www.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.ws

Tiada TUHAN selain ALLAH dan Nabi Muhammad adalah rasul ALLAH

Minggu, 06 Juli 2008

Tips Reparasi Komputer

Buat temen-temen yang punya masalah dengan komputer !!! neh ada beberapa tips perbaikan komputer moga aja bermanfaat !!

Masalah Pada Power Supply

Gejala : Setelah dihidupkan PC tidak bereaksi apa-apa, tidak ada tampilan di monitor, tidak ada lampu indikator (led) yang menyala, kipas power supply tidak berputar, lampu indikator pada monitor tidak menyala.

Solusi : Periksalah apakah kabel terhubung dengan benar dan steker terpasang dengan baik pada soketnya, periksa juga apakah ada tombol on/off dibelakang tepatnya dibelakang Power Supply sudah dalam posisi On, Jika sudah yakin terpasang dengan benar tapi tetap tidak ada respon untuk meyakinkan silahkan anda ganti kabel power dengan yang anda yakini bagus. Masalah terjadi karena tidak adanya tegangan listrik yang masuk, kerusakan ada pada kabel power.

Masalah : Setelah dihidupkan PC tidak bereaksi apa-apa, tidak ada tampilan di monitor, tidak ada lampu indikator (led) yang menyala, kipas power supply tidak berputar, lampu indikator pada monitor menyala.

Solusi : lakukan seperti langkah diatas, tetapi jika masih belum ada respon berati masalah ada pada Power Supply, Silahkan anda ganti PS nya, Saya sarankan sebaiknya anda ganti saja Power Supply yang rusak dengan yang baru, dan hati-hatilah dalam pemasangannya.

Catatan : Jika kerusakan hanya pada Power Supply saja, Setelah anda menggantinya, komputer akan kembali bekerja dengan normal. Kecuali jika ada masalah pada komponen yang lainnya seperti Mother Board, VGA Card dan Memory.



Masalah Pada Mother Board

Gejala : Setelah dihidupkan, tidak ada tampilan di monitor, lampu indikator (led) di panel depan menyala, lampu indikator (led) monitor berkedip-kedip, kipas power supply dan kipas procesor berputar, tidak ada suara beep di speaker.

Solusi : Langkah pertama lepas semua kabel power yang terhubung ke listrik, kabel data ke monitor, kabel keyboad/mouse, dan semua kabel yang terhubung ke CPU, kemudian lepas semua sekrup penutup cashing. Dalam keadaan casing terbuka silahkan anda lepaskan juga komponen-komponen lainnya, yaitu kabel tegangan dari power supply yang terhubung ke Motherboard, harddisk, floppy, hati-hati dalam pengerjaannya jangan terburu-buru. Begitu juga dengan Card yang menempel pada Mboard (VGA, Sound atau Card lainnya). Sekarang yang menempel pada cashing hanya MotherBoard saja. Silahkan anda periksa Motherboadnya dengan teliti, lihat Chip (IC), Elko, Transistor dan yang lainnya apakah ada yang terbakar.

Jika tidak ada tanda-tanda komponen yang terbakar kemungkinan Motherboard masih bagus, tapi ada kalanya Mboard tidak jalan karena kerusakan pada program yang terdapat di BIOS



Masalah Pada Harddisk

Gejala : Pada saat CPU dinyalakan kemudian melakukan proses Post setelah itu proses tidak berlanjut dan diam beberapa saat tidak langsung masuk ke operating system, dan kemudian di layar monitor ada pesan "harddisk error, harddisk Failur, setelah itu muncul pesan "press F1 to continou" setelah kita menekan tombol F1 tidak masuk Operating system dan muncul pesan "Operating system not found".

Solusi : Periksa kabel tegangan dan kabel data yang masuk ke harddisk apakah longgar, sebaiknya dikencangkan, kemudian nyalakan dan coba anda dengarkan apakah suara yang keluar dari harddisk normal, jika tidak normal berati harddisk rusak di controllernya.

Gejala : Pada saat CPU dinyalakan kemudian melakukan proses Post setelah itu muncul pesan "Operating system not found".

Solusi : Ada kemungkinan Operating system rusak, bisa diatasi dengan install ualng atau jika OS anda menggunakan windows 2000/XP ada Fasilitas Repairnya. atau ada kemungkinan juga harddisk anda tidak terdeteksi dan lakukan langkah diatas

Gejala : harddisk bad sector?

Solusi : Ada beberapa faktor penyebab terjadi bad sector diantaranya, tegangan listrik tidak stabil, sering terjadi putusnya aliran listrik secara mendadak, setelah pemakaina tidak di shot down, pemakaian yang terlalu lama, ada 2 jenis bad sector yaitu fisik dan software.....Untuk mengatasinya ada beberapa cara, diantaranya menggunakan software untuk menghilangkan badsector....pembahan lebih lanjut ada di eBook Metode perbaikan komputer dan bisa anda dapatkan jika anda bergabung menjadi Member Aktif.



Mengatasi Masalah Pada CD/DVD/ROM/RW

Gejala : Jenis kerusakan yang biasa ditemui :

1. Tidak terdeteksi di windows

2. Tidak bisa keluar masuk CD

3. Tidak bisa membaca/menulis/hanya bisa membaca saja. (CD)

4. Tidak bisa membaca/menulis/write protect (Floppy disk)

Solusi :

1. Periksa kabel data dan kabel tegangan yang masuk ke CD-floppy, perikas di setup bios apakah sudah dideteksi? sebaiknya diset auto. Periksa apakah led menyala, jika tidak kerusakan di Controllernya.

2. Kerusakan ada pada mekanik motor atau karet motor.

3. Kerusakan Biasanya pada optik, tetapi ada kemungkinan masih bisa diperbaiki dengan cara men-set ualng optik tersebut.

4. Head Kotor, bisa dibersihkan menggunakan Cutenbud

(langkah-langkah diatas secara lengkap dapat anda temukan di e-book "Metode perbaikan komputer cepat dan akurat" dan bisa anda dapatkan jika anda bergabung menjadi member perbaikankomputer.com



Masalah BIOS

Gejala : Hati-hati dalam Update Bios, ketika meng-Update anda keliru memilih versi Bios, PC jadi tidak jalan bahkan anda tidak dapat masuk ke BIOS.

Solusi : Biasanya Update tidak dapat dibatalkan, hanya jenis Motherboard tertentu yang memiliki backup BIOS pada Chip-nya, Disitu tersimpan jenis asli BIOS yang tidak dapat dihapus, untuk dapat merestore-nya anda tinggal memindahkan Posisi Jumper khusus yang biasanya sudah ada petunjuk di buku manualnya. Kemudian hidupka PC dan tunggu 10 detik, BIOS yang asli telah di Restore, kembalikan Posisi Jumper pada posisi semula, dan PC siap dijalankan kembali. Jika Motherboard tidak memiliki pasilitas tersebut, Chip BIOS harus dikirim ke Produsen, Jenis BIOS dapat anda lihat di buku manualnya. Berhati-hati dalam pemasangannya jangan sampai kaki IC BIOS patah atau terbalik Posisinya.

Gejala : CPU mengeluarkan suara Beep beberapa kali di speakernya dan tidak ada tampilan ke layar monitor, padahal monitor tidak bermasalah.

Solusi : Bunyi Beep menandakan adanya pesan kesalahan tertentu dari BIOS, Bunyi tersebut menunjukan jenis kesalahan apa yang terjadi pada PC, Biasanya kesalahan pada Memory yang tdk terdeteksi, VGA Card, yang tidak terpasang dengan baik, Processor bahkan kabel data Monitor pun bisa jadi penyebabnya.Silahkan anda periksa masalah tersebut.

Berikut Pesan kesalahan BIOS

Bunyi kesalahan BIOS biasanya tidak semua Motherboard menandakan kesalahan yang sama tergantung dari jenis BIOS nya.

[AMI BIOS]

Beep 1x : RAM/Memory tidak terpasang dengan Baik atau Rusak, Beep 6x : Kesalahan Gate A20 - Menunjukan Keyboard yang rusak atau IC Gate A20-nya sendiri, Beep 8x : Grapihic Card / VGA Card tidak terpasang dengan baik atau Rusak, Beep 11x : Checksum Error, periksa Batre Bios, dan ganti dengan yang baru.

[AWARD BIOS]

Beep 1x Panjang : RAM/Memory tidak terpasang dengan Baik atau Rusak, Beep 1x Panjang 2x Pendek : Kerusakan Pada Graphic Card (VGA), Periksa bisa juga Pemasangan pada slotnya tidak pas (kurang masuk), Beep 1x Panjang 3x Pendek : Keyboard rusak atau tidak terpasang. Beep Tidak terputus / bunyi terus menerus : RAM atau Graphic Card tidak terdeteksi.

Batrey CMOS Rusak / Lemah

Gejala : Muncul Pesan CMOS Checksum Vailure / Batrey Low, diakibatkan tegangna yang men-supply IC CMOS/BIOS tidak normal dikarenakan batrey lemah, sehingga settingan BIOS kembali ke Default-nya/setingan standar pabrik, dan konfigurasi Hardware harus di Set ulang.

Solusi : Segera Ganti Batrey nya

Gejala : CPU yang sering Hang?

Solusi : Ada beberapa faktor terjadi hanging diantaranya : Ada BadSector di Harddisk, Ada Virus, Ada masalah di Hardware seperti Memory Kotor/Rusak, MBoard Kotor/Rusak, Cooling Fan perputaran fan nya sudah lemah, Power Supply tidak stabil.....sebaiknya jangan dipaksakan untuk digunakan karena akan berakibat lebih fatal, silahkan hub: kami untuk dapat mengatasi masalah tersebut

Gejala : Komputer sering tampil blue screen apa penyebabnya?

Solusi : Pesan Blue Screen bisa disebabkan system windows ada yang rusak, Bisa dari Memory, Bisa dari hardisk, bisa dari komponen lainnya, tergantung pesan blue screen yang ditampilkan.

Gejala : Komputer jadi lebih lambat dari sebelumnya, padahal awalnya tidak begitu lambat

Solusi : Penyebab komputer anda prosesnya lambat ada beberapa faktor yaitu : Space hardisk terlalu penuh, terlalu banyak program / software yang memakan space harddisk dan memory, ada virus, harddisk badsector.

Senin, 30 Juni 2008

Langkah Up Date AVG

Buat temen-temen yang pake antivirus AVG neh cara updatenya moga aja bermanfaat !!!!


1. Klik Kanan icon AVG di Pojok Kanan bawah pilih check for update



2. Maka akan tampil kotak dialog sebagai berikut



3. Klik Folder untuk memilih folder Update, maka akan tampil :



4. Pilih folder yang berisi Update AVG terbaru lalu klik Ok maka proses update akan berjalan, tunggu sampai proses selesai.

5. Jika muncul kotak dialok selesai Klik OK sebelum 30 Secon

Rabu, 18 Juni 2008

Antara Persahabatan dan Cinta


Persahabatan dan Cinta adalah teman terbaik kerana dimana ada Cinta, Persahabatan selalu berada disampingnya. Dan dimana Persahabatan berada, Cinta selalu tersenyum ceria dan tidak pernah meninggalkan Persahabatan.Pada suatu hari, Persahabatan mula berpikir bahwa Cinta telah membuat dirinya tidak mendapat perhatian lagi karena Persahabatan menganggap Cinta lebih menarik daripada dirinya.

Seringkali Cinta cuma dijadikan kambing hitam sebagai perusak sebuah persahabatan. SALAH BESAR !!! Seharusnya dengan adanya Cinta, persahabatan akan semakin menyenangkan. Buat teman-teman yang sedang menjalin Persahabatan. Penuhilah persahabatanmu dengan Cinta, berikanlah Cinta yang terbaik untuk sahabatmu.

Persahabatan merupakan bentuk hubungan yang indah antara manusia, di mana Cinta hadir untuk memberikan senyumnya dan mewarnai Persahabatan. Tanpa Cinta, Persahabatan mungkin akan diisi dengan Kecewa, Benci, Marah dan berbagai hal yang membuat Persahabatan tidak lagi indah. Berhentilah membuat batas antara Cinta dan Persahabatan, biarkan mereka tetap menjadi Teman baik. Yang harus diluruskan adalah Cinta bukanlah perusak Persahabatan, Cinta memperindah persahabatan anda.

Bikin Blog Cantik

Dunia blogosphere seakan tak pernah berhenti untuk memberikan beragam pernak pernik blog kepada blogger. Blogger pun nampak menanggapi ini dengan selalu bereksperiman dengan mengedit dan mencomot source code dari penyedia aplikasi.

Aksesoris blog agar tampil cantik, user friendly, serta kita pun sebagai pengelola blog akan senang melihat nya. Antara lain sebagai berikut :


* Penambah jam : http://www.clocklink.com/


* Penambah Statistic Reader : http://feedjit.com/

* Penghitung statistik pengunjung di blog kita : http://www.sitemeter.com

* Penambah polling : http://www.ballot-box.net


* Menambah jadwal solat di blog kita : http://myquran.org


* Memberi Kamus Online pada blog kita : http://kamus.net


* Menambah kalender unik pada blog kita : http://www.free-blog-content.com


* Menambah prakiraan cuaca pada blog kita : http://www.weather.com

Penggunaan aksesoris diatas, bisa kita pelajari dengan men copy paste kan code dari penyedia layanan yang diberikan kemudian kita masukkan ke halaman page element.

Selasa, 03 Juni 2008

CCNA 3 Final

English FormE-2b CCNA3 Version3.1 Final - 2006 Fall



1. Refer to the exhibit. The network has converged and Switch_6 has been elected root bridge of the STP tree. However, network traffic analysis indicates that Switch_1 would be a better root bridge. How can the network administrator make this change, assuming that the spanning-tree priorities are at the default settings?



Set the bridge priority of Switch_1 to 32,768.

Set the bridge priority of Switch_6 to 65,565.

***Set the bridge priority of Switch_1 to 1.

Set the bridge priority of Switch_6 to 255.



2. When should EIGRP automatic summarization be turned off?

when a router has not discovered a neighbor within three minutes

when a router has more than three active interfaces

***when a router has discontiguous networks attached

when a router has less than five active interfaces























3. Refer to the output in the exhibit. What can be determined from the information shown?

VTP has been enabled for all ports.

Hosts in VLAN11 and VLAN22 must have IP addresses in the same subnet in order for them to exchange data.

Three ports have been assigned to the management VLAN.

***ARP requests issued by the host on port Fa0/12 will be seen by all hosts on VLAN33.



4. Refer to the OSPF network in the exhibit. Router R2 has been elected DR, but router R1 is the more powerful router. How can the network administrator configure R1 to force it to be elected as DR?

R1(config)# ospf priority 1

R1(config)# ip ospf priority 255

R1(config)# interface fastethernet 0/0

R1(config-if)# ospf priority 0

R1(config)# interface fastethernet 0/0

R1(config-if)# ip ospf priority 0

***R1(config)# interface fastethernet 0/0

R1(config-if)# ip ospf priority 255



5. Which of the following are attributes of link-state routing protocols? (Choose three.)

Periodic updates are sent every 120 seconds to neighboring routers.

Each router sends its entire routing table to neighboring routers.

***Routers send updates when a change in the network is detected.

***Link-state protocols converge more rapidly than distance vector protocols.

After convergence, link-state protocols use more bandwidth than distance vector protocols use.

***Link-state protocols are less prone to routing loops than distance vector protocols.



6. Refer to the exhibit. What will be the result of DR elections in the OSPF network shown? (Choose three.)

***CTL will be DR of the 172.16.4.0/24 network.

ID3 will be DR of the 172.16.4.0/24 network.

***CTL will be DR of the 172.16.5.0/24 network.

ID1 will be DR of the 172.16.5.0/24 network.

***CTL will be DR of the 172.16.8.0/24 network.

ID2 will be DR of the 172.16.8.0/24 network.



7. The network administrator shown in the exhibit is connected to an Ethernet LAN port on ACC-1. The administrator needs to verify the configuration of the newly installed switch ACC-3. What must be done so that the administrator can access ACC-3 with a web browser? (Choose three.)

***Establish the Layer 3 connectivity of the host to ACC-3.

Set the password on the management VLAN.

Configure the hostname on ACC-3.

***Activate the HTTP service on ACC-3.

***Configure IP addressing parameters on ACC-3.



8. Which of the following tasks must be completed to configure a router interface to serve the newly added network 192.168.10.64/27 and to advertise this network over RIP v2? (Choose three.)

***RIP v2 must be configured with the network command and the IP network number for the new network.

RIP v2 must be configured with the network command and the IP host address and subnet mask for the newly activated interface.

The router must be configured with the ip subnet-zero command so that this network can be added and advertised.

***A network host address and subnet mask must be applied to the newly activated interface.

***The routing protocol must be activated with the router rip and version 2 commands.

RIP v2 must be configured on the other enterprise routers with an entry for the newly added network.



9. Multiple routers have been configured with EIGRP as the routing protocol for use in the corporate network. What is true of the operation of this network? (Choose three.)

Only link-state protocols will run in the network.

***Routing information in the form of partial updates will be sent in response to topology changes.

***The network can support multiple routed protocols.

***Hello packets are used to discover and verify the status of neighboring routers.

Routing updates are broadcast to all other routers in the network.

Routing updates that consist of entire routing tables are sent to neighboring routers.



10. Refer to the graphic. Which of the following commands would be used on the router to provide communication between the two hosts connected to the switch?

interface vlan 2

ip address 192.168.2.1 255.255.255.0

no shutdown

interface vlan 3

ip address 192.168.3.1 255.255.255.0

no shutdown

***interface fastethernet 0/0

no shutdown

interface fastethernet 0/0.2

encapsulation dot1q 2

ip address 192.168.2.1 255.255.255.0

interface fastethernet 0/0.3

encapsulation dot1q 3

ip address 192.168.3.1 255.255.255.0

interface vlan 2

switchport mode trunk dot1q

interface vlan 3

switchport mode trunk dot11

interface fastethernet 0/0

mode trunk dot1q 2 3

ip address 192.168.2.1 255.255.255.0



11. Refer to the exhibit. Two Catalyst switches are connected, and both switches have ports configured for the Sales and Marketing VLANs as shown. What will allow hosts on the same VLAN to communicate with one another across different switches?

STP

VTP

routing

***trunking



12. Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch SW-A with a default gateway. Assuming the switch IP address is 192.168.120.12/24, what command string will the administrator use to assign a default gateway to the switch?

SW-A(config)# ip gateway 192.168.120.1

SW-A(config)# ip route 0.0.0.0 0.0.0.0 192.168.120.255

SW-A(config)# ip route 192.168.120.254 255.255.255.0 fastethernet 0/0

SW-A(config)# ip default-route 192.168.120.254

***SW-A(config)# ip default-gateway 192.168.120.254



13. What is the first step in the spanning-tree process?

elect a designated switch

use a router to locate a default gateway

***elect a root bridge

determine the path cost of each active port on the switch



14. What is the first parameter used to determine which switch is selected as the root bridge in a spanning-tree network?

highest path cost

highest priority number

highest Layer 2 address

***lowest priority number

lowest path cost

lowest Layer 2 address



15. Refer to the exhibit. What is the meaning of the highlighted value of 64 shown in the routing table?

It is the administrative distance.

It is the value assigned by the Dijkstra algorithm that designates how many hops are in the network.

It is the value used by the DUAL algorithm to determine the bandwidth for the link.

***It is the metric, which is cost.



16. A new switch has been added to the network and it needs to support error-free switching. Which switching mode should be configured on the new switch?

cut-through

fragment-free

***store and forward

auto-sensing



17. Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1?

198.18.0.0/16

***198.18.48.0/21

198.18.32.0/22

198.18.48.0/23

198.18.49.0/23

198.18.52.0/22



18. A network administrator asked an assistant to remove several VLANs from a switch. When the assistant entered in the no vlan 1 command an error was received. What was the cause of the error?

VLANs can not be deleted until all ports have been removed from the VLAN assignment.

VLANs can only be deleted by the user that created them.

VLAN 1 can not be deleted until another VLAN has been assigned its duties.

***VLAN1 is the management VLAN by default and can not be deleted.

The command was not entered properly, which caused a syntax error to occur.



19. Refer to the exhibit. How many broadcast domains are there in the topology shown, assuming that VLANs are not configured on the switches?

one

***two

three

four

six

eight



20. What are two of the benefits that switches provide to a network without VLANs configured? (Choose two.)

They allow creation of permanent virtual circuits.

They decrease network throughput.

They shrink the size of broadcast domains.

***They help eliminate collision domains.

***They allow existing bandwidth to be more efficiently utilized.



21. Refer to the network and command output shown in the exhibit. A network administrator located at the Headquarters site needs to check the configuration of a switch located at the Pacific office. Which command can be used to gain remote access to the Pacific LAN switch, assuming the switch is assigned the IP address 198.19.27.251/24?

Headquarters# telnet Pacific

Headquarters# dial Pacific 198.19.27.251

Headquarters(config)# line vty 0 4

Headquarters(config-line)# telnet Pacific

***Headquarters# telnet 198.19.27.251



22. Which three statements describe full-duplex Ethernet? (Choose three.)

***It utilizes 100% of the bandwidth in both directions.

It requires two wires.

It increases the number of broadcast domains in the network.

***It allows data to be received and sent simultaneously.

***It reduces the number of collisions.

It provides between 60% and 80% of the bandwidth in both directions.



23. The following command was added to a router configuration:



ip route 172.26.153.0 255.255.255.0 198.19.27.249



What two effects will this command have? (Choose two.)

It will create a default route using the interface with the IP address 198.19.27.249 as the next hop.

The route will be marked with an "C" in the routing table.

***It will create a static route to the 172.26.153.0/24 network.

All packets with an unknown destination address will be forwarded to the 172.26.153.0/24 network.

***Routes to network 172.26.153.0 that are learned dynamically will not be used to route packets as long as this configuration command is in effect.



24. Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge, if the switches are configured with their default priority values?

Switch_1

Switch_2

Switch_3

Switch_4

***Switch_5

Switch_6



25. Refer to the exhibit. Which configuration commands will direct outbound traffic from Corp_1 to the ISP and inbound traffic from the ISP to network 192.168.1.0/24?

***Corp_1(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0

ISP(config)# ip route 192.168.1.0 255.255.255.0 serial 0/1

Corp_1(config)# ip route 198.19.27.0 255.255.255.0 serial 0/0

ISP(config)# ip route 0.0.0.0 0.0.0.0 serial 0/1

Corp_1(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0

ISP(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0

Corp_1(config)# ip route 198.19.27.0 255.255.255.0 serial 0/0

ISP(config)# ip route 192.168.1.0 255.255.255.0 serial 0/1



26. Refer to the exhibit. What is the correct OSPF configuration for router RT-1?

RT-1(config)# router ospf 1

RT-1(config-router)# network 172.16.21.0 0.0.0.63 area 0

RT-1(config-router)# network 172.16.21.248 0.0.0.3 area 0

RT-1(config)# router ospf 0

RT-1(config-router)# network 172.16.21.0 0.0.0.3 area 0

RT-1(config-router)# network 172.16.21.248 0.0.0.31 area 0

***RT-1(config)# router ospf 1

RT-1(config-router)# network 172.16.21.0 0.0.0.31 area 0

RT-1(config-router)# network 172.16.21.248 0.0.0.3 area 0

RT-1(config)# router ospf 99

RT-1(config-router)# network 172.16.21.0 255.255.255.224 area 0

RT-1(config-router)# network 172.16.21.248 255.255.255.248 area 0



27. Refer to the exhibit. Router LC-1 needs to be configured to provide communication between the networks shown. Which group of commands will configure EIGRP on LC-1 to work within this network?

LC-1(config)# router eigrp 1

LC-1(config-router)# network 192.168.43.0 0.0.0.3 area 0

LC-1(config-router)# network 192.168.43.4 0.0.0.3 area 0

LC-1(config-router)# network 192.168.43.128 0.0.0.63 area 0

LC-1(config)# router eigrp 1

LC-1(config-router)# network 192.168.43.0 0.0.0.3 no-summary

LC-1(config-router)# network 192.168.43.4 0.0.0.3 no-summary

LC-1(config-router)# network 192.168.43.128 0.0.0.192 no-summary

***LC-1(config)# router eigrp 1

LC-1(config-router)# network 192.168.43.0

LC-1(config)# router eigrp 1

LC-1(config-router)# network 192.168.43.0 0.0.0.3

LC-1(config-router)# network 192.168.43.4 0.0.0.3

LC-1(config-router)# network 192.168.43.128 0.0.0.192



28. Employees of XYZ Company connect their laptop computers to the office LAN using Ethernet ports. The Cisco switches used in the company network are configured with port security. At which layer of the three-layer design model do these switches operate?

physical

distribution

data link

***access

core



29. Refer to the graphic. Switch 2 has computers attached that belong to VLAN 2. Switch 3 has computers attached that belong to VLAN 3. Switch 1 is a Cisco 2926G Layer 3 switch that has a route module installed. Switch 1 provides connectivity to the other switches and is used to route between the VLANs. At which layer of the three-layer switch design model does Switch 1 operate?

physical

data link

core

access

network

***distribution



30. Performance of the network shown in the exhibit has become poor since the addition of hosts to the network. The network administrator suspects that excessive collisions are causing this problem. If the network is using hubs, what should be done to reduce the collisions?

Add a router to every hub segment.

Replace hubs with access points.

***Replace hubs with switches.

Add additional hubs.



31. Refer to the exhibit. Which command will remove the static address from the MAC address table on a Cisco 2950 switch?

VALLYGREEN(config)# no mac-address-table entry 00e0.2917.1884 fastethernet interface 0/4 vlan 1

VALLYGREEN(config)# no mac-address-table 00e0.2917.1884 fastethernet 0/4

VALLYGREEN(config-if)# no mac-address-table static 00e0.2917.1884 vlan 1

***VALLYGREEN(config)# no mac-address-table static 00e0.2917.1884 vlan 1 interface fastethernet 0/4



32. Refer to the exhibit. If the exhibited network is running EIGRP, which subnetworks can be assigned to the serial links between LC-1 and the other routers?

192.168.43.4/30 and 192.168.43.8/30

192.168.43.32/30 and 192.168.43.160/30

192.168.43.96/30 and 192.168.43.100/30

192.168.43.160/30 and 192.168.43.164/30

***192.168.43.192/30 and 192.168.43.196/30



33. Which layer of the hierarchical three-layer design model combines traffic from multiple IDFs?

access

backbone

***distribution

core

34. Refer to the graphic. The host on VLAN 2 cannot communicate with the host on VLAN 3. Which of the following could be the problem based on the output of the show interface fastethernet 0/1 command from the switch?

The switch port 1 is not set to access mode.

***The router interface connected to switch port 1 is shut down.

The router is not configured for trunking.

The switch port is not configured for full duplex or a speed of 100 Mbps.



35. Which two statements describe the Spanning Tree Protocol? (Choose two.)

It can only be used in networks in which routers are installed.

It can only be used in networks in which both routers and switches are used.

***It can only be used in networks in which Layer 2 switching is in use.

***It eliminates Layer 2 loops in network topologies.

It eliminates the need for redundant physical paths in network topologies.



36. Refer to the exhibit. The link between switches SW-A and SW-B needs to provide connectivity between hosts on the same VLAN across the two switches. How should these ports be configured?

as data channel ports

as access ports

***as trunking ports

as root ports

as inter-VLAN ports



37. What does a constant amber SYSTEM LED indicate on a Catalyst switch?

The switch is going through POST.

The switch is in the process of initializing ports.

***The switch has failed POST.

The switch has passed POST and is working properly.



38. For what two reasons would a network administrator choose to enable authentication for OSPF exchanges? (Choose two.)

***to prevent routing information from being falsified

to reduce OSPF information exchange overhead

to ensure that OSPF routing information takes priority over RIP or EIGRP updates

to encrypt routing tables to prevent unauthorized viewing

***to ensure that routing information comes from a valid source



39. What do EIGRP routers use to establish and maintain adjacency relationships with neighboring routers?

the exchange of routing tables with directly attached routers

***the exchange of hello packets with neighboring routers

the learning of new routes from neighbors

the comparison of known routes to information received in updates

the exchange of neighbor tables with directly attached routers



40. Refer to the exhibit. Which sequence of commands is required to configure switch port Fa0/11 for host A?

SW-A(config)# interface fastethernet 0/11

SW-A(config-if)# vlan 11

SW-A(config)# interface vlan 11

SW-A(config-if)# switchport mode trunk

SW-A(config)# interface vlan 11

SW-A(config-if)# switchport mode access 11

***SW-A(config)# interface fastethernet 0/11

SW-A(config-if)# switchport mode access

SW-A(config-if)# switchport access vlan 11



41. Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

The switch is receiving BPDUs, but not sending data frames.

The switch is participating in an election process by forwarding the BPDUs it receives.

***The switch is sending and receiving data frames.

The switch is receiving BPDUs and populating the MAC address table, but not sending data.



42. Refer to the exhibit. What is an advantage of this network design?

It provides multiple paths for Layer 2 broadcasts to circulate through the network.

It allows spanning tree to forward traffic across redundant paths simultaneously.

It maximizes the number of ports available for users.

***It provides multiple paths for connectivity in the event of link failure.



43. Refer to exhibit. Routers Central and Remote are configured using RIPv1. Both routers are sending updates about their directly connected routes. The Central router can ping the Remote router serial interface and Remote can ping the serial interface of Central. However, neither router has dynamically learned routes from the other. What is the most likely problem?

A clock rate is missing from one of the serial interfaces.

A gateway of last resort is required.

Subnets cannot be used with RIPv1.

***VLSM is not supported by RIPv1.



44. If a company is using the IP address 172.16.0.0 and wants to create subnets using VLSM, which combination of addresses and masks will be valid?

172.16.128.0 /18 and 172.16.128.192 /26

172.16.160.0 /20 and 172.16.168.0 /20

***172.16.32.0 /19 and 172.16.64.128 /25

172.16.192.0 /18 and 172.16.224.0 /19



45. Which of the following features do RIPv1 and RIPv2 have in common? (Choose three.)

***hop count as a metric

classless routing

***use split horizon

***maximum hop count is 15

broadcast updates

no authentication



46. Which Ethernet switching mode has the least latency and lowest reliability?

***fast-forward

asymmetric

store-and-forward

fragment-free

symmetric



47. Which of the following statements is true when VTP is configured on a switched network that incorporates VLANs?

VTP is only compatible with the 802.1Q standard.

VTP adds to the complexity of managing a switched network.

***All VTP hello packets are routed through VLAN 1 interfaces.

Changes made to the VLAN configuration in the domain can be communicated to all switches dynamically.



***new questions, 10x to cyberhawk***

20. What are two benefits that switches, without VLANs configured, provide to a network when compared to a hub? (Choose two.)

They allow creation of permanent virtual circuits.

They decrease network throughput.

They shrink the size of broadcast domains.

***They increase the number of collision domains.

***They allow existing bandwidth to be more efficiently utilized.



29. Which statement is true when VTP is configured on a switched network that incorporates VLANs?

VTP is only compatible with the 802.1Q standard.

VTP adds to the complexity of managing a switched network.

A switch configured for VTP can belong to more than one VTP domain.

***, VTP dynamically communicates VLAN additions, deletions and modifications to all switches in the same VTP domain.

VTP advertisements are passed over access links to other switches.

Minggu, 01 Juni 2008

CCNA 2 PRACTICE FINAL

1. Which of the following are functions of a router? (Choose three.)

* packet switching
extension of network segments
* segmentation of local area networks
* selection of best path based on a logical addressing
selection of best path based on a physical addressing

2. What types of messages are sent periodically by devices configured for CDP?

probes
beacons
signals
* advertisements
routing updates
unicast

3. Which command will produce the output shown in the graphic?

show cdp
* show cdp neighbors
show cdp neighbors detail
show cdp detail

4. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?

4
* 5
8
10

5. A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)

* The ip host table on the router is not configured.
The command telnet Boston was issued from the wrong router prompt.
The routing table is missing.
* Domain name services are not available.

6. If the config-register on a router is set to 0x2102, where is the first place the router will look for boot system commands?

RAM
ROM
Flash
* NVRAM

7. In the configuration register value 0x2104, which value represents the boot field setting?

x
2
1
0
* 4

8. Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?

Router# boot system tftp 163.150.9.31 c2500-d-l.120-9
Router# copy run start

Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router# copy run start

* Router# config t
Router(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router(config)# exit
Router# copy run start

Router# config t
Router(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.bin
Router(config)# exit
Router# copy run start


9. Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)

Updates start broadcasting every 30 seconds.
Updates start broadcasting every 90 seconds.
* Link-state advertisements are flooded.
Link-state advertisements are sent only to neighboring routers.
* All routers note the change and adjust routes.
All routers ignore the change until the route becomes active again.

10. What can be determined from the partial output of the show ip route command displayed below? (Choose two.)

R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0
C 192.168.10.0/24 is directly connected, Serial0/0


The next update will be in 76 seconds.
* The next update will be in 16 seconds.
* The administrative distance is 120 and the metric is 1.
The metric is 120 and the administrative distance is 1.
200.200.200.0 is configured on Serial0/0.
192.168.10.2 is configured on Serial0/0.

11. Given the above topology, which of the following statements are true? (Choose two.)

If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.
* If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.
* If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.
If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.
If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.

12. Which command is used to redirect debug information to a device that is connected though a Telnet session?

Router# monitor
Router# terminal redirect vty 0
* Router# terminal monitor
Router# monitor output vty 0

13. The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.

access-list 22 deny host 204.204.7.122
access-list 22 permit any

Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?

RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 in

RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 out

RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 22 in

RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 in

RouterB(config)# interface s0/0
RouterB(config-if)# ip access-group 22 in

* RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 out


14. Refer to the output from the show ip route command. What can be concluded from the output of this router command?

A preferred route to the destination has not been set.
* There are two equal cost paths to network 1.0.0.0.
Both interfaces are being used equally to route traffic.
A variance must be set to load-balance across multiple paths.

15. Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user's PC has successfully booted but can not see the network. What should be checked first?

the PC power cord
the file server
* the PC network interface card LEDs
the LAN switch in the wiring closet
the configuration of the router interface attached to the LAN

16. What are the major characteristics of a wide area network? (Choose three.)

* connect devices separated by wide geographical areas
includes technologies of FDDI and Ethernet
* uses serial connections to access bandwidth
* common carriers are needed for connections
type of connection between a router and a switch

17. Which of the following WAN connection services typically use synchronous communications? (Choose two.)

circuit-switched
* leased line
* packet-switched
Ethernet
analog modem services

18. Which of the following are true regarding the setup configuration mode? (Choose three.)

To abort the setup mode, use the CTRL+SHIFT+6 keys.
* To abort the setup mode, use the CTRL+C keys.
Setup mode allows a complete configuration of the router.
* To enter setup mode, use the privileged mode setup command.
A router that does not find a valid IOS during the boot process will start the system configuration dialog.
* A router that does not find a valid configuration file during the boot process will start the system configuration dialog.

19. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name.

Router# ip host Fontana 200.100.50.5
* Router(config)# ip host Fontana 200.100.50.5
Router(config-if)# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5/24

20. Which statements are true regarding VTY passwords? (Choose two.)

VTY passwords must be encrypted.
* All VTY lines do not need to use the same password.
* A VTY password is required to establish telnet sessions.
The VTY password is set with the command line console 0.
The VTY password must be identical with the enable secret password.

21. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)

* telnetting into the router
initiating a debug session
configuring a router for the first time
* using the Aux port to check the current configuration
* using the console port to check the current configuration

22. The following IGRP configuration was typed in for RouterB:

RouterB(config)# router igrp 100
RouterB(config-router)# network 192.168.2.0
RouterB(config-router)# network 192.169.3.0

After several update periods, a technician notices that RouterB is not receiving updates from all routers shown in the diagram. Which of the following would correct this error?


RouterB(config)# router igrp
RouterB(config-router)# no network 192.169.3.0


RouterB(config)# router igrp 46
RouterB(config)# no network 192.169.3.0
RouterB(config)# network 192.168.3.0


RouterB(config)# router igrp 100
RouterB(config-router)# network 192.169.3.0
RouterB(config-router)# no network 192.168.3.0


* RouterB(config)# router igrp 100
RouterB(config-router)# no network 192.169.3.0
RouterB(config-router)# network 192.168.3.0


23. The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?

no update timers
holdown-timer 96
poison reverse E0
* passive-interface E0
no triggered updates

24. Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)

* by forwarding packets over paths of equal cost
by forwarding packets according to hop count and speed of the link
by determining which interface has the least traffic and sending to it first
by first determining the speed of the links and then cycling packets through the fastest links first
* by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time

25. The following line was displayed in the output of the show ip route command.

I 192.168.3.0/24 [100/80135] via 192.168.2.2, 00:00:30, Serial0/0

What is the value of the composite metric?

8
24
80
100
135
* 80135

26. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)

* TCP/IP must be installed and properly configured on each device.
Multiple subnets must be configured on the router to ensure accurate delivery.
* A default gateway must be configured for datagrams to travel outside of the LAN.
The hosts must be directly connected to a switch to travel outside of the LAN.
* To ensure accurate delivery, a router must be configured and accessible by hosts on the network.

27. The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)

* Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1
* Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0
Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2
Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1
Utah(config)# ip route 172.31.3.0 255.255.255.0 s1
* Utah(config)# ip route 0.0.0.0 0.0.0.0 s0

28. A network administrator needs to configure a routing protocol that will use bandwidth and delay when making routing decisions. Which of the following commands must be configured on Router2 so those metric values will be used when determining the best path?(Choose two.)

Router2(config)# router rip
* Router2(config)# router igrp 200
Router2(config-router)# network 192.5.5.0
Router2(config-router)# network 201.100.11.0
* Router2(config-router)# network 192.5.5.0
Router2(config-router)# network 201.100.11.0
Router2(config-router)# network 192.5.5.0 201.100.11.0

29. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)

* functions as a link-state routing protocol
discards packets when the hop count is greater than 15
calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)
created as a proprietary routing protocol
* floods updates as topology changes occur
broadcasts routing updates every 90 seconds or as triggered by topology changes

30. The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?

The router will load c2500-js-l.112-26d.
The router will load c2500-d-l.120-9.
The router will load the IOS from ROM.
* The router will boot into ROM monitor mode.

31. When would the ROM monitor mode be used? (Choose two.)

maintaining routing configuration settings
* modifying the IOS image stored in Flash
running a limited IOS feature set
* performing the bootstrap process

32. An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?

There was a POST failure.
The incorrect IOS loaded.
There was an error in the startup configuration file.
* The configuration register was set to ignore NVRAM.

33. Which of the following are valid static IP routes? (Choose three.)

RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1
* RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1
* RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2
RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2
* RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1

34. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)

There is a mismatch in the encapsulation type on both ends of the link.
* A Layer 1 issue exists.
* An interface problem exists.
The clockrate was not set during configuration.
* There is no usable media for the protocol.
Keepalive messages are not being sent.

35. When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
* when the interface is functioning as a DCE device

36. Which statement about datagram life is true?

Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.
The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.
* Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.
The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.

37. Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)

* Router B received a configuration change.
Router A sent a message requesting an update.
* Router C came online after Router B sent the RIP update.
Router B received an error message indicating the last update was not received.

38. Why is it useful to have an interface description?

A user can telnet to the router using the interface description.
The interface description is a shortcut way to edit the running-config.
* The interface description helps identify distant network connections.
The interface will remain inactive until an interface description is applied.

39. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?

The packets will be placed in a buffer and forwarded when the ACL is removed.
The packets will be sent to the source with an error notification message.
The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.
* The implicit deny any statement placed at the end of the list will cause the packets to be dropped.

40. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)

* It can be used to verify the operation of application layer software between the source and destination.
Telnet can use the ICMP protocol to verify a hardware connection and network layer address.
* It is the most complete testing mechanism available.
* Remote networks may be accessed via a Telnet session for troubleshooting.
Time to Live values are used by Telnet to identify a failure of device between source and destination.

41. Which of the following are true statements about creating and applying access lists? (Choose three.)

Access list entries should filter in the order from general to specific.
* One access list per port per protocol per direction is permitted.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.
* There is an implicit deny at the end of all access lists.
* Statements are processed sequentially from top to bottom until a match is found.
The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.

42. A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?

The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.
The wrong port was configured for the ACL so Telnet traffic was still allowed.
* The access list has not been assigned to an interface.
The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.

43. The routers shown in the graphic are running IGRP and sending updates about all of their networks. After the network has converged, a packet traveling to Router 4 from Router 2 will take which route based on the lowest metric?

Router2 to Router1 to Router4
* Router2 to Router3 to Router4
Router2 to Router4
Router1 to Router4

44. Which of the following are true regarding route metrics? (Choose three.)

* The more factors that make up a metric, the greater the flexibility to tailor network operations.
The larger the metric number, the better the path.
Routing protocols use metrics to send routing updates to directly connected neighbors.
* Load and reliability are dynamic metrics used by IGRP.
Bandwidth and delay are static metrics used by RIP v1.
* Ticks, delay and cost are metrics used by routing protocols.

45. Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?

F, G, E, D, B, A
F, E, D, C, A
* F, E, D, A
F, E, D, B, A

46. Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?

It will be forwarded through interface S1.
It will be forwarded to the default route.
It will be directed toward the Internet.
* It will be discarded.

47. The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)

* The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.
All of the routers will have direct knowledge of the exact topology of the entire network.
* The Key West router will forward routing table information to the Miami and Palm Beach routers.
The Miami router will learn about network 192.168.1.0 from the Key West router.
* If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.

48. Which of the following is the correct flow of routines for a router startup?

* load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS

CCNA 2 FINAL c

1. What are some reasons to change the configuration register setting? (Choose two.)

* to force the system to ignore the configuration file stored in NVRAM
to monitor password changes
to change the POST sequence
to force the router to boot the IOS from NVRAM
* to force the system into ROM monitor mode

2. In what order will the initial startup routine of a router locate and load the IOS if the config-register setting is 0x2102 and there are no boot system commands present in the startup-config file?

Flash, ROM, TFTP server
RAM, Flash, NVRAM
* Flash, TFTP server, ROM
ROM, TFTP server, Flash
Flash, NVRAM, RAM
ROM, Flash, TFTP server

3. Which statements are true regarding setup mode? (Choose three.)

Press Ctrl-z to terminate setup mode.
* Enter a question mark (?) for help at any point.
Press Spacebar to accept the default settings.
Use setup mode to enter complex protocol features.
* Press Enter to accept the default settings.
* Press Ctrl-c to abort configuration dialog.

4. During initial router bootup the following line appears:

"NVRAM invalid, possibly due to write erase."

What are two possible reasons for this result? (Choose two.)

The startup-config file was not saved to RAM before reboot.
The IOS has been erased.
* The router has not been configured.
* The startup-config file cannot be located.
The router will not enter initial configuration dialog.

5. Which of the following are valid boot system commands? (Choose two.)

Router(config)# boot system ram
* Router(config)# boot system rom
Router(config)# boot system IOS flash
Router(config)# boot system flash c2600-d-mz.121-3 192.168.10.5
* Router(config)# boot system tftp c1700-l-mz.131-2 172.16.24.7

6. Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting "interface is up, line protocol is up" status. RIP is then configured on Router C using the following commands:

RouterC(config)# router rip
RouterC(config-router)# network 192.168.4.0
RouterC(config-router)# network 172.16.0.0

If no additional routing is configured on Router A, Router B, and Router C, what will be the result?

Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.
Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.
All networks shown in the graphic will be reachable by Router A, Router B, and Router C.
* Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.

7. Router A is directly connected to the networks shown in the graphic and has a default route that points to Router B. All interfaces are active and properly addressed. However, when the workstation on network 172.16.4.0/24 sends a packet to destination address 172.16.201.5, it is discarded by Router A. What can be a reason for this result?

* The ip classless command is not enabled on Router A.
Router B is in a different autonomous system than Router A.
Routers A and B are using different routing protocols.
Router A has no route in its routing table that includes the address 172.16.201.5.

8. A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?

A(config)# router rip
A(config-router)# passive-interface S0/0

B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64

A(config)# router rip
A(config-router)# no network 192.168.25.32

* B(config)# router rip
B(config-router)# passive-interface S0/0

A(config)# no router rip

9. Which router component stores the information that is displayed by the show ip route command?

CPU
Flash
NVRAM
* RAM

10. If a PC does not have network connectivity to a router, which router port can be used to establish communication?

* console
Ethernet
serial
VTY

11. Which router command will generate the router output shown in the graphic?

* show arp
show protocols
show interface FastEthernet0/0
show interfaces
show hardware

12. What information can be learned during the initial router bootup? (Choose two.)

the configuration register value
* the number and types of interfaces installed
* the router model and the amount of memory that is available
the amount of memory required to load the IOS and configuration
the number of interfaces with connected cables

13. Which of the following could describe the devices labeled "?" in the graphic? (Choose three.)

* DCE
* CSU/DSU
LAN switch
* modem
hub

14. Which of the following are primary functions of a router? (Choose two.)

* packet switching
microsegmentation
domain name resolution
* path selection
flow control

15. Which of the following are correct statements verified by the router output shown in the graphic? (Choose two.)

Layer 3 connectivity exists between BigCity and the devices in the Device ID column.
* Layer 2 connectivity exists between BigCity and the devices in the Device ID column.
All devices shown in the Device ID column use the TCP/IP protocol suite.
All devices shown in the Device ID column can be pinged from BigCity.
* All devices listed in the Device ID column are directly connected to BigCity.

16. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)

The startup-config file will be ignored at bootup.
The router will load the IOS from Flash.
* The router will enter ROM monitor mode upon reload.
The router will enter boot ROM mode and have limited capabilities.
* The administrator can enter the b command to manually boot the IOS.

17. What can a network administrator do to recover from a lost router password?

perform a reload or reset
telnet from another router and issue the show running-config command to view the password
* boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes
boot the router to bootROM mode and enter the b command to load the IOS manually

18. Which router components and operations are correctly described? (Choose two.)

ROM - stores the backup configuration file
RAM - loads the operating system
* NVRAM - stores the configuration file
Flash - executes diagnostics at bootup
* POST - runs diagnostics on hardware modules
DRAM - loads the bootstrap

19. Which of the following commands will correctly configure an extended ACL? (Choose two).

Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25
* Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 80
* Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23
Router(config)# access-list 99 permit host 10.217.32.3
Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 23

20. The following access list has been created to prevent traffic from host 172.23.40.36 from accessing the 192.168.34.0 network.

access-list 44 deny host 172.23.40.36
access-list 44 permit any

Refer to the graphic. Which group of commands will properly place the access list so that the host is denied access only to network 192.168.34.0?

Rome(config)# interface fa0/0
Rome(config-if)# ip access-group 44 in
Rome(config)# interface s0/1
Rome(config-if)# ip access-group 44 out
Tokyo(config)# interface s0/0
Tokyo(config-if)# ip access-group 44 in
* Tokyo(config)# interface fa0/0
Tokyo(config-if)# ip access-group 44 out

21. Refer to the graphic. Communication is needed between the LAN connected to the fa0/0 interface of the Kansas router and the fa0/0 interface of the Maine router. All hosts on those LANs also need connectivity to the Internet. Which commands will allow this communication? (Choose three).

* Kansas(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.2
Kansas(config)# ip route 192.168.6.0 255.255.255.0 s0/1
* Kansas(config)# ip route 0.0.0.0 0.0.0.0 s0/1
Maine(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.1
* Maine(config)# ip route 0.0.0.0 0.0.0.0 s0/1
Maine(config)# ip route 172.16.32.0 255.255.255.0 172.18.64.2

22. A network administrator must configure a serial interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?

Chicago(config)# description San Jose T1
Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252

* Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# description San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 netmask 255.255.255.252
Chicago(config-if)# description San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# remote site San Jose T1

Chicago(config)# interface serial0/0
Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
Chicago(config-if)# interface description San Jose T1


23. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0x2102 and observes the following output:

Erasing the nvram filesystem will remove all files! Continue? [Confirm]
[OK]
Erase of nvram: complete

If the router unexpectedly loses power after this sequence, what will occur when power is restored?

The router will enter ROM monitor mode upon completion of the power-on self test (POST).
The router will load the last known valid configuration file.
The router will enter Rx-boot mode.
* The router will prompt the user to enter setup mode or to continue without entering setup mode.

24. A network administrator wishes to load a configuration file from a TFTP server into NVRAM on a router. Which of the following methods will create a startup-config file in NVRAM that matches the contents of the configuration file on the TFTP server?

* Copy the configuration file from a TFTP server using the command copy tftp startup-config.
Copy the configuration file from a TFTP server using the command copy Copy the file to RAM from a console connection using the copy tftp running-config command. Then reload the router to use the new configuration.
Paste the configuration file to the command line of the router while in global configuration mode. Then issue the copy startup-config running-config command.

25. What will occur if the command service password-encryption is entered on a router? (Choose two).

It will allow only the user EXEC mode password to be encrypted.
It will set an MD5 hashing algorithm on all unencrypted passwords.
* It will apply a weak encryption to all unencrypted passwords.
It will set the enable secret password to be encrypted.
It will apply an MD5 hashing algorithm to encrypt the console and telnet passwords.
* It will configure the user EXEC mode, telnet, and enable passwords as encrypted.

26. Which of the following describe Ethernet and serial interfaces of a router? (Choose two.)

They are enabled by default.
* They may be administratively disabled by using the shutdown command.
* They must be configured with an IP address and subnet mask in order to forward packets.
They must be configured with an IP address and a clockrate in order to forward packets.
They may be administratively disabled by using the no shutdown command.

27. Which of the following are true regarding the use of login banners? (Choose two.)

The message is only displayed in privileged EXEC mode.
* The message can be seen by everyone who accesses the router.
"Good morning" is an appropriate message to display.
* The banners should display warning messages.
The banners should identify circuits and other devices connected to the router.

28. While planning an IOS upgrade, the administrator issues the show version command. Based on the output in the graphic, what is the current IOS boot location?

RAM
NVRAM
* Flash
ROM

29. Which of the following are true regarding an interface description? (Choose three.)

It is a message that is displayed at login.
* It does not affect the operation of the router.
It contains the circuit identifiers of the interface by default.
* It could allow support personnel to better understand the scope of an interface problem.
* It could identify the purpose and location of the interface.
It wastes bandwidth and slows down interface problem resolution.

30. Which of the following describe Telnet on a router? (Choose two.)

* Simultaneous incoming Telnet sessions can be hosted by a router.
Telnet is the most basic testing mechanism available.
A Telnet session can only be initiated in privileged EXEC mode.
* Five separate Telnet lines are specified by the configuration line vty 0 4.
Telnet is classified as a network layer protocol.

31. Neither router in the graphic has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)

ATL> connect CHI
ATL> telnet CHI
* ATL# 192.168.4.2
ATL# connect ATL
* CHI# telnet 192.168.4.1
CHI# telnet ATL

32. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login


The entries specify three Telnet lines for remote access.
* The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
* Access will be permitted for Telnet using "c13c0" as the password.

33. Assuming the following ACL is correctly applied to a router interface, what can be concluded about this set of commands? (Choose two.)

Router(config)# access-list 165 deny tcp 192.28.115.0 0.0.0.255 172.20.0.0 0.0.255.255 eq 23
Router(config)# access-list 165 permit ip any any


This is a standard IP access list that denies network 192.28.115.0 Telnet access to the 172.20.0.0 network.
All Telnet traffic destined for 172.20.0.0 from any network will be denied access.
* Network 192.28.115.0 is denied Telnet access to the 172.20.0.0 network.
Network 172.20.0.0 is denied Telnet access to the 192.28.115.0 network.
* All FTP and HTTP traffic destined for 172.20.0.0 will be permitted access.

34. The following access list has been correctly applied to a router interface:

access-list 52 deny 172.30.65.52
access-list 52 permit any

Which of the following statements are true about this ACL? (Choose three.)

This is an invalid ACL because the wildcard mask is missing from the command.
* A wildcard mask of 0.0.0.0 is assumed for 172.30.65.52.
This is an extended IP access list.
* All traffic from 172.30.65.51 will be permitted.
* This is a standard IP access list.

35. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23
access-list 199 permit ip any any

Assuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)

* All FTP traffic from network 178.15.0.0 will be permitted.
All Telnet traffic destined for network 178.15.0.0 will be denied.
Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination.
* Telnet will not be permitted from any hosts on network 178.15.0.0 to any destination.
Telnet will not be permitted to any host on network 178.15.0.0 from any destination.

36. Refer to the graphic. Which command will create a standard ACL that will apply to outbound traffic on interface Fa0/0 of router A and will deny IP traffic from any host on network 172.16.34.0/24 that is destined for network 192.168.5.0/24 while allowing all other IP traffic?

access-list 2 deny 172.16.34.0 0.0.0.0
access-list 2 permit any
* access-list 33 deny 172.16.34.0 0.0.0.255
access-list 33 permit any
access-list 42 deny 172.16.34.0
access-list 42 permit any
access-list 56 deny tcp 172.16.34.0
access-list 56 permit ip any

37. Refer to the network and routing table entries shown in the graphic. How much time will elapse before Router A expects to receive another update from Router B?

5 seconds
13 seconds
* 17 seconds
25 seconds
65 seconds
90 seconds

38. Refer to the graphic. Which series of commands will create static routes that will allow Router A and Router B to deliver packets destined for LAN A and LAN B, and direct all other traffic to the Internet?

RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0
RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterB(config)# ip route 172.20.20.4 255.255.255.252 s0/0
* RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2
RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1
RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0

39. Which ACL can be applied in the outbound direction of Serial 0/0 on router B in the graphic to allow all IP traffic from LAN A to the Internet, allow Web traffic from LAN B to the Internet, and deny all other traffic to the Internet?

access-list 98 permit 192.168.2.0 0.0.0.255 any
access-list 98 permit tcp 10.90.3.0 0.0.0.255 any eq www
* access-list 125 permit ip 192.168.2.0 0.0.0.255 any
access-list 125 permit tcp 10.90.3.0 0.0.0.255 any eq www
access-list 132 permit ip 192.168.2.0 0.0.0.255 any
access-list 132 permit tcp 10.90.3.0 0.0.0.255 any eq www
access-list 132 permit ip any any
access-list 156 permit ip 192.168.2.0 0.0.0.255 any
access-list 156 permit ip 10.90.3.0 0.0.0.255 any eq www

40. What will occur when the following ACL is applied inbound to both FastEthernet interfaces of Router A in the graphic?

access-list 125 permit tcp 192.168.2.0 0.0.0.255 10.90.3.0 0.0.0.255 eq 23
access-list 125 permit tcp 10.90.3.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 23
access-list 125 permit tcp 192.168.2.0 0.0.0.255 any eq www

* Workstations A and B will be able to Telnet to each other. Workstation A will be allowed to access Web servers on the Internet, while Workstation B will be denied Internet Web access.
Workstations A and B will be able to Telnet to each other. All other traffic will be denied.
The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces.
The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.

41. Which of the following prevent successful loading of the Cisco IOS from flash memory? (Choose two.)

a configuration register set at 0x2102
a missing startup-configuration file
* a boot system command not present in the startup-config file
* an incorrect configuration register setting
a boot field set to 2

42. Refer to the graphic. A network administrator has a console connection to Router A. Pings to Router B are successful, but pings to Routers C and D fail. What is the first step in troubleshooting the problem?

Use the show cdp neighbors detail command from router A to gather information about all Cisco routers in the network.
Use the traceroute command to discover exactly which link in the network is down.
Use an extended ping from router A to each router in the network.
* Use the show interfaces command from a Telnet session on router B to check the connection to router C.

43. Which of the following describes CDP? (Choose three.)

* provides information on directly connected Cisco routers that have CDP enabled
* can only be configured between Cisco devices
used for debugging Layer 4 connectivity issues
should be disabled on non-locally managed ports
* presents a potential security risk

44. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)

Use a crossover cable to connect the terminal serial port to the router console port.
Use a rollover cable to connect the terminal NIC to the router console port.
* Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.
Use a transceiver to connect a straight-through cable to the router console port.
Use a straight-through cable to connect the router console port to the terminal NIC.
* Use a rollover cable to connect from a terminal serial port to the router console port.

45. Refer to the graphic. Assuming default metrics are used and the network is fully converged, which path will the IGRP routing protocol use to send a packet from Router A to Router F?

A, D, E, F
* A, B, D, E, F
A, C, D, E, G, F
A, B, D, E, G, F

46. Based on this partial output of the show ip route command, which routing protocol is configured on the router?

I 172.16.3.0/24 [100/80135] via 172.16.2.2, 00:00:27, Serial0/0



RIP v1
RIP v2
* IGRP
EIGRP
OSPF
IGP

47. Which of the following statements are true regarding routed protocols? (Choose two.)

* They provide enough information in the Layer 3 address to allow a packet to be forwarded from one network to another.
* They carry user data between networks.
They allow routers to share information about networks and their proximity to each other.
They are used by routers to maintain routing tables.
RIP and IGRP are routed protocols.

48. What could a Cisco support technician learn from the IOS filename c2600-d-mz.121-3? (Choose three.)

* the format of the file
the RAM memory requirements of the file
* the version number of the file
the size of the file
* the device platform of the file

49. Which commands will show the status and IP address of all interfaces on a router? (Choose two.)

* show protocols
show ip protocols
show version
* show interfaces
show ip ports

50. Which of the following are true statements regarding IGRP and RIP? (Choose two.)

* IGRP uses a combination of different metrics for path selection.
RIP is a proprietary protocol developed by Cisco.
RIP has the ability to scale to large networks.
* IGRP has the ability to scale to large networks.

CCNA 2 FINAL b

1. Why would an administrator change the value highlighted in the exhibit? (Choose two.)
to alter the POST sequence
to display output that tracks password changes
to force the router to reboot immediately
* to make the router bypass the startup-configuration file
* to configure the router to boot the RXBOOT image
to force the router to load the IOS from NVRAM

2. In what order will the initial startup routine of a router locate and load the IOS if the config-register setting is 0x2102 and there are no boot system commands present in the startup-config file?
Flash, ROM, TFTP server
RAM, Flash, NVRAM
* Flash, TFTP server, ROM
ROM, TFTP server, Flash
Flash, NVRAM, RAM
ROM, Flash, TFTP server

3. Which procedures will work while configuring the router using the setup configuration utility? (Choose three.)
Type help to display a list of options available at the prompt.
Press Ctrl-Shift-6, X to abort the configuration dialog.
* Press Enter or the Return key to accept the default values.
* Enter the address on an interface or add a new routing protocol suite.
* Press Ctrl-C to return to the privileged mode prompt or to terminate setup mode.
Type reload to save the changes created in setup mode and use the new configuration.

4. During initial router bootup the following line appears: "NVRAM invalid, possibly due to write erase." What are two possible reasons for this result? (Choose two.)
The startup-config file was not saved to RAM before reboot.
The IOS has been erased.
* The router has not been configured.
* The startup-config file cannot be located.
The router will not enter initial configuration dialog.

5. A new technician must add boot system commands to one of the department routers. Which available commands will the router return as output when the command shown below is entered? (Choose two.) Router(config)# boot system ?
RAM
NVRAM
IOS
IP Address
* TFTP
* FLASH

6. The Marshall and Fiji routers have been correctly configured to use RIP v1 as a dynamic routing protocol, and all interfaces on the Marshall and Fiji routers are reporting "interface is up, line protocol is up" status. RIP v1 is then configured on the Chatham router using the following commands: Chatham(config)# router rip Chatham(config-router)# network 198.18.100.0 Chatham(config-router)# network 172.23.0.0 If no additional routing is configured on Chatham, Marshall, or Fiji, what will be the result?
Networks 198.18.126.0/24, 198.18.100.0/24, and 172.23.0.0/16 will be unreachable from Fiji.
Fiji will have no knowledge of network 198.18.126.0/24, but will have routes to networks 198.18.100.0/24 and 172.23.0.0/16.
* Networks 198.18.100.0/24 and 172.23.0.0/16 will be unreachable from Marshall and Fiji.
All networks shown in the graphic will be reachable by Marshall, Fiji, and Chatham.

7. Router A is directly connected to the networks shown in the graphic and has a default route that points to Router B. All interfaces are active and properly addressed. However, when the workstation on network 172.16.4.0/24 sends a packet to destination address 172.16.201.5, it is discarded by Router A. What can be a reason for this result?
* The ip classless command is not enabled on Router A.
Router B is in a different autonomous system than Router A.
Routers A and B are using different routing protocols.
Router A has no route in its routing table that includes the address 172.16.201.5.

8. A network administrator has enabled RIP on routers A and B in the network diagram. Which commands will prevent RIP v1 updates from being sent to Router C?
C(config)# router rip C(config-router)# no network 192.168.25.64
C(config)# router rip C(config-router)# passive-interface S0/0
* B(config)# router rip B(config-router)# passive-interface S0/1
C(config)# no router rip
B(config)# router rip B(config-router)# network 192.168.25.32 B(config-router)# network 192.168.25.48

9. Which router component stores the information that is displayed by the show arp command?
flash
NVRAM
* RAM
ROM

10. If a PC does not have network connectivity to a router, which router port can be used to establish communication?
* console
Ethernet
serial
VTY

11. What information can be learned during the initial router bootup? (Choose two.)
the configuration register value
* the number and types of interfaces installed
* the router model and the amount of memory that is available
the amount of memory required to load the IOS and configuration
the number of interfaces with connected cables

12. Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.)
Ethernet switch
DTE
* modem
hub
* DCE device
* CSU/DSU

13. Which of the following are primary functions of a router? (Choose two.)
* packet switching
microsegmentation
domain name resolution
* path selection
flow control

14. What can be determined from the output shown in the exhibit? (Choose two.)
Annapolis is a 2611 router that is connected to the S0/0 interface of the Montgomery router.
All of the routers are connected to Montgomery through an Ethernet switch.
* Montgomery has Layer 2 connectivity with Cumberland.
Layer 3 connectivity is operational for all of the devices listed in the Device ID column.
An administrator consoled into the Waldorf router can ping the Brant router.
* Brant, Fisherman, and Potomac are directly connected to Montgomery.

15. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)
The startup-config file will be ignored at bootup.
The router will load the IOS from Flash.
* The router will enter ROM monitor mode upon reload.
The router will enter boot ROM mode and have limited capabilities.
* The administrator can enter the b command to manually boot the IOS.

16. What can a network administrator do to recover from a lost router password?
perform a reload or reset
telnet from another router and issue the show running-config command to view the password
* boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes
boot the router to bootROM mode and enter the b command to load the IOS manually

17. Which router components and operations are correctly described? (Choose two.)
ROM - stores the backup configuration file
RAM - loads the operating system
* NVRAM - stores the configuration file
Flash - executes diagnostics at bootup
* POST - runs diagnostics on hardware modules
DRAM - loads the bootstrap

18. Which commands will correctly configure an extended ACL? (Choose two.)
* Router(config)# access-list 192 permit icmp host 198.18.4.3 172.22.0.255 0.0.0.0 echo
* Router(config)# access-list 153 deny udp 10.43.0.0 0.0.255.255 any eq 161
Router(config)# access-list 98 permit tcp 192.0.2.3 0.0.0.0 eq 23
Router(config)# access-list 99 deny host 198.18.0.5
Router(config)# access-list 166 permit ip any eq 80

19. The following access list has been created to prevent traffic from host 172.23.40.36 from accessing the 192.168.34.0 network. access-list 44 deny host 172.23.40.36access-list 44 permit any Refer to the graphic. Which group of commands will properly place the access list so that the host is denied access only to network 192.168.34.0?
Rome(config)# interface fa0/0 Rome(config-if)# ip access-group 44 in
Rome(config)# interface s0/1 Rome(config-if)# ip access-group 44 out
Tokyo(config)# interface s0/0 Tokyo(config-if)# ip access-group 44 in
* Tokyo(config)# interface fa0/0 Tokyo(config-if)# ip access-group 44 out

20. Refer to the exhibit. Communication is needed between the Marketing LAN and the Sales LAN. All hosts on those LANs also need connectivity to the Internet. Which three commands will allow this communication? (Choose three).
Marketing(config)# ip route 198.18.150.0 255.255.255.0 fa0/0
Marketing(config)# ip route 198.18.160.0 255.255.255.0 198.18.160.1
* Marketing(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
* Sales(config)# ip route 192.0.2.0 255.255.255.0 fa0/0
* Sales(config)# ip route 0.0.0.0 0.0.0.0 s0/0
Sales(config)# ip route 0.0.0.0 0.0.0.0 198.18.160.2

21. A network administrator must configure a FastEthernet interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?
StPetersburg(config)# banner San Jose T1 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252
StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 netmask 255.255.255.252 StPetersburg(config-if)# description San Jose T1
StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# banner remote site San Jose T1
* StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# description San Jose T1

22. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0x2102 and observes the following output: Erasing the nvram filesystem will remove all files! Continue? [Confirm] [OK] Erase of nvram: complete If the router unexpectedly loses power after this sequence, what will occur when power is restored?
The router will enter ROM monitor mode upon completion of the power-on self test (POST).
The router will load the last known valid configuration file.
The router will enter Rx-boot mode.
* The router will prompt the user to enter setup mode or to continue without entering setup mode.

23. The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a TFTP server to the flash of the router. Which method will accomplish this task?
Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command.
Use the setup utility to load the new image to flash.
Copy the IOS image file from a TFTP server using the command copy filename ip address flash .
* Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.

24. What will occur if the command service password-encryption is entered on a router?
It will allow only the privileged mode password to be encrypted.
It will set an MD5 hashing algorithm on all unencrypted passwords.
* It will apply a weak encryption to all unencrypted passwords.
It will apply an MD5 hashing algorithm to encrypt the console and Telnet passwords.

25. Which features describe a FastEthernet interface on a router? (Choose two.)
can be configured using Router(config)# interface Ethernet0
* may be administratively disabled by using the shutdown command
* must be configured with a valid IP address and subnet mask in order to forward packets
has a maximum data rate of 10 Mbps
must be configured with the correct bandwidth to reach data rates higher than 10 Mbps

26. What are two recommended uses of login banners? (Choose two.)
* to display security warning messages
to welcome any user to the router
to warn people about misusing privileged EXEC mode
to identify circuits and other devices connected to the router
* to announce a scheduled system shutdown

27. Refer to the exhibit. While planning an IOS upgrade, the administrator issues the command show version. What is the current IOS boot location?
RAM
NVRAM
flash
* ROM

28. Why are interface descriptions used in router configurations? (Choose three).
* to enable support personnel to easily identify networks and customers that may be affected by a possible interface issue
* to provide comments on the interface without affecting the router functionality
to display access warning messages before users enter the interface configuration mode
to eliminate the need to use IP addresses when using the ping and telnet commands
* to identify the purpose and location of the interface

29. What are two characteristics of the support for Telnet within Cisco IOS software? (Choose two.)
* Up to five separate Telnet lines are supported by default in standard edition IOS files.
For security purposes, Telnet sessions are required to be established from the privileged mode.
* A router can host simultaneous Telnet sessions.
Once established, a Telnet session can remain operational regardless of network status.
Telnet tests wireless connectivity and does not require a physical connection between devices to gain remote access.

30. Neither router in the graphic has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)
ATL> connect CHI
ATL> telnet CHI
* ATL# 192.168.4.2
ATL# connect ATL
* CHI# telnet 192.168.4.1
CHI# telnet ATL

31. From the running-config, the following configuration entries are displayed: Router(config)# line vty 0 2 Router(config-line)# password g8k33pr Router(config-line)# login What can be interpreted from the exhibited configuration? (Choose two.)
* Three Telnet lines are available for remote access.
Two Telnet lines are available for remote access.
Future configuration of the remaining Telnet lines will require the password to be set to g8k33pr.
To login to the remote device, g8k33pr will be used as the Telnet and secret password.
* Remote access to this local router will require a Telnet password of g8k33pr.

32. Which two conclusions can be validly derived from the set of commands shown in the exhibit? (Choose two.)
Host 10.128.114.76 will be able to establish a Telnet session with host 172.25.0.26
* Host 10.128.114.76 will not be able to establish an FTP session with available hosts on the 172.25.0.0 network.
Host 192.168.85.76 will be able to establish a Telnet session with host 172.25.0.26.
* Host 192.168.85.76 will be able to establish an FTP session with available hosts on the 172.25.0.0 network.
Host 172.25.0.26 will not be able to establish a Telnet session with available hosts on the 192.168.85.0 network.
No host will be able to access IP services on the 10.128.114.0 network.

33. The following access list has been correctly applied to a router interface: access-list 52 deny 172.30.65.52access-list 52 permit any Which of the following statements are true about this ACL? (Choose three.)
This is an invalid ACL because the wildcard mask is missing from the command.
* A wildcard mask of 0.0.0.0 is assumed for 172.30.65.52.
This is an extended IP access list.
* All traffic from 172.30.65.51 will be permitted.
* This is a standard IP access list.

34. access-list 199 deny tcp 198.18.0.0 0.0.255.255 any eq 25 access-list 199 permit ip any any Assuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)
HTTP and FTP traffic from hosts on 198.18.0.0 will be denied.
Telnet traffic destined for hosts on network 198.18.0.0 will be denied.
* SMTP traffic from hosts on network 198.18.0.0 will be denied.
* SMTP and HTTP traffic to hosts on the 198.18.0.0 network is permitted.
Telnet traffic from any hosts to any host on network 198.18.0.0 will be denied.

35. Refer to the graphic. Which command will create a standard ACL that will apply to outbound traffic on interface Fa0/0 of router A and will deny IP traffic from any host on network 172.16.34.0/24 that is destined for network 192.168.5.0/24 while allowing all other IP traffic?
access-list 2 deny 172.16.34.0 0.0.0.0access-list 2 permit any
* access-list 33 deny 172.16.34.0 0.0.0.255access-list 33 permit any
access-list 42 deny 172.16.34.0access-list 42 permit any
access-list 56 deny tcp 172.16.34.0access-list 56 permit ip any

36. Refer to the exhibit. Router C interface E0 has gone down. What is the maximum time that will elapse before Router A learns that network 110.90.1.0 is down?
* 5 seconds
13 seconds
17 seconds
25 seconds
30 seconds
90 seconds

37. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet?
* WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1
WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1
WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2
WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/0

38. Which ACL can be applied in the outbound direction of Serial 0/0 on router B in the graphic to allow all IP traffic from LAN A to the Internet, allow Web traffic from LAN B to the Internet, and deny all other traffic to the Internet?
access-list 98 permit 192.168.2.0 0.0.0.255 any access-list 98 permit tcp 10.90.3.0 0.0.0.255 any eq www
* access-list 125 permit ip 192.168.2.0 0.0.0.255 any access-list 125 permit tcp 10.90.3.0 0.0.0.255 any eq www
access-list 132 permit ip 192.168.2.0 0.0.0.255 any access-list 132 permit tcp 10.90.3.0 0.0.0.255 any eq www access-list 132 permit ip any any
access-list 156 permit ip 192.168.2.0 0.0.0.255 any access-list 156 permit ip 10.90.3.0 0.0.0.255 any eq www

39. What will occur when the following ACL is applied inbound to both FastEthernet interfaces of the Anaheim Router shown in the exhibit? access-list 166 permit icmp 10.128.114.0 0.0.0.255 10.97.88.0 0.0.0.255 echo access-list 166 permit icmp 10.97.88.0 0.0.0.255 10.128.114.0 0.0.0.255 echo access-list 166 permit tcp 10.128.114.0 0.0.0.255 any eq www
The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.
The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces.
The Finance Admin host and the HR Admin host will be able to ping to each other. All other traffic will be denied.
* The Finance Admin host and the HR Admin host will be able to ping to each other. The HR Admin host will be allowed to access Web servers on the Internet, while the Finance Admin host will be denied Internet Web access.

40. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)
The configuration register is set to 0x2142.
* The first boot system command executed in the startup configuration file is boot system rom.
* The configuration register is set to 0x2100.
The boot field is set to the hexadecimal number 2.
The startup configuration file is missing or corrupt.

41. Refer to the graphic. A network administrator has a console connection to Router A. Pings to Router B are successful, but pings to Routers C and D fail. What is the first step in troubleshooting the problem?
Use the show cdp neighbors detail command from router A to gather information about all Cisco routers in the network.
Use the traceroute command to discover exactly which link in the network is down.
Use an extended ping from router A to each router in the network.
* Use the show interfaces command from a Telnet session on router B to check the connection to router C.

42. What are three features of CDP? (Choose three.)
* provides information on directly connected devices that have CDP enabled
* tests Layer 2 connectivity
* enabled by default on each interface
provides a layer of security
used for debugging Layer 4 connectivity issues

43. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)
Use a crossover cable to connect the terminal serial port to the router console port.
Use a rollover cable to connect the terminal NIC to the router console port.
* Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.
Use a transceiver to connect a straight-through cable to the router console port.
Use a straight-through cable to connect the router console port to the terminal NIC.
* Use a rollover cable to connect from a terminal serial port to the router console port.

44. Based on this partial output of the show ip route command, which routing protocol is configured on the router? R 172.16.3.0/24 [120/3] via 172.16.2.2, 00:00:27, Serial0/0
* RIP
EIGRP
OSPF
IGP
BGP

45. Which of the following statements are true regarding routed protocols? (Choose two.)
* They provide enough information in the Layer 3 address to allow a packet to be forwarded from one network to another.
* They carry user data between networks.
They allow routers to share information about networks and their proximity to each other.
They are used by routers to maintain routing tables.
RIP and IGRP are routed protocols.

46. What two facts can be determined from the output shown in the exhibit? (Choose two.)
* The version for this IOS file is 12.1 release 5.
The file format for this IOS version is T12.
The expression mz indicates whether the file is relocatable.
* This image could be used on a 2621 or a 2620 with enough RAM.
The number 121 indicates that this version of the software has been updated 121 times.

47. Which commands will show the status and IP address of all interfaces on a router? (Choose two.)
* show protocols
show ip protocols
show version
* show interfaces
show ip ports

48. A network administrator issues the command show ip route and sees this line of output: 192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:05, Serial0/0 What two pieces of information can be obtained from the output? (Choose two.)
* RIP is the routing protocol configured.
This is a static route to network 192.168.3.0.
* The metric for this route is 2.
The next periodic update is in 5 seconds.
The autonomous system number is 120.