10. Which three steps in the design and implementation of a multiarea OSPF network are considered planning steps? (Choose a letter)
2, 4 & 5Correct
7. Which two networks are part of the summary route 192.168.32.0/22? (Choose a letter)
2 & 3Correct
8. In OSPF discussions what is used to facilitate hierarchical routing in OSPF?
the use of multiple areasCorrect
A CCIE network administrator is verifying a multi-area OSPF configuration by checking the routing table on a router in area 1. The administrator notices a route to a network that is connected to a router in area 2. Which code appears in front of this route in the routing table within area 1?
O IACorrect
A CCNA network administrator configures a router with the command sequence:
The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.Correct
A CCNA network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence?
The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.Correct
A certified network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem?
The network wildcard mask is configured improperly.Correct
A certified network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? Router(config)# router ospf 1 Router(config-router)# network 10.0.0.0 255.0.0.0 area 0
The network wildcard mask is configured improperlyCorrect
A certified network administrator of Gilas Medical Hospital has just changed the router ID on a router that is working in an OSPFv2 environment. What should the administrator do to reset the adjacencies and use the new router ID
Issue the clear ip ospf process privileged mode command.Correct
A certified network administrator of RMS Company has just changed the router ID on a router that is working in an OSPFv2 environment. What should the administrator do to reset the adjacencies and use the new router ID?
Issue the clear ip ospf process privileged mode command.Correct
A certified network engineer of a new startup company is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW2(config-if-range)# channel-group 1 mode passive. Which command must be used on SW1 to enable this EtherChannel?
A certified network expert is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement?
GLBPCorrect
A certified wireless professional wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this?
Deploy a Wi-Fi Repeater.Correct
A company has deployed four 48-port access layer switches to a switch block. For redundancy each access layer switch will connect to two distribution layer
176Correct
A connection to a switch went down suddenly, how long can it take for a network using RSTP to converge again after a topology change?
6secCorrect
A good example of our learning in chapter 9 is what code in the Cisco IOS 15 image filename C1900- UNIVERSALK9-MZ.SPA.153-3.M.BIN Indicates that the file is digitally signed by Cisco?
SPACorrect
A network administrator discovers a visitor is trying to flood an AP with deauthentication frames. After some interrogation the security department finds out he is from a competitor company. The attack the visitor used is called jamming.
TRUECorrect
A network administrator enters the following command sequence on a Cisco 3560 switch. What is the purpose of these commands?
to make the Gi0/1 port a routed portCorrect
A network administrator is implementing OSPF in a portion of the network and must ensure that only specific routes are advertised via OSPF. Which network statement would configure the OSPF process for networks 192.168.4.0, 192.168.5.0, 192.168.6.0, and 192.168.7.0, now located in the backbone area, and inject them into the OSPF domain?
cCorrect
A network administrator of an international herbal company is verifying a multi-area OSPF configuration by checking the routing table on a router in area 1. The administrator notices a route to a network that is connected to a router in area 2. Which code appears in front of this route in the routing table within area 1?
O IACorrect
A network administrator of RMS defence contractor company is configuring an EtherChannel link between switches SW1 and SW2 each switch is located in a different building but just adjacent to each other by using the command SW1(config-if-range)# channel-group 1 mode passive. Which command must be used on SW2 to enable this EtherChannel?
A network engineer in ABC Enterprise is asked to stop auto route summary in EIGRP, which command you will use to prevent auto summary?
cCorrect
A network expert discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. What type of attack is this?
Man in the middleCorrect
A network link connected to a switch went down. How long can it take for a network using spanning tree topology to converge again after a topology change?
up to 50 secondsCorrect
A network problem occurs suddenly, what is the initial approach that should be used to troubleshoot a broadcast storm in a switched network?
Manually remove redundant links in the switched network.Correct
A network specialist of Avengers Corporation is troubleshooting an OSPFv2 network and discovers that two routers connected by a point-to-point WAN serial link are not establishing an adjacency. The OSPF routing process, network commands and area ID are all confirmed as correct, and the interfaces are not passive. Testing shows that the cabling is correct, that the link is up, and pings between the interfaces are successful. What is most likely the problem?
The subnet masks on the two connected serial interfaces do not match.Correct
A network specialist of PRS Industries is troubleshooting an OSPFv2 network and discovers that two routers connected by a point-to-point WAN serial link are not establishing an adjacency. The OSPF routing process, network commands and area ID are all confirmed as correct, and the interfaces are not passive. Testing shows that the cabling is correct, that the link is up, and pings between the interfaces are successful. What is most likely the problem?
The subnet masks on the two connected serial interfaces do not match.Correct
A new network specialist has been asked to verify the metrics that are used by EIGRP on a Cisco device. Which two EIGRP metrics are measured by using static values on a Cisco device?
Bandwidth & delayCorrect
A newly hired certified network engineer of RMS Industries is troubleshooting a switch and wants to verify if it is a root bridge. Which of the following listed below is the right command to display the correct information?
. show spanning-treeCorrect
A newly hired network engineer has been instructed to implement EtherChannel in a corporate network. What does this configuration consist of?
grouping multiple physical ports to increase bandwidth between two switchesCorrect
A remote class room can successfully access video-intensive streaming lectures via wired computers. However, when an 802.11n wireless access point is installed and used with 25 wireless laptops to access the same lectures, poor audio and video quality is experienced. Which wireless solution would improve the performance for the laptops?
Add another access point.Correct
A router that has at least one interface that is attached to a non-OSPF network is called ASBR.
TRUECorrect
A router with its interfaces attached to multiple areas is called ABR
TRUECorrect
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?
management frameCorrect
Access Layer is a design model layer that provides connectivity for the users.
TRUECorrect
Among the 802.11 standards what is the frequency assigned for 802.11g?
2.4GhzCorrect
Among the 802.11 standards what is the maximum speed of 802.11a?
54Mb/sCorrect
Among the 802.11 standards what is the maximum speed of 802.11g?
54Mb/sCorrect
Among the 802.11 wireless LAN standards what is the frequency assigned for 802.11a?
5GhzCorrect
Among the 802.11 wireless lan standards what is the frequency assigned for 802.11ac?
5GhzCorrect
Among the choices below which command would you use, If you want to disable STP on a port connected to a server?
spanning-tree portfastCorrect
Among the choices below, which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from first-hop failures in network edge devices or access circuits?
HSRPCorrect
Among the choices listed below, which port state will switch ports ?immediately transition to when configured for PortFast
ForwardingCorrect
Among the features of EIGRP which uses multicast and unicast rather than broadcast?
Less OverheadCorrect
Among the listed below what organization that set or influence WLAN standards?
IEEECorrect
Among the listed below which is a feature of EIGRP?
Load balancingCorrect
Among the listed below, in deploying wireless lan what advantage do a WLAN router offers vs. access point?_____+
Connect multiple networksCorrect
Among the listed below, what advantage do a WLAN router offers vs. access point?
Increase in securityCorrect
Among the listed below, which command can be issued on a router to verify that automatic summarization is enabled?
Show ip protocolsCorrect
Among the listed below, which serves as a receipt and is used to obtain a license. It is an 11- digit alphanumeric key created by Cisco manufacturing and it also defines the Feature Set associated with it?
Product Activation Key (PAK)Correct
An airline company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?
Split the traffic between the 2.4 GHz and 5 GHz frequency bandsCorrect
An ASBR generates type 5 LSAs for each of its external routes and floods them into the area that it is connected to.
TRUECorrect
As discussed in chapter 1, the duplication of devices, services, or connections so that, in the event of a failure, the redundant devices, services , or connections can perform the work of those that failed.
RedundancyCorrect
As discussed in Chapter 2 of Scaling Networks , which non-proprietary protocol provides router redundancy for a group of routers which support IPv4 LANs?
VRRPv2Correct
As discussed in Chapter 2, what do you called a design methodology for building networks in three layers including access, distribution, and core.
hierarchical networkCorrect
As discussed in chapter 7 as one of the EIGRP concepts what is the purpose of using protocol-dependent modules in EIGRP?
to accommodate routing of different network layer protocolsCorrect
As discussed in chapter 7, when an EIGRP-enabled router uses a password to accept routes from other EIGRP-enabled routers, which mechanism is used?
EIGRP authenticationCorrect
As discussed in chapter 9 of Scaling Networks what is the major release number in the IOS image name c1900-universalk9-mz.SPA.152-3.T.bin?
15Correct
As discussed in link aggregation what are two requirements to be able to configure an EtherChannel between two switches?
All the interfaces need to work at the same speed & need to be working in the same duplex mode.Correct
As discussed in link state advertisement which two statements correctly describe OSPF type 3 LSAs? 1. Type 3 LSAs are used to update routes between OSPF areas. 2. Type 3 LSAs are known as router link entries . 3. Type 3 LSAs are used for routes to networks outside the OSPF autonomous system . 4. Type 3 LSAs are known as autonomous system external LSA entries. 5. Type 3 LSAs are generated without requiring a full SPF calculation.
1 & 5Correct
As discussed in our topic Scaling Networks chapter 6,which area is referred to as the "backbone area"?
Area 0Correct
As discussed in Scaling Network course when OSPFv2 neighbors are establishing adjacencies, in which state do they elect a DR and BDR router?
Two-Way stateCorrect
As discussed in this chapter multiarea OSPF what OSPF LSA type is used to inform routers of the router ID of the DR in each multiaccess network in an OSPF area?
type 2Correct
As discussed in this chapter which statement is true regarding OSPF multi-area adjacencies?
One logical interface will be a primary link, and the other configured as a secondary link; the secondary link will be established as an unnumbered point-to-point interface.Correct
As discussed in this chapter, beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?
IPBaseCorrect
As discussed in wireless LAN technologies and standards, what wireless LAN technology that is an IEEE 802.16 WWAN standard that provides wireless broadband access of up to 30mi (50km)?
WIMAXCorrect
As shown from the network diagram above, the command “show ipv6 route can be issued on router R2 to verify the propagation of static default router from R1 to R2" Why is MD5 authentication is more secure than simple authentication of OSPF updates?
MD5 does not send the password to the neighbor router.Correct
As shown in the exhibit below, which protocol information is being displayed in the output?
GLBPCorrect
ASBRs are capable of summarizing which type of routes?
ExternalCorrect
At the start with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?
IPBaseCorrect
Based on the discussion in this chapter, which command syntax will initiate EtherChannel interface configuration mode?
Core Layer is a design model layer that forwards traffic from/to different local networks
FALSECorrect
Discussed in chapter 9, what code in the Cisco IOS 15 image filename C1900-UNIVERSALK9-MZ.SPA.153-3.M.BIN Indicates that the file is digitally signed by Cisco?
SPACorrect
Divides the network into functional components while still maintaining the core, distribution, and access layers of the three-layer model as discussed in chapter 2 LAN Redundancy?
Cisco Enterprise ArchitectureCorrect
During checking of routing table, a network engineer notices the following entry: O*E2 0.0.0.0/0 [110/1] via 192.168.16.3, 00:20:22, Serial0/0/0 What information can be gathered from this output?