Вы находитесь на странице: 1из 11

CONFIDENTIAL

CS/JUN 2012/ITT552/562

UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION

COURSE
*

SWITCHING TECHNOLOGY/ROUTING PROTOCOLS AND CONCEPTS ITT552/562 JUNE 2012 3 HOURS

COURSE CODE EXAMINATION TIME

INSTRUCTIONS TO CANDIDATES 1. This question paper consists of two (2) parts : PART A (25 Questions) PART B (4 Questions) 2. Answer ALL questions from all two (2) parts : i) Answer PART A in the Objective Answer Sheet. ii) Answer PART B in the Answer Booklet. Start each answer on a new page. Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of : i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty

3.

4.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


This examination paper consists of 11 printed pages
Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

PART A (25 MARKS) 1. Which statements are not true regarding distance vector routing protocol? A. B. C. D. 2. Routing updates are broadcast at intervals. Hop counts can be used for path selection. EIGRP can do unequal-cost load balancing. RIPvl multicast its routing updates.

What is routing loop? ' A. A condition where a return path from a destination is different from the outbound path forming a "loop", B. A condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destination. C. A packet bouncing back and forth between two loopback interfaces on a route. D. The distribution of routes from one routing protocol into another.

3. A. B. C. D. 4.

allows RIP to avoid routing loops by advertising a metrics of infinity. Split horizon Route poisoning Maximum hop count Hold-down timer

Refer to Figure 1. What is the administrative distance of the route to the 189.80.3.0 network? <output omitted> C 189.80.1.0 is directly connected, FastEthernetO/0 C 189.80.2.0 is directly connected, Serial0/0/0 R 189.80.3.0 [120/1] via 189.80.2.2, 00:00:05, Serial0/0/0 <output omitted> Figure 1 A. B. C. D. 1 12 24 120

5.

A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information? A. Router# B. Router# C. Router# D. Router# show show show show ip ip ip ip eigrp eigrp eigrp eigrp topology interfaces adjacency neighbors CONFIDENTIAL

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CS/JUN 2012/ITT552/562

6.

Refer to Figure 2. EIGRP is configured on all routers in the network. On a basis of the show i p e i g r p t o p o l o g y output provided, what conclusion can be derived?

Rl# show i p e i g r p t o p o l o g y <output omitted> P A 1 0 . 1 . 2 . 0 / 2 4 , 1 s u c c e s s o r s , FD i s 281600 v i a Connected, F a s t E t h e r n e t 0/0 1 0 . 6 . 1 . 0 / 2 4 , , 0 s u c c e s s o r s , FD i s 3385160704, Q 1 r e p l i e s , a c t i v e 0 0 : 0 0 : 4 1 , q u e r y - o r i g i n : Local o r i g i n Remaining r e p l i e s : via 1 0 . 1 . 2 . 1 , r, FastEthernetO/0
Figure 2 A. Router R1 can send traffic destined for network 10.6.1.0/24 out of interface FastEthernetO/0. B. Router R1 is waiting for a reply from the neighbor 10.1.2.1 to the hello message sent out before it declares the neighbor unreachable 0.0.0.0/0 via 192.168.0.1. C. Router R1 is waiting for a reply from the neighbor 10.1.2.1 to the hello message sent out inquiring for a second successor to network 10.6.1.0/24. D. Router R1 is waiting for a reply from the neighbor 10.1.2.1 in response to the query sent out about network 10.6.1.0/24. 7. What will a router do if it does not have EIGRP feasible successor route to a destination network and the successor route to that destination network is in active status? A. It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies. B. It routes all traffic that is addressed to the destination network to the interface indicated in the routing table. C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network. D. It sends a copy of its neighbor table to all adjacent routers. 8. As a Cisco technician, you need to know EIGRP protocol very well. Which of the following is true about EIGRP successor routes? A. B. C. D. Successor route is used by EIGRP to forward traffic to a destination. Successor routes are saved in the topology table to be used if the primary route fails. Successor routes are flagged as "active" in the routing table. A successor route will not be backed up by a feasible successor route.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 9. The company uses EIGRP as the routing protocol. 192.168.10.64/26

CS/JUN 2012/ITT552/562

192.168.10.192/26

192.168.10.0/30

192.168.10.4/30

192.168.10.128/26 R3# show i p r o u t e Gateway of l a s t r e s o r t i s not s e t 192 1 6 8 . 1 0 . 0 / 2 4 i s v a r i a b l y s u b n e t t e d , 6 s u b n e t s , 2 masks D 1 9 2 . 1 6 8 . 1 0 . 6 4 / 2 6 [90/2195456] v i a 1 9 2 . 1 6 8 . 1 0 . 9 , 00:03:31, Serial0/0 D 1 9 2 . 1 6 8 . 1 0 . 0 / 3 0 [90/2681856] v i a 1 9 2 . 1 6 8 . 1 0 . 9 , 0 0 : 0 3 : 3 1 , Serial0/0 C 192.168.10.4/30 is directly connected, Serial 0/1 C 192.168.10.8/30 is directly connected, Serial 0/0 C 192.168.10.192/26 is directly connected, FastEthernet0/0 D 192.168.10.128/26 [90/2195456] via 192.168.10.5,00:03 31, Serial 0/1 What path will packets take from a host on 192.168.10.192/26 network to a host on the LAN attached to router R1? A. B. C. D. The path of the The path of the The path of the The path of the packets will packets will packets will packets will be R3 to R2 to R1. be R3 to R1 to R2. be both R3 to R2 to R1 and R3 to R1. be R3 to R1.

10. A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table? A. B. C. D. The OSPF route. The EIGRP route. The RIPv2 route. The OSPF and RIPv2 routes.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

11. Which of the following are not regards to RIPvl characteristic? A. B. C. D. Uses hop count as a metric. Considers a metric of 16 as infinity. Has an administrative distance of 110 by default. Calculates metrics using the Bellman Ford algorithm. ?

12. Passive interface can be implemented to prevent A. B. C. D.

Confusion if both RIPvl and RIPv2 are being advertised on a network. Wasted bandwidth and processing from unnecessary updates. Updates from being sent out without a password. Routing loops.

13. What is the reason to implement RIPv2 rather than RIPvl? A. B. C. D. Used RIPv2 supports multi-areas. RIPv2 supports more than 16 routers. RIPv2 supports routing update authentication. RIPv2 supports classful (and not classless) routing.

14. What is the command to disable automatic summarization in RIPv2?

A. Router(config)#no auto-summary B. Router(config-router)# no auto-summary C. Router(config-if)#no auto-summary


D. Not recommended to disable automatic summarization. 15. The network 182.16.192.0 with a mask of 255.255.240.0 will support A. B. C. D. 256 stations 1024 stations 4094 stations 1022 stations

16. How many hosts could be supported on a 22 bit network? A. 22

B. 1022 C. 4094
D. 512 17. Which of the following devices share the same network? A. B. C. D. 192.168.78.25/29 192.168.78.23/29 192.168.78.33/29 192.168.78.38/29 and and and and 192.168.78.23/29. 192.168.78.33/29. 192.168.78.38/29. 192.168.78.41/29.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

18. A network administrator has enabled RIP on routers B and C in Figure 3. Which of the following commands will prevent RIP updates from being sent to Router A?

Figure 3 A. A(config)# router A(config-router)# B. B(config)# router B(config-router)# B(config-router)# C.A(config)# router A(config-router)# D.B(config)# router B (config-router)# rip passive-interface SO/0 rip network 192.168.25.48 network 192.168.25.64 rip no network 192.168.25.32 rip passive-interface SO/0

19. Which of the following about Routing Protocols is correct? A. B. C. D. The The RIP The RIP 2 is a Distance Vector Protocol. RIP 1 uses bandwidth and delay as the metric. 1 uses subnet mask. hold down timer value for RIP is 240 sec.

20. What is the maximum number of hops that OSPF allows before marking a network as unreachable? A. B. C. D. 15 16 255 Unlimited.

21. Which command must be entered when connecting two routers without external DCE devices via a serial link? A. Serial up. B. DTE rate. C. DCE rate.
D. Clockrate. Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

22. R1 in A network engineer is configuring a new router. The interfaces have been configured with IP addresses and activated, but no routing protocols or static routes have been configured yet. What routes are present in the routing table? A. B. C. D. Default routes. Broadcast routes. Direct connections. No routes; the routing table is empty.

23. Which routing principle is correct? A. If one router has certain information in its routing table, all adjacent routers have the same information. B. Routing information about a path from one network to another implies routing information about the reverse or return path. C. Every router makes its routing decision alone, based on the information it has in its own routing table. D. Every router makes its routing decisions based on the information it has in its own routing table and its neighbor routing tables. 24. What could be the rationale behind using p a s s i v e - i n t e r f a c e command when configuring a router? A. B. C. D. Allows interfaces to share common IP addresses. Allows an interface to remain up without the aid of keepalives. Allows a router to send routing and not receive updates via that interface. Allows a router to receive routing updates on an interface but not send updates via that interface.

25. When presented with multiple valid routes to a destination, what criteria does a router use to determine which routes to add to the routing table? A. The router selects the routes with the best metric. All routes that have the same best metric are added to the routing table. B. The router first selects routes with the lowest administrative distance. The resulting routes are then prioritized by metric and the routes with the best metric are added to the routing table. C. The router selects the routes with the lowest administrative distance. All routes with the same lowest administrative distance are added to the routing table. D. The router installs all routes in the routing table but uses the route with the best metric most when load balancing.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

PART B (75 MARKS)

QUESTION 1 a) Router A in Figure 1 is not receiving the routes from Router B about network 192.168.3.16. Figure 2 shows the configurations for Router A and B. You try to run #debug i p e i g r p command on Router B and the output display: IP-EIGRP: 1 9 2 . 1 6 8 . 3 . 1 6 / 2 8 - d e n i e d by d i s t r i b u t e l i s t IP-EIGRP: 1 9 2 . 1 6 8 . 3 . 1 6 / 2 8 - do n o t a d v e r t i s e o u t S e r i a l O IP-EIGRP: 1 9 2 . 1 6 8 . 3 . 0 / - do a d v e r t i s e o u t S e r i a l As a network engineer, you are responsible to troubleshoot this problem. You believe that there are two possible reasons for this. One is due to misconfigured network number and the other reason could be manual or auto-summarization across major network boundary. Explain your thought and give TWO (2) possible solutions to this problem.

192.168.3.16 192.168.3.33/28 Update rejected by Router A Figure 1


Router A# interface etherriet 0 ip address 172.16.3.1 255.255.255.0 interface serial 0 : ip address 10.1.1.1 255.255.255,0 router eigrp 1 network 172.l&vO.O ,.;/. network 10.0.0.0 : Router B# interface ethernet 0 H ip address:: 192 .168 , 3.17 255 .255, 255 ,240 interface:" serial:: 0 . :; : ; ;ip;;: addres s : lu:.l M . 2/ 2 55 .255 .255 . 0 : ; router eigrp Tl /' .. ::netwbE:f:k ::i;i::.:;;. GiJQ":& v-distcibute-l^ access-list 1 permit 192.168.3.160 0.0.0.15

Sending update ' 192.168.3.0/24

192.168.3.21/28

Figure 2 (8 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/JUN 2012/ITT552/562

b) State ONE (1) reason why link state routing protocols require lots of memory. (1 mark) c) Your are required to solve EIGRP Neighbor Problem below: i) RTR A and RTR B Autonomous System (AS) number have been configured as shown in Figure 3. However, no EIGRP neighbor relationship is formed between the two routers. What could be the reason? Show the step to resolve the problem.

RTR B#shoW running-confi g interface serial 0 IP address 10.1.1.1 255 255 255 0 router eigrp 11 network 10 .0.0.0 RTR A#show running- conf ig Interface serial 0 IP address 10.1.1.2 255 255 .255 0 router eigrp 1 network 10 .0.0.0 Figure 3 (3 marks) ii) Briefly explain DUAL concept. (2 marks) iii) Below is an opinion of David "Davis CCIE, MCSE+I, SCSA": "While there is often a "right tool for the job," all routing protocols have their strengths and weaknesses, and I don't believe that there is a clear-cut best routing protocol that is the right tool for every network." Do you agree with his view? Please support your answer with TWO (2) strengths and TWO (2) weaknesses of any two routing protocols and give ONE (1) example of scenario for each routing protocol as guidance on when it makes sense to use one or the other. (6 marks)

QUESTION 2 a) State FOUR (4) techniques how distance vector routing protocols prevent routing loops. (4 marks) b) RIPv2 and EIGRP is a type of distance vector routing protocol. Explain THREE (3) features of each type. (6 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

10

CS/JUN 2012/ITT552/562

c) State the command necessary in both version of RIP (RIPvl and RIPv2) to propagate a static default route. (2 marks) d) RIPvl network are automatically summarized across major network boundaries. Describe in detail the implication of automatic summarization with the help of Figure 4. (8 marks)

Figure 4

QUESTION 3 a) Show how to protect a router: i) from being viewed and configured by unauthorized users, ii) from being accessed remotely, iii) console port. (6 marks) b) Briefly explain the differences between static and dynamic routing in terms of: i) ii) iii) iv) configuration complexity. scaling. security. resources usage. (4 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL c)

11

CS/JUN 2012/ITT552/562

You were given the network address 192.168.1.0/24 to subnet and provide the IP addressing for a network. VLSM will be used so that the addressing requirements can be met using the 192.168.1.0/24 network. The network has the following addressing requirements: LAN 1:28 nodes LAN 2: 22 nodes LAN 3: 30 nodes LAN 4: 12 nodes LAN 5: 8 nodes (Note: It is not necessary to supply an address for the WAN connection because the Internet service provider supplies it.) (6 marks)

d)

State TWO (2) advantages of VLSM. (2 marks)

QUESTION 4 a) A new engineer is seeking for some advices from you. The company he is working with is planning to use OSPF for its network. Explain to him THREE (3) criteria that he is supposed to consider in making the decision. (6 marks) b) Explain why fast convergence of a network is crucial. (2 marks) c) Differentiate between the three updates below : i) Bounded update ii) Triggered update iii) Partial update (3 marks) d) One of the challenges presented by multi-access network is extensive LSA flooding. What would be the effect of extensive LSA flooding? Explain in detail how OSPF solve this issue. (6 marks)

END OF QUESTION PAPER

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

Вам также может понравиться