Basic Questions: Answer
Basic Questions: Answer
Basic Questions: Answer
Question 1
Which network topology allows all traffic to flow through a central hub?
A. bus
B. star
C. mesh
D. ring
Answer: B
Explanation
Star topology is the most popular topology for the network which allows all traffic to flow through a
central device.
Question 2
Answer: B D
Explanation
Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method
used most notably in early Ethernet (IEEE 802.3) technology for local area networking. When collision
detection (CD) observes a collision (excess current above what it is generating, i.e. > 24 mA for
coaxial Ethernet), it stops transmission immediately and instead transmits a 32-bit jam sequence.
Note: CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier
transmission used in wireless networks. Unlike CSMA/CD (Carrier Sense Multiple Access/Collision
Detect) which deals with transmissions after a collision has occurred, CSMA/CA acts to prevent
collisions before they happen.
Question 3
If a router has 3 hosts connected in one port and two other hosts connected in another port, how may
broadcast domains are present on the router?
A. 5
B. 2
C. 3
D. 4
Answer: B
Explanation
Each port of a router is a broadcast domain. This router has 2 ports so it has 2 broadcast domains.
Question 4
Answer: C
Question 5
Answer: D
Explanation
Ethernet frame size refers to the whole Ethernet frame, including the header and the trailer while MTU
size refers only to Ethernet payload. Baby giant frames refer to Ethernet frame size up to 1600 bytes,
and jumbo frame refers to Ethernet frame size up to 9216 bytes (according to this
link: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/29805-
175.html)
For example, standard Ethernet frame MTU is 1500 bytes. This does not include the Ethernet header
and Cyclic Redundancy Check (CRC) trailer, which is 18 bytes in length, to make the total Ethernet
frame size of 1518.
So according to strict definition, MTU size of 1600 cannot be classified as baby giant frames as the
whole Ethernet frames will surely larger than 1600 -> Answer C is not correct.
Answer D is a better choice as the MTU is 1518, so the whole Ethernet frame would be 1536 (1518 +
18 Ethernet header and CRC trailer). This satisfies the requirement of baby giant frames “Baby giant
frames refer to Ethernet frame size up to 1600 bytes”.
Question 6
Answer: A C D
Explanation
To understand more about TCP please read our TCP and UDP tutorial.
Note: Answer F is not correct because TCP does not require applications to determine the
retranmission. TCP itself will determine if the data packets should be retransmitted or not.
Question 7
Which of the following statements describe the network shown in the graphic? (Choose two)
Answer: A F
Explanation
Only router can break up broadcast domains so in the exhibit there are 2 broadcast domains: from e0
interface to the left is a broadcast domain and from e1 interface to the right is another broadcast
domain -> A is correct.
Both router and switch can break up collision domains so there is only 1 collision domain on the left of
the router (because hub doesn’t break up collision domain) and there are 6 collision domains on the
right of the router (1 collision domain from e1 interface to the switch + 5 collision domains for 5 PCs
in Production) -> F is correct.
Question 8
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair
network. From this statement, what is known about the network interface port?
A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.
Answer: C
Explanation
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD.
CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).
Question 9
If there are 3 hosts connected in one port of a switch and two other hosts connected in another port,
how many collision domains are present on the router?
A. 5
B. 2
C. 3
D. 4
Answer: B
Explanation
Each port of a switch is a separate collision domain. This switch uses two ports (for 5 hosts) so there
are two collision domains in total.
Question 10
Answer: A C D
Explanation
At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to
determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors
in the transmitted frames. Before sending data, the sending host generates a CRC based on the
header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to
generate its own CRC and compare them. If they do not match then a CRC error will occur.
Preamble is used to indicate the start of the frame by arranging the first 62 bits as alternating “1/0s”
and the last two bits as “1”s. Like so, 010101010101010………………………10101011. Therefore when the
receiving end sees the “11” it knows where the actual Ethernet header starts. The alternating 1s and
0s will also allow the two endpoints to sync their internal clocks. In summary, preamble is used for
synchronization.
The “Type/Length” field is used to indicate the “Type”of the payload (Layer 3 protocol) which is
indicated as a Hexadecimal value.
Note: Ethernet II uses “Type” while the old Ethernet version use “Length”
Question 11
What interconnection cable can you use when you use a MDI connection?
A. cut-through
B. straight-through
C. crossover
D. rollover
Answer: C
Explanation
MDI stands for “Medium Dependent Interface”. MDI is a type of Ethernet port found on network
devices. When connecting two devices with MDI ports (two hosts, for example) an Ethernet crossover
cable is required. The crossover cable switches the send and receive ports on the two connectors,
allowing data to flow correctly between two MDI ports.
Question 12
For what two purposes does the Ethernet protocol use physical addresses? (Choose two)
A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown
Answer: A E
Explanation
Physical addresses or MAC addresses are used to identify devices at layer 2 -> A is correct.
MAC addresses are only used to communicate on the same network. To communicate on different
network we have to use Layer 3 addresses (IP addresses) -> B is not correct; E is correct.
Layer 2 frame and Layer 3 packet can be recognized via headers. Layer 3 packet also contains
physical address -> C is not correct.
On Ethernet, each frame has the same priority to transmit by default -> D is not correct.
All devices need a physical address to identify itself. If not, they can not communicate -> F is not
correct.
Question 13
In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the server grants access
E. when the medium is idle
Answer: C E
Question 14
How many broadcast domains are shown in the graphic assuming only the default VLAN is configured
on the switches?
A. one
B. six
C. twelve
D. two
Answer: A
Explanation
Only router can break up broadcast domains but in this exhibit no router is used so there is only 1
broadcast domain.
For your information, there are 7 collision domains in this exhibit (6 collision domains between hubs &
switches + 1 collision between the two switches).
Question 15
Which type of cable must you use to connect two device with MDI interfaces?
A. rolled
B. crossover
C. crossed
D. straight through
Answer: B
Explanation
Use an Ethernet straight-through cable to connect an medium dependent interface (MDI) to an MDI-X
port. Use a cross-over cable to connect an MDI to an MDI port, or an MDI-X to an MDI-X port.
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/hw/maintenance/5505guide/ASA550
5HIG/pinouts.html
Note: MDI/MDIX is a type of Ethernet port connection using twisted pair cabling.
Question 16
Which statement about upgrading a Cisco IOS device with TFTP server?
A. the operation is performed in active mode
B. the operation is performed in unencrypted format
C. the operation is performed in passive mode
D. the Cisco IOS device must be on the same LAN as the TFTP server
Answer: B
Explanation
Step 5: Verify that the TFTP Server has IP Connectivity to the Router
The TFTP server must have a network connection to the router and must be able to ping the IP
address of the router targeted for a TFTP software upgrade. In order to achieve this connection, the
router interface and the TFTP server must have an IP address in the same range or a default
gateway configured -> The TFTP server does not need to be on the same LAN with the Cisco device.
Answer B is a reasonable choice although the word “unencrypted format” is unclear. Maybe this
answer means “the operation is performed over an unencrypted protocol”.
Question 17
Answer: A E
Explanation
At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to
determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors
in the transmitted frames. Before sending data, the sending host generates a CRC based on the
header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to
generate its own CRC and compare them. If they do not match then a CRC error will occur.
The “Type/Length” field is used to indicate the “Type”of the payload (Layer 3 protocol) which is
indicated as a Hexadecimal value.
Note: Ethernet II uses “Type” while the old Ethernet version use “Length”
OSI TCP/IP Model Questions
Question 1
Which statements correctly describe steps in the OSI data encapsulation process?
A. The transport layer divides a data stream into segments and may add reliability and flow control
information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Answer: A D
Explanation
The transport layer segments data into smaller pieces for transport. Each segment is assigned a
sequence number, so that the receiving device can reassemble the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the
requirements to retransmit. For example, in TCP, basic flow control is implemented by
acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment
before sending the next part.
-> A is correct.
The data link layer adds physical source and destination addresses and an Frame Check Sequence
(FCS) to the packet (on Layer 3), not segment (on Layer 4) -> B is not correct.
Packets are created when network layer encapsulates a segment (not frame) with source and
destination host addresses and protocol-related control information. Notice that the network layer
encapsulates messages received from higher layers by placing them into datagrams (also called
packets) with a network layer header -> C is not correct.
The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical
addressing of devices. Second, the network layer determines the best path to a particular destination
network, and routes the data appropriately.
-> D is correct.
The Physical layer (not presentation layer) translates bits into voltages for transmission across the
physical link -> E is not correct.
Question 2
What layer of the OSI Model is included in TCP/IP Model’s INTERNET layer?
A. Application
B. Session
C. Data Link
D. Presentation
E. Network
Answer: E
Explanation
The Internet Layer in TCP/IP Model is equivalent to the Network Layer of the OSI Model.
Question 3
Where does routing occur within the DoD TCP/IP reference model?
A. application
B. internet
C. network
D. transport
Answer: B
Explanation
The picture below shows the comparison between TCP/IP model & OSI model. Notice that the Internet
Layer of TCP/IP is equivalent to the Network Layer which is responsible for routing decision.
Question 4
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
A. The transport layer divides a data stream into segments and may add reliability and flow control
information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Answer: A D
Explanation
The Transport Layer segments data into smaller pieces for transport. Each segment is assigned a
sequence number, so that the receiving device can reassemble the data on arrival.
The Transport Layer also uses flow control to maximize the transfer rate while minimizing the
requirements to retransmit. For example, in TCP, basic flow control is implemented by
acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment
before sending the next part.
-> A is correct.
The Data Link Layer adds physical source and destination addresses and an Frame Check Sequence
(FCS) to the packet (on Layer 3), not segment (on Layer 4) -> B is not correct.
Packets are created when network layer encapsulates a segment (not frame) with source and
destination host addresses and protocol-related control information. Notice that the network layer
encapsulates messages received from higher layers by placing them into datagrams (also called
packets) with a network layer header -> C is not correct.
The Network Layer (Layer 3) has two key responsibilities. First, this layer controls the logical
addressing of devices. Second, the network layer determines the best path to a particular destination
network, and routes the data appropriately.
-> D is correct.
The Physical Layer (not Presentation Layer) translates bits into voltages for transmission across the
physical link -> E is not correct.
Question 5
Which layer in the OSI reference model is responsible for determining the availability of the receiving
program and checking to see if enough resources exist for that communication?
A. transport
B. network
C. presentation
D. session
E. application
Answer: E
Question 6
Which networking technology is currently recognized as the standard for computer networking?
A. System network architecture
B. Transmission control protocol/Internet protocol
C. Open system Interconnect
D. Open network architecture
Answer: B
Question 7
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer?
(Choose three)
A. Session
B. Transport
C. Presentation
D. Application
E. Data-link
F. Network
Answer: A C D
Explanation
The Internet Layer in TCP/IP Model is equivalent to the Network Layer of the OSI Model.
The first three layers of the OSI Model (Application, presentation and Session Layers) are merged into
the Application Layer in the TCP/IP Model.
Question 1
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?
A. It reduces the need for a backup data center.
B. It can redirect user requests to locations that are using fewer network resources.
C. It enables the ISP to maintain DNS records automatically.
D. It eliminates the need for a GSS.
Answer: B
Question 2
What are the three major components of Cisco network virtualization? (Choose three)
A. network access control
B. path isolation
C. virtual network services
D. policy enforcement
Answer: A B C
Explanation
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-
switches/white_paper_c11-531522.pdf
Question 3
Answer: D E F
Question 4
Which major component of the network virtualization architecture isolate users according to policy?
A. policy enforcement
B. network access control
C. network services virtualization
D. other
Answer: B
Explanation
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-
switches/white_paper_c11-531522.pdf
WAN Questions
Question 1
Which command can you enter to determine whether serial interface 0/2/0 has been configured using
HDLC encapsulation?
A. router#show platform
B. router#show ip interface s0/2/0
C. router#show interfaces Serial 0/2/0
D. router#show ip interface brief
Answer: C
Explanation
An example of the output of the “show interface serial …” command is shown below. We can see the
line “Encapsulation HDLC”.
Question 2
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has
built-in security mechanisms?
A. X.25
B. HDLC
C. PPP
D. Frame Relay
Answer: C
Explanation
PPP supports both synchronous (like analog phone lines) and asynchronous circuits (such as ISDN or
digital links). With synchronous circuits we need to use clock rate.
Note: Serial links can be synchronous or asynchronous. Asynchronous connections used to be only
available on low-speed (<2MB) serial interfaces, but now, there are the new HWICs (High-Speed WAN
Interface Cards) which also support asynchronous mode. To learn more about them please
visit http://www.cisco.com/en/US/prod/collateral/modules/ps5949/ps6182/prod_qas0900aecd802744
24.html.
Question 3
Which statements about using leased lines for your WAN infrastructure are true?
A. Leased lines provide inexpensive WAN access.
B. Leased lines with sufficient bandwidth can avoid latency between endpoints.
C. Leased lines require little installation and maintenance expertise.
D. Leased lines provide highly flexible bandwidth scaling.
E. Multiple leased lines can share a router interface.
F. Leased lines support up to T1 link speeds.
Answer: B C
Explanation
(Reference: Connecting Networks Companion Guide Book published by Cisco Networking Academy –
Page 54)
Question 4
Two routers named Atlanta and Brevard are connected by their serial interfaces as illustrated, but
there is no connectivity between them. The Atlanta router is known to have a correct configuration.
Given the partial configurations, identify the problem on the Brevard router that is causing the lack of
connectivity.
Answer: E
Question 5
Which of the following describes the roles of devices in a WAN? (Choose three)
A. A CSU/DSU terminates a digital local loop
B. A modem terminates a digital local loop
C. A CSU/DSU terminates an analog local loop
D. A modem terminates an analog local loop
E. A router is commonly considered a DTE device
F. A router is commonly considered a DCE device
Answers: A D E
Explanation
The idea behind a WAN is to be able to connect two DTE networks together through a DCE network.
The network’s DCE device (includes CSU/DSU) provides clocking to the DTE-connected interface (the
router’s serial interface).
A modem modulates outgoing digital signals from a computer or other digital device to analog signals
for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and
converts it to a digital signal for the digital device. A CSU/DSU is used between two digital lines -> A &
D are correct but B & C are not correct.
For more explanation of answer D, in telephony the local loop (also referred to as a subscriber line) is
the physical link or circuit that connects from the demarcation point of the customer premises to the
edge of the carrier or telecommunications service provider’s network. Therefore a modem terminates
an analog local loop is correct.
Question 6
Which two pieces of information are provided by the “show controllers serial 0” command? (Choose
two)
A. the type of cable that is connected to the interface.
B. The uptime of the interface
C. the status of the physical layer of the interface
D. the full configuration of the interface
E. the interface’s duplex settings
Answer: A C
Explanation
The “show controllers serial …” command tells us about the type of the cable (in the case V.35 DTE
cable) and the status of the physical layer of the interface. In above output we learn that there is an
cable attached on S0/0 interface. If no cable is found we will see the line “No DTE cable” instead.
Question 7
Answer: B
Explanation
Nowadays all serial links are full-duplex (as serial interfaces have separate Rx & Tx pins) so maybe
this question wants to ask about how to check the speed of the serial link. The “show interface”
command gives us information about this. An example of this command is shown below:
Question 8
Which WAN topology provides a direct connection from each site to all other sites on the network?
A. single-homed
B. full mesh
C. point-to-point
D. hub-and-spoke
Answer: B
Explanation
Full-mesh is a network topology in which there is a direct link between all pairs of nodes. Below is an
example of full-mesh topology.
Question 9
What are three reasons that an organization with multiple branch offices and roaming users might
implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three)
A. reduced cost
B. better throughput
C. broadband incompatibility
D. increased security
E. scalability
F. reduced latency
Answer: A D E
Question 10
Answer: C D E
Question 11
Answer: D
PPP Questions
Question 1
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose
two)
A. CHAP uses a two-way handshake.
B. CHAP uses a three-way handshake.
C. CHAP authentication periodically occurs after link establishment.
D. CHAP authentication passwords are sent in plaintext.
E. CHAP authentication is performed only upon link establishment.
F. CHAP has no protection from playback attacks.
Answer: B C
Question 2
A network administrator needs to configure a serial link between the main office and a remote
location. The router at the remote office is a non-Cisco router. How should the network administrator
configure the serial interface of the main office router to make the connection?
A. Main(config)# interface serial 0/0
Main(config-if)# ip address 172.16.1.1 255.255.255.252
Main(config-if)# no shut
Question 3
The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the
problem?
Answer: B
Explanation
Both routers must use the same password for CHAP to authentication.
Question 4
Answer: D
Explanation
Point-to-point leased line is the most expensive interconnection between two ends as the line is
dedicated to a single user, the user should still pay for all available bandwidth, including those unused.
-> A is not correct.
With the cost of point-to-point leased line, the full-mesh capability is only achieved when your
company has very very strong budget to pay all the bills. To create a full-mesh topology for n sites,
we need n*(n-1)/2 leased line connections. For example if we have 6 sites then we need 6*5/2 = 15
leased line connections -> It is nearly impossible for a normal company to achieve full-mesh topology
-> B is not correct.
Question 5
When you deploy multilink PPP on your network, where must you configure the group IP Address on
each device?
A. In the global config
B. Under serial interface
C. Under the routing protocol
D. Under the multilink interface
Answer: D
Explanation
Suppose R1 has two Serial interfaces which are directly connected to R2. This is how to configure
multilink on R1:
Therefore we must configure IP address under multilink interface, not physical member interfaces.
Question 6
Answer: C D
Explanation
The Multilink PPP feature provides load balancing functionality over multiple WAN links while providing
multivendor interoperability and support for packet fragmentation, proper sequencing, and load
calculation on both inbound and outbound traffic.
Multilink PPP combines multiple physical links into a logical bundle called a Multilink PPP bundle. A
Multilink PPP bundle is a single, virtual interface that connects to the peer system. Having a single
interface (Multilink PPP bundle interface) provides a single point to apply hierarchical queueing,
shaping, and policing to traffic flows. Individual links in a bundle do not perform any hierarchical
queueing. None of the links have any knowledge about the traffic on parallel links.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/wan_mlp/configuration/xe-3s/wan-mlp-
xe-3s-book/wan_cfg_mlppp_conn_xe.html
MLPPP supports two authentication protocols: Password Authentication protocol (PAP) and Challenge-
Handshake Authentication Protocol (CHAP)
Question 7
Answer: A
Question 8
Which command is used to enable CHAP authentication with PAP as the fallback method on a serial
interface?
A. (config-if)# authentication ppp chap fallback ppp
B. (config-if)# authentication ppp chap pap
C. (config-if)# ppp authentication chap pap
D. (config-if)# ppp authentication chap fallback ppp
Answer: C
Explanation
The command “ppp authentication chap pap” command indicates the CHAP authentication is used first.
If it fails or is rejected by other side then uses PAP instead. If you want to use PAP first (then CHAP)
you can use the “ppp authentication pap chap” command.
QoS Questions
Question 1
Answer: C
Explanation
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic
policing propagates bursts. When the traffic rate reaches the configured maximum rate (or
committed information rate), excess traffic is dropped (or remarked). The result is an output
rate that appears as a saw-tooth with crests and troughs. In contrast to policing, traffic shaping
retains excess packets in a queue and then schedules the excess for later transmission over
increments of time. The result of traffic shaping is a smoothed packet output rate.
Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by
the routing device.
Question 2
Question 3
Answer: A
Explanation
The IP datagram header contains an 8-bit field called ToS (Type of Service). The field has been part of
the IP header since the beginning, but it was rarely used until the recent introduction of Differentiated
Services (Diff-Serv).
Note:
+ CoS does not exists in an IP header. It appears in the header of a 802.1Q frame only. CoS is used
for QoS on a trunk link.
+ DSCP uses the first 6 bits of the TOS field.
Question 4
Which feature can you implement to reserve bandwidth for VoIP calls across the call path?
A. round robin
B. CBWFQ
C. PQ
D. RSVP
Answer: D
Explanation
The Resource Reservation Protocol (RSVP) protocol allows applications to reserve bandwidth for their
data flows. It is used by a host, on the behalf of an application data flow, to request a specific amount
of bandwidth from the network. RSVP is also used by the routers to forward bandwidth reservation
requests.
Question 5
Answer: A
Explanation
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic
policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed
information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as
a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets
in a queue and then schedules the excess for later transmission over increments of time. The
result of traffic shaping is a smoothed packet output rate.
Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by
the routing device.
Question 6
Answer: B
Explanation
Layer-3 marking is accomplished using the 8-bit Type of Service (ToS) field, part of the IP
header. A mark in this field will remain unchanged as it travels from hop-to-hop, unless a Layer-3
device is explicitly configured to overwrite this field. There are two marking methods that use the ToS
field:
+ IP Precedence: uses the first three bits of the ToS field.
+ Differentiated Service Code Point (DSCP): uses the first six bits of the ToS field. When using DSCP,
the ToS field is often referred to as the Differentiated Services (DS) field.
Reference: http://www.routeralley.com/guides/qos_classification.pdf
Question 7
Answer: A
Explanation
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic
policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed
information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as
a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets
in a queue and then schedules the excess for later transmission over increments of time. The
result of traffic shaping is a smoothed packet output rate.
Question 8
Which part of the PPPoE server configuration contains the information used to assign an IP address to
a PPPoE client?
A. virtual-template interface
B. DHCP
C. dialer interface
D. AAA authentication
Answer: A
Explanation
There is no Dialer interface on the PPPoE Server so answer “Dialer interface” is not correct. The most
suitable answer is “Virtual Template” interface as it contains the pool which is used to assign IP
address to the PPPoE Client. But this question is weird because according to the CCNAv3 syllabus,
candidates only need to grasp the PPPoE on client-side, not sure why this question asked about PPPoE
on Server side. For more information about PPPoE, please read our PPPoE tutorial.
Question 2
Answer: A
Explanation
PPPoE provides a standard method of employing the authentication methods of the Point-to-Point
Protocol (PPP) over an Ethernet network. When used by ISPs, PPPoE allows authenticated assignment
of IP addresses. In this type of implementation, the PPPoE client and server are interconnected by
Layer 2 bridging protocols running over a DSL or other broadband connection.
Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-
cli/vpn-pppoe.html
Question 3
Answer: B
Explanation
In the Dialer interface, we can use the “ip address negotiated” command to ask for an IP address from
the PPPoE Server.
MPLS Questions
Question 1
Explanation
MPLS operates at a layer that lies between traditional definitions of Layer 2 (data link layer) and Layer
3 (network layer), and thus is often referred to as a “layer 2.5” protocol.
Question 2
Answer: B D
Explanation
MPLS supports IPv4, IPv6, IPX, AppleTalk at the network layer. MPLS supports Ethernet, Token Ring,
FDDI, ATM, FR, PPP at the link layer.
MPLS uses label switching to forward packets over Ethernet. Labels are assigned to packets based on
groupings or forwarding equivalence classes (FECs). The label is added between the Layer 2 and the
Layer 3 header.
DMVPN Questions
Question 1
Answer: C
Explanation
The topology of DMVPN is always hub-and-spoke as all Spokes are required to connect to the Hub
router directly.
Question 2
Which circumstances can cause a GRE tunnel to be in an up/down state? (Choose three)
A. The tunnel interface IP address is misconfigured.
B. The tunnel interface is down.
C. A valid route to the destination address is missing from the routing table.
D. The tunnel address is routed through the tunnel itself.
E. The ISP is blocking the traffic.
F. An ACL is blocking the outbound traffic.
Answer: B C D
Question 3
Which technology supports multiple dynamic secure connections on an unsecured transport network?
A. DMVPN
B. VPN
C. Site-to-site VPN
D. client VPN
Answer: A
CDP & LLDP Questions
Question 1
Which command would you configure globally on a Cisco router that would allow you to view directly
connected Cisco devices?
A. cdp run
B. enable cdp
C. cdp enable
D. run cdp
Answer: A
Explanation
CDP is enabled by default on all Cisco routers. If it is turned off by any reason, we can turn it on again
with the following command on global configuration mode:
Router(config)#cdp run
Note: CDP can be turned on or turned off on each interface. For example to turn off CDP on an
interface we use this command:
Question 2
Answer: B
Explanation
Link Layer Discovery Protocol (LLDP) is a industry standard protocol that allows devices to advertise,
and discover connected devices, and there capabilities (same as CDP of Cisco). To enable it on Cisco
devices, we have to use this command under global configuration mode:
Question 3
Answer: D
Explanation
The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol (Layer 2 protocol)
developed by Cisco. It is used to share information about other directly connected Cisco equipment,
such as the operating system version and IP address. The most popular command with CDP is “show
cdp neighbors” to discover who is the neighbors.
+ Local Interface (Local Intrfce): the interfaces on the device you are using “show cdp neighbors”
command. In this case it is the interface of HOME router
+ Platform: the platform of neighbor device
+ Port ID: the neighbor device’s port or interface on which the CDP packets are multicast
Question 4
Which command you enter on a switch to display the ip address associated with connected devices?
A. show cdp neighbors detail
B. show cdp neighbor
C. show cdp interface
D. show cdp traffic
Answer: A
Explanation
Only the “show cdp neighbor detail” gives us information about the IP address of the connected
device. Below is an example of this command.
Question 5
Which command would you configure globally on a Cisco router that to re-enable CDP if it was
disabled by the administrator?
A. enable cdp
B. cdp enable
C. cdp run
D. run cdp
Answer: C
Question 6
Answer: A
IP Address Questions
Question 1
Which two statements about IPv4 multicast traffic are true? (Choose two)
A. It burdens the source host without affecting remote hosts.
B. It uses a minimum amount of network bandwidth.
C. It is bandwidth-intensive.
D. It simultaneously delivers multiple streams of data.
E. It is the most efficient way to deliver data to multiple receivers.
Answer: B E
Explanation
IP multicast delivers application source traffic to multiple receivers without burdening the source or
the receivers while using a minimum of network bandwidth.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst
_ovr.html
Question 2
Answer: B C
Question 3
What will happen if a private IP address is assigned to a public interface connected to an ISP?
A. A conflict of IP addresses happens, because other public routers can use the same range.
B. Addresses in a private range will not be routed on the Internet backbone.
C. Only the ISP router will have the capability to access the public network.
D. The NAT process will be used to translate this address to a valid IP address.
Answer: B
Question 4
Which destination IP address can a host use to send one message to multiple devices across different
subnets?
A. 172.20.1.0
B. 127.0.0.1
C. 192.168.0.119
D. 239.255.0.1
Answer: D
Explanation
In order to send traffic to multiple devices (not all) across different subnets we need to use multicast
addresses, which are in the range 224.0.0.0 through 239.255.255.255 -> D is correct.
Question 5
Which RFC was created to alleviate the depletion of IPv4 public addresses?
A. RFC 4193
B. RFC 1519
C. RFC 1518
D. RFC 1918
Answer: C
Explanation
The RFC 1518 is Classless Interdomain Routing (CIDR). CIDR is a mechanism developed to help
alleviate the problem of exhaustion of IP addresses and growth of routing tables.
+ With the classful routing system, individual networks were either limited to 254 hosts (/24) or
65,534 hosts (/16). For many network enterprises, 254 hosts were not enough and 65,534 were too
large to be used efficiently.
+ Routing information overload. The size and rate of growth of the routing tables in Internet routers is
beyond the ability of current software (and people) to effectively manage.
+ Eventual exhaustion of IP network numbers.
In contrast to classful routing, which categorizes addresses into one of three blocks, CIDR allows for
blocks of IP addresses to be allocated to Internet service providers. The blocks are then split up and
assigned to the provider’s customers.
According to the CIDR standard, the first part of an IP address is a prefix, which identifies the
network. The prefix is followed by the host identifier so that information packets can be sent to
particular computers within the network. A CIDR address includes the standard 32-bit IP address and
also the network prefix. For example, a CIDR address of 200.1.45.2/26, the “/26” indicates the first
26 bits are used to identify the unique network, leaving the remaining bits to identify the specific
hosts.
Therefore, instead of assigning the whole block of a class B or C address, now smaller blocks of a class
can be assigned. For example, instead of assigning a whole block of 200.1.45.0/24, a smaller block,
like 200.1.45.0/27 or 200.1.45.32/27, can be assigned.
In fact, CIDR is specified in RFCs 1518,1519 and 1520 so answer “RFC 1519” is also acceptable.
Question 6
Answer: C
Explanation
Only three connection types are commonly known and used in Internet Protocol version four (IPv4)
networks: unicast, multicast and broadcast. A fourth connection type, Anycast, was unknown until
IPv6 made it a standard connection type. Anycast is not standardized in IPv4 but can be emulated.
IPv4 Anycast addressing is a good solution to provide localization for services and servers in order to
obtain robustness, redundancy and resiliency.
The basic idea of Anycast is very simple: multiple servers, which share the same IP address, host the
same service. The routing infrastructure sends IP packets to the nearest server (according to the
metric of the routing protocol used). The major benefits of employing Anycast in IPv4 are improved
latency times, server load balancing, and improved security.
Reference: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.6367&rep=rep1&type=pdf
Question 7
Answer: B C
Explanation
Usually using private IPv4 addresses in a organization is free so surely they are less costly than public
IP addresses which you have to buy -> B is correct.
Also we can use private IPv4 addresses to devices that do not need to connect to the Internet because
Internet requires public IPv4 addresses -> C is correct.
Answer D is not correct as we still need to use NAT policies to limit which private IPv4 addresses in
our company can access our resources.
Question 8
Answer: A D
Question 9
Answer: B
Explanation
This is a tricky question if you don’t have a close look on the network. The first octet is 191, not 192
so it belongs to class B, not class C.
Question 10
Which two options are the best reasons to use an IPV4 private IP space? (Choose two)
A. to enable intra-enterprise communication
B. to conserve global address space
C. to manage routing overhead
D. to connect applications
E. to implement NAT
Answer: A B
Switch Questions
Question 1
Which switching method duplicates the first six bytes of a frame before making a switching decision?
A. fragment-free switching
B. cut-through switching
C. store-and-forward switching
D. ASIC switching
Answer: B
Explanation
In cut-through switching, the switch copies into its memory only the destination MAC address (first six
bytes of the frame) of the frame. After processing these first six bytes, the switch had enough
information to make a forwarding decision and move the frame to the appropriate switchport. This
switching method is faster than store-and-forward switching method.
In store-and-forward switching, the switch copies each complete Ethernet frame into the switch
memory and computes a Cyclic Redundancy Check (CRC) for errors. If a CRC error is found, the
Ethernet frame is dropped. If no CRC error is found then that frame is forwarded.
Question 2
Refer to the exhibit. Which of these statements correctly describes the state of the switch once the
boot process has been completed?
A. As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.
B. Remote access management of this switch will not be possible without configuration change.
C. More VLANs will need to be created for this switch.
D. The switch will need a different IOS code in order to support VLANs and STP.
Answer: B
Explanation
From the output we notice that the administrator has just shut down Interface Vlan1, which is the
default VLAN so no one can access it remotely (like telnet) -> B is correct.
Answer A is not correct as STP calculation does not depend on which port comes up first or last. STP
recalculates when there is a change in the network.
This IOS does support VLAN because it has VLAN 1 on it -> D is not correct.
Question 3
The network administrator normally establishes a Telnet session with the switch from host A. The
administrator’s attempt to establish a connect via Telnet to the switch from host B fails, but pings
from host B to other two hosts are successful. What is the issue for this problem?
A. Host B and the switch need to be in the same subnet.
B. The switch needs an appropriate default gateway assigned.
C. The switch interface connected to the router is down.
D. Host B need to be assigned an IP address in vlan 1.
Answer: B
Explanation
Host A (172.19.1.1) and the management IP address of the Switch (172.19.1.250) are in the same
subnet so telnet from host A to the switch can be successful even if a default gateway is not set on
host A.
But host B (172.19.32.2) and the management IP address of the Switch (172.19.1.250) are not in the
same subnet so host B needs a default gateway to telnet to the switch. The default gateway on host B
should be 172.19.32.254.
Question 4
The network administrator cannot connect to Switch1 over a Telnet session, although the hosts
attached to Switch1 can ping the interface Fa0/0 of the router. Given the information in the graphic
and assuming that the router and Switch2 are configured properly, which of the following commands
should be issued on Switch1 to correct this problem?
A. Switch1 (config)# line con0
Switch1 (config-line)# password cisco
Switch1 (config-line)#login
Answer: C
Question 5
Answer: A
Question 6
Answer: A
Explanation
In the configuration above, the “no shutdown” command was missing so interface Vlan 1 is still
inactive. Notice that only the loopback command does not need the “no shutdown” command to work.
Question 7
Answer: A
Explanation
A VLAN does not need to be assigned to any port -> B is not correct.
An access port can only receive traffic from one VLAN -> C is not correct.
If not assigned to a specific VLAN, an access port carries traffic for VLAN 1 by default -> D is not
correct.
An access port will drop packets with 802.1Q tags -> A is correct. Notice that 802.1Q tags are used to
packets moving on trunk links.
Question 8
Which feature allows a device to use a switch port that is configured for half-duplex to access the
network?
A. CSMA/CD
B. IGMP
C. port security
D. split horizon
Answer: A
Explanation
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is the LAN access method used in
Ethernet. When a device wants to gain access to the network, it checks to see if the network is free. If
the network is not free, the device waits a random amount of time before retrying. If the network is
free and two devices access the line at exactly the same time, their signals collide. When the collision
is detected, they both back off and wait a random amount of time before retrying.
CSMA/CD is used with devices operating in half-duplex mode only. CSMA/CD helps devices connecting
to half-duplex switch ports operate correctly.
Question 9
Answer: B
Explanation
The “!” is a special character which is not allowed in the hostname of Cisco device.
Question 10
Answer: B
Question 11
Two hosts are attached to a switch with the default configuration. Which statement about the
configuration is true?
A. IP routing must be enabled to allow the two hosts to communicate.
B. The two hosts are in the same broadcast domain.
C. The switch must be configured with a VLAN to allow the two hosts to communicate.
D. Port security prevents the hosts from connecting to the switch.
Answer: B
Explanation
All ports on a Layer 2 switch are in the same broadcast domain. Only router ports separate broadcast
domains.
Switch Questions 2
Question 1
Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
A. PortFast on the interface
B. the interface as an access port to allow the voice VLAN ID
C. a voice VLAN ID in interface and global configuration mode
D. Cisco Discovery Protocol in global configuration mode
Answer: B
Explanation
When you connect an IP phone to a switch using a trunk link, it can cause high CPU utilization in the
switches. As all the VLANs for a particular interface are trunked to the phone, it increases the number
of STP instances the switch has to manage. This increases the CPU utilization. Trunking also causes
unnecessary broadcast / multicast / unknown unicast traffic to hit the phone link.
In order to avoid this, remove the trunk configuration and keep the voice and access VLAN configured
along with Quality of Service (QoS). Technically, it is still a trunk, but it is called a Multi-VLAN
Access Port (MVAP). Because voice and data traffic can travel through the same port, you should
specify a different VLAN for each type of traffic. You can configure a switch port to forward voice and
data traffic on different VLANs. Configure IP phone ports with a voice VLAN configuration. This
configuration creates a pseudo trunk, but does not require you to manually prune the unnecessary
VLANs.
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. You can
configure a voice VLAN with the “switchport voice vlan …” command under interface mode. The full
configuration is shown below:
Switch(config)#interface fastethernet0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#switchport voice vlan 20
Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4500-series-
switches/69632-configuring-cat-ip-phone.html
Question 2
A technician has installed SwitchB and needs to configure it for remote access from the management
workstation connected SwitchA. Which set of commands is required to accomplish this task?
A.
SwitchB(config)#interface FastEthernet 0/1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#no shutdown
B.
SwitchB(config)#ip default-gateway 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#no shutdown
C.
SwitchB(config)#interface vlan 1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#ip default-gateway 192.168.8.254 255.255.255.0
SwitchB(config-if)#no shutdown
D.
SwitchB(config)#ip default-network 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#no shutdown
Answer: B
Explanation
To remote access to SwitchB, it must have a management IP address on a VLAN on that switch.
Traditionally, we often use VLAN 1 as the management VLAN (but in fact it is not secure).
In the exhibit, we can recognize that the Management Workstation is in a different subnet from the
SwitchB. For intersubnetwork communication to occur, you must configure at least one default
gateway. This default gateway is used to forward traffic originating from the switch only, not to
forward traffic sent by devices connected to the switch.
Question 3
Which three statements accurately describe layer 2 Ethernet switches? (choose three)
A. Microsegmentation decreases the number of collisions on the network.
B. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a property functioning network with redundant switched paths, each switched segment will
contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast
domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer
3 address information.
Answer: A D E
Explanation
Question 4
Refer to the exhibit. Give this output for SwitchC, what should the network administrator’s next action
be?
Answer: C
Question 5
A. Switch-1 will drop the data because it does not have an entry for that MAC address.
B. Switch-1 will forward the data to its default gateway.
C. Switch-1 will flood the data out all of its ports except the port from which the data originated.
D. Switch-1 will send an ARP request out all its ports except the port from which the data originated.
Answer: C
Explanation
The MAC address of 00b0.d056.efa4 has not been learned in its MAC address table so Switch-1 will
broadcast the frame out all of its ports except the port from which the data originated.
Question 6
Which utility can you use to determine whether a switch can send echo requests and replies?
A. ping
B. traceroute
C. ssh
D. telnet
Answer: A
Explanation
“ping” command is used to send echo requests and receive echo replies.
Question 7
Answer: D
Question 8
Which two types of information are held in the MAC address table? (Choose two)
A. MAC address
B. source IP address
C. destination IP address
D. Protocols
E. Port numbers
Answer: A E
Explanation
We can check the MAC address table with the command “show mac address-table”:
As we can see here, the “MAC address” field is the source MAC address and the “Ports” field are the
ports of the switch from which the frames (with corresponding source MAC address) were received.
Question 9
Answer: A
Explanation
To switch frames between LAN ports efficiently, the switch maintains an address table. When the
switch receives a frame, it associates the media access control (MAC) address of the sending network
device with the LAN port on which it was received.
The switch dynamically builds the address table by using the MAC source address of the frames
received. When the switch receives a frame for a MAC destination address not listed in its address
table, it floods the frame to all LAN ports of the same VLAN except the port that received the frame.
When the destination station replies, the switch adds its relevant MAC source address and port ID to
the address table. The switch then forwards subsequent frames to a single LAN port without flooding
all LAN ports.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/g
uide/cli/CLIConfigurationGuide/MACAddress.html
When the switch dynamically builds the MAC address table, it also specifies the time before an entry
ages out and is discarded from the MAC address table. The default is 300 seconds.
Question 10
Which of the three options are switchbox configurations that can always avoid duplex mismatch errors
between two switches? (Choose three)
A. Set one side of the connection to the full duplex and the other side to half duplex
B. Set both sides of the connection to full duplex
C. Set one side of the connection to auto-negotiate and the other side to half duplex
D. Set one side of the connection to auto-negotiate and the other side to full duplex
E. Set both sides of the connection to auto-negotiate
F. Set both sides of the connection to half duplex
Answer: B E F
Question 11
What two results would occur if the hub were to be replaced with a switch that is configured with one
Ethernet VLAN? (Choose two)
Note: This question may or may not have the exhibit.
Answer: C D
VLAN Questions
Question 1
Answer: B C D
Question 2
Which command can you enter to view the ports that are assigned to VLAN 20?
A. Switch#show ip interface brief
B. Switch#show interface vlan 20
C. Switch#show ip interface vlan 20
D. Switch#show vlan id 20
Answer: D
Question 3
Answer: A D F
Question 4
Which command sequence can you enter to create VLAN 20 and assign it to an interface on a switch?
A. Switch(config)#vlan 20
Switch(config)#interface gig x/y
Switch(config-if)#switchport access vlan 20
C. Switch(config)#vlan 20
Switch(config)#interface vlan 20
Switch(config-if)#switchport trunk native vlan 20
D. Switch(config)#vlan 20
Switch(config)#interface vlan 20
Switch(config-if)#switchport access vlan 20
E. Switch(config)#vlan 20
Switch(config)#interface vlan 20
Switch(config-if)#switchport trunk allowed vlan 20
Answer: A
Question 5
Which two circumstances can cause collision domain issues on VLAN domain? (Choose two)
A. duplex mismatches on Ethernet segments in the same VLAN
B. multiple errors on switchport interfaces
C. congestion on the switch inband path
D. a failing NIC in an end device
E. an overloaded shared segment
Answer: A C
Explanation
On an Ethernet connection, a duplex mismatch is a condition where two connected devices operate in
different duplex modes, that is, one operates in half duplex while the other one operates in full duplex.
Duplex mismatch can easily cause collision domain issue as the device that operates in full duplex
mode turns off CSMA/CD. So it is eager to send data immediately without checking if the link is free to
use -> A is correct.
An “inband path” is the path which provides path for management traffic (like CDP, VTP, PAgP…) but
we are not sure why congestion on the switch inband path can cause collision domain issues. Maybe
congestion on inband path prevents the JAM signal (sent when a collision occurs on the link) to be
sent correctly on the link.
Question 6
Answer: B
Explanation
Switch(config)#interface fa0/1
Switch(config-if)#switchport mode access
Then this interface, by default, will belong to VLAN 1. Of course we can assign another VLAN to this
port via the “switchport access vlan {vlan-number}” command.
Question 7
Answer: A
Explanation
Control plane traffic (like CDP, VTP, STP…) runs on VLAN 1 by default. They are not blocked on the
native VLAN -> Answer C is not correct.
If the answer says “the native VLAN should be set so that no real traffic running on it for security
reasons” then it is correct but the native VLAN is not typically disabled -> Answer D is not correct.
CDP runs on VLAN 1 by default and the native VLAN is also VLAN 1 by default so answer A is the best
choice here.
Question 8
Refer to the exhibit. Which statement describes the effect of this configuration?
Router#configure terminal
Router(config)#vlan 10
Router(config-vlan)#do show vlan
Answer: C
Explanation
With the configuration above, when we type “do show vlan” we would not see VLAN 10 in the VLAN
database because it has not been created yet. VLAN 10 is only created when we exits VLAN
configuration mode (with “exit” command).
Question 9
Which method does a connected trunk port use to tag VLAN traffic?
A. IEEE 802.1w
B. IEEE 802.1D
C. IEEE 802.1Q
D. IEEE 802.1p
Answer: C
Explanation
IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.
When a frame enters the VLAN-aware portion of the network (a trunk link, for example), a VLAN ID
tag is added to represent the VLAN membership of that frame. The picture below shows how VLAN tag
is added and removed while going through the network.
Question 10
Answer: B C E
Explanation
When using VLAN the number and size of collision domains remain the same -> A is not correct.
VLANs allow to group users by function, not by location or geography -> B is correct.
VLANs help minimize the incorrect configuration of VLANs so it enhances the security of the network
-> C is correct.
VLAN increases the size of broadcast domains but does not decrease the number of collision domains
-> D is not correct.
VLANs increase the number of broadcast domains while decreasing the size of the broadcast domains
which increase the utilization of the links. It is also a big advantage of VLAN -> E is correct.
VLANs are useful but they are more complex and need more administration -> F is not correct.
VLAN Questions 2
Question 1
Answer: C
Question 2
What are three advantages of VLANs? (Choose three)
A. VLANs establish broadcast domains in switched networks.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a method of conserving IP addresses in large networks.
D. VLANs provide a low-latency internetworking alternative to routed networks.
E. VLANs allow access to network services based on department, not physical location.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.
Answer: A E F
Question 3
Under normal operations, Cisco recommends that you configure switch ports on which VLAN?
A. on the default vlan
B. on the management vlan
C. on the native vlan
D. on any vlan except the default vlan
Answer: D
Explanation
The default Ethernet VLAN is VLAN 1. It is a security best practice to configure all the ports on all
switches to be associated with VLANs other than VLAN 1. All used ports are associated with VLANs
distinct from VLAN 1.
Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=11
All control/management traffic (like CDP, VTP, DTP…) is sent on VLAN 1 and we should separate
management and user data traffic. Another reason is by default, the native VLAN is also VLAN 1 which
is untagged on trunk links so it may cause a security hole.
Question 4
Which two protocol can detect native vlan mismatch errors? (Choose two)
A. CDP
B. VTP
C. DTP
D. STP
E. PAGP
Answer: A D
Explanation
The native VLAN must match on both sides of the trunk link for 802.1Q; otherwise the link will not
work. If there is a native VLAN mismatch, Spanning Tree Protocol (STP) places the port in a port VLAN
ID (PVID) inconsistent state and will not forward on the link -> STP can detect native VLAN mismatch.
Note: Cisco Discovery Protocol (CDP) version 2 passes native VLAN information between Cisco
switches. If you have a native VLAN mismatch, you will see CDP error messages on the console output
-> CDP can detect native VLAN mismatch.
Reference: http://www.ciscopress.com/articles/article.asp?p=29803&seqNum=3
Question 5
Answer: A
Question 6
Answer: B
Explanation
Answer A is not correct because when a packet is received from an 802.1Q trunk, it always carries
VLAN ID information in the VLAN tag portion so the switch does not need to look up its source MAC
address table to determine the VLAN ID of that packet.
Question 7
Which two statements about data VLANs on access ports are true ? (Choose two)
A. They can be configured as trunk ports
B. Two or more VLANs can be configured on the interface
C. 802.1Q encapsulation must be configured on the interface
D. Exactly one VLAN can be configured on the interface.
E. They can be configured as host ports.
Answer: D E
Question 8
Answer: D
Question 9
Assuming the default switch configuration which vlan range can be added modified and removed on a
Cisco switch?
A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005
Answer: A
Trunking Questions
Question 1
Which command can you enter to determine whether a switch is operating in trunking mode?
A. show vlan
B. show ip interface brief
C. show interfaces
D. show interface switchport
Answer: D
Explanation
Below is an example of the output of this command. Interface Ethernet1/0 is operating in trunking
mode.
Question 2
Which two commands can be used to verify a trunk link configuration status on a Cisco switch?
(choose two)
A. show interfaces trunk
B. show interfaces switchport
C. show ip interface brief
D. show interfaces vlan
Answer: A B
Explanation
The “show interfaces trunk” command and “show interfaces switchport” command can be used to
verify the status of an interface (trunking or not). The outputs of these commands are shown below
(port Ethernet 1/0 has been configured as trunk):
The “show ip interface brief” command only gives us information about the IP address, the status
(up/down) of an interface:
The “show interfaces vlan” command only gives us information about that VLAN, not about which
ports are the trunk links:
Question 3
Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Q-complaint trunk to
another switch. Based on the output shown, What is the reason the trunk does not form, even thought
the proper cabling has been attached?
Answer: C
Explanation
The “Operational Mode” is “static access” so this port is currently in access mode.
Question 4
Which two of these are characteristics of the 802.1Q protocol? (Choose two)
A. It is a layer 2 messaging protocol which maintains vlan configurations across network.
B. It includes an 8-bit field which specifies the priority of a frame.
C. It is used exclusively for tagging vlan frames and does not address network reconvergence
following switched network topology changes.
D. It modifies the 802.3 frame header and thus requires that the FCS be recomputed.
E. It is a trunking protocol capable of earring untagged frames.
Answer: D E
Explanation
IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network.
It is a protocol that allows VLANs to communicate with one another using a router. 802.1Q trunks
support tagged and untagged frames.
If a switch receives untagged frames on a trunk port, it believes that frame is a part of the native
VLAN. Also, frames from a native VLAN are not tagged when exiting the switch via a trunk port.
The 802.1q frame format is same as 802.3. The only change is the addition of 4 bytes fields. That
additional header includes a field with which to identify the VLAN number. Because inserting this
header changes the frame, 802.1Q encapsulation forces a recalculation of the original FCS field in the
Ethernet trailer.
Note: Frame Check Sequence (FCS) is a four-octet field used to verify that the frame was received
without loss or error. FCS is based on the contents of the entire frame.
Question 5
How to create a trunk port and allow VLAN 20? (Choose three)
A. switchport trunk encapsulation dot1q
B. switchport mode trunk
C. switchport trunk allowed vlan 20
D. switchport trunk native vlan 20
E. ?
Answer: A B C
Explanation
In switches that support both InterSwitch Link (ISL) and 802.1Q trunking encapsulations, we need to
specify an trunking protocol so we must use the command “switchport trunk encapsulation dot1q”
command first to set the trunk mode to 802.1Q. Then we configure trunking interface with the
“switchport mode trunk” command. Then we explicitly allow vlan 20 with the command “switchport
trunk allowed vlan 20” command. By default all VLANs are allowed to pass but after entering this
command, only VLAN 20 is allowed.
Question 6
Answer: C (?)
Explanation
Maybe this question wanted to ask “if the other end is configured with trunk/access/desirable mode”
then which mode is compatible so that the link can work. In that case both “dynamic auto” and
“dynamic desirable” mode are correct. The difference between these two modes is “dynamic auto” is
passively waiting for the other end to request to form a trunk while “dynamic desirable” will actively
attempt to negotiate to convert the link into a trunk.
Question 7
What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?
A. SA
B. DA
C. FCS
D. other
Answer: A
Explanation
The SA field is the source address field. The field should be set to the MAC address of the switch port
that transmits the frame. It is a 48-bit value (6 bytes). The receiving device may ignore the SA field of
the frame.
Question 8
Answer: D
Explanation
Control traffic like CDP, DTP, PAgP, and VTP uses VLAN 1 to operate, even if you change the native
VLAN.
Question 9
Explanation
Although some books and websites said DTP is disabled if the switch port is configured as trunk or
access mode (via the command “switchport mode trunk” or “switchport mode access”) but in fact DTP
is still running in these modes. Please read at http://packetlife.net/blog/2008/sep/30/disabling-
dynamic-trunking-protocol-dtp/. The only way to disable DTP on a switch port is to use the “switchport
nonegotiate” command. But notice this command can only be used after configuring that switch port
in “trunk” or “access” mode.
Therefore this is a question with no correct answer but if we have to choose an answer, we will choose
answer A. At least it is correct in theory.
Question 10
Answer: A C D
Explanation
The Dynamic Trunking Protocol (DTP) is a proprietary networking protocol developed by Cisco
Systems for the purpose of negotiating trunking on a link between two VLAN-aware switches, and for
negotiating the type of trunking encapsulation to be used. It is a Layer 2 protocol and it is enabled by
default on Cisco switches (so the interfaces of your switches will be in “dynamic auto” or “dynamic
desirable” mode). If you want to turn it off, use the “switchport nonegotiate” under interface mode.
Question 11
Which DTP switchport mode allow the port to create a trunk port if the the port is in trunk, dynamic
auto and dynamic desirable mode?
A. Dynamic Auto
B. Dynamic Desirable
C. Access
D. Trunk
Answer: B
Question 12
What is the function of the command switchport trunk native vlan 999 on a trunk port?
A. It designates VLAN 999 for untagged traffic.
B. It blocks VLAN 999 traffic from passing on the trunk.
C. It creates a VLAN 999 interface.
D. It designates VLAN 999 as the default for all unknown tagged traffic.
Answer: A
STP Questions
Question 1
Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are
operating at the same bandwidth? (Choose three)
A. Switch A – Fa0/0
B. Switch A – Fa0/1
C. Switch B – Fa0/0
D. Switch B – Fa0/1
E. Switch C – Fa0/0
F. Switch C – Fa0/1
Answer: B C D
Explanation
First by comparing their MAC addresses we learn that switch B will be root bridge as it has lowest
MAC. Therefore all of its ports are designated ports -> C & D are correct.
On the link between switch A & switch C there must have one designated port and one non-designated
(blocked) port. We can figure out which port is designated port by comparing their MAC address again.
A has lower MAC so Fa0/1 of switch A will be designated port while Fa0/1 of switch C will be blocked
-> B is correct.
Question 2
If the primary root bridge experiences a power loss, which switch takes over?
A. switch 0040.0ВС0.90C5
B. switch 00E0.F90B.6BE3
C. switch 0004.9A1A.C182
D. switch 00E0.F726.3DC6
Answer: C
Explanation
The switches compare their Bridge ID with each other to find out who will be the root bridge. The root
bridge is the bridge with the lowest bridge ID.
In this question the bridge priority was not mentioned so we suppose they are the same. Therefore
the switch with lowest MAC address will become the new root bridge.
Question 3
Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are
operating at the same bandwidth? (Choose three)
A. Switch A – Fa0/0
B. Switch A – Fa0/1
C. Switch B – Fa0/0
D. Switch B – Fa0/1
E. Switch C – Fa0/0
F. Switch C – Fa0/1
Answer: B C D
Explanation
First by comparing their MAC addresses we learn that switch B will be root bridge as it has lowest
MAC. Therefore all of its ports are designated ports -> C & D are correct.
On the link between switch A & switch C there must have one designated port and one non-designated
(blocked) port. We can figure out which port is designated port by comparing their MAC address again.
A has lower MAC so Fa0/1 of switch A will be designated port while Fa0/1 of switch C will be blocked
-> B is correct.
Question 4
If primary and secondary root switches with priority 16384 both experience catastrophic losses, which
tertiary switch can take over?
A. a switch with priority 20480
B. a switch with priority 8192
C. a switch with priority 4096
D. a switch with priority 12288
Answer: A
Explanation
This is a tricky question. We know the switch with lowest value of priority is elected the root switch.
Therefore in this question the switches with priority of 4096, 8192, 12288 (which are lower than the
current value of the root bridge 16384) are not joining the root bridge election by somehow. The only
suitable answer is the switch with priority 20480 will become the root bridge.
Question 5
Answer: A
Explanation
Multiple Spanning Tree (MST) rides on top of RSTP so it converges very fast. The idea behind MST is
that some VLANs can be mapped to a single spanning tree instance because most networks do not
need more than a few logical topologies.
Question 6
Answer: B
Explanation
Cisco developed PVST+ to allow strolling numerous STP instances, even over an 802.1Q network via
the use of a tunneling mechanism. PVST+ utilizes Cisco gadgets to hook up with a Mono Spanning
Tree area to a PVST+ region. No particular configuration is needed to attain this. PVST+ affords assist
for 802.1Q trunks and the mapping of a couple of spanning trees to the single spanning tree of
popular 802.1Q switches strolling Mono Spanning Tree.
Question 7
Answer: B
Explanation
Question 8
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these
statements are true? (Choose three)
Answer: A C E
Explanation
From the output, we see that all ports are in Designated role (forwarding state) -> A and E are
correct.
The command “show spanning-tree vlan 30″ only shows us information about VLAN 30. We don’t
know how many VLAN exists in this switch -> B is not correct.
The bridge priority of this switch is 24606 which is lower than the default value bridge priority 32768
-> C is correct.
All three interfaces on this switch have the connection type “p2p”, which means Point-to-point
environment – not a shared media -> D is not correct.
The only thing we can specify is this switch is the root bridge for VLAN 30 but we can not guarantee it
is also the root bridge for other VLANs -> F is not correct.
Question 9
Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are
operating at the same bandwidth? (Choose three)
A. Switch A – Fa0/0
B. Switch A – Fa0/1
C. Switch B – Fa0/0
D. Switch B – Fa0/1
E. Switch C – Fa0/0
F. Switch C – Fa0/1
Answer: B C D
Explanation
First by comparing their MAC addresses we learn that switch B will be root bridge as it has lowest
MAC. Therefore all of its ports are designated ports -> C & D are correct.
On the link between switch A & switch C there must have one designated port and one non-designated
(blocked) port. We can figure out which port is designated port by comparing their MAC address again.
A has lower MAC so Fa0/1 of switch A will be designated port while Fa0/1 of switch C will be blocked
-> B is correct.
Question 10
When an interface is configured with PortFast BPDU guard, how does the interface respond when it
receives a BPDU?
A. It continues operating normally.
B. It goes into an errdisable state.
C. It goes into a down/down state.
D. It becomes the root bridge for the configured VLAN.
Answer: B
Explanation
PortFast BPDU guard prevents loops by moving a nontrunking port into an errdisable state when a
BPDU is received on that port. When you enable BPDU guard on the switch, spanning tree shuts down
PortFast-configured interfaces that receive BPDUs instead of putting them into the spanning tree
blocking state.
In a valid configuration, PortFast-configured interfaces do not receive BPDUs (because PortFast should
only be configured on interfaces which are connected to hosts). If a PortFast-configured interface
receives a BPDU, an invalid configuration exists. BPDU guard provides a secure response to invalid
configurations because the administrator must manually put the interface back in service.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-
2glx/configuration/guide/stp_enha.html
STP Questions 2
Question 1
A. BPDU guard
B. PortFast
C. loop guard
D. UDLD
E. Uplink Fast
Answer: B
Explanation
When you enable PortFast on the switch, spanning tree places ports in the forwarding state
immediately, instead of going through the listening, learning, and forwarding states.
Question 2
Which switch would STP choose to become the root bridge in the selection process?
A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78
Answer: A
Question 3
Which type does a port become when it receives the best BPDU on a bridge?
Answer: D
Explanation
Root port is the port on non-root bridge which is closest to the root bridge (in term of cost). Therefore
when a port receives the best BPDU on a non-root bridge it will become the root port.
Question 4
Which value can you modify to configure a specific interface as the preferred forwarding interface?
Answer: B
Explanation
We can configure the port priority to change the preferred forwarding interface as we wish. For
example we can change the port priority of an interface for VLAN 20 to 64 as follows:
Question 5
Answer: C
Explanation
Per VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the
network. It means a switch can be the root bridge of a VLAN while another switch can be the root
bridge of other VLANs in a common topology. For example, Switch 1 can be the root bridge for Voice
data while Switch 2 can be the root bridge for Video data. If designed correctly, it can optimize the
network traffic.
Question 6
Three switches are connected to one another via trunk ports. Assuming the default switch
configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?
Answer: B
Question 7
A. CST
B. RSTP
C. MSTP
D. PVST+
Answer: D
Question 8
A BPDU guard is configured on an interface that has PortFast enable. Which state does the interface
enter when it receives a BPDU?
A. Blocking
B. Shutdown
C. Listening
D. Errdisable
Answer: D
Explanation
PortFast BPDU guard prevents loops by moving a nontrunking port into an errdisable state when a
BPDU is received on that port.
In a valid configuration, PortFast-configured interfaces do not receive BPDUs (because PortFast should
only be configured on interfaces which are connected to hosts). If a PortFast-configured interface
receives a BPDU, an invalid configuration exists. BPDU guard provides a secure response to invalid
configurations because the administrator must manually put the interface back in service.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-
2glx/configuration/guide/stp_enha.html
Question 9
Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network?
(Choose two)
A. 802.1D
B. VTP
C. 802.1Q
D. SAP
E. STP
Answer: A E
Question 10
Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network
segment that services the printers?
A. Switch1
B. Switch2
C. Switch3
D. Switch4
Answer: C
Explanation
First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which is
connected directly to the Printers.
Next, by comparing the MAC address of Switch 3 and Switch 4 we found that the MAC of Switch 3 is
smaller. Therefore the interface connected to the Printers of Switch 3 will become designated interface
and the interface of Switch 4 will be blocked. The picture below shows the roles of all ports:
(Please notice that Switch 1 will become the root bridge because of its lowest priority, not Switch 3)
Question 11
When you enable PortFast on a switch port, the port immediately transitions to which state?
A. Blocking
B. Forwarding
C. Learning
D. Listening
Answer: B
Explanation
PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately,
bypassing the listening and learning states.
Question 12
Question 13
A. Listening
B. Learning
C. Forwarding
D. Discarding
Answer: D
Question 14
Answer: B
Explanation
Answer A is not correct as we can choose which switch to become root bridge by configuring bridge
priority. The switch with lowest bridge priority (value) would become the root bridge.
For answer B, this paragraph from Cisco confirms it is the correct answer:
“When you implement a root bridge in a switching network, you usually refer to the root bridge as the
root switch. Each VLAN must have its own root bridge because each VLAN is a separate broadcast
domain. The roots for the different VLANs can all reside in a single switch or in various switches.”
Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-
5.html
The meaning of answer C is not clear but maybe it means “every VLAN must use the same root
bridge” which is not correct as Sw1 can be the root bridge for VLANs 1, 3, 5 but Sw2 can be the root
bridge for VLAN 2, 4, 6…
Which two spanning-tree port states does RSTP combine to allow faster convergence? (Choose two)
A. discarding
B. listening
C. blocking
D. forwarding
E. learning
Answer: B C
Explanation
There are only three port states left in RSTP that correspond to the three possible operational states.
The 802.1D blocking, and listening states are merged into the 802.1w discarding state.
* Discarding – the port does not forward frames, process received frames, or learn MAC addresses –
but it does listen for BPDUs (like the STP blocking state)
* Learning – receives and transmits BPDUs and learns MAC addresses but does not yet forward
frames (same as STP).
* Forwarding – receives and sends data, normal operation, learns MAC address, receives and
transmits BPDUs (same as STP).
Blocking Discarding
Listening Discarding
Learning Learning
Forwarding Forwarding
Although the learning state is also used in RSTP but it only takes place for a short time as compared
to STP. RSTP converges with all ports either in forwarding state or discarding state.
Question 2
Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as
being configured to run RSTP. No other configuration changes have been made. Which three of these
show the correct RSTP port roles for the indicated switches and interfaces? (Choose three)
A. SwitchA, Fa0/2, designated
B. SwitchA, Fa0/1, root
C. SwitchB, Gi0/2, root
D. SwitchB, Gi0/1, designated
E. SwitchC, Fa0/2, root
F. SwitchD, Gi0/2, root
Answer: A B F
Explanation
The question says “no other configuration changes have been made” so we can understand these
switches have the same bridge priority. Switch C has lowest MAC address so it will become root bridge
and 2 of its ports (Fa0/1 & Fa0/2) will be designated ports -> E is incorrect.
Because SwitchC is the root bridge so the 2 ports nearest SwitchC on SwitchA (Fa0/1) and SwitchD
(Gi0/2) will be root ports -> B and F are correct.
Now we come to the most difficult part of this question: SwitchB must have a root port so which port
will it choose? To answer this question we need to know about STP cost and port cost.
In general, “cost” is calculated based on bandwidth of the link. The higher the bandwidth on a
link, the lower the value of its cost. Below are the cost values you should memorize:
10Mbps 100
100Mbps 19
1 Gbps 4
SwitchB will choose the interface with lower cost to the root bridge as the root port so we must
calculate the cost on interface Gi0/1 & Gi0/2 of SwitchB to the root bridge. This can be calculated from
the “cost to the root bridge” of each switch because a switch always advertises its cost to the
root bridge in its BPDU. The receiving switch will add its local port cost value to the cost in the
BPDU.
In the exhibit you also we FastEthernet port is connecting to GigabitEthernet port. In this case
GigabitEthernet port will operate as a FastEthernet port so the link can be considered as FastEthernet
to FastEthernet connection.
One more thing to notice is that a root bridge always advertises the cost to the root bridge (itself) with
an initial value of 0.
SwitchC advertises its cost to the root bridge with a value of 0. Switch D adds 19 (the cost value of
100Mbps link although the port on Switch D is GigabitEthernet port) and advertises this value (19) to
SwitchB. SwitchB adds 4 (the cost value of 1Gbps link) and learns that it can reach SwitchC via Gi0/1
port with a total cost of 23. The same process happens for SwitchA and SwitchB learns that it can
reach SwitchC via Gi0/2 with a total cost of 38 -> Switch B chooses Gi0/1 as its root port -> D is not
correct.
Now our last task is to identify the port roles of the ports between SwitchA & SwitchB. It is rather easy
as the MAC address of SwitchA is lower than that of SwitchB so Fa0/2 of SwitchA will be designated
port while Gi0/2 of SwitchB will be alternative port -> A is correct but C is not correct.
Question 3
Which two switch states are valid for 802.1w? (Choose two)
A. listening
B. backup
C. disabled
D. learning
E. discarding
Answer: D E
Explanation
IEEE 802.1w is Rapid Spanning Tree Protocol (RSTP). There are only three port states left in RSTP that
correspond to the three possible operational states. The 802.1D disabled, blocking, and listening
states are merged into the 802.1w discarding state.
* Discarding – the port does not forward frames, process received frames, or learn MAC addresses –
but it does listen for BPDUs (like the STP blocking state)
* Learning – receives and transmits BPDUs and learns MAC addresses but does not yet forward
frames (same as STP).
* Forwarding – receives and sends data, normal operation, learns MAC address, receives and
transmits BPDUs (same as STP).
Question 4
Which two states are the port states when RSTP has converged? (choose two)
A. discarding
B. learning
C. disabled
D. forwarding
E. listening
Answer: A D
Explanation
RSTP only has 3 port states that are discarding, learning and forwarding. When RSTP has converged
there are only 2 port states left: discarding and forwarding.
Question 5
Answer: A B F
Question 6
Answer: A
Question 7
Which two of these statements regarding RSTP are correct? (Choose two)
Answer: B E
Question 8
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will
assume the discarding role?
A. Switch3, port fa0/1
B. Switch3, port fa0/12
C. Switch4, port fa0/11
D. Switch4, port fa0/2
E. Switch3, port Gi0/1
Answer: C
Explanation
In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower
bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of
Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.
Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how
does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3.
A BPDU is superior than another if it has:
These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3
have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The
only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index).
In this case the port priorities are equal because they use the default value, so Switch4 will compare
port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to
Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the
other port -> Port fa0/11 of Switch4 will be blocked (discarding role).
If you are still not sure about this question, please read my RSTP tutorial.
Question 9
Which option describes how a switch in rapid PVST+ mode responds to a topology change?
A. It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.
B. It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP
instance.
C. It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.
D. It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP
instance.
Answer: B
Explanation
For PVST and PVST+, any change in the STP topology will result in a Topology Change Notification
(TCN) BPDU. The TCN tells the switches that a change in the topology table has occurred, and they
must therefore flush their Content-Addressable Memory (CAM) tables. Switches will set their CAM
tables to age out after ForwardDelay seconds, which is 15 seconds by default. In other words, if a host
doesn’t send traffic within 15 seconds to update the CAM table, the switch will have to begin flooding
traffic to that host. This can lead to excessive amounts of flooded traffic.
Which protocol supports sharing the VLAN configuration between two or more switches?
A. multicast
B. STP
C. VTP
D. split-horizon
Answer: C
Explanation
With VTP, switches can learn VLAN configuration of other switches dynamically.
Question 2
A. Configure VLAN
B. Confiture NTP
C. Configure each VLAN
D. Configure VTP
Answer: D
Explanation
VLAN Trunking Protocol (VTP) allows a network manager to configure a switch so that it will propagate
VLAN configurations to other switches in the network automatically.
Question 3
A. Server
B. Client
C. Transparent
D. Off
Answer: B
Explanation
Question 4
Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk
mode, or desirable auto mode?
A. Dynamic auto
B. Trunk
C. Dynamic desirable
D. Access
Answer: A
Explanation
The Dynamic Trunking Protocol (DTP) is a proprietary networking protocol developed by Cisco for the
purpose of negotiating trunking on a link between two switches, and for negotiating the type of
trunking encapsulation to be used.
In dynamic auto mode, the interface is able to convert the link to a trunk link. The interface
becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. The
default switchport mode for newer Cisco switch Ethernet interfaces is dynamic auto. Note that if two
Cisco switches are left to the common default setting of auto, a trunk will never form.
In fact two other answers (“trunk” and “dynamic desirable”) are also correct but “dynamic auto” is the
best choice that fits the requirements, no more no less. For “dynamic desirable” mode, the interface
becomes a trunk interface if the neighboring interface is set to trunk, desirable, or auto mode.
Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=8
Question 5
To configure the VLAN trunking protocol to communicate VLAN information between two switches,
what two requirements must be met? (Choose two)
A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B. The VTP management domain name of both switches must be set the same.
C. All ports on both the switches must be set as access ports.
D. One of the two switches must be configured as a VTP server.
E. A rollover cable is required to connect the two switches together.
F. A router must be used to forward VTP traffic between VLANs.
Answer: B D
Explanation
In Cisco switches there are two encapsulations: 802.1q and ISL so we can set two ends to ISL instead
-> A is not correct.
The ports between two switches must be set to trunk ports so that they can exchange VLAN
information through VTP -> C is not correct.
To connect two switches we can use cross-over cable or straight-through cable (because modern Cisco
switches can “auto-sense”) but not rollover cable -> E is not correct.
To forward traffic in the same VLAN (between two or more switches) we can use switches only. If we
want to forward VTP traffic between different VLANs we can use either a router or a Layer 3 switch ->
F is not correct.
Two switches can only communicate when they are set to the same VTP domain name (and the same
VTP password) -> B is correct.
One of the two switches must be set to VTP Server so that it can create VTP updates and advertise its
VLAN information.
Question 6
A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice
vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running
configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses
up to the maximum defined.
Answer: C E
Explanation
Note: Dynamic access port or Dynamic port VLAN membership must be connected to an end station.
This type of port can be configured with the “switchport access vlan dynamic” command in the
interface configuration mode. Please read more about Dynamic access port
here: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-
1_19_ea1/configuration/guide/3550scg/swvlan.html#wp1103064
Question 2
The network administrator normally establishes a Telnet session with the switch from host A. The
administrator’s attempt to establish a connect via Telnet to the switch from host B fails, but pings
from host B to other two hosts are successful. What is the issue for this problem?
Answer: B
Explanation
Host A (172.19.1.1) and the management IP address of the Switch (172.19.1.250) are in the same
subnet so telnet from host A to the switch can be successful even if a default gateway is not set on
host A.
But host B (172.19.32.2) and the management IP address of the Switch (172.19.1.250) are not in the
same subnet so host B needs a default gateway to telnet to the switch. The default gateway on host B
should be 172.19.32.254.
Question 3
A. shutdown
B. protect
C. shutdown vlan
D. restrict
Answer: A
Explanation
Shutdown is the default switch port port-security violation mode. When in this mode, the switch will
automatically force the switchport into an error disabled (err-disable) state when a violation occurs.
While in this state, the switchport forwards no traffic. The switchport can be brought out of this error
disabled state by issuing the errdisable recovery cause CLI command or by disabling and re-enabling
the switchport.
Question 4
By default, how many MAC addresses are permitted to be learned on a switch port with port security
enabled?
A. 8
B. 2
C. 1
D. 0
Answer: C
Explanation
By default, port security limits the MAC address that can connect to a switch port to one. If the
maximum number of MAC addresses is reached, when another MAC address attempting to access the
port a security violation occurs.
Question 5
Which set of commands is recommended to prevent the use of a hub in the access layer?
A.
switch(config-if)#switchport mode trunk
switch(config-if)#switchport port-security maximum 1
B.
switch(config-if)#switchport mode trunk
switch(config-if)#switchport port-security mac-address 1
C.
switch(config-if)#switchport mode access
switch(config-if)#switchport port-security maximum 1
D.
switch(config-if)#switchport mode access
switch(config-if)#switchport port-security mac-address 1
Answer: C
Explanation
Port security is only used on access port (which connects to hosts) so we need to set that port to
“access” mode, then we need to specify the maximum number of hosts which are allowed to connect
to this port -> C is correct.
Note: If we want to allow a fixed MAC address to connect, use the “switchport port-security mac-
address ” command.
Question 6
Answer: B
Explanation
If we don’t specify the MAC address (like in this question) then the switch will dynamically learn the
attached MAC Address and place it into your running-configuration -> B is correct.
Question 7
Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.
2950Switch(config-if)#switchport port-security
2950Switch(config-if)#switchport port-security mac-address sticky
2950Switch(config-if)#switchport port-security maximum 1
The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this
frame is received by 2950Switch? (Choose two)
A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B. Only host A will be allowed to transmit frames on fa0/1.
C. This frame will be discarded when it is received by 2950Switch.
D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out
fa0/1.
E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be
forwarded out fa0/1.
F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be
forwarded out fa0/1.
Answer: B D
Explanation
After you have set the maximum number of secure MAC addresses for interface fa0/1, the secure
addresses are included in the “Secure MAC Address” table (this table is similar to the Mac Address
Table but you can only view it with the show port-security address command). So in this question,
although you don’t see the MAC address of host A listed in the MAC Address Table but frames with a
destination of 0000.00aa.aaaa will be forwarded out of fa0/1 interface -> D is correct.
Question 8
Which two commands correctly verify whether port security has been configured on port FastEthernet
0/12 on a switch? (Choose two)
Answer: C D
Explanation
We can verify whether port security has been configured by using the “show running-config” or “show
port-security interface ” for more detail. An example of the output of “show port-security interface ”
command is shown below:
Question 9
Refer to the exhibit. A junior network administrator was given the task of configuring port security on
SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is
detected, the port is to drop frames from this device. The administrator configured the interface and
tested it with successful pings from PC_A to RouterA, and then observes the output from these two
show commands.
Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two)
Answer: B D
Explanation
As we see in the output, the “Port Security” is in “Disabled” state (line 2 in the output). To enable Port
security feature, we must enable it on that interface first with the command:
SwitchA(config-if)#switchport port-security
-> B is correct.
Also from the output, we learn that the switch is allowing 2 devices to connect to it (switchport port-
security maximum 2) but the question requires allowing only PC_A to access the network so we need
to reduce the maximum number to 1 -> D is correct.
Question 10
Answer: E
Explanation
There are various reasons for the interface to go into errdisable. The reason can be:
+ Duplex mismatch
+ Port channel misconfiguration
+ BPDU guard violation
+ UniDirectional Link Detection (UDLD) condition
+ Late-collision detection
+ Link-flap detection
+ Security violation
+ Port Aggregation Protocol (PAgP) flap
+ Layer 2 Tunneling Protocol (L2TP) guard
+ DHCP snooping rate-limit
+ Incorrect GBIC / Small Form-Factor Pluggable (SFP) module or cable
+ Address Resolution Protocol (ARP) inspection
+ Inline power
Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/69980-
errdisable-recovery.html
Therefore in fact there are two correct answers in this question, which are “There is a duplex
mismatch” and “Port security has disabled the interface” but maybe you should choose the port
security answer as it is the most popular reason.
Question 11
Which port security mode can assist with troubleshooting by keeping count of violations?
A. access
B. protect
C. restrict
D. shutdown
Answer: C
Question 12
Which port security violation mode allows traffic from valid mac address to pass but block traffic from
invalid MAC address?
A. protect
B. shutdown
C. shutdown vlan
D. restrict
Answer: A
Explanation
In fact both “protect” and “restrict” mode allows traffic from passing with a valid MAC address so this
question is not good. This is a quote from Cisco for these two modes:
protect: drops packets with unknown source addresses until you remove a sufficient number of
secure MAC addresses to drop below the maximum value.
restrict: drops packets with unknown source addresses until you remove a sufficient number of
secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to
increment.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/port_sec.pdf
Therefore the only difference between these two modes is “restrict” mode causes the SecurityViolation
counter to increment (only useful for statistics).
Question 13
A. dynamic
B. bia
C. static
D. sticky
Answer: C
SPAN Questions
Question 1
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on
the same switch?
A. copy run start
B. traceroute
C. the ICMP Echo IP SLA
D. SPAN
Answer: D
Explanation
Switched Port Analyzer (SPAN) is used to analyze network traffic passing through ports on a switch.
For example we can configure the Switch to monitor its interface Fa0/0, which connects to the Core,
by sending all traffic to/from Fa0/0 to its Fa0/1 interface. At Fa0/1 interface we connect to a computer
and use such a software like Wireshark to capture the packets.
EtherChannel Questions
Question 1
Refer to the exhibit. While troubleshooting a switch, you executed the “show interface port-channel 1
etherchannel” command and it returned this output. Which information is provided by the Load value?
Answer: D
Explanation
The way EtherChannel load balancing works is that the switch assigns a hash result from 0-7 based on
the configured hash method ( load balancing algorithm ) for the type of traffic. This hash result is
commonly called as Result Bundle Hash (RBH).
Now we need to convert Load value from Hexadecimal to Binary numbers. Therefore:
+ Gi1/1: 36 (Hex) = 00110110 (Bin) -> Bits 3, 4, 6, 7 are chosen
+ Gi1/2: 84 (Hex) = 10000100 (Bin) -> Bits 1, 6 are chosen
+ Gi1/3: 16 (Hex) = 00010110 (Bin) -> Bits 4, 6, 7 are chosen
Therefore if the RBH is 3, it will choose Gi1/1. If RBH is 4, it will choose Gi1/1 and Gi1/3 interfaces. If
RBH is 6 it will choose all three above interfaces. And the bit sharing ratio is 3:3:2 (from “No of bits”
column) hence two links has higher probability of getting utilized as compared to the third link.
Question 2
Answer: C
Question 3
Answer: B
Explanation
All interfaces in an EtherChannel must be configured identically to form an EtherChannel. Specific
settings that must be identical include:
+ Speed settings
+ Duplex settings
+ STP settings
+ VLAN membership (for access ports)
+ Native VLAN (for trunk ports)
+ Allowed VLANs (for trunk ports)
+ Trunking Encapsulation (ISL or 802.1Q, for trunk ports)
Question 4
Answer: A
Explanation
LACP is the IEEE Standard (IEEE 802.3ad) and is the most common dynamic Etherchannel protocol,
whereas PAgP is a Cisco proprietary protocol and works only between supported vendors and Cisco
devices.
Question 5
Answer: A B
Explanation
Auto Responds to PAgP messages but does not aggressively negotiate a PAgP EtherChannel. A
channel is formed only if the port on the other end is set to Desirable. This is the default
mode.
Desirable Port actively negotiates channeling status with the interface on the other end of the link. A
channel is formed if the other side is Auto or Desirable.
The table below lists if an EtherChannel will be formed or not for PAgP:
Auto Yes No
InterVLAN Routing
Question 1
Which type of device can be replaced by the use of subinterfaces for VLAN routing?
A. Layer 2 bridge
B. Layer 2 switch
C. Layer 3 switch
D. router
Answer: C
Question 2
Which technology can enable multiple VLANs to communicate with one another?
Answer: A
Question 3
Answer: D
Explanation
To enabe encapsulation on a subinterface we have type the “encapsulation” command under that
subinterface, not the main interface. An example of configuring encapsulation on subinterface of Fa0/1
is shown below:
Router(config)#interface f0/0
Router(config-if)#no shutdown
(Note: The main interface f0/0 doesn’t need an IP address but it must be turned on)
Router(config)#interface f0/0.0
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip address 192.168.1.1 255.255.255.0
Router(config-subif)#interface f0/0.1
Router(config-subif)#encapsulation dot1q 20
Router(config-subif)#ip address 192.168.2.1 255.255.255.0
Note: In the “encapsulation dot1q 10”, number 10 is the VLAN applied to that subinterface. Or you
can understand that the subinterface belongs to that VLAN.
Question 4
Answer: E
Explanation
The causes of slow interVLAN are usually duplex mismatch or collision domain issues, user
misconfiguration. For more information please read: http://www.cisco.com/c/en/us/support/docs/lan-
switching/virtual-lans-vlan-trunking-protocol-vlans-vtp/23637-slow-int-vlan-
connect.html#troubleshoot_slow_interv
Question 5
Answer: D
Question 6
A. Its date plane router traffic for a single VI AN over two or more switches.
B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the
same subnet.
C. It requires the native VLAN to be disabled.
D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs.
Answer: D
Question 7
Which two statements are true about interVLAN routing in the topology that is shown in the exhibit?
(Choose two)
Answer: D F
Question 8
Answer: A E
Explanation
This question only asks about enable router-on-stick on a switch, not a router. We don’t have
subinterface on a switch so B is not a correct answer.
Question 9
The network shown in the diagram is experiencing connectivity problems. Which of the following will
correct the problems? (Choose two)
Answer: B D
Question 10
Answer: A
Question 11
Answer: C
Question 12
To enable router on a stick on a router subinterface, which two steps must you perform? (Choose two)
Answer: C D
Router Questions
Question 1
Which step in the router boot process searches for an IOS image to load into the router?
A. bootstrap
B. POST
C. mini-IOS
D. ROMMON mode
Answer: A
Explanation
For more information about booting process please read our Cisco Router Boot Sequence tutorial.
Question 2
If a router has four interfaces and each interface is connected to four switches, how many broadcast
domains are present on the router?
A. 1
B. 2
C. 4
D. 8
Answer: C
Explanation
Remember that only route interface can separate broadcast domain (while switch interface separate
collision domain) so the broadcast domains are equal to the number of router interfaces, which is four
in this case.
Question 3
Answer: A
Explanation
In short, when powered on the router needs to do:
Question 4
Which command can you execute to set the user inactivity timer to 10 seconds?
A. SW1(config-line)#exec-timeout 0 10
B. SW1(config-line)#exec-timeout 10
C. SW1(config-line)#absolute-timeout 0 10
D. SW1(config-line)#absolute-timeout 10
Answer: A
Explanation
The “exec-timeout” command is used to configure the inactive session timeout on the console port or
the virtual terminal. The syntax of this command is:
Therefore we need to use the “exec-timeout 0 10” command to set the user inactivity timer to 10
seconds.
Question 5
After you configure the Loopback0 interface, which command can you enter to verify the status of the
interface and determine whether fast switching is enabled?
Answer: A
Explanation
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an
IOS image. What function does the router perform next?
Answer: A
Explanation
When you turn the router on, it runs through the following boot process.
The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully,
the System OK LED indicator comes on.
The router checks the configuration register to identify where to load the IOS image from. A setting of
0×2102 means that the router will use information in the startup-config file to locate the IOS image. If
the startup-config file is missing or does not specify a location, it will check the following locations for
the IOS image:
The router loads the configuration file into RAM (which configures the router). The router can load a
configuration file from:
+ NVRAM (startup-configuration file)
+ TFTP server
If a configuration file is not found, the router starts in setup mode.
Question 7
Answer: B
Explanation
The “show ip interface brief” command can be used to view a summary of the router interfaces. This
command displays the IP address, interface status, and additional information. An example of the
“show ip interface brief” command is shown below. We can see the interface status of E0/0 is “up/up”.
Question 8
A. Level 0
B. Level 1
C. Level 15
D. Level 16
Answer: C
Explanation
By default, the Cisco IOS CLI has two privilege levels enabled, level 1 and level 15.
+ User EXEC mode (privilege level 1): provides the lowest EXEC mode user privileges and allows only
user-level commands available at the Router> prompt.
+ Privileged EXEC mode (privilege level 15): includes all enable-level commands at
the Router# prompt. Level 15 users can execute all commands and this is the most secured and
powerful privilege level.
However, there are actually 16 privilege levels available on the CLI, from 0 to 15 and you can assign
users to any of those levels. Zero-level access allows only five commands -logout, enable, disable,
help, and exit. User level (level 1) provides very limited read-only access to the router, and privileged
level (level 15) provides complete control over the router.
Question 9
Answer: D
Explanation
To reset the password we can type “confreg 0x2142” under rommon mode to set the configuration
register to 2142 in hexadecimal (the prefix 0x means hexadecimal (base 16)). With this setting when
that router reboots, it bypasses the startup-config.
Question 10
A. Router(config)#hostname R1
B. Router#hostname R1
C. Router(config)#host name R1
D. Router>hostname R1
Answer: A
Question 11
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote
location? (Choose two)
A. no logging console
B. logging host ip-address
C. terminal monitor
D. show logging | redirect flashioutput.txt
E. snmp-server enable traps syslog
Answer: B C
Explanation
The “no logging console” turns off logging to the console connection (it is turned on by default) and it
is often used if the console received large amount of logging output. But this command is not
recommended in normal configuration -> A is not correct.
The command “logging host ip-address” instructs the device to send syslog messages to an external
syslog server -> B is correct.
The “show logging | redirect flashioutput.txt” command will put the text file in the router flash
memory because we did not specify a remote location (like tftp) -> D is not correct.
The command “snmp-server enable traps syslog” instructs the device to send syslog messages to your
network management server as SNMP traps instead of syslog packets. This command itself does not
enable debug output to a remote location -> E is not correct.
By default, Cisco IOS does not send log messages to a terminal session over IP, that is, telnet or SSH
connections don’t get log messages. But notice that console connections on a serial cable do have
logging enabled by default. The command “terminal monitor” helps logging messages appear on the
your terminal. First we don’t think this is a correct answer but after reading the question again, we
believe it is a suitable one as a Telnet/SSH session may be considered a “remote location” -> C is
correct.
Question 12
Answer: D
Explanation
Other choices are surely incorrect so only “physical access” answer is the correct one. In order to
recover a password on a Cisco router, the first thing you have to do is either switch off or shut down
the router. For more information about this process, please
read http://www.cisco.com/c/en/us/support/docs/routers/2800-series-integrated-services-
routers/112033-c2900-password-recovery-00.html
Question 13
Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the
TFTP server?
Router# copy tftp flash
Address or name of remote host []? 192.168.2.167
Source filename []? c1600-k8sy-mz.123-16a.bin
Destination filename [c1600-k8sy-mz.123-16a.bin]?
Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin…
Erasing flash before copying? [confirm]
Erasing the flash filesystem will remove all files! continue? [confirm]
Erasing device
Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee …erased
Erase of flash: complete
Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0):
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK – 6888962/13777920 bytes]
A. The router cannot verify that the Cisco IOS image currently in flash is valid
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. In order for the router to use the new image as the default, it must be the only IOS image in flash.
Answer: C
Explanation
During the copy process, the router asked “Erasing flash before copying? [confirm]” and the
administrator confirmed (by pressing Enter) so the flash was deleted.
Note: In this case, the flash has enough space to copy a new IOS without deleting the current one.
The current IOS is deleted just because the administrator wants to do so. If the flash does not have
enough space you will see an error message like this:
Answer: D
Explanation
Switch stacking technology allows the network engineer to make that stack of physical switches act
like one switch. The stacking cables together make a ring between the switches. That is, the switches
connect in series, with the last switch connecting again to the first.
Answer B is not correct as switch stacking is about connecting switches together so that they act as
one switch, not about adding and removing hosts.
Answer C is not correct because switch stacking has nothing to do with performance of high-needs
applications.
Surely switch stacking provides redundancy as stacking creates a ring of connection with two opposite
paths. Whenever a frame is ready for transmission onto the path, a calculation is made to see which
path has the most available bandwidth. The entire frame is then copied onto this half of the path.
With switch stacking, STP, CDP and VTP would run on one switch, not multiple switches. Also there
would be one MAC address table, and it would reference all ports on all physical switches so we may
say switch stacking has better resource usage. Also if we consider all stacking switches as one logical
switch then surely the port density is increase very much. Therefore answer D is the most suitable
one.
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-
switches/prod_white_paper09186a00801b096a.html
Question 2
Which two options describe benefits of aggregated chassis technology? (Choose two)
Answer: A C
Explanation
Chassis aggregation is a Cisco technology to make multiple switches operate as a single switch. It is
similar to stacking but meant for powerful switches (like the 6500 and 6800 series switches). Chassis
aggregation is often used in the core layer and distribution layer (while switching stacking is used for
access layer).
The books do not mention about the benefits of chassis aggregation but they are the same as switch
stacking.
Reference: CCNA Routing and Switching ICND2 200-105 Official Cert Guide
VSS is a chassis aggregation technology but it is dedicated for Cisco Catalyst 6500 Series Switches.
VSS increases operational efficiency by simplifying the network, reducing switch management
overhead by at least 50 percent -> A is correct
Single point of management, IP address, and routing instance for the Cisco Catalyst 6500 virtual
switch
+ Single configuration file and node to manage. Removes the need to configure redundant switches
twice with identical policies.
+ Only one gateway IP address is required per VLAN, instead of the three IP addresses per
VLAN used today -> C is correct while D is not correct.
+ Removes the need for Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol
(VRRP), and Gateway Load Balancing Protocol (GLBP)-> so maybe E is not correct.
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-
switching-system-1440/prod_qas0900aecd806ed74b.html
Question 3
A. 1:N
B. N:1
C. 1:1
D. 1+N
E. N+1
Answer: A
Explanation
1:N master redundancy: Every switch in the stack can act as the master. If the current master fails,
another master is elected from the stack.
1:N master redundancy allows each stack member to serve as a master, providing the highest
reliability for forwarding. Each switch in the stack can serve as a master, creating a 1:N availability
scheme for network control. In the unlikely event of a single unit failure, all other units continue to
forward traffic and maintain operation.
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-
switches/prod_white_paper09186a00801b096a.html
Note:
N+1 simply means that there is a power backup in place should any single system component fail. The
‘N’ in this equation stands for the number of components necessary to run your system. The ‘+1’
means there is one independent backup should a component of that system fail. An example of “N+1”
is your family has 5 members, so you need 5 cups to drink. But you have one extra cup for
redundancy (6 cups in total) so that if any cup breaks, you still have enough cups for the family.
Access list Questions
Question 1
A. 1
B. 64
C. 99
D. 100
E. 299
F. 1099
Answer: D
Explanation
In most cases we only need to remember 1-99 is dedicated for standard access lists while 100 to 199
is dedicated for extended access lists.
Question 2
Answer: A
Explanation
Therefore we can configure a standard acl with keyword “standard” and configure an extended acl
with keyword “extended”. For example this is how to configure an named extended access-list:
Router(config)#ip access-list extended in_to_out permit tcp host 10.0.0.1 host 187.100.1.6 eq telnet
Question 3
Answer: A
Explanation
Question 4
A network engineer wants to allow a temporary entry for a remote user with a specific username and
password so that the user can access the entire network over the internet. Which ACL can be used?
A. reflexive
B. extended
C. standard
D. dynamic
Answer: D
Explanation
We can use a dynamic access list to authenticate a remote user with a specific username and
password. The authentication process is done by the router or a central access server such as a
TACACS+ or RADIUS server. The configuration of dynamic ACL can be read
here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524.sht
ml
Question 5
A. An ACL have must at least one permit action, else it just blocks all traffic.
B. ACLs go bottom-up through the entries looking for a match
C. An ACL has a an implicit permit at the end of ACL.
D. ACLs will check the packet against all entries looking for a match.
Answer: A
Question 6
A. removing an entry
B. opening the access-list in notepad
C. adding an entry
D. resequencing
Answer: D
Explanation
You can check the named access-list with the “show ip access-list” (or “show access-list”) command:
R1#show ip access-list
Standard IP access list nat_traffic
10 permit 10.1.0.0, wildcard bits 0.0.255.255
15 permit 10.2.0.0, wildcard bits 0.0.255.255
20 permit 10.3.0.0, wildcard bits 0.0.255.255
We can resequence a named access-list with the command: “ip access-list resequence access-
list-name starting-sequence-number increment “. For example:
R1(config)#ip access-list nat_traffic 100 10
R1#show ip access-list
Standard IP access list nat_traffic
100 permit 10.1.0.0, wildcard bits 0.0.255.255
110 permit 10.2.0.0, wildcard bits 0.0.255.255
120 permit 10.3.0.0, wildcard bits 0.0.255.255
We can see the starting sequence number is now 100 and the increment is 10. But notice that
resequencing an access-list cannot change the order of entries inside it but it is the best choice in this
question. Adding or removing a n entry does not change the order of entries. Maybe we should
understand this question “how to renumber the entries in a named access-list”.
Question 7
Which of the following are the valid numbers of standard ACL? (Choose two)
A. 50
B. 1550
C. 150
D. 1250
E. 2050
Answer: A B
Explanation
The range of standard ACL is 1-99, 1300-1999 so 50 and 1550 are two valid numbers.
Question 8
Host is able to ping a web server but it is not able to do HTTP request. What is the most likely cause
the problem?
Question 9
Answer: B
Explanation
The range of standard ACL is 1-99, 1300-1999 so 50 is a valid number for standard ACL.
Question 10
While troubleshooting a connection problem on a computer, you determined that the computer can
ping a specific web server but it cannot connect to TCP port 80 on that server. Which reason for the
problem is most likely true?
Answer: D
IP Routing
Question 1
A router has learned three possible routes that could be used to reach a destination network. One
route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a
metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router
install in the routing table?
A. the RIPv2 route
B. all three routes
C. the OSPF and RIPv2 routes
D. the OSPF route
E. the EIGRP route
Answer: E
Explanation
When one route is advertised by more than one routing protocol, the router will choose to use the
routing protocol which has lowest Administrative Distance. The Administrative Distances of popular
routing protocols are listed below:
Question 2
Which command can you enter to route all traffic that is destined for 192.168.0.0/20 to a specific
interface?
A. router(config)#ip route 192.168.0.0 255.255.240.0 GigabitEthernet0/1
B. router(config)#ip route 0.0.0.0 255.255.255.0 GigabitEthernet0/1
C. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
D. router(config)#ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1
Answer: A
Explanation
Question 3
Which command can you enter to set the default route for all traffic to an interface?
A. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
B. router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1
C. router(config-router)#default-information originate
D. router(config-router)#default-information originate always
Answer: A
Question 4
Which three statements about static routing are true? (Choose three)
A. It uses consistent route determination.
B. It is best used for small-scale deployments.
C. Routing is disrupted when links fail.
D. It requires more resources than other routing methods.
E. It is best used for large-scale deployments.
F. Routers can use update messages to reroute when links fail.
Answer: A B C
Explanation
The static routing specifies a fixed destination so it is “consistent”. It is best used for small-scaled
places where there are a few routers only. When links fail, static route cannot automatically find an
alternative path like dynamic routing so routing is disrupted.
Question 5
If host Z needs to send data through router R1 to a storage server, which destination MAC address
does host Z use to transmit packets?
A. the host Z MAC address
B. the MAC address of the interface on R1 that connects to the storage server
C. the MAC address of the interface on R1 that connects to host Z
D. the MAC address of the storage server interface
Answer: C
Explanation
Host Z will use ARP to get the MAC address of the interface on R1 that connects to it and use this MAC
as the destination MAC address. It use the IP address of the storage server as the destination IP
address.
For example in the topology below, host A will use the MAC address of E0 interface of the router as its
destination MAC address to reach the Email Server.
Question 6
Answer: D
Explanation
The Administrative Distance (AD) of popular routing protocols is shown below. You should learn them
by heart:
Note: The AD of iBGP is 200
The smaller the AD is, the better it is. The router will choose the routing protocol with smallest AD.
Question 7
Answer: D
Question 8
Answer: D
Question 9
When a router makes a routing decision for a packet that is received from one network and destined
to another, which portion of the packet does if replace?
A. Layer 2 frame header and trailer
B. Layer 3 IP address
C. Layer 5 session
D. Layer 4 protocol
Answer: A
Explanation
The Layer 2 information (source and destination MAC) would be changed when passing through each
router. The Layer 3 information (source and destination IP addresses) remains unchanged.
Question 10
Answer: B
Question 11
Which dynamic routing protocol uses only the hop count to determine the best path to a destination?
A. IGRP
B. RIP
C. EIGRP
D. OSPF
Answer: B
IP Routing 2
Question 1
Answer: B
Question 2
Which component of the routing table ranks routing protocols according to their preferences?
A. administrative distance
B. next hop
C. metric
D. routing protocol code
Answer: A
Explanation
The administrative distance of each protocol is compared to see if that route is better or not.
Question 3
Which route source code represents the routing protocol with a default administrative distance of 90 in
the routing table?
A. S
B. E
C. D
D. R
E. O
Answer: C
Explanation
Letter “D” is used to symbolize for EIGRP (with a default AD of 90). Letter “E” is not used for EIGRP
because it has been used for Exterior Gateway Protocol (EGP). It is a obsolete routing protocol now.
Question 4
When enabled, which feature prevents routing protocols from sending hello messages on an interface?
A. virtual links
B. passive-interface
C. directed neighbors
D. OSPF areas
Answer: B
Question 5
How does a router handle an incoming packet whose destination network is missing from the routing
table?
Answer: B
Explanation
If there is a default route then surely the router will forward all unknown traffic to there. But if there is
no default route in the routing table then the router will discard the packet. In this question we
suppose there is no default route in the routing table. Otherwise the question should state it (this
question is unclear).
Question 6
Which path does a router choose when it receives a packet with multiple possible paths to the
destination over different routing protocols?
A. the path with both the lowest administrative distance and the highest metric
B. the path with the lowest administrative distance
C. the path with the lowest metric
D. the path with both the lowest administrative distance and lowest metric
Answer: B
Question 7
If a route is not present in the routing table for a particular destination, what would the router do?
A. Default route
B. Flood
C. Drop
Answer: A
Question 8
When a device learns multiple routes to a specific network, it installs the route with?
Answer: A
Explanation
Making a forwarding decision actually consists of three sets of processes: the routing protocols, the
routing table, and the actual process which makes a forwarding decision and switches packets. The
longest prefix match always wins among the routes actually installed in the routing table, while the
routing protocol with the lowest administrative distance always wins when installing routes into the
routing table.
Reference: http://www.cisco.co
m/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/8651-21.html
Therefore in this question, the process will be: longest bit match > lowest AD > lowest metric > equal
load balancing.
Question 9
When a router is unable to find a known route in the routing table, how does it handle the packet?
Answer: A
Explanation
In fact this question is not clear. If we understand that “router is unable to find a known route in the
routing table” and there is no default route in the routing table then the router will surely discard the
packet -> A is correct. But we are not sure if there is a default route or not so let learn more about
gateway of last resort.
A Gateway of Last Resort is a route used by the router when no other known route exists to send the
IP packet. For CCNA level, when ip routing feature is enabled, a gateway of last resort is usually
created by:
+ The “ip default-network” command (but dynamic routing protocols have different behaviors). But in
general, the “ip default-network” cannot set the gateway of last resort without a known route in the
routing table.
+ Creating a static route to network 0.0.0.0 0.0.0.0 is another way to set the gateway of last resort
on a router. This is the reason why this question is not clear as it does not tell us if a default route
exists or not.
Maybe in this question a default route does not exist. Otherwise the author would notice and indicate
it in the question.
Question 10
If router R1 knows a static route to a destination network and then learns about the same destination
network through a dynamic routing protocol, how does R1 respond?
Answer: D
Explanation
The default administrative distance value of static route is 1 which is always smaller than any dynamic
routing protocol so it is always preferred to dynamic routing protocols.
Question 11
Which two statements about floating static routes are true? (Choose two)
Answer: C D
Explanation
Floating static routes are static routes that have an administrative distance greater than the
administrative distance (AD) of another static route or dynamic routes. By default a static route has
an AD of 1 then floating static route must have the AD greater than 1. Floating static route has a
manually configured administrative distance greater than that of the primary route and therefore
would not be in the routing table until the primary route fails.
Question 12
Answer: C
Explanation
A host route for IPv4 has the mask /32, and a host route for IPv6 has the mask /128. If an IPv4
address is configured with a mask of /32 on an interface of the router, which is typical for loopback
interfaces, the host route appears in the routing table only as connected (for example in the routing
table we will see this line: “C 10.10.10.1/32 is directly connected, Loopback0”.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/ip-routing/116264-technote-ios-00.html
Question 13
When troubleshooting Ethernet connectivity issues, how can you verify that an IP address is known to
a router?
Explanation
If the IP address exists in the routing table then we can say the local router knew the way to reach
that destination. But this question wants to ask if the destination has communicated to the local router
or not (“an IP address is known to a router”). Maybe it is a tricky question.
Subnetting Questions
Question 1
Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command.
Which network addresses should be used for Link A and Network A? (Choose two)
A. Network A – 172.16.3.48/26
B. Network A – 172.16.3.128/25
C. Network A – 172.16.3.192/26
D. Link A – 172.16.3.0/30
E. Link A – 172.16.3.40/30
F. Link A – 172.16.3.112/30
Answer: B D
Explanation
Network A needs 120 hosts < 128 = 27 -> Need a subnet mask of 7 bit 0s -> “/25″.
Answer E “Link A – 172.16.3.40/30″ is not correct because this subnet belongs to MARKETING subnet
(172.16.3.32/27).
Answer F “Link A – 172.16.3.112/30″ is not correct because this subnet belongs to ADMIN subnet
(172.16.3.96/27).
Question 2
Answer: A
Explanation
Although all above answers are correct but 172.16.1.0/26 is the best choice as it is the most specific
prefix-match one.
Question 3
You have been asked to come up with a subnet mask that will allow all three web servers to be on the
same network while providing the maximum number of subnets. Which network address and subnet
mask meet this requirement?
A. 192.168.252.0 255.255.255.252
B. 192.168.252.8 255.255.255.248
C. 192.168.252.8 255.255.255.252
D. 192.168.252.16 255.255.255.240
E. 192.168.252.16 255.255.255.252
Answer: B
Question 4
Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24
Answer: B
Explanation
We need to summarize 4 subnets so we have to move left 2 bits (2 2 = 4). In this question we can
guess the initial subnet mask is /24 because 10.0.0.0, 10.0.1.0, 10.0.2.0, 10.0.3.0 belong to different
networks. So “/24″ moves left 2 bits -> /22.
Question 5
How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet
mask of 255.255.255.240?
A. 4
B. 8
C. 16
D. 14
Answer: D
Explanation
From the subnet mask of 255.255.255.240 (/28) we learn there are 2 4 – 2 = 14 hosts per subnet.
Question 6
Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses.
Which are these addresses? (Choose three)
A. 172.16.9.0
B. 172.16.8.0
C. 172.16.31.0
D. 172.16.20.0
Answer: A C D
Explanation
From the subnet mask of 255.255.248.0 we learn that the increment is 8 therefore 172.16.8.0 is a
network address which cannot be assigned to a host. Other network addresses are 172.16.16.0,
172.16.24.0, 172.16.32.0… Notice that 172.16.31.0 is a valid host address (which belongs to
172.16.24.0 to 172.16.31.255 subnet).
Question 7
Answer: E
Explanation
Question 8
Answer: A
Question 9
A. With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a
unique IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate
with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate
with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
Answer: B D E
Explanation
The principle here is if the subnet mask makes two IP addresses 10.1.0.36 and 10.1.1.70 in the same
subnet then the Network device A does not need to have IP addresses on its interfaces (and we don’t
need a Layer 3 device here).
A quick way to find out the correct answers is notice that all 255.255.255.x subnet masks will
separate these two IP addresses into two separate subnets so we need a Layer 3 device here and each
interface must require an IP address on a unique IP subnet -> A, C are not correct while B, D are
correct.
With 255.255.254.0 subnet mask, the increment here is 2 in the third octet -> the first subnet is from
10.1.0.0 to 10.1.1.255, in which two above IP addresses belong to -> each interface of Network
device A does not require an IP address -> E is correct.
Question 10
Refer to the exhibit, you determine that Computer A cannot ping Computer B. Which reason for the
problem is most likely true?
A. The Subnet mask for Computer A is incorrect
B. The default gateway address for Computer A is incorrect
C. The subnet mask for computer B is incorrect.
D. The default gateway address for computer B is incorrect
Answer: A
RIP Questions
Question 1
Answer: A B
Explanation
“Enable RIP” is surely correct to configure RIPv2 but “enable auto-summary” is not recommended.
Maybe there is another suitable option for this question (like “use ‘version 2’ command” or “Allowing
Unicast Updates for RIP”).
Question 2
Which two options are requirements for configuring RIPv2 for IPv4 (Choose two)?
A. enabling RIP authentication
B. connecting RIP to a WAN Interface
C. enabling auto route summarization
D. allowing unicast updates for RIP
E. enabling RIP on the router
Answer: D E
Explanation
To enable RIP surely we have to enable it first (with the “router rip” command in global configuration
mode) -> E is correct.
RIPv2 sends its updates via multicast but in Nonbroadcast Multiple Access (NBMA) environment,
multicast is not allowed so we have to use unicast to send RIPv2 updates -> D is correct.
Question 3
Answer: A
Explanation
The split-horizon rule states that “a router never sends information about a route back in same
direction which is original information came”. This rule is used in distance vector protocol (like RIP or
EIGRP) to prevent Layer 3 routing loop.
Question 4
interface FastEthernet0/1
description site id:14254489
ip address 172.17.0.1 255.255.0.0
router rip
passive-interface FastEthernet0/0
network 172.16.0.0
network 172.17.0.0
version 2
Answer: A
Explanation
A passive-interface with RIP prevents that interface from sending RIP advertisements but it is still
receiving RIP updates from other RIP neighbors. This behavior is different from EIGRP and OSPF
where the passive-interface statement stops forming neighbor adjacencies over that link.
Question 5
Which type of routing protocol operates by exchanging the entire routing information?
A. distance vector protocols
B. link state protocols
C. path vector protocols
D. exterior gateway protocols
Answer: A
Explanation
Distance vector protocols (like RIP) exchanges the entire routing information each time the routers
send the updates.
Note: EIGRP is considered an advanced distance vector protocol so it does not send the whole routing
table for each update.
Question 6
Refer to the exhibit. After you apply the given configuration to R1, you determine that it is failing to
advertise the 172.16.10.32/27 network .Which action most likely to correct the problem?
<exhibit missing>
Answer: B
OSPF Questions
Question 1
Which three statements about link-state routing are true? (Choose three)
Answer: D E F
Question 2
Which three characteristics are representative of a link-state routing protocol? (Choose three)
A. provides common view of entire topology
B. exchanges routing tables with neighbors
C. calculates shortest path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates
Answer: A C D
Question 3
What are two drawbacks of implementing a link-state routing protocol? (Choose two)
Answer: C D
Question 4
Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1.
Which two configuration changes can you make on edge-1 to allow the two routers to establish
adjacency? (Choose two)
Answer: D E
Explanation
In order to become OSPF neighbor following values must be match on both routers:
+ Area ID
+ Authentication
+ Hello and Dead Intervals
+ Stub Flag
+ MTU Size
Therefore we need to adjust the MTU size on one of the router so that they are the same. Or we can
tell OSPF to ignore the MTU size check with the command “ip ospf mtu-ignore”.
Question 5
A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers
cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the
output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in
the graphic, what is the cause of this problem?
Answer: D
Explanation
In this case Ethernet0 of R1 has Hello and Dead Intervals of 5 and 20 while R2 has Hello and Dead
Intervals of 10 and 40 -> R1 and R2 cannot form OSPF neighbor relationship.
Question 6
A. link-state
B. distance-vector
C. path-vector
D. other
Answer: A
Explanation
The information available to a distance vector router has been compared to the information available
from a road sign. Link state routing protocols are like a road map. A link state router cannot be fooled
as easily into making bad routing decisions, because it has a complete picture of the network. The
reason is that unlike the routing-by-rumor approach of distance vector, link state routers have
firsthand information from all their peer routers. Each router originates information about itself, its
directly connected links, and the state of those links (hence the name). This information is passed
around from router to router, each router making a copy of it, but never changing it. The ultimate
objective is that every router has identical information about the internetwork, and each router will
independently calculate its own best paths.
Reference: http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4
Question 7
Refer to the exhibit. If R1 sends traffic to 192.168.101.45 the traffic is sent through which interface?
A. FastEthernet0/1
B. FastEthernet0/0
C. FastEthernet1/0
D. FastEthernet1/1
Answer: D
Explanation
192.168.101.45 belongs to 192.168.0.0/16 network so the router will use FastEthernet1/1 as the exit
interface.
Question 8
R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this
problem? (Choose two)
A. All of the routers need to be configured for backbone Area 1.
B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.
C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being
established.
D. The hello and dead interval timers are not set to the same values on R1 and R3.
E. EIGRP is also configured on these routers with a lower administrative distance.
F. R1 and R3 are configured in different areas.
Answer: D F
Explanation
D and F are correct because these entries must match on neighboring routers:
Question 9
Refer to the exhibit. You have discovered that computers on the 192.168.10.0/24 network can
ping their default gateway, but they cannot connect to any resources on a remote network. Which
reason for the problem is most likely true?
R1
interface Loopback0
ip address 172.16.1.1 255.255.255.255
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
interface FastEthernet0/1
ip address 192.168.10.1 255.255.255.0
!
router ospf 1
router-id 172.16.1.1
network 172.16.1.1 0.0.0.0 area 0
network 192.168.10.0 0.0.0.255 area 0
Answer: A
Explanation
The most obvious thing in this configuration is R1 forgot to run OSPF on interface Fa0/0 (with the
“network 192.168.12.0 0.0.0.255 area …”) command so the computers behind 192.168.10.0/24
network does not know how to reach resources on a remote network.
Question 10
Which parameter or parameters are used to calculate OSPF cost in Cisco routers?
Answer: B
Explanation