Items of practical training certificates Cisco CCNA: Copy to TFTP Server
Start practicing: Link here
Categories
- BCRAN Knowledgenet Labs (2)
- BSCI Knowledgenet Labs (2)
- BSMSN Knowledgenet Labs (2)
- CBTN CCIE Video Practice Lab CCIE Labs Mega Package (1)
- CCIE RS Practice Labs (1)
- CCNA - Hotspot Questions (1)
- CCNA 1 - Chapter 1 (1)
- CCNA 1 - Chapter 10 (1)
- CCNA 1 - Chapter 11 (1)
- CCNA 1 - Chapter 2 (1)
- CCNA 1 - Chapter 3 (1)
- CCNA 1 - Chapter 4 (1)
- CCNA 1 - Chapter 5 (1)
- CCNA 1 - Chapter 6 (1)
- CCNA 1 - Chapter 7 (1)
- CCNA 1 - Chapter 8 (1)
- CCNA 1 - Chapter 9 (1)
- CCNA 1 - Final Exam (1)
- CCNA 1 Final Exam 640 - 80Test Module Online (1)
- CCNA 2 - Chapter 1 (1)
- CCNA 2 - Chapter 10 (1)
- CCNA 2 - Chapter 11 (1)
- CCNA 2 - Chapter 2 (1)
- CCNA 2 - Chapter 3 (1)
- CCNA 2 - Chapter 4 (1)
- CCNA 2 - Chapter 5 (1)
- CCNA 2 - Chapter 6 (1)
- CCNA 2 - Chapter 7 (1)
- CCNA 2 - Chapter 8 (1)
- CCNA 2 - Chapter 9 (1)
- CCNA 2 - Final Exam (A) (1)
- CCNA 2 - Final Exam (B) (1)
- CCNA 2 - Final Exam (C) (1)
- CCNA 3 - Chapter 1 (1)
- CCNA 3 - Chapter 2 (1)
- CCNA 3 - Chapter 3 (1)
- CCNA 3 - Chapter 4 (1)
- CCNA 3 - Chapter 5 (1)
- CCNA 3 - Chapter 6 (1)
- CCNA 3 - Chapter 7 (1)
- CCNA 3 - Final Exam (1)
- CCNA 4 - Chapter 1 (1)
- CCNA 4 - Chapter 2 (1)
- CCNA 4 - Chapter 3 (1)
- CCNA 4 - Chapter 4 (1)
- CCNA 4 - Chapter 5 (1)
- CCNA 4 - Chapter 6 (1)
- CCNA 4 - Chapter 7 (1)
- CCNA 4 - Chapter 8 (1)
- CCNA 4 - Final Exam (A) (1)
- CCNA 4 - Final Exam (B) (1)
- CCNA 4 - Final Exam (C) (1)
- CCNA 4 - Voucher (1)
- CCNA Drag and Drop Questions (1)
- CCNA EIGRP LAB Question (2)
- CCNA full course including simulators dumps etc (1)
- CCNA Implementation SIM (1)
- CCNA lab (2)
- CCNA Lab Manual by ESP (1)
- CCNA Lab: Copy to TFTP Server (2)
- CCNA Lab: IGRP Routing (2)
- CCNA Lab: Initial Switch Configuration (2)
- CCNA Lab: RIP Routing (2)
- CCNA Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0) (1)
- CCNA Practice Certification Exam 2 (1)
- CCNA Troubleshooting Questions 1 (1)
- CCNA Troubleshooting Questions 2 (1)
- CCNA v4.0 Test module (15)
- CCNA VOICE Official Guide (2)
- CCNA WAN Questions (1)
- CCNA: Cisco Certified Network Associate: Fast Pass (2)
- CCNA1 (20)
- CCNA1 Test Module (6)
- CCNA2 (26)
- CCNA2 FINAL2 (new 25/12/08) (1)
- CCNA3 (15)
- CCNA3 – Answers chapter 4 v.4.0 (100/100) (2)
- CCNA4 (19)
- CCNP BSCI 642-901 Curriculum Labs (1)
- CCNP lab online (2)
- CCNP ONT 10 Lab Guide (1)
- CCNP_BCMSN Lab: Configuring a Distribution Switch (2)
- Cisco 6509 Lab (2)
- Cisco IOS access lists: 10 things you should know (2)
- Cisco Network Magic Pro 5.0.8282 (2)
- Cisco Training CCNA IP Addressing - Part 1 of 5 (1)
- CIT Lab (2)
- GNS3-Topology: CCNA CCNP Full Mesh Topology Template (1)
- IP adress (1)
- Lab (6)
- Lab 2 (2)
- Latest News CCNA (2)
- MCSA (2)
- Modelling the CCNA Topology (2)
- PacketTrap Ping Scan 1.1.3301 (2)
- Pix Firewall Simulator (2)
- Subnetting in 6 easy steps - part 1 (1)
- Test Module Online (31)
- TESTKING (5)
- TESTKING 640-802-v23 (1)
- TESTKING 640-802V13 (1)
- TESTKING 640-802v17 (1)
- Update today (17)
Live Traffic
Monday, December 22, 2008
CCNA Lab: Copy to TFTP Server
Posted by
CCNA v4.0
at
10:27 AM
0
comments
CCNA Lab: RIP Routing
Items of practical training certificates Cisco CCNA: RIP Routing
Start practicing: RIP Routing
Posted by
CCNA v4.0
at
6:57 AM
0
comments
Labels: CCNA Lab: RIP Routing, Update today
CCNA Lab: RIP Routing
Items of practical training certificates Cisco CCNA: RIP Routing
Start practicing: RIP Routing
Posted by
CCNA v4.0
at
6:57 AM
0
comments
Labels: CCNA Lab: RIP Routing, Update today
CCNA Lab: IGRP Routing
Items of practical training certificates Cisco CCNA: IGRP Routing
Start practicing: Link here
Posted by
CCNA v4.0
at
6:53 AM
0
comments
Labels: CCNA Lab: IGRP Routing, Update today
CCNA Lab: IGRP Routing
Items of practical training certificates Cisco CCNA: IGRP Routing
Start practicing: Link here
Posted by
CCNA v4.0
at
6:53 AM
0
comments
Labels: CCNA Lab: IGRP Routing, Update today
CCNA Lab: Initial Switch Configuration
Items of practical training certificates Cisco CCNA: Initial Switch Configuration
Start practicing: Initial Switch Configuration
Posted by
CCNA v4.0
at
4:43 AM
0
comments
Labels: CCNA Lab: Initial Switch Configuration, Update today
CCNA Lab: Initial Switch Configuration
Items of practical training certificates Cisco CCNA: Initial Switch Configuration
Start practicing: Initial Switch Configuration
Posted by
CCNA v4.0
at
4:43 AM
0
comments
Labels: CCNA Lab: Initial Switch Configuration, Update today
Saturday, December 20, 2008
CCNA EIGRP LAB Question
Question:
After adding R3 router, no routing updates are being exchanged between R3 and the new location. All other inter connectivity and Internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.
Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are cisco.
IP addresses are listed in the chart below.
R1 Fa0/0: 192.168.77.33 | R2 Fa0/0: 192.168.60.97 |
R3 Fa0/0: 192.168.77.34 | R4 Fa0/0: 192.168.60.129 |
Answer and explanation:
We should check the configuration of the new added router first because it does not function properly while others work well. From the command line interface of R3 router, enter the show running-config command
From the output above, we know that this router was wrongly configured with an autonomous number (AS) of 22. When the AS numbers among routers are mismatched, no adjacency is formed.
(You should check the AS numbers on other routers for sure)
To solve this problem, we simply re-configure router R3 with the following commands:
R3>enable (you have to enter cisco as its password here)
R3#configure terminal
R3(config)#no router eigrp 22
R3(config)#router eigrp 212
R3(config-router)#network 192.168.60.0
R3(config-router)#network 192.168.77.0
R3(config-router)#no auto-summary
R3(config-router)#end
R3#copy running-config startup-config
Check R1 router with the show running-config command:
Notice that it is missing a definition to the network R3. Therefore we have to add it so that it can recognize R3 router
R1>enable (you have to enter cisco as its password here)
R1#configure terminal
R1(config)#router eigrp 212
R1(config-router)#network 192.168.77.0
R1(config-router)#end
R1#copy running-config startup-config
Now the whole network will work well. You should check again with ping command from router R3 to other routers!
Read more...
Posted by
CCNA v4.0
at
12:58 AM
0
comments
Labels: CCNA EIGRP LAB Question, Update today
CCNA EIGRP LAB Question
Question:
After adding R3 router, no routing updates are being exchanged between R3 and the new location. All other inter connectivity and Internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.
Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are cisco.
IP addresses are listed in the chart below.
R1 Fa0/0: 192.168.77.33 | R2 Fa0/0: 192.168.60.97 |
R3 Fa0/0: 192.168.77.34 | R4 Fa0/0: 192.168.60.129 |
Answer and explanation:
We should check the configuration of the new added router first because it does not function properly while others work well. From the command line interface of R3 router, enter the show running-config command
From the output above, we know that this router was wrongly configured with an autonomous number (AS) of 22. When the AS numbers among routers are mismatched, no adjacency is formed.
(You should check the AS numbers on other routers for sure)
To solve this problem, we simply re-configure router R3 with the following commands:
R3>enable (you have to enter cisco as its password here)
R3#configure terminal
R3(config)#no router eigrp 22
R3(config)#router eigrp 212
R3(config-router)#network 192.168.60.0
R3(config-router)#network 192.168.77.0
R3(config-router)#no auto-summary
R3(config-router)#end
R3#copy running-config startup-config
Check R1 router with the show running-config command:
Notice that it is missing a definition to the network R3. Therefore we have to add it so that it can recognize R3 router
R1>enable (you have to enter cisco as its password here)
R1#configure terminal
R1(config)#router eigrp 212
R1(config-router)#network 192.168.77.0
R1(config-router)#end
R1#copy running-config startup-config
Now the whole network will work well. You should check again with ping command from router R3 to other routers!
Read more...
Posted by
CCNA v4.0
at
12:58 AM
0
comments
Labels: CCNA EIGRP LAB Question, Update today
CCNA: Cisco Certified Network Associate: Fast Pass
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.
The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:
* Designing Cisco internetworks
* Developing an access list
* Evaluating TCP/IP communication
* Configuring routers and switches
* Configuring IP addresses, subnet masks, and gateway addresses
* Performing LAN, VLAN, and WAN troubleshooting
* Understanding rules for packet control
The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.
The perfect companion to Sybex's CCNA: Cisco Certified Network Associate Study Guide, Sixth or Deluxe editions, or any CCNA study tool
The Perfect CCNA Preparation and Review Tool
Many candidates who complete a Study Guide or course also appreciate a review tool that helps them brush up on key topics. Sybex's CCNA Fast Pass, Third Edition, is that tool. This streamlined book hones in on critical information for the new CCNA exam 640-802, including network planning and design, implementation and operation, troubleshooting, and technology. Study, review, and practice with this practical study aid, then take the exam with confidence.
* Easy-to-use book is organized by exam objectives for quick review
* Flexible Fast Pass goes hand-in-hand with any learning tool on the market
* Exam Essentials in each chapter helps you zero in on what you need to know
* Book includes review questions, practice tools, and two practice exams
* Targeted and expert content from leading Cisco networking authority, Todd Lammle
Look inside for complete review coverage of all exam objectives for CCNA Exam 640-802
Download here (8.3M pdf)
Posted by
CCNA v4.0
at
12:25 AM
0
comments
Labels: CCNA: Cisco Certified Network Associate: Fast Pass, Update today
CCNA: Cisco Certified Network Associate: Fast Pass
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.
The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:
* Designing Cisco internetworks
* Developing an access list
* Evaluating TCP/IP communication
* Configuring routers and switches
* Configuring IP addresses, subnet masks, and gateway addresses
* Performing LAN, VLAN, and WAN troubleshooting
* Understanding rules for packet control
The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.
The perfect companion to Sybex's CCNA: Cisco Certified Network Associate Study Guide, Sixth or Deluxe editions, or any CCNA study tool
The Perfect CCNA Preparation and Review Tool
Many candidates who complete a Study Guide or course also appreciate a review tool that helps them brush up on key topics. Sybex's CCNA Fast Pass, Third Edition, is that tool. This streamlined book hones in on critical information for the new CCNA exam 640-802, including network planning and design, implementation and operation, troubleshooting, and technology. Study, review, and practice with this practical study aid, then take the exam with confidence.
* Easy-to-use book is organized by exam objectives for quick review
* Flexible Fast Pass goes hand-in-hand with any learning tool on the market
* Exam Essentials in each chapter helps you zero in on what you need to know
* Book includes review questions, practice tools, and two practice exams
* Targeted and expert content from leading Cisco networking authority, Todd Lammle
Look inside for complete review coverage of all exam objectives for CCNA Exam 640-802
Download here (8.3M pdf)
Posted by
CCNA v4.0
at
12:25 AM
0
comments
Labels: CCNA: Cisco Certified Network Associate: Fast Pass, Update today
Friday, December 19, 2008
Cisco IOS access lists: 10 things you should know
Takeaway: Access control lists (ACLs) are a fundamental part of working with routers. How much do you know about managing these vital gatekeepers? David Davis lists 10 things every administrator should know about working with Cisco IOS ACLs.
People who read this, also read...
Playing with Cisco access lists
Use advanced parameters on your Cisco IOS ACLs
Traffic filtering with Cisco access lists: Why, how, and what to consider
Learn additional uses for Cisco IOS access control lists
Protect your network with the Cisco IOS Firewall
If you work with Cisco routers, you're more than likely familiar with Cisco IOS access control lists (ACLs). But that doesn't mean you know all there is to know about these important gatekeepers. Access lists are an integral part of working with routers, and they're vital to security.
Because ACLs are a fundamental part of router administration, I want to address 10 things you should know about working with these lists. If you're new to working with Cisco routers, this list offers a good foundation to get you started. But even if you've worked with Cisco routers for a while, it never hurts to review the basics—you might even learn something new.
So, without any further ado, here are 10 things you need to know about Cisco IOS access lists, beginning with the basic definition of an ACL.
What is an access control list?
In the Cisco IOS, an access control list is a record that identifies and manages traffic. After identifying that traffic, an administrator can specify various events that can happen to that traffic.
What's the most common type of ACL?
IP ACLs are the most popular type of access lists because IP is the most common type of traffic. There are two types of IP ACLs: standard and extended. Standard IP ACLs can only control traffic based on the SOURCE IP address. Extended IP ACLs are far more powerful; they can identify traffic based on source IP, source port, destination IP, and destination port.
What are the most common numbers for IP ACLs?
The most common numbers used for IP ACLs are 1 to 99 for standard lists and 100 to 199 for extended lists. However, many other ranges are also possible.
Standard IP ACLs: 1 to 99 and 1300 to 1999
Extended IP ACLs: 100 to 199 and 2000 to 2699
How can you filter traffic using ACLs?
You can use ACLs to filter traffic according to the "three P's"—per protocol, per interface, and per direction. You can only have one ACL per protocol (e.g., IP or IPX), one ACL per interface (e.g., FastEthernet0/0), and one ACL per direction (i.e., IN or OUT).
How can an ACL help protect
my network from viruses?
You can use an ACL as a packet sniffer to list packets that meet a certain requirement. For example, if there's a virus on your network that's sending out traffic over IRC port 194, you could create an extended ACL (such as number 101) to identify that traffic. You could then use the debug ip packet 101 detail command on your Internet-facing router to list all of the source IP addresses that are sending packets on port 194.
What's the order of operations in an ACL?
Routers process ACLs from top to bottom. When the router evaluates traffic against the list, it starts at the beginning of the list and moves down, either permitting or denying traffic as it goes. When it has worked its way through the list, the processing stops.
That means whichever rule comes first takes precedence. If the first part of the ACL denies traffic, but a lower part of the ACL allows it, the router will still deny the traffic. Let's look at an example:
Access-list 1 permit any
Access-list 1 deny host 10.1.1.1
Access-list 1 deny anyWhat does this ACL permit? The first line permits anything. Therefore, all traffic meets this requirement, so the router will permit all traffic, and processing will then stop.
What about traffic you don't specifically address in an ACL?
At the end of an ACL is an implicit deny statement. Whether you see the statement or not, the router denies all traffic that doesn't meet a condition in the ACL. Here's an example:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255What traffic does this ACL permit? None: The router denies all traffic because of the implicit deny statement. In other words, the ACL really looks like this:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255
Access-list 1 deny ANYCan I name an ACL?
Numbers—who needs numbers? You can also name your ACLs so you can more easily identify their purpose. You can name both standard and extended ACLs. Here's an example of using a named ACL:
router(config)# ip access-list ?
extended Extended Access List
log-update Control access list log updates
logging Control access list logging
resequence Resequence Access List
standard Standard Access List
router(config)# ip access-list extended test
router(config-ext-nacl)#
router(config-ext-nacl)# 10 deny ip any host 192.168.1.1
router(config-ext-nacl)# exit
router(config)# exit
router# show ip access-list
Extended IP access list test 10 deny ip any host 192.168.1.1What's a numbering sequence?
In the "old days," you couldn't edit an ACL—you could only copy it to a text editor (such as Notepad), remove it, edit it in notepad, and then re-create it. In fact, this is still a good way to edit some Cisco configurations.
However, this approach can also create a security risk. During the time you've removed the ACL to modify it, the router isn't controlling traffic as needed. But it's possible to edit a numbered ACL with commands. Here's an example:
router(config)# access-list 75 permit host 10.1.1.1
router(config)#^Z
router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)# ip access-list standard 75
router(config-std-nacl)# 20 permit any
router(config-std-nacl)# no 10 permit 10.1.1.1
router(config-std-nacl)#^Z
router# show ip access-lists 75
Standard IP access list 75 20 permit any
router#How else can I use an ACL?
ACLs aren't just for filtering traffic. You can also use them for a variety of operations. Let's look at some of their possible other uses:
To control debug output: You can use the debug list X command to control debug output. By using this command before another debug command, the command only applies to what you've defined in the list.
To control route access: You can use a routing distribute-list ACL to only permit or deny certain routes either into or out of your routing protocol.
As a BGP AS-path ACL: You can use regular expressions to permit or deny BGP routes.
For router management: You can use an ACL to control which workstation or network manages your router with an ACL and an access-class statement to your VTY lines.
For encryption: You can use ACLs to determine how to encrypt traffic. When encrypting traffic between two routers or a router and a firewall, you must tell the router what traffic to encrypt, what traffic to send unencrypted, and what traffic to drop.
To wrap up this review, I'll leave you with one last tip: Don't forget to use remark statements in your ACLs. They'll come in handy when you have to troubleshoot something later.
Posted by
CCNA v4.0
at
11:54 PM
0
comments
Labels: Cisco IOS access lists: 10 things you should know, Update today
Cisco IOS access lists: 10 things you should know
Takeaway: Access control lists (ACLs) are a fundamental part of working with routers. How much do you know about managing these vital gatekeepers? David Davis lists 10 things every administrator should know about working with Cisco IOS ACLs.
People who read this, also read...
Playing with Cisco access lists
Use advanced parameters on your Cisco IOS ACLs
Traffic filtering with Cisco access lists: Why, how, and what to consider
Learn additional uses for Cisco IOS access control lists
Protect your network with the Cisco IOS Firewall
If you work with Cisco routers, you're more than likely familiar with Cisco IOS access control lists (ACLs). But that doesn't mean you know all there is to know about these important gatekeepers. Access lists are an integral part of working with routers, and they're vital to security.
Because ACLs are a fundamental part of router administration, I want to address 10 things you should know about working with these lists. If you're new to working with Cisco routers, this list offers a good foundation to get you started. But even if you've worked with Cisco routers for a while, it never hurts to review the basics—you might even learn something new.
So, without any further ado, here are 10 things you need to know about Cisco IOS access lists, beginning with the basic definition of an ACL.
What is an access control list?
In the Cisco IOS, an access control list is a record that identifies and manages traffic. After identifying that traffic, an administrator can specify various events that can happen to that traffic.
What's the most common type of ACL?
IP ACLs are the most popular type of access lists because IP is the most common type of traffic. There are two types of IP ACLs: standard and extended. Standard IP ACLs can only control traffic based on the SOURCE IP address. Extended IP ACLs are far more powerful; they can identify traffic based on source IP, source port, destination IP, and destination port.
What are the most common numbers for IP ACLs?
The most common numbers used for IP ACLs are 1 to 99 for standard lists and 100 to 199 for extended lists. However, many other ranges are also possible.
Standard IP ACLs: 1 to 99 and 1300 to 1999
Extended IP ACLs: 100 to 199 and 2000 to 2699
How can you filter traffic using ACLs?
You can use ACLs to filter traffic according to the "three P's"—per protocol, per interface, and per direction. You can only have one ACL per protocol (e.g., IP or IPX), one ACL per interface (e.g., FastEthernet0/0), and one ACL per direction (i.e., IN or OUT).
How can an ACL help protect
my network from viruses?
You can use an ACL as a packet sniffer to list packets that meet a certain requirement. For example, if there's a virus on your network that's sending out traffic over IRC port 194, you could create an extended ACL (such as number 101) to identify that traffic. You could then use the debug ip packet 101 detail command on your Internet-facing router to list all of the source IP addresses that are sending packets on port 194.
What's the order of operations in an ACL?
Routers process ACLs from top to bottom. When the router evaluates traffic against the list, it starts at the beginning of the list and moves down, either permitting or denying traffic as it goes. When it has worked its way through the list, the processing stops.
That means whichever rule comes first takes precedence. If the first part of the ACL denies traffic, but a lower part of the ACL allows it, the router will still deny the traffic. Let's look at an example:
Access-list 1 permit any
Access-list 1 deny host 10.1.1.1
Access-list 1 deny anyWhat does this ACL permit? The first line permits anything. Therefore, all traffic meets this requirement, so the router will permit all traffic, and processing will then stop.
What about traffic you don't specifically address in an ACL?
At the end of an ACL is an implicit deny statement. Whether you see the statement or not, the router denies all traffic that doesn't meet a condition in the ACL. Here's an example:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255What traffic does this ACL permit? None: The router denies all traffic because of the implicit deny statement. In other words, the ACL really looks like this:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255
Access-list 1 deny ANYCan I name an ACL?
Numbers—who needs numbers? You can also name your ACLs so you can more easily identify their purpose. You can name both standard and extended ACLs. Here's an example of using a named ACL:
router(config)# ip access-list ?
extended Extended Access List
log-update Control access list log updates
logging Control access list logging
resequence Resequence Access List
standard Standard Access List
router(config)# ip access-list extended test
router(config-ext-nacl)#
router(config-ext-nacl)# 10 deny ip any host 192.168.1.1
router(config-ext-nacl)# exit
router(config)# exit
router# show ip access-list
Extended IP access list test 10 deny ip any host 192.168.1.1What's a numbering sequence?
In the "old days," you couldn't edit an ACL—you could only copy it to a text editor (such as Notepad), remove it, edit it in notepad, and then re-create it. In fact, this is still a good way to edit some Cisco configurations.
However, this approach can also create a security risk. During the time you've removed the ACL to modify it, the router isn't controlling traffic as needed. But it's possible to edit a numbered ACL with commands. Here's an example:
router(config)# access-list 75 permit host 10.1.1.1
router(config)#^Z
router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)# ip access-list standard 75
router(config-std-nacl)# 20 permit any
router(config-std-nacl)# no 10 permit 10.1.1.1
router(config-std-nacl)#^Z
router# show ip access-lists 75
Standard IP access list 75 20 permit any
router#How else can I use an ACL?
ACLs aren't just for filtering traffic. You can also use them for a variety of operations. Let's look at some of their possible other uses:
To control debug output: You can use the debug list X command to control debug output. By using this command before another debug command, the command only applies to what you've defined in the list.
To control route access: You can use a routing distribute-list ACL to only permit or deny certain routes either into or out of your routing protocol.
As a BGP AS-path ACL: You can use regular expressions to permit or deny BGP routes.
For router management: You can use an ACL to control which workstation or network manages your router with an ACL and an access-class statement to your VTY lines.
For encryption: You can use ACLs to determine how to encrypt traffic. When encrypting traffic between two routers or a router and a firewall, you must tell the router what traffic to encrypt, what traffic to send unencrypted, and what traffic to drop.
To wrap up this review, I'll leave you with one last tip: Don't forget to use remark statements in your ACLs. They'll come in handy when you have to troubleshoot something later.
Posted by
CCNA v4.0
at
11:54 PM
0
comments
Labels: Cisco IOS access lists: 10 things you should know, Update today
Cisco Network Magic Pro 5.0.8282
Cisco has introduced a suite of network management software named Network Magic 5.0 . This tool will improve various network tasks like- connecting and sharing computers(content & printer), control computers on network while accessing Internet, connection repairing features, manage performance problem to provide optimize performance and many more. This tool run in the background and indicate/alert each time when new device connect to your network.
The Network Magic 5.0 suit provide the various functionality and provide capability to
* Connect and share content or a printer across a network
* Manage, monitor and control how computers on the network access the Internet
* Diagnose and repair connection and performance problems
* Optimize performance and reliability
* Track network history and usage through reporting capabilities
* Manage active connections and get status updates Control user
* Access and help secure the network from intruders
Features:
* Connect your devices together in minutes.
* Share Internet connections, printers and files.
* Protect your network with enhanced WPA security capabilities and status alerts.
* Repair your network and Internet connections to stay online and productive.
* Control access to the Internet and track online activity with remote desktop screenshots.
* And much more!
Download Read more...
Posted by
CCNA v4.0
at
11:48 PM
0
comments
Cisco Network Magic Pro 5.0.8282
Cisco has introduced a suite of network management software named Network Magic 5.0 . This tool will improve various network tasks like- connecting and sharing computers(content & printer), control computers on network while accessing Internet, connection repairing features, manage performance problem to provide optimize performance and many more. This tool run in the background and indicate/alert each time when new device connect to your network.
The Network Magic 5.0 suit provide the various functionality and provide capability to
* Connect and share content or a printer across a network
* Manage, monitor and control how computers on the network access the Internet
* Diagnose and repair connection and performance problems
* Optimize performance and reliability
* Track network history and usage through reporting capabilities
* Manage active connections and get status updates Control user
* Access and help secure the network from intruders
Features:
* Connect your devices together in minutes.
* Share Internet connections, printers and files.
* Protect your network with enhanced WPA security capabilities and status alerts.
* Repair your network and Internet connections to stay online and productive.
* Control access to the Internet and track online activity with remote desktop screenshots.
* And much more!
Download Read more...
Posted by
CCNA v4.0
at
11:48 PM
0
comments
Friday, December 5, 2008
CCNA 4 - Voucher
THIS EXAM IS (80%)
What is accomplished by segmenting a LAN with a bridge?
*increase large collision domains
reduce large collision domains
reduce small broadcast domains
increase small broadcast domains
2
How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?
4
*5
8
10
3
What is a disadvantage of cut-through switching?
*no error checking
a decrease in error checking
decrease in number of collision domains
decrease in bandwidth
increased latency
4
Which of the following are data link layer encapsulation details? (Choose two.)
*Packets are put into frames.
Data is packaged into a packet.
Data is segmented into segments.
Data is converted for Internet travel.
*An address is added to identify the directly connected device.
5
Select the characteristics specified by 10BaseT. (Choose three.)
*twisted pair cable
T style connectors
*baseband transmission
10 gigabits per second data rate
*10 megabits per second data rate
decimal encoded data transmission
6
A LAN is to be added to an unused router Ethernet interface. What steps must be performed to configure this interface to allow connectivity to the hosts on this LAN? (Choose two.)
*Enter the command no shutdown.
A password must be set on the interface.
The interface DCE clock rate must be set.
The interface must be configured for virtual terminal access.
*The interface must be configured with an IP address and subnet mask.
The router must be put in setup mode in order for the interface to be configured.
7
Which media types can be used in an implementation of a 10BASE-T network? (Choose three.)
Category 5 UTP *
Category 5e UTP *
Category 3 UTP *
coaxial cable
multi-mode fiber
single mode fiber
8
If 4 bits are borrowed from the host field of a Class C address to create subnets, what will the range of usable host addresses be in the last subnet?
.224 to .239
.225 to .239
.225 to .254
.241 to .254
.241 to .255
*.240 to .255
9
Which of the following describe how a device on a LAN builds a table of MAC addresses? (Choose two.)
by monitoring the traffic that occurs on the local network segment
*via FTP from the nearest router
*by sending a request to the nearest domain name server
by broadcasting an ARP request
10
Which of the following best describes how the Gigabit Ethernet, Media Access Control method views the link?
ring
shared bus
point-to-point *
star
extended star
11
What is the purpose of Positive Acknowledgment and Retransmission (PAR)?
PAR allows the presentation layer to request that data be resent in a format the destination host can process.
PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment is corrupt.
*PAR helps ensure that a number of data segments sent by one host are received by another host before additional data segments are sent.
PAR is used to renegotiate the window size during the synchronization process.
12
Which criteria identify a Class B address? (Choose two.)
decimal number in first octet between 127-191
decimal number in first octect between 128-192
*decimal number in first octect between 128-191
first bit of binary IP address is 0
*first two bits of binary IP address are 10
first three bits of IP binary address are 110
13
An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?
There was a POST failure.
The incorrect IOS loaded.
There was an error in the startup configuration file.
*The configuration register was set to ignore NVRAM.
14
What operations are performed during router initialization? (Choose three.)
*The IOS is loaded into RAM.
The generic bootstrap loader tests all interfaces.
All directly connected network devices are identified.
*A valid configuration file is loaded from NVRAM if specified by the configuration register.
*A question driven setup menu is presented if a valid configuration file cannot be loaded.
15
For a network manager planning the installation of a new network, which of the following will be needed to implement a typical 10BASE-T network installation? (Choose three.)
RJ-11
BNC connectors
RJ-48 patch cables
RJ-45 connectors *
Category 5 UTP cables *
hubs or switches *
16. A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one?
255.255.0.0
255.255.240.0
255.255.255.0
*255.255.255.192
255.255.255.224
17
A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)
*The ip host table on the router is not configured.
The command telnet Boston was issued from the wrong router prompt.
The routing table is missing.
*Domain name services are not available.
18
Which of the following network components would be considered Layer 1 devices? (Choose three.)
*hub
router
bridge
switch
*repeater
*transceiver
19
What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?
*100 meters
185 meters
300 meters
500 meters
20
What is the result of executing the erase startup-config command?
It deletes the active configuration file from RAM.
*It deletes the backup configuration file in NVRAM.
It deletes the saved configuration file from ROM.
It deletes the saved configuration file from the C: drive.
21
Which of the following imposes boundaries on broadcast traffic?
Bridge
Repeater
*Router
Transceiver
22
Which utility shows the route a packet takes to reach its destination?
netstat
ping
Telnet
*traceroute
23
Which device is considered a multi-port bridge?
hub
router
*switch
gateway
transceiver
repeater
24
What organization developed the TCP/IP reference model?
Internet Engineering Task Force (IETF)
National Intstitute of Standards and Technology (NIST)
Department of the Navy (DoN)
Department of Defense (DoD) *
Massachusetts Institute of Technology (MIT)
Stanford University
25 Which of the following is true regarding CDP and the graphic shown?
CDP running on Router D will gather information about routers A, B, C, and E.
By default, Router A will receive CDP advertisements from routers B and C.
*If routers D and E are running different routing protocols, they will not exchange CDP information.
Router E can use CDP to identify the IOS running on Router B.
26
How would an administrator configure a static route for use if a primary route failed?
configure the route with a metric greater than the default value
configure the route and the router will activate it as needed
configure the route to activate by using the redistribute static command
*configure the route with an administrative distance greater than the default value
27
Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below.
156
158
160
*162
164
166
28
*What happens on an Ethernet network after a collision occurs? (Choose three.)
A backoff algorithm is invoked and transmission is stopped.
Devices involved in the collision have a random period of time for priority retransmission of the damaged packet.
The devices involved in the collision release a token indicating the time each station may begin retransmitting.
*The devices involved in the collision do not have priority to transmit data.
*The devices with data to transmit return to a listen-before-transmit mode.
Transmit work will restart with the reissuance of all data.
29
Which of the following types of networks pass a token sequentially to each host? (Choose two.)
Ethernet
*Token Ring
*FDDI
Frame Relay
ISDN
30
What is the length of a MAC address?
8 bits
8 bytes
24 bits
24 bytes
*48 bits
48 bytes
31 Which of the following are TCP services? (Choose three.)
address resolution
end-to-end communication
*flow control
reliability of data delivery
path determination
*data representation
32
Routers have different types of memory. Choose the answer that describes RAM.
provides working storage
*stores a fully functional IOS image
stores the startup configuration file
initializes the code used in router startup
33
Which command will display routing table information about all known networks and subnetworks?
Router# show ip interfaces
Router# show ip connections
*Router# show ip route
Router# show ip networks
34
Which of the following statements describe distance vector routing updates? (Choose three.)
Topology changes are transmitted to all routers at once.
Routers send their entire routing tables in distance vector updates.
*Path cost metrics for each route are included in the updates.
Periodic updates are sent directly to every router in the network.
*Routing updates are sent periodically to adjacent routers.
*Routers send only the state of their own links in distance vector updates.
35
Which ICMP message type notifies source hosts that a receiving host or network is not available?
time exceeded
redirect
*destination unreachable
source quench
parameter problem
echo reply
36
How many total subnets are created by applying the subnet mask 255.255.252.0 to a Class B network?
4
6
*64
252
255
1024
37
Which of the following conditions will cause a router using holddown timers to ignore an update?
an update from a different router with a better metric
an update from a different router with a poorer metric
an update from the same router with a better metric
*an update from the same router with a poorer metric
38
Which IP packet field will prevent endless loops?
type-of-service
identification
flags
*time-to-live
header checksum
39
Which of the following is a network type that is widely used in dialup networking?
shared media
point-to-point
extended shared media
*point-to-multipoint
40
When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?
1022
510
254
126
30
*6
41
Cisco Discovery Protocol (CDP) operates at which OSI Layer?
physical layer
network layer
*data link layer
presentation layer
42
Which protocol can be used to load or retrieve Cisco IOS images to or from a router?
SNMP
*TFTP
UDP
TCP
43
Which of the following is a transport layer protocol of the TCP/IP model?
FTP
*UDP
IP
TFTP
44
Which of the following is created with switched full-duplex transmission?
more collision domains
fewer collision domains
*no collision domains
no increase in broadcast domains
more broadcast domains
45
Which of the following IP addresses are broadcast addresses if the subnet mask is 255.255.255.240? (Choose three.)
*75.32.75.15
205.16.35.11
*199.254.129.111
*129.130.17.143
135.22.55.93
105.33.62.213
46 What type of routing uses information that is manually entered into the routing table?
dynamic
interior
*static
standard
47
What is used to resolve known IP addresses to unknown MAC addresses?
*ARP
DNS
DHCP
RARP
48
Which of the following OSI layers offers reliable, connection-oriented data communication services?
session
*transport
network
data link
49
Which of the following are benefits of creating a subnetwork structure in an IP network? (Choose three.)
permits network address duplication
*allows for address flexibility
*prevents address replication
provides broadcast containment
*adds low-level security
allows for more network hosts available
50
How many IP addresses can be assigned to host devices on each subnet of a Class B network with a subnet mask of 255.255.255.248?
3
5
6
8
30
8190???? mayby that
51
After a Telnet session has been suspended, which actions will restart the session? (Choose two.)
pressing Enter to restart the most recent session
using the resume command followed by a session ID
*typing the session ID followed by pressing Enter
*using the resume command followed by the IP address
52
Which layer of the OSI model covers physical media?
*Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
53
Which protocol is used by FTP to transfer files over the Internet?
*TCP
SMTP
UDP
SNMP
54
Which of the following factors should be considered when selecting a routing protocol to be implemented in an enterprise network? (Choose three.)
*bandwidth consumption
*router memory requirements
router location
spanning tree size
*router processor capability
flow control capability
55
A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful? (Choose two.)
*The router will block the ping request message.
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
Workstation B will send a UDP ping reply message to workstation A.
*Workstation A will send an ICMP echo request message to workstation B.
Workstation B will send an ICMP echo reply message to workstation A.
56
Which mode will a router enter if it is unable to locate a valid startup configuration file during the boot process?
Boot mode
Config mode
Setup mode
Startup mode
57
Which protocol of the TCP/IP model internet layer provides connectionless, best-effort-delivery of datagrams?
ARP
ICMP
IP
RARP
*TCP
DNS
58
Which of the following does a router use to make a forwarding decision?
*destination IP address
MAC address
source IP address
encapsulation address
default gateway
59
Routers have different types of memory. Choose the answer that describes NVRAM.
provides working storage
*stores a fully functional IOS image
stores the startup configuration file
initializes the code that is used to boot the router
60
Which statement is correct concerning routing and routed protocols?
A routed protocol allows the routers to communicate with other routers and maintain tables for a routing protocol.
A routing protocol allows routers to communicate with other routers and maintain tables for a routed protocol.
*Routers only need to use routing protocols to work properly.
There is no difference between routed and routing protocols.
Posted by
CCNA v4.0
at
12:19 AM
0
comments
Labels: CCNA 4 - Voucher, Update today
ccna2 final version 4.0(97,2%)
CCNA2 FINAL (version 1)
CCNA 2 FINAL (Version 2)
ccna 2 final ExamMay 06-2008
Take Assessment - ERouting Final Exam - CCNA Exploration: Routing Protocols and Concepts (Version 4.0)
1
Refer to the exhibit. What two statements are true based on the output shown? (Choose two.)
- neighbors 192.168.10.9 and 192.168.10.5 have auto summary disabled
- router 3 is load balancing traffic to the 172.16.3.0 network across its serial interfaces
2
Refer to the exhibit. The network administrator issues the command no ip classless on Router1. What forwarding action will take place on a packet that is received by Router1 and is destined for host 192.168.0.26?
- The packet will be dropped.
3.
The network shown in the diagram is having problems routing traffic. It is suspected that the problem is with the addressing scheme. What is the problem with the addressing used in the topology?
- The subnetwork configured on the serial link between Router1 and Router2 overlaps with
the subnetwork assigned to Ethernet0 of Router3.
4
Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network properly. What is the cause?
- 192.168.10.31 is the broadcast address for this subnet.
5
A router has learned about a network through static and dynamic routing processes. Which route will be used to reach network 192.168.168.0?
- S 192.168.168.0/24 [1/0] via 192.168.200.1
6 Which three statements are true of holddown timers? (Choose three.)
- prevent update messages from reinstating a route that may have gone bad
- allow routers to still forward packets to destination networks that are in holddown
- permit lower metric updates received from any neighboring router to reinstate the route to a possibly down network
7.
Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on Router1?
- DUAL will query neighbors for a route to network 192.168.1.0.
8 When presented with multiple valid routes to a destination, what criteria does a router use to determine which routes to add to the routing table?
- The router first selects routes with the lowest administrative distance. The resulting routes are then prioritized by metric and the routes with the best metric are added to the routing table.
9 Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?
- Locate and load the startup-config file from NVRAM.
10 Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
- The router modifies the TTL field, decrementing it by one.
- The router maintains the same source and destination IP.
- The router changes the source physical address to the physical address of the exit interface.
11
Which of the following are required when adding a network to the OSPF routing process configuration? (Choose three.)
- network address
- wildcard mask
- area ID
12
What does RIP use to reduce convergence time in a larger network?
It uses triggered updates to announce network changes if they happen in between the periodic updates.
13
Refer to the exhibit. All routers in the network are running RIPv2 and EIGRP with default routing protocol settings and have interfaces configured with the bandwidths that are shown in the exhibit. Which protocol will be used and how will traffic between the Router1 LAN and Router5 LAN be routed through the network?
- EIGRP traffic will use the path Router1, Router3, Router4, Router5 because it has the best metric.
14
A network administrator has configured a default route on Router_A but it is not being shared with adjacent Router_B and the other routers in the OSPF area. Which command will save the administrator the time and trouble of configuring this default route on
- Router_A(config-router)# default-information originate
15
The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?
S 172.16.1.0 [1/0] via 172.16.2.2
16
Refer to the exhibit. A packet enters Router1 with a destination IP of 172.16.28.121. Which routing table entry will be used to forward this packet to the destination address?
- 172.16.16.0/20 [1/0] via 192.168.0.17
17
Refer to the exhibit. What are the effects of the exhibited commands on the router?
- Only the enable password is encrypted.
18 Which two statements are true regarding link-state routing protocols? (Choose two.)
- They are aware of the complete network topology.
- They offer rapid convergence times in large networks.
19 Which three statements about routing protocols are true? (Choose three.)
- OSPF elects designated routers on multiaccess links.
- EIGRP supports unequal cost load balancing.
- RIP does not advertise a route beyond a hop count of 15.
20
Refer to the exhibit. The network administrator is testing network connectivity by issuing the tracert command from host A to host B. Given the exhibited output on host A, what are two possible routing table issues on the network? (Choose two.)
-Router2 is missing a route to the 172.16.0.0 network
- Router3 is missing a route to the 10.0.0.0 network
21 What are three features of CDP? (Choose three.)
- tests Layer 2 connectivity
- enabled by default on each interface
- provides information on directly connected devices that have CDP enabled
22
Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are failing between the two routers. What change by the administrator will correct the problem?
- Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.
23
What can be determined from the output shown in the exhibit? (Choose two.)
- Montgomery has Layer 2 connectivity with Cumberland.
- Brant, Fisherman, and Potomac are directly connected to Montgomery.
24 What command would the network administrator apply to a router that is running OSPF to advertise the entire range of addresses included in 172.16.0.0/19 in area 0?
- R1(config-router)# network 172.16.0.0 0.0.31.255 area 0
25 What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.)
- The routers must agree on the network type.
- The routers must use the same dead interval.
26
Refer to the exhibit. A network administrator is trying to figure out why BOS does not have the 10.0.0.0/24 network in its routing table. All routers are configured for OSPF in area 0. The links between the routers are operational and the administrator is able to ping between all router interfaces. What is a logical next step that the network administrator should take to troubleshoot the problem?
- Use show and debug commands to determine if hellos are propagating.
27
Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)
- 10.0.0.0/8
-192.168.2.0/24
28
Refer to the exhibit. All router interfaces are configured with an IP address and are operational. If no routing protocols or static routes are configured, what information will be included in the show ip route command output for router A?
Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be in the routing table.
29
Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is true regarding how the routers in this topology will respond to this event?
Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.
30
Refer to the exhibit. R1 knows two routes, Path A and Path B, to the Ethernet network attached to R3. R1 learned Path A to network 10.2.0.0/16 from a static route and Path B to network 10.2.0.0/16 from EIGRP. Which route will R1 install in its routing table?
The route via Path A is installed because the static route has the lowest administrative distance to network 10.2.0.0/16.
31
Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem?
The command network 192.168.2.0 is missing from the EIGRP configuration on the JAX router.
32
Refer to the exhibit. Which statement is true concerning the routing configuration?
- Packets routed to the R2 ethernet interface require two routing table lookups.
3
Which of the following should be considered when troubleshooting a problem with the establishment of neighbor relationships between OSPF routers? (Choose three.)
- OSPF interval timers mismatch
- interface network type mismatch
- inconsistent authentication configuration
34
Refer to the exhibit. What summary address can Router2 advertise to Router1 to reach the three networks on Routers 3, 4, and 5 without advertising any public address space or overlapping the networks on Router1?
- 172.16.0.0/13
35
A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?
- B(config)# router rip
B(config-router)# passive-interface S0/0
36
refer to the exhibit. The routers in the exhibit are running the EIGRP routing protocol. What statement is true regarding how packets will travel from the 172.16.1.0/16 network to the 192.168.200.0/24 network?
- The router installs all the equal cost paths in the routing table and performs equal cost load balancing to send packets out multiple exit interfaces.
37
The Suffolk router is directly connected to the networks shown in the graphic and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by the Suffolk router. What can be a reason for this result?
- The ip classless command is not enabled on the Suffolk router.
38
Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?
- split horizon
39
What is the purpose of the TTL field within an IP packet header?
limits the period of time or number of hops a packet can traverse through the network before it should be discarded
40
Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)
- The AD of EIGRP routes has been manually changed to a value other than the default value.
- Router1 is running both the EIGRP and OSPF routing process.
- No default route has been configured.
41 Which three statements describe the operation of routing with EIGRP? (Choose three.)
- As new neighbors are discovered, entries are placed in a neighbor table.
- If hello packets are not received within the hold time, DUAL must recalculate the topology.
- The reported distance is the distance to a destination as advertised by a neighbor.
42
Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1?
- 198.18.48.0/21
43
Which of the following could describe the devices labeled "?" in the graphic? (Choose three.)
DCE
CSU/DSU
modem
44
Refer to the exhibit. How many routes are both level 1 and qualify for use as an ultimate route?
- 2
45
Refer to exhibit. Given the topology shown in the exhibit, what three commands are needed to configure EIGRP on the Paris router? (Choose three.)
- Paris(config)# router eigrp 100
- Paris(config-router)# network 192.168.7.0
- Paris(config-router)# network 192.168.8.0
46 Which of the following are primary functions of a router? (Choose two.)
- packet switching
- path selection
47
Refer to exhibit. A company network engineer enters the following commands in the routers:
R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2
R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1
When the engineer enters the show ip route command on R1, the routing table does not display the static route to the 10.1.1.0 network. All R1 and R2 interfaces are correctly addressed per the graphic. What is a logical next step that the engineer could take in order to make the static route display in the routing table in R1?
Enable the R1 and R2 serial interfaces.
48
Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network?
- It will load balance the traffic between ADC and ABC
49 Which two router component and operation pair are correctly described? (Choose two.)
NVRAM - stores the configuration file
POST - runs diagnostics on hardware modules
50
Refer to the exhibit. Pings are failing between HostA and HostB. The network administrator discovers that Router1 does not have a route to the 172.16.0.0 network. Assuming Router2 is configured correctly, which two static routes could be configured on Router1 to enable Host A to reach network 172.16.0.0? (Choose two.)
- ip route 172.16.0.0 255.255.0.0 S0/0
- ip route 172.16.0.0 255.255.0.0 192.168.0.2
51
When the show cdp neighbors command is issued from Router C, which devices will be displayed in the output?
B, D
52
Refer to the exhibit. The results of the show ip route command are displayed in the graphic for Router R2. Which route will be selected for a packet with a destination address of 10.1.4.1?
0.0.0.0/0 via 192.168.0.1
53 Which statement is true regarding routing metrics?
- Routers compare metrics to determine the best route.
54 What is the first step OSPF and IS-IS routers take in building a shortest path first database?
learn about directly connected networks
55
What is the function of the OSPF LSU packet?
used to announce new OSPF information and to reply to certain types of requests
56
Refer to the exhibit. Hosts on the BOS Fa0/0 LAN are able to ping the Fa0/1 interface on the JAX router and all interfaces on the BOS and ORL routers. Why would hosts from the 10.0.0.0/24 network not be able to ping hosts on the Fa0/0 LAN of the JAX router?
The JAX router needs the network 192.168.3.0 0.0.0.255 area 0 command.
57
Refer to the routing table shown in the exhibit. What is the meaning of the highlighted value 192?
- It is the metric, which is cost.
58
Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)
- The missing information for Blank 1 is the command show ip route.
- The missing information for Blank 2 is the number 120.
- The missing information for Blank 3 is the letter C.
Posted by
CCNA v4.0
at
12:07 AM
0
comments
Labels: CCNA v4.0 Test module, Update today