Cisco CCNA 200-125 Exam Dumps Latest – New Questions & Answers

Section IV: WAN Technologies

IV.1. Which three statements about DWDM are true? (Choose three)

  • It allows a single strand of fiber to support bidirectional communications
  • It is used for long-distance and submarine cable systems
  • It can multiplex up to 256 channels on a single fiber
  • It supports both the SDH and SONET standards
  • Each channel can carry up to a 1-Gbps signal
  • It supports simplex communications over multiple strands of fiber

IV.2. Which WAN topology is most appropriate for a centrally located server farm with several satellite branches?

  • star
  • hub and spoke
  • point-to-point
  • full mesh
Show (Hide) Explanation/Reference
Star is the most popular topology for Ethernet topology but hub and spoke is the most appropriate WAN topology.

In a Hub-and-spoke network topology, one physical site act as Hub (Example, Main Office or Head Quarter), while other physical sites act as spokes. Spoke sites are connected to each other via Hub site. In Hub-and-spoke topology, the network communication between two spokes always travel through the hub (except when using DMVPN Phase II or Phase III where spokes can communicate with each other directly). The networking device at Hub site is often much more powerful than the ones at spoke sites.

Hub and spoke is an ideal topology when most of the resources lie at the Hub site and the branch sites only need to access to the Hub.

Note: Although some books may say Hub-and-spoke and Star topologies are the same but in fact they have difference. When talking about Hub-and-spoke we often think about the communication between Hub site and Spoke sites. When talking about Star we think about the communication between end devices.

IV.3. Which value must a device send as its username when using CHAP to authenticate with a remote peer site id:17604704 over a PPP link?

  • the username defined by the administrator
  • the local hostname
  • the automatically-generated username
  • the hostname of the remote device

IV.4. Which technology supports multiple dynamic secure connections over an unsecure transport network?

  • Point-to-point
  • DMVPN
  • VPN
  • site-to-site VPN

IV.5. DRAG DROP. Drag the frame relay acronym on the left to match its definition on the right. (Not all acronyms are used.)Select and Place:
Correct Answer:

IV.6. Which feature can you implement to reserve bandwidth for VoIP calls across the call path?

  • PQ
  • CBWFQ
  • round robin
  • RSVP
Show (Hide) Explanation/Reference
The Resource Reservation Protocol (RSVP) protocol allows applications to reserve bandwidth for their data flows. It is used by a host, on the behalf of an application data flow, to request a specific amount of bandwidth from the network. RSVP is also used by the routers to forward bandwidth reservation requests.

IV.7. Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?

  • HDLC
  • PPP
  • X.25
  • Frame Relay
Show (Hide) Explanation/Reference
PPP supports both synchronous (like analog phone lines) and asynchronous circuits (such as ISDN or digital links). With synchronous circuits we need to use clock rate.

Note: Serial links can be synchronous or asynchronous. Asynchronous connections used to be only available on low-speed (<2MB) serial interfaces, but now, there are the new HWICs (High-Speed WAN Interface Cards) which also support asynchronous mode. To learn more about them please visit

http://www.cisco.com/en/US/prod/collateral/modules/ps5949/ps6182/prod_qas0900aecd80274424.html.

IV.8. During which phase of PPPoE is PPP authentication performed?

  • the PPP Session phase
  • Phase 2
  • the Active Discovery phase
  • the Authentication phase
  • Phase 1
Show (Hide) Explanation/Reference
PPPoE provides a standard method of employing the authentication methods of the Point-to-Point Protocol (PPP) over an Ethernet network. When used by ISPs, PPPoE allows authenticated assignment of IP addresses. In this type of implementation, the PPPoE client and server are interconnected by Layer 2 bridging protocols running over a DSL or other broadband connection.

PPPoE is composed of two main phases:
Active Discovery Phase: In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is assigned and the PPPoE layer is established.
PPP Session Phase: In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.

Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-cli/vpn-pppoe.html

IV.9. Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)

  • The tunnel interface IP address is misconfigured.
  • The tunnel interface is down.
  • A valid route to the destination address is missing from the routing table.
  • The tunnel address is routed through the tunnel itself.
  • The ISP is blocking the traffic.
  • An ACL is blocking the outbound traffic.

IV.10. Which two statements about using leased lines for your WAN infrastructure are true? (Choose two.)

  • Leased lines provide inexpensive WAN access.
  • Leased lines with sufficient bandwidth can avoid latency between endpoints.
  • Leased lines require little installation and maintenance expertise.
  • Leased lines provide highly flexible bandwidth scaling.
  • Multiple leased lines can share a router interface.
  • Leased lines support up to T1 link speeds.
Show (Hide) Explanation/Reference
The advantages of leased lines include:

+ Simplicity: Point-to-point communication links require minimal expertise to install and maintain.

+ Quality: Point-to-point communication links usually offer high service quality, if they have adequate bandwidth. The dedicated capacity removes latency or jitter between the endpoints.

+ Availability: Constant availability is essential for some applications, such as e-commerce. Point-to-point communication links provide permanent, dedicated capacity, which is required for VoIP or Video over IP.

The disadvantages of leased lines include:

+ Cost: Point-to-point links are generally the most expensive type of WAN access. The cost of leased line solutions can become significant when they are used to connect many sites over increasing distances. In addition, each endpoint requires an interface on the router, which increases equipment costs.

+ Limited flexibility: WAN traffic is often variable, and leased lines have a fixed capacity, so that the bandwidth of the line seldom matches the need exactly (therefore answer D is not correct). Any change to the leased line generally requires a site visit by ISP personnel to adjust capacity.

(Reference: Connecting Networks Companion Guide Book published by Cisco Networking Academy – Page 54)

IV.11. Which option describes a benefit of a point-to-point leased line ?

  • Low cost
  • Full-mesh capability
  • Flexibillity of design
  • Simply of configuration
Show (Hide) Explanation/Reference
Point-to-point leased line is the most expensive interconnection between two ends as the line is dedicated to a single user, the user should still pay for all available bandwidth, including those unused. -> A is not correct.

With the cost of point-to-point leased line, the full-mesh capability is only achieved when your company has very very strong budget to pay all the bills. To create a full-mesh topology for n sites, we need n*(n-1)/2 leased line connections. For example if we have 6 sites then we need 6*5/2 = 15 leased line connections -> It is nearly impossible for a normal company to achieve full-mesh topology -> B is not correct.

Flexibility is not an advantage of leased line connection -> C is not correct.

Point-to-point leased line simplifies the configuration as the circuit is available on a permanent basis and does not require a connection to be set up before traffic is passed. It does not require to define a permanent virtual circuit (PVC) in the configuration either -> D is correct.

IV.12. What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?(Choose three.)

  • reduced cost.
  • better throughput.
  • broadband incompatibility.
  • increased security.
  • scalability.
  • reduced latency.

IV.13. Which command is used to enable CHAP authentication whit PAP as the fallback method on a serial
interface?

  • (config-if)#authentication ppp chap fallback ppp
  • (config-if)#authentication ppp chap pap
  • (config-if)#ppp authentication chap pap
  • (config-if)#ppp authentication chap fallback ppp
Show (Hide) Explanation/Reference
The command “ppp authentication chap pap” command indicates the CHAP authentication is used first. If it fails or is rejected by other side then uses PAP instead. If you want to use PAP first (then CHAP) you can use the “ppp authentication pap chap” command.

IV.14. Which two authentication methods are compatible with MLPPP on a serial interface? (Choose two.)

  • LEAP
  • CHAP
  • PAP
  • PEAP
  • TACACS+
Show (Hide) Explanation/Reference
The Multilink PPP feature provides load balancing functionality over multiple WAN links while providing multivendor interoperability and support for packet fragmentation, proper sequencing, and load calculation on both inbound and outbound traffic.

Multilink PPP combines multiple physical links into a logical bundle called a Multilink PPP bundle. A Multilink PPP bundle is a single, virtual interface that connects to the peer system. Having a single interface (Multilink PPP bundle interface) provides a single point to apply hierarchical queueing, shaping, and policing to traffic flows. Individual links in a bundle do not perform any hierarchical queueing. None of the links have any knowledge about the traffic on parallel links.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/wan_mlp/configuration/xe-3s/wan-mlp-xe-3s-book/wan_cfg_mlppp_conn_xe.html

MLPPP supports two authentication protocols: Password Authentication protocol (PAP) and Challenge-Handshake Authentication Protocol (CHAP)

IV.15. Which WAN topology provides a direct connection from each site to all other sites on the network?

  • single-homed
  • full mesh
  • point-to-point
  • hub-and-spoke
Show (Hide) Explanation/Reference
Full-mesh is a network topology in which there is a direct link between all pairs of nodes. Below is an example of full-mesh topology.

IV.16. Two routers named Atlanta and Brevard are connected by their serial interfaces as illustrated, but there is no connectivity between them. The Atlanta router is known to have a correct configuration.
Given the partial configurations, identify the problem on the Brevard router that is causing the lack of connectivity.

  • transmission unit size too large
  • no loopback set
  • an incorrect subnet mask
  • incompatible encapsulation at each end
  • an incorrect IP address
  • incompatible bandwidth between routers

IV.17. A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

  • Main(config)# interface serial 0/0
    Main(config-if)# ip address 172.16.1.1 255.255.255.252
    Main(config-if)# no shut
  • Main(config)# interface serial 0/0
    Main(config-if)# ip address 172.16.1.1 255.255.255.252
    Main(config-if)# encapsulation ppp
    Main(config-if)# no shut
  • Main(config)# interface serial 0/0
    Main(config-if)# ip address 172.16.1.1 255.255.255.252
    Main(config-if)# encapsulation frame-relay
    Main(config-if)# authentication chap
    Main(config-if)# no shut
  • Main(config)# interface serial 0/0
    Main(config-if)#ip address 172.16.1.1 255.255.255.252
    Main(config-if)#encapsulation ietf
    Main(config-if)# no shut

IV.18. Refer to the exhibit. The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the problem?

  • The usernames are incorrectly configured on the two routers.
  • The passwords do not match on the two routers.
  • CHAP authentication cannot be used on a serial interface.
  • The routers cannot be connected from interface S0/0 to interface S0/0.
  • With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.
Show (Hide) Explanation/Reference
Both routers must use the same password for CHAP to authentication.

IV.19. Which of the following describes the roles of devices in a WAN? (Choose three.)

  • A CSU/DSU terminates a digital local loop.
  • A modem terminates a digital local loop.
  • A CSU/DSU terminates an analog local loop.
  • A modem terminates an analog local loop.
  • A router is commonly considered a DTE device.
  • A router is commonly considered a DCE device.
Show (Hide) Explanation/Reference
The idea behind a WAN is to be able to connect two DTE networks together through a DCE network. The network’s DCE device (includes CSU/DSU) provides clocking to the DTE-connected interface (the router’s serial interface).

A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device. A CSU/DSU is used between two digital lines -> A & D are correct but B & C are not correct.

For more explanation of answer D, in telephony the local loop (also referred to as a subscriber line) is the physical link or circuit that connects from the demarcation point of the customer premises to the edge of the carrier or telecommunications service provider’s network. Therefore a modem terminates an analog local loop is correct.

IV.20. Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?

  • virtual-template interface
  • DHCP
  • dialer interface
  • AAA authentication
Show (Hide) Explanation/Reference
The picture below shows all configuration needed for PPPoE:

There is no Dialer interface on the PPPoE Server so answer “Dialer interface” is not correct. The most suitable answer is “Virtual Template” interface as it contains the pool which is used to assign IP address to the PPPoE Client. But this question is weird because according to the CCNAv3 syllabus, candidates only need to grasp the PPPoE on client-side, not sure why this question asked about PPPoE on Server side. For more information about PPPoE, please read our PPPoE tutorial.

IV.21. Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

  • CHAP uses a two-way handshake.
  • CHAP uses a three-way handshake.
  • CHAP authentication periodically occurs after link establishment.
  • CHAP authentication passwords are sent in plaintext.
  • CHAP authentication is performed only upon link establishment.
  • CHAP has no protection from playback attacks.

IV.22. Which technology you will choose to connect multiple sites with secure connections?

  • Point-to-point
  • DMVPN
  • MPLS
  • Remote access

IV.23. Which two statements about MPLS are true? (Choose two)

  • It provides automatic authentication
  • It can carry multiple protocols, including IPv4 and IPv6
  • It encapsulates all traffic in an IPv4 header
  • It uses labels to separate and foward customer traffic
  • It tags customer traffic using 802.1q
Show (Hide) Explanation/Reference
MPLS supports IPv4, IPv6, IPX, AppleTalk at the network layer. MPLS supports Ethernet, Token Ring, FDDI, ATM, FR, PPP at the link layer.

MPLS uses label switching to forward packets over Ethernet. Labels are assigned to packets based on groupings or forwarding equivalence classes (FECs). The label is added between the Layer 2 and the Layer 3 header.

IV.24. Which function does traffic shaping perform?

  • It buffers and queues excess packets
  • It buffers traffic without queuing it
  • It queues traffic without buffering it
  • It drops packets to control the output rate
Show (Hide) Explanation/Reference
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate.

IV.25. When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?

  • In the global config
  • Under serial interface
  • Under the routing protocol
  • Under the multilink interface
Show (Hide) Explanation/Reference
Suppose R1 has two Serial interfaces which are directly connected to R2. This is how to configure multilink on R1:

R1(config-if)# interface Serial 0/0 
R1(config-if)# encapsulation ppp 
R1(config-if)# ppp multilink 
R1(config-if)# ppp multilink group 1 
R1(config-if)# no shutdown

R1(config-if)# interface Serial 0/1 
R1(config-if)# encapsulation ppp 
R1(config-if)# ppp multilink 
R1(config-if)# ppp multilink group 1 
R1(config-if)# no shutdown

R1(config)# interface multilink 1 
R1(config-if)# ip address 192.168.42.1 255.255.255.252 
R1(config-if)# ppp multilink 
R1(config-if)# ppp multilink group 1

Therefore we must configure IP address under multilink interface, not physical member interfaces.

IV.26. Refer to the exhibit.Assuming that the entire network topology is shown, what is the operational status of the interfaces of R2 as indicated by the command output shown?

  • One interface has a problem.
  • Two interfaces have problems.
  • The interfaces are functioning correctly.
  • The operational status of the interfaces cannot be determined from the output shown.

IV.27. Which option describes the purpose of traffic policing?

  • It prioritizes routing protocol traffic.
  • It remarks traffic that is below the CIR
  • It drops traffic that exceeds the CIR.
  • It queues and then transmits traffic that exceeds the CIR.
Show (Hide) Explanation/Reference
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate.

Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the routing device.

IV.28. Which PPP subprotocol negotiates authentication options?

  • NCP
  • LCP
  • ISDN
  • DLCI
  • SLIP

IV.29. Refer to the topology below and answer the following question.

Why is the Branch2 network 10.1 0.20.0/24 unable to communicate with the Server farm1 network 10.10.10.0/24 over the GRE tunnel?

  • The GRE tunnel destination is not configured on the R2 router
  • The GRE tunnel destination is not configured on the Branch2 router
  • The static route points to the tunnel0 interface that is misconfigured on the Branch2 router
  • The static route points to the tunnel0 interface that is misconfigured on the R2 router.
Show (Hide) Explanation/Reference

The Branch2 network is communicating to the Server farm, which is connected to R2, via GRE Tunnel so we should check the GRE tunnel first to see if it is in “up/up” state with the “show ip interface brief” command on the two routers.

On Branch2:

We see interfaces Tunnel0 at two ends are “up/up” which are good so we should check for the routing part on two routers with the “show running-config” command and pay attention to the static routing of each router. On Branch2 we see:

The destination IP address for this static route is not correct. It should be 192.168.24.1 (Tunnel0’s IP address of R2), not 192.168.24.10 -> Answer C is correct.
Note: You can use the “show ip route” command to check the routing configuration on each router but if the destination is not reachable (for example: we configure “ip route 10.10.10.0 255.255.255.0 192.168.24.10” on Branch2, but if 192.168.24.10 is unknown then Branch2 router will not display this routing entry in its routing table.
Note: The IP address or configuration may be different in the exam.

IV.30. Refer to the topology below and answer the following question.

Why has the Branch3 router lost connectivity with R1? Use only show commands to troubleshoot because usage of the debug command is restricted on the Branch3 and R1 routers?

  • A PPP chap hostname mismatch is noticed between Branch3 and R1
  • A PPP chap password mismatch is noticed between Branch3 and R1
  • PPP encapsulation is not configured on Branch3
  • The PPP chap hostname and PPP chap password commands are missing on the Branch3 router
Show (Hide) Explanation/Reference

First we should check Branch3 (and R1) with the “show ip interface brief” command to find any Layer1/Layer2 issue.

We see interfaces connecting between them are in “up/down” states which indicates a Layer 2 issue so we should check the configuration of these interfaces carefully witch the “show running-config” command and pay attention to these interfaces.

and on Branch3:

We learn from above config is R1 is using CHAP to authenticate Branch3 router (via the “ppp authentication chap” command on R1). Branch3 router is sending CHAP hostname “Branch_3” and CHAP password “Branch3_Secret!” to R1 to be authenticated. Therefore, we should check if R1 has already been configured with such username and password or not with the “show running-config” command on R1:

On R1 we see the configured username is “Branch3”, not “Branch_3” so the usernames here are mismatchedand this is the problem -> Answer A is correct.

IV.31. Which statement about the router configurations is correct?

  • The PPP PAP is authentication configured between Branch2 and R1
  • Tunnel keepalives are not configured for the tunnel0 interface on Branch2 and R2
  • The Branch 2 LAN network 192.168.11 0/24 is not advertised into the EIGRP network
  • The Branch3 LAN network 192.168.11 0/24 is not advertised into the EIGRP network
  • PPP CHAP authentication is configured between Branch1 and R1
Show (Hide) Explanation/Reference

In this question we have to check each option to see if it is correct. When we check Branch3 router we notice that “network 192.168.10.0” command is missing under “router eigrp 100” – > Answer D is correct.

IV.32. Refer to the topology below and answer the following question.

Why did Branch1 router lose WAN connectivity with R1 router?

  • A. The IP address is misconfigured on PPP multilink interface on the Branch1 router
  • B. The PPP multilink group is misconfigured on the Branch1 serial interfaces
  • C. The PPP multilink group is misconfigured on the R1 serial interfaces
  • D. The Branch1 serial interfaces are placed in a shutdown condition
Show (Hide) Explanation/Reference

This question clearly stated there is a WAN connectivity issue between R1 and Branch1 so we should check both of them with the “show ip interface brief” command. On R1:

On Branch1:

We can see that although the Multilink1 interfaces are in “up/up” state but they are not in the same subnet. According to the IP address scheme shown on the topology we can deduce the Multilink interface on Branch1 has been misconfigured, it should be 192.168.14.2 instead.

IV.33. DRAG DROP. Drag and drop the QoS features from the left onto the correct descriptions on the right.Select and Place:
Correct Answer:

IV.34. While troubleshooting a GRE tunnel interface issue, show interface command output displays tunnel status up, but line protocol is down. Which reason for this problem is the most likely?

  • The next hop server is misconfigured.
  • The route to the tunnel destination address is through the tunnel itself.
  • The tunnel was just reset.
  • The interface has been administratively shut down.

IV.35. Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?

  • router#show platform
  • router#show interfaces Serial 0/2/0
  • router#show ip interface s0/2/0
  • router#show ip interface brief
Show (Hide) Explanation/Reference
Output from real deviceRouter2901#sh int g0/0
GigabitEthernet0/0 is up, line protocol is up Hardware is CN Gigabit Ethernet, address is c471.fe99.9999 (bia c471.fe99.9999)
Description: Lan
Internet address is 10.1.1.1/25
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 1Gbps, media type is RJ45
output flow-control is unsupported, input flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of “show interface” counters never
Input queue: 0/75/61/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 39000 bits/sec, 30 packets/sec
5 minute output rate 73000 bits/sec, 37 packets/sec
41068530 packets input, 3905407112 bytes, 0 no buffer
Received 8678853 broadcasts (0 IP multicasts)
0 runts, 0 giants, 45 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 79853 multicast, 0 pause input
39267208 packets output, 2262399504 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
79926 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
Router2901#
Router2901 ip int g0/0
GigabitEthernet0/0 is up, line protocol is up
Internet address is 10.1.1.1/25
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Secondary address 192.168.1.7/24
Multicast reserved groups joined: 224.0.0.10
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Policy routing is disabled
Network address translation is enabled, interface in domain inside
BGP Policy Mapping is disabled
Input features: Common Flow Table, Stateful Inspection, Virtual Fragment Reassembly, Virtual Fragment Reassembly After IPSec Decryption, CAR, MCI Check
Output features: NAT Inside, Common Flow Table, Stateful Inspection, NAT ALG proxy, CAR
Post encapsulation features: CAR
IPv4 WCCP Redirect outbound is disabled
IPv4 WCCP Redirect inbound is disabled
IPv4 WCCP Redirect exclude is disabled
Router2901#

IV.36. Refer to the exhibit. In the Frame Relay network, which IP addresses would be assigned to the interfaces with point-to- point PVCs?

Correct Answer: C

Show (Hide) Explanation/Reference

With point to point PVC, each connection needs to be in a separate subnet. The R2-R1 connection (DLCI 16to 99) would have each router within the same subnet. Similarly, the R3-R1 connection would also be in the same subnet, but it must be in a different one than the R2-R1 connection.

IV.37. Refer to the exhibit. What is the reason that the interface status is “administratively down, line protocol down”?

  • There is no encapsulation type configured.
  • There is a mismatch in encapsulation types.
  • The interface is not receiving any keepalives.
  • The interface has been configured with the shutdown command.
  • The interface needs to be configured as a DTE device.
  • The wrong type of cable is connected to the interface.
Show (Hide) Explanation/Reference
Interface can be enabled or disabled with shutdown/no shutdown command. If you interface is down, it will display administratively down status. You can bring up an interface having administratively down interface using no shutdown command.

IV.38. The output of the show frame-relay pvc command shows “PVC STATUS = INACTIVE”. What does this mean?

  • The PVC is configured correctly and is operating normally, but no data packets have been detected for more than five minutes.
  • The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.
  • The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger a call to the remote router.
  • The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.
  • The PVC is not configured on the local switch.
Show (Hide) Explanation/Reference
The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:
+ ACTIVE: the PVC is operational and can transmit data + INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available + DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch
+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books.

IV.39. Which command is used to enable CHAP authentication, with PAP as the fallback method, on a serial interface?

  • Router(config-if)# ppp authentication chap fallback ppp
  • Router(config-if)# ppp authentication chap pap
  • Router(config-if)# authentication ppp chap fallback ppp
  • Router(config-if)# authentication ppp chap pap
Show (Hide) Explanation/Reference
This command tells the router to first use CHAP and then go to PAP if CHAP isn’t available.

IV.40. Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

  • RSA
  • L2TP
  • IPsec
  • PPTP
Show (Hide) Explanation/Reference
IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.

IV.41. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?

  • This command should be executed from the global configuration mode.
  • The IP address 10.121.16.8 is the local router port used to forward data.
  • 102 is the remote DLCI that will receive the information.
  • This command is required for all Frame Relay configurations.
  • The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.
Show (Hide) Explanation/Reference
Broadcast is added to the configurations of the frame relay, so the PVC supports broadcast, allowing therouting protocol updates that use the broadcast update mechanism to be forwarded across itself.

IV.42. Which two options are valid WAN connectivity methods? (Choose two.)

  • PPP
  • WAP
  • DSL
  • L2TPv3
  • Ethernet
Show (Hide) Explanation/Reference
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP was originally emerged as an encapsulation protocol for transporting IP traffic between two peers. It is a data link layer protocol used for WAN connections. DSL is also considered a WAN connection, as it can be used to connect networks, typically when used with VPN technology

IV.43. Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

  • IETF
  • ANSI Annex D
  • Q9333-A Annex A
  • HDLC
Show (Hide) Explanation/Reference
Cisco supports two Frame Relay encapsulation types: the Cisco encapsulation and the IETF Frame Relay encapsulation, which is in conformance with RFC 1490 and RFC 2427. The former is often used to connect two Cisco routers while the latter is used to connect a Cisco router to a non-Cisco router. You can test with your Cisco router when typing the command Router(config- if)# encapsulation frame-relay ? on a WAN link. Below is the output of this command (notice Cisco is the default encapsulation so it is not listed here, just press Enter to use it).

Note: Three LMI options are supported by Cisco routers are ansi, Cisco, and Q933a. They represent the ANSI Annex D, Cisco, and ITU Q933-A (Annex A) LMI types, respectively. HDLC is a WAN protocol same as Frame-Relay and PPP so it is not a Frame Relay encapsulation type.

IV.44. RouterA is unable to reach RouterB. Both routers are running IOS version 12.0. After reviewing the command output and graphic, what is the most likely cause of the problem?

  • incorrect bandwidth configuration
  • incorrect LMI configuration
  • incorrect map statement
  • incorrect IP address
Show (Hide) Explanation/Reference
First we have to say this is an unclear question and it is wrong. The “frame-relay map ip” statement is correct thus none of the four answers above is correct. But we guess there is a typo in the output. Maybe the “ip address 172.16.100.2 255.255.0.0 command should be “ip address 172.16.100.1 255.255.0.0.

IV.45. Refer to the exhibit. What is the meaning of the term dynamic as displayed in the output of the show framerelay map command shown?

  • The Serial0/0 interface is passing traffic.
  • The DLCI 100 was dynamically allocated by the router.
  • The Serial0/0 interface acquired the IP address of 172.16.3.1 from a DHCP server.
  • The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud.
  • The mapping between DLCI 100 and the end station IP address 172.16.3.1 was learned through Inverse.
Show (Hide) Explanation/Reference
Inverse Address Resolution Protocol (Inverse ARP) was developed to provide a mechanism for dynamic DLCI to Layer 3 address maps. Inverse ARP works much the same way Address Resolution Protocol (ARP) works on a LAN. However, with ARP, the device knows the Layer 3 IP address and needs to know the remote data link MAC address. With Inverse ARP, the router knows the Layer 2 address which is the DLCI, but needs to know the remote Layer 3 IP address. When using dynamic address mapping, Inverse ARP requests a nexthop protocol address for each active PVC. Once the requesting router receives an Inverse ARP response, itupdates its DLCI-to-Layer 3 address mapping table. Dynamic address mapping is enabled by default for all protocols enabled on a physical interface. If the Frame Relay environment supports LMI autosensing and Inverse ARP, dynamic address mapping takes place automatically. Therefore, no static address mapping is required.

IV.46. Which two statistics appear in show frame-relay map output? (Choose two.)

  • the number of BECN packets that are received by the router
  • the value of the local DLCI
  • the number of FECN packets that are received by the router
  • the status of the PVC that is configured on the router
  • the IP address of the local router
Show (Hide) Explanation/Reference
Sample “show frame-relay map” output: R1#sh frame mapSerial0/0 (up): ip 10.4.4.1 dlci 401(0x191,0x6410), dynamic,broadcast, status defined, activeSerial0/0 (up): ip 10.4.4.3 dlci 403(0x193,0x6430), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip 10.4.4.4 dlci 401(0x191,0x6410), static,CISCO, status defined, active

IV.47. Users have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router# show frame relay pvc command shown in the graphic, which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?

  • DLCI = 100
  • last time PVC status changed 00:25:40
  • in BECN packets 192
  • in FECN packets 147
  • in DE packets 0
Show (Hide) Explanation/Reference
If device A is sending data to device B across a Frame Relay infrastructure and one of the intermediate Frame Relay switches encounters congestion, congestion being full buffers, over- subscribed port, overloaded resources, etc, it will set the BECN bit on packets being returned to the sending device and the FECN bit on the packets being sent to the receiving device.

IV.48. Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?

  • show frame-relay lmi
  • show frame-relay map
  • show frame-relay pvc
  • show interfaces serial
Show (Hide) Explanation/Reference
When connecting Cisco devices with non-Cisco devices, you must use IETF4 encapsulation on both devices.
Check the encapsulation type on the Cisco device with the show frame-relay map exec command.

IV.49. It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following procedures are required to accomplish this task? (Choose three.)

  • Remove the IP address from the physical interface.
  • Encapsulate the physical interface with multipoint PPP.
  • Create the virtual interfaces with the interface command.
  • Configure each subinterface with its own IP address.
  • Disable split horizon to prevent routing loops between the subinterface networks.
  • Configure static Frame Relay map entries for each subinterface network.
Show (Hide) Explanation/Reference
For multiple PVC’s on a single interface, you must use subinterfaces, with each subinterface configured for each PVC. Each subinterface will then have its own IP address, and no IP address will be assigned to the main interface.

IV.50. What occurs on a Frame Relay network when the CIR is exceeded?

  • All TCP traffic is marked discard eligible.
  • All UDP traffic is marked discard eligible and a BECN is sent.
  • All TCP traffic is marked discard eligible and a BECN is sent.
  • All traffic exceeding the CIR is marked discard eligible.
Show (Hide) Explanation/Reference
Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network. Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

IV.51. Refer to the exhibit. Which statement describes DLCI 17?

  • DLCI 17 describes the ISDN circuit between R2 and R3.
  • DLCI 17 describes a PVC on R2. It cannot be used on R3 or R1.
  • DLCI 17 is the Layer 2 address used by R2 to describe a PVC to R3.
  • DLCI 17 describes the dial-up circuit from R2 and R3 to the service provider.
Show (Hide) Explanation/Reference
DLCI-Data Link Connection Identifier Bits: The DLCI serves to identify the virtual connection so that the receiving end knows which information connection a frame belongs to. Note that this DLCI has only local significance. Frame Relay is strictly a Layer 2 protocol suite.

IV.52. What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?

  • defines the destination IP address that is used in all broadcast packets on DCLI 202
  • defines the source IP address that is used in all broadcast packets on DCLI 202
  • defines the DLCI on which packets from the 192.168.1.2 IP address are received
  • defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address
Show (Hide) Explanation/Reference
This command identifies the DLCI that should be used for all packets destined to the 192.168.1.2 address. In this case, DLCI 202 should be used.

IV.53. What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)

  • They create split-horizon issues.
  • They require a unique subnet within a routing domain.
  • They emulate leased lines.
  • They are ideal for full-mesh topologies.
  • They require the use of NBMA options when using OSPF.
Show (Hide) Explanation/Reference
Subinterfaces are used for point to point frame relay connections, emulating virtual point to point leased lines. Each subinterface requires a unique IP address/subnet. Remember, you can not assign multiple interfaces in a router that belong to the same IP subnet.

IV.54. What command is used to verify the DLCI destination address in a Frame Relay static configuration?

  • show frame-relay pvc
  • show frame-relay lmi
  • show frame-relay map
  • show frame relay end-to-end
Show (Hide) Explanation/Reference
Sample “show frame-relay map” output: R1#sh frame mapSerial0/0 (up): ip 10.4.4.1 dlci 401(0x191,0x6410), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip 10.4.4.3 dlci 403(0x193,0x6430), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip 10.4.4.4 dlci 401(0x191,0x6410), static,CISCO, status defined,

IV.55. What is the purpose of Inverse ARP?

  • to map a known IP address to a MAC address
  • to map a known DLCI to a MAC address
  • to map a known MAC address to an IP address
  • to map a known DLCI to an IP address
  • to map a known IP address to a SPID
  • to map a known SPID to a MAC address
Show (Hide) Explanation/Reference
Dynamic address mapping relies on the Frame Relay Inverse Address Resolution Protocol (Inverse ARP), defined by RFC 1293, to resolve a next hop network protocol (IP) address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its Frame Relay PVC to discover the protocol address of the remote device connected to the Frame Relay network. The responses to the Inverse ARP requests are used to populate an address-to-DLCI mapping table on the Frame Relay router or access server. The router builds and maintains this address-to- DLCI mapping table, which contains all resolved Inverse ARP requests, including both dynamic and static mapping entries.

IV.56. All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?

  • show chap authentication
  • show interface serial0
  • debug ppp authentication
  • debug chap authentication
  • show ppp authentication chap

IV.57. A default Frame Relay WAN is classified as what type of physical network?

  • point-to-point
  • broadcast multi-access
  • nonbroadcast multi-access
  • nonbroadcast multipoint
  • broadcast point-to-multipoint

IV.58. Which of the following are key characteristics of PPP? (Choose three.)

  • can be used over analog circuits
  • maps Layer 2 to Layer 3 address
  • encapsulates several routed protocols
  • supports IP only
  • provides error correction

IV.59. How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?

  • Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the subinterface
  • Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic
  • Configure many sub-interfaces on the same subnet
  • Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces

IV.60. The Frame Relay network in the diagram is not functioning properly. What is the cause of the problem?

  • The Gallant router has the wrong LMI type configured
  • Inverse ARP is providing the wrong PVC information to the Gallant router
  • The S3 interface of the Steele router has been configured with the frame-relay encapsulation ietf command
  • The frame-relay map statement in the Attalla router for the PVC to Steele is not correct
  • The IP address on the serial interface of the Attalla router is configured incorrectly

IV.61. Refer to the exhibit. The network administrator is in a campus building distant from Building B. WANRouter is hosting a newly installed WAN link on interface S0/0. The new link is not functioning and the administrator needs to determine if the correct cable has been attached to the S0/0 interface. How can the administrator accurately verify the correct cable type on S0/0 in the most efficient manner?

  • Telnet to WANRouter and execute the command show interfaces S0/0
  • Telnet to WANRouter and execute the command show processes S0/0
  • Telnet to WANRouter and execute the command show running-configuration
  • Telnet to WANRouter and execute the command show controller S0/0
  • Physically examine the cable between WANRouter S0/0 and the DCE.
  • Establish a console session on WANRouter and execute the command show interfaces S0/0

IV.62. Refer to the exhibit. A network technician is unable to ping from R1 to R2. What will help correct the problem?

  • Ensure that the serial cable is correctly plugged in to the interfaces.
  • Apply the clock rate 56000 configuration command to the serial0/1 interface of R1.
  • Configure the serial0/1 interfaces on R1 and R2 with the no shutdown command.
  • Change the address of the serial0/1 interface of R1 to 192.1.1.4.
  • Change the subnet masks of both interfaces to 255.255.255.240.

IV.63. Refer to the exhibit. Which two statements are true of the interface configuration? (Choose two.)

  • The encapsulation in use on this interface is PPP.
  • The default serial line encapsulation is in use on this interface.
  • The address mask of this interface is 255.255.255.0.
  • This interface is connected to a LAN.
  • The interface is not ready to forward packets.

IV.64. An administrator issues the show ip interface s0/0 command and the output displays that interface Serial0/0 is up, line protocol is up. What does “line protocol is up” specifically indicate about the interface?

  • The cable is attached properly.
  • CDP has discovered the connected device.
  • Keepalives are being received on the interface.
  • A carrier detect signal has been received from the connected device.
  • IP is correctly configured on the interface.

IV.65. Refer to the exhibit. Which two statements are true based the output of the show frame-relay lmi command issued on the Branch router? (Choose two.)

  • LMI messages are being sent on DLCI 1023.
  • The LMI exchange between the router and Frame Relay switch is functioning properly.
  • LMI messages are being sent on DLCI 0.
  • The Frame Relay switch is not responding to LMI requests from the router.
  • The router is providing a clock signal on Serial0/0 on the circuit to the Frame Relay switch.
  • Interface Serial0/0 is not configured to encapsulate Frame Relay.

IV.66. What are three characteristics of satellite Internet connections? (Choose three)

  • A. Their upload speed is about 10 percent of their download speed.
  • B. They are frequently used by rural users without access to other high-speed connections.
  • C. They are usually at least 10 times faster than analog modem connections.
  • D. They are usually faster than cable and DSL connections.
  • E. They require a WiMax tower within 30 miles of the user location.
  • F. They use radio waves to communicate with cellular phone towers.
Show (Hide) Explanation/Reference
Many rural areas do not have cable Internet access and their only choice to connect to the Internet is via satellite. Satellite internet leverages the hundreds of satellites in orbit around the Earth to send and receive data over the Internet. Of course the speed of this type of connection is much slower than DSL and cable connections. But with new technologies, satellite connections may achieve data speed up to 50 Mbps -> B is correct, D is not correct.In general, the speeds of popular types of Internet connections are like this: DSL/cable > satellite Internet > dial-up (analog modem).Satellite Internet uses satellite for Internet connection -> E is not correct

Satellites use radio waves to communicate with the customer’s gateway, also known as a ground station (like a customer’s satellite dish), but not with cellular phone towers -> F is not correct.

For your information, satellite Internet uses high frequency signals, which range from 18.3 gigahertz to 31 gigahertz (Ka band).

Answer A C are two options left and they are acceptable answers. Although in practical they may vary a lot.

IV.67. Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)

  • the type of cable that is connected to the interface.
  • The uptime of the interface
  • the status of the physical layer of the interface
  • the full configuration of the interface
  • the interface‟s duplex settings
Show (Hide) Explanation/Reference
Below is an example of the output of this command:

The “show controllers serial …” command tells us about the type of the cable (in the case V.35 DTE cable) and the status of the physical layer of the interface. In above output we learn that there is an cable attached on S0/0 interface. If no cable is found we will see the line “No DTE cable” instead.

IV.68. Which type of topology is required by DMVPN?

  • ring
  • full mesh
  • hub-and-spoke
  • partial mesh
Show (Hide) Explanation/Reference
The topology of DMVPN is always hub-and-spoke as all Spokes are required to connect to the Hub router directly.

IV.69. Which statement about MPLS is true?

  • It operates in Layer 1.
  • It operates between Layer 2 and Layer 3.
  • It operates in Layer 3.
  • It operates in Layer 2.
Show (Hide) Explanation/Reference
MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

IV.70. What destination Layer 2 address will be used in the frame header containing a packet for host 172.30.4.4?

  • 704
  • 196
  • 702
  • 344
Show (Hide) Explanation/Reference
The output of the above show command displays that the local DLCI number corresponding to the subinterface of s1/0 whose IP address is 172.30.0.4 is 702.

IV.71. A static map to the S-AMER location is required. Which command should be used to create this map?

  • frame-relay map ip 172.30.0.3 704 broadcast
  • frame-relay map ip 172.30.0.3 196 broadcast
  • frame-relay map ip 172.30.0.3 702 broadcast
  • frame-relay map ip 172.30.0.3 344 broadcast
Show (Hide) Explanation/Reference
Based on the output of the command “show frame-relay map”, we know that DLCI mapped to the router SAMER is 196. (.3 In the above network topology, the complete Layer 3 IP address is 172.30.0.3)

IV.72. Which connection uses the default encapsulation for serial interfaces on Cisco routers?

  • The serial connection to the MidEast branch office.
  • The serial connection to the DeepSouth branch office.
  • The serial connection to the NorthCentral branch office.
  • The serial connection to the Multinational Core.
Show (Hide) Explanation/Reference
On the basis of the configuration on Dubai provided in the exhibit, we know that the encapsulation types of different interfaces are as follows:
Serial 1/0 : encapsulation frame-relay
Serial 1/2 and Serial 1/3 : both interfaces are encapsulated PPP
Serial 1/1: There is no related encapsulation information displayed, so its default encapsulation type is HDLC .
Based on the network topology provided in the exhibit, the interface Serial 1/1 is connected to the router
MidEast of the branch office, so the encapsulation type of the router MidEast is by default.
The default encapsulation on a serial interface is HDLC. The original HDLC encapsulation was defined by the International Organization for Standards (ISO), those same folks who developed the OSI model. The ISO version of HDLC had one shortcoming, however; it had no options to support multiple
Layer 3 routed protocols. As a result, most vendors have created their own form of HDLC. Cisco is no exception because it has its own proprietary form of HDLC to support various Layer 3 protocols such as IPX, IP, and AppleTalk.
The Serial connection to the Dub branch office using the default encapsulation type. You can change using:
* encapsulation command on interface

IV.73. If required, what password should be on the router in the MidEast branch office to allow a connection to be established with the Dubai router?

  • No password is required
  • En8ble
  • SCr8
  • T1net
  • C0nsole
Show (Hide) Explanation/Reference
In the diagram, DeepSouth is connected to Dubai’s S1/2 interface and is configured as follows:
Interface Serial1/2
IP address 192.168.0.5 255.255.255.252
Encapsulalation PPP ; Encapsulation for this interface is PPP
Check out the following Cisco Link:
http://www.cisco.com/en/US/tech/tk713/tk507/
technologies_configuration_example09186a0080094333.shtml#configuringausernamedifferentfromtherouters name
Here is a snipit of an example:
If Router 1 initiates a call to Router 2, Router 2 would challenge Router 1, but Router 1 would not challenge Router 2. This occurs because the ppp authentication chap callin command is configured on Router 1. This is an example of a unidirectional authentication. In this setup, the ppp chap hostname alias-r1 command is configured on Router 1. Router 1 uses “alias-r1” as its hostname for CHAP authentication instead of “r1.” The Router 2 dialer map name should match Router 1’s ppp chap hostname; otherwise, two B channels are established, one for each direction.

IV.74. Which two authentic methods are compatible with MLPPP on a serial Interface? (Choose two.)

  • PEAP
  • CHAP
  • TACACS+
  • PAP
  • LEAP

IV.75. Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?

  • The automatically generated user name
  • The local host name
  • The user name defined by the administrator
  • The host name of the remote device.
Show (Hide) Explanation/Reference
http://www.cisco.com/c/en/us/support/docs/wan point-to-point-protocol-ppp/10241-ppp-callin-hostname.html

IV.76. Which two benefits of implementing a full-mesh WAN topology are true?(Choose two)

  • increased latency
  • redundancy
  • improved scalability
  • reliability
  • reduced itter

IV.77. DRAG DROP. Drag and drop the PPPoE message types from the left into the sequence in which PPPoE messages are sent on the right.Select and Place:
Correct Answer:

IV.78. Which type of interface can negotiate an IP address for a PPPoE client?

  • Ethernet
  • dialer
  • serial
  • Frame Relay
Show (Hide) Explanation/Reference
In the Dialer interface, we can use the “ip address negotiated” command to ask for an IP address from the PPPoE Server.

IV.79. What does traffic shaping do to reduce congestion in a network?

  • buffers and queues packets.
  • buffers without queuing packets.
  • queqes without buffering packets.
  • drops packets.
Show (Hide) Explanation/Reference
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate.

Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the routing device.

IV.80. Refer to the exhibit. Which WAN protocol is being used?

  • ATM
  • HDLC
  • Frame Relay
  • PPP
Show (Hide) Explanation/Reference

This question is to examine the show int command.
According to the information provided in the exhibit, we can know that the data link protocol used in this network is the Frame Relay protocol.
“LMI enq sent…”

IV.81. Which option is the primary purpose of traffic shaping?

  • providing best-effort service
  • enabling policy-based routing
  • enabling dynamic flow identification
  • limiting bandwidth usage

Related Articles

113
Leave a Reply

avatar
62 Comment threads
51 Thread replies
17 Followers
 
Most reacted comment
Hottest comment thread
66 Comment authors
Null0NarcisAlexGaboAndreas Recent comment authors
newest oldest most voted
Null0
Guest
Null0

For everyone that is gonna take the test these days, just wanna say that more that 80% of the questions in here where in the test that i took today. Just pay attention to details. About LAB i had ACL one and EIGRP, but careful because configuration at EIGRP was a bit diffrent. Cheers

Narcis
Guest
Narcis

Question VII.15…the correct answer is c. hop-by-hop response time

Alex
Guest
Alex

VI.A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

Answer: C

Null0
Guest
Null0

145. Question is wrong, you need to switch single homed with single multihomed…multihomed means two or more different ISP and homed mean to only one ISP.

Null0
Guest
Null0

VIII.136. Which access layer threat mitigation technique provides security by acting as a filter between trusted and untrusted traffic sources?

DHCP snooping
dynamic packet inspection
a nondefault native VLAN
802.1X

It is DHCP Snooping and not 802.1X the correct answer.

” DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The DHCP snooping feature performs the following activities: ….
The DHCP snooping feature determines whether traffic sources are trusted or untrusted….” from cisco site.

alex
Guest
alex

II.112 Refer to the exhibit. The two exhibited devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? (Choose three.)

correct answer:

The Manchester serial address is 10.1.1.1
The London router is a Cisco 2610
The CDP information was received on port Serial0/0 of the Manchester router

Andreas
Guest
Andreas

qestion II.24 Which three commands MUST you enter
we cant enter 2 modes. in layer 3 switches we have to put switchport trunk encapsulation dot1q but the question doesnt mention layer 3. any suggestions?

Andreas
Guest
Andreas

question I.71 the answer is different than the explanation. pls be more specific

Adam
Guest
Adam

what does these sections means which pages is current and valid?

Germán Castro
Guest
Germán Castro

hi, guys. I believe the ansewer to the first question “. Which three statements about DWDM are true?” is wrong. It seems to me that the correct ones are A B D, instead of C D E as shown. Could you please comment on that?

Gabo
Guest
Gabo

I think the same too. That question appear in Sect II and IV. In the 2nd is answered correct.

****************************************************
DWDM circuits are used in all modern submarine communications cable systems and other long-haul circuits.

Specifically, DWDM

Enables bidirectional communications over one strand of fiber
Assigns incoming optical signals to specific wavelengths of light (i.e., frequencies)
Each channel is capable of carrying a 10-Gbps multiplexed signal
Can multiplex more than 80 different channels of data (i.e., wavelengths) onto a single fiber
Can amplify these wavelengths to boost the signal strength
Supports SONET and SDH standards

Alin
Guest
Alin

Question 159 the correct answer is 2 no 3 . I’m right?

Null0
Guest
Null0

Nope, its 3… 3 host to one port of a switch with a hub ( one collision), 2 hosts in another port ( two collision) and one port of the switch to the router and we have 3 collision, because it is asking how many collision are seen from the router and the router should be connected to the switch. Hope it helps

Khan
Guest
Khan

did anyone attempt the Cisco 200-125 exam in feb? Plz help out with the lab that came?

Bart
Guest
Bart

I.124. Which three are characteristics of an IPv6 anycast address? (Choose three.)

in that question you have only 2 answers marked instead of 3.

alex
Guest
alex

the third answer is: one-to-nearest communication model

Robin Hatton
Guest
Robin Hatton

I.34. – SA is the only possible answer as DA (although 6bytes) does not have to be a unique address as it can also be a broadcast address.

– Robin

Meek Mars
Guest
Meek Mars

Question 32

Why is not switch 1 the Root as it has the lowest priority?

Is it because switch 3 is at the distribution level?

Festus Morumbasi
Guest
Festus Morumbasi

VIII.232. Which port security violation mode drop traffic from unknown MAC addresses and sends an SNMP trap?

Correct answer: restrict

wasd22
Guest
wasd22

question 201 and 232 are the same with different answers.
VIII.232. Which port security violation mode drop traffic from unknown MAC addresses and sends an SNMP trap?

Protect
Resrict
Shutdown
Shutdown VLAN

still not sure about the answer, becuase the snmp trap is sent on different IOS version of the catalyst series ( https://community.cisco.com/t5/switching/snmp-trap-port-security-violation-shutdown-problem-stumper/td-p/1894494 )
3560X and 3750X, 3570 sent the snmp trap only on restrict, don’t know about newer models.

can somebody please clarify this? even in the netacad platform there isn’t a clear explanation (5.2.2.3 CCNA module 2)

hmm
Guest
hmm

I think #214 is wrong

should be Verify that the devices of interest are included in the device inventory

source: https://www.econfigs.com/ccna-6-4-verify-acls-using-the-apic-em-path-trace-acl-analysis-tool/

Before You Begin
Make sure that you have devices in your inventory. If not, discover devices using the Discovery function.
Ensure that the controller has SSH or Telnet access to the device

Abeer
Guest
Abeer

is it updated ?

vinoth
Guest
vinoth

hi i study CCNA version 6 .next month i will sit for the exam which dump is perfect for me please can you tell me

Alex
Guest
Alex

In qestion 221 I think the corect annswerd is pc to router crossover and sw to hub strait I think

Tanvir
Guest
Tanvir

Someones told me ccna dumps change today last dumps didn’t work, can you give me the latest dumps please

Sabbir
Guest
Sabbir

Q221: PC to Router cable is Crossover and Switch to Wireless Point is Staright-Through.

Farid
Guest
Farid

Hey guys, I wanted to ask a question on if we will get exact same questions on the real exam, and if this is made for practice only?

soni.ritika220@gmail.com
Guest
soni.ritika220@gmail.com

72. Which two statements about VTP are true? (Choose two.)

All switches must be configured with the same VTP domain name*
All switches must be configured to perform trunk negotiation.
All switches must be configured with a unique VTP domain name
The VTP server must have the highest revision number in the domain*
All switches must use the same VTP version.

The answer should be
All switches must be configured with the same VTP domain name*
All switches must use the same VTP version.
Please correct me if I am wrong

Abdi
Guest
Abdi

hey guys. the current CCNA is version 6. but the dump is i think its version 3 how can its compatible? please reply.

Abdi
Guest
Abdi

no one reply?

harlock
Guest
harlock

Is it still vaild?

Jin Kas
Guest
Jin Kas

Hi, is this still valid the questions and labs?

Nirmesh
Guest
Nirmesh

Is it still relevant?

John
Guest
John

Hello,
Can you please provide a downloaded pdf version?
Thank you.

Sasi
Guest
Sasi

Are these questions still valid

xhh
Guest
xhh

are the exams strick about mobile phone in room

Kamil
Guest
Kamil

VIII. 113. Show license udi and show version are correct. There is no command like show license status at all.

Ron
Guest
Ron

I don’t see IP SLA questions in this website. Does anyone know which session it belongs to ?
Thanks,

*.onion
Guest
*.onion

VIII.147
Correct Answer are:
–>Define a dialer interface*
–>**Create a dialer pool and bind it to the physical interface**

(Create a dialer pool and bind it to the virtual template* its not a correct anwser)

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-xe-3s-book/bba-pppoe-client-xe.html

*.onion
Guest
*.onion

VIII.108
corrects answer are:
–>The interface is error-disabled if packets arrive from a new unknown source address*
–>**It has dynamically learned two secure MAC addresses.**

When violation-mode is protect, violation counter does NOT increment.

(The security violation counter increments if packets arrive from a new unknown source address* its not a correct anwser)

https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/nxos/commands/l2/switchport-port-security-violation.html

Mati
Guest
Mati

–>The interface is error-disabled if packets arrive from a new unknown source address* INCORRECT

–>**It has dynamically learned two secure MAC addresses.** CORRECT

*.onion
Guest
*.onion

VIII.92.
I think, the correct answer is strict:
Strict is used to specify the hop(s) that you want the packet to go through, but no other hop(s) are allowed to be visited.

Record is a very useful option because it displays the address(es) of the hops (up to nine) the packet goes through.

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13730-ext-ping-trace.html

Joseph
Guest
Joseph

VIII.147.Which two actions must you take to correctly configure PPPoE on a client? (Choose two.)
The right answer is a : Define a dialer interface and Create a dialer pool and bind it to the physical
interface.

Rey
Guest
Rey

III.42. According to the routing table, where will the router send a packet destined for 10.1.5.65? – The multiple choice answers given in the VCE file needs to be corrected to the ones displayed here. III.15. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1? – No routing table is displayed 🙁 III.109. Which two are advantages of static routing when compared to dynamic routing? (Choose two.) – In the VCE file it only lets you choose one option even though it says choose two. III.65. A router receives… Read more »

Andrew
Guest
Andrew

VIII.25. Which two statements about configuring an Ether Channel on a Cisco switch are true?(Choose two)

The right answers are:
The interfaces configured in the Ether Channel must operate at the same speed and duplex mode*
The interfaces configured in the Ether Channel must be part of the same VLAN or trunk

But not:
The interfaces configured in the Ether Channel must be on the same physical switch*

Kevin
Guest
Kevin

Thank you for the information on your site, it really is very useful. About the file in VCE format please update it with all questions.

Andrew
Guest
Andrew

The question:
I.87. Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?

The right answer is a NDP, not an ARP

Andrey
Guest
Andrey

Question:
I.87.Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?
Right answer is NDP, not an ARP!!!

Tony
Guest
Tony

Are these questions still valid as i will be writing the exam in 2weeks time?

Rey
Guest
Rey

Routing Technologies – III.123. You have configured a router with an OSPF router ID, but its IP address still reflects the physical interface. Which action can you take to correct the problem in the least disruptive way?

Reload the OSPF process
Reboot the router
Specify a loopback address*
Save the router configuration

This one is really confusing. I think the correct answer is Reload the OSPF process.

Rey
Guest
Rey

Section V: Infrastructure Services, Q51: What statement is true about this configuration?

The answer should be C: the number 1 referred to in the ip inside source command references access-list number 1.

Agustin
Guest
Agustin

I had the exam last week. I gave it wrong. But 80% or more of the questions are here. Especially in section 8. My recommendation is to study a lot of labs, section 8 and all drag and drop

Andreea
Guest
Andreea

Hello,

I will go to the exam on 4 November. Could you please tell me if these dumps are still available?

Thank you very much!

tom
Guest
tom

Did you pass it?

Andreea
Guest
Andreea

Yes

tom
Guest
tom

Did you use another source except this website? Or just this questions are enough to pass it? Becase I’ll go memorize it. Thank you

ivan
Guest
ivan

Passed my exam past weekend. This site is very good, highly reccomend.

T.G.
Guest
T.G.

This is a great piece of job. I thank you all for taking the time to put this together. Very helpful. 🙂