1.
| Which of the following are functions of a router? (Choose three.)
| |
| packet switching | |
| extension of network segments | |
| segmentation of local area networks | |
| selection of best path based on a logical addressing | |
| selection of best path based on a physical addressing | |
| When would the ROM monitor mode be used? (Choose two.)
| |
| maintaining routing configuration settings | |
| modifying the IOS image stored in Flash | |
| running a limited IOS feature set | |
| performing the bootstrap process | |
| |||||||||||
![]() Which of the following are valid static IP routes? (Choose three.) | |
| RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1 | |
| RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1 | |
| RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 | |
| RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2 | |
| RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 | |
| RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1 | |
| |||||||||||||||
| When must a router serial interface be configured with the
clock rate command? | |
| when the interface is functioning as a DTE device | |
| when the interface timers have been cleared | |
| when the connected DTE device is shut down | |
| when the interface is functioning as a DCE device | |
| Which statement about datagram life is true? | |
| Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source. | |
| The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed. | |
| Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source. | |
| The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source. | |
| |||||||||||
| Why is it useful to have an interface description? | |
| A user can telnet to the router using the interface description. | |
| The interface description is a shortcut way to edit the running-config. | |
| The interface description helps identify distant network connections. | |
| The interface will remain inactive until an interface description is applied. | |
| ACL statements operate in sequential, logical order. If a
condition match is true, the rest of the ACL statements are not checked. If all
of the ACL statements are unmatched, what happens to the packet? | |
| The packets will be placed in a buffer and forwarded when the ACL is removed. | |
| The packets will be sent to the source with an error notification message. | |
| The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited. | |
| The implicit deny any statement placed at the end of the list will cause the packets to be dropped. | |
| Why would an administrator use the Telnet application when
troubleshooting a network? (Choose three.) | |
| It can be used to verify the operation of application layer software between the source and destination. | |
| Telnet can use the ICMP protocol to verify a hardware connection and network layer address. | |
| It is the most complete testing mechanism available. | |
| Remote networks may be accessed via a Telnet session for troubleshooting. | |
| Time to Live values are used by Telnet to identify a failure of device between source and destination. | |
| Which of the following are true statements about creating and
applying access lists? (Choose three.) | |
| Access list entries should filter in the order from general to specific. | |
| One access list per port per protocol per direction is permitted. | |
| Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination. | |
| There is an implicit deny at the end of all access lists. | |
| Statements are processed sequentially from top to bottom until a match is found. | |
| The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied. | |
| |||||||||||
| Which two statements are true about route metrics? (Choose two.)
| |
| The more factors that make up a metric, the greater the flexibility to tailor network operations. | |
| The larger the metric number, the better the path. | |
| Routing protocols use metrics to send routing updates to directly connected neighbors. | |
| Bandwidth and delay are static metrics used by RIP v1. | |
| Ticks, delay, and cost are metrics used by routing protocols. | |
| |||||||||||
| |||||||||||
| ||||