1.
Which of the following are functions of a router? (Choose three.)
| |
packet switching | |
extension of network segments | |
segmentation of local area networks | |
selection of best path based on a logical addressing | |
selection of best path based on a physical addressing |
When would the ROM monitor mode be used? (Choose two.)
| |
maintaining routing configuration settings | |
modifying the IOS image stored in Flash | |
running a limited IOS feature set | |
performing the bootstrap process |
|
![]() Which of the following are valid static IP routes? (Choose three.) | |
RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1 | |
RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1 | |
RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 | |
RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2 | |
RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 | |
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1 |
|
When must a router serial interface be configured with the
clock rate command? | |
when the interface is functioning as a DTE device | |
when the interface timers have been cleared | |
when the connected DTE device is shut down | |
when the interface is functioning as a DCE device |
Which statement about datagram life is true? | |
Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source. | |
The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed. | |
Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source. | |
The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source. |
|
Why is it useful to have an interface description? | |
A user can telnet to the router using the interface description. | |
The interface description is a shortcut way to edit the running-config. | |
The interface description helps identify distant network connections. | |
The interface will remain inactive until an interface description is applied. |
ACL statements operate in sequential, logical order. If a
condition match is true, the rest of the ACL statements are not checked. If all
of the ACL statements are unmatched, what happens to the packet? | |
The packets will be placed in a buffer and forwarded when the ACL is removed. | |
The packets will be sent to the source with an error notification message. | |
The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited. | |
The implicit deny any statement placed at the end of the list will cause the packets to be dropped. |
Why would an administrator use the Telnet application when
troubleshooting a network? (Choose three.) | |
It can be used to verify the operation of application layer software between the source and destination. | |
Telnet can use the ICMP protocol to verify a hardware connection and network layer address. | |
It is the most complete testing mechanism available. | |
Remote networks may be accessed via a Telnet session for troubleshooting. | |
Time to Live values are used by Telnet to identify a failure of device between source and destination. |
Which of the following are true statements about creating and
applying access lists? (Choose three.) | |
Access list entries should filter in the order from general to specific. | |
One access list per port per protocol per direction is permitted. | |
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination. | |
There is an implicit deny at the end of all access lists. | |
Statements are processed sequentially from top to bottom until a match is found. | |
The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied. |
|
Which two statements are true about route metrics? (Choose two.)
| |
The more factors that make up a metric, the greater the flexibility to tailor network operations. | |
The larger the metric number, the better the path. | |
Routing protocols use metrics to send routing updates to directly connected neighbors. | |
Bandwidth and delay are static metrics used by RIP v1. | |
Ticks, delay, and cost are metrics used by routing protocols. |
|
|
|