[PART 5] CCNA 200-125 Dumps Questions and Answers Latest (VCE + PDF)

Rate this post

281.  What is the use of IPv4 private space (choose two)

  • connect applications together
  • save global address space*
  • something about NAT
  • allow intra-company communication*

282.  Assuming a subnet mask of, three of the following addresses are valid host addresses. Which are these addresses? (Choose three.)

Show (Hide) Explanation/Reference
From the subnet mask of we learn that the increment is 8 therefore is a network address which cannot be assigned to a host. Other network addresses are,,… Notice that is a valid host address (which belongs to to subnet).

283.  Which type does a port become when it receives the best BPDU on a bridge?

  • The designated port
  • The backup port
  • The alternate port
  • The root port*
Show (Hide) Explanation/Reference
Root port is the port on non-root bridge which is closest to the root bridge (in term of cost). Therefore when a port receives the best BPDU on a non-root bridge it will become the root port.

284.  Which value can you modify to configure a specific interface as the preferred forwarding interface?

  • The interface number
  • The port priority*
  • The VLAN priority
  • The hello time
Show (Hide) Explanation/Reference
We can configure the port priority to change the preferred forwarding interface as we wish. For example we can change the port priority of an interface for VLAN 20 to 64 as follows:

Switch(config-if)#spanning-tree vlan 20 port-priority 64

285.  Which statement about VLAN configuration is true?

  • The switch must be in VTP server or transparent mode before you can configure a VLAN*
  • The switch must be in config-vlan mode before you configure an extended VLAN
  • Dynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064`
  • A switch in VTP transparent mode save the VLAN databases to the running configuration only

286.  Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers? 

  • Switch1
  • Switch2
  • Switch3*
  • Switch4
Show (Hide) Explanation/Reference
First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which is connected directly to the Printers.

Next, by comparing the MAC address of Switch 3 and Switch 4 we found that the MAC of Switch 3 is smaller. Therefore the interface connected to the Printers of Switch 3 will become designated interface and the interface of Switch 4 will be blocked. The picture below shows the roles of all ports:

DP: Designated Port
RP: Root Port
BP: Blocked Port

(Please notice that Switch 1 will become the root bridge because of its lowest priority, not Switch 3)

287.  In which two situations should you use out-of-band management? 

  • when a network device fails to forward packets*
  • when you require ROMMON access*
  • when management applications need concurrent access to the device
  • when you require administrator access from multiple locations
  • when the control plane fails to respond

288.  Which command can you enter to configure a local username with an encrypted password and EXEC mode user privileges?

  • Router(config)#username jdone privilege 1 password 7 08314D5D1A48*
  • Router(config)#username jdone privilege 1 password 7 PASSWORD1
  • Router(config)#username jdone privilege 15 password 0 08314D5D1A48
  • Router(config)#username jdone privilege 15 password 0 PASSWORD1
Show (Hide) Explanation/Reference
Usually we enter a command like this:

username bill password westward

And the system display this command as follows:

username bill password 7 21398211

The encrypted version of the password is 21398211. The password was encrypted by the Cisco-defined encryption algorithm, as indicated by the “7”.
However, if you enter the following command: “username bill password 7 21398211”, the system determines that the password is already encrypted and performs no encryption. Instead, it displays the command exactly as you entered it.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfpass.html#wp1001412

289.  What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

  • The access point transmits, but the node is unable to receive.
  • A connection occurs.
  • Both the node and the access point are unable to transmit.
  • The node transmits, but the access point is unable to receive.*
Show (Hide) Explanation/Reference
802.11g is only compatible with 802.11b, not 802.11a so when 802.11a node broadcast, 802.11g access point cannot receive it.

290.  Which value is indicated by the next hop in a routing table?

  • preference of the route source
  • IP address of the remote router for forwarding the packets*
  • how the route was learned
  • exit interface IP address for forwarding the packets

291.  Which statement about the inside interface configuration in a NAT deployment is true?

  • It is defined globally
  • It identifies the location of source addresses for outgoing packets to be translated using access or route maps.*
  • It must be configured if static NAT is used
  • It identifies the public IP address that traffic will use to reach the internet.
Show (Hide) Explanation/Reference
When we specify a NAT “inside” interface (via the “ip nat inside” command under interface mode), we are specifying the source IP addresses. Later in the “ip nat” command under global configuration mode, we will specify the access or route map for these source addresses.

For example the command:

Router(config)# ip nat inside source list 1 pool PoolforNAT

after the keyword “source” we need to specify one of the three keywords:

+ list: specify access list describing local addresses (but this command does not require an “inside” interface to be configured)
+ route-map: specify route-map
+ static: specify static local -> global mapping

292.  Which option is the default switch port port-security violation mode?

  • shutdown*
  • protect
  • shutdown vlan
  • restrict
Show (Hide) Explanation/Reference
Shutdown is the default switch port port-security violation mode. When in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable recovery cause CLI command or by disabling and re-enabling the switchport.

293.  Which entity assigns IPv6 addresses to end users?

  • RIR
  • ISPs*
Show (Hide) Explanation/Reference
According to the official IANA website “Users are assigned IP addresses by Internet service providers (ISPs). ISPs obtain allocations of IP addresses from a local Internet registry (LIR) or National Internet Registry (NIR), or from their appropriate Regional Internet Registry (RIR): https://www.iana.org/numbers

294.  which value indicate the distance from the ntp authoritative time source?

  • priority
  • location
  • layer
  • stratum*

295.  Which NTP type designates a router without an external reference clock as an authoritative time source?

  • server
  • peer
  • master*
  • client

296.  Which 3 feature are represented by A letter in AAA? (Choose Three)

  • authorization*
  • accounting*
  • authentication*
  • accountability
  • accessibility
  • authority

297.  Which of the following are the valid numbers of standard ACL (choosse 2)

  • 50*
  • 1550*
  • 150
  • 1250
  • 2050
Show (Hide) Explanation/Reference
The range of standard ACL is 1-99, 1300-1999 so 50 and 1550 are two valid numbers.

298.  When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?

  • in the global config
  • Under serial interface
  • Under the routing protocol
  • Under the multilink interface*

299.  What are two statement for SSH?

  • use port 22*
  • unsecured
  • encrypted*
  • most common remote-access method
  • operate at transport

300.  If a route is not present in the routing table for a particular destination, what would the router do?

  • Default route
  • Flood
  • Drop*
  • No Answer

301.  Host is able to ping a web server but it is not able to do HTTP request.

  • ACL blocking port 23
  • ACL blocking All ports
  • ACL blocking port 80*
  • ACL blocking port 443
  • None of the above

302.  Which NTP command configures the local devices as an NTP reference clock source?

  • NTP Peer
  • NTP Broadcast
  • NTP Master*
  • NTP Server
Show (Hide) Explanation/Reference
From a Cisco perspective, getting the clock from an Internet time source and/or from a local timing device both require the same command (ntp server). To have a specific network device consider itself as a reference clock source, another command is used (ntp master)

For example, the command

Router(config)#ntp server

configures the local device to use a remote NTP clock source from while the command:

Router(config)#ntp master 1

configures the local device as a NTP reference clock source with stratum of 1.

Reference: http://www.pearsonitcertification.com/articles/article.aspx?p=2141272

303.  Which item represents the standard IP ACL?

  • Access-list 110 permit any any
  • Access-list 50 deny*
  • Access list 101 deny tvp any host
  • Access-list 2500 deny tcp any host eq 22
Show (Hide) Explanation/Reference
The range of standard ACL is 1-99, 1300-1999 so 50 is a valid number for standard ACL.

304.  Which command can you enter to verify that a 128-bit address is live and responding?

  • Traceroute
  • telnet
  • ping
  • ping ipv6*

305.  Where information about untrusted hosts are stored?

  • CAM table
  • Trunk table
  • MAC table
  • binding database*
Show (Hide) Explanation/Reference
The DHCP snooping binding database is also referred to as the DHCP snooping binding table. The DHCP snooping feature dynamically builds and maintains the database using information extracted from intercepted DHCP messages. The database contains an entry for each untrusted host with a leased IP address if the host is associated with a VLAN that has DHCP snooping enabled. The database does not contain entries for hosts connected through trusted interfaces.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html

306.  What is one benefit of PVST+?

  • PVST+ supports Layer 3 load balancing without loops.
  • PVST+ reduces the CPU cycles for all the switches in the network.
  • PVST+ allows the root switch location to be optimized per VLAN.*
  • PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.
Show (Hide) Explanation/Reference
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained and optimized per VLAN.

307.  Which statement about VLAN operation on Cisco Catalyst switches is true?

  • When a packet is received from an 802.1Q trunk, the VLAN ID can be determined from the source MAC
    address and the MAC address table.
  • Unknown unicast frames are retransmitted only to the ports that belong to the same VLAN.*
  • Broadcast and multicast frames are retransmitted to ports that are configured on different VLAN.
  • Ports between switches should be configured in access mode so that VLANs can span across the ports.
Show (Hide) Explanation/Reference
Each VLAN resides in its own broadcast domain, so incoming frames with unknown destinations are only transmitted to ports that reside in the same VLAN as the incoming frame.

308.  Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?

  • the switch with the highest MAC address
  • the switch with the lowest MAC address*
  • the switch with the highest IP address
  • the switch with the lowest IP address
Show (Hide) Explanation/Reference
Each switch in your network will have a Bridge ID Priority value, more commonly referred to as a BID.
This BID is a combination of a default priority value and the switch’s MAC address, with the priority value listed first. The lowest BID will win the election process.
For example, if a Cisco switch has the default priority value of 32,768 and a MAC address of 11-22-33- 44-55-66, the BID would be 32768:11-22-33-44-55-66. Therefore, if the switch priority is left at the default, the MAC address is the deciding factor in the root bridge election.

309.  Which two options are primary responsibilities of the APlC-EM controller? (Choose two.)

  • lt automates network actions between different device types.*
  • lt provides robust asset management.
  • lt tracks license usage and Cisco lOS versions.
  • lt automates network actions between legacy equipment.
  • lt makes network functions programmable.*
Show (Hide) Explanation/Reference


Automate network configuration and setup
Deploy network devices faster
Automate device deployment and provisioning across the enterprise.

Provide a programmable network
Enable developers to create new applications that use the network to fuel business growth.

310.  Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

  • ping address*
  • tracert address
  • traceroute address
  • arp address
Show (Hide) Explanation/Reference
To check the connectivity between a host and a destination (through some networks) we can use both “tracert” and “ping” commands. But the difference between these two commands is the “tracert” command can display a list of near-side router interfaces in the path between the source and the destination. In this question the PC and the host are in the same VLAN so “tracert” command is not useful as there is no router to go through. Therefore the best answer in this case is “ping address”.

Note: “traceroute” command has the same function of the “tracert” command but it is used on Cisco routers only, not on a PC.

311.   Refer to the exhibit.

Which two statements are true about interVLAN routing in the topology that is shown in the exhibit?
(Choose two.)

  • Host E and host F use the same IP gateway address.
  • Router1 and Switch2 should be connected via a crossover cable.
  • Router1 will not play a role in communications between host A and host D.
  • The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.*
  • Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.
  • The FastEthernet 0/0 interface on Router1 and the FastEthernet 0/1 interface on Switch2 trunk ports must be configured using the same encapsulation type.*
Show (Hide) Explanation/Reference
In order for multiple VLANs to connect to a single physical interface on a Cisco router, subinterfaces must be used, one for each VLAN. This is known as the router on a stick configuration. Also, for any trunk to be formed, both ends of the trunk must agree on the encapsulation type, so each one must be configured for 802.1q or ISL.

312.  What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?

  • path cost*
  • lowest port MAC address
  • VTP revision number
  • highest port priority number
  • port priority number and MAC address
Show (Hide) Explanation/Reference
The path cost to the root bridge is the most important value to determine which port will become the root port on each non-root switch. In particular, the port with lowest cost to the root bridge will become root port (on non-root switch).

313.   Refer to the exhibit.

lf RTRO1 as configured as shown, which three addresses will be received by other routers that are running ElGRP on the network? (Choose three.)

  • 172.16.4.O
  • 1O.O.O.O*
  • 172.16.O.O*
  • 192.168.2.O*
  • 192.168.O.O
  • 1O.4.3.O

314.  Which two statements about TACACS+ are true? (Choose two.)

  • lt can run on a UNlX server.*
  • lt authenticates against the user database on the local device.
  • lt is more secure than AAA authentication.
  • lt is enabled on Cisco routers by default.
  • lt uses a managed database.*
Show (Hide) Explanation/Reference


Many IT departments choose to use AAA (Authentication, Authorization and Accounting) protocols RADIUS or TACACS+ to address these issues.


This document describes how to configure a Cisco router for authentication with the TACACS+ that runs on
UNIX. TACACS+ does not offer as many features as the commercially available Cisco Secure ACS for
Windows or Cisco Secure ACS UNIX.
TACACS+ software previously provided by Cisco Systems has been discontinued and is no longer supported
by Cisco Systems.

315.  Which command enables RSTP on a switch?

  • spanning-tree uplinkfast
  • spanning-tree mode rapid-pvst*
  • spanning-tree backbonefast
  • spanning-tree mode mst
Show (Hide) Explanation/Reference
Rapid Spanning Tree Protocol (RSTP) is an enhancement of the original STP 802.1D protocol. The RSTP 802.1w protocol is an IEEE open implementation. Cisco has its own proprietary implementation of RSTP, that includes the benefits of its Per-VLAN spanning tree protocols, called Rapid-PVST+.
To activate the Rapid-PVST+ protocol: switch(config)#spanning-tree mode rapid-pvst

316.  A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?

  • More collision domains will be created.
  • IP address utilization will be more efficient.
  • More bandwidth will be required than was needed previously.
  • An additional broadcast domain will be created.*

317.  VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?

  • The command is rejected.
  • The port turns amber.
  • The command is accepted and the respective VLAN is added to vlan.dat.*
  • The command is accepted and you must configure the VLAN manually.
Show (Hide) Explanation/Reference
The “switchport access vlan 3″will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3.

318.  Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario?

  • 802.1Q giants frames could saturate the link.
  • VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.
  • A native VLAN mismatch error message will appear.*
  • VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.
Show (Hide) Explanation/Reference
A “native VLAN mismatch” error will appear by CDP if there is a native VLAN mismatch on an 802.1Q link. “VLAN mismatch” can cause traffic from one vlan to leak into another vlan.

319.  Refer to the exhibit

All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can
communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?

  • The access link needs to be configured in multiple VLANs.
  • The link between the switches is configured in the wrong VLAN.
  • The link between the switches needs to be configured as a trunk.*
  • VTP is not configured to carry VLAN information between the switches.
  • Switch IP addresses must be configured in order for traffic to be forwarded between the switches.
Show (Hide) Explanation/Reference
In order to pass traffic from VLANs on different switches, the connections between the switches must be configured as trunk ports.

320.  What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?

  • It creates a VLAN 999 interface.
  • It designates VLAN 999 for untagged traffic.*
  • It blocks VLAN 999 traffic from passing on the trunk.
  • It designates VLAN 999 as the default for all unknown tagged traffic.
Show (Hide) Explanation/Reference
Configuring the Native VLAN for Untagged Traffic A trunk port configured with 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default.

321.  Which parameter or parameters are used to calculate OSPF cost in Cisco routers?

  • Bandwidth*
  • Bandwidth and Delay
  • Bandwidth, Delay, and MTU
  • Bandwidth, MTU, Reliability, Delay, and Load
Show (Hide) Explanation/Reference



The cost (also called metric) of an interface in OSPF is an indication of the overhead required to send packets across a certain interface. The cost of an interface is inversely proportional to the bandwidth of that interface. A higher bandwidth indicates a lower cost. There is more overhead (higher cost) and time delays involved in crossing a 56k serial line than crossing a 10M ethernet line. The formula used to calculate the cost is:
cost= 10000 0000/bandwith in bps
For example, it will cost 10 EXP8/10 EXP7 = 10 to cross a 10M Ethernet line and will cost 10 EXP8/1544000 = 64 to cross a T1 line.
By default, the cost of an interface is calculated based on the bandwidth; you can force the cost of an interface with the ip ospf cost <value> interface subconfiguration mode command.

322.  Which command shows your active Telnet connections?

  • show cdp neigbors
  • show session*
  • show users
  • show vty logins
Show (Hide) Explanation/Reference
The “show users” shows telnet/ssh connections to your router while “show sessions” shows telnet/ssh connections from your router (to other devices). The question asks about “your active Telnet connections”, meaning connections from your router

323.  Refer to the exhibit.

Based on the exhibited routing table, how will packets from a host within the LAN be forwarded to

  • The router will forward packets from R3 to R2 to R1.
  • The router will forward packets from R3 to R1 to R2.
  • The router will forward packets from R3 to R2 to R1 AND from R3 to R1.*
  • The router will forward packets from R3 to R1.
Show (Hide) Explanation/Reference
From the routing table we learn that network is learned via 2 equal-cost paths ( & -> traffic to this network will be load-balancing.

324.  Refer to the exhibit. You have discovered that computers on the 192 168 10 0/24 network can ping their default gateway, but they cannot connect to any resources on a remote network. Which reason for the problem is most likely true?

  • The network is missing from OSPF.*
  • The OSPF process ID is incorrect.
  • The OSPF area number is incorrect.
  • An ARP table entry is missing for
  • A VLAN number is incorrect for
Show (Hide) Explanation/Reference
The most obvious thing in this configuration is R1 forgot to run OSPF on interface Fa0/0 (with the “network area …”) command so the computers behind network does not know how to reach resources on a remote network.

325.  Which WAN topology provides a direct connection from each site to all other sites on the network?

  • single-homed
  • full mesh*
  • point-to-point
  • hub-and-spoke
Show (Hide) Explanation/Reference
Full-mesh is a network topology in which there is a direct link between all pairs of nodes. Below is an example of full-mesh topology.

326.  Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)

  • tty password
  • enable secret password*
  • vty password*
  • aux password
  • console password
  • username password

327.  Refer to the exhibit. Which user-mode password has just been set?

  • Telnet*
  • Auxiliary
  • SSH
  • Console
Show (Hide) Explanation/Reference
When you connect to a switch/router via Telnet, you first need to provide Telnet password first. Then to access Privileged mode (Switch#) you need to provide secret password after typing “enable” before making any changes.

328.  Which component of a routing table entry represents the subnet mask?

  • Routing protocol code
  • Prefix
  • metric
  • Network mask*
Show (Hide) Explanation/Reference
IP Routing Table Entry Types
An entry in the IP routing table contains the following information in the order presented:
Network ID. The network ID or destination corresponding to the route. The network ID can be class- based, subnet, or supernet network ID, or an IP address for a host route.
Network Mask. The mask that is used to match a destination IP address to the network ID.
Next Hop. The IP address of the next hop.
Interface. An indication of which network interface is used to forward the IP packet.
Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number  of hops (routers crossed) to the network ID.
Routing table entries can be used to store the following types of routes:
Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network.
Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address ba- sis. For host routes, the network ID is the IP address of the specified host and the network mask is
Default Route. The default route is designed to be used when a more specific network ID or host route  is not found. The default route network ID is with the network mask of 

329.  How can you disable DTP on a switch port?

  • Configure the switch port as a trunk.* (no correct answer, in fact) 
  • Add an interface on the switch to a channel group.
  • Change the operational mode to static access
  • Change the administrative mode to access
Show (Hide) Explanation/Reference
Although some books and websites said DTP is disabled if the switch port is configured as trunk or access mode (via the command “switchport mode trunk” or “switchport mode access”) but in fact DTP is still running in these modes. Please read at http://packetlife.net/blog/2008/sep/30/disabling-dynamic-trunking-protocol-dtp/. The only way to disable DTP on a switch port is to use the “switchport nonegotiate” command. But notice this command can only be used after configuring that switch port in “trunk” or “access” mode.

Therefore this is a question with no correct answer but if we have to choose an answer, we will choose answer A. At least it is correct in theory.

330.  How is the redundancy represented in ntp master?

  • N:1
  • N+1*
  • 1:N
Show (Hide) Explanation/Reference
NTP redundancy

331.  Which command you enter on a switch to display the ip address associated with connected devices?

  • Show cdp neighbors detail*
  • Show cdp neighbor
  • Show cdp interface
  • Show cdp traffic
Show (Hide) Explanation/Reference
Only the “show cdp neighbor detail” gives us information about the IP address of the connected device. Below is an example of this command.

332.  Which technology can enable multiple vlan to communicate with one another?

  • Intra-vlan routing using a layer 3 switch
  • Inter-vlan routing using a layer 3 switch*
  • Inter-vlan routing using a layer 2 switch
  • Intra-vlan routing using router on a stick

333.  Which protocol is a Cisco proprietary implementation of STP?

  • CST
  • RSTP
  • MSTP
  • PVST+*

334.  Which Type of ipv6 unicast ip address is reachable across the internet?

  • Unique Local
  • Compatible
  • Link local
  • Global*


interface Loopback0
ip address
router bgp 999
neighbor remote-as 65001

Refer to the exhibit . Which Command do you enter so that R1 advertises the loopback0 interface to the BGP Peers?

  • Network mask*
  • Network
  • Network
  • Network mask
  • Network mask
  • Network
Show (Hide) Explanation/Reference
First please notice that unlike other routing protocols like OSPF or EIGRP, we have to use subnet mask, not wildcard mask, to advertise the routes in the “network” command -> C is not correct.

Secondly, with BGP, you must advertise the correct network and subnet mask in the “network” command ( in this case network BGP is very strict in the routing advertisements. In other words, BGP only advertises the network which exists exactly in the routing table (in this case network x.x.x.32/27 exists in the routing table as the Fa0/0 interface). If you put the command “network x.x.0.0 mask” or “network x.0.0.0 mask” or “network x.x.x.33 mask” then BGP will not advertise anything.

Therefore the full command in this question is “network mask”.

For more information about BGP configuration, please read our Basic BGP Configuration tutorial.

336.  Which networking Technology is currently recognized as the standard for computer networking?

  • System network architecture
  • Transmission control protocol/Internet protocol*
  • Open system Interconnect
  • Open network architecture

337.  Which two are advantages of static routing when compared to dynamic routing? (Choose two.) 

  • Configuration complexity decreases as network size increases.
  • Security increases because only the network administrator may change the routing table.*
  • Route summarization is computed automatically by the router.
  • Routing tables adapt automatically to topology changes.
  • An efficient algorithm is used to build routing tables, using automatic updates.
  • Routing updates are automatically sent to neighbors.
  • Routing traffic load is reduced when used in stub network links.*
Show (Hide) Explanation/Reference
Since static routing is a manual process, it can be argued that it is more secure (and more prone to  human errors) since the network administrator will need to make changes to the routing table directly.
Also, in stub networks where there is only a single uplink connection, the load is reduced as stub routers  just need a single static default route, instead of many routes that all have the same next hop IP address. 

338.  Refer to the exhibit. 

Which rule does the DHCP server use when there is an IP address conflict?

  • The address is removed from the pool until the conflict is resolved.*
  • The address remains in the pool until the conflict is resolved.
  • Only the IP detected by Gratuitous ARP is removed from the pool.
  • Only the IP detected by Ping is removed from the pool.
  • The IP will be shown, even after the conflict is resolved.
Show (Hide) Explanation/Reference
An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP  checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from  the pool. The address will not be assigned until the administrator resolves the conflict.

339.  Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.) 

  • Set the IP gateway to be used by the network.
  • Perform host discovery used DHCPDISCOVER message.
  • Configure IP address parameters from DHCP server to a host.*
  • Provide an easy management of layer 3 devices.
  • Monitor IP performance using the DHCP server.
  • Assign and renew IP address from the default pool.*
Show (Hide) Explanation/Reference
The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that  are connected to a network (known as hosts) so they can communicate on that network using the  Internet Protocol (IP). It involves clients and a server operating in a client-server model. DHCP servers  assigns IP addresses from a pool of addresses and also assigns other parameters such as DNS and default  gateways to hosts. 

340.  Which definition of default route is true?

  • A route that is manually configured.
  • A route used when a destination route is missing.
  • A route to the exact /32 destination address*
  • Dynamic route learned from the server.

341.  Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?

  • The automatically generated user name
  • The local host name*
  • The user name defined by the administrator
  • The host name of the remote device.
Show (Hide) Explanation/Reference

342.  Which two statements about Ethernet standards are true?(choose two)

  • Ethernet is defined by IEEE standard 802.2
  • Ethernet is defined by IEEE standard 802.3*
  • Ethernet 10BASE-T dose not support full-duplex.
  • When an Ethernet network uses CSMA/CD ,it terminates transmission as soon as collision occurs*
  • When an Ethernet network uses CSMA/CA ,it terminates transmission as soon as collision occurs

343. How to configure RIPv2? (Choose Two.)

  • Enable RIP*
  • Connect RIP to WAN interface
  • Enable no auto-summary*
  • Enable authentication
Show (Hide) Explanation/Reference
“Enable RIP” is surely correct to configure RIPv2 but “enable auto-summary” is not recommended. Maybe there is another suitable option for this question (like “use ‘version 2’ command” or “Allowing Unicast Updates for RIP”).

344. Which technology supports multiple dynamic secure connections over an unsecure transport network?

  • Point-to-point
  • DMVPN*
  • VPN
  • site-to-site VPN

345. interface fa0/0
ip address x.x.x.33
router bgp XXX
neighbor x.x.x.x remote as x.x.x.x
You need to advertise the network of Int fa0/0.

  • x.x.x.32 mask*
  • x.x.x.32
  • x.x.x.32 mask
  • x.x.x.33 mask

346. Which two statements about MPLS are true? (Choose two)

  • It provides automatic authentication
  • It can carry multiple protocols, including IPv4 and IPv6*
  • It encapsulates all traffic in an IPv4 header
  • It uses labels to separate and foward customer traffic*
  • It tags customer traffic using 802.1q
Show (Hide) Explanation/Reference
MPLS supports IPv4, IPv6, IPX, AppleTalk at the network layer. MPLS supports Ethernet, Token Ring, FDDI, ATM, FR, PPP at the link layer.

MPLS uses label switching to forward packets over Ethernet. Labels are assigned to packets based on groupings or forwarding equivalence classes (FECs). The label is added between the Layer 2 and the Layer 3 header.

347. Which command is used to build DHCP pool?

  • ip dhcp pool DHCP*
  • ip dhcp conflict
  • ip dhcp-server pool DHCP
  • ip dhcp-client pool DHCP
Show (Hide) Explanation/Reference
The following example shows how to configure a DHCP Server on a Cisco router:

Configuration Description
Router(config)#ip dhcp pool CLIENTS Create a DHCP Pool named CLIENTS
Router(dhcp-config)#network /24 Specifies the subnet and mask of the DHCP address pool
Router(dhcp-config)#default-router Set the default gateway of the DHCP Clients
Router(dhcp-config)#dns-server Configure a Domain Name Server (DNS)
Router(dhcp-config)#domain-name 9tut.com Configure a domain-name
Router(dhcp-config)#lease 0 12 Duration of the lease (the time during which a client computer can use an assigned IP address). The syntax is “lease{days[hours] [minutes] | infinite}”. In this case the lease is 12 hours. The default is a one-day lease.
Before the lease expires, the client typically needs to renew its address lease assignment with the server
Router(config)# ip dhcp excluded-address The IP range that a DHCP Server should not assign to DHCP Clients. Notice this command is configured under global configuration mode

Note: We checked with both Cisco IOS v12.4 and v15.4 but found no “ip dhcp-server pool” command:

Therefore the answer “ip dhcp-server pool …” is not correct.

348. Which option describes a benefit of a point-to-point leased line ?

  • Low cost
  • Full-mesh capability
  • Flexibillity of design
  • Simply of configuration*

349. Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable or auto mode?

  • Dynamic Auto
  • Dynamic Desirable*
  • Access
  • Trunk

350. which type of IP address of ipv6 that also exist in IPv4 but barely used?

  • unicast
  • multicast
  • anycast*
  • broadcast

Download PDF File below:

Related Articles

Leave a Reply

Photo and Image Files
Audio and Video Files
Other File Types