Router B To Check The Connection To Router C
Router B To Check The Connection To Router C
2
Which of the following commands will correctly configure an extended
ACL? (Choose two).
Router(config)# access-list 18 permit tcp host 192.168.73.3 eq
25
Router(config)# access-list 102 permit tcp 10.43.0.0
0.0.255.255 any eq 80
Router(config)# access-list 187 permit tcp host
192.168.42.34
172.29.0.0 0.0.255.255 eq 23
Router(config)# access-list 99 permit host 10.217.32.3
Router(config)# access-list 128 permit tcp host 192.168.100.31
eq 23
3
Which two steps describe how to create a functional physical
connection between a router console and a terminal? (Choose two.)
Use a crossover cable to connect the terminal serial port to the
router console port.
Use a rollover cable to connect the terminal NIC to the router
console port.
Use an RJ-45 to DB-9 adapter on the terminal serial port to
connect
to the cable going to the router console.
Use a transceiver to connect a straight-through cable to the
router
console port.
Use a straight-through cable to connect the router console port to
the terminal NIC.
Use a rollover cable to connect from a terminal serial port
to the
router console port.
4
Which of the following are true regarding the use of login banners?
(Choose two.)
The message is only displayed in privileged EXEC mode.
The message can be seen by everyone who accesses the
router.
"Good morning" is an appropriate message to display.
The banners should display warning messages.
The banners should identify circuits and other devices connected
to the router.
5
Which of the following are primary functions of a router? (Choose
two.)
packet switching
microsegmentation
domain name resolution
path selection
flow control
8
What are some reasons to change the configuration register setting?
(Choose two.)
to force the system to ignore the configuration file stored
in NVRAM
to monitor password changes
to change the POST sequence
to force the router to boot the IOS from NVRAM
to force the system into ROM monitor mode
9
Which of the following describes CDP? (Choose three.)
provides information on directly connected Cisco routers
that have CDP enabled
can only be configured between Cisco devices
used for debugging Layer 4 connectivity issues
should be disabled on non-locally managed ports
presents a potential security risk
10
Which router component stores the information that is displayed by
the
show ip route command?
CPU
Flash
NVRAM
RAM
11
During initial router bootup the following line appears:
What are two possible reasons for this result? (Choose two.)
The startup-config file was not saved to RAM before reboot.
The IOS has been erased.
The router has not been configured.
The startup-config file cannot be located.
The router will not enter initial configuration dialog.
12
Which router command will generate the router output shown in the
graphic?
show arp
show protocols
show interface FastEthernet0/0
show interfaces
show hardware
13
Neither router in the graphic has a host table or DNS available. The
interfaces and passwords have been correctly configured. Which of the
following commands will initiate a Telnet session? (Choose two.)
ATL> connect CHI
ATL> telnet CHI
ATL# 192.168.4.2
ATL# connect ATL
CHI# telnet 192.168.4.1
CHI# telnet ATL
14
Which of the following statements are true regarding routed protocols?
(Choose two.)
They provide enough information in the Layer 3 address to
allow a
packet to be forwarded from one network to another.
They carry user data between networks.
They allow routers to share information about networks and their
proximity to each other.
They are used by routers to maintain routing tables.
RIP and IGRP are routed protocols.
15
16
What are the results of setting the boot field bits in the
configuration register to "0000"? (Choose two.)
The startup-config file will be ignored at bootup.
The router will load the IOS from Flash.
The router will enter ROM monitor mode upon reload.
The router will enter boot ROM mode and have limited
capabilities.
The administrator can enter the b command to manually boot the
IOS.
17
What could a Cisco support technician learn from the IOS filename
c2600-d-mz.121-3? (Choose three.)
the format of the file
the RAM memory requirements of the file
the version number of the file
the size of the file
the device platform of the file
18
Which of the following prevent successful loading of the Cisco IOS
from flash memory? (Choose two.)
a configuration register set at 0x2102
a missing startup-configuration file
a boot system command not present in the startup-config
file
an incorrect configuration register setting
a boot field set to 2
19
A network administrator issues the erase startup-config command on a
configured router with the configuration register set to 0x2102 and
observes the following output:
Erasing the nvram filesystem will remove all files! Continue? [Confirm]
[OK]
Erase of nvram: complete
If the router unexpectedly loses power after this sequence, what will
occur when power is restored?
The router will enter ROM monitor mode upon completion of the
power-on self test (POST).
The router will load the last known valid configuration file.
The router will enter Rx-boot mode.
The router will prompt the user to enter setup mode or to
continue
without entering setup mode.
20
Which commands will show the status and IP address of all interfaces
on a router? (Choose two.)
show protocols
show ip protocols
show version
show interfaces
show ip ports
21
Refer to the network and routing table entries shown in the graphic.
How much time will elapse before Router A expects to receive
another
update from Router B?
5 seconds
13 seconds
17 seconds
25 seconds
65 seconds
90 seconds
22
What can a network administrator do to recover from a lost router
password?
perform a reload or reset
telnet from another router and issue the show running-config
command
to view the password
boot the router to ROM monitor mode and configure the
router to
ignore NVRAM when it initializes
boot the router to bootROM mode and enter the b command to
load the
IOS manually
23
24
A network administrator must configure a serial interface with an IP
address. The configuration must also identify the remote site to which
the interface is connected. Which set of commands will meet these
requirements?
Chicago(config)# description San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9
255.255.255.252
Chicago(config-if)# description San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 netmask
255.255.255.252
Chicago(config-if)# description San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# remote site San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# interface description San Jose T1
25
Which of the following describe Telnet on a router? (Choose two.)
Simultaneous incoming Telnet sessions can be hosted by a
router.
Telnet is the most basic testing mechanism available.
A Telnet session can only be initiated in privileged EXEC mode.
Five separate Telnet lines are specified by the
configuration line vty 0 4.
Telnet is classified as a network layer protocol.
26
Which of the following are true regarding an interface description?
(Choose three.)
It is a message that is displayed at login.
It does not affect the operation of the router.
It contains the circuit identifiers of the interface by default.
It could allow support personnel to better understand the
scope of an
interface problem.
It could identify the purpose and location of the interface.
It wastes bandwidth and slows down interface problem resolution.
27
Refer to the graphic. Which command will create a standard ACL that
will apply to outbound traffic on interface Fa0/0 of router A and will
deny IP traffic from any host on network 172.16.34.0/24 that is
destined for network 192.168.5.0/24 while allowing all other IP
traffic?
access-list 2 deny 172.16.34.0 0.0.0.0
access-list 2 permit any
access-list 33 deny 172.16.34.0 0.0.0.255
access-list 33 permit any
access-list 42 deny 172.16.34.0
access-list 42 permit any
access-list 56 deny tcp 172.16.34.0
access-list 56 permit ip any
28
access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23
access-list 199 permit ip any any
29
31
What will occur if the command service password-encryption is entered
on a router? (Choose two).
It will allow only the user EXEC mode password to be encrypted.
It will set an MD5 hashing algorithm on all unencrypted
passwords.
It will apply a weak encryption to all unencrypted
passwords.
It will set the enable secret password to be encrypted.
It will apply an MD5 hashing algorithm to encrypt the console and
telnet passwords.
It will configure the user EXEC mode, telnet, and enable
passwords as
encrypted.
32
Due to a security violation, the router passwords must be changed.
What information can be learned from the following configuration
entries? (Choose two.)
33
What information can be learned during the initial router bootup?
(Choose two.)
the configuration register value
the number and types of interfaces installed
the router model and the amount of memory that is
available
the amount of memory required to load the IOS and configuration
the number of interfaces with connected cables
34
35
The following access list has been correctly applied to a router
interface:
Which of the following statements are true about this ACL? (Choose
three.)
This is an invalid ACL because the wildcard mask is missing from
the command.
A wildcard mask of 0.0.0.0 is assumed for 172.30.65.52.
This is an extended IP access list.
All traffic from 172.30.65.51 will be permitted.
This is a standard IP access list.
36
Which statements are true regarding setup mode? (Choose three.)
Press Ctrl-z to terminate setup mode.
Enter a question mark (?) for help at any point.
Press Spacebar to accept the default settings.
Use setup mode to enter complex protocol features.
Press Enter to accept the default settings.
Press Ctrl-c to abort configuration dialog.
37
If a PC does not have network connectivity to a router, which router
port can be used to establish communication?
console
Ethernet
serial
VTY
38
Which of the following could describe the devices labeled "?" in the
graphic? (Choose three.)
DCE
CSU/DSU
LAN switch
modem
hub
39
Which of the following are true statements regarding IGRP and RIP?
(Choose two.)
IGRP uses a combination of different metrics for path
selection.
RIP is a proprietary protocol developed by Cisco.
RIP has the ability to scale to large networks.
IGRP has the ability to scale to large networks.
40
What will occur when the following ACL is applied inbound to both
FastEthernet interfaces of Router A in the graphic?
41
A network administrator wishes to load a configuration file from a
TFTP server into NVRAM on a router. Which of the following methods
will create a startup-config file in NVRAM that matches the contents
of the configuration file on the TFTP server?
Copy the configuration file from a TFTP server using the
command copy
tftp startup-config.
Copy the configuration file from a TFTP server using the command
copy
<filename< startup-config.
Copy the file to RAM from a console connection using the copy
tftp
running-config command. Then reload the router to use the new
configuration.
Paste the configuration file to the command line of the router
while
in global configuration mode. Then issue the copy startup-config
running-config command.
42
Refer to the graphic. Assuming default metrics are used and the
network is fully converged, which path will the IGRP routing protocol
use to send a packet from Router A to Router F?
A, D, E, F
A, B, D, E, F
A, C, D, E, G, F
A, B, D, E, G, F
43
In what order will the initial startup routine of a router locate and
load the IOS if the config-register setting is 0x2102 and there are no
boot system commands present in the startup-config file?
Flash, ROM, TFTP server
RAM, Flash, NVRAM
Flash, TFTP server, ROM
ROM, TFTP server, Flash
Flash, NVRAM, RAM
ROM, Flash, TFTP server
44
Based on this partial output of the show ip route command, which
routing protocol is configured on the router?
RIP v1
RIP v2
IGRP
EIGRP
OSPF
IGP
45
Assuming the following ACL is correctly applied to a router interface,
what can be concluded about this set of commands? (Choose two.)
46
47
The following access list has been created to prevent traffic from
host 172.23.40.36 from accessing the 192.168.34.0 network.
Refer to the graphic. Which group of commands will properly place the
access list so that the host is denied access only to network
192.168.34.0?
Rome(config)# interface fa0/0
Rome(config-if)# ip access-group 44 in
Rome(config)# interface s0/1
Rome(config-if)# ip access-group 44 out
Tokyo(config)# interface s0/0
Tokyo(config-if)# ip access-group 44 in
Tokyo(config)# interface fa0/0
Tokyo(config-if)# ip access-group 44 out
48
Which of the following are valid boot system commands? (Choose
two.)
Router(config)# boot system ram
Router(config)# boot system rom
Router(config)# boot system IOS flash
Router(config)# boot system flash c2600-d-mz.121-3
192.168.10.5
Router(config)# boot system tftp c1700-l-mz.131-2
172.16.24.7
49
Which router components and operations are correctly described?
(Choose two.)
ROM - stores the backup configuration file
RAM - loads the operating system
NVRAM - stores the configuration file
Flash - executes diagnostics at bootup
POST - runs diagnostics on hardware modules
DRAM - loads the bootstrap
50