Вы находитесь на странице: 1из 10

DsmbISP Chapter 6 - (Version 4.

1)
Written By Beni Muhaemin on Sunday, April 29, 2012 | 8:21 AM 1. What is the purpose of a routing protocol? *It allows a router to share information about known networks with other routers.

2. Why is fast convergence desirable in networks that use dynamic routing protocols? *Routers may make incorrect forwarding decisions until the network has converged.

3. In which situation would a company register for its own autonomous system number (ASN)? *when the company uses two or more ISPs

4. What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority? *autonomous system

5. Which protocol is an exterior routing protocol? *BGP

6. What device enables an ISP to connect with other ISPs to transfer data? *border gateway router

7. Which part of an IP packet does the router use to make routing decisions? *destination IP address

8. What statement is true regarding an AS number? *AS numbers are controlled and registered for Internet use.

9. Which routing protocol is used to exchange data between two different ISPs? *BGP

10. Consider this routing table entry:

R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1

What type of route is this? *a RIP route

11. Refer to the exhibit. If all routers are running RIP and network 10.0.0.0 goes down, when will R3 learn that the network is no longer available? *immediately

12. What information is included in RIPv2 routing updates that is not included in RIPv1 updates? *subnet mask

13. What two types of businesses would benefit from registering as their own autonomous systems? (Choose two.) *a global business with connections to multiple local ISPs *a medium-sized nationwide business with Internet connectivity through different ISPs

14. Which two statements describe static routes? (Choose two.) *They require manual reconfiguration to accommodate network changes. *They are identified in the routing table with the prefix S

15. What is the difference between interior and exterior routing protocols? *Interior routing protocols are used to communicate within a single autonomous system.

16. Refer to the exhibit. Which configuration command or commands contributed to the output that is shown? *routerA(config-router)# network 192.168.3.0

17. Refer to the exhibit. All of the routers are running RIP. There are two paths from router A to the 192.168.3.0 network. Based on the output of the show ip route command on router A, which route was entered into the routing table and why? *A,B,C,D because it has the lowest metric

18. What is the purpose of the network command in configuring RIP? *to identify the directly connected networks that will be announced in RIP updates

19. Refer to the exhibit. If connectivity between the two hosts is maintained, what is the maximum number of RIP routers that can be in the path from HostA to HostB? *15

20. Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will router B do? *use the default route

You are here: Home / Cisco Associate / CCNA / CCNA Discovery / DsmbISP Chapter 6 CCNA Discovery 2 4.1 2012 2013 100% DsmbISP Chapter 6 CCNA Discovery 2 4.1 2012 2013 100% January 1, 2012 by HeiseR 1 Comment and 0 Reactions Take Assessment DsmbISP Chapter 6 CCNA Discovery: Working at a Small-toMedium Business or ISP (Version 4.1) Answers 2012 2013 1. Which command is used to view the RIP routing protocol settings and configuration? show version show ip route show interface show ip protocols 2. Refer to the exhibit. What is the maximum number of RIP routers that could separate HostA and HostB and still leave the hosts with connectivity to each other? 14 15 16 17 3. In which situation would a company register for its own autonomous system number (ASN)? when the companys ISP adds connection points to the Internet when additional routers are added to the corporate internetwork when more than one interior routing protocol is used when the company uses two or more ISPs 4. Consider this routing table entry R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1 What type of route is this? a static route

a default route a RIP route an OSPF route an EIGRP route a directly-connected route 5. What is the difference between interior and exterior routing protocols? Exterior routing protocols are only used by large ISPs. Interior routing protocols are used by small ISPs. Interior routing protocols are used to route on the Internet. Exterior routing protocols are used inside organizations. Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains. Interior routing protocols are used to communicate within a single autonomous system. Exterior routing protocols are used to communicate between multiple autonomous systems. 6. What information is included in RIPv2 routing updates that is not included in RIPv1 updates? metric subnet mask area identification hop count autonomous system number 7. Which routing protocol is used to exchange data between two different ISPs? BGP EIGRP OSPF RIP v2 8. Refer to the exhibit. Which configuration command or commands contributed to the output that is shown? routerA(config-router)# no version 2 routerA(config)# interface fa0/0 routerA(config-if)# ip address 172.19.0.0 255.255.0.0 routerA(config-router)# network 192.168.3.0 routerA(config)# no ip default-gateway 9. Refer to the exhibit. If all routers are running RIP and network 10.0.0.0 goes down, when will R3 learn that the network is no longer available? in 30 seconds in 60 seconds in 90 seconds Immediately 10. What statement is true regarding an AS number? AS numbers are controlled and registered for Internet use. Interior routing protocols require registered AS numbers. ISPs require all customers to have registered AS numbers. All routers at an ISP must be assigned the same AS number. 11. What is the purpose of the network command used when configuring RIP? to specify whether RIPv1 or RIPv2 will be used as the routing protocol to allow the router to monitor RIP updates that occur on other routers to identify which networks on the router will send and receive RIP updates to configure the IP address on an interface that will use RIP to identify all of the remote networks that should be reachable from the router 12. Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network? router# show ip address router# show ip route

router# show ip networks router# show ip interface brief router# debug ip protocol router# debug rip update 13. What is the purpose of a routing protocol? It is used to build and maintain ARP tables. It provides a method for segmenting and reassembling data packets. It allows an administrator to devise an addressing scheme for the network. It allows a router to share information about known networks with other routers. It provides a procedure for encoding and decoding data into bits for packet forwarding. 14. What device enables an ISP to connect with other ISPs to transfer data? border gateway router DSLAM web server interior router 15. Which command will display RIP routing updates as they are sent and received? show ip route show ip rip debug ip rip show ip protocols show ip rip database 16. Which part of an IP packet does the router use to make routing decisions? source IP address source MAC address destination IP address destination MAC address 17. What two types of businesses would benefit from registering as their own autonomous systems? (Choose two.) a home business with one ISP connection a global business with connections to multiple local ISPs a medium-sized nationwide business with Internet connectivity through different ISPs a large enterprise with two connections to the same ISP a small ISP with a single Internet connection through a larger ISP 18. Which command will display RIP activity as it occurs on a router? debug ip rip show ip route show ip interface show ip protocols debug ip rip config show ip rip database 19. Why is fast convergence desirable in networks that use dynamic routing protocols? Routers will not allow packets to be forwarded until the network has converged. Hosts are unable to access their gateway until the network has converged. Routers may make incorrect forwarding decisions until the network has converged. Routers will not allow configuration changes to be made until the network has converged. 20. Which two statements describe static routes? (Choose two.) They are created in interface configuration mode. They require manual reconfiguration to accommodate network changes. They automatically become the default gateway of the router. They are identified in the routing table with the prefix S They are automatically updated whenever an interface is reconfigured or shutdown.

21. Which two statements or sets of statements describe differences between link-state and distance vector routing protocols? (Choose two.) Link-state routing protocols routinely use more bandwidth for updates than do distance vector routing protocols. Distance vector routing protocols update all routers at one time. Link-state routing protocols update one router at a time. Link-state routers only know about directly connected routers. Distance vector routers know about every router in the network. Link-state routing protocols update when a change is made. A network using distance vector routing protocols only updates at a specific interval. Distance vector routing protocols have limited information about the entire network. Link state routing protocols know about all routers in the network. In case of similar topologies, networks using link-state routing protocols typically converge more rapidly than do networks using distance vector routing protocols. 22. Which protocol is an exterior routing protocol? BGP EIGRP OSPF RIP 23. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.) Ping show arp Traceroute show ip route show interface show cdp neighbor detail 24. What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority? Internet intranet virtual private network autonomous system 25. Refer to the exhibit. All of the routers are running RIP. There are two paths from router A to the 192.168.3.0 network. Based on the output of the show ip route command on router A, which route was entered into the routing table and why? A,B,C,D because it has the lowest administrative distance A,E,F,G,D because it has the lowest administrative distance A,B,C,D because it has the lowest metric A,E,F,G,D because it has the lowest metric 26. A network is converged and the routing tables are complete. When a packet needs to be forwarded, what is the first criterion used to determine the best path in the routing table? the route with the highest bandwidth the route with the smallest administrative distance the route with the longest address and mask match to the destination the route with the best combination of administrative distance and lowest cost 27. Refer to the exhibit. If connectivity between the two hosts is maintained, what is the maximum number of RIP routers that can be in the path from HostA to HostB? 14 15

16 17 28. What is the purpose of the network command in configuring RIP? to specify whether RIPv1 or RIPv2 will be used as the routing protocol to allow the router to monitor RIP updates that occur on other routers to identify the directly connected networks that will be announced in RIP updates to configure the IP address on an interface that will use RIP to identify all of the remote networks that should be reachable from the router 29. Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What willrouter B do? drop the packet use the default route forward the packet via the route to 10.16.1.0 forward the packet via the route to 10.16.1.64 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++
1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.) ATM CHAP IPsec IPX MPLS PPTP 2. What are the three main functions of a secure VPN? (Choose three.) accounting authentication authorization data availability data confidentiality data integrity 3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.) AES DES AH hash MPLS RSA 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? Data is being transmitted from the subscriber to the headend. Data is flowing downstream. Cable television transmissions are interfering with voice and data transmissions. The system is experiencing congestion in the lower frequency ranges. 5. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) use higher RF frequencies allocate an additional channel subdivide the network to reduce users on each segment

reduce the length of the local loop to 5.5 kilometers or less use filters and splitters at the customer site to separate voice from data traffic 6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.) digital certificates encryption encapsulation hashing passwords 7. What two protocols provide data authentication and integrity for IPsec? (Choose two.) AH L2TP ESP GRE PPTP 8. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.) digital certificates ESP hashing algorithms smart cards WPA 9. Which is an example of symmetric-key encryption? Diffie-Hellman digital certificate pre-shared key RSA signature 10.

Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office? a GRE tunnel a site-to-site VPN a remote-access VPN the user must be at the office location to establish a secure connection 11. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text.

The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software. Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment. Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS. 12. Which two statements about DSL are true? (Choose two.) users are on a shared medium uses RF signal transmission local loop can be up to 3.5 miles (5.5km) physical and data link layers are defined by DOCSIS user connections are aggregated at a DSLAM located at the CO 13. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworkers site? a WiMAX tower a one-way multicast satellite a WiMAX receiver an access point connected to the company WLAN 14. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used? cable DSL ISDN POTS 15. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths access method maximum data rate modulation techniques compression techniques 16.

Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network? Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network. Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network. Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network. All locations can support VPN connectivity. 17. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.) supports municipal wireless networks utilizing mesh technologies covers areas as large as 7,500 square kilometers supports point-to-point links, but not full mobile cellular-type access connects directly to the Internet through high-bandwidth connections operates at lower speeds than Wi-Fi, but supports many more users 18.

Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.) The devices must use a dedicated Layer 2 connection. The devices must have the VPN client software installed. The two parties must inspect the traffic against the same ACLs. The two parties must establish a secret key used by encryption and hash algorithms. The two parties must agree on the encryption algorithm to be used over the VPN tunnel. The devices must be authenticated before the communication path is considered secure. 19. Which statement describes cable? Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range. The cable subscriber must purchase a cable modem termination system (CMTS) Each cable subscriber has dedicated upstream and downstream bandwidth. Cable subscribers may expect up to 27 Mbps of bandwidth on the upload patch