

Question: 255
Which of the following statements is true about EIGRP neighbor router authentication?

Lead your way to certificates!


A. MD5 authentication is a must.
B. With MD5 authentication, the key is sent across, but it is encrypted.
C. MD5 authentication is not needed.
D. Simple password or MD5 authentication may be used.

Answer: A

Question: 256
What is the maximum hop count of EIGRP?

A. 200
B. 225
C. 224
D. 256

Answer: C

Question: 257
Which of the following commands is used to display the number of sent and received EIGRP
packets?

A. Show ip eigrp statistics command


B. Show ip eigrp stats command
C. Show ip eigrp packets command
D. Show ip eigrp traffic command

Answer: D

Question: 258
Which of the following routing protocols is NOT supported by EIGRP?

A. AppleTalk routing protocol


B. Distance Vector Multicast Routing Protocol
C. IP routing protocol
D. IPX routing protocol

Answer: B

Question: 259
Which of the following EIGRP commands assists in the installation of protocols and in
configuration problems?

A. debug
B. network

Lead your way to certificates!


C. bandwidth
D. show

Answer: A

Question: 260
Which of the following EIGRP packets can be sent unreliably?

A. Hello packets
B. Reply packets
C. Update packets
D. Query packets

Answer: A

Question: 261
Which of the following show commands can be used to display the EIGRP topology table?

A. show ip eigrp table


B. show eigrp topology
C. show eigrp topology table
D. show ip eigrp topology

Answer: D

Question: 262
Which of the following protocols requires the least bandwidth?

A. IGRP
B. RIP
C. OSPF
D. EIGRP

Answer: D

Question: 263
Which of the following is a term used to represent the metric value for the lowest metric route
to a particular subnet in EIGRP?

A. Feasible metric
B. Least distance
C. Least metric
D. Feasible distance

Lead your way to certificates!


Answer: D

Question: 264
Which of the following statements is TRUE about the Enhanced Interior Gateway Routing
protocol?

A. When EIGRP sends multicast traffic, it uses the Class D address 224.0.0.10.
B. When EIGRP sends unicast traffic, it uses the Class C address 224.0.0.10.
C. When EIGRP sends unicast traffic, it uses the Class D address 224.0.0.10.
D. When EIGRP sends multicast traffic, it uses the Class B address 224.0.0.10.

Answer: A

Question: 265
Which of the following protocols is responsible for the ordered delivery of EIGRP packets to
all neighbors?

A. Transmission Control Protocol


B. Reliable Transport Protocol
C. Reliable Transfer Protocol
D. Reliable Delivery Protocol

Answer: B

Question: 266
Which of the following protocols is a classful routing protocol?

A. EIGRP
B. RIP v2
C. IGRP
D. OSPF

Answer: C

Question: 267
What is the administrative distance of the OSPF protocol?

A. 160
B. 140
C. 110
D. 170

Answer: C

Lead your way to certificates!


Question: 268
In which of the following processes does a router take the routes, as learned by one protocol,
and inject routes for those subnets into another routing protocol?

A. IP routing
B. IP redistribution
C. IP distribution
D. IP injection

Answer: B

Question: 269
Which of the following configuration settings prevents OSPF neighbor discovery on an
OSPFenabled interface?

A. Configuring the interface as passive


B. Configuring the interface as invalid
C. Configuring the interface as disconnected
D. Configuring the interface as hidden

Answer: A

Question: 270
Which of the following protocols is used in backbone networks?

A. RIP
B. IGRP
C. OSPF
D. BGP

Answer: C

Question: 271
Which of the following is a flooding protocol?

A. BGP
B. IGRP
C. OSPF
D. EBGP

Answer: C

Question: 272
Which of the following header fields of an OSPF packet is used to identify the damages

Lead your way to certificates!


suffered by the packet during its transmission?

A. Checksum
B. Data
C. Packet length
D. Area ID

Answer: A

Question: 273
Which of the following is NOT an OSPF area?

A. Not-so-stubby area
B. Transmit area
C. Totally stubby area
D. Backbone area

Answer: B

Question: 274
Which of the following IP addresses represents the backbone region of an OSPF network?

A. 0.0.0.0
B. 1.1.1.1
C. 0.0.0.1
D. 1.0.0.0

Answer: A

Question: 275
Which of the following routing protocols does not supports VLSM?

A. EIGRP
B. RIPv2
C. RIPv1
D. OSPF

Answer: C

Question: 276
Which of the following protocols cannot define a default metric?

A. RIP
B. IS-IS

Lead your way to certificates!


C. BGP
D. OSPF

Answer: B

Question: 277
Which of the following is NOT OSPF area type?

A. Stub
B. Totally stubby
C. NSSA
D. SSA

Answer: D

Question: 278
Which of the following protocols does not support frame relay?

A. OSPF
B. IS-IS
C. RIP
D. IGRP

Answer: A

Question: 279
Which of the following is the range of values for Process IDs in OSPF?

A. 0-65535
B. 1-655355
C. 0-655355
D. 1-65535

Answer: D

Question: 280
Which of the following header fields of an OSPF packet is used to identify the source of the
packet?

A. Type
B. Router ID
C. Area ID
D. Version number

Lead your way to certificates!


Answer: B

Question: 281
Which of the following OSPF LSA types maintains a list of routers connected to the network?

A. Summary LSA
B. AS-external LSA
C. Router LSA
D. Network LSA

Answer: D

Question: 282
Which of the following parameters is used as a metric in OSPF?

A. Maximum transmission unit (MTU)


B. Bandwidth
C. Delay
D. Cost

Answer: D

Question: 283
Which of the following is the size of the header field in an OSPF packet?

A. 20 bytes
B. 25 bytes
C. 15 bytes
D. 24 bytes

Answer: D

Question: 284
Which of the following pairs of multicast addresses is reserved for OSPF?

A. 224.0.0.0 and 224.0.0.1


B. 225.0.0.5 and 225.0.0.6
C. 225.0.0.0 and 224.0.0.1
D. 224.0.0.5 and 224.0.0.6

Answer: D

Question: 285
Which of the following protocols is an example of the interior routing protocol?

Lead your way to certificates!


A. BGP
B. ARP
C. OSPF
D. EGP

Answer: C

Question: 286
Which of the following OSPF packets is used to determine and maintain relationships with
neighboring routers?

A. Hello packet
B. Database Description packet
C. Link State Update packet
D. Link State Request packet

Answer: A

Question: 287
Which of the following routing protocols supports Bidirectional Forwarding Detection (BFD)?

A. RIP
B. TCP
C. IGRP
D. OSPF

Answer: D

Question: 288
Which of the following is a link-state routing protocol?

A. RIP
B. SMTP
C. LDAP
D. SNMP
E. OSPF

Answer: E

Question: 289
Which of the following OSPF packets is used to list router IDs from which the router has a
Link
State Acknowledgement (LSA) and its existing sequence number?

Lead your way to certificates!


A. Database Description packet
B. Link State Request packet
C. Link State Update packet
D. Hello packet

Answer: A

Question: 290
OSPF is encapsulated directly in IP datagrams with protocol number ________.

A. 89
B. 69
C. 96
D. 98

Answer: A

Question: 291
Which of the following OSPF LSA types originates by area border routers?

A. AS-external LSA
B. Summary LSA
C. Network LSA
D. Router LSA

Answer: B

Question: 292
Which of the following routing protocols supports the tagging of routes?

A. RIP v1
B. OSPF
C. BGP
D. IGRP

Answer: B

Question: 293
Which of the following algorithms is used by the Open Shortest Path First protocol?

A. Diffusing update algorithm (DUAL)


B. Edge disjoint shortest pair algorithm
C. Bellman ford algorithm

Lead your way to certificates!


D. Dijkstra's algorithm

Answer: D

Question: 294
Which of the following OSPF packets responds to a link state request packet?

A. A hello packet
B. A link state update packet
C. A database description packet
D. A link state acknowledgement packet

Answer: B

Question: 295
Which of the following areas forms the core of an OSPF network?

A. Backbone area
B. Stub area
C. Base area
D. Support area

Answer: A

Question: 296
With RIP, the routing table is sent to a neighbor host every ______.

A. 10 seconds
B. 30 seconds
C. 45 seconds
D. 60 seconds

Answer: B

Question: 297
At which of the following layers is the OSPF protocol encapsulated?

A. Internet layer
B. Data link layer
C. Session layer
D. Transport layer

Answer: D

Lead your way to certificates!


Question: 298
Which of the following OSPF routers has neighbor relationships with routers in area 0.0.0.0?

A. A Backbone router
B. An Area Border router
C. An Internal router
D. An Autonomous System Boundary router

Answer: A

Question: 299
What does OSPF stand for?

A. Organized Second Path First


B. Open Second Path First
C. Open Shortest Path First
D. Organized Shortest Path First

Answer: C

Question: 300
Which of the following formulas is used for the calculation of the overall metric of EIGRP?

A. [(K1*Bandwidth + {(K2*Reliability)/(256-Load)} + K3*Delay).8K5/(K4 + Reliability)]*256


B. [(K1*Bandwidth + {(K2*Bandwidth)/(256-Load)} + K3*Delay).8K5/(K4 + Reliability)]*256
C. [(K1*Bandwidth + {(K2*Delay)/(256-Load)} + K3*Delay).K5/(K4 + Reliability)]*256
D. [(K1*Bandwidth + {(K2*Load)/(256-Bandwidth)} + K3*Delay).8K5/(K4 + Reliability)]*256
E. [(K1*Bandwidth + {(K2*Bandwidth)/(256-Load)} + K3*Delay).K5/(K4 + Reliability)]*256

Answer: B

Question: 301
Which of the following OSPF areas is responsible for distributing routing information between
nonbackbone areas?

A. Stub area
B. Backbone area
C. Totally stubby area
D. Not-so-stubby area

Answer: B

Question: 302
Which of the following protocols uses a link-state algorithm in order to build and calculate the

Lead your way to certificates!


shortest path to all known destinations?

A. OSPF
B. IGRP
C. RIP v1
D. RIP v2

Answer: A

Question: 303
Which of the following BGP features defines the IP TTL field value in terms of packets sent
between two eBGP routers?

A. eBGP peers
B. eBGP multihop
C. eBGP hopcount
D. eBGP multihop count

Answer: B

Question: 304
Which of the following statements is true about eBGP?

A. An internal routing protocol can be used to reach an eBGP neighbor.


B. eBGP requires a full mesh of routers.
C. A static route is used to form an adjacency between neighbors.
D. The next hop does not change when the eBGP updates are exchanged between eBGP
neigh bors.

Answer: C

Question: 305
Which of the following protocol packets run directly on top of the data link layer?

A. OSPF packets
B. EIGRP packets
C. IS-IS packets
D. IGP packets

Answer: C

Question: 306
Which of the following protocols is capable of carrying both IP and CLNS?

Lead your way to certificates!


A. EIGRP
B. BGP
C. OSPF
D. IS-IS

Answer: D

Question: 307
_________ routers use link state advertisements (LSAs) to communicate with each other.

A. IGRP
B. OSPF
C. RIP
D. EIGRP

Answer: B

Question: 308
_______ is used to route between different autonomous systems.

A. OSPF
B. EIGRP
C. EGP
D. BGP

Answer: D

Question: 309
Which of the following protocols works opposite to the External Border Gateway Protocol
(eBGP)?

A. Interior Gateway Routing Protocol (IGRP)


B. Border Gateway Protocol (BGP)
C. Enhanced Interior Gateway Routing Protocol (EIGRP)
D. Internal Border Gateway Protocol (iBGP)

Answer: D

Question: 310
Identify whether the statement given below is true or false?
"IPv6 does not support broadcast addresses."

A. True
B. False

Lead your way to certificates!


Answer: A

Question: 311
Which of the following fields of IPv6 determines the number of hops a packet can travel
before being discarded?

A. Class field
B. Next header field
C. Version field
D. Hop limit field

Answer: D

Question: 312
What is the size of a subnet in IPv6?

A. 264 addresses
B. 2128 addresses
C. 262 addresses
D. 232 addresses

Answer: A

Question: 313
What is the size of the IPv6 fixed-length header?

A. 60 bytes
B. 40 bytes
C. 30 bytes
D. 20 bytes

Answer: B

Question: 314
Which of the following address spaces does the IPv6 addressing scheme support?

A. 32-bit
B. 128-bit
C. 512-bit
D. 256-bit

Answer: B

Lead your way to certificates!


Question: 315
Which of the following is a test address that acts as a test mechanism of network devices and
protocols?

A. IPv4
B. Loop-back address
C. Subnet mask
D. IPv6

Answer: B

Question: 316
Which of the following terms is the IPv6 equivalent of a static IP address in IPv4?

A. Nontemporary
B. Nondynamic
C. Temporary
D. Dynamic

Answer: A

Question: 317
IPv6 addresses are composed of two logical parts: a 64-bit network prefix, and a ______ host
part.

A. 128-bit
B. 16-bit
C. 64-bit
D. 32-bit

Answer: C

Question: 318
Which of the following techniques is used for hybrid implementation of IPv6 and IPv4 and to
run IPv4 and IPv6 in a fully independent way?

A. Dual IP stacks
B. Dual tunneling
C. DNS
D. IP tunneling

Answer: A

Question: 319

Lead your way to certificates!


Which of the following is the unspecified address in IPv6?

A. 0:0:0:0:0:0:0:0
B. 1:0:0:0:0:0:0:0
C. 0:0:0:0:0:0:0:1
D. 1:1:1:1:1:1:1:1

Answer: A

Question: 320
Which of the following is a valid IPv6 IP address?

A. 12ED:2F33:63E2:21BA:CB24:2D73:FACE:F25H
B. 12ED:2F33:63E2:21BA:CB24:2D73:FACE:F25F
C. 12ED:2F33:63E2:21BA:CB24:2D73:FACE:F25G
D. 12ED:2F33:63E2:21BA:CB24:2D73:FACE:F25I

Answer: B

Question: 321
What fraction of the IPv6 address space is reserved for multicast addresses?

A. 1/8
B. 1/1024
C. 1/128
D. 1/256

Answer: D

Question: 322
Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in
a device or network?

A. Dual stack
B. Clustering
C. Mirroring
D. Duplexing

Answer: A

Question: 323
Which of the following fields of IPv4 is changed to the Payload Length field in IPv6?

A. Time To Live (TTL)

Lead your way to certificates!


B. Fragment Offset
C. Protocol
D. Datagram field

Answer: D

Question: 324
Which of the following IPv6 addresses is similar to the private, non-routable address in IPv4
addressing scheme?

A. Local-link
B. Anycast
C. Site local
D. Global unicast

Answer: A

Question: 325
Which of the following is the loopback address in IPv6?

A. 0:0:0:0:0:0:1
B. 0:0:0:0:0:0:0:1
C. 0:0:0:0:0:0:1:1
D. 0:0:0:0:0:0:0:0:1

Answer: B

Question: 326
Which of the following is an Exterior Gateway Protocol (EGP)?

A. RIP
B. BGP
C. EIGRP
D. OSPF

Answer: B

Question: 327
Which of the following is the range of multicast addresses in IPv6?

A. 225.0.0.0 through 239.255.255.255.


B. 224.0.0.0 through 255.255.255.255.
C. 224.0.0.0 through 224.255.255.255.
D. 224.0.0.0 through 239.255.255.255.

Lead your way to certificates!


Answer: D

Question: 328
Which of the following command is used to display the IPv6 information?

A. ipconfig
B. ipconfig6
C. cacls
D. attrib
E. ftype

Answer: A

Question: 329
Which of the following commands is used in IPv6 to test TCP/IP connectivity?

A. ifconfig
B. ping
C. dig
D. ping6

Answer: D

Question: 330
Which of the following command is used to install IPv4?

A. netsh interface ipv4 install


B. netsh interface ipv6 add
C. netsh interface 6to4
D. netsh interface ipv4 add

Answer: A

Question: 331
Which of the following commands displays the IPv6 routing table?

A. ip -6 route
B. iptable
C. ping6
D. trceroute6

Answer: A

Lead your way to certificates!


Question: 332
Which of the following IP addresses is the loopback address in IPv6?

A. 1:0:0:0:0:0:0:0
B. 0:0:0:0:0:0:0:0
C. 0:0:0:0:0:0:0:1
D. 0:0:0:1:1:0:0:0

Answer: C

Question: 333
Which of the following types of security are provided by IPv6?

A. Authentication and Confidentiality


B. Confidentiality and Integrity
C. Integrity and Availability
D. Availability and Authentication

Answer: A

Question: 334
How many bits are used by the IPv6 addressing scheme for the link-layer address
encapsulation?

A. 128 bits
B. 64 bits
C. 8 bits
D. 32 bits

Answer: B

Question: 335
Which of the following ranges of IPv6 addresses is reserved?

A. 225.0.0.0 - 225.255.255.255
B. 224.0.0.0 - 225.0.0.255
C. 224.0.0.0 -224.255.255.255
D. 224.0.0.0 - 224.0.0.255

Answer: D

Question: 336
Which of the following is the loopback address in IPv4?

Lead your way to certificates!


A. 0.0.0.0.0.0.0.1
B. 0:0:0:0:0:0:0:1
C. 127.0.0.1
D. 127:0:0:1

Answer: C

Question: 337
Which of the following techniques is used to make IPv4 packets as a link for IPv6 datagrams?

A. DNS
B. Dual tunneling
C. Tunneling
D. Dual IP stack

Answer: C

Question: 338
Which of the following fields is identical in both IPv4 and IPv6 headers?

A. Flow label field


B. Class field
C. Payload length field
D. Version field

Answer: D

Question: 339
Which of the following is NOT a valid IPv6 IP address?

A. 45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: 45CF


B. 45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: FACE
C. 45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: 12CD
D. 45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: FACL

Answer: D

Question: 340
Which of the following protocols allows clients located behind an IPv4 NAT device to use IPv6
over Internet?

A. 6to4
B. P-HTTS
C. ISATP

Lead your way to certificates!


D. Teredo

Answer: D

Question: 341
Which of the following IP protocol numbers is used to indicate the direct encapsulation of IPv6
datagrams within IPv4 packets?

A. 41
B. 45
C. 14
D. 2

Answer: A

Question: 342
Which of the following IPv6 addresses is a single address that can be assigned to multiple
interfaces?

A. Site local
B. Anycast
C. Local-link
D. Global unicast

Answer: B

Question: 343
What fraction of the IPv6 address space is reserved for link-local unicast addresses?

A. 1/128
B. 1/1024
C. 1/8
D. 1/256

Answer: B

Question: 344
Which of the following protocols tunnels IPv6 traffic over IPv4 traffic?

A. SMTP
B. SATP
C. 6to4
D. Teredo

Lead your way to certificates!


Answer: C

Question: 345
Which of the following layers is not a part of the Internet protocol suite?

A. IP layer
B. Internet layer
C. Link layer
D. Application layer

Answer: A

Question: 346
Identify whether the given statement is true or false.
"IPSec is a necessary requirement for configuring the IPv6 protocol suite."

A. False
B. True

Answer: B

Question: 347
Which of the following is not a valid IPv4 to IPv6 transition technology?

A. Teredo
B. Dual IP layer architecture
C. ISATAP
D. IPv6 over IPv4 tunneling
E. 4to6

Answer: E

Question: 348
Which of the following extension headers of IPv6 is used to pass instructions to the
intermediate nodes?

A. Destination Options
B. Fragment
C. Hop-by-hop
D. Routing

Answer: C

Question: 349

Lead your way to certificates!


Which of the following address spaces does the IPv6 addressing scheme support?

A. 64-bit
B. 28-bit
C. 128-bit
D. 32-bit

Answer: D

Question: 350
The ________ technique allows IPv6 and IPv4 to co-exist in the same devices and networks.

A. Duplexing
B. Tunneling
C. Multiplexing
D. Dual stack

Answer: D

Question: 351
In the _______ scenario, the headquarters and business partner are connected through a
secure IPSec tunnel.

A. Extranet VPN
B. Intranet VPN
C. Access VPN
D. Internet VPN

Answer: A

Question: 352
Which of the following is the prefix in multicast addresses in IPv6?

A. ff00::/1
B. ff00::/6
C. ff00::/8
D. ff00::/0

Answer: C

Question: 353
Which of the following is a private network that is securely extended to share part of an
organization's information or processes with remote employees?

Lead your way to certificates!


A. Intranet environment
B. VPN
C. nternet
D. Extranet environment

Answer: D

Question: 354
Which of the following VPN connections are constructed using encryption techniques?

A. Hybrid VPN connections


B. Trusted VPN connections
C. Secure VPN connections
D. Encrypted VPN connections

Answer: C

Question: 355
Which of the following commands is used to provide a simple clear-text password with no
encryption in GRE tunneling?

A. The tunnel key command


B. The key encryption command
C. The key tunnel command
D. The tunnel encryption command

Answer: A

Question: 356
Identify whether the given statement is true or false.
"A VPN tunnel is a link or connection that encapsulates and encrypts private data."

A. True
B. False

Answer: A

Question: 357
Which of the following is the primary functionality of a VPN?

A. Data modification
B. Data availability
C. Data integrity
D. Non-repudiation

Lead your way to certificates!


Answer: C

Question: 358
Which of the following commands is used to configure the tunnel source in GRE?

A. tunnel source {ip-address | type number}


B. tunnel source {type number}
C. tunnel source {ip-address}
D. tunnel number {ip-address | type number}

Answer: A

Question: 359
Which of the following site-to-site VPN elements provides a logical connection in a virtual
private network?

A. Headend VPN device


B. Broadband service
C. VPN access device
D. VPN tunnel

Answer: D

Question: 360
Which of the following is the main benefit of VPNs as compared to the dedicated networks?

A. Reduced cost
B. Better network performance
C. Improved security
D. Less downtime on average

Answer: A

Question: 361
Identify whether the statement given below is true or false.

"A VPN server must have a manual TCP/IP configuration for its Internet interface."

A. False
B. True

Answer: B

Lead your way to certificates!


Question: 362
Which of the following values of the Protocol Type field in a GRE header is used when IPv4 is
being carried out as a GRE payload?

A. 0x8000
B. ox0001
C. 0x800
D. 0x1600

Answer: C

Question: 363
Which of the following is required by DirectAccess for security of data on the public network?

A. IPv4-over-SSL
B. IPv6-over-IPsec
C. IPv4-over-IPsec
D. IPv6-over-SSl

Answer: B

Question: 364
Which of the following GRE packet-field bits are reserved and must be transmitted as 0?

A. Checksum bits
B. Recursion Control bits
C. Offset bits
D. Flag bits

Answer: D

Question: 365
In which of the following cases is GRE tunneling useful?

A. In case of encryption of multicast traffic


B. In case of a protocol that is not switchable
C. In case of encryption of unicast traffic
D. In case of a protocol that is routable

Answer: A

Question: 366
Which of the following protocols works at layer 3 of the OSI model?

Lead your way to certificates!


A. L2F
B. L2TP
C. PPTP
D. IPSec

Answer: D

Question: 367
Which of the following layers' protocols provide logical addressing and path selection?

A. Layer 2 (Data link)


B. Layer 4 (Transport)
C. Layer 1 (Physical)
D. Layer 3 (Network)

Answer: D

Question: 368
Which of the following is NOT an easy VPN mode of operation?

A. Network extension plus mode


B. Server extension plus mode
C. Client mode
D. Network extension mode

Answer: B

Question: 369
What does a Layer 3 MPLS VPN forward?

A. Network protocols
B. MAC addresses
C. IP packets
D. Routing tables

Answer: C

Question: 370
Which of the following models does the path control layer belong to?

A. SNA architectural model


B. OSI model
C. TCP/IP architecture model
D. Architectural model

Lead your way to certificates!


Answer: A

Question: 371
Which of the following protocols can encapsulate network layer protocol packet types inside
IP tunnels?

A. Transmission Control Protocol (TCP)


B. Routing Information Protocol (RIP)
C. Open Shortest Path First (OSPF) protocol
D. Generic Routing Encapsulation (GRE) protocol

Answer: D

Question: 372
Which of the following DNS records is used for host name to IPv6 address resolution?

A. CNAME
B. PTR
C. SOA
D. A
E. AAAA

Answer: E

Question: 373
Which of the following commands is used to enable GRE tunneling?

A. tunnel mode gre source


B. tunnel mode gre
C. tunnel mode gre ip
D. tunnel mode gre number

Answer: C

Question: 374
Which of the following is NOT a subcategory of VPNs?

A. Software-based VPN application


B. Firewall-based VPN
C. IDS-based VPN application
D. Hardware-based VPN

Answer: C

Lead your way to certificates!


Question: 375
Which of the following is an advantage of VPN?

A. Inconsistent remote access performance


B. Secure connectivity to high speed remote users
C. No entrance into the network if the Internet connection is broken
D. Potentially lower bandwidth availability

Answer: B

Question: 376
Which of the following IPSec modes can be used for both site-to-site VPNs and access VPNs?

A. Tunnel mode
B. Transport mode
C. Null mode
D. ommon mode

Answer: A

Question: 377
Which of the following commands is used to configure the tunnel mode in GRE?

A. tunnel source {aurp | cayman | dvmrp | eon | gre ip | nos}


B. tunnel route {aurp | cayman | dvmrp | eon | gre ip | nos}
C. tunnel mode {aurp | cayman | dvmrp | eon | gre ip | nos}
D. tunnel number {aurp | cayman | dvmrp | eon | gre ip | nos}

Answer: C

Question: 378
Which of the following is a major tunneling protocol for VPN?

A. PPTP
B. UDP
C. IP
D. TCP

Answer: A

Question: 379
Which of the following VPN connections supports frame relay circuits?

Lead your way to certificates!


A. Hybrid VPN connection
B. Relay VPN connection
C. Secure VPN connection
D. Trusted VPN connection

Answer: D

Question: 380
Which of the following is a characteristic of ICMP?

A. It is not a required part of the TCP/IP stack.


B. All ICMP messages begin with the same four fields.
C. It is the error and control mechanism for IP, and exists at Layer 3 of the OSI model.
D. The ICMP source-quench message specifies that an IP header error occurred.

Answer: C

Question: 381
Which of the following is the default value of the protocol type field in GRE packets?

A. GRE protocol type


B. IP protocol type
C. Ethernet protocol type
D. Encapsulation protocol type

Answer: C

Question: 382
Which of the following is the primary function of VPNs?

A. To establish a wireless connections to networks


B. To access networks remotely
C. To establish private connections over public networks
D. To make virtual connections for remote access

Answer: C

Question: 383
Which of the following layers of the OSI model is used to perform sequencing services related
to proper data reassembly?

A. Layer 2
B. Layer 3
C. Layer 7

Lead your way to certificates!


D. Layer 4

Answer: B

Question: 384
Which of the following networks relies on the tunneling protocol?

A. Virtual Private Network (VPN)


B. Wireless Network
C. Wide Area Network (WAN)
D. Local Area Network (LAN)

Answer: A

Question: 385
Which of the following is a feature of VPNs?

A. Immature standards, protocols, and technology


B. Significant cost savings
C. Increased network complexity
D. Decreased security and encryption capabilities

Answer: B

Question: 386
______ provides the highest level of VPN security.

A. IPSec
B. MS-CHAP
C. CHAP
D. EAP

Answer: A

Question: 387
What does VPN stand for?

A. Virtual Private Network


B. Visitor Private Network
C. Visitor Public Network
D. Virtual Public Network

Answer: A

Lead your way to certificates!


Question: 388
Which of the following protocols is used by the GRE tunneling mechanism as its transport
protocol?

A. UDP
B. IP
C. TCP
D. OSPF

Answer: B

Question: 389
Which of the following is the full form of DSL?

A. Digitally subscribed logic


B. Digital subscriber logic
C. Digital subscriber line
D. Digitally subscribed line

Answer: C

Question: 390
Which of the following commands is used to configure the tunnel destination in GRE?

A. tunnel destination {hostname | ip-address}


B. tunnel number {hostname | ip-address}
C. tunnel destination {ip-address | hostname}
D. tunnel destination {hostname}

Answer: A

Question: 391
Which of the following components of the Cisco Easy VPN allows a variety of devices to push
security policies from a central site to remote sites?

A. Easy VPN Remote


B. Easy VPN Server
C. Easy VPN Host
D. Easy VPN Client

Answer: B

Question: 392
Which of the following technologies is supported by secure VPNs?

Lead your way to certificates!


A. IPsec inside of L2TP
B. ATM circuit
C. Frame relay circuit
D. IPsec without encryption

Answer: A

Question: 393
Which of the following is a tunneling protocol for VPNs?

A. Layer 4 Tunneling Protocol (L4TP)


B. Layer 3 Tunneling Protocol (L3TP)
C. Layer 2 Tunneling Protocol (L2TP)
D. Layer 1 Tunneling Protocol (L1TP)

Answer: C

Question: 394
Which of the following techniques allows for the creation of efficient and scalable addressing
schemes?

A. Variable-Length Subnet Masking (VLSM)


B. Supernetting
C. Route summarization
D. Address summarization

Answer: A

Question: 395
Which of the following components of a Site-to-Site VPN interconnects the headend and
branchend devices in the VPN?

A. GRE tunnel
B. Internet service
C. VPN access device
D. Headend VPN device

Answer: A

Question: 396
Which of the following is the full form of SRE?

A. Source Route Entry

Lead your way to certificates!


B. Source Route Encapsulation
C. Source Region Encapsulation
D. Source Region Entry

Answer: A

Question: 397
Which of the following OSI layers are used by the RIP messages?

A. Layer 2 and Layer 4


B. Layer 3 and Layer 4
C. Layer 1 and Layer 2
D. Layer 1 and Layer 3

Answer: B

Question: 398
Which of the following authentication types can be used in Easy VPN mode?

A. Blowfish
B. AES
C. Kerberos
D. RSA signatures

Answer: D

Question: 399
Which of the following Layer 3 protocols defines a packet that can be routed in IPv4 or IPv6?

A. Packet routing protocol


B. Layer 3 routing protocol
C. Routing protocol
D. Routed protocol

Answer: D

Question: 400
Which of the following advantages does DSL offer over the cable modem service?

A. DSL provides faster speed.


B. DSL is generally less expensive.
C. DSL services are easily available.
D. DSL provides dedicated local bandwidth.

Lead your way to certificates!


Answer: D

Question: 401
Which of the following GRE packet fields is optional?

A. Recursion Control
B. Protocol Type
C. Version
D. Checksum

Answer: D

Question: 402
Which of the following forms of DSL theoretically provides the fastest service?

A. ADSL
B. VDSL
C. SHDSL
D. SDSL

Answer: B

Question: 403
Which of the following layers of sanity checks are executed by the packet sanity?

A. Layer1 and Layer2


B. Layer3 and Layer4
C. Layer4 and Layer5
D. Layer2 and Layer3

Answer: B

Question: 404
Which of the following network connections is termed as a pipe within a pipe?

A. A VPN connection
B. A LAN connection
C. A broadband connection
D. An ISDN connection

Answer: A

Question: 405
Which of the following types of VPNs allows you to extend your network resources to branch

Lead your way to certificates!


offices, home offices, and business partner sites?

A. Remote Access VPN


B. Internet VPN
C. Site-to-Site VPN
D. Client-Server VPN

Answer: C

Question: 406
Which of the following broadband access methods is a telephone data service standard?

A. DSL
B. Wired Ethernet
C. ISDN
D. Cable modem

Answer: C

Question: 407
Which of the following statements is true about VPNs and firewalls?

A. There is no difference between firewalls and VPNs.


B. Firewalls block messages, whereas VPNs open pathways for messages.
C. Firewalls are user-configurable, whereas VPNs cannot be configured.
D. Firewalls are a new type of VPNs.

Answer: B

Question: 408
Which of the following protocols uses HTTP-over-SSL session between VPN clients and
servers for exchanging encapsulated IPv4 or IPv6 packets?

A. L2TP
B. PPTP
C. SSTP
D. NNTP

Answer: C

Question: 409
Which of the following protocols is responsible for the security of a VPN network?

A. RIP

Lead your way to certificates!


B. IS-IS
C. IPSec
D. OSPF

Answer: C

Question: 410
Which of the following VPN technologies allow customers to have their own IP addressing
and their own security policies?

A. Hybrid VPNs
B. Secure VPNs
C. Trusted VPNs
D. Public VPNs

Answer: C

Question: 411
Which of the following protocol types represents the GRE packets using IPv4 headers?

A. 47
B. 14
C. 41
D. 74

Answer: A

Question: 412
You work as the Network Administrator of a Windows 2000 Active Directory network. Your
company's offices are at Dallas and New York.
Your company wants to configure a secure, direct Internet link. The company's management
wants to accomplish the following tasks:
l Keep the offices' internal resources secure from outsiders.
l Keep communication secure between the two offices.
You install a firewall in each office. Which of the tasks does this action accomplish?

A. The action taken will accomplish both the goals.


B. The action taken will accomplish neither of the goals.
C. The action taken will fulfill the secure communication concern.
D. The action taken will fulfill the internal resource security concern.

Answer: D

Question: 413

Lead your way to certificates!


Peter works as a Network Administator for Aztech Inc. He wants to setup a VPN connection
to enable the temporary employees of the company to connect to the company’s network.
Rearrange the following tasks in the order in which they should be performed to configure
VPN.
(Click the Exhibit button on the toolbar to see the case study.)

Lead your way to certificates!


A.

Answer: A

Question: 414
How should you authenticate users, from FirstAid Inc., who access State Medico Inc's
network
using a VPN connection?
(Click the Exhibit button on the toolbar to see the case study.)

Lead your way to certificates!


Lead your way to certificates!
Lead your way to certificates!
Lead your way to certificates!
A. Use EAP.
B. Use the Internet Authentication Service (IAS).
C. Use the fully qualified domain name and password.
D. Use certificate-based authentication.

Answer: C

Question: 415
You work as a Network Administrator for Corptech Inc. You have added a new router to an
established OSPF network. However, the networks attached to the new router do not appear
in the routing tables of the other OSPF routers.
The new router has been configured for OSPF in the following way:
Router(config)# router ospf 99
Router(config)# network 172.168.2.0 255.255.0.0 area 0
Based on this information, what can be the cause of the problem?

A. Wrong subnet mask


B. Improperly configured Process ID
C. Improperly configured area
D. Wrong network wildcard mask

Answer: D

Question: 416
You work as a network administrator for Net Perfect Inc. The company has a TCP/IP-based
network. DHCP services are running on a server on the network. A client computer,
configured for obtaining automatic IPv4 address lease, is added to the network. Which type of
messages will be generated during the DHCP lease process?

A. Multicast
B. Anycast
C. Broadcast
D. Unicast

Answer: C

Question: 417
You work as a Network Administrator for Infonet Inc. The company has a Windows Server
2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers
on the network run Windows Server 2008. The users in the network use NetBIOS name to
connect network application on the network. Your manager requires you migrate the network
to IPv6-enabled network without affecting any client computers. Which of the following actions
will you take to accomplish the task?

Lead your way to certificates!


A. Configure GlobalNames zones on the DNS servers in the network.
B. Configure the client computers to use WINS.
C. Configure stub zone on the DNS servers in the network.
D. Install a new Windows Server 2003 DNS server computer on each domain and configure
GlobalNames zones.

Answer: A

Question: 418
You work as a Network Administrator for Net Perfect Inc. The company has a Windows
Server 2008 network environment. The network is configured as a Windows Active Directory-
based single forest single domain network. The network is configured on IP version 6 protocol.
All the computers on the network are connected to a switch device. One day, users complain
that they are unable to connect to a file server. You try to ping the client computers from the
server, but the pinging fails. You try to ping the server's own loopback address, but it fails to
ping. You restart the server, but the problem persists.
What is the most likely cause?

A. The server's NIC is not working.


B. The server is configured with unspecified IP address.
C. The cable that connects the server to the switch is broken.
D. The switch device is not working.
E. Automatic IP addressing is not working.

Answer: A

Question: 419
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based
network. You want to know the statistics of each protocol installed on your computer.
Which of the following commands will you use to accomplish the task?

A. netstat -g
B. netstat -s
C. netstat -r
D. netstat –M

Answer: B

Question: 420
You work as a Software Developer for uCertify Inc. The company uses Visual Studio .NET
2005 as its application development platform. You create a service named MyService that
needs to be deployed using the .NET Framework. The network administrator of the company
creates a specific user account for the service. You are required to configure the service to
run in the environment of the specific user account. What will you do to accomplish the task?

Lead your way to certificates!


A. Use the CONFIG option of the Net.exe command-line tool to install the service.
B. Set the Account, Username, and Password properties of the ServiceProcessInstaller class
prior to installation.
C. Set the StartType property of the ServiceInstaller class prior to installation.
D. Use the installutil.exe command-line tool to install the service.
E. Use the Web.config file to install the service.

Answer: B

Question: 421
You work as a desktop support technician for Peach Tree Inc. Rick, the network administrator,
asks you to configure the following address on a computer running Windows 7 Ultimate:
1010:1eff::344a:face Which of the following addresses will you configure on the computer?

A. IPv6
B. IPv4
C. URL
D. MAC

Answer: A

Question: 422
You work as the network administrator for uCertify Inc. The company has planned to add the
support for IPv6 addressing. The initial phase deployment of IPv6 requires support from some
IPv6-only devices. These devices need to access servers that support only IPv4. Which of the
following tools would be suitable to use?

A. Native IPv6
B. Point-to-point tunnels
C. Multipoint tunnels
D. NAT-PT

Answer: D

Question: 423
You work as the Network Administrator for uCertify Inc. The company network has two
servers named A and B. These servers handle the Production and Sales department,
respectively. The client host uses IPv4 to communicate with server A, and IPv6 with server B.
Which of the following IPv6 coexistence features is likely to work on the host?

A. Native IPv6
B. Dual Stacks
C. Multipoint tunnels

Lead your way to certificates!


D. Point-to-point tunnels
E. NAT-PT

Answer: B

Question: 424
Which of the following tunneling mechanisms support IPv6 IGP routing protocols?
Each correct answer represents a complete solution. Choose two.

A. Manually configured
B. Automatic 6 to 4
C. ISATAP
D. GRE

Answer: A, D

Question: 425
You work as a Network Administrator for uCertify Inc. The company's main office has a
central router named Router1 that uses both the Internet and a leased line connection to
connect with the routers on other branch offices. You decide to use the leased lines for all the
major data traffic, unless failure occurs, in which case the Internet connection will be used to
pass the traffic to the office.
Which of the following should be used for this purpose in the branch router?

A. GRE tunnel
B. Floating static route
C. IPsec tunnel
D. IGP

Answer: B, C

Question: 426
Choose and reorder the correct steps to configure DSL on a router.

A.

Lead your way to certificates!


Answer: A

Question: 427
Which of the following configuration schemes in IPv6 allows a client to automatically configure
its own IP address with or without IPv6 routers?

A. Stateless configuration
B. Stateful autoconfiguration
C. Stateful configuration
D. Stateless autoconfiguration

Answer: D

Question: 428
Fill in the blank.
The__________extension header is used to pass optional information to all nodes along a
packet's delivery path.

A. Hop-by-hop

Answer: A

Question: 429
IPv6 specification is defined in RFC 2460. Which of the following protocols finally came to be
known as IPv6?

A. CLNP
B. SIPP
C. TUBA
D. CATNIP

Answer: B

Question: 430
Which of the following components of a network is mandatory when using IPv6?

Lead your way to certificates!


A. FTP
B. IPsec
C. HTTP
D. VPN

Answer: B

Question: 431
Which of the following OSPF packets are used in the making of adjacencies?
Each correct answer represents a complete solution. Choose all that apply.

A. Link State Acknowledgement packets


B. Link State Update packets
C. Hello packets
D. Database Description packets
E. Link State Request packets

Answer: D, E

Question: 432
Which of the following packets are responsible for the trustworthy update mechanism of
OSPF?
Each correct answer represents a complete solution. Choose all that apply.

A. Link State Request packets


B. Hello packets
C. Link State Acknowledgement packets
D. Link State Update packets
E. Database Description packets

Answer: C, D

Question: 433
Fill in the blank with the appropriate word:
EIGRP uses the ________table to store information about the destinations advertised by
neighboring routers.

A. topology

Answer: A

Question: 434
Which of the following address types are implemented by the IPv6 addressing scheme?

Lead your way to certificates!


Each correct answer represents a complete solution. Choose all that apply.

A. Unicast
B. Anycast
C. Broadcast
D. Multicast

Answer: A, B, D

Question: 435
Which of the following statements are NOT true about the IPv4 protocol?
Each correct answer represents a part of the solution. Choose three.

A. IPv4 specifies a new packet format, designed to minimize packet-header processing.


B. IPv4 has a header that consists of 10 fixed header fields, two addresses, and options.
C. The IPv4 header uses 128-bit addresses.
D. The size of a subnet in IPv4 is 264 addresses.

Answer: A, C, D

Question: 436
Mark works as a network administrator for BlueWell Inc. He is using the stateless
autoconfigration process to automate the IP address configuration of individual network
devices. He wants the network devices to be comprised of 1111111010 as the first ten bits
followed by 54 zeroes and a 64 bit interface identifier. Which of the following steps will Mark
perform to accomplish the task?

A. Link-Local Address Assignment


B. Link-Local Address Generation
C. Link-Local Address Uniqueness Test
D. Global Address Configuration

Answer: B

Question: 437
John works as a network administrator for BlueWell Inc. He is using the the stateless
autoconfigration process to automate the IP address configuration of the individual network
devices. He wants to test whether the local link addresses generated in the autoconfigration
process is already used by any other device. Which of the following steps will he perform to
accomplish the task?

A. Router Direction
B. Router Contact
C. Global Address Configuration

Lead your way to certificates!


D. Link-Local Address Uniqueness Test

Answer: D

Question: 438
The extension headers in Ipv6 provide a new way of handling options. There are added after
the basic Ipv6 header and are daisy chained. What is the correct order of the extension
headers at the source node?

A.

Answer: A

Question: 439
Drag the scope and use of the reserved multicast addresses in Ipv6 to their appropriate
places.

Lead your way to certificates!


A.

Lead your way to certificates!


Answer: A

Question: 440
A virtual private network (VPN) is a computer network that is layered on the top of an
underlying computer network. VPNs are of different technologies, such as Trusted VPNs,
Secure VPNs, and Hybird VPNs, each having distinct requirements. Drag the various VPN
names to their appropriate places.

Lead your way to certificates!


A.

Answer: A

Lead your way to certificates!


Question: 441
Fill in the blank with the appropriate word.
A ____________area of OSPF can import autonomous system (AS) external routes, but
cannot receive AS external routes from the backbone or other areas.

A. not-so-stubby

Answer: A

Question: 442
Which of the following protocols make use of the Dijkstra's algorithm?
Each correct answer represents a complete solution. Choose all that apply.

A. External Border Gateway protocol (eBGP)


B. Open Shortest Path First protocol (OSPF)
C. Intermediate system to intermediate system (IS-IS)
D. Enhanced Interior Gateway Routing protocol (EIGRP)

Answer: B, C

Question: 443
Fill in the blank with the appropriate word:
The not-so-stubby area cannot receive AS external routes from the _________area in OSPF.

A. backbone

Answer: A

Question: 444
Which of the following features belong to the totally stubby area in OSPF?
Each correct answer represents a complete solution. Choose all that apply.

A. The only way for traffic to get routed outside the totally stubby area is a default route,
advertised into the area.
B. The inter-area (IA) routes are not summarized into the totally stubby areas.
C. The totally stubby area is an additional standard functionality of an NSSA.
D. The totally stubby area is used to pass the traffic from one adjacent area to the backbone.
E. The totally stubby area distributes routing information between areas.

Answer: A, B

Question: 445
Fill in the blanks with the appropriate range.

Lead your way to certificates!


The GRE packet header varies in length and can be ___________ to_________ bits long.

A. 32, 160

Answer: A

Question: 446
Fill in the blank with the appropriate word.
__________refers to any form of work-related travel, thereby eliminating the distance
restrictions of telecommuting

A. Teleworking

Answer: A

Question: 447
What are the transmission addresses used in IPv6 addressing at the source?

A. Broadcast addresses
B. Multicast addresses
C. Anycast addresses
D. Unicast addresses

Answer: D

Question: 448
Fill in the blank with the appropriate term:
__________allows the user to access the IPv6 Internet in absence of an IPv6 native access
provider.

A. IP tunneling.

Answer: A

Question: 449
Fill in the blank with the appropriate word:
GRE is a tunneling protocol that creates a virtual _____________ link to various brands of
routers at remote points over an Internet Protocol internetwork.

A. point-to-point

Answer: A

Question: 450

Lead your way to certificates!


Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to
traverse IPv4 networks?

A. Translation
B. Tunneling
C. Stack
D. Dual-stack

Answer: B

Question: 451
Choose and reorder the steps to configure GRE.

A.

Answer: A

Question: 452
Drag and drop the command used for specifying the tunnel interface in GRE to their
appropriate places.

Lead your way to certificates!


A.

Lead your way to certificates!


Answer: A

Question: 453
Fill in the blank with the appropriate word.
__________is a term that refers to any function influencing the packet forwarding process.

A. Path control

Answer: A

Question: 454
Which of the following settings do potential neighbors check before becoming an OSPF
neighbor?
Each correct answer represents a part of the solution. Choose all that apply.

A. There should be same Router IDs.


B. OSPF authentication success
C. P Maximum Transmission Units (MTUs) must match.
D. OSPF authentication failure
E. The interfaces cannot be passive (negative).
F. IP Maximum Transmission Units (MTUs) must not match.
G. There should be unique Router IDs.

Answer: C, D, E, G

Question: 455
Which of the following are the requirements of the EIGRP router connections?
Each correct answer represents a complete solution. Choose all that apply.

A. Hello timer and the Hold timer must match.


B. The routers must not be passive in the command interface.
C. Router IDs must be unique.
D. The routers must be able to send or receive IP packets to one another.
E. Interfaces' primary addresses must be in the same subnet.
F. K values used in metric calculations must match.

Answer: B, D, E, F

Question: 456
How many metrics are associated with EIGRP for each route?

A. 5
B. 4

Lead your way to certificates!


C. 3
D. 7

Answer: A

Question: 457
Which of the following routing protocols are supported by the Enhanced Internet Gateway
Routing Protocol (EIGRP)?
Each correct answer represents a complete solution. Choose all that apply.

A. IP routing protocols
B. Border Gateway Protocol
C. Open Shortest Path First protocol
D. AppleTalk routing protocol
E. PX routing protocols

Answer: A, D, E

Question: 458
Fill in the blank with the appropriate word.
EIGRP uses the routing,___________ , and neighbor tables for storing the collected data and
for its computations.

A. topology

Answer: A

Question: 459
The IPv4 packet header consists of 13 fields. The fields in the header are packed with the
most significant byte first, and for the diagram and discussion, the most significant bits are
considered to come first. One of the fields is used to provide protection against corruption in
transmission by checking the error. Mark the field that is used for error-checking.

Lead your way to certificates!


A.

Answer: A

Question: 460
Which of the following protocols support Variable Length Subnet Masking (VLSM)?
Each correct answer represents a complete solution. Choose all that apply.

A. Interior gateway routing protocol (IGRP)


B. Open shortest path first protocol (OSPF)
C. Routing information protocol (RIP)
D. Enhanced interior gateway routing protocol (EIGRP)

Answer: B, D

Question: 461
Which of the following features make EIGRP more efficient than other distance vector routing
protocols such as IGRP?
Each correct answer represents a complete solution. Choose all that apply.

A. EIGRP imposes much less overhead on routers and transmission facilities during normal
op eration.
B. EIGRP employs a neighbor discovery/recovery mechanism to ensure that neighbors
remain aware of each other's accessibility.
C. EIGRP enables support for new protocols to be easily added to an existing network.
D. EIGRP employs a periodic update of the routing tables between neighboring routers.

Answer: A, B, C

Question: 462
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communicating

Lead your way to certificates!


protocols used for the Internet and other similar networks. In the Tree View pane, place the
appropriate protocol names belong to the various layers.

A.

Answer: A

Lead your way to certificates!


Question: 463
Which of the following characteristics are defined by the IPv6 header?
Each correct answer represents a part of the solution. Choose three.

A. It contains six fields of information, and a source and destination address.


B. The six fields account for eight bytes of the 40-byte length.
C. Its length is 40 bytes(fixed).
D. It contains ten fields of information, and a source and destination address.

Answer: A, B, C

Question: 464
Which of the following mechanisms provides IPv4 address compatibility, IPv6 in IPv4
tunneling, and dual IP stacks, all of which combine to make the migration to IPv6, and
coexistence of IPv4 and IPv6, as simple as possible?

A. Simple Internet Transition (SIT)


B. Tunneling
C. Dual Stack
D. Translation

Answer: A

Question: 465
Fill in the blank with the appropriate command.
Debug in EIGRP is turned off by executing the ________command.

A. do un all

Answer: A

Question: 466
Which of the following features are supported by OSPF?
Each correct answer represents a complete solution. Choose all that apply.

A. It allows faster convergence time, guaranteeing that the updates and changes are
propagated across the network.
B. It guarantees updates and changes that are propagated across the network.
C. It supports Variable-length subnet masking (VLSM).
D. It has limitations such as network diameter and hop count.
E. t uses areas to minimize the Central Processing Unit (CPU) and memory requirements.

Answer: A, B, E

Lead your way to certificates!


Question: 467
Which of the following features of VPN connections make them cost-effective?
Each correct answer represents a complete solution. Choose all that apply.

A. Reduced need for leased lines


B. Reduced public net traffic
C. Reduced need for long distance telephone calls
D. Reduced need for modem pools and remote access servers

Answer: A, C, D

Question: 468
Routers A and B are EIGRP neighbors. You configure router B with the eigrp stub connected
command. What will be the result?
Each correct answer represents a part of the solution. Choose all that apply.

A. Router A will no longer send query messages to router B.


B. Both the routers will learn EIGRP routes from each other.
C. Router B will no longer respond to the query messages of router A.
D. Router B will send IP packets to router A but router A cannot send IP packets to router B.
E. Router A will no longer learn routes from router B for the routers that are not connected to
B.

Answer: A, E

Question: 469
Router A is a part of the main office of uCertify Inc. It uses the Internet for establishing a
connection with the rest of uCertify's branches. Which of the following is NOT an advantage
of using an IPSec tunnel for packets sent through the Internet, between the router and the
rest of the branch offices of the company?

A. Allowing the use of an IGP between RI and the company


B. Authentication
C. Secure communications
D. Privacy

Answer: A

Question: 470
Fill in the blank with the appropriate word.
Generally, any connection to the customer of 256 Kbit/s or more is considered as
a__________ connection.

A. broadband

Lead your way to certificates!


Answer: A

Question: 471
Router A in ASN-1 of an enterprise connects to an ISP router B in ASN-2 using eBGP. The
serial link between the two routers uses IP addresses 10.1.1.1 and 10.1.1.2, respectively.
Both the routers make use of S0/0 interfaces for this link. Which of the following would be
needed on router A to configure eBGP?
Each correct answer represents a part of the solution. Choose two.

A. router bgp 1
B. neighbor 10.1.1.2 Update-source 10.1.1.1
C. neighbor 10.1.1.2 remote-as 2
D. neighbor 10.1.1.2 Update-source S0/0

Answer: A, C

Question: 472
Drag and drop the eBGP verification commands to their appropriate places.

A.

Lead your way to certificates!


Answer: A

Question: 473
Administrative distance is used to determine the preference of a routing protocol when
multiple routes to a single destination exist. Drag the administrative distance to their
appropriate places.

A.

Lead your way to certificates!


Answer: A

Question: 474
Which of the following fields for two directly connected routers must match to establish
neighbor adjacency in OSPF?
Each correct answer represents a complete solution. Choose all that apply.

A. Area IDs
B. Process IDs
C. Router IDs
D. Hello Timers

Answer: A, D

Question: 475
Which of the following commands are used to identify all the interfaces for which OSPF has
been enabled or is not passive?

A. show ip route ospf


B. show ip protocols
C. show ip ospf neighbors
D. show ip ospf database
E. show ip ospf interface brief

Answer: B, E

Question: 476

Lead your way to certificates!


Which of the following is a valid IPv6 address?

A. 45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: FACE


B. 45CF: 6D53: 12CD: AFC7: E654: BB32: 54AT: FACE
C. 45CF: 6D53: 12KP: AFC7: E654: BB32: 543C: FACE
D. 123.111.243.123

Answer: A

Question: 477
A virtual private network (VPN) is a computer network that is layered on the top of an
underlying computer network. There are three different types of VPN connections, namely
secure VPNs, trusted VPNs, and hybrid VPNs. Drag the VPN connection names to their
appropriate places.

A.

Lead your way to certificates!


Answer: A

Question: 478
According to the case study, how should a retail outlet connect to the M2M.com's
headquarters using a VPN connection?
(Click the Exhibit button on the toolbar to see the case study.)

Lead your way to certificates!


Lead your way to certificates!
Lead your way to certificates!
A. Configure the Dial-up connection to ISP.
Use PPTP to connect to the VPN Server
B. Configure the Dial-up connection to the headquarters.
Use PPTP to connect to the VPN Server.
C. Configure the Dial-up connection to ISP.
Use L2TP over IPSec to connect to the VPN Server
D. Configure the Dial-up connection to the headquarters.
Use L2TP over IPSec to connect to the VPN Server.

Answer: A

Question: 479
Your company has been hired to provide consultancy, development, and integration services
to Blue Wells Inc. Blue Wells Inc., wants to upgrade its network. You have prepared a case
study to plan the upgrade.
Blue Wells Inc., wants to allow its IT specialists to access the network resources from remote
locations. How will you configure the network to accomplish this?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a part of the solution. Choose three.

Lead your way to certificates!


Lead your way to certificates!
Lead your way to certificates!
A. Allow a VPN connection that uses PPTP communication.
B. Configure a direct dial-in connection that uses the EAP-TLS authentication with smart
cards .
C. Configure a direct dial-in connection that uses the PAP authentication.
D. Allow a VPN connection that uses L2TP communication.
E. Configure a direct dial-in connection that uses the MS-CHAP authentication.
F. Apply basic encryption on all the connections.
G. Apply strong encryption on all the connections.
H. Apply IPSec on all the connections.

Answer: D, G, H

Question: 480
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. Choose two.

A. netsh interface IPv6 set interface


B. netsh interface IPv6 add address
C. netsh interface IPv6 add routes
D. netsh interface IPv6 show interface

Answer: A, C

Question: 481
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.

A. It uses longer subnet masks than those used in IPv4.


B. It uses 128-bit addresses.
C. It increases the number of available IP addresses.
D. It provides improved authentication and security.
E. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

Lead your way to certificates!


Answer: B, C, D, E

Question: 482
You work as a Network Administrator for Tech Perfect Inc. The office network is configured as
an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent
to an IPv4 publicly routable address. Which of the following types of addresses will you
choose?

A. Global unicast
B. Site-local
C. Local-link
D. Loopback

Answer: A

Question: 483
You work as a technician for BlueWell Inc. The company has a TCP/IP based network. Due to
some fault in the network you do not have the permission to remotely access a remote
computer.
Which of the following ICMPv6 error messages would you receive?

A. Parameter Problem
B. Timer Exceeded
C. Destination Unreachable
D. Packet Too Big

Answer: C

Question: 484
Which of the following terms is used to represent IPv6 addresses?

A. Colon-hexadecimal
B. Colon-dot
C. Hexadecimal-dot notation
D. Dot notation

Answer: A

Question: 485
Which of the following protocols does PPP use to control functions on Layer 3?
Each correct answer represents a complete solution. Choose three.

A. LCP

Lead your way to certificates!


B. IPCP
C. Pv6CP
D. CDPCP

Answer: B, C, D

Question: 486
Network interface cards consist of a number of IPv6 addresses, each with a different prefix,
depending on the destination or network function required. Which of the following IPv6
address prefixes is reserved for the Geographic-based Unicast addresses?

A. 100
B. 001
C. 0000 010
D. 0000 001

Answer: A

Question: 487
Which of the following reference RFCs is used to define the unique requirements of IPv4
Internet routers?

A. RFC 1700
B. RFC 2800 STD 1
C. RFC 1812
D. RFC 1122 and RFC 1123

Answer: C

Question: 488
An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6
tackles addressing and routing-table problems, and improves the protocol as well. Which of
the following statements is true about IPv6?

A. It uses symmetric key encryption.


B. It eliminates the primary need for Network Address Translation (NAT).
C. It implements broadcasting.
D. Its address is 32 bits in length.

Answer: B

Question: 489
Which of the following are the parts of an IPv6 packet?
Each correct answer represents a part of the solution. Choose three.

Lead your way to certificates!


A. Fixed Header
B. Optional Extension Header
C. Protocol Information Header
D. Payload

Answer: A, B, D

Question: 490
What are the advantages of stateless autoconfigration in IPv6?
Each correct answer represents a part of the solution. Choose three.

A. Ease of use.
B. No server is needed for stateless autoconfigration.
C. It provides basic authentication to determine which systems can receive configuration data .
D. No host configuration is necessary.

Answer: A, B, D

Question: 491
Which of the following features belong to the Generic Routing Encapsulation (GRE) tunneling
protocol?
Each correct answer represents a complete solution. Choose all that apply.

A. GRE provides implicit protection against recursive encapsulation.


B. GRE provides explicit protection against recursive encapsulation.
C. GRE tunnels are designed to be completely stateless.
D. GRE is used for creating a virtual point-to-point link.
E. GRE supports multiprotocol tunneling.
F. GRE tunnels are designed to be completely stateful.

Answer: B, C, D, E, F

Question: 492
Fill in the blank with the appropriate word(S):
A virtual private network connection uses the public telecommunication infrastructure and can
be visualized as a ____________.

A. pipe within a pipe

Answer: A

Question: 493
An OSPF domain is divided into areas that are labled with 32-bit area identifiers. Place the

Lead your way to certificates!


OSPF area names to their appropriate places:

A.

Lead your way to certificates!


Answer: A

Question: 494
A BGP router is learning the same route from two different eBGP peers - peer1 and peer2.
The AS_path information from peer1 is {2248,56,41}, and the AS_path information from peer2
is {2235,61}. Which BGP attributes can be adjusted in order to force the router to prefer the
route that is advertised by peer1?
Each correct answer represents a part of the solution. Choose two.

A. Community
B. Local preference
C. Weight
D. Next-hop

Answer: B, C

Question: 495
Drag the Ipv6 Header Fields to their appropriate places.

Lead your way to certificates!


A.

Answer: A

Question: 496
Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a
remote location and a public IPv4 address, instead of public IPv6 address, has been assigned
to the computer?

A: ISATAP
B: PortProxy
C: Teredo
D: 6to4

Lead your way to certificates!


Answer: D

Question: 497
Drag the GRE packet fields to their appropriate places.

A.

Lead your way to certificates!


Answer: A

Question: 498
Which of the following are requirements of OSPF router connections?
Each correct answer represents a part of the solution. Choose all that apply.

A. The routers must not be passive in the command interface.


B. Interfaces' primary addresses must be in the same subnet.
C. K values used in metric calculations must match.
D. Router IDs must be the same.
E. Hello timer and the Hold timer must match.

Answer: A, B, E

Question: 499
Which of the following statements are true about EIGRP?
Each correct answer represents a complete solution. Choose all that apply.

A. It incorporates a neighbor discovery/recovery process.


B. It makes use of fixed length supernet masks.
C. It is a distance-vector protocol.
D. It makes use of variable length subnet masks.
E. It is a link-state routing protocol.
F. It supports for single network-layer protocols.
G. It is based on a route calculation algorithm called the Diffusing Update Algorithm (DUAL).

Answer: A, C, D, G

Question: 500
Which of the following protocols is used in large networks working as service providers?

A. Enhanced Interior Gateway Routing protocol (EIGRP)


B. Intermediate System-to-Intermediate System protocol (IS-IS)
C. External Border Gateway protocol (eBGP)
D. Open Shortest Path First protocol (OSPF)

Answer: B

Question: 501
Which of the following technologies is used by the Enhanced Interior Gateway Routing
protocol to enable other routers to dynamically discover about other routers on their directly
attached networks?

Lead your way to certificates!


A: Reliable Transport Protocol (RTP)
B: DUAL finite-state machine
C: Protocol-dependent modules
D: Neighbor discovery/recovery mechanism

Answer: D

Question: 502
Fill in the blank with the appropriate word.
____________uses a combination of bandwidth, delay, load, and reliability to compare routes
and select the best possible path.

A. EIGRP

Answer: A

Question: 503
Which of the following statements is TRUE about VPN tunneling?

A. It is an optional feature of VPN that increases the network performance when turned on.
B. It is a marketing strategy to sell VPN products cheaply in return for expensive service contr
acts.
C. It refers to the encapsulation of packets within the packets of a different protocol to create
and maintain the virtual circuit.
D. It is a method used by system administrators to detect hackers on the network.

Answer: C

Question: 504
An EIGRP network design reveals that a router has five distinct paths from itself to the Data
Center subnets. Which of the following commands can be used to find all the possible next-
hop IP routes for these five routes?

A. show ip eigrp topology all-learned


B. show ip eigrp topology
C. show ip route eigrp all-links
D. show ip route eigrp
E. show ip eigrp topology all-links

Answer: E

Question: 505
You work as a network administrator for uCertify Inc. The company has planned to add IPv6
support. For the first year, the IPv6 addresses will be in small packets spread around the

Lead your way to certificates!


existing IPv4 network. When the application team tests IPv6-enabled servers, the network is
flooded with IPv6 traffic.
Which of the following tools can be used for the IPv6 deployment?

A. Multipoint tunnels
B. Native IPv6
C. Point-to-point tunnels
D. NAT-PT

Answer: A

Question: 506
Which of the following is the administrative distance assigned to external BP routes by default?

A. 5
B. 200
C. 1
D. 20
E. 0

Answer: D

Question: 507
Choose and reorder the correct steps in which a BGP router determines the best path to a
destination.

A.

Lead your way to certificates!


Answer: A

Question: 508
Which of the following statements is TRUE for EIGRP queries?

A. EIGRP queries cannot propagate over autonomous systems.


B. EIGRP queries require replies before network convergence.
C. EIGRP queries prevent routers from stuck in active (SIA) state.
D. EIGRP queries can be contained by disabling route summarization.

Answer: B

Lead your way to certificates!

Anda mungkin juga menyukai