IP题库

更新时间:2024-06-08 09:03:01 阅读量: 综合文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

1. Refer to the exhibit. What could be possible causes for the \(Choose two.)

A. A Layer 1 problem exists. B. The bandwidth is set too low. C. A protocol mismatch exists. D. An incorrect cable is being used.

E. There is an incorrect IP address on the Serial 0/0 interface. Answer: AD

2. Before installing a new, upgraded version of the IOS, what should be checked on the router, and which

command should be used to gather this information? (Choose two.) A. the amount of available ROM

B. the amount of available flash and RAM memory

C. the version of the bootstrap software present on the router D. show version E. show processes F. show running-config Answer: BD

3. Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support

this transmission? .

| English | Chinese(Traditional) | Chinese(Simplified) | - 3 - . Information Co., Ltd. All rights reserved. A. B. C. D. E. F.

Answer: D

4. Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is

shown in the exhibit? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 4 - . Information Co., Ltd. All rights reserved.

A. Host E and host F use the same IP gateway address.

B. Router1 and Switch2 should be connected via a crossover cable.

C. Router1 will not play a role in communications between host A and host D.

D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. F. TheFastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same

encapsulation type. Answer: DF

5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on

RouterB? (Choose two.)

A. It ensures that data will be forwarded by RouterB. B. It provides stability for the OSPF process on RouterB. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 5 - . Information Co., Ltd. All rights reserved.

C. It specifies that the router ID for RouterB should be 10.0.0.1.

D. It decreases the metric for routes that are advertised from RouterB. E. It indicates that RouterB should be elected the DR for the LAN. Answer: BC

6. A network administrator is explaining VTP configuration to a new technician. What should the network

administrator tell the new technician about VTP configuration? (Choose three.) A. A switch in the VTP client mode cannot update its local VLAN database.

B. A trunk link must be configured between the switches to forward VTP updates. C. A switch in the VTP server mode can update a switch in the VTP transparent mode.

D. A switch in the VTP transparent mode will forward updates that it receives to other switches. E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP

revision number.

F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership. Answer: ABD

7. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.) A. RAM B. NVRAM

C. flash memory D. HTTP server E. TFTP server F. Telnet server Answer: CE

8. What are two reasons a network administrator would use CDP? (Choose two.) A. to verify the type of cable interconnecting two devices

B. to determine the status of network services on a remote device .

| English | Chinese(Traditional) | Chinese(Simplified) | - 6 - . Information Co., Ltd. All rights reserved.

C. to obtain VLAN information from directly connected switches

D. to verify Layer 2 connectivity between two devices when Layer 3 fails

E. to obtain the IP address of a connected device in order to telnet to the device

F. to determine the status of the routing protocols between directly connected routers Answer: DE

9. Refer to the exhibit. Both switches are using a default configuration. Which two destination addresses

will host 4 use to send data to host 1? (Choose two.) A. the IP address of host 1 B. the IP address of host 4 C. the MAC address of host 1 D. the MAC address of host 4

E. the MAC address of the Fa0/0 interface of the R1 router F. the MAC address of the Fa0/1 interface of the R1 router Answer: AF

10. Refer to the exhibit. The router has been configured with these commands: hostname Gateway

interface FastEthernet 0/0

ip address 198.133.219.14 255.255.255.248 no shutdown .

| English | Chinese(Traditional) | Chinese(Simplified) | - 7 - . Information Co., Ltd. All rights reserved.

interfaceFastEthernet 0/1

ip address 192.168.10.254 255.255.255.0 no shutdown

interface Serial 0/0

ip address 64.100.0.2 255.255.255.252 no shutdown

ip route 0.0.0.0 0.0.0.0 64.100.0.1

What are the two results of this configuration? (Choose two.)

A. The default route should have a next hop address of 64.100.0.3.

B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.

C. The address of the subnet segment with the WWW server will support seven more servers. D. The addressing scheme allows users on the Internet to access the WWW server.

E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without

address translation. Answer: DE

11. A company is installing IP phones. The phones and office computers connect to the same device. To

ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is

on a different network from that of the office computer data traffic. What is the best network device to

.

| English | Chinese(Traditional) | Chinese(Simplified) | - 8 - . Information Co., Ltd. All rights reserved.

which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.) A. hub B. router C. switch D. STP

E. subinterfaces F. VLAN Answer: CF

12. What are two benefits of using VTP in a switching environment? (Choose two.) A. It allows switches to read frame tags.

B. It allows ports to be assigned to VLANs automatically. C. It maintains VLAN consistency across a switched network. D. It allows frames from multiple VLANs to use a single interface.

E. It allows VLAN information to be automatically propagated throughout the switching environment. Answer: CE

13. Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)

A. It establishes a static route to the 172.16.3.0 network. B. It establishes a static route to the 192.168.2.0 network.

C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.

D. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.

E. It uses the default administrative distance.

F. It is a route that would be used last if other routes to the same destination exist. Answer: AE

14. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 9 - . Information Co., Ltd. All rights reserved.

A. decreasing the number of collision domains B. filtering frames based on MAC addresses C. allowing simultaneous frame transmissions D. increasing the size of broadcast domains

E. increasing the maximum length of UTP cabling between devices Answer: BC

15. Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so

that the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two

Ethernet segments would need to be configured as trunk links? (Choose two.) A. A B. B C. C D. D E. E F. F

Answer: CF

16. Which two topologies are using the correct type of twisted-pair cables? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 10 - . Information Co., Ltd. All rights reserved. A. B. C. D. E.

Answer: DE

17. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.) A. amount of RAM B. bridge priority C. IOS version D. IP address E. MAC address F. speed of the links Answer: BE .

| English | Chinese(Traditional) | Chinese(Simplified) | - 11 - . Information Co., Ltd. All rights reserved.

18. Refer to the exhibit. Assume that the routing protocol referenced in each choice below is configured

with its default settings and the given routing protocol is running on all the routers. Which two conditional

statements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0 for the

routing protocol mentioned? (Choose two.)

A. If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5. B. If OSPF is the routing protocol, the path will be from R1 to R2 to R5. C. If OSPF is the routing protocol, the path will be from R1 to R5.

D. If RIPv2 is the routing protocol, the path will be from R1 to R3 to R4 to R5.

E. If RIPv2 is the routing protocol, the path will be from R1 to R5. Answer: AE

19. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values

could be used for the configuration of these hosts? (Choose three.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 12 - . Information Co., Ltd. All rights reserved.

A. host A IP address: 192.168.1.79 B. host A IP address: 192.168.1.64

C. host A default gateway: 192.168.1.78 D. host B IP address: 192.168.1.128

E. host B default gateway: 192.168.1.129 F. host B IP address: 192.168.1.190 Answer: ACF

20. A network administrator changes the configuration register to 0x2142 and reboots the router. What are

two results of making this change? (Choose two.) A. The IOS image will be ignored.

B. The router will prompt to enter initial configuration mode. C. The router will boot to ROM.

D. Any configuration entries in NVRAM will be ignored. E. The configuration in flash memory will be booted. Answer: BD

21. Refer to the exhibit. The networks connected to router R2 have been summarized as a

192.168.176.0/21 route and sent to R1. Which two packet destination addresses will R1 forward to R2?

(Choose two.)

A. 192.168.194.160 B. 192.168.183.41 C. 192.168.159.2 .

| English | Chinese(Traditional) | Chinese(Simplified) | - 13 - . Information Co., Ltd. All rights reserved.

D. 192.168.183.255 E. 192.168.179.4 F. 192.168.184.45 Answer: BE

22. Which three statements are typical characteristics of VLAN arrangements? (Choose three.) A. A new switch has no VLANs configured.

B. Connectivity between VLANs requires a Layer 3 device. C. VLANs typically decrease the number of collision domains. D. Each VLAN uses a separate address space.

E. A switch maintains a separate bridging table for each VLAN.

F. VLANs cannot span multiple switches. Answer: BDE

23. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the

10.1.3.0/24 network when different routing protocols are configured? (Choose three.)

A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.

B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is

the routing protocol. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 14 - . Information Co., Ltd. All rights reserved.

C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by

default.

D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.

E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths

will be installed in the routing table.

F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations. Answer: ADE

24. Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)

A. With a network wide mask of 255.255.255.128, each interface does not require an IP address. B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.

C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.

D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.

E. With a network wide mask of 255.255.254.0, each interface does not require an IP address. Answer: BDE

25. Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 15 - . Information Co., Ltd. All rights reserved.

A. alternate B. backup C. designated D. disabled E. root Answer: CE

26. Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the most likely

reason that interfaceFastEthernet 0/10 is not the root port for VLAN 2?

A. This switch has more than one interface connected to the root network segment in VLAN 2. B. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree.

C. This switch interface has a higher path cost to the root bridge than another in the topology. D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch. Answer: C

27. Refer to the exhibit. The network administrator must establish a route by which London workstations

can forward traffic to the Manchester workstations. What is the simplest way to accomplish this? .

| English | Chinese(Traditional) | Chinese(Simplified) | - 16 - . Information Co., Ltd. All rights reserved.

A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.

B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester.

C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router.

D. Configure a static default route on London with a next hop of 10.1.1.1.

E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2. F. Configure Manchester to advertise a static default route to London. Answer: E

28. Refer to the exhibit. This command is executed on 2960Switch:

2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1

Which two of these statements correctly identify results of executing the command? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 17 - . Information Co., Ltd. All rights reserved.

A. Port security is implemented on the fa0/1 interface.

B. MAC address 0000.00aa.aaaa does not need to be learned by this switch. C. Only MAC address 0000.00aa.aaaa can source frames on the fa0/1 segment.

D. Frames with a Layer 2 source address of 0000.00aa.aaaa will be forwarded out fa0/1.

E. MAC address 0000.00aa.aaaa will be listed in the MAC address table for interface fa0/1 only. Answer: BE

29. Which of the following describes the roles of devices in a WAN? (Choose three.)

A. A CSU/DSU terminates a digital local loop. B. A modem terminates a digital local loop. C. A CSU/DSU terminates an analog local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device. F. A router is commonly considered a DCE device. Answer: ADE

30. What are two characteristics of Telnet? (Choose two.) A. It sends data in clear text format.

B. It is no longer supported on Cisco network devices. C. It is more secure than SSH.

D. It requires an enterprise license in order to be implemented.

E. It requires that the destination device be configured to support Telnet connections. Answer: AE

31. What are two security appliances that can be installed in a network? (Choose two.) A. ATM B. IDS C. IOS D. IOX E. IPS .

| English | Chinese(Traditional) | Chinese(Simplified) | - 18 - . Information Co., Ltd. All rights reserved. F. SDM Answer: BE

32. A single 802.11g access point has been configured and installed in the center of a square office. A few

wireless users are experiencing slow performance and drops while most users are operating at peak

efficiency. What are three likely causes of this problem? (Choose three.) A. mismatched TKIP encryption B. null SSID

C. cordless phones D. mismatched SSID E. metal file cabinets

F. antenna type or direction Answer: CEF

33. A host is attempting to send data to another host on a different network. What is the first action that the

sending host will take? A. Drop the data.

B. Send the data frames to the default gateway.

C. Create an ARP request to get a MAC address for the receiving host.

D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

Answer: C

34. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 19 - . Information Co., Ltd. All rights reserved.

A. The area of overlap of the two cells represents a basic service set (BSS). B. The network diagram represents an extended service set (ESS). C. Access points in each cell must be configured to use channel 1.

D. The area of overlap must be less than 10% of the area to ensure connectivity. E. The two APs should be configured to operate on different channels. Answer: BE

35. Which two devices can interfere with the operation of a wireless network because they operate on

similar frequencies? (Choose two.) A. copier

B. microwave oven C. toaster

D. cordless phone E. IP phone F. AM radio Answer: BD

36. Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.) A. Global addresses start with 2000::/3. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 20 - . Information Co., Ltd. All rights reserved.

B. Link-local addresses start with FE00:/12. C. Link-local addresses start with FF00::/10.

D. There is only one loopback address and it is ::1.

E. If a global address is assigned to an interface, then that is the only allowable address for the interface. Answer: AD

37. Refer to the exhibit. Which statement is true?

A. The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20. B. VLAN 20 is running the Per VLAN Spanning Tree Protocol. C. The MAC address of the root bridge is 0017.596d.1580.

D. SwitchA is not the root bridge, because not all of the interface roles are designated. Answer: D

38. Which two of these statements are true of IPv6 address representation? (Choose two.) A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast. B. A single interface may be assigned multiple IPv6 addresses of any type. C. Every IPv6 interface contains at least one loopback address. D. The first 64 bits represent the dynamically created interface ID.

.

| English | Chinese(Traditional) | Chinese(Simplified) | - 21 - . Information Co., Ltd. All rights reserved.

E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory. Answer: BC

39. What are three basic parameters to configure on a wireless access point? (Choose three.) A. SSID B. RTS/CTS C. AES-CCMP D. TKIP/MIC E. RF channel

F. authentication method Answer: AEF

40. Refer to the exhibit. A system administrator installed a new switch using a script to configure it. IP

connectivity was tested using pings to SwitchB. Later attempts to access NewSwitch using Telnet from

SwitchA failed. Which statement is true? A. Executing password recovery is required. B. The virtual terminal lines are misconfigured.

C. Use Telnet to connect to RouterA and then to NewSwitch to correct the error. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 22 - . Information Co., Ltd. All rights reserved.

D. Power cycle of NewSwitch will return it to a default configuration. Answer: C

41. Which two of these statements regarding RSTP are correct? (Choose two.) A. RSTP cannot operate with PVST+. B. RSTP defines new port roles. C. RSTP defines no new port states.

D. RSTP is a proprietary implementation of IEEE 802.1D STP. E. RSTP is compatible with the original IEEE 802.1D STP. Answer: BE

42. Which three of these statements regarding 802.1Q trunking are correct? (Choose three.) A. 802.1Q native VLAN frames are untagged by default. B. 802.1Q trunking ports can also be secure ports. C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.

D. 802.1Q trunks require full-duplex, point-to-point connectivity.

E. 802.1Q trunks should have native VLANs that are the same at both ends. Answer: ACE

43. Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as

being configured to run RSTP. No other configuration changes have been made. Which three of these

show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 23 - . Information Co., Ltd. All rights reserved.

A. SwitchA, Fa0/2, designated B. SwitchA, Fa0/1, root C. SwitchB, Gi0/2, root

D. SwitchB, Gi0/1, designated E. SwitchC, Fa0/2, root F. SwitchD, Gi0/2, root Answer: ABF

44. Refer to the exhibit. A junior network administrator was given the task of configuring port security on

SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is

detected, the port is to drop frames from this device. The administrator configured the interface and tested

it with successful pings from PC_A to RouterA, and then observes the output from these two show

commands.

Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 24 - . Information Co., Ltd. All rights reserved.

A. Port security needs to be globally enabled.

B. Port security needs to be enabled on the interface.

C. Port security needs to be configured to shut down the interface in the event of a violation. D. Port security needs to be configured to allow only one learned MAC address.

E. Port security interface counters need to be cleared before using the show command. F. The port security configuration needs to be saved to NVRAM before it can become active. Answer: BD

45. Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer divides a data stream into segments and may add reliability and flow control

information.

B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host

addresses and protocol-related control information.

D. Packets are created when the network layer adds Layer 3 addresses and control information to a

segment.

E. The presentation layer translates bits into voltages for transmission across the physical link.

.

| English | Chinese(Traditional) | Chinese(Simplified) | - 25 - . Information Co., Ltd. All rights reserved. Answer: AD

46. For which type of connection should a straight-through cable be used? A. switch to switch B. switch to hub C. switch to router D. hub to hub E. router to PC Answer: C

47. Which set of commands is recommended to prevent the use of a hub in the access layer? A. switch(config-if)#switchport mode trunk

switch(config-if)#switchport port-security maximum 1 B. switch(config-if)#switchport mode trunk

switch(config-if)#switchport port-security mac-address 1 C. switch(config-if)#switchport mode access

switch(config-if)#switchport port-security maximum 1 D. switch(config-if)#switchport mode access

switch(config-if)#switchport port-security mac-address 1 Answer: C

48. By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations

are key to avoid unauthorized management access? (Choose two.) A. Create an additional ACL to block the access to VLAN 1.

B. Move the management VLAN to something other than default. C. Move all ports to another VLAN and deactivate the default VLAN. D. Limit the access in the switch using port security configuration. E. Use static VLAN in trunks and access ports to restrict connections. F. Shutdown all unused ports in the Catalyst switch. Answer: BF .

| English | Chinese(Traditional) | Chinese(Simplified) | - 26 - . Information Co., Ltd. All rights reserved.

49. Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?

A. BackboneFast B. UplinkFast C. Root Guard D. BPDU Guard E. BPDU Filter Answer: D

50. Which type of cable is used to connect the COM port of a host to the COM port of a router or

switch? A. crossover

B. straight-through C. rolled

D. shielded twisted-pair Answer: C

51. What is known as \A. global unicast B. anycast C. multicast

D. unspecified address Answer: B

52. Which option is a valid IPv6 address? A. 2001:0000:130F::099a::12a B. 2002:7654:A1AD:61:81AF:CCC1 C. FEC0:ABCD:WXYZ:0067::2A4 D. 2004:1:25A4:886F::1 Answer: D .

| English | Chinese(Traditional) | Chinese(Simplified) | - 27 - . Information Co., Ltd. All rights reserved.

53. How many bits are contained in each field of an IPv6 address? A. 24 B. 4 C. 8 D. 16

Answer: D

54. Which layer of the OSI reference model uses the hardware address of a device to ensure message

delivery to the proper host on a LAN? A. physical B. data link C. network D. transport Answer: B

55. Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to

ensure that reliable networking occurs? A. data link B. network C. transport D. presentation E. physical Answer: C

56. What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies.

B. Manage and scale the growth of the internal network.

C. Conserve public IP addresses so that we do not run out of them. D. Allow access reserved to the devices. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 28 - . Information Co., Ltd. All rights reserved. Answer: C

57. Which IP address can be assigned to an Internet interface? A. 10.180.48.224 B. 9.255.255.10 C. 192.168.20.223 D. 172.16.200.18 Answer: B

58. What will happen if a private IP address is assigned to a public interface connected to an ISP? A. Addresses in a private range will be not routed on the Internet backbone. B. Only the ISP router will have the capability to access the public network. C. The NAT process will be used to translate this address in a valid IP address. D. Several automated methods will be necessary on the private network.

E. A conflict of IP addresses happens, because other public routers can use the same range. Answer: A

59. When is it necessary to use a public IP address on a routing interface? A. Connect a router on a local network. B. Connect a router to another router.

C. Allow distribution of routes between networks. D. Translate a private IP address. E. Connect a network to the Internet. Answer: E

60. What is the first 24 bits in a MAC address called? A. NIC B. BIA C. OUI D. VAI .

| English | Chinese(Traditional) | Chinese(Simplified) | - 29 - . Information Co., Ltd. All rights reserved. Answer: C

61. In an Ethernet network, under what two scenarios can devices transmit? (Choose two.) A. when they receive a special token B. when there is a carrier

C. when they detect no other devices are sending D. when the medium is idle

E. when the server grants access

Answer: CD

62. Which term describes the process of encapsulating IPv6 packets inside IPv4 packets? A. tunneling B. hashing C. routing D. NAT Answer: A

63. Which statement about RIPng is true? A. RIPng allows for routes with up to 30 hops. B. RIPng is enabled on each interface separately. C. RIPng uses broadcasts to exchange routes.

D. There can be only one RIPng process per router. Answer: B

64. Which statement about IPv6 is true?

A. Addresses are not hierarchical and are assigned at random. B. Only one IPv6 address can exist on a given interface. C. There are 2.7 billion addresses available.

D. Broadcasts have been eliminated and replaced with multicasts. Answer: D .

| English | Chinese(Traditional) | Chinese(Simplified) | - 30 - . Information Co., Ltd. All rights reserved.

65. Which line from the output of the show ip interface command indicates a layer 1 problem? A. Serial0/1 is up, line protocol is down B. Serial0/1 is down, line protocol is down C. Serial0/1 is up, line protocol is up

D. Serial0/1 is administratively down, line protocol is down Answer: B

66. A network admin wants to know every hop the packets take when he accesses cisco.com. Which

command is the most appropriate to use? A. path cisco.com B. debug cisco.com C. trace cisco.com

D. traceroute cisco.com Answer: D

67. QoS policies are applied on the switches of a LAN. Which type of command will show the effects of

the policy in real time? A. show command B. debug command

C. configuration command D. rommon command Answer: B

68. Which command will show the MAC addresses of stations connected to switch ports? A. show mac-address B. showarp C. show table

D. show switchport Answer: B .

| English | Chinese(Traditional) | Chinese(Simplified) | - 31 - . Information Co., Ltd. All rights reserved.

69. What is the name of the VTP mode of operation that enables a switch to forward only VTP advertisements while still permitting the editing of local VLAN information? A. server B. client C. tunnel

D. transparent Answer: D

70. Which port state is introduced by Rapid-PVST? A. learning B. listening C. discarding D. forwarding Answer: C

71. What speeds must be disabled in a mixed 802.11b/g WLAN to allow only 802.11g clients to connect? A. 6, 9, 12, 18 B. 1, 2, 5.5, 6 C. 5.5, 6, 9, 11 D. 1, 2, 5.5, 11 Answer: D

72. Refer to the exhibit. Which VLSM mask will allow for the appropriate number of host addresses for Network A? .

| English | Chinese(Traditional) | Chinese(Simplified) | - 32 - . Information Co., Ltd. All rights reserved. A. /25 B. /26 C. /27 D. /28 Answer: A

73. Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the

least amount of wasted addresses? A. 255.255.255.0

B. 255.255.254.0 C. 255.255.252.0 D. 255.255.248.0 Answer: B

74. Refer to the exhibit. Which mask is correct to use for the WAN link between the routers that will

provide connectivity while wasting the least amount of addresses? A. /23 B. /24 C. /25 D. /30 Answer: D .

| English | Chinese(Traditional) | Chinese(Simplified) | - 33 - . Information Co., Ltd. All rights reserved.

75. Refer to the exhibit. What is the most appropriate summarization for these routes? A. 10.0.0.0 /21 B. 10.0.0.0 /22 C. 10.0.0.0 /23 D. 10.0.0.0 /24 Answer: B

76. Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.) A. Set the IP gateway to be used by the network.

B. Perform host discovery used DHCPDISCOVER message.

C. Configure IP address parameters from DHCP server to a host. D. Provide an easy management of layer 3 devices. E. Monitor IP performance using the DHCP server. F. Assign and renew IP address from the default pool. Answer: CF

77. Which two benefits are provided by using a hierarchical addressing network addressing scheme?

(Choose two.)

A. reduces routing table entries B. auto-negotiation of media rates

C. efficient utilization of MAC addresses

D. dedicated communications between devices E. ease of management and troubleshooting Answer: AE .

| English | Chinese(Traditional) | Chinese(Simplified) | - 34 - . Information Co., Ltd. All rights reserved.

78. Which two benefits are provided by creating VLANs? (Choose two.) A. added security

B. dedicated bandwidth

C. provides segmentation

D. allows switches to route traffic between subinterfaces E. contains collisions Answer: AC

79. Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.) A. VTP B. 802.1q C. IGP D. ISL E. 802.3u Answer: BD

80. Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.) A. 802.1d B. VTP C. 802.1q D. STP E. SAP

Answer: AD

81. On the network 131.1.123.0/27, what is the last IP address that can be assigned to a host? A. 131.1.123.30 B. 131.1.123.31 C. 131.1.123.32 D. 131.1.123.33 .

| English | Chinese(Traditional) | Chinese(Simplified) | - 35 - . Information Co., Ltd. All rights reserved. Answer: A

82. The ip subnet zero command is not configured on a router. What would be the IP address of Ethernet

0/0 using the first available address from the sixth subnet of the network 192.168.8.0/29? A. 192.168.8.25 B. 192.168.8.41 C. 192.168.8.49 D. 192.168.8.113 Answer: C

83. For the network 192.0.2.0/23, which option is a valid IP address that can be assigned to a host?

A. 192.0.2.0 B. 192.0.2.255 C. 192.0.3.255 D. 192.0.4.0 Answer: B

84. How many addresses for hosts will the network 124.12.4.0/22 provide? A. 510 B. 1022 C. 1024 D. 2048 Answer: B

85. Where does routing occur within the DoD TCP/IP reference model? A. application B. internet C. network D. transport Answer: B .

| English | Chinese(Traditional) | Chinese(Simplified) | - 36 - . Information Co., Ltd. All rights reserved.

86. Which VTP mode is capable of creating only local VLANs and does not synchronize with other switches in the VTP domain? A. client B. dynamic C. server D. static

E. transparent Answer: E

87. Which switch would STP choose to become the root bridge in the selection process? A. 32768: 11-22-33-44-55-66 B. 32768: 22-33-44-55-66-77 C. 32769: 11-22-33-44-55-65 D. 32769: 22-33-44-55-66-78 Answer: A

88. A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment

existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?

A. More collision domains will be created. B. IP address utilization will be more efficient.

C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created. Answer: D

89. Which two statements about the use of VLANs to segment a network are true? (Choose two.) A. VLANs increase the size of collision domains.

B. VLANs allow logical grouping of users by function. C. VLANs simplify switch administration. D. VLANs enhance network security. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 37 - . Information Co., Ltd. All rights reserved. Answer: BD

90. On corporate network, hosts on the same VLAN can communicate with each other, but they are

unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?

A. a router with subinterfaces configured on the physical interface that is connected to the switch B. a router with an IP address on the physical interface connected to the switch C. a switch with an access link that is configured between the switches D. a switch with a trunk link that is configured between the switches Answer: A

91. When a DHCP server is configured, which two IP addresses should never be assignable to hosts?

(Choose two.)

A. network or subnetwork IP address B. broadcast address on the network C. IP address leased to the LAN D. IP address used by the interfaces

E. manually assigned address to the clients F. designated IP address to the DHCP server Answer: AB

92. Which statement describes the process of dynamically assigning IP addresses by the DHCP server?

A. Addresses are allocated after a negotiation between the server and the host to determine the length of

the agreement.

B. Addresses are permanently assigned so that the hosts uses the same address at all times.

C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an

address must be made.

D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease. Answer: D .

| English | Chinese(Traditional) | Chinese(Simplified) | - 38 - . Information Co., Ltd. All rights reserved.

93. Which network protocol does DNS use? A. FTP B. TFTP C. TCP D. UDP E. SCP Answer: D

94. When two hosts are trying to communicate across a network, how does the host originating the

communication determine the hardware address of the host that it wants to \A. RARP request

B. Show Network Address request C. Proxy ARP request D. ARP request

E. Show Hardware Address request Answer: D

95. When a host transmits data across a network to another host, which process does the data go through?

A. standardization B. conversion C. encapsulation D. synchronization Answer: C

96. An administrator attempts a traceroute but receives a \Unreadable\message. Which

protocol is responsible for that message? A. RARP B. RUDP C. ICMP .

| English | Chinese(Traditional) | Chinese(Simplified) | - 39 - . Information Co., Ltd. All rights reserved. D. SNMP Answer: C

97. When you are logged into a switch, which prompt indicates that you are in privileged mode? A. % B. @ C. > D. $ E. #

Answer: E

98. Which command shows system hardware and software version information? A. show configuration B. show environment C. show inventory D. show platform E. show version Answer: E

99. Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An

802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but

on

CAT2 the native VLAN is not specified. What will happen in this scenario?

A. 802.1Q giants frames could saturate the link.

B. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames. C. A native VLAN mismatch error message will appear.

D. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames. Answer: C

100. Which command would correctly configure a serial port on a router with the last usable host address .

| English | Chinese(Traditional) | Chinese(Simplified) | - 40 - . Information Co., Ltd. All rights reserved.

in the 192.216.32.32/29 subnet?

A. router (config-if)#ip address 192.216.32.38 255.255.255.240 B. router (config-if)# ip address 192.216.32.39 255.255.255.224 C. router (config-if)# ip address 192.216.32.63 255.255.255.248 D. router (config-if)# ip address 192.216.32.39 255.255.255.248 E. router (config-if)# ip address 192.216.32.63 255.255.255.248 F. router (config-if)# ip address 192.216.32.38 255.255.255.248 Answer: F

101. The network default gateway applying to a host by DHCP is 192.168.5.33/28. Which option is the

valid IP address of this host? A. 192.168.5.55 B. 192.168.5.47 C. 192.168.5.40 D. 192.168.5.32 E. 192.168.5.14 Answer: C

102. Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0? (Choose two.)

A. 113.10.4.0 B. 186.54.3.0 C. 175.33.3.255 D. 26.35.2.255 E. 17.35.36.0 Answer: BD

103. The network administrator has asked you to check the status of the workstation's IP stack by pinging

the loopback address. Which address would you ping to perform this task? A. 10.1.1.1 .

| English | Chinese(Traditional) | Chinese(Simplified) | - 41 - . Information Co., Ltd. All rights reserved. B. 127.0.0.1 C. 192.168.0.1 D. 239.1.1.1 Answer: B

104. Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned

an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable.

Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? (Choose two.)

A. Replace the straight-through cable with a crossover cable. B. Change the subnet mask of the hosts to /25. C. Change the subnet mask of the hosts to /26.

D. Change the address of Workstation A to 192.0.2.15. E. Change the address of Workstation B to 192.0.2.111. Answer: AB

105. Your ISP has given you the address 223.5.14.6/29 to assign to your router's interface. They have

also given you the default gateway address of 223.5.14.7. After you have configured the address, the

router is unable to ping any remote devices. What is preventing the router from pinging remote devices?

A. The default gateway is not an address on this subnet.

B. The default gateway is the broadcast address for this subnet. C. The IP address is the broadcast address for this subnet. D. The IP address is an invalid class D multicast address. Answer: B

106. Which command is used to copy the configuration from RAM into NVRAM? A. copy running-config: startup-config B. copy startup-config: running-config: C. copy running config startup config D. copy startup config running config .

| English | Chinese(Traditional) | Chinese(Simplified) | - 42 - . Information Co., Ltd. All rights reserved.

E. write terminal Answer: A

107. Which command is used to load a configuration from a TFTP server and merge the configuration into RAM?

A. copy running-config: TFTP: B. copy TFTP: running-config

C. copy TFTP: startup-config D. copy startup-config: TFTP: Answer: B

108. A system administrator types the command to change the hostname of a router. Where on the Cisco

IFS is that change stored? A. NVRAM B. RAM C. FLA

1. Which connections allow the use of full-duplex Ethernet?(Choose three.) A. switch to host B. switch to switch C. hub to hub D. switch to hub E. host to host Answer: ABE

2. Which of the following statements are true regarding bridges and switches? (Choose 3.)

A. Switches are primarily software based while bridges are hardware based. B. Both bridges and switches forward Layer 2 broadcasts. C. Bridges are frequently faster than switches.

D. Switches have a higher number of ports than most bridges.

E. Bridges define broadcast domains while switches define collision domains. F. Both bridges and switches make forwarding decisions based on Layer 2 addresses. Answer: BDF

3. Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.) A. 10.172.13.65 B. 172.16.223.125 C. 172.64.12.29 D. 192.168.23.252 E. 198.234.12.95 F. 212.193.48.254 Answer: CEF

4. Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? A. frame-relay arp B. frame-relay map

C. frame-relay interface-dlci

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801 D. frame-relay lmi-type Answer: B

5. After the show ip route command has been entered, the following routes are displayed. Which route will not be

entered into the routing table of a neighboring router?

A. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0 B. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1 C. C 192.168.1.0/24 is directly connected, Ethernet0

D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0 Answer: D

6. What is a global command?

A. a command that is available in every release of IOS, regardless of the version or deployment status

B. a command that can be entered in any configuration mode

C. a command that is universal in application and supports all protocols D. a command that is implemented in all foreign and domestic IOS versions E. a command that is set once and affects the entire router Answer: E

7. All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which

command will display the CHAP authentication process as it occurs between two routers in the network? A. show CHAP authentication B. show interface serial0 C. debug PPP authentication D. debug CHAP authentication E. show ppp authentication chap Answer: C

8. It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit.

Which of the following procedures are required to accomplish this task? (Choose three.)

A. Remove the IP address from the physical interface. 中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

B. Encapsulate the physical interface with multipoint PPP. C. Create the virtual interfaces with the interface command. D. Configure each subinterface with its own IP address.

E. Disable split horizon to prevent routing loops between the subinterface networks.

F. Configure static Frame Relay map entries for each subinterface network. Answer: ACD

9. The RIP network shown in the graphic has been fully operational for two days. Each routing table is complete.

Which networks will be included in the next routing update from the Apples router to the Pears router? A. A,B,C,D,E,F B. A,C C. A,B,C,D D. B,D E. D,E,F F. A,B,C Answer: F

10. How should a router that is being used in a Frame Relay network be configured

to avoid split horizon issues from preventing routing updates?

A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.

B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.

C. Configure many sub-interfaces on the same subnet.

D. Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces. Answer: A

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

11. A Cisco router that was providing Frame Relay connectivity at a remote site was replaced with a different

vendor's frame relay router. Connectivity is now down between the central and remote site. What is the most likely cause of the problem? A. mismatched LMI types B. incorrect DLCI

C. mismatched encapsulation types D. incorrect IP address mapping Answer: C

12. Given the partial outputs displayed in the graphic, which switch device would be the spanning tree root bridge

for a network of only these four devices? A. Tampa B. Miami C. London D. Cairo Answer: D

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

13. The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the

command output of both routers, what is the most likely cause of the problem? A. Authentication needs to be changed to PAP for both routers. B. Serial ip addresses of routers are not on the same subnet. C. Username/password is incorrectly configured. D. Router names are incorrectly configured. Answer: C

14. Which of the following statements describe the network shown in the graphic? (Choose two.)

A. There are two broadcast domains in the network. B. There are four broadcast domains in the network.

C. There are six broadcast domains in the network. D. There are four collision domains in the network. E. There are five collision domains in the network. 中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

F. There are seven collision domains in the network. Answer: AF

15. Which of the following are characteristics of a Frame Relay point-to-point subinterface? (Choose two.) A. requires use of Inverse ARP B. resolves NBMA split horizon issues C. requires the frame-relay map command D. maps one IP subnet per DLCI

E. maps one IP subnet across multiple DLCIs Answer: BD

16. Refer to the graphic. Host A is communicating with the server. What will be the source MAC address of the

frames received by Host A from the server? A. the MAC address of router interface e0 B. the MAC address of router interface e1

C. the MAC address of the server network interface D. the MAC address of host A Answer: A

17. When variable length subnet masking is used, what does the term route aggregation describe?

A. calculating the total number of available host addresses in the AS B. combining routes to multiple networks into one supernet 中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

C. reducing the number of unusable addresses by creating many subnets from one supernet

D. reclaiming unused address space by changing the subnet size Answer: B

18. On three different occasions an administrator configured a router, and after testing the configuration saved it to

NVRAM by issuing the copy running-config startup-config command. After each successful save the

administrator issued the reload command. Each time when the router restarted, the router appeared to have the

default blank configuration. What could cause such results? A. The boot system commands were left out of the configuration. B. The NVRAM is corrupted.

C. The configuration register setting is incorrect.

D. The upgraded IOS just loaded is not compatible with the hardware.

E. The upgraded configuration is not compatible with the hardware platform. Answer: C

19. Based on the network shown in the graphic which option contains both the potential networking problem and

the protocol or setting that should be used to prevent the problem? A. routing loops, hold down timers B. switching loops, split horizon C. routing loops, split horizon D. switching loops, VTP E. routing loops, STP F. switching loops, STP Answer: F

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

20. If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190 Answer: C

21. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? A. static NAT B. dynamic NAT C. overloading D. overlapping E. port loading Answer: C

22. Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.) A. Router(config)# router ospf 0 B. Router(config)# router ospf 1 C. Router(config)# router ospf area 0

D. Router(config-router)# network 192.168.16.0 0.0.0.255 0 E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0 F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0 Answer: BE

23. A network administrator is trying to add a new router into an established OSPF network. The networks

attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in

the partial configuration shown below, what configuration error is causing this problem?

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

A. The process id is configured improperly. B. The OSPF area is configured improperly.

C. The network wildcard mask is configured improperly. D. The network number is configured improperly. E. The AS is configured improperly.

F. The network subnet mask is configured improperly. Answer: C

24. ABC Company is merging with several local businesses that use routers from multiple vendors. Which routing

protocol would work best to connect ABC Company with the enterprise networks it has acquired by providing

scalability and VLSM support while minimizing network overhead? A. RIP v1 B. RIP v2 C. IGRP D. OSPF E. EIGRP Answer: D

25. What does the \A. the summarized address for all of the internal subnetted addresses

B. the MAC address of the router used by inside hosts to connect to the Internet C. a globally unique, private IP address assigned to a host on the inside network D. a registered address that represents an inside host to an outside network Answer: D

26. Which of the following are types of flow control? (Choose three.) A. buffering B. cut-through C. windowing

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801 D. congestion avoidance E. load balancing Answer: ACD

27. Which destination addresses will be used by Host A to send data to Host C? (Choose two.)

A. the IP address of Switch 1 B. the MAC address of Switch 1 C. the IP address of Host C

D. the MAC address of Host C

E. the IP address of the router's E0 interface F. the MAC address of the router's E0 interface Answer: CF

28. In the implementation of VLSM techniques on a network using a single Class C IP address, which subnet

mask is the most efficient for point-to-point serial links? A. 255.255.255.0 B. 255.255.255.240 C. 255.255.255.248 D. 255.255.255.252 E. 255.255.255.254 Answer: D

29. If all OSPF routers in a single area are configured with the same priority value, what value does a router use

for the OSPF router ID in the absence of a loopback interface? 中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

A. the IP address of the first Fast Ethernet interface B. the IP address of the console management interface C. the highest IP address among its active interfaces D. the lowest IP address among its active interfaces

E. the priority value until a loopback interface is configured Answer: C

30. To configure the VLAN trunking protocol to communicate VLAN information between two switches, what

two requirements must be met? (Choose two.)

A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.

B. The VTP management domain name of both switches must be set the same. C. All ports on both the switches must be set as access ports. D. One of the two switches must be configured as a VTP server. E. A rollover cable is required to connect the two switches together. F. A router must be used to forward VTP traffic between VLANs. Answer: BD

31. A static route to the 10.5.6.0/24 network is to be configured on the HFD router. The administrator wants HFD

to see this static route as the most reliable route . Which command should the administrator use?

A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0 B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6 C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0 D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6 E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0 中国思科华为3COM网络技术站http://www.CiscoH3com.com

TestInside 640-801

F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0 Answer: C

32. A default Frame Relay WAN is classified as what type of physical network? A. point-to-point

B. broadcast multi-access C. nonbroadcast multi-access D. nonbroadcast multipoint E. broadcast point-to-multipoint Answer: C

33. Which of the following commands will configure a default route to any destination network not found in the routing table?

A. Router(config)# ip default-route 0.0.0.0 255.255.255.255 s0 B. Router(config)# ip route 0.0.0.0 255.255.255.255 s0 C. Router(config)# ip default-route 0.0.0.0 s0 D. Router(config)# ip route 0.0.0.0 0.0.0.0 s0 E. Router(config)# ip route any any e0 Answer: D

34. When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?

A. By default, all defined VLANs are allowed on the trunk.

B. Each single VLAN, or VLAN range, must be specified with the switchport mode command.

C. Each single VLAN, or VLAN range, must be specified with the vtp domain command.

D. Each single VLAN, or VLAN range, must be specified with the vlan database command. Answer: A

35. Network users are complaining that they cannot access resources on the LAN attached to interface e0 of the

Production router. Which of the following commands will display current IP addressing and the Layer 1 and Layer 2 status of this interface? (Choose three.) A. Production# show version

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

B. Production# show protocols C. Production# show interfaces D. Production# show controllers E. Production# show ip interface F. Production# show startup-config Answer: BCE

36. A network administrator needs to configure a router for a Frame Relay

connection to a non-Cisco router.

Which of the following commands will prepare the WAN interface for this connection?

A. Router(config-if)# encapsulation frame-relay q933a B. Router(config-if)# encapsulation frame-relay ansi C. Router(config-if)# encapsulation frame-relay ietf D. Router(config-if)# encapsulation frame-relay isl Answer: C

37. Refer to the output of the corporate router routing table shown in the graphic. The corporate router receives an

IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. What will the router do with this packet?

A. It will encapsulate the packet as Frame Relay and forward it out interface Serial 0/0.117.

B. It will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0.

C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply message out interface serial 0/0.102.

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0. Answer: B

38. Which of the following protocols uses both TCP and UDP ports? A. FTP B. SMTP C. Telnet D. DNS Answer: D

39. Which statement describes a spanning-tree network that has converged? A. All switch and bridge ports are in the forwarding state.

B. All switch and bridge ports are assigned as either root or designated ports. C. All switch and bridge ports are in either the forwarding or blocking state. D. All switch and bridge ports are either blocking or looping. Answer: C

40. Refer to the graphic. How many collision domains are shown? A. one B. two C. three D. four E. six F. fourteen Answer: B

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

41. What is the default administrative distance of the OSPF routing protocol? A. 90 B. 100 C. 110 D. 120 E. 130 F. 170 Answer: C

42. Which routing protocols can be used within the enterprise network shown in the diagram? (Choose three.) A. RIP v1 B. RIP v2 C. IGRP D. OSPF E. BGP F. EIGRP Answer: BDF

43. Which statements are true about EIGRP successor routes? (Choose two.) A. A successor route is used by EIGRP to forward traffic to a destination.

B. Successor routes are saved in the topology table to be used if the primary route fails.

C. Successor routes are flagged as \D. A successor route may be backed up by a feasible successor route.

E. Successor routes are stored in the neighbor table following the discovery process.

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801 Answer: AD

44. The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an

extended access list to permit or deny access to an entire subnetwork? A. 255.255.255.224 B. 255.255.255.248 C. 0.0.0.224 D. 0.0.0.8 E. 0.0.0.7 F. 0.0.0.3 Answer: E

45. An internetwork has been configured as shown in the diagram, with both routers using EIGRP routing for AS

44. Users on the Branch router are unable to reach any of the subnets on the HQ router. Which of the following

commands is necessary to fix this problem? A. Branch(config-router)# version 2

B. Branch(config-router)# no auto-summary C. Branch(config-router)# redistribute eigrp 44

D. Branch(config-router)# eigrp log-neighbor-changes E. Branch(config-router)# default-information originate Answer: B

46. After the router interfaces shown in the diagram have been configured, it is discovered that hosts in the Branch

LAN cannot access the Internet. Further testing reveals additional connectivity issues. What will fix this problem?

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

A. Change the address of the Branch router LAN interface. B. Change the address of the Branch router WAN interface. C. Change the subnet mask of the HQ router LAN interface. D. Change the address of the HQ router LAN interface.

E. Change the address of the HQ router interface to the Internet. F. Change the subnet mask of the HQ router interface to the Internet. Answer: B

47. This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router

Remote27. Which of the following command sequences will correct this problem? A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco B. Remote27(config)# line console 0 Remote27(config-line)# login

Remote27(config-line)# password cisco C. ACCESS1(config)# line vty 0 4

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

ACCESS1(config-line)# login

ACCESS1(config-line)# password cisco D. Remote27(config)# line vty 0 4 Remote27(config-line)# login

Remote27(config-line)# password cisco E. ACCESS1(config)# enable password cisco F. Remote27(config)# enable password cisco Answer: C

48. Refer to the diagram. Which three statements describe the router port configuration and the switch port

configuration as shown in the topology? (Choose three.) A. The Router1 WAN port is configured as a trunking port.

B. The Router1 port connected to Switch1 is configured using subinterfaces.

C. The Router1 port connected to Switch1 is configured as 10 Mbps. D. The Switch1 port connected to Router1 is configured as a trunking port. E. The Switch1 port connected to Host B is configured as an access port. F. The Switch1 port connected to Hub1 is configured as full duplex. Answer: BDE

49. What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A. Administratively shut down the interface. B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process. 中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command. Answer: DE

50. Which IP addressing scheme would be correct for the topology shown in the graphic?

A. Host 1 - 192.168.10.22/24; Host 2 - 192.168.10.23/24; Host 3 - 192.168.10.24/24

B. Host 1 - 192.168.10.22/24; Host 2 - 192.168.11.23/24; Host 3 - 192.168.10.23/24

C. Host 1 - 192.168.10.22/24; Host 2 - 192.168.10.23/24; Host 3 - 192.168.11.23/24

D. Host 1 - 192.168.11.22/24; Host 2 - 192.168.11.23/24; Host 3 - 192.168.10.24/24 Answer: B

51. The network administrator wants to upgrade the IOS of a router. The new image requires 64 MB of RAM and

16 MB for storage of the file. Given the output shown in the graphic, which of the following is true?

A. This router meets the requirements for the new image.

B. This router will require a DRAM upgrade to meet the requirements for the new image.

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

C. This router will require a flash upgrade to meet the requirements for the new image.

D. This router will require an NVRAM upgrade to meet the requirements for the new image. Answer: B

52. How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the

switches? A. one B. two C. six D. twelve Answer: A

53. An access list was written with the four statements shown in the graphic. Which single access list statement

will combine all four of these statements into a single statement that will have exactly the same effect?

A. access-list 10 permit 172.29.16.0 0.0.0.255 B. access-list 10 permit 172.29.16.0 0.0.1.255 C. access-list 10 permit 172.29.16.0 0.0.3.255 D. access-list 10 permit 172.29.16.0 0.0.15.255 E. access-list 10 permit 172.29.0.0 0.0.255.255 Answer: C

54. The access list shown in the graphic should deny all hosts located on network 172.16.1.0, except host

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

172.16.1.5, from accessing the 172.16.4.0 network. All other networks should be accessible. Which command

sequence will correctly apply this access list? A. routerA(config)# interface fa0/0 routerA(config-if)# ip access-group 10 in B. routerA(config)# interface s0/0

routerA(config-if)# ip access-group 10 out C. routerB(config)# interface fa0/1

routerB(config-if)# ip access-group 10 out D. routerB(config)# interface fa0/0 routerB(config-if)# ip access-group 10 out E. routerB(config)# interface s0/1

routerB(config-if)# ip access-group 10 out Answer: D

55. Which command will set the default gateway to 192.168.12.1 on a Cisco switch? A. Switch(config)# ip default-network 192.168.12.1 B. Switch(config)# ip route-default 192.168.12.1 C. Switch(config)# ip default-gateway 192.168.12.1 D. Switch(config)# ip route 192.168.12.1 0.0.0.0 Answer: C

56. The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possible causes for this interface status? (Choose three.)

中国思科华为3COM网络技术站http://www.CiscoH3com.com

TestInside 640-801

A. The interface is shut down.

B. No keepalive messages are received. C. The clockrate is not set. D. No loopback address is set.

E. No cable is attached to the interface.

F. There is a mismatch in the encapsulation type. Answer: BCF

57. Assuming all hosts and servers are in the same VLAN, which statement is correct about the internetwork shown in the diagram? A. Switch2 is the root bridge.

B. Spanning Tree Protocol is not running. C. Host D and Server 1 are in the same network.

D. No collisions can occur in traffic between Host B and Host C. E. If Fa0/0 is down on Router1, Host A cannot access Server 1. F. If Fa0/1 is down on Switch3, Host C cannot access Server 2. Answer: C

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

58. Which statement is correct about the internetwork shown in the diagram? A. Switch 2 is the root bridge. B. Spanning Tree is not running.

C. Host D and Server 1 are in the same network.

D. No collisions can occur in traffic between Host B and Host C. E. If Fa0/0 is down on Router 1, Host A cannot access Server 1. F. If Fa0/1 is down on Switch 3, Host C cannot access Server 2. Answer: E

59. The EIGRP configuration in the Glencoe router uses a single network statement. From the output shown in the

graphic, which network statement would advertise these networks in EIGRP? A. network 172.26.168.128 0.0.0.127 B. network 172.26.168.128 area 478 C. network 172.26.0.0

D. network 172.26.168.0 area 478 Answer: C

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

60. A network administrator is configuring the routers in the graphic for OSPF. The OSPF process has been started

and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several

options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0

/24 LAN segment. What configuration tasks could be used to establish this preference? (Choose three.)

A. Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.

B. Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.

C. Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.

D. Change the priority value of the Fa0/0 interface of RouterB to zero.

E. Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.

F. No further configuration is necessary. Answer: ACE

61. Which of the following describe private IP addresses? (Choose two.) A. addresses chosen by a company to communicate with the Internet B. addresses that cannot be routed through the public Internet C. addresses that can be routed through the public Internet D. a scheme to conserve public addresses

E. addresses licensed to enterprises or ISPs by an Internet registry organization Answer: BD

62. Refer to the topology and partial switch command output shown in the graphic. The internetwork shown in the

diagram is experiencing connectivity problems. Host A is unable to ping Host B. What needs to be done to enable

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

these hosts to ping each another?

A. The gateway on Host A needs to be changed. B. The IP address on Host B needs to be reconfigured. C. VLAN 2 must be named.

D. The Fa0/1 interface on the ET-1 switch must be configured as a trunk port. E. Switch port Fa0/1 must be moved to a different VLAN. Answer: D

63. Refer to the graphic. A company wants to use NAT in the network shown. Which commands will apply the

NAT configuration to the proper interfaces? (Choose two.) A. R1(config)# interface serial0/1 R1(config-if)# ipnat inside

B. R1(config)# interface serial0/1

中国思科华为3COM网络技术站http://www.CiscoH3com.com TestInside 640-801

R1(config-if)# ipnat outside

本文来源:https://www.bwwdw.com/article/lz56.html

Top